This document provides an overview of cloud computing, including definitions, models, and applications. It begins with definitions of cloud computing from various experts and the National Institute of Standards and Technology (NIST). It describes the essential characteristics, service models (SaaS, PaaS, IaaS), and deployment models of cloud computing. The document discusses the differences between clusters, grids, and clouds. It provides examples of cloud applications like ECG analysis, protein structure prediction, and social networking. Finally, it outlines the actors in cloud computing reference architecture like cloud providers, consumers, brokers and carriers along with example usage scenarios.
This presentation attempts to first demystify what's Cloud, and why Cloud Computing is an absolute MUST to reduce Cost of Application Delivery. It then attempts to bring out the important role that DCIM will play in the Cloud Computing Infrastructure, as we head towards a world of Software Defined Data Centers.
This presentation attempts to first demystify what's Cloud, and why Cloud Computing is an absolute MUST to reduce Cost of Application Delivery. It then attempts to bring out the important role that DCIM will play in the Cloud Computing Infrastructure, as we head towards a world of Software Defined Data Centers.
An study of security issues & challenges in cloud computingijsrd.com
"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security.
Cloud computing IT-703 reveals the attractive features of cloud computing along with the driven technology i.e. virtualization as per the RGPV syllabus
Abstract:-
This paper is based on the study of grid computing and cloud computing technology. These two technologies are related with geographically defined network standards. The main aspect of this paper is deep learning of latest technology and trends in the field of networking.
Keywords:-Technology,Cloud Computing,Grid Computing
Cloud computing is an evolving paradigm. The NIST definition characterizes important aspects of cloud computing and is intended to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing.
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
Securing Apps & Data in the Cloud Presented by Spyders & Netskope - a discussion of shadow IT and the emergence of Cloud Access Security Brokers (CASBs) like Netskope, Spyders latest technology partner, have emerged to help solve the issue of shadow IT. Cloud Access Security Brokers were listed as the #1 technology in the Gartner 2014 Top 10 Technologies for Information Security. If your wondering about what cloud access security brokers are, Gartner defines CASBs as “on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. Essentially, CASBs consolidate multiple types of security policy enforcement.”
As organizations embrace cloud applications, new risks and complexities have arisen. Staying on top of the ever-changing policy, legal and tech landscapes is daunting and gives rise to complex legal and business challenges.
Privacy and security expert, Lisa Abe-Oldenburg, and Pranav Shah, a CIO advocate and security specialist, go over latest considerations facing Canadian organizations transitioning to cloud-based apps.
Lisa provides insight and guidance from a legal perspective, and Pranav addresses the business challenges related to architecture, technology, and human capital. Participants also gain insight into how organizations are successfully leveraging one of Gartner's newest categories, Cloud Access Security Brokers (CASB), as an integral component of their secure, SaaS business and security strategies.
Visit http://www.spyders.ca to learn more about Netskope and Cloud Access Security Brokers.
From the server room to the board room, there is a lot of talk about “the cloud” — and for good reason. The cloud offers organizations — and their information technology (IT) staffs, in particular — a number of important benefits ranging from increased efficiencies to scalability. Taking advantage of these benefits requires understanding the various cloud models available and how they can best meet your organization’s specific needs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing basically involves delivering hosted services over the Internet to store, manage, and process data, instead of using local server or a personal computer. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). In scientific terms, cloud computing is a synonym for distributed computing over a network which means the ability to run a program on many connected computers at the same time. Therefore it involves a large number of computers that are connected through a real-time communication network.
The past decade has seen increasingly ambitious and successful methods for outsourcing computing. Approaches such as utility computing, on-demand computing, grid computing, software as a service, and cloud computing all seek to free computer applications from the limiting confines of a single computer. Software that thus runs "outside the box" can be more powerful (think Google, TeraGrid), dynamic (think Animoto, caBIG), and collaborative (think FaceBook, myExperiment). It can also be cheaper, due to economies of scale in hardware and software. The combination of new functionality and new economics inspires new applications, reduces barriers to entry for application providers, and in general disrupts the computing ecosystem. I discuss the new applications that outside-the-box computing enables, in both business and science, and the hardware and software architectures that make these new applications possible.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
An study of security issues & challenges in cloud computingijsrd.com
"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security.
Cloud computing IT-703 reveals the attractive features of cloud computing along with the driven technology i.e. virtualization as per the RGPV syllabus
Abstract:-
This paper is based on the study of grid computing and cloud computing technology. These two technologies are related with geographically defined network standards. The main aspect of this paper is deep learning of latest technology and trends in the field of networking.
Keywords:-Technology,Cloud Computing,Grid Computing
Cloud computing is an evolving paradigm. The NIST definition characterizes important aspects of cloud computing and is intended to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing.
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
Securing Apps & Data in the Cloud Presented by Spyders & Netskope - a discussion of shadow IT and the emergence of Cloud Access Security Brokers (CASBs) like Netskope, Spyders latest technology partner, have emerged to help solve the issue of shadow IT. Cloud Access Security Brokers were listed as the #1 technology in the Gartner 2014 Top 10 Technologies for Information Security. If your wondering about what cloud access security brokers are, Gartner defines CASBs as “on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. Essentially, CASBs consolidate multiple types of security policy enforcement.”
As organizations embrace cloud applications, new risks and complexities have arisen. Staying on top of the ever-changing policy, legal and tech landscapes is daunting and gives rise to complex legal and business challenges.
Privacy and security expert, Lisa Abe-Oldenburg, and Pranav Shah, a CIO advocate and security specialist, go over latest considerations facing Canadian organizations transitioning to cloud-based apps.
Lisa provides insight and guidance from a legal perspective, and Pranav addresses the business challenges related to architecture, technology, and human capital. Participants also gain insight into how organizations are successfully leveraging one of Gartner's newest categories, Cloud Access Security Brokers (CASB), as an integral component of their secure, SaaS business and security strategies.
Visit http://www.spyders.ca to learn more about Netskope and Cloud Access Security Brokers.
From the server room to the board room, there is a lot of talk about “the cloud” — and for good reason. The cloud offers organizations — and their information technology (IT) staffs, in particular — a number of important benefits ranging from increased efficiencies to scalability. Taking advantage of these benefits requires understanding the various cloud models available and how they can best meet your organization’s specific needs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing basically involves delivering hosted services over the Internet to store, manage, and process data, instead of using local server or a personal computer. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). In scientific terms, cloud computing is a synonym for distributed computing over a network which means the ability to run a program on many connected computers at the same time. Therefore it involves a large number of computers that are connected through a real-time communication network.
The past decade has seen increasingly ambitious and successful methods for outsourcing computing. Approaches such as utility computing, on-demand computing, grid computing, software as a service, and cloud computing all seek to free computer applications from the limiting confines of a single computer. Software that thus runs "outside the box" can be more powerful (think Google, TeraGrid), dynamic (think Animoto, caBIG), and collaborative (think FaceBook, myExperiment). It can also be cheaper, due to economies of scale in hardware and software. The combination of new functionality and new economics inspires new applications, reduces barriers to entry for application providers, and in general disrupts the computing ecosystem. I discuss the new applications that outside-the-box computing enables, in both business and science, and the hardware and software architectures that make these new applications possible.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
this is my project idea. i did my project based on this only
main aim is to detect virus from ip and clear the prosess and to sever.
so if you want to enhance this do some extensions whatever your idea.
Cloud computing introduction and concept as per the RGPV, BE syllabus. PPt contains the material from various cloud Draft (NIST) and other research material to fulfill the Syllabus requirement.
i-softinc is a one of the most popular development company for developing android application development in USA. It is a leading company which provides best services for android app development services in USA. Today, i-softinc has developed 1000+ apps and 250+ happy clients across the world. There are so many companies for developing mobile application Development Company in USA. Among all companies, I-Softinc is a top most development company for developing best mobile application development in USA. The professional and expert of i-softinc always develop and design best mobile application Development Company in USA.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Cloud computing Review over various scheduling algorithmsIJEEE
Cloud computing has taken an importantposition in the field of research as well as in thegovernment organisations. Cloud computing uses virtualnetwork technology to provide computer resources tothe end users as well as to the customer’s. Due tocomplex computing environment the use of high logicsand task scheduler algorithms are increase which resultsin costly operation of cloud network. Researchers areattempting to build such kind of job scheduling algorithms that are compatible and applicable in cloud computing environment.In this paper, we review research work which is recently proposed by researchers on the base of energy saving scheduling techniques. We also studying various scheduling algorithms and issues related to them in cloud computing.
Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Cloud computing
1. A tour of future- smart and on-demand computing
1
2. Cloud Computing
This presentation demonstrates the
vision , mission and future scope of
the Cloud computing Technology.
Introduction to Cloud
Definition of Cloud by NIST
Cloud Architecture
Cloud Reference Architecture
Applications of Cloud
2
5. The Power of Thinking
Cloud computing is using the internet
to access someone else's software
running on someone else's hardware in
someone else's data center.
Lewis Cunningham
A large-scale distributed computing
paradigm that is driven by economies
of scale, in which a pool of abstracted,
virtualized, dynamically scalable,
managed computing power, storage,
platforms, and services are delivered
on demand to external customers over
the Internet.
A Cloud is a type of parallel and
distributed system consisting of a
collection of interconnected and
virtualized computers that are
dynamically
provisioned
and
presented as one or more unified
computing resources based on
service-level
agreements
established through negotiation
between the service provider and
consumers.
Rajkumar Buyya
Ian Foster
Prepared by: Jitendra S Rathore
5
6. The Power of Thinking
A cloud is a pool of virtualized
resources that can host a variety of
different workloads, allow workloads
to be deployed and scaled-out quickly,
allocate resources when needed, and
support redundancy.
Greg Boss et al., IBM
6
9. NIST
(National Institute of Standard &Technology)
Cloud computing allows computer
users to conveniently rent access to
fully featured applications, to
software
development
and
deployment environments, and to
computing infrastructure assets
such as network-accessible data
storage and processing.
9
10. NIST
(National Institute of Standard &Technology)
"Cloud computing is a model for
enabling convenient, on-demand
network access to a shared pool of
configurable computing resources
(e.g., networks, servers, storage,
applications, and services) that can
be rapidly provisioned and released
with minimal management effort or
service provider interaction. This
cloud model promotes availability
and is composed of five essential
characteristics,
three
service
models, and four deployment
models.
10
11. Essential Characteristics
On-demand
self-service - A
consumer can unilaterally provision
computing capabilities, such as
server time and network storage, as
needed
automatically
without
requiring human interaction with
each service’s provider.
Broad
network
access
Capabilities are available over the
network and accessed through
standard mechanisms that promote
use by heterogeneous thin or thick
client platforms (e.g., mobile
phones, laptops, and personal digital
assistants (PDAs)).
Resource pooling - The provider’s
computing resources are pooled to
serve multiple consumers using a
multi-tenant model, with different
physical
and
virtual
resources
dynamically assigned and reassigned
according to consumer demand. There
is a sense of location independence in
that the subscriber generally has no
control or knowledge over the exact
location of the provided resources but
may be able to specify location at a
higher level of abstraction (e.g.,
country, state, or datacenter).
Examples of resources include storage,
processing,
memory,
network
bandwidth, and virtual machines.
11
12. Essential Characteristics
Rapid elasticity - Capabilities can
be
rapidly
and
elastically
provisioned,
in
some
cases
automatically, to quickly scale out
and rapidly released to quickly scale
in. To the consumer, the capabilities
available for provisioning often
appear to be unlimited and can be
purchased in any quantity at any
time.
Measured Service - Cloud systems
automatically control and optimize
resource use by leveraging a
metering capability at some level of
abstraction appropriate to the type
of service (e.g., storage, processing,
bandwidth,
and
active
user
accounts). Resource usage can be
monitored, controlled, and reported
providing transparency for both the
provider and consumer of the
utilized service.
12
14. Service Models
Software as a Service (SaaS) - The
capability provided to the consumer is
to use the provider’s applications
running on a cloud infrastructure. The
applications are accessible from
various client devices through a thin
client interface such as a Web browser
(e.g., Web-based email). The consumer
does not manage or control the
underlying
cloud
infrastructure
including network, servers, operating
systems, storage, or even individual
application capabilities, with the
possible exception of limited userspecific application configuration
settings.
Prepared by: Jitendra S Rathore
14
15. Service Models
Platform as a Service (PaaS) - The
capability provided to the consumer
is to deploy onto the cloud
infrastructure consumer-created or acquired applications created using
programming languages and tools
supported by the provider. The
consumer does not manage or
control the underlying cloud
infrastructure including network,
servers, operating systems, or
storage, but has control over the
deployed applications and possibly
application hosting environment
configurations.
15
16. Service Models
Infrastructure as a Service (IaaS) -
The capability provided to the
consumer is to provision processing,
storage, networks, and other
fundamental computing resources
where the consumer is able to
deploy and run arbitrary software,
which can include operating systems
and applications. The consumer
does not manage or control the
underlying cloud infrastructure but
has control over operating systems,
storage, deployed applications, and
possibly limited control of select
networking components (e.g., host
firewalls).
16
17. Deployment Models
Private
cloud - The cloud
infrastructure is operated solely for
an organization. It may be managed
by the organization or a third party
and may exist on premise or off
premise.
Community cloud - The cloud
infrastructure is shared by several
organizations and supports a specific
community that has shared
concerns (e.g., mission, security
requirements,
policy,
and
compliance considerations). It may
be managed by the organizations or
a third party and may exist on
premise or off premise.
Public
cloud
-The
cloud
infrastructure is made available to
the general public or a large industry
group and is owned by an
organization selling cloud services.
Hybrid cloud - The cloud
infrastructure is a composition of
two or more clouds (private,
community, or public) that remain
unique entities but are bound
together by standardized or
proprietary technology that enables
data and application portability
(e.g., cloud bursting for loadbalancing between clouds).
17
19. Terms use in Cloud
•cloud subscriber or subscriber: a
person or organization that is a
customer of a cloud;
•client: a machine or software
application that accesses a cloud
over a network connection, perhaps
on behalf of a subscriber.
•cloud provider or provider: an
organization that provides cloud
services.
Prepared by: Jitendra S Rathore
19
20. Clarification
(Cluster,Grid andCloud)
•A computer cluster is a group of
linked computers, working together
closely thus in many respects
forming a single computer.
•The components of a cluster are
connected to each other through
fast local area networks
•Types of Cluster
High Availability Cluster
Load Balancing Cluster
HPC Cluster
Prepared by: Jitendra S Rathore
20
21. Clarification
(Cluster,Grid andCloud)
•Requirements
for
computing
increasing fast –
More data to process.
More compute intensive
algorithms available.
•Approaches to supply demand
Qualitative:
Optimized
algorithms, faster processors,
more memory.
Quantitative:
Cluster
computing, grid computing,
etc.
Prepared by: Jitendra S Rathore
21
22. Clarification
(Cluster,Grid andCloud)
•Grid computing is a term referring
to the combination of computer
resources
from
multiple
administrative domains to reach a
common goal.
Coordinates resources that are not
subject to centralized control
Uses
standard, open, generalpurpose protocols and interfaces
Delivers
nontrivial
qualities
of
service
Prepared by: Jitendra S Rathore
22
24. Clarification
(Cluster,Grid andCloud)
•Grid computing is the combination of
computer resources from multiple
administrative domains applied to a
common task, usually to a scientific,
technical or business problem that
requires a great number of computer
processing cycles or the need to
process large amounts of data. It is a
type of parallel and distributed system
that enables the sharing, selection,
and aggregation of geographically
distributed autonomous resources
dynamically at runtime depending on
their
availability,
capability,
performance, cost and users qualityof-service requirements.
Applications:
•Bio Informatics applications
•High Energy Physics Applications
•Weather Modeling and Predicting
Ocean Currents
•Disaster Management
•Aerodynamic Simulations
Prepared by: Jitendra S Rathore
24
25. Clarification
(Cluster,Grid andCloud)
•A large-scale distributed computing
paradigm that is driven by
economies of scale, in which a pool
of
abstracted,
virtualized,
dynamically-scalable,
managed
computing
power,
storage,
platforms, and services are delivered
on demand to external customers
over the Internet
Prepared by: Jitendra S Rathore
25
26. Comparison between Three
Cluster
Grid
Cloud
On demand Self Service
NO
NO
YES
Broad Network Access
YES
YES
YES
Resource Pooling
Yes
Yes
Yes
Rapid Elasticity
NO
NO
YES
Measured Service
NO
YES
YES
Prepared by: Jitendra S Rathore
26
30. Cloud Applications
This presentation demonstrates the
major areas where cloud can play
vital role and their scope in the Cloud
computing Technology.
ECG Analysis in the cloud
Protein structure prediction
Gene Expression Data Analysis
Satellite Image Processing
CRM and ERP
Social Networking
Prepared by: Jitendra S Rathore
30
34. Typical Commercial Terms of Service
A subscriber’s terms of service for a cloud are
determined by a legally binding agreement
between the two parties often contained in
two parts:
(1) a service agreement - The service
agreement is a legal document
specifying the rules of the legal contract
between a subscriber and provider and
(2) a Service Level Agreement (SLA) - SLA
is a shorter document stating the
technical performance promises made
by a provider including remedies for
performance failures.
Note: Published SLAs between
Subscribers and providers can
typically be terminated at any
time by either party, either
“for cause” such as a
subscriber’s violation of a
cloud’s
acceptable
use
policies, or for failure of a
subscriber to pay in a timely
manner.
Further,
an
agreement can be terminated
for no reason at all.
Subscribers should analyze
provider termination and
data retention policies.
Prepared by: Jitendra S Rathore
34
35. Typical Commercial Terms of Service
Provider promises, including explicit
statements regarding limitations,
are codified in their SLAs. A
provider’s SLA has three basic parts:
(a) Promises –
(a). a collection of promises made to
subscribers
1.
Availability
2.
Remedies for Failure to Perform
3.
Data Preservation
4.
Legal
Care
Information
(b) a collection of promises explicitly not
made to subscribers, i.e., limitations,
and
1.
Subscriber
(b) Limitation-
(c) a set of obligations that subscribers
of
must accept.
Schedule Outage - If a provider
announces a scheduled service outage,
the outage does not count as failure to
perform. For some providers, outages
must be announced in advance, or
must be bounded in duration.
Prepared by: Jitendra S Rathore
35
36. Typical Commercial Terms of Service
2. Force majeure events - Providers
4. Security - Providers generally assert that
generally disclaim all responsibility for
events outside their realistic control.
Examples include power failures, natural
disasters, and failures in network
connectivity between subscribers and
providers.
they are not responsible for security,
i.e., unauthorized modification or
disclosure of subscriber data, or for
service interruptions caused by
malicious activity. Generally, SLAs are
explicit about placing security risks on
subscribers. In some cases, providers
promise to use best efforts to protect
subscriber data, but all of the providers
surveyed
disclaim
security
responsibility for data breach, data
loss, or service interruptions by
limiting remedies to service credits for
failure to meet availability promises.
3. SLA Changes - Providers generally
reserve the right to change the terms of
the SLA at any time, and to change
pricing with limited advanced notice. For
standard SLA changes, notice is generally
given by a provider by posting the change
to a Web site. It is then the subscriber’s
responsibility to periodically check the
Web site for changes. Changes may take
effect immediately or after a delay of
several weeks.
5. Service API Changes - Providers generally
reserve the right to change or delete
service APIs at any time.
Prepared by: Jitendra S Rathore
36
37. Typical Commercial Terms of Service
(c) Obligations –
1.
2.
Generally, subscribers
must agree to three key obligations:
Acceptable Use Polices - Subscribers
generally must agree to refrain from
storing illegal content, such as child
pornography, and from conducting illegal
activities such as: (1) gambling, (2) sending
spam, (3) conducting security attacks (e.g.,
denial of service or hacking), (4)
distributing
spyware,
(5)
intrusive
monitoring, and (6) attempting to subvert
cloud system infrastructures. Acceptable
use policies vary among providers.
Licensed Software - All providers state
that third-party software running in their
clouds must conform to the software’s
license terms. In some cases, providers
bundle such software and include
monitoring to ensure that license
restrictions are enforced.
3. Timely Payments - Cloud service costs are
generally incurred gradually over a billing
period, with the fee due to the provider at
the period’s end. Failure to pay, after a grace
period, usually subjects a subscriber to
suspension or termination “for cause” which
can result in loss of subscriber data.
4. Security - Providers generally assert that they
are not responsible for security, i.e.,
unauthorized modification or disclosure
of subscriber data, or for service
interruptions caused by malicious
activity. Generally, SLAs are explicit
about placing security risks on
subscribers. In some cases, providers
promise to use best efforts to protect
subscriber data, but all of the providers
surveyed disclaim security responsibility
for data breach, data loss, or service
interruptions by limiting remedies to
service credits for failure to meet
availability promises.
Prepared by: Jitendra S Rathore
37
40. Cloud Reference Architecture
NIST cloud computing reference
architecture defines five major actors:
1. cloud consumer
2. cloud provider
3. cloud carrier
4. cloud auditor and
5. cloud broker.
Each actor is an entity (a person or
an organization) that participates in
a transaction or process and/or
performs tasks in cloud computing.
Prepared by: Jitendra S Rathore
40
41. Actor’s Responsibility
Actor
Definitions
Cloud Consumer
A person or organization that maintains a business
relationship with, and uses service from, Cloud Providers.
Cloud Provider
A person, organization, or entity responsible for making
a service available to interested parties.
Cloud Auditor
A party that can conduct independent assessment of
cloud
services, information
system
operations,
performance and security of the cloud Implementation.
Cloud Broker
An entity that manages the use, performance and
delivery of cloud services, and negotiates relationships
between Cloud Providers and Cloud Consumers.
Cloud Carrier
An intermediary that provides connectivity and transport
of cloud services from Cloud Providers to Cloud Consumers.
Prepared by: Jitendra S Rathore
41
43. Example Scenario - 1
Usages Scenario for Cloud Brokers
Prepared by: Jitendra S Rathore
43
44. Example Scenario - 2
Usages Scenario for Cloud Carriers
Prepared by: Jitendra S Rathore
44
45. Example Scenario - 3
Usages Scenario for Cloud Auditors
Prepared by: Jitendra S Rathore
45
46. Cloud Consumer
•The cloud consumer is the principal
stakeholder for the cloud computing
service.
•A cloud consumer represents a person or
organization that maintains a business
relationship with, and uses the service from
•a cloud provider. A cloud consumer
browses the service catalog from a cloud
provider, requests the
•appropriate service, sets up service
contracts with the cloud provider, and uses
the service. The cloud
•consumer may be billed for the service
provisioned, and needs to arrange payments
accordingly.
Cloud consumers need SLAs to specify
the technical performance requirements
fulfilled by a cloud provider.
SLAs can cover terms regarding the
quality of service, security, remedies for
performance failures.
A cloud provider may also list in the SLAs a
set of promises explicitly not made to
consumers, i.e. limitations, and obligations
that cloud consumers must accept.
A cloud consumer can freely choose a cloud
provider with better pricing and more
favorable terms.
Typically a cloud provider's pricing policy
and SLAs are non-negotiable, unless the
customer expects heavy usage and might
be able to negotiate for better contracts.
Prepared by: Jitendra S Rathore
46
48. Service Available to Cloud Costumers
•SaaS applications in the cloud and
made accessible via a network to the
SaaS consumers.
•The consumers of SaaS can be
organizations that provide their
members with access to software
applications, end users who directly
use software applications, or software
application
administrators
who
configure applications for end users.
•SaaS consumers can be billed
based on the number of end users,
the time of use, the network
bandwidth consumed, the amount of
data stored or duration of stored data.
Prepared by: Jitendra S Rathore
48
49. Service Available to Cloud Costumers
•Cloud consumers of PaaS can employ
the tools and execution resources
provided by cloud providers to develop,
test, deploy and manage the applications
hosted in a cloud environment.
•PaaS consumers can be application
developers who design and implement
application software, application testers
who run and test applications in cloudbased
environments,
application
deployers who publish applications into
the cloud, and application administrators
who configure and monitor application
performance on a platform.
•PaaS consumers can be billed according
to, processing, database storage and
network resources consumed by the PaaS
application, and the duration of the
platform usage.
Prepared by: Jitendra S Rathore
49
50. Service Available to Cloud Costumers
•Consumers of IaaS have access to virtual
computers, network-accessible storage,
network infrastructure components, and
other fundamental computing resources on
which they can deploy and run arbitrary
software.
•The consumers of IaaS can be system
developers, system administrators and IT
managers who are interested in creating,
installing, managing and monitoring services
for IT infrastructure operations.
•IaaS consumers are provisioned with the
capabilities to access these computing
resources, and are billed according to the
amount or duration of the resources
consumed, such as CPU hours used by
virtual
•computers, volume and duration of data
stored, network bandwidth consumed,
number of IP addresses used for certain
intervals..
Prepared by: Jitendra S Rathore
50
51. Cloud Providers
•A cloud provider is a person, an
A Cloud Provider's activities can
organization; it is the entity
responsible for making a service
available to interested parties.
be described in five major areas,
as shown in Figure,
a cloud provider conducts
•A Cloud Provider acquires and
activities in the areas of
manages
the
computing
infrastructure
required
for
providing the services, runs the
cloud software that provides the
services, and makes arrangement
to deliver the cloud services to the
Cloud Consumers through network
access.
1.
service deployment
2.
service orchestration
3.
cloud service management
4.
Security
5.
its
privacy.
Prepared by: Jitendra S Rathore
51
52. Cloud Providers – Major Activities
Prepared by: Jitendra S Rathore
52
53. Cloud Auditor
•A cloud auditor is a party that can
•
perform
an
independent
examination of cloud service
controls with the intent to express
an opinion thereon.
•Audits are performed to verify
conformance to standards through
review of objective evidence.
•A cloud auditor can evaluate the
services provided by a cloud
provider in terms of security
controls,
privacy
impact,
performance, etc.
•
Auditing is especially important
for federal agencies as “agencies
should include a contractual
clause enabling third parties to
assess security controls of cloud
providers” [4] (by Vivek Kundra,
Federal Cloud Computing Strategy,
Feb. 2011.).
Security controls [3] are the
management, operational, and
technical
safeguards
or
countermeasures employed within
an
organizational
information
system
to
protect
the
confidentiality,
integrity,
and
availability of the system and its
information.
Prepared by: Jitendra S Rathore
53
54. Cloud Broker
•As cloud computing evolves, the
integration of cloud services can be
too complex for cloud consumers to
•manage.
•A cloud consumer may request
cloud services from a cloud broker,
instead of contacting a cloud
provider directly.
•A cloud broker is an entity that
manages the use, performance and
delivery of cloud services and
negotiates relationships between
cloud
providers
and
cloud
consumers.
Cloud
broker can provide
services in three categories –
Service Intermediation: A cloud
broker enhances a given service
by improving some specific
capability and providing valueadded
services
to
cloud
consumers. The improvement
can be managing access to cloud
services, identity management,
performance
reporting,
enhanced security, etc.
Prepared by: Jitendra S Rathore
54
55. Cloud Broker
Service Aggregation: A cloud broker
combines and integrates multiple
services into one or more new
services. The broker provides data
integration and ensures the secure
data movement between the cloud
consumer
and
multiple
cloud
providers.
Service Arbitrage: Service arbitrage is
similar to service aggregation except
that the services being aggregated are
not fixed. Service arbitrage means a
broker has the flexibility to choose
services from multiple agencies.
The cloud broker, for example, can use
a credit-scoring service to measure
and select an agency with the best
score
Prepared by: Jitendra S Rathore
55
56. Cloud Carrier
•A
cloud carrier acts as an
intermediary
that
provides
connectivity and transport of cloud
services between cloud consumers
and cloud providers.
•
The distribution of cloud
services is normally provided
by
network
and
telecommunication carriers or
a transport agent
•Cloud carriers provide access to
•
a transport agent refers to a
business
organization
that
provides physical transport of
storage media such as highcapacity hard drives.
consumers
through
network,
telecommunication
and
other
access devices.
•For
example, cloud consumers
can obtain cloud services through
network access devices, such as
computers,
laptops,
mobile
phones, mobile Internet devices
(MIDs), etc .
Prepared by: Jitendra S Rathore
56
60. Business Support
Business Support involves the set of
business-related services dealing
with
clients
and
supporting
processes . It includes1.
Customer Management-
Manage customer accounts
Manage service contracts
setup/negotiate/close/terminate
contract, etc.
open/close/terminate accounts
manage user
Profiles
manage customer relationships by
providing points-of-contact and
resolving customer
problems, etc.
3. Inventory Management-
2. Contract management –
Set up and manage service catalogs
4. Accounting and Billing
issues
and
Manage customer billing information
send billing statements
Process received payments
track invoices, etc.
60
61. Business Support
5. Reporting and Auditing Monitor user operations
Figure
generate reports, etc.
6. Pricing and RatingEvaluate cloud services and determine
prices
handle promotions
Pricing rules based on a user's profile,
etc.
61
62. Provisioning and Configuration
It includes followingRapid provisioning:
Automatically deploying cloud
systems based on the requested
service/resources/capabilities.
Resource changing: Adjusting
configuration/resource
assignment for repairs, upgrades
and joining new nodes into the
cloud.
Monitoring and Reporting:
Discovering and monitoring
virtual resources, monitoring
cloud operations and events and
generating performance reports.
Metering: Providing a metering
capability at some level of
abstraction appropriate to the
type of service (e.g., storage,
processing, bandwidth, and
active user accounts).
SLA management:
Encompassing the SLA contract
definition (basic schema with
the QoS parameters), SLA
monitoring and SLA
enforcement according to
defined policies.
Figure
62
63. Portability and Interoperability
According to NIST, the adoption of
cloud computing depends greatly on
how the cloud can address users‟
concerns on security, portability
and interoperability.
Figure
Portability - customers are interested
to know whether they can move their
data or applications across multiple
cloud environments at low cost and
minimal disruption.
Interoperability - Users are concerned
about the capability to communicate
between or among multiple clouds
63
64. Interoperability
According to Author of [3],
interoperability means:
“In cloud computing, interoperability
typically refers to the ability to easily
move workloads and data from one
cloud provider to another or
between private and public clouds. A
common tactic for enabling
interoperability is the use of open
standards,
and
many
cloud
standardization
projects
are
developing standards for the cloud.”
A common tactic for enabling
interoperability is the use of
open standards [ITU 2005].
According to Microsoft [4] –
1. Data portability
2. Standards
3. Ease
of migrations and
deployment
4. Developer choice
are the basic elementary points for
ensuring interoperability in the
cloud
Figure
64
66. Cloud Ecosystem
According to [5],
Cloud ecosystem is a term used to
describe the complex system of
interdependent components that
work together to enable cloud
services.
Merriam-Webster
defines
an
ecosystem as the complex of a
community of organisms and its
environment functioning as an
ecological unit.
In terms of cloud computing, that
complex includes not only traditional
elements of cloud computing such as
software and infrastructure but also
consultants, integrators, partners,
third parties and anything in their
environments that has a bearing on
the other components.
According to Microsoft [6], cloud
ecosystem includes all the things as
shown in the figure
66
68. Cloud Business Process Management
•According to [wiki],
“Cloud computing business process
management is the use of (BPM)
tools that are delivered as software
services (SaaS) over a network.
Cloud BPM business logic is
deployed on an application server
and the business data resides in
cloud storage.”
•
According to [7],
“Business Process Management
Software in the cloud enables
strategic process improvement,
reduced technology cost, and better
alignment of IT with business goals.
The new IT paradigm and business
model can drive new growth
opportunities,
increase
profit
margins for the private sector, and
achieve more efficient and effective
missions for federal agencies. ”
68
69. BPM by Oracle [8]
Prepared by: Jitendra S Rathore
69
73. Cloud Analytics Needs
•According to [9],
“Few decades back , the problem was
the shortage of information or data. In
modern era, this problem is overcome
by the advent of the Internet and
reduced storage cost. ”
•But the new challenge is to how to
analyze data?
•Data is getting generated as much
faster pace than the speed at which it
can be processed with the current
infrastructures.
•Huge and dedicated server were
designed and developed for the same,
but problem is the cost of such
infrastructure which is not affordable
for such companies.
•
•
•
•
•
Such seeking companies seeking
towards cloud computing for this
purpose.
Also termed as utility computing [9].
In general, business Intelligence
application such as
image
processing,
web
searches,
understanding buying and selling
needs, supply chain and ranking
and bio informatics (gene structure
prediction) are data intensive
applications.
Cloud can be the perfect match for
such analytics services.
For example , Google MapReduce
do the same by splitting data into
small chunk and distributed into
computing sources for analyzing.
73
74. Cloud Analytics
•Cerri et al,gives the new name to
Single Data Mining Task – Like
this service “Knowledge in the cloud
” rather than “data in the cloud” to
support collaborative task which are
computationally
intensive
and
facilitate
distributed,
heterogeneous knowledge .
Distributed
•According to Talia, knowledge
Data Mining Applications or
service in the cloud can be classified
into 4Single Steps – Compose of KDD
process such as Preprocessing,
filtering and visualization.
classification, Clustering
Association rule discovery.
and
Data
Mining
Pattern- Such as Collective
learning, Meta Learning Models
and Parallel Classification.
KDD Processes – Including all f
services previously discussed.
As shown in figure referred from
[9]-
74
77. What is Desktop Virtualization?
According to [wiki] –
“Desktop
virtualization
is
software
technology that separates the desktop
environment and associated application
software from the physical client device that
is used to access it.”
Desktop virtualization can be used in
conjunction with application virtualization
and (Windows) user profile management
systems, now termed "user virtualization," to
provide
a
comprehensive
desktop
environment management system.
In this mode, all the components of the
desktop are virtualized, which allows for a
highly flexible and much more secure desktop
delivery model.
In addition, this approach supports a more
complete desktop disaster recovery strategy
as all components are essentially saved in the
data center and backed up through traditional
redundant maintenance systems.
If a user's device or hardware is lost, the
restore is much more straightforward
and simple, because basically all the
components will be present at login from
another device.
In addition, because no data is saved to
the user's device, if that device is lost,
there is much less chance that any
critical data can be retrieved and
compromised.
Prepared by: Jitendra S Rathore
77
78. Virtual Desktop Infrastructure (VDI)
Virtual Desktop Infrastructure (VDI) is a
desktop-centric service that hosts user desktop
environments on remote servers and/or blade
PCs, which are accessed over a network using a
remote display protocol. A connection brokering
service is used to connect users to their assigned
desktop sessions.
For users, this means they can access their
desktop from any location, without being tied to
a single client device.
In other words [10]“Virtual desktop infrastructure (VDI) is the
practice of hosting a desktop operating
system within a virtual machine (VM)
running on a centralized server. VDI is a
variation on the client/server computing
model, sometimes referred to as serverbased computing. The term was coined by
VMware Inc.”
Since the resources are centralized, users
moving between work locations can still access
the same desktop environment with their
applications and data.
For IT administrators, this means a more
centralized, efficient client environment that is
easier to maintain and able to respond more
quickly to the changing needs of the user and
business
78
79. VDI
According to Microsoft [11] –
1.
Microsoft VDI: allows users to
seamlessly access their rich and full
fidelity
Windows
environment
running in the datacenter, from any
device. Microsoft VDI is powered by
upcoming Windows Server 2012.
2. Experience: RemoteFX provides a
consistently rich user experience,
irrespective of what type of virtual
desktop is being accessed, or where the
users are accessing their desktops from.
With Remote Desktop Services
(RDS) and Hyper-V in Windows
Server 2012, organizations get the
following benefits-
3.
Platform: Windows Server 2012 provides
a single platform to deliver any type of
hosted desktop, making it simple to
deploy and easy to manage.
deployment choices: RDS can host either
Session based desktops, pooled VMs or
personal VMs. So customers have the
flexibility to deploy the right type of VDI
desktop for their users, all from a single
platform.
79
83. VDI
•Desktop computing is ubiquitous
represents a growing cost for IT.
and
•Updating
operating
systems
and
applications has become very time
consuming and costly while securing access
to data has become more complex.
•Virtual Desktop Infrastructure (VDI) offers a
solution. VDI separates the desktop operating
system and application configuration from
the physical device.
•Instead of managing individual desktop
devices in a distributed manner, the software
stacks (operating system plus applications
and configuration settings) are hosted in the
data center using a master catalog of prebuilt and tested configurations.
•
Users are assigned to a particular
standard configuration that supports
their role.
•
When they connect to the VDI
environment, applications run on virtual
servers with screen updates pushed over
the network (campus LAN or WAN) to
the user’s display. Users can use a less
expensive device, such as “thin” or
“zero” clients, to attach to the network
while accessing the familiar desktop
environment and applications they have
when using a traditional desktop or
laptop PC, or they can use their PC with
images pushed to them upon login
83
85. What is Testing in the Cloud?
According to Wikipedia, "cloud testing
is a form of software testing in which
Web applications that leverage Cloud
computing environments ("cloud") seek
to simulate real-world user traffic as a
means of load testing and stress testing
web sites [12].
The ability and costs to simulate Web
traffic for software testing purposes has
been an inhibitor
to overall Web
reliability.“
According of survey of [12], cloud
testing is a –
““Cloud testing basically aligns with the
concept of cloud and SaaS. It
provides the ability to test by
leveraging the cloud, thereby
bringing the same benefits that the
cloud brings to Customers.”
(by Vinita Ananth, Director - APJ
Region, HP Softwareas-aService). ”
85
86. Objectives of the Cloud Testing
It has four major objectives [12]1. To assure the quality of cloud-based
applications deployed in a cloud,
including their functional services,
business processes, and system
performance as well as scalability
based on a set of application-based
system requirements in a cloud.
2. To validate software as a service
(SaaS) in a cloud environment,
including software performance,
scalability,
security
and
3. To check the provided automatic
cloud-based functional services, for
example auto-provisioned functions.
4. To test cloud compatibility and interoperation capability between SaaS
and applications in a cloud
infrastructure, for example, checking
the APIs of SaaS and their cloud
connectivity to others.
measurement based on
certain
economic scales and pre-defined
SLAs.
86
87. Advantages of Cloud Based Testing
Reduce costs by leveraging with
computing resources in clouds – This
refers to effectively using virtualized
resources
and
shared
cloud
infrastructure to eliminate required
computer resources and licensed
software costs in a test laboratory.
Take the advantage of on-demand test
services (by a third-party) to conduct
large-scale and effective real-time online
validation for internet based software in
clouds.
Easily leverage scalable cloud system
infrastructure to test and evaluate
system
(SaaS/Cloud/Application)
performance and scalability
Workflow of Testing
87
88. Scope ofCloud Based SoftwareTesting
From [12]
Prepared by: Jitendra S Rathore
88