SlideShare a Scribd company logo
1 of 20
Submitted By:
Saptarshi Chakraborty(221130)
Vikalp Mehta(221167)
Utkarsh Kumar Singh(221156)
Varun Tripathi(221163)
The practice of using a network of remote servers
hosted on the Internet to store, manage, and
process data, rather than a local server or a
personal computer
Grid Computing

Cloud Computing



Grids enable access to shared
computing power and storage
capacity



Clouds enable access to leased
computing power and storage
capacity 



Grids are an open source
technology. Resource users
and providers alike can
understand and contribute to
the management of their grid



Clouds
are
a
proprietary
technology only the resource
provider knows exactly how their
cloud
manages data,
job
queues, security requirements
etc.



Computing
centers
are
distributed
across different
sites, countries and continents



The cloud providers often have
private data centers which are
often centralized in a few
location
1. Services and infrastructure are maintained on
a private network
2. These cloud offers highest level of security and
control
3. But company has to maintain and purchase all
software and reduces cost savings
1.Public cloud is the one where services
and infrastructure are provided off site
2.Public cloud requires extra security and
reliability
3.These platform offers greatest level of
efficiency in shared resources
1. Includes a variety of public and private options with
multiple providers
2. It allows you to keep each aspect at your business in
most effective environment possible
3. One limitation is that you have to keep track of multiple
different security platforms and ensure that all aspect of
business can communicate with each others .
When using Saas ,
vendor can create a
private cloud just for
your company inside
their fire wall . They
provide you with a
virtual private network
for additional security
Cloud computing
Cloud computing
Cloud computing
Cloud computing
Cloud computing
Cloud computing

More Related Content

What's hot

Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)Rohit Jain
 
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Prasadu Peddi
 
Introduction to cloud computing by Revanth Reddy Mekala
Introduction to cloud computing by Revanth Reddy MekalaIntroduction to cloud computing by Revanth Reddy Mekala
Introduction to cloud computing by Revanth Reddy MekalaRevanthreddyMekala
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingAlexis Blandin
 
Integrity for join queries
Integrity for join queriesIntegrity for join queries
Integrity for join queriesPapitha Velumani
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boardsMohamed Ramadan
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingRashmi Agale
 
Distributed Computing in IoT
Distributed Computing in IoTDistributed Computing in IoT
Distributed Computing in IoTKishan Patel
 
Fog Computing Platform
Fog Computing PlatformFog Computing Platform
Fog Computing Platform霈萱 蔡
 
Componentization of IT services
Componentization of IT servicesComponentization of IT services
Componentization of IT servicesganykg
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemscfenoy
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
NECOS Objectives
NECOS ObjectivesNECOS Objectives
NECOS Objectives
 
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
 
Introduction to cloud computing by Revanth Reddy Mekala
Introduction to cloud computing by Revanth Reddy MekalaIntroduction to cloud computing by Revanth Reddy Mekala
Introduction to cloud computing by Revanth Reddy Mekala
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Integrity for join queries
Integrity for join queriesIntegrity for join queries
Integrity for join queries
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Distributed Computing in IoT
Distributed Computing in IoTDistributed Computing in IoT
Distributed Computing in IoT
 
Fog Computing Platform
Fog Computing PlatformFog Computing Platform
Fog Computing Platform
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
part1 Cloud computing rgesit
part1 Cloud computing rgesitpart1 Cloud computing rgesit
part1 Cloud computing rgesit
 
Componentization of IT services
Componentization of IT servicesComponentization of IT services
Componentization of IT services
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 

Similar to Cloud computing

Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSuman Jha
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Cloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfCloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfPalanikumar72221
 
Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!
Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!
Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!Caroline Johnson
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing documentObul Naidu
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 

Similar to Cloud computing (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Basics.pptx
Cloud Basics.pptxCloud Basics.pptx
Cloud Basics.pptx
 
cloud computing
cloud computingcloud computing
cloud computing
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Cloud+Computing-1.pptx
Cloud+Computing-1.pptxCloud+Computing-1.pptx
Cloud+Computing-1.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfCloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdf
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!
Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!
Explaining The Differences Between Single-Tenant and Multi-Tenant Clouds!
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing document
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
ITM711 M2.pdf
ITM711  M2.pdfITM711  M2.pdf
ITM711 M2.pdf
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
ITM711-M2.pdf
ITM711-M2.pdfITM711-M2.pdf
ITM711-M2.pdf
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Grid computing
Grid computingGrid computing
Grid computing
 

More from Vikalp Mehta

Yoga Industry India
Yoga Industry IndiaYoga Industry India
Yoga Industry IndiaVikalp Mehta
 
Indian fmcg sector
Indian fmcg sectorIndian fmcg sector
Indian fmcg sectorVikalp Mehta
 
Cadbury dairy milk choclate consumer behavior
Cadbury dairy milk choclate consumer behaviorCadbury dairy milk choclate consumer behavior
Cadbury dairy milk choclate consumer behaviorVikalp Mehta
 
From regional star to global leader
From regional star to global leaderFrom regional star to global leader
From regional star to global leaderVikalp Mehta
 
Accenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisationAccenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisationVikalp Mehta
 
Hey ! i put in my papers
Hey ! i put in my papers Hey ! i put in my papers
Hey ! i put in my papers Vikalp Mehta
 

More from Vikalp Mehta (9)

Yoga Industry India
Yoga Industry IndiaYoga Industry India
Yoga Industry India
 
Lifebyoy
LifebyoyLifebyoy
Lifebyoy
 
Rural India
Rural India Rural India
Rural India
 
Indian fmcg sector
Indian fmcg sectorIndian fmcg sector
Indian fmcg sector
 
Sprite marketing
Sprite marketingSprite marketing
Sprite marketing
 
Cadbury dairy milk choclate consumer behavior
Cadbury dairy milk choclate consumer behaviorCadbury dairy milk choclate consumer behavior
Cadbury dairy milk choclate consumer behavior
 
From regional star to global leader
From regional star to global leaderFrom regional star to global leader
From regional star to global leader
 
Accenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisationAccenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisation
 
Hey ! i put in my papers
Hey ! i put in my papers Hey ! i put in my papers
Hey ! i put in my papers
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cloud computing

  • 1. Submitted By: Saptarshi Chakraborty(221130) Vikalp Mehta(221167) Utkarsh Kumar Singh(221156) Varun Tripathi(221163)
  • 2. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer
  • 3.
  • 4. Grid Computing Cloud Computing  Grids enable access to shared computing power and storage capacity  Clouds enable access to leased computing power and storage capacity   Grids are an open source technology. Resource users and providers alike can understand and contribute to the management of their grid  Clouds are a proprietary technology only the resource provider knows exactly how their cloud manages data, job queues, security requirements etc.  Computing centers are distributed across different sites, countries and continents  The cloud providers often have private data centers which are often centralized in a few location
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. 1. Services and infrastructure are maintained on a private network 2. These cloud offers highest level of security and control 3. But company has to maintain and purchase all software and reduces cost savings
  • 10.
  • 11. 1.Public cloud is the one where services and infrastructure are provided off site 2.Public cloud requires extra security and reliability 3.These platform offers greatest level of efficiency in shared resources
  • 12.
  • 13. 1. Includes a variety of public and private options with multiple providers 2. It allows you to keep each aspect at your business in most effective environment possible 3. One limitation is that you have to keep track of multiple different security platforms and ensure that all aspect of business can communicate with each others .
  • 14. When using Saas , vendor can create a private cloud just for your company inside their fire wall . They provide you with a virtual private network for additional security