Posts

Week 8 - Relational Database

A relational database is a system used to store and organize information in a structured way. Instead of keeping everything in one long file, it separates information into tables. These tables work a lot like spreadsheets, with columns that describe the type of data, such as a name or a date, and rows that contain the actual data. What makes relational databases special is that the tables can be connected, or related, to each other. For example, one table might hold customer information, while another stores their orders, and the database links those pieces together. This approach was first introduced in 1970 by E. F. Codd, a researcher at IBM. Before that, information was often kept in flat files, which made it hard to find specific details or make connections between different pieces of data. Codd’s idea completely changed how businesses manage large amounts of information. To interact with a relational database, people use a language called SQL, or Structured Query Language. It al...

Week 7 - Access Control

Access control is how organizations decide who can see or use certain information, tools, or areas. It’s a key part of keeping data and systems safe. There are several models used to manage access, and each works a little differently depending on what a company needs. The first type is Discretionary Access Control (DAC) . This model gives control to the person who owns the information or file. That person decides who else can access it. DAC is easy to use and flexible, but it can be risky if users make mistakes or don’t manage access carefully. Mandatory Access Control (MAC) is much stricter. In this model, only a system administrator can decide who gets access. Users can’t make changes on their own. MAC is often used in high-security places like government offices because it keeps control tight and consistent. Role-Based Access Control (RBAC) is common in businesses. People are given access based on their job role. For example, a manager might have access to more tools than a reg...

Week 6 - Cloud Security

Cloud security is an important part of protecting data and systems that are stored and used in the cloud. As more businesses move to cloud platforms to store files, run applications, and manage operations, it’s critical to understand how cloud security works and why it matters. Unlike traditional IT security, which focuses on physical servers and devices, cloud security is designed to protect data that is stored across multiple locations and accessed through the internet. Cloud environments are common targets for cyberattacks, data breaches, and unauthorized access. Without strong cloud security, businesses risk losing sensitive information, damaging their reputation, and even facing legal issues. That’s why cloud security uses a combination of tools and practices to keep information safe. Some key parts of cloud security include identity and access management, which controls who can access data; encryption, which scrambles data so it can’t be read without permission; and regular moni...

Week 5 - Can the Cloud Keep Up

The Internet of Things (IoT) is exploding, connecting everything from smart home devices to industrial machines. This rapid growth creates huge amounts of data that need to be processed, stored, and managed efficiently. Many experts believe the cloud will play a key role in handling this flood of information. Cloud computing offers flexible resources and scalable infrastructure that can adjust to the growing number of IoT devices. However, there are challenges to overcome. For example, IoT devices often generate real-time data that needs quick processing, which can be difficult when relying on distant cloud servers. This has led to the rise of “edge computing,” where data is processed closer to the devices themselves to reduce delays. Security and privacy are also major concerns. As more devices connect to the cloud, protecting data from cyberattacks becomes critical. The cloud must evolve to offer stronger security measures to keep IoT data safe. In the future, a combination of clo...

Week 4 - Amazon VPC

Amazon Virtual Private Cloud (Amazon VPC) is a service from AWS that lets you create your own private network in the cloud. It works like a traditional data center but gives you the flexibility and scalability of the cloud. With a VPC, you can set up parts of your network called subnets, choose your own IP address ranges, and control how data moves in and out using route tables and gateways. For example, an internet gateway lets your resources connect to the internet, while a VPC endpoint lets you privately connect to AWS services without going through the internet. Every AWS account comes with a default VPC so you can start quickly, but you can also create your own custom VPC with settings that meet your specific needs. You can connect your VPC to other networks, like other VPCs or even your company’s on-premises network, using features like VPC peering, VPNs, or transit gateways. AWS also offers tools like traffic mirroring to help you monitor network activity and VPC flow logs to t...

Week 3 - Successful Cloud Migration

Moving your business to the cloud can feel overwhelming, but it gets easier if you follow a clear plan. Softchoice breaks the process down into five simple steps. First, you start with Gap Analysis . This means looking at your current technology setup to see what works well and what needs to improve. It helps you understand where the cloud can help your business. Next is Get Moving . This step is about starting small, like trying out cloud tools or setting up basic cloud systems. It prepares you for the bigger move. After that, comes Planning . Here, you make a detailed plan about which cloud services to use, when to move things, and who will help with the migration. Having a good plan makes the move smoother. Then you have the Migration step, where you actually move your apps and data to the cloud. This needs to be done carefully to avoid problems and keep your business running. Finally, there’s Optimization . Once everything is in the cloud, you work on making it run better, st...

Week 2 - Cloud Deployment Models

Cloud computing has changed how businesses handle data, and choosing the right cloud deployment model is key. The most common models include public, private, hybrid, and community clouds. A public cloud is run by third-party providers and shared by many users. It’s affordable and easy to scale but offers less control and security. In contrast, a private cloud is dedicated to one organization, either hosted on-site or by another provider. It provides stronger security and control but usually costs more. The hybrid cloud combines both public and private clouds, giving businesses flexibility to move data and workloads between them. This helps optimize resources and meet changing needs. Lastly, a community cloud is shared by organizations with similar requirements, like regulatory compliance, allowing them to collaborate more effectively. Choosing the right cloud model depends on your organization’s security needs, budget, and how much control and flexibility you require. Understand...