SlideShare a Scribd company logo
Traditional IT and Cloud
Overview
 Why study Cloud?
 Traditional IT
 Traditional IT vs. Cloud
 Cloud overview
Why study Cloud ?
 Companies of all sizes are moving their
operations on cloud.
 Cloud computing is changing the job market.
 Stay up-to-date with the latest technological
innovations.
 Your interest.
Traditional IT
 Before we look into the details of cloud, we first
need to understand how things work.
 Traditional IT is an informational technology
environment used for hosting data services or
applications that are owned, controlled and
managed by the same organization .
 This means that the organization needs to own
and maintain each of the components required for
application development.
Traditional IT
Application
Data
Runtime
Middleware
O/S
Virtualization
Servers
Storage
Networking
In traditional IT,
you
Manage all these
Features of traditional IT
 All the servers and infrastructure are within the
organization’s data center.
 It offers complete control of the resources.
 It needs staff to maintain the server.
 The hosting organization is responsible for the
security (physical and software).
 Infrastructure is not dynamically scalable as it
takes time to acquire physical servers and takes
time to set them up.
Features of traditional IT
 We need to have backup data centers for backup
(sensitive applications).
 The applications need to be designed based on
hardware limitations.
 The connectivity can be fast in case where data
centers are connected through LAN.
 As equipment is owned by the organization, in the
longer run in some cases, this could be more
economical.
Features of traditional IT
 The organization is responsible for all layers
which are application layer, OS, physical layer
and databases.
 An organization can have one or more data
centers depending on the need.
Traditional IT vs. Cloud
Traditional IT Cloud computing
Equipment/data centers owned by
the organization itself.
Equipment/data centers owned by
the cloud provider.
Upfront commitment to the
resources.
On demand resources acquisition.
Capacity addition takes time. Capacity addition is quick and easy.
Responsible for the security of the
infrastructure.
Cloud provider takes the burden of
security of the infrastructure.
May not be attractive models for
startups and for experimentation.
attractive models for startups and for
experimentation.
Workforce is familiar with this
approach.
Workforce needs training.
May be economical in few cases. Economical in lots of scenarios in
ever changing and fast moving IT
environment.
Works well when security and
confidentiality of the application is
Although the application and
confidentiality can be as solid as
Cloud overview
 Cloud  Not a physical thing.
 Cloud refers to network or Internet.
 Cloud is something which is present at remote
local and provides services over network.
 For some people, the word cloud refers to where
you store your pictures and share with others, for
others, it may refer to backing up your mobile
device.
Overview cloud
 Cloud is the logical name given to the resources
which are located at the remote place and
accessed by our network or Internet (it can be
accessed by multiples devices: mobile devices,
laptops, tablets…)
 Resources: storage, infrastructure, software and
managed services.
 A simple example for cloud service is Gmail which
is the email provided by Google and managed by
it.
Cloud overview
 Cloud computing: storing, accessing data and
programs over the internet instead of using
computer hard drives.
 The company offering these computing services
is called cloud provider and they typically charge
the same way we pay for electricity or water bill
which means we only pay for what we use.

More Related Content

What's hot

Cloud computing-Practical Example
Cloud computing-Practical ExampleCloud computing-Practical Example
Cloud computing-Practical Example
Tasawar Gulzar
 
Big data
Big dataBig data
Big data
SMITSHAH219
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
Migrant Systems
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
Nilay Shrivastava
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
IBM India Smarter Computing
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
BIJIT GHOSH
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Simplilearn
 
Cloud Computing India Introduction and Overview - by karROX
Cloud Computing India Introduction and Overview - by karROXCloud Computing India Introduction and Overview - by karROX
Cloud Computing India Introduction and Overview - by karROX
Discover Cloud Computing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
seleshkumar Prajapati
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 
Introduction to Cloud Computing
Introduction to Cloud Computing  Introduction to Cloud Computing
Introduction to Cloud Computing
Chathuranga Bandara
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
Satyanarayana Swamy
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01
Mudassir Farman
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1
CCG
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
Craig Dickson
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
Bhavani Thangavel
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
Techsparks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Arysha Channa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Sreehari820
 

What's hot (20)

Cloud computing-Practical Example
Cloud computing-Practical ExampleCloud computing-Practical Example
Cloud computing-Practical Example
 
Big data
Big dataBig data
Big data
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
 
Cloud Computing India Introduction and Overview - by karROX
Cloud Computing India Introduction and Overview - by karROXCloud Computing India Introduction and Overview - by karROX
Cloud Computing India Introduction and Overview - by karROX
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud Computing  Introduction to Cloud Computing
Introduction to Cloud Computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similar to Ch1 traditional it and cloud

B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
Idan Hershkovich
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Hira Zahan
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
Advanced Business Solutions
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
ijtsrd
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
Metaorange
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
Shaun Thomas
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
Praveen M Jigajinni
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
IJERA Editor
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
TSplusIndia
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
khan593595
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
computing
computingcomputing
computing
Pappu Deepti
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Manish Sahani
 

Similar to Ch1 traditional it and cloud (20)

B1802041217
B1802041217B1802041217
B1802041217
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
computing
computingcomputing
computing
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 

More from sawsan slii

Introduction to exploring hci
Introduction to exploring hciIntroduction to exploring hci
Introduction to exploring hci
sawsan slii
 
Design principles
Design principlesDesign principles
Design principles
sawsan slii
 
Introduction hci
Introduction hciIntroduction hci
Introduction hci
sawsan slii
 
Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloud
sawsan slii
 
Cache mapping exercises
Cache mapping exercisesCache mapping exercises
Cache mapping exercises
sawsan slii
 
Fileprocessing lec-7
Fileprocessing lec-7Fileprocessing lec-7
Fileprocessing lec-7
sawsan slii
 
evaluation techniques in HCI
evaluation techniques in HCIevaluation techniques in HCI
evaluation techniques in HCI
sawsan slii
 
Evaluation techniques in HCI
Evaluation techniques in HCIEvaluation techniques in HCI
Evaluation techniques in HCI
sawsan slii
 
Ajax and xml
Ajax and xmlAjax and xml
Ajax and xml
sawsan slii
 
UCD and low-fidelity prototyping
UCD and low-fidelity prototypingUCD and low-fidelity prototyping
UCD and low-fidelity prototyping
sawsan slii
 
Web forms and server side scripting
Web forms and server side scriptingWeb forms and server side scripting
Web forms and server side scripting
sawsan slii
 
Web server administration
Web server administrationWeb server administration
Web server administration
sawsan slii
 

More from sawsan slii (12)

Introduction to exploring hci
Introduction to exploring hciIntroduction to exploring hci
Introduction to exploring hci
 
Design principles
Design principlesDesign principles
Design principles
 
Introduction hci
Introduction hciIntroduction hci
Introduction hci
 
Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloud
 
Cache mapping exercises
Cache mapping exercisesCache mapping exercises
Cache mapping exercises
 
Fileprocessing lec-7
Fileprocessing lec-7Fileprocessing lec-7
Fileprocessing lec-7
 
evaluation techniques in HCI
evaluation techniques in HCIevaluation techniques in HCI
evaluation techniques in HCI
 
Evaluation techniques in HCI
Evaluation techniques in HCIEvaluation techniques in HCI
Evaluation techniques in HCI
 
Ajax and xml
Ajax and xmlAjax and xml
Ajax and xml
 
UCD and low-fidelity prototyping
UCD and low-fidelity prototypingUCD and low-fidelity prototyping
UCD and low-fidelity prototyping
 
Web forms and server side scripting
Web forms and server side scriptingWeb forms and server side scripting
Web forms and server side scripting
 
Web server administration
Web server administrationWeb server administration
Web server administration
 

Recently uploaded

LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 

Recently uploaded (20)

LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 

Ch1 traditional it and cloud

  • 2. Overview  Why study Cloud?  Traditional IT  Traditional IT vs. Cloud  Cloud overview
  • 3. Why study Cloud ?  Companies of all sizes are moving their operations on cloud.  Cloud computing is changing the job market.  Stay up-to-date with the latest technological innovations.  Your interest.
  • 4. Traditional IT  Before we look into the details of cloud, we first need to understand how things work.  Traditional IT is an informational technology environment used for hosting data services or applications that are owned, controlled and managed by the same organization .  This means that the organization needs to own and maintain each of the components required for application development.
  • 6.
  • 7. Features of traditional IT  All the servers and infrastructure are within the organization’s data center.  It offers complete control of the resources.  It needs staff to maintain the server.  The hosting organization is responsible for the security (physical and software).  Infrastructure is not dynamically scalable as it takes time to acquire physical servers and takes time to set them up.
  • 8. Features of traditional IT  We need to have backup data centers for backup (sensitive applications).  The applications need to be designed based on hardware limitations.  The connectivity can be fast in case where data centers are connected through LAN.  As equipment is owned by the organization, in the longer run in some cases, this could be more economical.
  • 9. Features of traditional IT  The organization is responsible for all layers which are application layer, OS, physical layer and databases.  An organization can have one or more data centers depending on the need.
  • 10. Traditional IT vs. Cloud Traditional IT Cloud computing Equipment/data centers owned by the organization itself. Equipment/data centers owned by the cloud provider. Upfront commitment to the resources. On demand resources acquisition. Capacity addition takes time. Capacity addition is quick and easy. Responsible for the security of the infrastructure. Cloud provider takes the burden of security of the infrastructure. May not be attractive models for startups and for experimentation. attractive models for startups and for experimentation. Workforce is familiar with this approach. Workforce needs training. May be economical in few cases. Economical in lots of scenarios in ever changing and fast moving IT environment. Works well when security and confidentiality of the application is Although the application and confidentiality can be as solid as
  • 11. Cloud overview  Cloud  Not a physical thing.  Cloud refers to network or Internet.  Cloud is something which is present at remote local and provides services over network.  For some people, the word cloud refers to where you store your pictures and share with others, for others, it may refer to backing up your mobile device.
  • 12.
  • 13. Overview cloud  Cloud is the logical name given to the resources which are located at the remote place and accessed by our network or Internet (it can be accessed by multiples devices: mobile devices, laptops, tablets…)  Resources: storage, infrastructure, software and managed services.  A simple example for cloud service is Gmail which is the email provided by Google and managed by it.
  • 14. Cloud overview  Cloud computing: storing, accessing data and programs over the internet instead of using computer hard drives.  The company offering these computing services is called cloud provider and they typically charge the same way we pay for electricity or water bill which means we only pay for what we use.