1707Currently online
77Today's Reading
10Share Today
Multilingual display

Cloud Computing: What are the 7 main characteristics of a cloud application?

2018-04-06 20:48:32

Cloud computing, known as the "Internet of cloud applications", is a new network after the Internet and the Web. Therefore, cloud applications play a pivotal role in the development of cloud computing. In the future, major changes in cloud computing also require cloud applications to support the development of the entire industry. Cloud applications can be seen as the upgrade of SaaS, most of the network disk belongs to the category of SaaS, including personal network disk (such as network disk, 360 cloud disk and Tencent micro cloud) and enterprise network disk (Oat enterprise cloud disk (OATOS), fast disk and 115 network disk, etc.). So, what are the seven main characteristics that cloud applications should have?


Cloud computing

Cloud Applications: The "cell" of cloud Computing

Cloud computing is the "Internet of cloud applications", which is a new "network" after the Internet and the Web. This is an "application network" that transcends hardware, traditional software, physical networks (Internet), information networks (Web), and traditional computing models. "Cloud application" is so important in cloud computing that the most significant technological change in the history of software must start from "application", which supports the building of the entire software industry.

"Cloud applications" must have the following seven characteristics

All "cloud applications" must be compatible with the Web and can be accessed as long as there is an Internet and browser, regardless of the hardware being used, which can be a computer, a smartphone, or even a TV. All "cloud applications" run on a standard cloud computing platform. The platform must be completely isolated from the physical. "Cloud applications" do not directly access any computer or network of anything, such as files, networks, databases, forms, data fields, data types, memory, peripherals, etc. The "cloud application" must be completely isolated from the operating environment, and the user does not need to care about the operating environment: including hardware, software, databases, middleware, and so on.


Nonprocedural "cloud applications" are no longer programs, but "executable documents." Creating a "cloud app" is like writing a document. "Cloud Applications" for the first time extended the concept of "what you see is what you get" to the field of programming. The "cloud application" no longer consists of any "intermediate program." "Cloud application" developers do not need to have programming knowledge, do not need to understand programming theory, programming languages, databases, etc. Developing cloud applications is equivalent to transforming industry knowledge and daily work experience into another form of knowledge. "Cloud applications" can be copied, transferred, saved, archived, shared, and run like documents.


Mobility All "cloud applications" must be able to move like data. Not only can the "cloud application" be moved, but the "cloud application" can also be moved together with the data used, and can be easily implanted into the target operating environment. Not only the data of the "cloud application" can be moved, but also the "ecological environment" of the "cloud application" can be moved together with the "cloud application", including the use license (license) and configuration of the "cloud application".


Security "cloud applications" must fundamentally eliminate the breeding ground for software viruses. Needless to say, as long as it is software, it is impossible to prevent software viruses, and the same is true of "cloud applications". "Cloud applications" must be based on a new concept in security: "software can have viruses, but the security system of cloud computing must let these viruses have no hiding place." This requires that all "cloud applications" must be able to clearly list any actions they may perform, the data they may access, and any actions they may do with the data. The user can allow/block/modify/authorize these actions, data access, and data operations one by one. All this without having to look at the source code or modify the source code.


All "cloud applications" can be assembled like documents. Multiple applications created by different developers can be assembled into a new application, all invoking the same user data. An application can be split into multiple smaller applications, and even one function can be copied into another application, all without having to look at the source code and modify the source code.


The controllable "cloud application" must fundamentally solve the problem of software intellectual property protection. Without authorization, users cannot do anything with the cloud application, not even copy it. However, with authorization, users can modify and personalize the "cloud application" at any level. All this without having to look at the source code or modify it.


Portability All "cloud applications" must strictly implement the separation of programs and data. "Cloud applications" are completely independent of the data they use. Any "cloud application" developed by a third party can be ported to any user database, using the data format chosen by the user. All this without having to look at the source code or modify it.