SlideShare a Scribd company logo
Traditional IT and Cloud
Overview
 Why study Cloud?
 Traditional IT
 Traditional IT vs. Cloud
 Cloud overview
Why study Cloud ?
 Companies of all sizes are moving their
operations on cloud.
 Cloud computing is changing the job market.
 Stay up-to-date with the latest technological
innovations.
 Your interest.
Traditional IT
 Before we look into the details of cloud, we first
need to understand how things work.
 Traditional IT is an informational technology
environment used for hosting data services or
applications that are owned, controlled and
managed by the same organization .
 This means that the organization needs to own
and maintain each of the components required for
application development.
Traditional IT
Application
Data
Runtime
Middleware
O/S
Virtualization
Servers
Storage
Networking
In traditional IT,
you
Manage all these
Features of traditional IT
 All the servers and infrastructure are within the
organization’s data center.
 It offers complete control of the resources.
 It needs staff to maintain the server.
 The hosting organization is responsible for the
security (physical and software).
 Infrastructure is not dynamically scalable as it
takes time to acquire physical servers and takes
time to set them up.
Features of traditional IT
 We need to have backup data centers for backup
(sensitive applications).
 The applications need to be designed based on
hardware limitations.
 The connectivity can be fast in case where data
centers are connected through LAN.
 As equipment is owned by the organization, in the
longer run in some cases, this could be more
economical.
Features of traditional IT
 The organization is responsible for all layers
which are application layer, OS, physical layer
and databases.
 An organization can have one or more data
centers depending on the need.
Traditional IT vs. Cloud
Traditional IT Cloud computing
Equipment/data centers owned by
the organization itself.
Equipment/data centers owned by
the cloud provider.
Upfront commitment to the
resources.
On demand resources acquisition.
Capacity addition takes time. Capacity addition is quick and easy.
Responsible for the security of the
infrastructure.
Cloud provider takes the burden of
security of the infrastructure.
May not be attractive models for
startups and for experimentation.
attractive models for startups and for
experimentation.
Workforce is familiar with this
approach.
Workforce needs training.
May be economical in few cases. Economical in lots of scenarios in
ever changing and fast moving IT
environment.
Works well when security and
confidentiality of the application is
Although the application and
confidentiality can be as solid as
Cloud overview
 Cloud  Not a physical thing.
 Cloud refers to network or Internet.
 Cloud is something which is present at remote
local and provides services over network.
 For some people, the word cloud refers to where
you store your pictures and share with others, for
others, it may refer to backing up your mobile
device.
Overview cloud
 Cloud is the logical name given to the resources
which are located at the remote place and
accessed by our network or Internet (it can be
accessed by multiples devices: mobile devices,
laptops, tablets…)
 Resources: storage, infrastructure, software and
managed services.
 A simple example for cloud service is Gmail which
is the email provided by Google and managed by
it.
Cloud overview
 Cloud computing: storing, accessing data and
programs over the internet instead of using
computer hard drives.
 The company offering these computing services
is called cloud provider and they typically charge
the same way we pay for electricity or water bill
which means we only pay for what we use.

More Related Content

What's hot

Cloud storage
Cloud storageCloud storage
Cloud storage
chautingfong
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
Martin Bioh
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Madhusudan Partani
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
Sean Connolly
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
Naga Dinesh
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
University of San Francisco
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
DrRajapraveenkN
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
How private cloud is better than public cloud
How private cloud is better than public cloudHow private cloud is better than public cloud
How private cloud is better than public cloud
Abhi Roy
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
panewberry
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
TSplusIndia
 
computing
computingcomputing
computing
Pappu Deepti
 
Cloud computing in healthcare
Cloud computing in healthcareCloud computing in healthcare
Cloud computing in healthcare
Mithisar Basumatary
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
guest50a642f
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
Ritesh Dwivedi
 
Traditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersTraditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data Centers
Shreya Srivastava
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
Cloud Legal Project
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
iCloudWebPACS
iCloudWebPACSiCloudWebPACS
iCloudWebPACS
iCloud Inc.
 

What's hot (20)

Cloud storage
Cloud storageCloud storage
Cloud storage
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
How private cloud is better than public cloud
How private cloud is better than public cloudHow private cloud is better than public cloud
How private cloud is better than public cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
computing
computingcomputing
computing
 
Cloud computing in healthcare
Cloud computing in healthcareCloud computing in healthcare
Cloud computing in healthcare
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Traditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersTraditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data Centers
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
iCloudWebPACS
iCloudWebPACSiCloudWebPACS
iCloudWebPACS
 

Similar to Ch1 traditional it and cloud

B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
Idan Hershkovich
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Hira Zahan
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
Advanced Business Solutions
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
ijtsrd
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
Metaorange
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
Shaun Thomas
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
Praveen M Jigajinni
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
IJERA Editor
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
khan593595
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Manish Sahani
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
DeepikaPardeshi1
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
Sysfore Technologies
 

Similar to Ch1 traditional it and cloud (20)

B1802041217
B1802041217B1802041217
B1802041217
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 

More from sawsan slii

Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloud
sawsan slii
 
Aws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, CloudwatchAws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, Cloudwatch
sawsan slii
 
Introduction to exploring hci
Introduction to exploring hciIntroduction to exploring hci
Introduction to exploring hci
sawsan slii
 
Design principles
Design principlesDesign principles
Design principles
sawsan slii
 
Introduction hci
Introduction hciIntroduction hci
Introduction hci
sawsan slii
 
Cache mapping exercises
Cache mapping exercisesCache mapping exercises
Cache mapping exercises
sawsan slii
 
Fileprocessing lec-7
Fileprocessing lec-7Fileprocessing lec-7
Fileprocessing lec-7
sawsan slii
 
evaluation techniques in HCI
evaluation techniques in HCIevaluation techniques in HCI
evaluation techniques in HCI
sawsan slii
 
Evaluation techniques in HCI
Evaluation techniques in HCIEvaluation techniques in HCI
Evaluation techniques in HCI
sawsan slii
 
Ajax and xml
Ajax and xmlAjax and xml
Ajax and xml
sawsan slii
 
UCD and low-fidelity prototyping
UCD and low-fidelity prototypingUCD and low-fidelity prototyping
UCD and low-fidelity prototyping
sawsan slii
 
Web forms and server side scripting
Web forms and server side scriptingWeb forms and server side scripting
Web forms and server side scripting
sawsan slii
 
Web server administration
Web server administrationWeb server administration
Web server administration
sawsan slii
 

More from sawsan slii (13)

Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloud
 
Aws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, CloudwatchAws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, Cloudwatch
 
Introduction to exploring hci
Introduction to exploring hciIntroduction to exploring hci
Introduction to exploring hci
 
Design principles
Design principlesDesign principles
Design principles
 
Introduction hci
Introduction hciIntroduction hci
Introduction hci
 
Cache mapping exercises
Cache mapping exercisesCache mapping exercises
Cache mapping exercises
 
Fileprocessing lec-7
Fileprocessing lec-7Fileprocessing lec-7
Fileprocessing lec-7
 
evaluation techniques in HCI
evaluation techniques in HCIevaluation techniques in HCI
evaluation techniques in HCI
 
Evaluation techniques in HCI
Evaluation techniques in HCIEvaluation techniques in HCI
Evaluation techniques in HCI
 
Ajax and xml
Ajax and xmlAjax and xml
Ajax and xml
 
UCD and low-fidelity prototyping
UCD and low-fidelity prototypingUCD and low-fidelity prototyping
UCD and low-fidelity prototyping
 
Web forms and server side scripting
Web forms and server side scriptingWeb forms and server side scripting
Web forms and server side scripting
 
Web server administration
Web server administrationWeb server administration
Web server administration
 

Recently uploaded

Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 

Recently uploaded (20)

Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 

Ch1 traditional it and cloud

  • 2. Overview  Why study Cloud?  Traditional IT  Traditional IT vs. Cloud  Cloud overview
  • 3. Why study Cloud ?  Companies of all sizes are moving their operations on cloud.  Cloud computing is changing the job market.  Stay up-to-date with the latest technological innovations.  Your interest.
  • 4. Traditional IT  Before we look into the details of cloud, we first need to understand how things work.  Traditional IT is an informational technology environment used for hosting data services or applications that are owned, controlled and managed by the same organization .  This means that the organization needs to own and maintain each of the components required for application development.
  • 6.
  • 7. Features of traditional IT  All the servers and infrastructure are within the organization’s data center.  It offers complete control of the resources.  It needs staff to maintain the server.  The hosting organization is responsible for the security (physical and software).  Infrastructure is not dynamically scalable as it takes time to acquire physical servers and takes time to set them up.
  • 8. Features of traditional IT  We need to have backup data centers for backup (sensitive applications).  The applications need to be designed based on hardware limitations.  The connectivity can be fast in case where data centers are connected through LAN.  As equipment is owned by the organization, in the longer run in some cases, this could be more economical.
  • 9. Features of traditional IT  The organization is responsible for all layers which are application layer, OS, physical layer and databases.  An organization can have one or more data centers depending on the need.
  • 10. Traditional IT vs. Cloud Traditional IT Cloud computing Equipment/data centers owned by the organization itself. Equipment/data centers owned by the cloud provider. Upfront commitment to the resources. On demand resources acquisition. Capacity addition takes time. Capacity addition is quick and easy. Responsible for the security of the infrastructure. Cloud provider takes the burden of security of the infrastructure. May not be attractive models for startups and for experimentation. attractive models for startups and for experimentation. Workforce is familiar with this approach. Workforce needs training. May be economical in few cases. Economical in lots of scenarios in ever changing and fast moving IT environment. Works well when security and confidentiality of the application is Although the application and confidentiality can be as solid as
  • 11. Cloud overview  Cloud  Not a physical thing.  Cloud refers to network or Internet.  Cloud is something which is present at remote local and provides services over network.  For some people, the word cloud refers to where you store your pictures and share with others, for others, it may refer to backing up your mobile device.
  • 12.
  • 13. Overview cloud  Cloud is the logical name given to the resources which are located at the remote place and accessed by our network or Internet (it can be accessed by multiples devices: mobile devices, laptops, tablets…)  Resources: storage, infrastructure, software and managed services.  A simple example for cloud service is Gmail which is the email provided by Google and managed by it.
  • 14. Cloud overview  Cloud computing: storing, accessing data and programs over the internet instead of using computer hard drives.  The company offering these computing services is called cloud provider and they typically charge the same way we pay for electricity or water bill which means we only pay for what we use.