Cloud computing: Difference between revisions

Content deleted Content added
m fixed typo (period -> comma)
Citation bot (talk | contribs)
Add: publisher, date, authors 1-2. | Use this bot. Report bugs. | Suggested by AManWithNoPlan | Linked from User:AManWithNoPlan/sandbox5 | #UCB_webform_linked 1139/5810
Line 97:
 
=== Leaky abstractions ===
Cloud computing [[Abstraction (computer science)|abstractions]] aim to simplify resource management, but [[Leaky abstraction|leaky abstractions]] can expose underlying complexities. These variations in abstraction quality depend on the cloud vendor, service and [[Software architecture|architecture]]. Mitigating leaky abstractions requires users to understand the implementation details and limitations of the cloud services they utilize. <ref>{{Cite book |title=Cloud Native Infrastructure: Patterns for Scalable Infrastructure and Applications in a Dynamic Environment |date=25 October 2017 |publisher=O'Reilly Media |isbn=9781491984253}}</ref><ref>{{Cite book |title=Cloud Observability in Action |isbn=9781633439597 |last1=Hausenblas |first1=Michael |date=26 December 2023 |publisher=Simon and Schuster }}</ref><ref>{{Cite book |title=Microservices From Day One: Build robust and scalable software from the start |isbn=9781484219379 |last1=Jr |first1=Cloves Carneiro |last2=Schmelmer |first2=Tim |date=10 December 2016 |publisher=Apress }}</ref>
 
=== Service lock-in within the same vendor ===
Service lock-in within the same vendor occurs when a customer becomes dependent on specific services within a cloud vendor, making it challenging to switch to alternative services within the same vendor when their needs change. <ref>{{Cite book |title=Cloud Computing with the Windows Azure Platform |isbn=9781118058756 |last1=Jennings |first1=Roger |date=29 December 2010 |publisher=John Wiley & Sons }}</ref><ref>{{Cite book |title=Cloud and Virtual Data Storage Networking |isbn=9781466508446}}</ref>
 
===Security and privacy===