SlideShare a Scribd company logo
1 of 10
Presented By:
Ruchir Tarawat
 B.Tech.- IT

Semester-VIII
 Cloud Computing simply means Internet
  computing.

 Itis a technology that uses the internet
  and central remote servers to maintain
  data and applications.
Cloud Services can be divided into three
stacks:
1. Infrastructure as a Service (IaaS)


2.   Platform as a Service (PaaS)

1.   Software as a Service(SaaS)
Following are the four types of Cloud
Deployment Models-
1. Private Cloud,


2.   Community Cloud,

3.   Public Cloud, and

4.   Hybrid Cloud
1.   Private Cloud is used by a particular
     organization to prevent from misuse of
     data and information.
2.   Community      Cloud     establish   where
     requirements of several organization is
     same.
3.   Public Cloud is used publically for
     everyone’s use of data and information.
4.   Hybrid Cloud is the combination of Private,
     Community and Public Cloud.
 Helps to use applications without
 installations.

 Access the personal files at any computer
 with internet access.

 Thistechnology allows much more efficient
 computation by centralizing storage,memory,
 processing and band width.
 Receive secure, managed hosting at very
  inexpensive costs.

 Don’t need to purchase additional hardware
  as your space requirements grow.

 Ifsomething does goes wrong, user can get
  the support of his/her service providers.
 The  data is at the mercy of a third-party
  company (you better make sure you trust
  them).
 It may be difficult (or even impossible) to
  move large amounts of data from the
  provider.
 User do not have control over the remote
  servers, their software, or their security.
ANY QUERY…….???

More Related Content

What's hot

Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Fuji Xerox Asia Pacific
 
How private cloud is better than public cloud
How private cloud is better than public cloudHow private cloud is better than public cloud
How private cloud is better than public cloudAbhi Roy
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top ThreatsTiago de Almeida
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsAM Publications
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 

What's hot (17)

Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?
 
How private cloud is better than public cloud
How private cloud is better than public cloudHow private cloud is better than public cloud
How private cloud is better than public cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Csathreats.v1.0
Csathreats.v1.0Csathreats.v1.0
Csathreats.v1.0
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 

Viewers also liked

Добро пожаловать в Ffi
Добро пожаловать в FfiДобро пожаловать в Ffi
Добро пожаловать в FfiIgor Fortuna
 
Affluent Profile Brief
Affluent Profile BriefAffluent Profile Brief
Affluent Profile Briefcmdamo
 
презентация. экономия топлива до 30%
презентация. экономия топлива до 30%презентация. экономия топлива до 30%
презентация. экономия топлива до 30%Igor Fortuna
 
Russian presentation
Russian presentationRussian presentation
Russian presentationIgor Fortuna
 
Russian swan lake training frage
Russian swan lake training frageRussian swan lake training frage
Russian swan lake training fragebobadillajuan
 

Viewers also liked (9)

Добро пожаловать в Ffi
Добро пожаловать в FfiДобро пожаловать в Ffi
Добро пожаловать в Ffi
 
Affluent Profile Brief
Affluent Profile BriefAffluent Profile Brief
Affluent Profile Brief
 
презентация. экономия топлива до 30%
презентация. экономия топлива до 30%презентация. экономия топлива до 30%
презентация. экономия топлива до 30%
 
Mystique
MystiqueMystique
Mystique
 
Russian presentation
Russian presentationRussian presentation
Russian presentation
 
Russian swan lake training frage
Russian swan lake training frageRussian swan lake training frage
Russian swan lake training frage
 
Fuente power suplly
Fuente power supllyFuente power suplly
Fuente power suplly
 
Presentation1
Presentation1Presentation1
Presentation1
 
Genlec ppt
Genlec pptGenlec ppt
Genlec ppt
 

Similar to Cloud Computing

Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?sriramr
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloudsriramr
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Introduction-to-Cloud-Computing training
Introduction-to-Cloud-Computing trainingIntroduction-to-Cloud-Computing training
Introduction-to-Cloud-Computing trainingamsyasera
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusNANDINI SHARMA
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 

Similar to Cloud Computing (20)

Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloud
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
H046053944
H046053944H046053944
H046053944
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Introduction-to-Cloud-Computing training
Introduction-to-Cloud-Computing trainingIntroduction-to-Cloud-Computing training
Introduction-to-Cloud-Computing training
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabus
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Cloud Computing

  • 1. Presented By: Ruchir Tarawat B.Tech.- IT Semester-VIII
  • 2.  Cloud Computing simply means Internet computing.  Itis a technology that uses the internet and central remote servers to maintain data and applications.
  • 3. Cloud Services can be divided into three stacks: 1. Infrastructure as a Service (IaaS) 2. Platform as a Service (PaaS) 1. Software as a Service(SaaS)
  • 4. Following are the four types of Cloud Deployment Models- 1. Private Cloud, 2. Community Cloud, 3. Public Cloud, and 4. Hybrid Cloud
  • 5. 1. Private Cloud is used by a particular organization to prevent from misuse of data and information. 2. Community Cloud establish where requirements of several organization is same. 3. Public Cloud is used publically for everyone’s use of data and information. 4. Hybrid Cloud is the combination of Private, Community and Public Cloud.
  • 6.
  • 7.  Helps to use applications without installations.  Access the personal files at any computer with internet access.  Thistechnology allows much more efficient computation by centralizing storage,memory, processing and band width.
  • 8.  Receive secure, managed hosting at very inexpensive costs.  Don’t need to purchase additional hardware as your space requirements grow.  Ifsomething does goes wrong, user can get the support of his/her service providers.
  • 9.  The data is at the mercy of a third-party company (you better make sure you trust them).  It may be difficult (or even impossible) to move large amounts of data from the provider.  User do not have control over the remote servers, their software, or their security.