SlideShare a Scribd company logo

106248842 cc

homework help,online homework help,online tutors,online tutoring,research paper help,do my homework,

1 of 13
Download to read offline
Homework Help
https://www.homeworkping.com/
Research Paper help
https://www.homeworkping.com/
Online Tutoring
https://www.homeworkping.com/
click here for freelancing tutoring sites
Cloud Computing
Definition
Cloud computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation
and access their personal files at any computer with internet access. This technology allows for much
more efficient computing by centralizing storage, memory, processing and bandwidth.
Cloud computing is the delivery of computing as a service rather than a product, whereby shared
resources, software, and information are provided to computers and other devices as a utility (like
the electricity grid) over a network (typically the Internet).
Cloud computing provides computation, software applications, data access,data management and
storage resources without requiring cloud users to know the location and other details of the computing
infrastructure.
End users access cloud based applications through a web browser or a light weight desktop or mobile
app while the business software and data are stored on servers at a remote location. Cloud application
providers strive to give the same or better service and performance than if the software programs were
installed locally on end-user computers.
A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You dont need a software or
a server to use them. All a consumer would need is just an internet connection and you can start sending
emails. The server and email management software is all on the cloud ( internet) and is totally managed
by the cloud service provider Yahoo , Google etc. The consumer gets to use the software alone and enjoy
the benefits. The analogy is , 'If you need milk , would you buy a cow ?' All the users or consumers
need is to get the benefits of using the software or hardware of the computer like sending emails etc. Just
to get this benefit (milk) why should a consumer buy a (cow) software /hardware ?
Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each
segment serves a different purpose and offers different products for businesses and individuals around
the world. In June 2011, a study conducted by VersionOne found that 91% of senior IT professionals
actually don't know what cloud computing is and two-thirds of senior finance professionals are clear by
the concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen Group study
found that disciplined companies achieved on average an 68% increase in their IT expense because
cloud computing and only a 10% reduction in data center power costs
Characteristics
Cloud computing exhibits the following key characteristics:
 Empowerment of end-users of computing resources by putting the provisioning of those resources in
their own control, as opposed to the control of a centralized IT service (for example)
 Agility improves with users' ability to re-provision technological infrastructure resources.
 Application programming interface (API) accessibility to software that enables machines to
interact with cloud software in the same way the user interface facilitates interaction between humans
and computers. Cloud computing systems typically use REST-based APIs.
 Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted
to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically
provided by a third-party and does not need to be purchased for one-time or infrequent intensive
computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and
fewer IT skills are required for implementation (in-house).
 Device and location independence enable users to access systems using a web browser
regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure
is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from
anywhere.
 Virtualization technology allows servers and storage devices to be shared and utilization be
increased. Applications can be easily migrated from one physical server to another.
 Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:
 Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
 Peak-load capacity increases (users need not engineer for highest possible load-levels)
 Utilisation and efficiency improvements for systems that are often only 10–20% utilised.
 Reliability is improved if multiple redundant sites are used, which makes well-designed cloud
computing suitable for business continuity and disaster recovery.
 Scalability and Elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained,
self-service basis near real-time, without users having to engineer for peak loads.
 Performance is monitored, and consistent and loosely coupled architectures are constructed
using web services as the system interface.
 Security could improve due to centralization of data, increased security-focused resources, etc., but
concerns can persist about loss of control over certain sensitive data, and the lack of security for
stored kernels. Security is often as good as or better than other traditional systems, in part because
providers are able to devote resources to solving security issues that many customers cannot afford.
However, the complexity of security is greatly increased when data is distributed over a wider area or
greater number of devices and in multi-tenant systems that are being shared by unrelated users. In
addition, user access to security audit logs may be difficult or impossible. Private cloud installations
are in part motivated by users' desire to retain control over the infrastructure and avoid losing control
of information security.
 Maintenance of cloud computing applications is easier, because they do not need to be installed on
each user's computer and can be accessed from different places.
Benefits of Cloud Computing
Cloud Computing brings with it many benefits to the end user. These include:
1. Access to a huge range of applications without having to download or install anything
2. Reduced Cost It helps keep the cost down for both the users and website owners. Also for the
users, they can access it from any computer and still have the file they need. For the owners,
they do not need to reproduce the software and ship it out. They just rent the server space.
Consumption is billed as a utility with minimal upfront costs. Users can avoid expenditure on
hardware and software; only using what they need
3. More Storage They can hold more storage than a personal computer can. It takes away the need
for the upgrading computer memory, which also helps keep the cost down for the companies and
users alike. Scalability via on-demand resources
4. Automatically Updated Owners no longer need to hire people to update more than one server,
and it also helps the users who do not like to download updates for the software. The server gets
the updates and everyone who uses the service gets the updates without updating anything on
their end.
5. Computing Flexibility It has more flexibility than other network computing systems and saves time
plus money for people who are in a time crunch.
6. Mobility Like most networks it allows users to connect even without their own computers,
meaning you can do your work from anywhere in the world as long as you have a internet
connection and a computer access. So you can take your work with you on your wedding and
vacations. Applications can be accessed from any computer, anywhere in the world.
7. No Downloads The users do not need to download anything, so that saves time and hard drive
space for users. They can just log onto the network.
8. Shared Resources A key component of cloud computing is that companies share resources. With
cloud computing, this allows them all to have access to the resources via cloud computing. This
again saves businesses time and money by placing their resources all in one location that is easy
for their workers to look up and access. Companies can share resources in one place
Drawbacks
Cloud Computing has many benefits, however there are also some associated risks with using cloud
computing. These include:
1. Users do not physically possess storage of their own data, which leaves the responsibility and
control of data storage with the provider
2. Users could become dependent upon the cloud computing provider
3. With data held externally, business continuity and disaster recovery are in the hands of the
provider
4. Data migration issues when changing cloud provider
5. What happens if your cloud provider goes out of business?
Cloud Computing – Service Models.
Cloud computing providers offer their services according to three fundamental models: Infrastructure as a
service (IaaS), platform as a service (PaaS), and software as a service (SaaS) where IaaS is the most
basic and each higher model abstracts from the details of the lower models.
Infrastructure as a Service (IaaS or HaaS)
In this most basic cloud service model, cloud providers offer computers – as physical or more often
as virtual machines –, raw (block) storage, firewalls, load balancers, and networks. IaaS providers supply
these resources on demand from their large pools installed in data centers. Local area networks including
IP addresses are part of the offer. For the wide area connectivity, the Internet can be used or - incarrier
clouds - dedicated virtual private networks can be configured.
To deploy their applications, cloud users then install operating system images on the machines as well as
their application software. In this model, it is the cloud user who is responsible for patching and
maintaining the operating systems and application software. Cloud providers typically bill IaaS services
on a utility computing basis, that is, cost will reflect the amount of resources allocated and consumed.
Hardware as a Service (HaaS)
 SaaS and PaaS are providing appliancess to customers, HaaS does not.
 It offers the hardware so that your organization can put whatever
they want onto it
 Rather than purchase servers, software, racks, and
having to pay for the datacenter space for them, the
service provider rents those resources:
- Server space
- Network equipment
- Memory
- CPU cycles
- Storage space
Examples: Amazon EC2, Rackspace Mosso, GoGrid.
Platform as a Service (PaaS)
In the PaaS model, cloud providers deliver a computing platform and/or solution stack typically including
operating system, programming language execution environment, database, and web server. Application
developers can develop and run their software solutions on a cloud platform without the cost and
complexity of buying and managing the underlying hardware and software layers. With some PaaS offers,
the underlying compute and storage resources scale automatically to match application demand s uch that
the cloud user does not have to allocate resources manually.
PaaS APIs
 normally based on HTML or JavaScript.
 provides automatic facilities for concurrency management, scalability,failover, and security.
 supports web development interfaces such as SOAP and REST
 able to access databases & reuse services within a private network
A general model is implemented under which developers build appls
 designed to run on the provider’s infrastructure
 delivered to users in via an Internet browser
Downfall
 A lack of interoperability and portability among providers
 If you create an appl with one cloud provider & decide to move to another, you may not be able to
do so or you’ll have to pay a high price
Examples: Google App Engine, Microsoft Azure, Zoho Creator, NetSuite NetFlex, Akamai EdgePlatform,
Salesforce Force.com, Facebook Platform
Software as a Service (SaaS)
In this model, cloud providers install and operate application software in the cloud and cloud users access
the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on
which the application is running. This eliminates the need to install and run the application on the cloud
user's own computers simplifying maintenance and support. What makes a cloud application different
from other applications is its elasticity. This can be achieved by cloning tasks onto multiple virtual
machines at run-time to meet the changing work demand. Load balancers distribute the work over the set
of virtual machines. This process is transparent to the cloud user who sees only a single access point. To
accomodate a large number of cloud users, cloud applications can be multitenant, that is, any machine
serves more than one cloud user organization. It is common to refer to special types of cloud based
application software with a similar naming convention:desktop as a service, business process as a
service, Test Environment as a Service, communication as a service.
The pricing model for SaaS applications is typically a monthly or yearly flat fee per user
Characteristics of SaaS:
1. Software applications or services are stored remotely
2. A user can then access these services or software applications via the Internet
3. In most cases, a user does not have to install anything onto their host machine,
 all they require is a web browser to access these services
 in some cases, additional plug-in/add-on for certain services are needed
4. Network-based manag & access to available software from central locations
 rather than at each customer’s site,
 enabling customers to access applications remotely via the Internet
 centralized enhancement and patch updating
5. Appl delivery from a one-to-many model,
 as opposed to a traditional one-to-one model.
 single-instance, multitenant architecture

Recommended

Topic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsTopic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsZubair Nabi
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Unit 1.3 types of cloud
Unit 1.3 types of cloudUnit 1.3 types of cloud
Unit 1.3 types of cloudeShikshak
 

More Related Content

What's hot

Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectMohamed Shorbagy
 
Application of Virtualisation and CloudComputing for Development and Runtime ...
Application of Virtualisation and CloudComputing for Development and Runtime ...Application of Virtualisation and CloudComputing for Development and Runtime ...
Application of Virtualisation and CloudComputing for Development and Runtime ...Ingenieurbuero Arno-Can Uestuensoez
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingNishant Munjal
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computingAsmaa Ibrahim
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation Project
 
Application of Virtualisation and CloudComputing for Development and Runtime ...
Application of Virtualisation and CloudComputing for Development and Runtime ...Application of Virtualisation and CloudComputing for Development and Runtime ...
Application of Virtualisation and CloudComputing for Development and Runtime ...
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog doc
Fog doc Fog doc
Fog doc
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 

Viewers also liked

162187008 ncba-cases
162187008 ncba-cases162187008 ncba-cases
162187008 ncba-caseshomeworkping7
 
103317354 1st caselepro-1docx
103317354 1st caselepro-1docx103317354 1st caselepro-1docx
103317354 1st caselepro-1docxhomeworkping7
 
158428965 apm2009-05att-a-acq-strat-temp07-29-2009
158428965 apm2009-05att-a-acq-strat-temp07-29-2009158428965 apm2009-05att-a-acq-strat-temp07-29-2009
158428965 apm2009-05att-a-acq-strat-temp07-29-2009homeworkping7
 
206452716 hr-ll-case-studies
206452716 hr-ll-case-studies206452716 hr-ll-case-studies
206452716 hr-ll-case-studieshomeworkping7
 
101844369 civil-law-cases
101844369 civil-law-cases101844369 civil-law-cases
101844369 civil-law-caseshomeworkping7
 
100321536 case-study
100321536 case-study100321536 case-study
100321536 case-studyhomeworkping7
 
104855788 evidence-case
104855788 evidence-case104855788 evidence-case
104855788 evidence-casehomeworkping7
 
159340607 case-presentation
159340607 case-presentation159340607 case-presentation
159340607 case-presentationhomeworkping7
 
101241052 monolake-case
101241052 monolake-case101241052 monolake-case
101241052 monolake-casehomeworkping7
 
103775261 bar-exam-case
103775261 bar-exam-case103775261 bar-exam-case
103775261 bar-exam-casehomeworkping7
 
101220253 crim-pro-cases2
101220253 crim-pro-cases2101220253 crim-pro-cases2
101220253 crim-pro-cases2homeworkping7
 
Smart eco hub open day 1
Smart eco hub open day 1Smart eco hub open day 1
Smart eco hub open day 1Conor Annett
 
104995441 what-is-intellectual-property-law
104995441 what-is-intellectual-property-law104995441 what-is-intellectual-property-law
104995441 what-is-intellectual-property-lawhomeworkping7
 

Viewers also liked (16)

162187008 ncba-cases
162187008 ncba-cases162187008 ncba-cases
162187008 ncba-cases
 
103317354 1st caselepro-1docx
103317354 1st caselepro-1docx103317354 1st caselepro-1docx
103317354 1st caselepro-1docx
 
158428965 apm2009-05att-a-acq-strat-temp07-29-2009
158428965 apm2009-05att-a-acq-strat-temp07-29-2009158428965 apm2009-05att-a-acq-strat-temp07-29-2009
158428965 apm2009-05att-a-acq-strat-temp07-29-2009
 
Cadetproblem 2014
Cadetproblem 2014Cadetproblem 2014
Cadetproblem 2014
 
206452716 hr-ll-case-studies
206452716 hr-ll-case-studies206452716 hr-ll-case-studies
206452716 hr-ll-case-studies
 
101844369 civil-law-cases
101844369 civil-law-cases101844369 civil-law-cases
101844369 civil-law-cases
 
100321536 case-study
100321536 case-study100321536 case-study
100321536 case-study
 
104855788 evidence-case
104855788 evidence-case104855788 evidence-case
104855788 evidence-case
 
159340607 case-presentation
159340607 case-presentation159340607 case-presentation
159340607 case-presentation
 
101241052 monolake-case
101241052 monolake-case101241052 monolake-case
101241052 monolake-case
 
103775261 bar-exam-case
103775261 bar-exam-case103775261 bar-exam-case
103775261 bar-exam-case
 
101220253 crim-pro-cases2
101220253 crim-pro-cases2101220253 crim-pro-cases2
101220253 crim-pro-cases2
 
Smart eco hub open day 1
Smart eco hub open day 1Smart eco hub open day 1
Smart eco hub open day 1
 
104995441 what-is-intellectual-property-law
104995441 what-is-intellectual-property-law104995441 what-is-intellectual-property-law
104995441 what-is-intellectual-property-law
 
101314655 org-study
101314655 org-study101314655 org-study
101314655 org-study
 
103823344 cc
103823344 cc103823344 cc
103823344 cc
 

Similar to 106248842 cc

Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introductionRameshKante
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloudsriramr
 
Cloud computing and Advantages
Cloud computing and AdvantagesCloud computing and Advantages
Cloud computing and AdvantagesToneshkumar Pardhi
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?sriramr
 

Similar to 106248842 cc (20)

Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Cloud computing whitepaper(2)
Cloud computing whitepaper(2)Cloud computing whitepaper(2)
Cloud computing whitepaper(2)
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloud
 
Cloud computing and Advantages
Cloud computing and AdvantagesCloud computing and Advantages
Cloud computing and Advantages
 
Cloud Basics.pptx
Cloud Basics.pptxCloud Basics.pptx
Cloud Basics.pptx
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 

More from homeworkping7

207797480 effective-study-skills-3
207797480 effective-study-skills-3207797480 effective-study-skills-3
207797480 effective-study-skills-3homeworkping7
 
207745685 b-777-oral-study
207745685 b-777-oral-study207745685 b-777-oral-study
207745685 b-777-oral-studyhomeworkping7
 
207702106 spec-pro-cases
207702106 spec-pro-cases207702106 spec-pro-cases
207702106 spec-pro-caseshomeworkping7
 
207619526 urc-case-study
207619526 urc-case-study207619526 urc-case-study
207619526 urc-case-studyhomeworkping7
 
207528705 family-case-study-1
207528705 family-case-study-1207528705 family-case-study-1
207528705 family-case-study-1homeworkping7
 
207492751 examples-of-unethical-behavior-in-the-workplace
207492751 examples-of-unethical-behavior-in-the-workplace207492751 examples-of-unethical-behavior-in-the-workplace
207492751 examples-of-unethical-behavior-in-the-workplacehomeworkping7
 
207372012 long-case-rawalo-dedi
207372012 long-case-rawalo-dedi207372012 long-case-rawalo-dedi
207372012 long-case-rawalo-dedihomeworkping7
 
207287040 a-study-on-impact-of-ites-sectors-in-india
207287040 a-study-on-impact-of-ites-sectors-in-india207287040 a-study-on-impact-of-ites-sectors-in-india
207287040 a-study-on-impact-of-ites-sectors-in-indiahomeworkping7
 
207285085 classic-knitwear-case-study
207285085 classic-knitwear-case-study207285085 classic-knitwear-case-study
207285085 classic-knitwear-case-studyhomeworkping7
 
207244508 united-color-of-benaton
207244508 united-color-of-benaton207244508 united-color-of-benaton
207244508 united-color-of-benatonhomeworkping7
 
207135483 oblicon-case-digestsxavier
207135483 oblicon-case-digestsxavier207135483 oblicon-case-digestsxavier
207135483 oblicon-case-digestsxavierhomeworkping7
 
207095812 supply-chain-management
207095812 supply-chain-management207095812 supply-chain-management
207095812 supply-chain-managementhomeworkping7
 
207043126 ikea-case-study-solution
207043126 ikea-case-study-solution207043126 ikea-case-study-solution
207043126 ikea-case-study-solutionhomeworkping7
 
206915421 avatar-case-study
206915421 avatar-case-study206915421 avatar-case-study
206915421 avatar-case-studyhomeworkping7
 
206891661 ee2002-lab-manual-fall-2013
206891661 ee2002-lab-manual-fall-2013206891661 ee2002-lab-manual-fall-2013
206891661 ee2002-lab-manual-fall-2013homeworkping7
 
206885611 eskom-ee-simama-ranta-2014
206885611 eskom-ee-simama-ranta-2014206885611 eskom-ee-simama-ranta-2014
206885611 eskom-ee-simama-ranta-2014homeworkping7
 
206883782 lawyers-fiduciary-obligations
206883782 lawyers-fiduciary-obligations206883782 lawyers-fiduciary-obligations
206883782 lawyers-fiduciary-obligationshomeworkping7
 
206869083 ortho-study-guide
206869083 ortho-study-guide206869083 ortho-study-guide
206869083 ortho-study-guidehomeworkping7
 

More from homeworkping7 (20)

207797480 effective-study-skills-3
207797480 effective-study-skills-3207797480 effective-study-skills-3
207797480 effective-study-skills-3
 
207745685 b-777-oral-study
207745685 b-777-oral-study207745685 b-777-oral-study
207745685 b-777-oral-study
 
207702106 spec-pro-cases
207702106 spec-pro-cases207702106 spec-pro-cases
207702106 spec-pro-cases
 
207619526 urc-case-study
207619526 urc-case-study207619526 urc-case-study
207619526 urc-case-study
 
207528705 family-case-study-1
207528705 family-case-study-1207528705 family-case-study-1
207528705 family-case-study-1
 
207492751 examples-of-unethical-behavior-in-the-workplace
207492751 examples-of-unethical-behavior-in-the-workplace207492751 examples-of-unethical-behavior-in-the-workplace
207492751 examples-of-unethical-behavior-in-the-workplace
 
207402181 ee-ass1
207402181 ee-ass1207402181 ee-ass1
207402181 ee-ass1
 
207372012 long-case-rawalo-dedi
207372012 long-case-rawalo-dedi207372012 long-case-rawalo-dedi
207372012 long-case-rawalo-dedi
 
207287040 a-study-on-impact-of-ites-sectors-in-india
207287040 a-study-on-impact-of-ites-sectors-in-india207287040 a-study-on-impact-of-ites-sectors-in-india
207287040 a-study-on-impact-of-ites-sectors-in-india
 
207285085 classic-knitwear-case-study
207285085 classic-knitwear-case-study207285085 classic-knitwear-case-study
207285085 classic-knitwear-case-study
 
207244508 united-color-of-benaton
207244508 united-color-of-benaton207244508 united-color-of-benaton
207244508 united-color-of-benaton
 
207137236 ee2207-lm
207137236 ee2207-lm207137236 ee2207-lm
207137236 ee2207-lm
 
207135483 oblicon-case-digestsxavier
207135483 oblicon-case-digestsxavier207135483 oblicon-case-digestsxavier
207135483 oblicon-case-digestsxavier
 
207095812 supply-chain-management
207095812 supply-chain-management207095812 supply-chain-management
207095812 supply-chain-management
 
207043126 ikea-case-study-solution
207043126 ikea-case-study-solution207043126 ikea-case-study-solution
207043126 ikea-case-study-solution
 
206915421 avatar-case-study
206915421 avatar-case-study206915421 avatar-case-study
206915421 avatar-case-study
 
206891661 ee2002-lab-manual-fall-2013
206891661 ee2002-lab-manual-fall-2013206891661 ee2002-lab-manual-fall-2013
206891661 ee2002-lab-manual-fall-2013
 
206885611 eskom-ee-simama-ranta-2014
206885611 eskom-ee-simama-ranta-2014206885611 eskom-ee-simama-ranta-2014
206885611 eskom-ee-simama-ranta-2014
 
206883782 lawyers-fiduciary-obligations
206883782 lawyers-fiduciary-obligations206883782 lawyers-fiduciary-obligations
206883782 lawyers-fiduciary-obligations
 
206869083 ortho-study-guide
206869083 ortho-study-guide206869083 ortho-study-guide
206869083 ortho-study-guide
 

Recently uploaded

Grades 7 to 8 Anti- OSAEC and CSAEM session.pptx
Grades 7 to 8 Anti- OSAEC and CSAEM session.pptxGrades 7 to 8 Anti- OSAEC and CSAEM session.pptx
Grades 7 to 8 Anti- OSAEC and CSAEM session.pptxGladysValencia13
 
Overview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdfOverview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdfChristalin Nelson
 
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Katherine Villaluna
 
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptxPractical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptxKatherine Villaluna
 
DISCOURSE: TEXT AS CONNECTED DISCOURSE
DISCOURSE:   TEXT AS CONNECTED DISCOURSEDISCOURSE:   TEXT AS CONNECTED DISCOURSE
DISCOURSE: TEXT AS CONNECTED DISCOURSEMYDA ANGELICA SUAN
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasAlexandraSwartzwelde
 
2.20.24 The March on Washington for Jobs and Freedom.pptx
2.20.24 The March on Washington for Jobs and Freedom.pptx2.20.24 The March on Washington for Jobs and Freedom.pptx
2.20.24 The March on Washington for Jobs and Freedom.pptxMaryPotorti1
 
ICSE English Literature Class X Handwritten Notes
ICSE English Literature Class X Handwritten NotesICSE English Literature Class X Handwritten Notes
ICSE English Literature Class X Handwritten NotesGauri S
 
Plant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptxPlant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptxAKSHAYMAGAR17
 
11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdfAynouraHamidova
 
Persuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of PersuasionPersuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of PersuasionCorinne Weisgerber
 
Practical Research 1: Nature of Inquiry and Research.pptx
Practical Research 1: Nature of Inquiry and Research.pptxPractical Research 1: Nature of Inquiry and Research.pptx
Practical Research 1: Nature of Inquiry and Research.pptxKatherine Villaluna
 
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...Rabiya Husain
 
Routes of Drug Administrations PPT..pptx
Routes of Drug Administrations PPT..pptxRoutes of Drug Administrations PPT..pptx
Routes of Drug Administrations PPT..pptxRenuka N Sunagad
 
11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdfAynouraHamidova
 
Nzinga Kika - The story of the queen
Nzinga Kika    -  The story of the queenNzinga Kika    -  The story of the queen
Nzinga Kika - The story of the queenDeanAmory1
 

Recently uploaded (20)

Grades 7 to 8 Anti- OSAEC and CSAEM session.pptx
Grades 7 to 8 Anti- OSAEC and CSAEM session.pptxGrades 7 to 8 Anti- OSAEC and CSAEM session.pptx
Grades 7 to 8 Anti- OSAEC and CSAEM session.pptx
 
Overview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdfOverview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdf
 
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
 
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptxPractical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
 
DISCOURSE: TEXT AS CONNECTED DISCOURSE
DISCOURSE:   TEXT AS CONNECTED DISCOURSEDISCOURSE:   TEXT AS CONNECTED DISCOURSE
DISCOURSE: TEXT AS CONNECTED DISCOURSE
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in Canvas
 
2.20.24 The March on Washington for Jobs and Freedom.pptx
2.20.24 The March on Washington for Jobs and Freedom.pptx2.20.24 The March on Washington for Jobs and Freedom.pptx
2.20.24 The March on Washington for Jobs and Freedom.pptx
 
ICSE English Literature Class X Handwritten Notes
ICSE English Literature Class X Handwritten NotesICSE English Literature Class X Handwritten Notes
ICSE English Literature Class X Handwritten Notes
 
Plant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptxPlant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptx
 
Capter 5 Climate of Ethiopia and the Horn GeES 1011.pdf
Capter 5 Climate of Ethiopia and the Horn GeES 1011.pdfCapter 5 Climate of Ethiopia and the Horn GeES 1011.pdf
Capter 5 Climate of Ethiopia and the Horn GeES 1011.pdf
 
11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 2-2023-Aynura-Hamidova.pdf
 
Persuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of PersuasionPersuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of Persuasion
 
DNA damage and repair mechanism
DNA damage and repair mechanism DNA damage and repair mechanism
DNA damage and repair mechanism
 
Practical Research 1: Nature of Inquiry and Research.pptx
Practical Research 1: Nature of Inquiry and Research.pptxPractical Research 1: Nature of Inquiry and Research.pptx
Practical Research 1: Nature of Inquiry and Research.pptx
 
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
 
first section physiology laboratory.pptx
first section physiology laboratory.pptxfirst section physiology laboratory.pptx
first section physiology laboratory.pptx
 
Routes of Drug Administrations PPT..pptx
Routes of Drug Administrations PPT..pptxRoutes of Drug Administrations PPT..pptx
Routes of Drug Administrations PPT..pptx
 
11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 1-2023-Aynura-Hamidova.pdf
 
Nzinga Kika - The story of the queen
Nzinga Kika    -  The story of the queenNzinga Kika    -  The story of the queen
Nzinga Kika - The story of the queen
 

106248842 cc

  • 1. Homework Help https://www.homeworkping.com/ Research Paper help https://www.homeworkping.com/ Online Tutoring https://www.homeworkping.com/ click here for freelancing tutoring sites Cloud Computing Definition Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud computing provides computation, software applications, data access,data management and storage resources without requiring cloud users to know the location and other details of the computing infrastructure. End users access cloud based applications through a web browser or a light weight desktop or mobile app while the business software and data are stored on servers at a remote location. Cloud application providers strive to give the same or better service and performance than if the software programs were installed locally on end-user computers. A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You dont need a software or a server to use them. All a consumer would need is just an internet connection and you can start sending emails. The server and email management software is all on the cloud ( internet) and is totally managed
  • 2. by the cloud service provider Yahoo , Google etc. The consumer gets to use the software alone and enjoy the benefits. The analogy is , 'If you need milk , would you buy a cow ?' All the users or consumers need is to get the benefits of using the software or hardware of the computer like sending emails etc. Just to get this benefit (milk) why should a consumer buy a (cow) software /hardware ? Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world. In June 2011, a study conducted by VersionOne found that 91% of senior IT professionals actually don't know what cloud computing is and two-thirds of senior finance professionals are clear by the concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen Group study found that disciplined companies achieved on average an 68% increase in their IT expense because cloud computing and only a 10% reduction in data center power costs Characteristics Cloud computing exhibits the following key characteristics:  Empowerment of end-users of computing resources by putting the provisioning of those resources in their own control, as opposed to the control of a centralized IT service (for example)  Agility improves with users' ability to re-provision technological infrastructure resources.  Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. Cloud computing systems typically use REST-based APIs.  Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house).  Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.  Virtualization technology allows servers and storage devices to be shared and utilization be increased. Applications can be easily migrated from one physical server to another.  Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:  Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)  Peak-load capacity increases (users need not engineer for highest possible load-levels)  Utilisation and efficiency improvements for systems that are often only 10–20% utilised.  Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.  Scalability and Elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads.  Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.  Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford.
  • 3. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.  Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places. Benefits of Cloud Computing Cloud Computing brings with it many benefits to the end user. These include: 1. Access to a huge range of applications without having to download or install anything 2. Reduced Cost It helps keep the cost down for both the users and website owners. Also for the users, they can access it from any computer and still have the file they need. For the owners, they do not need to reproduce the software and ship it out. They just rent the server space. Consumption is billed as a utility with minimal upfront costs. Users can avoid expenditure on hardware and software; only using what they need 3. More Storage They can hold more storage than a personal computer can. It takes away the need for the upgrading computer memory, which also helps keep the cost down for the companies and users alike. Scalability via on-demand resources 4. Automatically Updated Owners no longer need to hire people to update more than one server, and it also helps the users who do not like to download updates for the software. The server gets the updates and everyone who uses the service gets the updates without updating anything on their end. 5. Computing Flexibility It has more flexibility than other network computing systems and saves time plus money for people who are in a time crunch. 6. Mobility Like most networks it allows users to connect even without their own computers, meaning you can do your work from anywhere in the world as long as you have a internet connection and a computer access. So you can take your work with you on your wedding and vacations. Applications can be accessed from any computer, anywhere in the world. 7. No Downloads The users do not need to download anything, so that saves time and hard drive space for users. They can just log onto the network. 8. Shared Resources A key component of cloud computing is that companies share resources. With cloud computing, this allows them all to have access to the resources via cloud computing. This again saves businesses time and money by placing their resources all in one location that is easy for their workers to look up and access. Companies can share resources in one place Drawbacks Cloud Computing has many benefits, however there are also some associated risks with using cloud computing. These include:
  • 4. 1. Users do not physically possess storage of their own data, which leaves the responsibility and control of data storage with the provider 2. Users could become dependent upon the cloud computing provider 3. With data held externally, business continuity and disaster recovery are in the hands of the provider 4. Data migration issues when changing cloud provider 5. What happens if your cloud provider goes out of business? Cloud Computing – Service Models. Cloud computing providers offer their services according to three fundamental models: Infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) where IaaS is the most basic and each higher model abstracts from the details of the lower models. Infrastructure as a Service (IaaS or HaaS) In this most basic cloud service model, cloud providers offer computers – as physical or more often as virtual machines –, raw (block) storage, firewalls, load balancers, and networks. IaaS providers supply these resources on demand from their large pools installed in data centers. Local area networks including IP addresses are part of the offer. For the wide area connectivity, the Internet can be used or - incarrier clouds - dedicated virtual private networks can be configured. To deploy their applications, cloud users then install operating system images on the machines as well as their application software. In this model, it is the cloud user who is responsible for patching and maintaining the operating systems and application software. Cloud providers typically bill IaaS services on a utility computing basis, that is, cost will reflect the amount of resources allocated and consumed.
  • 5. Hardware as a Service (HaaS)  SaaS and PaaS are providing appliancess to customers, HaaS does not.  It offers the hardware so that your organization can put whatever they want onto it  Rather than purchase servers, software, racks, and having to pay for the datacenter space for them, the service provider rents those resources: - Server space - Network equipment - Memory - CPU cycles - Storage space Examples: Amazon EC2, Rackspace Mosso, GoGrid. Platform as a Service (PaaS) In the PaaS model, cloud providers deliver a computing platform and/or solution stack typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying compute and storage resources scale automatically to match application demand s uch that the cloud user does not have to allocate resources manually. PaaS APIs  normally based on HTML or JavaScript.  provides automatic facilities for concurrency management, scalability,failover, and security.  supports web development interfaces such as SOAP and REST  able to access databases & reuse services within a private network A general model is implemented under which developers build appls  designed to run on the provider’s infrastructure  delivered to users in via an Internet browser Downfall  A lack of interoperability and portability among providers  If you create an appl with one cloud provider & decide to move to another, you may not be able to do so or you’ll have to pay a high price Examples: Google App Engine, Microsoft Azure, Zoho Creator, NetSuite NetFlex, Akamai EdgePlatform, Salesforce Force.com, Facebook Platform Software as a Service (SaaS)
  • 6. In this model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. What makes a cloud application different from other applications is its elasticity. This can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand. Load balancers distribute the work over the set of virtual machines. This process is transparent to the cloud user who sees only a single access point. To accomodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention:desktop as a service, business process as a service, Test Environment as a Service, communication as a service. The pricing model for SaaS applications is typically a monthly or yearly flat fee per user Characteristics of SaaS: 1. Software applications or services are stored remotely 2. A user can then access these services or software applications via the Internet 3. In most cases, a user does not have to install anything onto their host machine,  all they require is a web browser to access these services  in some cases, additional plug-in/add-on for certain services are needed 4. Network-based manag & access to available software from central locations  rather than at each customer’s site,  enabling customers to access applications remotely via the Internet  centralized enhancement and patch updating 5. Appl delivery from a one-to-many model,  as opposed to a traditional one-to-one model.  single-instance, multitenant architecture
  • 7. The Cloud Pyramid Storage as a Service (SaaS):  Also known as disk space on demand  The ability to leverage storage that physically exists at a remote site but is logically a local storage resource to any application that requires storage.  It’s a means that a third-party provider rents space on their storage to end-users who lack the budget or capital budget to pay for it on their own.  Ideal when technical personnel are not available or have inadequate knowledge to implement and maintain that storage infrastructure  Given the complexity of current backup, replication, and disaster recovery needs, the service has become popular  Hundreds of cloud storage providers on the Web,  more seem to be added each day.  The biggest advantage is cost savings:  Storage rented from provider using a cost-per-gigabyte-stored or perdata-transferred model Examples of specialized providers 1. Google Docs 2. Web email providers like Gmail, Hotmail, and 3. Yahoo! Mail 4. Flickr and Picasa 5. YouTube 6. Hostmonster and GoDaddy store files and data for 7. many client web sites.
  • 8. 8. Facebook and MySpace are social networking sites 9. MediaMax and Strongspace offer storage space for any kind of digital data Database as a Service (DaaS):  Databases: repositories for information with links within the information that help make the data searchable.  Distributed databases, like Amazon’s SimpleDB, spread information among physically dispersed hardware  To the client, the information seems to be located in one place.  Idea behind DaaS is to avoid the complexity and cost of running your own database  The power is to leverage database technology that would typically cost thousands of dollars in hardware and software licenses.  Provides the ability to leverage the services of a remotely hosted database, sharing it with other users and having it logically function as if the database were local. Benefits: o Ease of use o Power o Integration o Management Information as a Service:  It refers to the ability to consume any type of remotely hosted information  E.g. stock price information, address validation, credit reporting, through a well-defined interface such as an API  ability to mix and match a variety of information from many different sources through a single application or mashup.  We can get stock quotes from one information-as-a-service provider,census data from another  GeoNames Web API, from geonames.org, o a geographical database containing over 8 million geographical names o provides a broad range of information on each, from its population and form of government to its topology to its road and railway systems and more. Communication as a Service (CaaS)  CaaS is an outsourced enterprise communications solution  Providers of this type of cloud-based solution are responsible for the management of hardware and software  Designed on a utility-like pricing model  Requires little to no management oversight from customers.  Network capacity and feature sets can be changed dynamically, so functionality keeps pace with consumer demand and provider-owned resources are not wasted.
  • 9.  Delivers - Voice over IP (VoIP) services, - Instant Messaging (IM), and - Video conferencing capabilities - Advanced features: chat, multimedia conferencing, Microsoft Outlook integration, real-time presence, “soft” phones (software-based telephones), video calling, unified messaging and mobility etc. Identity as a Service:  Offers a digital identity—a set of bytes—to describe the user  Based on this information, the application can determine who the user is and what he or she is allowed to do.  In-house applications rely on services like Active Directory to provide this information.  Clouds, however, have to use their own identity services.  If you sign on services to Amazon cloud services, you have to sign on using an Amazondefined identity.  Google’s App Engine requires a Google account  Windows uses Windows Live ID for use with Microsoft’s cloud applications.  OpenID o is an open, decentralized, single sign-on standard that allows users to log in to many services using the same digital identity. o is in the form of a uniform resource locator (URL) and does not rely on a central authority to authenticate a user’s identity. o Since a specific type of authentication is not required, nonstandard forms of authentication may be used, including smart cards, biometric, or passwords. o Used by many organizations, including: Google, IBM, Microsoft, Yahoo! Monitoring as a Service (MaaS)  Outsourced provisioning of security, primarily on business platforms that leverage the Internet to conduct business.  Security monitoring involves protecting an enterprise or government client from cyber threats  Security-as-a-service, is the ability to deliver core security services remotely over the Internet.  While the typical security services provided are rudimentary, more sophisticated services such as identity management are becoming available. Process as a Service  Remote resource that can bind many resources together, e.g. services & data hosted within the same CC resource or remotely to create business processes
  • 10.  Business process: meta-application that spans systems, leveraging key services& information combined into a sequence to form a process  These processes are easier to change than are applications and thus provide agility to those who leverage these process engines delivered on demand Integration as a Service The ability to deliver a complete integration stack from the cloud  including interfacing with applications, semantic mediation, flow control, integration design, and so on.  includes most of the features and functions found within traditional enterprise application integration technology, but delivered as a service Governance/Management as a Service (GaaS):  Any on-demand service that provides the ability to manage one or more cloud services.  These are typically simple things such topology, resource utilization, virtualization, and uptime management  Governance systems are becoming available as well, offering, for instance, the ability to enforce defined policies on data and services. Testing as a Service (TaaS):  Ability to test local or cloud-delivered systems using testing software and services that are remotely hosted.  While a cloud service requires testing unto itself, TaaS systems have the ability to test other cloud applications, Web sites, and internal enterprise systems, and they do not require a hardware or software footprint within the enterprise. What’s New! Amazon services: Amazon was one of the first companies to offer cloud services to the public, and they are very sophisticated Most extensive cloud service to date Offers a number of cloud services 1. Elastic Compute Cloud (EC2) offers virtual machines and extra CPU cycles foryour organization. 2. Simple Storage Service (S3) allows you to store items up to 5GB in size in Amazon’s virtual storage service.
  • 11. 3. Simple Queue Service (SQS) allows your machines to talk to each other using this message-passing API. 4. SimpleDB is a web service for running queries on structured data in real time. This service works in close conjunction with S3 and EC2, collectively providing the ability to store, process, and query data sets in the cloud. 5. CloudFront enables to place online content at the edges of the network, meaning that content is delivered from a location close to the user requesting it. Microsoft’s solution for CC: Windows Azure  An OS that allows organizations to run Windows apps and store files and data using Microsoft’s datacenters  Azure Services Platform includes services that allow developers to: o establish user identities, o manage workflows, o synchronize data, o perform other functions as they build software programs on Microsoft’s online computing platform.  Key components of Azure Services Platform include o provides service hosting and management and low-level scalable storage, computation, and networking. o SQL Services - provides database services and reporting. o .NET Services - provides service-based implementations of .NET Framework concepts such as workflow. o Live Services - used to share, store, and synchronize documents,photos, and files across PCs, phones, PC applications, and web sites. o SharePoint Services and Dynamics CRM Services - used for businesscontent, collaboration, and solution development in the cloud. Salesforce  Force.com - on-demand cloud computing platform (PaaS) offers: o Apex, an integrated development environment o Programmable interface, User interface options o Business logic, Workflow and approvals engine o Automatic mobile device deployment o Web services integration, A relational database o Reporting and analytics  Visualforce o Framework for creating new interface designs o Enables user interactions that can be built and delivered with no software or hardware infrastructure requirements o uses HTML, AJAX, and Flex, for business applications  CRM (customer relationship management) offering consists of the Sales Cloud and the Service Cloud with five core applications: o Sales, o Marketing,
  • 12. o Service, o Collaboration, o Analytics, o Custom applications  AppExchange - is a directory of applications built for Salesforce.com by third-party developers. - users can purchase and add to their Salesforce.com environment. Homework Help https://www.homeworkping.com/ Math homework help https://www.homeworkping.com/ Research Paper help https://www.homeworkping.com/ Algebra Help https://www.homeworkping.com/ Calculus Help https://www.homeworkping.com/ Accounting help https://www.homeworkping.com/ Paper Help https://www.homeworkping.com/ Writing Help