This document provides an overview of cloud computing. It begins with definitions of cloud computing and discusses concepts like service-oriented architecture, cyber infrastructure, and virtualization. It describes different types of cloud architectures like public, private and hybrid clouds. It outlines the key components of cloud computing including cloud types, virtualization, and users. It discusses how cloud computing works and reviews the merits and demerits. Finally, it concludes that cloud computing allows for more efficient use of IT resources and flexible access to computing power and data from any internet-connected device.
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
In recent era cloud is appear as a backbone of business strategies. Businesses are continuously researching and exploring various methods to use cloud technologies to achieve business goals in faster and cost-effective ways.
The document discusses several new trends in cloud computing including cloud as an innovation platform for mobile, social, and big data applications. It also discusses the growth of Platform-as-a-Service (PaaS), software-defined hardware, big data analytics in the cloud, security in the cloud, and cloud-based collaboration across generations in the workplace. A survey found that cloud adoption is now strategic for many companies and SaaS adoption has grown significantly while IaaS and PaaS are reaching a tipping point. The amount of data residing in the cloud is also expected to grow significantly in the next two years.
The document discusses cloud computing, including what it is, its history and benefits. It defines cloud as the delivery of computing services over the internet and discusses common cloud characteristics like on-demand self-service and rapid elasticity. It describes the different cloud models including infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). The document also provides an overview of Microsoft Azure, a flexible cloud platform, and concludes by noting that while cloud computing offers benefits, security remains a challenge that could slow adoption.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). IaaS provides basic computing resources, PaaS provides platforms to build applications, and SaaS provides complete applications users can access. Popular cloud platforms include Amazon EC2 for IaaS and Google App Engine for PaaS. Cloud computing offers advantages like scalability, cost savings and device independence.
The document discusses cloud computing and defines it as the delivery of computing resources over the Internet. It describes the key characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also discusses the benefits of cloud computing such as cost savings, scalability, reliability, and simplified maintenance. Finally, it outlines the important components needed to build a dynamic cloud infrastructure including service management, asset management, virtualization, and energy efficiency.
The term “Cloud Computing” is a recent buzzword in the IT world. Behind this fancy poetic phrase, there lies a true picture for the future of computing for both in technical prospective and social prospective. However, the term “Cloud Computing” is recent but the idea of centralizing computation and storage in distributed data centers maintained by third party companies is not new but it came in the way back in 1990s along with distributed computing approaches like grid computing. Cloud computing aimed at providing IT as a service to the cloud users on-demand basic with greater flexibility, availability, reliability and scalability with utility computing model. This new paradigm of computing has an immense potential in it to be use in the field of e-governance and in rural development perspective in the developing country like India.
Have you heard of cloud computing? Well you should of! Cloud computing is not something that is new, it has been around for a few years now. This presentation helps readers to understand what cloud computing is and how a business should use it.
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
In recent era cloud is appear as a backbone of business strategies. Businesses are continuously researching and exploring various methods to use cloud technologies to achieve business goals in faster and cost-effective ways.
The document discusses several new trends in cloud computing including cloud as an innovation platform for mobile, social, and big data applications. It also discusses the growth of Platform-as-a-Service (PaaS), software-defined hardware, big data analytics in the cloud, security in the cloud, and cloud-based collaboration across generations in the workplace. A survey found that cloud adoption is now strategic for many companies and SaaS adoption has grown significantly while IaaS and PaaS are reaching a tipping point. The amount of data residing in the cloud is also expected to grow significantly in the next two years.
The document discusses cloud computing, including what it is, its history and benefits. It defines cloud as the delivery of computing services over the internet and discusses common cloud characteristics like on-demand self-service and rapid elasticity. It describes the different cloud models including infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). The document also provides an overview of Microsoft Azure, a flexible cloud platform, and concludes by noting that while cloud computing offers benefits, security remains a challenge that could slow adoption.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). IaaS provides basic computing resources, PaaS provides platforms to build applications, and SaaS provides complete applications users can access. Popular cloud platforms include Amazon EC2 for IaaS and Google App Engine for PaaS. Cloud computing offers advantages like scalability, cost savings and device independence.
The document discusses cloud computing and defines it as the delivery of computing resources over the Internet. It describes the key characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also discusses the benefits of cloud computing such as cost savings, scalability, reliability, and simplified maintenance. Finally, it outlines the important components needed to build a dynamic cloud infrastructure including service management, asset management, virtualization, and energy efficiency.
The term “Cloud Computing” is a recent buzzword in the IT world. Behind this fancy poetic phrase, there lies a true picture for the future of computing for both in technical prospective and social prospective. However, the term “Cloud Computing” is recent but the idea of centralizing computation and storage in distributed data centers maintained by third party companies is not new but it came in the way back in 1990s along with distributed computing approaches like grid computing. Cloud computing aimed at providing IT as a service to the cloud users on-demand basic with greater flexibility, availability, reliability and scalability with utility computing model. This new paradigm of computing has an immense potential in it to be use in the field of e-governance and in rural development perspective in the developing country like India.
Have you heard of cloud computing? Well you should of! Cloud computing is not something that is new, it has been around for a few years now. This presentation helps readers to understand what cloud computing is and how a business should use it.
The presentation discusses developing a cloud computing application and Android application for students. The project aims to allow students to develop and execute Java programs on tablets and mobile devices using cloud computing resources. It describes cloud computing concepts, Android architecture, and progress made in linking the Android SDK with Eclipse for application development.
Cloud computing stores and processes data in remote data centers that can be accessed from any device while edge computing processes data locally or at nearby edge data centers to minimize latency. Edge computing provides faster speeds, lower costs, better security and reliability than cloud computing as it keeps sensitive data localized rather than in remote data centers, though cloud computing remains suitable for massive data storage needs. Both cloud and edge computing have roles to play as companies seek distributed computing solutions.
Collaboration In The Cloud PresentationPatrick Huang
The document discusses collaboration in cloud computing. It defines key cloud concepts like SaaS, PaaS, and IaaS. Collaboration is described as interactions between parties working together towards a shared goal, with all parties benefiting. New technologies enable more collaboration opportunities between companies and individuals. The emergence of social media and networks will transform how businesses interact with customers and operate internally. Overall, cloud computing and new collaboration tools promise to revolutionize how organizations work and innovate through more open and connected models.
This document is a technical seminar report on cloud computing submitted in partial fulfillment of a Bachelor of Engineering degree. It introduces cloud computing as a concept where computing resources such as servers, storage, databases and networking are provided as standardized services over the Internet. The document discusses the history, characteristics, implementation and economics of cloud computing and provides examples of major companies involved in cloud services.
Cloud computing or Cloud hosting has transformed how businesses operate. Despite increased adoption of Cloud hosting and its associated benefits for enterprises, certain facts need to ‘cleared’ amongst Cloud users. Here’s a PPT to clear all your myths.
Report on cloud computing by prashant guptaPrashant Gupta
The document is a technical seminar report submitted by Prashant Gupta on cloud computing. It includes an abstract, introduction, table of contents, and initial sections on the concept and history of cloud computing. The introduction provides a definition of cloud computing and discusses the shift from centralized to distributed computing models. It highlights the scalability and on-demand access to computing resources that cloud computing provides.
Elements Of Cloud Computing Satish Jun24 09dhanya.sumeru
Cloud computing provides dynamically scalable resources over the Internet. Key characteristics include resources beyond a single company, access via the Internet, and invisible technology infrastructure. Cloud services include storage, applications, and programming environments accessed through web browsers. Major benefits are lower costs, improved collaboration, and access from anywhere. Security and reliability concerns remain barriers. Leading cloud providers include Amazon, Google, Microsoft, IBM and Salesforce.
Cloud computing has become the foundation of a range of important applications. At the same time, other technologies are also driving the further advancement of cloud computing. This chapter focuses on the relationship between cloud computing and related fields and introduces you to some of the new technologies related to cloud computing.
Privacy Issues of Cloud Computing in the Federal SectorLew Oleinick
Presentation describing potential privacy issues of implementing cloud computing in the Federal market.
NOTE: Presentation does NOT reflect any official agency position. All views expressed are my own.
This document discusses cloud computing and related concepts:
1. Cloud computing is a model for delivering computing resources such as hardware and software via a network. Users can access scalable resources from the cloud without knowing details of the infrastructure.
2. Technologies like virtualization, distributed storage, and broadband internet access enable cloud computing. This shifts processing to large remote data centers managed by cloud providers.
3. For service providers, cloud computing offers benefits like reduced infrastructure costs and improved efficiency. For users, it provides flexible access to resources without upfront investment or management overhead.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers various online services through a network of remote servers. There are different types of cloud services and deployment models depending on who can access the cloud - public, private, hybrid or community. The main cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). While cloud computing provides benefits like flexible access to data and lower costs, it also poses security and privacy risks if data is not properly protected on remote servers.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include broad network access, resource pooling, rapid elasticity, and measured service. Cloud services provide software, platforms, and infrastructure as services on demand over the Internet.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It aims to address growing IT needs like increasing server capacity, reducing costs through pay-per-use models, and integrating external web applications. Cloud computing exhibits characteristics of utility computing, virtualization, and elastic scalability. The key service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud deployment models include private, public, community and hybrid clouds.
The 5 biggest cloud computing trends in 2021ArpitGautam20
Cloud Computing has been a lifesaver in the unprecedented times of 2020. Let’s look at 5 upcoming cloud computing trends for 2021. https://arsr.tech/the-5-biggest-cloud-computing-trends-in-2021/
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
This document provides contact information for Elysium Technologies Private Limited, an IT services company with branches across India. It lists the company's address, phone numbers, and email contacts for its branches in cities including Madurai, Chennai, Trichy, Coimbatore, and others. It also mentions the company has 13 years of experience, 250+ developers, and provides services including automated services, 24/7 help desk support, and ticketing/appointment systems.
This document summarizes a seminar on key challenges in cloud computing. It introduces cloud computing and the three main types of cloud services: SaaS, PaaS, and IaaS. It discusses how cloud computing can enable future internet of services by providing on-demand access to applications, platforms, and computing infrastructure. Several issues that must be addressed to realize this vision are discussed, including deploying cloud infrastructure, managing large clouds, developing aggregation architectures, and improving security, reliability and energy efficiency. Key challenges for enabling future internet of services through cloud computing are identified as supporting application elasticity, assuring quality of service, improving scalability, reliability, privacy, security and energy management of cloud infrastructure, and enhancing cloud
The document discusses the history and development of cloud computing. It covers:
- Early concepts in the 1960s-1970s using time-sharing systems on mainframes.
- Virtual private networks in the 1990s providing cheaper access to servers.
- Amazon launching EC2 in 2006 and Google releasing App Engine in 2008, driving cloud adoption.
- Open source projects like OpenStack in 2010 making cloud technologies more accessible.
- Major tech companies increasingly offering cloud services and platforms through the 2010s.
This seminar report discusses cloud computing. It provides an acknowledgment, abstract, table of contents and introduction section. The report will cover the 5 characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It will also discuss the 4 deployment models and 3 service models of cloud computing.
This document is Priyanka R. Nayak's seminar report on cloud computing submitted to Visvesvaraya Technological University. It discusses key concepts of cloud computing including cyber infrastructure, service-oriented architecture, cloud types (public, private, hybrid), cloud architecture, and cloud components. The report provides an introduction to cloud computing and covers topics such as virtualization and users.
This document discusses cloud computing and provides definitions and characteristics. It describes the different deployment and service models of cloud computing including private cloud, public cloud, community cloud, hybrid cloud, software as a service, platform as a service, and infrastructure as a service. It also discusses virtualization and its role in cloud computing, the relationship between cloud computing and the internet of things, and some security issues related to cloud placing control in the hands of vendors.
The presentation discusses developing a cloud computing application and Android application for students. The project aims to allow students to develop and execute Java programs on tablets and mobile devices using cloud computing resources. It describes cloud computing concepts, Android architecture, and progress made in linking the Android SDK with Eclipse for application development.
Cloud computing stores and processes data in remote data centers that can be accessed from any device while edge computing processes data locally or at nearby edge data centers to minimize latency. Edge computing provides faster speeds, lower costs, better security and reliability than cloud computing as it keeps sensitive data localized rather than in remote data centers, though cloud computing remains suitable for massive data storage needs. Both cloud and edge computing have roles to play as companies seek distributed computing solutions.
Collaboration In The Cloud PresentationPatrick Huang
The document discusses collaboration in cloud computing. It defines key cloud concepts like SaaS, PaaS, and IaaS. Collaboration is described as interactions between parties working together towards a shared goal, with all parties benefiting. New technologies enable more collaboration opportunities between companies and individuals. The emergence of social media and networks will transform how businesses interact with customers and operate internally. Overall, cloud computing and new collaboration tools promise to revolutionize how organizations work and innovate through more open and connected models.
This document is a technical seminar report on cloud computing submitted in partial fulfillment of a Bachelor of Engineering degree. It introduces cloud computing as a concept where computing resources such as servers, storage, databases and networking are provided as standardized services over the Internet. The document discusses the history, characteristics, implementation and economics of cloud computing and provides examples of major companies involved in cloud services.
Cloud computing or Cloud hosting has transformed how businesses operate. Despite increased adoption of Cloud hosting and its associated benefits for enterprises, certain facts need to ‘cleared’ amongst Cloud users. Here’s a PPT to clear all your myths.
Report on cloud computing by prashant guptaPrashant Gupta
The document is a technical seminar report submitted by Prashant Gupta on cloud computing. It includes an abstract, introduction, table of contents, and initial sections on the concept and history of cloud computing. The introduction provides a definition of cloud computing and discusses the shift from centralized to distributed computing models. It highlights the scalability and on-demand access to computing resources that cloud computing provides.
Elements Of Cloud Computing Satish Jun24 09dhanya.sumeru
Cloud computing provides dynamically scalable resources over the Internet. Key characteristics include resources beyond a single company, access via the Internet, and invisible technology infrastructure. Cloud services include storage, applications, and programming environments accessed through web browsers. Major benefits are lower costs, improved collaboration, and access from anywhere. Security and reliability concerns remain barriers. Leading cloud providers include Amazon, Google, Microsoft, IBM and Salesforce.
Cloud computing has become the foundation of a range of important applications. At the same time, other technologies are also driving the further advancement of cloud computing. This chapter focuses on the relationship between cloud computing and related fields and introduces you to some of the new technologies related to cloud computing.
Privacy Issues of Cloud Computing in the Federal SectorLew Oleinick
Presentation describing potential privacy issues of implementing cloud computing in the Federal market.
NOTE: Presentation does NOT reflect any official agency position. All views expressed are my own.
This document discusses cloud computing and related concepts:
1. Cloud computing is a model for delivering computing resources such as hardware and software via a network. Users can access scalable resources from the cloud without knowing details of the infrastructure.
2. Technologies like virtualization, distributed storage, and broadband internet access enable cloud computing. This shifts processing to large remote data centers managed by cloud providers.
3. For service providers, cloud computing offers benefits like reduced infrastructure costs and improved efficiency. For users, it provides flexible access to resources without upfront investment or management overhead.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers various online services through a network of remote servers. There are different types of cloud services and deployment models depending on who can access the cloud - public, private, hybrid or community. The main cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). While cloud computing provides benefits like flexible access to data and lower costs, it also poses security and privacy risks if data is not properly protected on remote servers.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include broad network access, resource pooling, rapid elasticity, and measured service. Cloud services provide software, platforms, and infrastructure as services on demand over the Internet.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It aims to address growing IT needs like increasing server capacity, reducing costs through pay-per-use models, and integrating external web applications. Cloud computing exhibits characteristics of utility computing, virtualization, and elastic scalability. The key service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud deployment models include private, public, community and hybrid clouds.
The 5 biggest cloud computing trends in 2021ArpitGautam20
Cloud Computing has been a lifesaver in the unprecedented times of 2020. Let’s look at 5 upcoming cloud computing trends for 2021. https://arsr.tech/the-5-biggest-cloud-computing-trends-in-2021/
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
This document provides contact information for Elysium Technologies Private Limited, an IT services company with branches across India. It lists the company's address, phone numbers, and email contacts for its branches in cities including Madurai, Chennai, Trichy, Coimbatore, and others. It also mentions the company has 13 years of experience, 250+ developers, and provides services including automated services, 24/7 help desk support, and ticketing/appointment systems.
This document summarizes a seminar on key challenges in cloud computing. It introduces cloud computing and the three main types of cloud services: SaaS, PaaS, and IaaS. It discusses how cloud computing can enable future internet of services by providing on-demand access to applications, platforms, and computing infrastructure. Several issues that must be addressed to realize this vision are discussed, including deploying cloud infrastructure, managing large clouds, developing aggregation architectures, and improving security, reliability and energy efficiency. Key challenges for enabling future internet of services through cloud computing are identified as supporting application elasticity, assuring quality of service, improving scalability, reliability, privacy, security and energy management of cloud infrastructure, and enhancing cloud
The document discusses the history and development of cloud computing. It covers:
- Early concepts in the 1960s-1970s using time-sharing systems on mainframes.
- Virtual private networks in the 1990s providing cheaper access to servers.
- Amazon launching EC2 in 2006 and Google releasing App Engine in 2008, driving cloud adoption.
- Open source projects like OpenStack in 2010 making cloud technologies more accessible.
- Major tech companies increasingly offering cloud services and platforms through the 2010s.
This seminar report discusses cloud computing. It provides an acknowledgment, abstract, table of contents and introduction section. The report will cover the 5 characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It will also discuss the 4 deployment models and 3 service models of cloud computing.
This document is Priyanka R. Nayak's seminar report on cloud computing submitted to Visvesvaraya Technological University. It discusses key concepts of cloud computing including cyber infrastructure, service-oriented architecture, cloud types (public, private, hybrid), cloud architecture, and cloud components. The report provides an introduction to cloud computing and covers topics such as virtualization and users.
This document discusses cloud computing and provides definitions and characteristics. It describes the different deployment and service models of cloud computing including private cloud, public cloud, community cloud, hybrid cloud, software as a service, platform as a service, and infrastructure as a service. It also discusses virtualization and its role in cloud computing, the relationship between cloud computing and the internet of things, and some security issues related to cloud placing control in the hands of vendors.
This document provides an overview of cloud computing, including its key characteristics, service models, deployment models, examples, advantages and limitations. Specifically, it defines cloud computing as the delivery of computing resources such as servers, storage, databases and software over the internet. It describes the main service models of software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). It also outlines the deployment models of public, private and hybrid clouds and discusses some advantages like scalability, cost savings and disadvantages like security issues and dependence on internet connectivity.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document describes a proposed design for a trustworthy and secure billing system for cloud computing. It discusses the need for such a system given that users and cloud service providers could potentially modify or falsify billing records. The proposed system, called THEMIS, would introduce a Cloud Notary Authority (CNA) to generate mutually verifiable binding information from service logs monitored by an SMon module. This binding information could then be used to resolve any future disputes over billing between users and providers. The CNA would store the service logs locally so that even administrators could not modify or falsify the data, improving the trustworthiness and security of the billing process.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
This document discusses cloud computing and its various models and benefits. It provides definitions of cloud computing, explaining that it relies on sharing computing resources over the internet rather than local servers. It then summarizes the main service models (SaaS, PaaS, IaaS), deployment models (private, public, hybrid, community clouds), and benefits of cloud computing like cost savings, scalability, reliability and reduced maintenance needs. It also outlines some challenges around security, privacy and controlling cloud infrastructure.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
This document discusses cyber forensics in cloud computing. It begins by defining cloud computing and noting that cloud organizations have yet to establish well-defined forensic capabilities, making it difficult to investigate criminal activity. The document then provides an overview of cloud computing concepts like virtualization, server virtualization, and the three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It proposes a cloud computing service architecture based on these three models and their relationships.
This document discusses cyber forensics in cloud computing. It begins with an introduction to cloud computing concepts like virtualization, infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then proposes steps for cloud forensics investigations, including collecting and storing data, performing signature-based and behavior-based analysis, and using network tools for forensics analysis and invasion detection. The goal is to define the new area of cloud forensics and analyze its challenges and opportunities.
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
This document provides an introduction to cloud computing security issues in infrastructure as a service (IaaS). It discusses how cloud computing works and the service models of software as a service, platform as a service, and IaaS. IaaS provides processing power, data storage, and other shared resources on a pay-as-you-go basis. The document focuses on security issues related to the IaaS model, examining security for service level agreements, utility computing, platform virtualization, networks and connectivity, and computer hardware. It also discusses how security issues with cloud software can impact IaaS and cloud computing overall.
This document provides an overview of cloud computing, including its key concepts, models, and advantages. The main points are:
- Cloud computing provides on-demand access to computing resources like servers, storage, databases, and applications via the internet. It allows users to avoid upfront infrastructure costs.
- The major cloud service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides access to applications, PaaS provides development platforms, and IaaS provides basic computing resources.
- The key benefits of cloud computing include cost savings, flexibility, scalability, and accessibility of resources from anywhere via
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
The document discusses the history and concepts of cloud computing. It began with clustering and grid computing, where computers were grouped together to function as a single computer or where multiple clusters acted as a grid. Cloud computing evolved this concept further by providing dynamically scalable, virtualized resources as an internet-based service. Common types of cloud services include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document then discusses various components, applications, and benefits of cloud computing architectures.
In a cloud computing architecture, cloud infrastructure refers to the back-end technology elements found within most enterprise data centers -- servers, persistent storage and networking equipment -- but on a much greater scale. Some large cloud providers, including hyperscale cloud companies, such as Microsoft and Amazon, form partnerships with vendors to design custom infrastructure components that are optimized for specific needs, such as power efficiency or workloads that include big data and AI.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
2. 1.INTRODUCTION
Cloud computing is the next natural step in the evolution of on-demand information
technology services and products. To a large extent cloud computing will be based on
virtualized resources. The idea of cloud computing is based on a very fundamental
principal of `reusability of IT capabilities`. The difference that cloud computing brings
compared to traditional concepts of ―grid computing‖ , ―distributed computing‖ ,
―utility computing‖ , or ―autonomic computing‖ is to broaden horizons across
organizational boundaries.
According to the IEEE Computer Society Cloud Computing is:
"A paradigm in which information is permanently stored in servers on the
Internet and cached temporarily on clients that include desktops,
Entertainment centers, table computers, notebooks, wall computers, handhelds, etc."
Though many cloud computing architectures and deployments are powered by grids,
based on autonomic characteristics and consumed on the basis of utilities billing, the
concept of a cloud is fairly distinct and complementary to the concepts of grid, SaaS,
Utility Computing etc. In theory, cloud computing promises availability of all required
hardware, software, platform, applications, infrastructure and storage with an
ownership of just an internet connection.
people can access the information that they need from any device with an Internet
connection—including mobile and handheld phones—rather than being chained to the
desktop. It also means lower costs, since there is no need to install software or
hardware.‖
Cloud computing used to posting and sharing photos on orkut, instant messaging with
friends maintaining and upgrading business technology
3. 2. Concepts
A powerful underlying and enabling concept is computing through service-oriented
architectures (SOA) - delivery of an integrated and orchestrated suite of functions to an
end-user through composition of both loosely and tightly coupled functions, or services -
often network based. Related concepts are component-based system engineering,
orchestration of different services through workflows, and virtualization.
2.1. Cyber infrastructure
Cyber infrastructure makes applications dramatically easier to develop and deploy, thus
expanding the feasible scope of applications possible within budget and organizational
constraints, and shifting the scientist’s and engineer’s effort away from information
technology development and concentrating it on scientific and engineering research. Cyber
infrastructure also increases efficiency, quality, and reliability by capturing commonalities
among application needs, and facilitates the efficient sharing of equipment and services.
Today, almost any business or major activity uses, or relies in some form, on IT and IT
services. These services need to be enabling and appliance-like, and there must be an
economy of- scale for the total-cost-of-ownership to be better than it would be without cyber
infrastructure. Technology needs to improve end-user productivity and reduce Technology-
driven overhead
2.2. Service-Oriented Architecture
SOA is not a new concept, although it again has been receiving considerable attention in
recent years [e.g., Bel08, IBM08a]. Examples of some of the first network-based service-
oriented architectures are remote procedure calls (RPC), DCOM and Object Request
Brokers (ORBs) based on the CORBA specifications . A more recent example are so called
―Grid Computing‖ architectures and solutions . In an SOA environment end-users
request an IT service (or an integrated collection of such services) at the desired functional,
quality and capacity level, and receive the reponse at the time requested or at a specified
later time. Service discovery, brokering, and reliability are important .Goal of the SOA is
that creating an architecture in which servises are able to communicate using http protocol
It is expected that in the next 10 years, service-based solutions will be a major vehicle for
delivery of information and other IT assisted functions at both individual and
organizational levels.
e.g., software applications, web-based services, personal and business ―desktop‖ computing.
4. 3 Cloud Architecture
Cloud architecture the systems architecture of the software systems involved
in the delivery of cloud computing, comprises hardware and software designed by a cloud
architect who typically works for a cloud integrator. It typically involves multiple cloud
components communicating with each other over application programming interfaces,
usually web services.
This closely resembles the Unix philosophy of having multiple programs doing one thing
well and working together over universal interfaces. Complexity is controlled and the
resulting systems are more manageable than their monolithic counterparts.
Cloud architecture extends to the client, where web browsers and/or software applications
access cloud applications. Cloud storage architecture is loosely coupled, where metadata
operations are centralized enabling the data nodes to scale into the hundreds, each
independently delivering data
5. Fig.3. Cloud Architecture
3.1. Cloud –Types
Public cloud:
Public cloud or external cloud describes cloud computing in the traditional mainstream.
Public clouds are run by third parties, and applications from different customers are likely
to be mixed together on the cloud’s servers, storage systems, and networks. A public cloud
provides services to multiple customers.
Hybrid cloud:
Hybrid clouds combine both public and private cloud models. This is most often seen with
the use of storage clouds to support Web 2.0 applications.
Private cloud:
Private clouds are built for the exclusive use of one client, providing the utmost
control over data, security, and quality of service (Figure 4). The company owns the
infrastructure and has control over how applications are deployed on it. Private clouds can
be built and managed by a company’s own IT organization or by a cloud provider
.
Cloud computing products and services can be classified into 4 major
categories:
They are
1. Application as service ( AaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a service (IaaS)
4. Software as a Service (SaaS)
1. Application as s service (AaaS): These are the first kind of cloud computing services that
came into being. Under this, a service is made available to an end-user. The end-user is
asked to create an account with the service provider and start using the application. One of
first famous application was web-based email service by hotmail started in 1996. Scores of
such services are available now on the web.
2. Platform as a Service (PaaS): Cloud vendors are companies that offer cloud computing
services and products. One of the services that they provide is called PaaS. Under this a
computing platform such as operating system is provided to a customer or end user on a
6. monthly rental basis. Some of the major cloud computing vendor are Amazon, Microsoft,
Google etc
3. Infrastructure as a service: The cloud computing vendors offer infrastructure as a service.
One may avail hardware services such as processors, memory, networks etc on agreed basis
for specific duration and price. 4. Software as a service (SaaS): Software package such as CRM
or CAD/CAM can be accessed under cloud computing scheme. Here a customer upon
registration is allowed to use software accessible through net and use it for his or his business
process. The related data and work may be stored on local machines or with the service
providers. SaaS services may be available on rental basis or on per use basis.
4.Component
The key to a SOA framework that supports workflows is componentization of its services,
an ability to support a range of couplings among workflow building blocks, fault-tolerance
in its data- and process-aware service-based delivery, and an ability to audit processes, data
and results, i.e., collect and use provenance information. Component-based approach is
characterized by reusability (elements can be re-used in other workflows), substitutability
(alternative implementations are easy to insert, very precisely specified interfaces are
available, run-time component replacement mechanisms exist, there is ability to verify and
validate
substitutions, etc), extensibility and scalability (ability to readily extend system component
pool and to scale it, increase capabilities of individual components, have an extensible and
scalable architecture that can automatically discover new functionalities and resources,
etc),customizability (ability to customize generic features to the needs of a particular
scientific domain and problem), and composability (easy construction of more complex
functional solutions using basic components, reasoning about such compositions, etc.).
There are other
characteristics that also are very important. Those include reliability and availability of the
components and services, the cost of the services, security, total cost of ownership, economy
of scale, and so on.In the context of cloud computing we distinguish many categories of
components. From differentiated and undifferentiated hardware, to general-purpose and
specialized software and applications, to real and virtual ―images‖ , to environments, to
no-root
Differentiated resources, to workflow-based environments and collections of services, and
soon.
4.1 Virtualization
Virtualization is another very useful concept. It allows abstraction and isolation of lower-
level functionalities and underlying hardware. This enables portability of higher-level
functions and sharing and/or aggregation of the physical resources. The virtualization
concept has been around in some form since 1960s (e.g., in IBM mainframe systems). Since
then, the concept has matured considerably and it has been applied to all aspects of
computing – memory, storage, processors, software, networks, as well as services that IT
offers. It is the combination of the growing needs and the recent advances in the IT
architectures and solutions that is now
bringing the virtualization to the true commodity level. Virtualization, through its economy of
scale, and its ability to offer very advanced and complex IT services at a reasonable cost, is
poised to become, along with wireless and highly distributed and pervasive computing
7. devices, such as sensors and personal cell-based access devices, the driving technology behind
the next waive in IT growth .Not surprisingly there are dozens of virtualization products, and a
number of small and large companies that make them. Some examples in the operating
systems and software applications space are VMware1, Xen - an open source Linux-based
product developed
by XenSource2, and Microsoft virtualization products, to mention a few. Major IT players
have also shown a renewed interest in the
technology. Classical storage players such as EMC10, NetApp11, IBM12
and Hitachi13 have not been standing still either. In addition, the network virtualization
market is teeming with activity.
4.2 Users
The most important Cloud entity, and the principal quality driver and constraining
influence is, of course, the user. The value of a solutions depends very much on the view it
has of its end-user requirements and user categories.
There four broad sets of nonexclusive user categories:
System or Cyber infrastructure (CI) developers, developers (authors) of different component
services and underlying applications, technology and domain personnel that integrates basic
services into composite services and their orchestrations (workflows) and delivers those to
end-users, and finally users of simple and composite services. User categories also include
domain specific groups, and indirect users such as stakeholders, policy makers, and so on.
Functional and usability requirements derive, in most part, directly from the user profiles.
8. Working Of Cloud Computing:
Cloud Computing system can be divided it into two sections: the front end and the back
end. They connect to each other through a network, usually the Internet. Thefront end is
the side the computer user, or client, sees.The back end is the "cloud" section of the system.
On the back end there are various computers,servers and data storage systems that create
the "cloud" of
computing services.A central server administers the system, monitoring traffic and client
demands to ensure everything runs smoothly. It followsa set of rules called protocols
Servers and remote computers do most of the work and store the data.
9. 6. Merits & Demerits:
Merits:
Cloud enabler technologies like utility computing, Grid Computing, RTI, web
infrastructure and others are cloud enabled.
1. Infrastructure service providers are taking advantage of the Cloud services.
2. Information services, entertainment-oriented services such as video on demand, simple
business services such as customer authentication or identity management and contextual
services such as location or mapping services are positioned well by using the service.
3. Other services, such as corporate processes (for example, billing, deduction management
and mortgage calculation) and transactional services (for example, fiscal transactions),
would take longer to reach the cloud and the mainstream.
4. Cloud computing infrastructures allows efficient use of their IT hardware and software
investments
5. A cloud infrastructure can be a cost efficient model for delivering information services,
reducing IT management complexity.
6. The Cloud makes it possible to launch Web 2.0 applications quickly and to scale up
applications as much as needed when needed.
Demerits:
Stored data might not be secure: With cloud computing, all our data is stored on the cloud.
The unauthorized users gain access to our confidential data.
Dependent on internet connection:Internet connectivity isn’t completely stable and reliable.
It’s not platform agnostic:Most clouds force participants to rely on a single platform or host
only one type of product.
Can be slow:Even on a fast connection,web based application scan sometimes be slower than
accessing a similar software program on our desktop PC
10. 7.Conclusion
―Cloud‖ computing builds on decades of research in virtualization, distributed
computing, utility computing, and more recently networking, web and software services. It
implies a service oriented architecture, reduced information technology overhead for the
end-user, great flexibility, reduced total cost of ownership, ondemand services and many
other things.
In today's global competitive market, companies must innovate and get the most from its
resources to succeed. Cloud computing infrastructures are next generation platforms that
can provide tremendous value to companies of any size. They can help companies achieve
more efficient use of their IT hardware and software investments and provide a means to
accelerate the adoption of innovations.Cloud computing increases profitability by
improving resource utilization. Costs are driven down by delivering appropriate resources
only for the time those resources are needed. Cloud computing has enabled teams and
organizations to streamline lengthy procurement processes.
Cloud computing enables innovation by alleviating the need of innovators to find resources to
develop, test, and make their innovations available to the user community. Innovators are
free to focus on the innovation rather than the logistics of finding and managing resources
that enable the innovation.
11. 8. References
Magazines:
1] Cloud Computing – MLADEN .A.VOUK -Issues, Research an Implementations ,
Information Technical Interfaces ,june 2008
Websites:
www.ibm.com/developerworks/websphere/zones/hipods/library.html
http://communication.howstuffworks.com/cloud-computing2.html
www.thbs.com
http://www.wikipedia.org/