SlideShare a Scribd company logo
1 of 13
Cloud Computing:5
Cloud and Dynamic Infrastructure
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Rapid Scalable Deployment
Features due to Dynamic
Infrastructure
Service Management
• Service Management: Service
management solutions help you create
and manage a more agile, business-
oriented and dynamic infrastructure so you
can rapidly respond to change and deliver
higher quality services at a lower cost.
Learn more about Service management
Asset management
• Asset management: Hardware, software,
and services from IBM help you maximize
the performance and lifetime value of
assets across your enterprise—
production, facilities, transportation and
IT—and closely align them with your
overall business strategy.
Virtualization & Consolidation
• Virtualization & Consolidation:
Virtualization and consolidation can
reduce IT complexity to help your data
center become more resilient and secure
while reducing costs.
• The ability to deploy capacity and server
images virtually increases speed of
deployment roughly by a factor of 30
times.
Information Infrastructure
• Information Infrastructure: A comprehensive
approach to information infrastructure addresses
compliance, availability, retention, and security
requirements while helping businesses get the
right information to the right person at the right
time.
• Potential benefits include up to: 75% decrease in
capital costs, 600% increase in input capacity,
300x improvement in throughput, 500x
improvement in hardware price/performance ratio.
Energy Efficiency
• Energy Efficiency: Energy efficiency
solutions can help lower data center
energy costs by up to 40% or more
through facilities design, power and
cooling infrastructure, active energy
management, and efficient, scalable IBM
systems.
Security
• Security: Security solutions deliver the full
breadth and depth of capabilities that
enable organizations to take a business-
driven, holistic approach to security,
compliance and risk management in
alignment with an IT governance
framework, supporting the secure delivery
of services with speed and agility in the
dynamic infrastructure.
Business Resiliency
• Business Resiliency: Business continuity and
resiliency solutions keep your business running in
the event of an internal or external risk, planned or
unplanned, and allow your IT experts to devote
more time to innovation.
• Less than 50% percent companies surveyed have
disaster recovery and business continuity
strategies in place.
• And among those who have planned for business
continuity and resiliency, 75 percent report that
efforts are likely to be “haphazard” and “untested.”
Assignment
• Explain the concept and benefits of dynamic
infrastructure using cloud computing

More Related Content

What's hot

Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center ConsolidationBarry Weber
 
Dp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facilityDp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facilitydpsir
 
Sustainability Through Software Symantec At United Nations L
Sustainability Through Software   Symantec At United Nations LSustainability Through Software   Symantec At United Nations L
Sustainability Through Software Symantec At United Nations LSymantec
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterSunbird DCIM
 
The End Of Corporate Computing
The End Of Corporate ComputingThe End Of Corporate Computing
The End Of Corporate Computingmrt77
 
5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure CostsCentilytics
 
TMI Energy Assessments
TMI Energy AssessmentsTMI Energy Assessments
TMI Energy Assessmentstdeloye
 
Active Power Down
Active Power DownActive Power Down
Active Power DownSiM Medi@
 
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...Sunbird DCIM
 
HP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer BriefHP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer BriefCole Whitney
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOXJose A. Abril
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownStorage Switzerland
 
Msp Presentation 1.2
Msp Presentation 1.2Msp Presentation 1.2
Msp Presentation 1.2dbrown225
 
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and DiagnosticStephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and DiagnosticDutch Power
 
Ecosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightEcosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightCyrus Sorab
 
Active Power Down
Active Power DownActive Power Down
Active Power Downjdunnet
 
Digital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risksDigital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risksAlex Lal
 

What's hot (18)

Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center Consolidation
 
Dp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facilityDp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facility
 
Sustainability Through Software Symantec At United Nations L
Sustainability Through Software   Symantec At United Nations LSustainability Through Software   Symantec At United Nations L
Sustainability Through Software Symantec At United Nations L
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
The End Of Corporate Computing
The End Of Corporate ComputingThe End Of Corporate Computing
The End Of Corporate Computing
 
Partnering For Success In the Cloud
Partnering For Success In the CloudPartnering For Success In the Cloud
Partnering For Success In the Cloud
 
5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs
 
TMI Energy Assessments
TMI Energy AssessmentsTMI Energy Assessments
TMI Energy Assessments
 
Active Power Down
Active Power DownActive Power Down
Active Power Down
 
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
 
HP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer BriefHP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer Brief
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOX
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Msp Presentation 1.2
Msp Presentation 1.2Msp Presentation 1.2
Msp Presentation 1.2
 
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and DiagnosticStephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
 
Ecosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightEcosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic Insight
 
Active Power Down
Active Power DownActive Power Down
Active Power Down
 
Digital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risksDigital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risks
 

Similar to Cloud Computing Benefits Dynamic Infrastructure

Professional services golden pitch presentation
Professional services golden pitch presentationProfessional services golden pitch presentation
Professional services golden pitch presentationxKinAnx
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationSix Degrees
 
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...IBM Switzerland
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataPrecisely
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataPrecisely
 
Smarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic InfrastructureSmarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic InfrastructureIBMAsean
 
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...XO Communications
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case studyNandita Nityanandam
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...Eduardo Gonzalez Loumiet, MBA, PMP, CPHIMS
 
The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013IBM Sverige
 
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...IBM Sverige
 
Ibm Services Story
Ibm Services StoryIbm Services Story
Ibm Services Storykclutch71
 
IBM Service Brochure
IBM Service BrochureIBM Service Brochure
IBM Service BrochureNone
 
How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?MilesWeb
 
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based PlatformsOn the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based PlatformsPrecisely
 
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Global Technology Services:  Partnering for Better Business OutcomesIBM Global Technology Services:  Partnering for Better Business Outcomes
IBM Global Technology Services: Partnering for Better Business OutcomesIBM Services
 
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions
 
DCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure Management
DCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure ManagementDCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure Management
DCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure Managementjpjobard
 

Similar to Cloud Computing Benefits Dynamic Infrastructure (20)

Professional services golden pitch presentation
Professional services golden pitch presentationProfessional services golden pitch presentation
Professional services golden pitch presentation
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
 
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster PreparednessMeaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Smarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic InfrastructureSmarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic Infrastructure
 
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case study
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
 
The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013
 
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
 
Ibm Services Story
Ibm Services StoryIbm Services Story
Ibm Services Story
 
IBM Service Brochure
IBM Service BrochureIBM Service Brochure
IBM Service Brochure
 
How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?
 
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based PlatformsOn the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
 
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Global Technology Services:  Partnering for Better Business OutcomesIBM Global Technology Services:  Partnering for Better Business Outcomes
IBM Global Technology Services: Partnering for Better Business Outcomes
 
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro Presentation
 
Why the Cloud?
Why the Cloud?Why the Cloud?
Why the Cloud?
 
DCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure Management
DCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure ManagementDCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure Management
DCIM DATACENTER INFRASTRUCTURE MANAGEMENT Infrastructure Management
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Recently uploaded (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

Cloud Computing Benefits Dynamic Infrastructure

  • 1. Cloud Computing:5 Cloud and Dynamic Infrastructure Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 3. Features due to Dynamic Infrastructure
  • 4.
  • 5. Service Management • Service Management: Service management solutions help you create and manage a more agile, business- oriented and dynamic infrastructure so you can rapidly respond to change and deliver higher quality services at a lower cost. Learn more about Service management
  • 6. Asset management • Asset management: Hardware, software, and services from IBM help you maximize the performance and lifetime value of assets across your enterprise— production, facilities, transportation and IT—and closely align them with your overall business strategy.
  • 7. Virtualization & Consolidation • Virtualization & Consolidation: Virtualization and consolidation can reduce IT complexity to help your data center become more resilient and secure while reducing costs. • The ability to deploy capacity and server images virtually increases speed of deployment roughly by a factor of 30 times.
  • 8. Information Infrastructure • Information Infrastructure: A comprehensive approach to information infrastructure addresses compliance, availability, retention, and security requirements while helping businesses get the right information to the right person at the right time. • Potential benefits include up to: 75% decrease in capital costs, 600% increase in input capacity, 300x improvement in throughput, 500x improvement in hardware price/performance ratio.
  • 9. Energy Efficiency • Energy Efficiency: Energy efficiency solutions can help lower data center energy costs by up to 40% or more through facilities design, power and cooling infrastructure, active energy management, and efficient, scalable IBM systems.
  • 10. Security • Security: Security solutions deliver the full breadth and depth of capabilities that enable organizations to take a business- driven, holistic approach to security, compliance and risk management in alignment with an IT governance framework, supporting the secure delivery of services with speed and agility in the dynamic infrastructure.
  • 11. Business Resiliency • Business Resiliency: Business continuity and resiliency solutions keep your business running in the event of an internal or external risk, planned or unplanned, and allow your IT experts to devote more time to innovation. • Less than 50% percent companies surveyed have disaster recovery and business continuity strategies in place. • And among those who have planned for business continuity and resiliency, 75 percent report that efforts are likely to be “haphazard” and “untested.”
  • 12.
  • 13. Assignment • Explain the concept and benefits of dynamic infrastructure using cloud computing