SlideShare a Scribd company logo
Cloud Computing:5
Cloud and Dynamic Infrastructure
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Rapid Scalable Deployment
Features due to Dynamic
Infrastructure
Service Management
• Service Management: Service
management solutions help you create
and manage a more agile, business-
oriented and dynamic infrastructure so you
can rapidly respond to change and deliver
higher quality services at a lower cost.
Learn more about Service management
Asset management
• Asset management: Hardware, software,
and services from IBM help you maximize
the performance and lifetime value of
assets across your enterprise—
production, facilities, transportation and
IT—and closely align them with your
overall business strategy.
Virtualization & Consolidation
• Virtualization & Consolidation:
Virtualization and consolidation can
reduce IT complexity to help your data
center become more resilient and secure
while reducing costs.
• The ability to deploy capacity and server
images virtually increases speed of
deployment roughly by a factor of 30
times.
Information Infrastructure
• Information Infrastructure: A comprehensive
approach to information infrastructure addresses
compliance, availability, retention, and security
requirements while helping businesses get the
right information to the right person at the right
time.
• Potential benefits include up to: 75% decrease in
capital costs, 600% increase in input capacity,
300x improvement in throughput, 500x
improvement in hardware price/performance ratio.
Energy Efficiency
• Energy Efficiency: Energy efficiency
solutions can help lower data center
energy costs by up to 40% or more
through facilities design, power and
cooling infrastructure, active energy
management, and efficient, scalable IBM
systems.
Security
• Security: Security solutions deliver the full
breadth and depth of capabilities that
enable organizations to take a business-
driven, holistic approach to security,
compliance and risk management in
alignment with an IT governance
framework, supporting the secure delivery
of services with speed and agility in the
dynamic infrastructure.
Business Resiliency
• Business Resiliency: Business continuity and
resiliency solutions keep your business running in
the event of an internal or external risk, planned or
unplanned, and allow your IT experts to devote
more time to innovation.
• Less than 50% percent companies surveyed have
disaster recovery and business continuity
strategies in place.
• And among those who have planned for business
continuity and resiliency, 75 percent report that
efforts are likely to be “haphazard” and “untested.”
Assignment
• Explain the concept and benefits of dynamic
infrastructure using cloud computing

More Related Content

What's hot

Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center Consolidation
Barry Weber
 
Dp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facilityDp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facilitydpsir
 
Sustainability Through Software Symantec At United Nations L
Sustainability Through Software   Symantec At United Nations LSustainability Through Software   Symantec At United Nations L
Sustainability Through Software Symantec At United Nations L
Symantec
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
Sunbird DCIM
 
The End Of Corporate Computing
The End Of Corporate ComputingThe End Of Corporate Computing
The End Of Corporate Computingmrt77
 
Partnering For Success In the Cloud
Partnering For Success In the CloudPartnering For Success In the Cloud
Partnering For Success In the Cloud
Justin Devine, MBA, PMP
 
5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs
Centilytics
 
TMI Energy Assessments
TMI Energy AssessmentsTMI Energy Assessments
TMI Energy Assessments
tdeloye
 
Active Power Down
Active Power DownActive Power Down
Active Power DownSiM Medi@
 
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
Sunbird DCIM
 
HP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer BriefHP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer Brief
Cole Whitney
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOXJose A. Abril
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
Storage Switzerland
 
Msp Presentation 1.2
Msp Presentation 1.2Msp Presentation 1.2
Msp Presentation 1.2
dbrown225
 
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and DiagnosticStephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Dutch Power
 
Ecosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightEcosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic Insight
Cyrus Sorab
 
Active Power Down
Active Power DownActive Power Down
Active Power Down
jdunnet
 
Digital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risksDigital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risks
Alex Lal
 

What's hot (18)

Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center Consolidation
 
Dp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facilityDp air article_20120628_data center design - how to build a green facility
Dp air article_20120628_data center design - how to build a green facility
 
Sustainability Through Software Symantec At United Nations L
Sustainability Through Software   Symantec At United Nations LSustainability Through Software   Symantec At United Nations L
Sustainability Through Software Symantec At United Nations L
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
The End Of Corporate Computing
The End Of Corporate ComputingThe End Of Corporate Computing
The End Of Corporate Computing
 
Partnering For Success In the Cloud
Partnering For Success In the CloudPartnering For Success In the Cloud
Partnering For Success In the Cloud
 
5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs5 Best Practices by MSPs that can help in Managing Azure Costs
5 Best Practices by MSPs that can help in Managing Azure Costs
 
TMI Energy Assessments
TMI Energy AssessmentsTMI Energy Assessments
TMI Energy Assessments
 
Active Power Down
Active Power DownActive Power Down
Active Power Down
 
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
 
HP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer BriefHP Thin Client Management Services Offer Brief
HP Thin Client Management Services Offer Brief
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOX
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Msp Presentation 1.2
Msp Presentation 1.2Msp Presentation 1.2
Msp Presentation 1.2
 
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and DiagnosticStephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
 
Ecosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightEcosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic Insight
 
Active Power Down
Active Power DownActive Power Down
Active Power Down
 
Digital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risksDigital horizons: technology enabled management of major incident risks
Digital horizons: technology enabled management of major incident risks
 

Similar to Cloud computing 5 cloud and the dynamic infrastructure

Professional services golden pitch presentation
Professional services golden pitch presentationProfessional services golden pitch presentation
Professional services golden pitch presentationxKinAnx
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
Six Degrees
 
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...IBM Switzerland
 
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster PreparednessMeaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
William Buddy Gillespie ITIL Certified
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
Precisely
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
Precisely
 
Smarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic InfrastructureSmarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic Infrastructure
IBMAsean
 
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
XO Communications
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case study
Nandita Nityanandam
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
Eduardo Gonzalez Loumiet, MBA, PMP, CPHIMS
 
The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013
IBM Sverige
 
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
IBM Sverige
 
Ibm Services Story
Ibm Services StoryIbm Services Story
Ibm Services Storykclutch71
 
IBM Service Brochure
IBM Service BrochureIBM Service Brochure
IBM Service Brochure
None
 
Cloud ERP Development: Exploring Trends and Challenges.pptx
Cloud ERP Development: Exploring Trends and Challenges.pptxCloud ERP Development: Exploring Trends and Challenges.pptx
Cloud ERP Development: Exploring Trends and Challenges.pptx
Mitchell Marsh
 
How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?
MilesWeb
 
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based PlatformsOn the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
Precisely
 
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Global Technology Services:  Partnering for Better Business OutcomesIBM Global Technology Services:  Partnering for Better Business Outcomes
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Services
 
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions
 
Why the Cloud?
Why the Cloud?Why the Cloud?
Why the Cloud?
Carlos Martin Hernandez
 

Similar to Cloud computing 5 cloud and the dynamic infrastructure (20)

Professional services golden pitch presentation
Professional services golden pitch presentationProfessional services golden pitch presentation
Professional services golden pitch presentation
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
Ibm symp14 referenten_mike storzer_frank heimes_why infrastructure matters fo...
 
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster PreparednessMeaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Smarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic InfrastructureSmarter Planet: Dynamic Infrastructure
Smarter Planet: Dynamic Infrastructure
 
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case study
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
 
The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013The Cloud Enabled Datacenter - Smarter Business 2013
The Cloud Enabled Datacenter - Smarter Business 2013
 
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
 
Ibm Services Story
Ibm Services StoryIbm Services Story
Ibm Services Story
 
IBM Service Brochure
IBM Service BrochureIBM Service Brochure
IBM Service Brochure
 
Cloud ERP Development: Exploring Trends and Challenges.pptx
Cloud ERP Development: Exploring Trends and Challenges.pptxCloud ERP Development: Exploring Trends and Challenges.pptx
Cloud ERP Development: Exploring Trends and Challenges.pptx
 
How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?How to Achieve Cost Optimization through Managed Cloud Services?
How to Achieve Cost Optimization through Managed Cloud Services?
 
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based PlatformsOn the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
On the Cloud? Data Integrity for Insurers in Cloud-Based Platforms
 
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Global Technology Services:  Partnering for Better Business OutcomesIBM Global Technology Services:  Partnering for Better Business Outcomes
IBM Global Technology Services: Partnering for Better Business Outcomes
 
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro Presentation
 
Why the Cloud?
Why the Cloud?Why the Cloud?
Why the Cloud?
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 

Recently uploaded (20)

Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 

Cloud computing 5 cloud and the dynamic infrastructure

  • 1. Cloud Computing:5 Cloud and Dynamic Infrastructure Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 3. Features due to Dynamic Infrastructure
  • 4.
  • 5. Service Management • Service Management: Service management solutions help you create and manage a more agile, business- oriented and dynamic infrastructure so you can rapidly respond to change and deliver higher quality services at a lower cost. Learn more about Service management
  • 6. Asset management • Asset management: Hardware, software, and services from IBM help you maximize the performance and lifetime value of assets across your enterprise— production, facilities, transportation and IT—and closely align them with your overall business strategy.
  • 7. Virtualization & Consolidation • Virtualization & Consolidation: Virtualization and consolidation can reduce IT complexity to help your data center become more resilient and secure while reducing costs. • The ability to deploy capacity and server images virtually increases speed of deployment roughly by a factor of 30 times.
  • 8. Information Infrastructure • Information Infrastructure: A comprehensive approach to information infrastructure addresses compliance, availability, retention, and security requirements while helping businesses get the right information to the right person at the right time. • Potential benefits include up to: 75% decrease in capital costs, 600% increase in input capacity, 300x improvement in throughput, 500x improvement in hardware price/performance ratio.
  • 9. Energy Efficiency • Energy Efficiency: Energy efficiency solutions can help lower data center energy costs by up to 40% or more through facilities design, power and cooling infrastructure, active energy management, and efficient, scalable IBM systems.
  • 10. Security • Security: Security solutions deliver the full breadth and depth of capabilities that enable organizations to take a business- driven, holistic approach to security, compliance and risk management in alignment with an IT governance framework, supporting the secure delivery of services with speed and agility in the dynamic infrastructure.
  • 11. Business Resiliency • Business Resiliency: Business continuity and resiliency solutions keep your business running in the event of an internal or external risk, planned or unplanned, and allow your IT experts to devote more time to innovation. • Less than 50% percent companies surveyed have disaster recovery and business continuity strategies in place. • And among those who have planned for business continuity and resiliency, 75 percent report that efforts are likely to be “haphazard” and “untested.”
  • 12.
  • 13. Assignment • Explain the concept and benefits of dynamic infrastructure using cloud computing