SlideShare a Scribd company logo
Speakers’ Background in cloud 
computing 
: 
Ashfaq 
Ahmed 
Nibi 
Maouriyan 
Prabhu.G 
Anurag 
Thakur 
XI - ‘Sci’ 2014-15
What is Cloud Computing? 
Cloud computing is internet-based computing in which large 
groups of remote servers are networked to allow the centralized 
data storage, and online access to computer services or 
resources. Clouds can be classified as public, private or hybrid. 
Cloud Computing is a general term used to describe a new class of 
network based computing that takes place over the Internet, 
Using the Interbasically a step on from Utility Computing a 
collection/group of integrated and networked hardware, software and 
Internet infrastructure is called a platform. 
These platforms hide the complexity and details of the underlying 
infrastructure from users and applications by providing very simple 
graphical interface or API (Applications Programming Interface).
Cloud Summary outline 
Cloud computing is an umbrella term used to refer to Internet based development and services 
Introduction to cloud context 
o Technology context: multi-core, virtualization, 64-bit processors, parallel computing models, 
big-data storages… 
o Cloud models: IaaS (Amazon AWS), PaaS (Microsoft Azure), SaaS (Google App Engine) 
 A number of characteristics define cloud data, applications services and infrastructure: 
o Remotely hosted: Services or data are hosted on remote infrastructure. 
o Ubiquitous: Services or data are available from anywhere. 
o Commodified: The result is a utility computing model similar to traditional that of traditional 
utilities, like gas and electricity - you pay for what you would want!
Cloud computing metaphor: For a user, the network 
elements representing the provider-rendered services are 
invisible, as if obscured by a cloud.
How to use a Cloud storage ? … 
(ex: One Drive) 
Step 1 
On the Start screen, tap or 
clickOneDrive to open 
the OneDrive app. 
Step 2 
Tap or click folders to browse 
to the location 
on OneDrive where you 
want to add the files. 
Step 3 
Swipe in from the top or 
bottom edge of the screen 
or right-click to open the 
app commands, and then 
tap or clickAdd files.
Moving and Downloading your 
files…. 
To move files to OneDrive using File 
Explorer 
When you move files, you're 
removing them from your PC and 
adding them to OneDrive. Drag 
files from the file list in the right 
pane to OneDrive in the left pane. 
Getting to your files from anywhere 
When your files are in OneDrive, 
you can get to them from any 
device, even if something happens 
to your PC. You can go to the 
OneDrive website, or you can use 
one of the mobile apps for 
Android, iOS, or Windows Phone.
Benefits of Cloud Computing 
 On-demand self-service 
 Broad network 
access 
 Rapid elasticity 
 Measured service 
 Lower costs
On-demand Self-Service 
Clients can provision 
computer resources without 
the need for interaction with 
cloud service provider 
personnel.
Reliability 
The scale of cloud 
computing networks and 
their ability to provide load 
balancing and failover 
makes them highly reliable, 
often much more reliable 
that what you can achieve in 
a single or organization.
Rapid Elasticity 
The system can add resources by either scaling up 
systems (more powerful computers) or scaling out 
systems (more computers of the same kind), and 
scaling may be automatic or manual.
Broad Network Access 
Access to resources 
in the cloud is 
available over the 
network using 
standard methods in 
a manner that 
provides platform-independent 
access 
to clients of all types.
Lower Costs 
Because cloud networks operate at higher 
efficiencies and with greater utilization, 
significant cost reductions are often 
encountered.
Measured Service 
The use of cloud system 
resources is measured, 
audited and reported to the 
customer based on a metered 
system. A client can be 
charged based on a known 
metric such as amount of 
storage used, number of 
transactions, network 
input/output, amount of 
processing power used and so 
forth.
Answer: The Cloud Computing? 
Typical requirements and models: 
o platform (PaaS), 
o software (SaaS), 
o infrastructure (IaaS), 
o Services-based application programming interface (API) 
A cloud computing environment can provide one or more of these 
requirements for a cost 
Pay as you go model of business 
When using a public cloud the model is similar to renting a property 
than owning one. 
An organization could also maintain a private cloud and/or use both.
Cloud Computing 
Characteristics 
Common Characteristics: 
Massive Scale Resilient Computing 
Virtualization Service Orientation 
Low Cost Software 
Advanced Security 
Homogeneity 
Geographic Distribution 
Essential Characteristics: 
On Demand Self-Service 
Broad Network Access Rapid Elasticity 
Resource Pooling 
Measured Service
Private 
Cloud 
Cloud 
Computing 
Public 
Cloud 
Hybrid 
Cloud 
Deployment Models 
Community 
Cloud
Other Benefits… 
 Resource pooling 
 Ease of utilization 
 Outsourced IT 
management 
 Simplified maintenance 
and upgrade 
 Low barrier to entry
Facts for Cloud Growth 
1. Cut Costs on one side 
2. Improved Telecom Connectivity 
3. Business Process Outsourcing
SECURITY 
Cloud computing security or, more simply, cloud 
security is an evolving sub-domain of computer security, 
network security, and, more broadly, information security. 
It refers to a broad set of policies, technologies, and 
controls deployed to protect data, applications, and the 
associated infrastructure of cloud computing. 
Organizations use the Cloud in a variety of different 
service models (SaaS, PaaS, and IaaS) and deployment 
models (Private, Public, and Hybrid). There are a number 
of security issues/concerns associated with cloud 
computing but these issues fall into two broad categories: 
security issues faced by cloud providers (organizations 
providing software-,platform-, or 
infrastructure-as-a-service via the cloud) and security 
issues faced by their customers
STORAGE 
Cloud storage is a model of data storage where the digital data is 
stored in logical pools, the physical storage spans multiple servers (and 
often locations), and the physical environment is typically owned and 
managed by a hosting company. 
These cloud storage providers are responsible for keeping the data 
available and accessible, and the physical environment protected 
and running. People and organizations buy or lease storage capacity 
from the providers to store end user, organization, or application data. 
Cloud storage services may be accessed through a co-located cloud 
compute service, a web service application programming interface 
(API) or by applications that utilize the API, such as cloud desktop 
storage, a cloud storage gateway or Web-based 
content management systems.
Service Model Types
What is Open Stack? 
Open Stack is a global collaboration of 
developers and cloud computing 
technologists producing the ubiquitous open 
source cloud computing platform for public 
and private clouds. 
The project aims to deliver solutions for all 
types of clouds by being simple to 
implement, massively scalable, and feature 
rich.
Similar Concepts 
Grid computing — "A form of distributed and parallel computing, 
whereby a 'super and virtual computer' is composed of a cluster of 
networked, loosely coupled computers acting in concert to perform very 
large tasks." 
Mainframe computer — Powerful computers used mainly by large 
organizations for critical applications, typically bulk data processing such 
as: census, industry and consumer statistics, police and secret 
intelligence services; enterprise resource planning; and financial 
transaction processing. 
Utility computing — The "packaging of computing resources, such as 
computation and storage, as a metered service similar to a traditional 
public utility, such as electricity." 
Peer-to-peer — A distributed architecture without the need for central 
coordination. Participants are both suppliers and consumers of resources 
(in contrast to the traditional client–server model).
Benefits of Grid Computing 
Hardware Abstraction 
Ease of Migration 
Encapsulation of Storage 
Ease of Growth 
Workload Consolidation 
Improved Remote Management 
Improved Monitoring and Troubleshooting
Insane Technologies Promise 
 100% money back guarantee on services 
 1 year replacement guarantee on major hardware 
purchases 
 Guaranteed 1 hour response time 
 Guaranteed Billing and much more…
Summary 
We illustrated cloud concepts and demonstrated the cloud capabilities 
through simple applications 
We discussed the features of the Hadoop File System, and mapreduce to 
handle big-data sets. 
We also explored some real business issues in adoption of cloud. 
Cloud is indeed an impactful technology that is sure to transform 
computing in business.

More Related Content

What's hot

Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
Suranga Nisiwasala
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
solarisyougood
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Cecil Donald
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
Types of clouds in cloud computing
Types of clouds in cloud computingTypes of clouds in cloud computing
Types of clouds in cloud computing
Mahesh Chemmala
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
Liming Liu
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Unmesh Ballal
 
cloud computing
cloud computingcloud computing
cloud computing
Mukhid Khan LashKari
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
Mohammed Sajjad Ali
 
Latest Research Topics on Cloud Computing
Latest Research Topics on Cloud ComputingLatest Research Topics on Cloud Computing
Latest Research Topics on Cloud Computing
Thesis Scientist Private Limited
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
Sandip Kadam
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Suman Jha
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
Suneel Dogra
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
Mohammed Sajjad Ali
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
ragibhasan
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
University of San Francisco
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
Laud Randy Amofah
 

What's hot (20)

Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Types of clouds in cloud computing
Types of clouds in cloud computingTypes of clouds in cloud computing
Types of clouds in cloud computing
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
 
Latest Research Topics on Cloud Computing
Latest Research Topics on Cloud ComputingLatest Research Topics on Cloud Computing
Latest Research Topics on Cloud Computing
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 

Viewers also liked

Casd emphasis proposal English
Casd emphasis proposal English Casd emphasis proposal English
Casd emphasis proposal English
egosum24
 
Historiadelarteactividad1
Historiadelarteactividad1 Historiadelarteactividad1
Historiadelarteactividad1
Marlon Pinilla
 
способы оопределения поставщика
способы оопределения поставщикаспособы оопределения поставщика
способы оопределения поставщикаkuhtin
 
Sessió 1 Taller De Creació De Blocs
Sessió 1 Taller De Creació De BlocsSessió 1 Taller De Creació De Blocs
Sessió 1 Taller De Creació De Blocsmguilla4
 
2015-07-21 - basilgreenpencil.com
2015-07-21 - basilgreenpencil.com2015-07-21 - basilgreenpencil.com
2015-07-21 - basilgreenpencil.com
Fiemme3000
 
Alguien
AlguienAlguien
Alguien
Dunia
 
Condominoo
CondominooCondominoo
Condominoo
Patricia Quiroga
 
Roca Blog Day
Roca Blog DayRoca Blog Day
Roca Blog Day
Rorihuela
 
Dia dos namorados
Dia dos namoradosDia dos namorados
Dia dos namorados
BE ESGN
 
Si las pizarras_hablaran (2ª parte)
Si las pizarras_hablaran (2ª parte)Si las pizarras_hablaran (2ª parte)
Si las pizarras_hablaran (2ª parte)
franchyintercultural
 
k07046nhapxuatxuly
k07046nhapxuatxulyk07046nhapxuatxuly
k07046nhapxuatxuly
Vo Oanh
 
Software
SoftwareSoftware
Software
920615
 
PIQ
PIQPIQ
Inteligencia emocional -_grupo_5.
Inteligencia emocional -_grupo_5.Inteligencia emocional -_grupo_5.
Inteligencia emocional -_grupo_5.
RBFtributaria
 
Telephone Coaching Case Study
Telephone Coaching Case StudyTelephone Coaching Case Study
Telephone Coaching Case Study
Peter Mackechnie
 
Phương pháp dạy học 2
Phương pháp dạy học 2Phương pháp dạy học 2
Phương pháp dạy học 2Duy Thanh
 
Ke toan.org mau-cv-curriculum-vitae-bang-tieng-viet
Ke toan.org mau-cv-curriculum-vitae-bang-tieng-vietKe toan.org mau-cv-curriculum-vitae-bang-tieng-viet
Ke toan.org mau-cv-curriculum-vitae-bang-tieng-vietbuithihang
 
Miễn dịch không đặc hiệu
Miễn dịch không đặc hiệuMiễn dịch không đặc hiệu
Miễn dịch không đặc hiệu
Lam Nguyen
 

Viewers also liked (18)

Casd emphasis proposal English
Casd emphasis proposal English Casd emphasis proposal English
Casd emphasis proposal English
 
Historiadelarteactividad1
Historiadelarteactividad1 Historiadelarteactividad1
Historiadelarteactividad1
 
способы оопределения поставщика
способы оопределения поставщикаспособы оопределения поставщика
способы оопределения поставщика
 
Sessió 1 Taller De Creació De Blocs
Sessió 1 Taller De Creació De BlocsSessió 1 Taller De Creació De Blocs
Sessió 1 Taller De Creació De Blocs
 
2015-07-21 - basilgreenpencil.com
2015-07-21 - basilgreenpencil.com2015-07-21 - basilgreenpencil.com
2015-07-21 - basilgreenpencil.com
 
Alguien
AlguienAlguien
Alguien
 
Condominoo
CondominooCondominoo
Condominoo
 
Roca Blog Day
Roca Blog DayRoca Blog Day
Roca Blog Day
 
Dia dos namorados
Dia dos namoradosDia dos namorados
Dia dos namorados
 
Si las pizarras_hablaran (2ª parte)
Si las pizarras_hablaran (2ª parte)Si las pizarras_hablaran (2ª parte)
Si las pizarras_hablaran (2ª parte)
 
k07046nhapxuatxuly
k07046nhapxuatxulyk07046nhapxuatxuly
k07046nhapxuatxuly
 
Software
SoftwareSoftware
Software
 
PIQ
PIQPIQ
PIQ
 
Inteligencia emocional -_grupo_5.
Inteligencia emocional -_grupo_5.Inteligencia emocional -_grupo_5.
Inteligencia emocional -_grupo_5.
 
Telephone Coaching Case Study
Telephone Coaching Case StudyTelephone Coaching Case Study
Telephone Coaching Case Study
 
Phương pháp dạy học 2
Phương pháp dạy học 2Phương pháp dạy học 2
Phương pháp dạy học 2
 
Ke toan.org mau-cv-curriculum-vitae-bang-tieng-viet
Ke toan.org mau-cv-curriculum-vitae-bang-tieng-vietKe toan.org mau-cv-curriculum-vitae-bang-tieng-viet
Ke toan.org mau-cv-curriculum-vitae-bang-tieng-viet
 
Miễn dịch không đặc hiệu
Miễn dịch không đặc hiệuMiễn dịch không đặc hiệu
Miễn dịch không đặc hiệu
 

Similar to Cloud computing

CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
AmitSingh770691
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
Dr. Radhey Shyam
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
khan593595
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
UtkarshKumar608655
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
ssuserbb23da
 
Cloud Computing Made Easy
Cloud Computing Made EasyCloud Computing Made Easy
Cloud Computing Made Easy
Mayank Aggarwal
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
PARTHO KUMAR SAHA
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
Udara Sandaruwan
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
charan7575
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
Mayank Aggarwal
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
manoj kumar
 
What is cloud ?
What is cloud ?What is cloud ?
What is cloud ?
Dibyadip Das
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Arwa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Sonia banu S.Md
 

Similar to Cloud computing (20)

CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Cloud Computing Made Easy
Cloud Computing Made EasyCloud Computing Made Easy
Cloud Computing Made Easy
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
What is cloud ?
What is cloud ?What is cloud ?
What is cloud ?
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Cloud computing

  • 1.
  • 2. Speakers’ Background in cloud computing : Ashfaq Ahmed Nibi Maouriyan Prabhu.G Anurag Thakur XI - ‘Sci’ 2014-15
  • 3. What is Cloud Computing? Cloud computing is internet-based computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. Clouds can be classified as public, private or hybrid. Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet, Using the Interbasically a step on from Utility Computing a collection/group of integrated and networked hardware, software and Internet infrastructure is called a platform. These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface).
  • 4. Cloud Summary outline Cloud computing is an umbrella term used to refer to Internet based development and services Introduction to cloud context o Technology context: multi-core, virtualization, 64-bit processors, parallel computing models, big-data storages… o Cloud models: IaaS (Amazon AWS), PaaS (Microsoft Azure), SaaS (Google App Engine)  A number of characteristics define cloud data, applications services and infrastructure: o Remotely hosted: Services or data are hosted on remote infrastructure. o Ubiquitous: Services or data are available from anywhere. o Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
  • 5. Cloud computing metaphor: For a user, the network elements representing the provider-rendered services are invisible, as if obscured by a cloud.
  • 6. How to use a Cloud storage ? … (ex: One Drive) Step 1 On the Start screen, tap or clickOneDrive to open the OneDrive app. Step 2 Tap or click folders to browse to the location on OneDrive where you want to add the files. Step 3 Swipe in from the top or bottom edge of the screen or right-click to open the app commands, and then tap or clickAdd files.
  • 7. Moving and Downloading your files…. To move files to OneDrive using File Explorer When you move files, you're removing them from your PC and adding them to OneDrive. Drag files from the file list in the right pane to OneDrive in the left pane. Getting to your files from anywhere When your files are in OneDrive, you can get to them from any device, even if something happens to your PC. You can go to the OneDrive website, or you can use one of the mobile apps for Android, iOS, or Windows Phone.
  • 8. Benefits of Cloud Computing  On-demand self-service  Broad network access  Rapid elasticity  Measured service  Lower costs
  • 9. On-demand Self-Service Clients can provision computer resources without the need for interaction with cloud service provider personnel.
  • 10. Reliability The scale of cloud computing networks and their ability to provide load balancing and failover makes them highly reliable, often much more reliable that what you can achieve in a single or organization.
  • 11. Rapid Elasticity The system can add resources by either scaling up systems (more powerful computers) or scaling out systems (more computers of the same kind), and scaling may be automatic or manual.
  • 12. Broad Network Access Access to resources in the cloud is available over the network using standard methods in a manner that provides platform-independent access to clients of all types.
  • 13. Lower Costs Because cloud networks operate at higher efficiencies and with greater utilization, significant cost reductions are often encountered.
  • 14. Measured Service The use of cloud system resources is measured, audited and reported to the customer based on a metered system. A client can be charged based on a known metric such as amount of storage used, number of transactions, network input/output, amount of processing power used and so forth.
  • 15. Answer: The Cloud Computing? Typical requirements and models: o platform (PaaS), o software (SaaS), o infrastructure (IaaS), o Services-based application programming interface (API) A cloud computing environment can provide one or more of these requirements for a cost Pay as you go model of business When using a public cloud the model is similar to renting a property than owning one. An organization could also maintain a private cloud and/or use both.
  • 16. Cloud Computing Characteristics Common Characteristics: Massive Scale Resilient Computing Virtualization Service Orientation Low Cost Software Advanced Security Homogeneity Geographic Distribution Essential Characteristics: On Demand Self-Service Broad Network Access Rapid Elasticity Resource Pooling Measured Service
  • 17. Private Cloud Cloud Computing Public Cloud Hybrid Cloud Deployment Models Community Cloud
  • 18. Other Benefits…  Resource pooling  Ease of utilization  Outsourced IT management  Simplified maintenance and upgrade  Low barrier to entry
  • 19. Facts for Cloud Growth 1. Cut Costs on one side 2. Improved Telecom Connectivity 3. Business Process Outsourcing
  • 20. SECURITY Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, and Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: security issues faced by cloud providers (organizations providing software-,platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers
  • 21. STORAGE Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store end user, organization, or application data. Cloud storage services may be accessed through a co-located cloud compute service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems.
  • 23. What is Open Stack? Open Stack is a global collaboration of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. The project aims to deliver solutions for all types of clouds by being simple to implement, massively scalable, and feature rich.
  • 24. Similar Concepts Grid computing — "A form of distributed and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks." Mainframe computer — Powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as: census, industry and consumer statistics, police and secret intelligence services; enterprise resource planning; and financial transaction processing. Utility computing — The "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity." Peer-to-peer — A distributed architecture without the need for central coordination. Participants are both suppliers and consumers of resources (in contrast to the traditional client–server model).
  • 25. Benefits of Grid Computing Hardware Abstraction Ease of Migration Encapsulation of Storage Ease of Growth Workload Consolidation Improved Remote Management Improved Monitoring and Troubleshooting
  • 26. Insane Technologies Promise  100% money back guarantee on services  1 year replacement guarantee on major hardware purchases  Guaranteed 1 hour response time  Guaranteed Billing and much more…
  • 27. Summary We illustrated cloud concepts and demonstrated the cloud capabilities through simple applications We discussed the features of the Hadoop File System, and mapreduce to handle big-data sets. We also explored some real business issues in adoption of cloud. Cloud is indeed an impactful technology that is sure to transform computing in business.

Editor's Notes

  1. ScalabilityInfrastructure capacity allows for traffic spikes and minimizes delays. ResiliencyCloud providers have mirrored solutions to minimize downtime in the event of a disaster. This type of resiliency can give businesses the sustainability they need during unanticipated events. Homogeneity: No matter which cloud provider and architecture an organization uses, an open cloud will make it easy for them to work with other groups, even if those other groups choose different providers and architectures. On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). Resource pooling. Multi-tenant model.. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). <number>
  2. <number>
  3. <number>