Bookory

Cybersecurity Blogs & Insights

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

serverless computing- 5

What is Serverless Computing?

2 min read

Got baffled by the name my friends🙊

Its not like you don’t need servers for computing.


It only means that the developers need not wrack their heads about the server availability.  It is the responsibility of the cloud provider and they bill clients as per demand.

Let us brief you with a small example.

Booking out gas cylinders was so common right when we were young?

If you miss it, mom will go bonkers!! And you are without 🍳 food.

Even then both booking and delivery infrastructure was in place. But  giving a call and getting it scheduled was our piece right

Every home had a gas cylinder dedicated. Well, now we live in apartments and piped gas has made us forget those times.


This can be compared to serverless computing. Simply pay as per your use. Management of gas cylinders is not anyone’s headache anymore. They are assured that from the common cylinder pool gas will be made available whenever they need it.

Similarly –
‘Serverless’ computing runs on servers, but it is up to the cloud vendor to provision server space as it is needed by the application; no specific machines are assigned for a given function or application.

On the other hand, each container lives on one machine at a time and uses the operating system of that machine, though moving them to a different machine is no big deal!
PS: I have taken the liberty of cooking gas as an example. This is just a creative liberty to explain a concept fluidly.

PS: Going by that analogy, my grandmom used to own her fuel. She would cut the wood herself and it would take her ages to do it (Just like owning Servers 🙊) I wonder if she could have been a cloud mafia now!!

PS: Don’t sue me for those examples 🙈

Latest Articles

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Secure Better Data Protection with Strong Cybersecurity Now

2 min readFree ISO 27001 Templates: Your One Stop Shop Achieving ISO 27001 certification can seem...

Secure Better Data Protection with Strong Cybersecurity Now

6 min readIn today’s digital era, data has become one of the most valuable assets for individuals...

Better security with AI Against Phishing and Ransomware

7 min readArtificial Intelligence (AI) is a game-changer in many aspects of our lives, from how we...

Revolutionize Cybersecurity with AI for Better Protection

8 min readIn a world where cyber threats are romping like supervillains in the digital domain, who...

Master Zero Trust for Better Data Privacy in Digital Age

5 min readIn the rapidly evolving digital landscape, where data breaches have become alarmingly...

Better Results: Employee Training for ISO 27001 Compliance

4 min readLet’s face it – when we hear “ISO 27001,” most of us think of complex...

Better Results with NIST CSF 2.0: Manage Cybersecurity Risks

7 min readIntroduction In today’s digital era, cybersecurity threats are lurking around every...

AI and ISO 27001: The Best Way to Secure Your Cyber World

5 min readLadies and gents, gather around your screens and keyboards as we take a trip down memory...

What You Need to Know About GDPR and Cybersecurity

6 min readImagine this: You’re sipping your morning coffee, scrolling through your emails when you...

ISO 27001 Compliance Simplified in the Role of Employee Training

5 min readLet’s face it – when we hear “ISO 27001,” most of us think of complex...

Navigating One of the Top Cyber Threats of Our Time

8 min readIn the digital age, where connectivity and convenience reign supreme, a lurking menace...

The Unseen Advantages of ISO 27001 for Supply Chain Security

5 min readIn an increasingly interconnected world, supply chains have become more complex and...

Why Startups Need ISO 27001 Certification – Secure Your Future Now

5 min readIntroduction Hey there! If you’re knee-deep in managing a startup, you know that...

Introducing the NIST Cybersecurity Framework (CSF) 2.0: A Comprehensive Guide to Managing Cybersecurity Risks

6 min readIntroduction In today’s digital era, cybersecurity threats are lurking around every...

Small Business Cybersecurity: Safeguarding Your Remote Team with ISO 27001

5 min readHey there, digital defenders and remote work champions! Is your team scattered across the...

The Unlikely Duo: Data Protection vs. Cybersecurity – A Tale of Digital Guardians

3 min readWelcome, fellow cyber voyagers, to the epic clash of bytes, the showdown of ones and...

Navigating the Cybersecurity Minefield: Crafting Your Response Plan

3 min readIn the chaotic realm of cyberspace, where digital pirates roam and data breaches loom...

What is Serverless Computing?

2 min readGot baffled by the name my friends🙊 Its not like you don’t need servers for computing. It...

Types of Firewall

6 min readWhat is Firewall? Firewall devices and services can offer protection beyond standard...
Shopping cart close