SlideShare a Scribd company logo
He110!
My name is William
https://ca.linkedin.com/in/william-pourmajidi-778ab01
# York University ITEC Program Graduate
# MSc Computer Science – Blockchain and Software
Engineerings
# PhD Candidate - Dept. of Computer Science - Ryerson
University
# 16 Years experience as programmer, developer, designer,
network engineer, Cloud Engineer , and recently: Cloud
Architect !
# Short Bio – Python Version…
MyLifeTime = random.randrange(0,115)
MyAge = currentDay.getMyAge()
While ( MyAge < MyLifeTime):
hobby = apply(learn(read(*computers*)))
Cloud Computing[Cloud Com·put·ing]
The practice of using a
network of remote
servers hosted on the
Internet to store,
manage, and process
data, rather than a local
server or a personal
computer.
What do we want to learn?
I start with, Why?
Basics
We are very demanding users:
• Computing Power
• Performance (speed and accuracy)
• Large Storage
• Service-based offerings (Netflix, Spotify,…)
• Increased Compatibility
• Ubiquitous access (Omnipresence)
• Security
• Compact Size , Long battery life
Basics
Computing Power
• Moore's Law: Each two years, the power of computing doubles, but our
problems get bigger at a faster rate.
• Stand-alone computation power is not enough to solve major problems
Example: Decryption Task
• A 3-deciuma lock
• 3 options , each from 0 to 9 (10 combination)
• Total 10 ^ 3 = 1000 combinations
• Trial for each combination : 2 seconds
• Total crack time (Worst case):
2000 second = 34 minutes
Digital Combinations
• A simple 64-bit binary encryption
• 2^64 = 18,446,744,073,709,551,616 (18 quintillion ) combinations!
• Assume we try 1000 combination per second (very fast)
Basics
It takes about 600 million years
to brute force this lock with one computer
Apple vs FBI
• Feb 2016, FBI asked Apple to assist them to break into an iPhone
(belonging to a mass shooter)
• Apple refused
• Apple uses 265 bit encryption (Far more complicated that 64 bit)
• FBI took Apple to court
• A few days after, FBI claimed they found a way to get in to iphone, how:
• High performance computing (paining a wall)
Basics
High Performance Computing (HPC): Joining millions of
computing engines (virtual machines) can solve a very complex
problem in matter of hours, or days.
Cloud: Powerful Computing
Data Center: a facility composed of networked computers and
storage that businesses or other organizations use to organize,
process, store and disseminate large amounts of data
Cloud: Powerful Computing
Canada’s Largest Data Center:
• 151 Front St. West.
• Handles the traffic rates of 531 Gbit/s making it number 1 in
Canada,
Cloud: Powerful Computing
Cloud: Organized and
Maintainable
Data Centers: Cabling
Use of “Raised Floors for cooling system and cabling)
Cloud: Secure
Data Centers: Physical Security
• No Windows
• Biometric locks (Eyes, Voice, finger print)
• Access Card (multi-level access cards)
• Security guards (Gun controlled environment)
Cloud: Secure
Data Centers: Logical Security
• Much more complicated than physical security
• Deep Packet Inspection
• Firewalls
• Layered Networks
Cloud: Secure
Data Centers: Logical Security
• Firewalls
• Layered Networks
Cloud: Financially Feasible
Charge back model: rent per hour and pay for what you use
• Storage : Pay per GB storage
• Computing: Pay per CPU and RAM per hour
• Network: Pay per GB data transfer
• Cloud: Powerful Computing
• Cloud: Organized and Maintainable
• Cloud: Secure
• Cloud: Financially Feasible
Why Cloud?
Because:
Cloud Computing
Stats
Statistical Status of Cloud
• Half of US Government agencies use the cloud
• By 2020, cloud computing will cross the $270 billion mark
• 2014 : The first year when the majority of workloads were on
the cloud.
• Amazon has “1,000,000,000” gigabytes of data across more
than 1,400,000 servers.
• 90% of Microsoft’s R&D budget is being allocated to improve
cloud technology
Reference : http://cloudtweaks.com/
Cloud Stats
Moving from On-premises to Off-Premisis
https://www.ibm.com
Cloud Stats
Companies by Number of Servers
Cloud Stats
www.softwareadvice.com
https://www.infoworld.com
Cloud Stats
Adoption rate among key Cloud players
Questions?
Comments?
Discussions?
Cloud Computing
Key characteristics
Cloud Computing Definition (Very Important):
Cloud Computing is a model for enabling ubiquitous, convenient, on-
demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction.
Cloud Key Characteristics
Virtualization
• Virtualization is at the core of Cloud technology
• Huge impact on Utilization
Source: Vmware.com
Cloud Key Characteristics
Cloud Key Characteristics
Software Defined Network (SDN):
Elasticity
• Expanding and shrinking based on resource usage and tenant
demands.
Example 1.1: Let’s review your favorite online shopping service
around new year and two weeks after new year
JIT (Just In time)
• Creation time for 1 Linux server ~ roughly 4 minutes
• Creation time for 1 Windows server ~ roughly 4 minutes
• Creation time for 1000 Servers ~ roughly 4 minutes
Cloud Key Characteristics
High Availability
• Availability is a Non-Function-Requirement
• The amount of time that it is operational and available for use
• Feb 2017: A command typo , caused AWS to go down From
9:37AM PST to 1:54PM PST
• This incident costs AWS and its customers more than
US$150,000,000
Cloud Key Characteristics
Cloud Key Characteristics
Globally connected data centers
Redundant power infrastructure
Source : Wiley: Deploying and Managing a Cloud Infrastructure
Cloud Key Characteristics
24x7x365 Monitoring
Cloud Key Characteristics
Hybrid distribution of accountability
SLA : Service Level Agreement
Cloud Key Characteristics
Cloud Deployment models
Private
• Owned by one company and USED by one company
Public
• Owned by one company and USED by many company
Hybrid
• The result of having both Private and Public Cloud : Lots of
flexibility , lots of problems
Community Cloud
• Owned by a group of companies who use the cloud as well (e.g.,
Universities , Research Institutes)
Cloud Key Characteristics
Infrastructure as a service (IaaS)
• Provider provides the infrastructure, client builds on top of it
• Very Flexible
• Requires advanced cloud expertise
Platform as a service (PaaS)
• Provider provides the infrastructure, virtualization, and OS
• Client uses the OS to install anything they like
• Requires generic IT knowledge
Cloud Key Characteristics
Foundations of cloud computing
Software as a service(SaaS)
• Provider provides EVERYTHING
• Client uses the service
• Example: Gmail , Google Drive, Salesforce, Online Office
Cloud Deployment models
Cloud Key Characteristics
Cloud Deployment models
Cloud Key Characteristics
Questions?
Comments?
Discussions?

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
Amazon Web Services
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
Ravindra Dastikop
 
What is Cloud Computing with AWS?
What is Cloud Computing with AWS?What is Cloud Computing with AWS?
What is Cloud Computing with AWS?
Amazon Web Services
 
App Modernization
App ModernizationApp Modernization
App Modernization
PT Datacomm Diangraha
 
App Modernization with Microsoft Azure
App Modernization with Microsoft AzureApp Modernization with Microsoft Azure
App Modernization with Microsoft Azure
Microsoft Tech Community
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Syam Lal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
SarthakNawal1
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
 
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
Microsoft Azure Security Overview - Microsoft - CSS Dallas AzureMicrosoft Azure Security Overview - Microsoft - CSS Dallas Azure
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
Alert Logic
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
sagaroceanic11
 
Microservice architecture design principles
Microservice architecture design principlesMicroservice architecture design principles
Microservice architecture design principles
Sanjoy Kumar Roy
 
FinOps introduction
FinOps introductionFinOps introduction
FinOps introduction
Alexander Tokarev
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
Maganathin Veeraragaloo
 
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceAWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
Tom Laszewski
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Waseem Ahmed
 
Challenges of the Cloud Migration Journey
Challenges of the Cloud Migration JourneyChallenges of the Cloud Migration Journey
Challenges of the Cloud Migration Journey
CloudHealth by VMware
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 
Cloud Center of Excellence
Cloud Center of ExcellenceCloud Center of Excellence
Cloud Center of Excellence
Jeremy Canale
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
 
What is Cloud Computing with AWS?
What is Cloud Computing with AWS?What is Cloud Computing with AWS?
What is Cloud Computing with AWS?
 
App Modernization
App ModernizationApp Modernization
App Modernization
 
App Modernization with Microsoft Azure
App Modernization with Microsoft AzureApp Modernization with Microsoft Azure
App Modernization with Microsoft Azure
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
Microsoft Azure Security Overview - Microsoft - CSS Dallas AzureMicrosoft Azure Security Overview - Microsoft - CSS Dallas Azure
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Microservice architecture design principles
Microservice architecture design principlesMicroservice architecture design principles
Microservice architecture design principles
 
FinOps introduction
FinOps introductionFinOps introduction
FinOps introduction
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceAWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Challenges of the Cloud Migration Journey
Challenges of the Cloud Migration JourneyChallenges of the Cloud Migration Journey
Challenges of the Cloud Migration Journey
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Center of Excellence
Cloud Center of ExcellenceCloud Center of Excellence
Cloud Center of Excellence
 

Similar to A non-technical introduction to Cloud Computing

Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
krisbliesner
 
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
Amazon Web Services Korea
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Amit Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shailaja Patil
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
Deep Gupta
 
IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...
IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...
IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...
Amazon Web Services
 
IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...
IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...
IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...
Amazon Web Services
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
TabassumMaktum
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
UOS
 
Latest trendsincloud computing
Latest trendsincloud computingLatest trendsincloud computing
Latest trendsincloud computing
Liliana Ignat
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
Deepak Shukla
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
ahmedsamir339466
 
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...
Amazon Web Services
 
AWS Business Essentials Day
AWS Business Essentials DayAWS Business Essentials Day
AWS Business Essentials Day
Amazon Web Services
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud computing by Luqman
Cloud computing by LuqmanCloud computing by Luqman
Cloud computing by Luqman
Luqman Shareef
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Rohith Shankar
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 

Similar to A non-technical introduction to Cloud Computing (20)

Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
 
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...
IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...
IBM Aspera for High Speed Data Migration to Your AWS Cloud - DEM06-S - Anahei...
 
IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...
IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...
IBM Aspera for high-speed data migration to your AWS Cloud - DEM02-S - New Yo...
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Latest trendsincloud computing
Latest trendsincloud computingLatest trendsincloud computing
Latest trendsincloud computing
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...
 
AWS Business Essentials Day
AWS Business Essentials DayAWS Business Essentials Day
AWS Business Essentials Day
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing by Luqman
Cloud computing by LuqmanCloud computing by Luqman
Cloud computing by Luqman
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

A non-technical introduction to Cloud Computing

  • 1. He110! My name is William https://ca.linkedin.com/in/william-pourmajidi-778ab01 # York University ITEC Program Graduate # MSc Computer Science – Blockchain and Software Engineerings # PhD Candidate - Dept. of Computer Science - Ryerson University # 16 Years experience as programmer, developer, designer, network engineer, Cloud Engineer , and recently: Cloud Architect ! # Short Bio – Python Version… MyLifeTime = random.randrange(0,115) MyAge = currentDay.getMyAge() While ( MyAge < MyLifeTime): hobby = apply(learn(read(*computers*)))
  • 2. Cloud Computing[Cloud Com·put·ing] The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
  • 3. What do we want to learn?
  • 5. Basics We are very demanding users: • Computing Power • Performance (speed and accuracy) • Large Storage • Service-based offerings (Netflix, Spotify,…) • Increased Compatibility • Ubiquitous access (Omnipresence) • Security • Compact Size , Long battery life
  • 6. Basics Computing Power • Moore's Law: Each two years, the power of computing doubles, but our problems get bigger at a faster rate. • Stand-alone computation power is not enough to solve major problems Example: Decryption Task • A 3-deciuma lock • 3 options , each from 0 to 9 (10 combination) • Total 10 ^ 3 = 1000 combinations • Trial for each combination : 2 seconds • Total crack time (Worst case): 2000 second = 34 minutes
  • 7. Digital Combinations • A simple 64-bit binary encryption • 2^64 = 18,446,744,073,709,551,616 (18 quintillion ) combinations! • Assume we try 1000 combination per second (very fast) Basics It takes about 600 million years to brute force this lock with one computer
  • 8. Apple vs FBI • Feb 2016, FBI asked Apple to assist them to break into an iPhone (belonging to a mass shooter) • Apple refused • Apple uses 265 bit encryption (Far more complicated that 64 bit) • FBI took Apple to court • A few days after, FBI claimed they found a way to get in to iphone, how: • High performance computing (paining a wall) Basics
  • 9. High Performance Computing (HPC): Joining millions of computing engines (virtual machines) can solve a very complex problem in matter of hours, or days. Cloud: Powerful Computing
  • 10. Data Center: a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data Cloud: Powerful Computing
  • 11. Canada’s Largest Data Center: • 151 Front St. West. • Handles the traffic rates of 531 Gbit/s making it number 1 in Canada, Cloud: Powerful Computing
  • 12. Cloud: Organized and Maintainable Data Centers: Cabling Use of “Raised Floors for cooling system and cabling)
  • 13. Cloud: Secure Data Centers: Physical Security • No Windows • Biometric locks (Eyes, Voice, finger print) • Access Card (multi-level access cards) • Security guards (Gun controlled environment)
  • 14. Cloud: Secure Data Centers: Logical Security • Much more complicated than physical security • Deep Packet Inspection • Firewalls • Layered Networks
  • 15. Cloud: Secure Data Centers: Logical Security • Firewalls • Layered Networks
  • 16. Cloud: Financially Feasible Charge back model: rent per hour and pay for what you use • Storage : Pay per GB storage • Computing: Pay per CPU and RAM per hour • Network: Pay per GB data transfer
  • 17. • Cloud: Powerful Computing • Cloud: Organized and Maintainable • Cloud: Secure • Cloud: Financially Feasible Why Cloud? Because:
  • 18.
  • 20. Statistical Status of Cloud • Half of US Government agencies use the cloud • By 2020, cloud computing will cross the $270 billion mark • 2014 : The first year when the majority of workloads were on the cloud. • Amazon has “1,000,000,000” gigabytes of data across more than 1,400,000 servers. • 90% of Microsoft’s R&D budget is being allocated to improve cloud technology Reference : http://cloudtweaks.com/ Cloud Stats
  • 21. Moving from On-premises to Off-Premisis https://www.ibm.com Cloud Stats
  • 22. Companies by Number of Servers Cloud Stats www.softwareadvice.com
  • 26. Cloud Computing Definition (Very Important): Cloud Computing is a model for enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Key Characteristics
  • 27. Virtualization • Virtualization is at the core of Cloud technology • Huge impact on Utilization Source: Vmware.com Cloud Key Characteristics
  • 28. Cloud Key Characteristics Software Defined Network (SDN):
  • 29. Elasticity • Expanding and shrinking based on resource usage and tenant demands. Example 1.1: Let’s review your favorite online shopping service around new year and two weeks after new year JIT (Just In time) • Creation time for 1 Linux server ~ roughly 4 minutes • Creation time for 1 Windows server ~ roughly 4 minutes • Creation time for 1000 Servers ~ roughly 4 minutes Cloud Key Characteristics
  • 30. High Availability • Availability is a Non-Function-Requirement • The amount of time that it is operational and available for use • Feb 2017: A command typo , caused AWS to go down From 9:37AM PST to 1:54PM PST • This incident costs AWS and its customers more than US$150,000,000 Cloud Key Characteristics
  • 31. Cloud Key Characteristics Globally connected data centers
  • 32. Redundant power infrastructure Source : Wiley: Deploying and Managing a Cloud Infrastructure Cloud Key Characteristics
  • 33. 24x7x365 Monitoring Cloud Key Characteristics
  • 34. Hybrid distribution of accountability SLA : Service Level Agreement Cloud Key Characteristics
  • 35. Cloud Deployment models Private • Owned by one company and USED by one company Public • Owned by one company and USED by many company Hybrid • The result of having both Private and Public Cloud : Lots of flexibility , lots of problems Community Cloud • Owned by a group of companies who use the cloud as well (e.g., Universities , Research Institutes) Cloud Key Characteristics
  • 36. Infrastructure as a service (IaaS) • Provider provides the infrastructure, client builds on top of it • Very Flexible • Requires advanced cloud expertise Platform as a service (PaaS) • Provider provides the infrastructure, virtualization, and OS • Client uses the OS to install anything they like • Requires generic IT knowledge Cloud Key Characteristics
  • 37. Foundations of cloud computing Software as a service(SaaS) • Provider provides EVERYTHING • Client uses the service • Example: Gmail , Google Drive, Salesforce, Online Office
  • 38. Cloud Deployment models Cloud Key Characteristics
  • 39. Cloud Deployment models Cloud Key Characteristics

Editor's Notes

  1. Good to here…..