2. Cloud computing
◦ A type of computing that relies on sharing
computer resources rather than having local servers
or personal devices-http://www.webopedia.com/TERM/C/cloud_computing.html
◦ The practice of using a network of remote servers
hosted on the Internet to store, manage, and
process data, rather than a local server or a
personal computer - Google
◦ The elastic leasing of pooled computer resources
over the internet – MIS book
3.
4. Grid Computing
◦ Solving large problems
with parallel computing
Utility Computing
◦ Offering computing
resources as a metered
service
SaaS
◦ Network based
subscriptions to
applications
Cloud Computing
◦ Anytime, anywhere access
to IT resources delivered
dynamically as a service
5. Front End
◦ Client computer
Back End
◦ Servers, Data
Storage, Computers
6. Typically each application will have its own
dedicated server
There are multiple digital storage devices that
are located all over the globe to keep data
safe and secure. If one server goes down the
data is replicated on multiple other servers so
the data is always available to the end user
7. A number of characterises can be used to define the
nature of the solution and services offered through
cloud computing:
8. ‣ Cost Effectiveness
‣ Unlimited Data storage and security
‣ Backup and Disaster Recovery
‣ Ease of access and availability
‣ Connect Seamless Connectivity to all their data,
data of their partners, customers
‣ Elastic and unlimited computing ability
‣ Managing and analyzing big data
10. Cloud Service Models
‣ SaaS
‣ PaaS
‣ IaaS
Deployment Models:
Public, Private, Hybrid and Community
11. Industries using the Cloud:
‣ Banks
‣ Pharmaceutical Companies
‣ Health Care
‣ Hospitality and Food businesses
‣ Logistics and Transportation
‣ Credit unions
‣ Securities and Investment Companies
12. Non commercial Uses:
‣ Social Media and communication
‣ Norwegian use of Bank IDs
‣ Leicester Tigers
‣ Rotary Clubs
13. Hardware-agnostic
Greater scale, virtually unlimited resources
Increased Power and reduced cost - Cloud become
predominant
Reduced Investment in Hardware
Transition to Mobile Environment
14. Security Enhancements
Shift to Thin Virtual Environment
Decreased human involvement in Operation
Increased Specialization
15. Security Enhancements
Improved encryption technologies – growing user confidence
Abundance of small affordable sensors – better analytics
Increase in Forensic Capabilities