Your browser does not allow storing cookies. We recommend enabling them.

Cloud Applications

Thin Clients, Smarts and Data in the Cloud

Cloud applications are usually written with fairly thin clients and most of the heavy computation happening in the cloud. Data is usually stored in the cloud.

The benefits of this approach include writing most of the application code only once, even though multiple operating systems and many different mobile devices need to be supported. Power consumption on handheld devices is also greatly reduced when the computation is moved to the cloud.

Most cloud-based applications require an active Internet connection to function. This makes them dependent on the continued operation of networks.

Web Browser as an Enabling Technology

Modern web browsers have become the universal client technology. Most applications no longer require installation of a separate client.

Most new cloud-based applications are written using HTML5 and Javascript to implement the user interface. Frameworks like React can be used to implement the whole client application in Javascript.

Applications typically communicate with servers on the cloud using REST APIs, that is, using JSON-formatted data objects sent over HTTP. The applications increasingly rely on TLS and PKI for security and OAUTH or user-specific authentication tokens for authentication.

Mobile Applications

Mobile applications can be implemented either using a mobile browser or as native applications that have to be installed.

Most mobile devices today are based either on Google's Android operating system or Apple's IOS. Thus, many companies prepare versions of their applications for both of these platforms. The same platforms also cover tablets.

Smart Devices (Internet of Things, or IoT)

Smart devices also usually rely heavily on the cloud. Often, they just act as sensors that send information to the cloud, actual computation being performed in the cloud, and results are then returned to the device for display and control adjustment.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now