Cloud Computing definition , its history , Service Models , Deployment Models , Architecture, pretty much all the important aspects related to cloud computing
Have you heard of cloud computing? Well you should of! Cloud computing is not something that is new, it has been around for a few years now. This presentation helps readers to understand what cloud computing is and how a business should use it.
Have you heard of cloud computing? Well you should of! Cloud computing is not something that is new, it has been around for a few years now. This presentation helps readers to understand what cloud computing is and how a business should use it.
Business disadvantages using cloud computing exist. This report summary outlines the most important need to know disadvantages related to using cloud computing.
Cloud computing consists of hardware and software resources made available on the internet as managed third-party services.These services provide access to advanced software applications and high-end networks of server computers.
Know more about Grazitti Salesforce services, visit http://goo.gl/5jJYJ
Recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise IT solutions.
Many parties claim that “cloud computing” can help enterprises meet the increased requirements of lower TCO, higher ROI, increased efficiency, dynamic provisioning and utility-like services.
However, many IT professionals are citing the increased risks associated with trusting information assets to the cloud as something that must be clearly understood and managed by relevant stakeholders.
This presentation examines the potential business benefits, risks and assurance considerations.
In this presentation CompTIA explores 5 key trends surrounding the transition from the POW era (PC-centric, On-premise, Web 1.0) to the SMAC era (Social, Mobile, Analytics, Cloud). The dual perspective of end users and IT channel firms provides a nuanced view of where things stand today and where they may be headed.
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and
scalability. This paradigm shift raises a broad range of security and privacy issues that must be
taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud
computing environments. This paper reviews the existing technologies and a wide array of both
earlier and state-of-the-art projects on cloud security and privacy. We categorize the existing
research according to the cloud reference architecture orchestration, resource control, physical
resource, and cloud service management layers, in addition to reviewing the existing
developments in privacy-preserving sensitive data approaches in cloud computing such as
privacy threat modeling and privacy enhancing protocols and solutions.
The 2013 Future of Cloud Computing 3rd Annual Survey was conducted in partnership with GigaOM Research and 57 industry collaborators. It focuses on Cloud adoption, growth, investment, and key trends emanating from the 2011 and 2012 surveys. For additional information and to get involved follow us @futureofcloud #futurecloud and visit http://www.mjskok.com/resource/2013-future-cloud-computing-3rd-annual-survey-results.
Research from EMA shows that most organizations benefit from their use of automation tools, but some are successful at more than just improved productivity and a reduction in errors. The most successful organizations create a culture of automation and get the most out of the tools they use.
These slides—based on the webinar featuring Dan Twing, President and COO of leading IT research firm EMA--outline what traits set the successful organizations apart from the less successful ones, as well as:
- How organizations organize the scheduling function and the teams that manage the workload automation software
- The sources of budgets and authority, and the extent of evangelizing automation
- The ongoing impact of increasing use of multi-cloud resources as more legacy production work is moved to cloud infrastructures
Asyma E3 2014 The Impact of Cloud Computing on SME'sasyma
Why do you use the “CLOUD”? Do you want to? Do you have a choice? What does it cost to participate? What impact does Cloud Computing have on my business and why should I care? We’ll look at the cloud from both sides now.
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...RapidValue
This whitepaper addresses the primary reasons for enterprises migrating to the cloud infrastructure, various types of cloud deployment (technology & services) models IaaS, PaaS, SaaS, public cloud, private cloud and hybrid cloud, feature comparison of two popular cloud platforms – AWS and Microsoft Azure, and some examples of how enterprises and consumers are using the cloud technology.
스타카지노 『OX600』。『COM』실시간빙고 싸이트 스타카지노 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 스타카지노 싸이트 『OX600』。『COM』실시간빙고 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 『OX600』。『COM』실시간빙고 싸이트 스타카지노 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트
Business disadvantages using cloud computing exist. This report summary outlines the most important need to know disadvantages related to using cloud computing.
Cloud computing consists of hardware and software resources made available on the internet as managed third-party services.These services provide access to advanced software applications and high-end networks of server computers.
Know more about Grazitti Salesforce services, visit http://goo.gl/5jJYJ
Recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise IT solutions.
Many parties claim that “cloud computing” can help enterprises meet the increased requirements of lower TCO, higher ROI, increased efficiency, dynamic provisioning and utility-like services.
However, many IT professionals are citing the increased risks associated with trusting information assets to the cloud as something that must be clearly understood and managed by relevant stakeholders.
This presentation examines the potential business benefits, risks and assurance considerations.
In this presentation CompTIA explores 5 key trends surrounding the transition from the POW era (PC-centric, On-premise, Web 1.0) to the SMAC era (Social, Mobile, Analytics, Cloud). The dual perspective of end users and IT channel firms provides a nuanced view of where things stand today and where they may be headed.
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and
scalability. This paradigm shift raises a broad range of security and privacy issues that must be
taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud
computing environments. This paper reviews the existing technologies and a wide array of both
earlier and state-of-the-art projects on cloud security and privacy. We categorize the existing
research according to the cloud reference architecture orchestration, resource control, physical
resource, and cloud service management layers, in addition to reviewing the existing
developments in privacy-preserving sensitive data approaches in cloud computing such as
privacy threat modeling and privacy enhancing protocols and solutions.
The 2013 Future of Cloud Computing 3rd Annual Survey was conducted in partnership with GigaOM Research and 57 industry collaborators. It focuses on Cloud adoption, growth, investment, and key trends emanating from the 2011 and 2012 surveys. For additional information and to get involved follow us @futureofcloud #futurecloud and visit http://www.mjskok.com/resource/2013-future-cloud-computing-3rd-annual-survey-results.
Research from EMA shows that most organizations benefit from their use of automation tools, but some are successful at more than just improved productivity and a reduction in errors. The most successful organizations create a culture of automation and get the most out of the tools they use.
These slides—based on the webinar featuring Dan Twing, President and COO of leading IT research firm EMA--outline what traits set the successful organizations apart from the less successful ones, as well as:
- How organizations organize the scheduling function and the teams that manage the workload automation software
- The sources of budgets and authority, and the extent of evangelizing automation
- The ongoing impact of increasing use of multi-cloud resources as more legacy production work is moved to cloud infrastructures
Asyma E3 2014 The Impact of Cloud Computing on SME'sasyma
Why do you use the “CLOUD”? Do you want to? Do you have a choice? What does it cost to participate? What impact does Cloud Computing have on my business and why should I care? We’ll look at the cloud from both sides now.
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...RapidValue
This whitepaper addresses the primary reasons for enterprises migrating to the cloud infrastructure, various types of cloud deployment (technology & services) models IaaS, PaaS, SaaS, public cloud, private cloud and hybrid cloud, feature comparison of two popular cloud platforms – AWS and Microsoft Azure, and some examples of how enterprises and consumers are using the cloud technology.
스타카지노 『OX600』。『COM』실시간빙고 싸이트 스타카지노 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 스타카지노 싸이트 『OX600』。『COM』실시간빙고 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 『OX600』。『COM』실시간빙고 싸이트 스타카지노 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 사이트 스타카지노 『OX600』。『COM』실시간빙고 사이트 스타카지노 싸이트 『OX600』。『COM』실시간빙고 싸이트 스타카지노 사이트 『OX600』。『COM』실시간빙고 싸이트
Using the VEP for Better Patient Outcomes in Mild Traumatic Brain InjuryDiopsys, Inc.
An optimal VEP test protocol can differentiate objectively between visually normal patients and those with mild traumatic brain injury.
BY KENNETH J. CIUFFREDA, OD, PhD; NAVEEN YADAV, BSOptom, MS, PhD; AND DIANA P. LUDLAM, BS, COVT
A silent (so far) revolution has been pioneered for Indian renewable companies (RC) which is no less than the fad and hype of the technology sector. RCs need to explore sustainable renewable energy finance with IPOs, innovative structures like Yield Cos (Utility and commercial scale plants) as also investment plans (for residential solar - My power loans)
The presentation essentially summarizes the renewables eco system in India, global solar experiences (US), IFRS/ US GAAP A/C issues for renewables sector, future of solar n grid parity, US IPO concepts n regulatory environment.
This Presentation is on a very popular technology related topic, Cloud Computing. It is in our basic daily technology need like gmail i.e. also based on Cloud Computing. And also it has also very good source of job in it. Hope it would be helpful for your School or College project.
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
3. Members
.
Rana M Zubair Arshad(35)
Enam-ul-Haq(53)
Areeba Shahzad(44)
Talha Malik(48)
M Ahsan(32)
Moin Abba(04)
Shah Zaman(46) NFC Institute of Engineering
& Technology Multan
Pakistan
BSCS
Session 2013-2017
6. “Cloud” ?
• In cloud computing, the word cloud (also
phrased as "the cloud") is used as a
metaphor for "the Internet,"
• The phrase cloud computing means "a
type of Internet-based computing," where
different services— such as servers,
storage and applications — are delivered
to an organization's computers and
devices through the Internet.
7. Definition
• The practice of using a network of
remote servers hosted on the
Internet to store, manage, and
process data, rather than a local
server or a personal computer.
Cloud computing is a model for delivering information
technology services in which resources are retrieved
from the internet through web-based tools and
applications, rather than a direct connection to a
server
8.
9. Emergence of Cloud
Introduced in the sixties by J.C.R. Licklider
His vision was for everyone on the globe to be interconnected and
accessing programs and data at any site, from anywhere
It was a gradual evolution that started in the 1950s with
mainframe computing
Because of the costs to buy and maintain mainframe
computers is to high, it was not practical for an organization
to buy and maintain one for every employee
10. Emergence of Cloud
After some time, around 1970, the concept of virtual machines
(VMs) was created.
Using virtualization software like VMware, it became possible to
execute one or more operating systems simultaneously in an isolated
environment.
In the 1990s, telecommunications companies, who
previously offered primarily dedicated point-to-point data
circuits, began offering virtual private network
11. Emergence of Cloud
By switching traffic as they saw fit to balance server use, they could use
overall network bandwidth more effectively.
The next development was Amazon Web Services in 2002, which provided a suite
of cloud-based services including storage, computation and even human
intelligence
In August 2006 Amazon introduced its Elastic Compute Cloud
Microsoft announced "Azure" in October 2008
19. Data Center
• Data Center is a facility used to house Computer systems
& associated components.
• E.g Telecommunications & Storage Systems.
Facebook Microsoft
21. Architecture
• Front-end device
• Back-end platform
• Cloud-based delivery
• Network
The architecture of cloud computing comprises of the following
components
22. Architecture
These are basically the devices that are used by clients to
access the data or program using the browser or special
applications
Front-end Devices
Back-end Platform
There are various computers, servers, virtual machines,
etc. that combine to become a back-end platform
Cloud-based delivery
It is the system to deliver information and data between
Front End and back End
28. Infrastructure as a Service.
• Infrastructure as a Service (IaaS) is
a way of delivering Cloud
Computing infrastructure –
servers, storage, network and
operating systems – as an on-
demand service
29. Characteristics of Iass
• Resources are distributed as a service
• Allows for dynamic scaling
• Has a variable cost, utility pricing model
• Generally includes multiple users on a single
piece of hardware
30. Iass include
• Email
• Business Process
• Industry/application
• CRM/ERp/PHR
Examples
Amazon web service
Rocket space cloud
At&t
31. Platform as a Service
• PaaS can be defined as a computing
platform that allows the creation of
web applications quickly and easily
and without the complexity of buying
and maintaining the software and
infrastructure underneath it
it is a platform for the creation of
software, delivered over the web
32. Characteristics of pass
• Services to develop, test, deploy, host and maintain applications in the same
integrated development environment. All the varying services needed to fulfil the
application development process
• Web based user interface creation tools help to create, modify, test and deploy
different UI scenarios
• Multi-tenant architecture where multiple concurrent users utilize the same
development application
• Built in scalability of deployed software including load balancing and failover
• Integration with web services and databases via common standards
• Support for development team collaboration – some PaaS solutions include project
planning and communication tools
• Tools to handle billing and subscription management
33. Pass include
• Middleware
• Web 2.0 Aplication Runtime
• Development Tooling
• Database
• Java Runtime
Example
Google App Engine
Force.com Window Azure
34. Software as a Service
• software that is deployed over the
internet
• In the software as a service (SaaS)
model, users gain access to
application software and databases
35. Characteristics of sass
• Web access to commercial software
• Software is managed from a central location
• Software delivered in a “one to many” model
• Users not required to handle software
upgrades and patches
• Application Programming Interfaces (APIs)
allow for integration between different pieces of
software
36. Sass include
• Servers
• Networking
• Storage
• Data Center Fabric
• Firewall , Load balancer
Gmail
Facebook Microsoft Online services
Examples
41. Cloud Characteristics
• On demand self service
• Ubiquitous network access
• Location Independent
• Rapid Elasticity
• Pay per use
42. Supporting Factors
• Advancement in processor
• Virtualization Technology
• Distributed Storage
• Automated Management
• Broadband internet Access
• Fast and Inexpensive server
45. Public Cloud
• when the services are rendered over a network that
is open for public use
• The customers do not have any distinguishability
and control over the location of the infrastructure
• From the technical viewpoint, there may be slight or
no difference between private and public clouds’
structural design except in the level of security
• Public cloud is better suited for business
requirements which require managing the load; host
application
46. Private Cloud
• is also known as internal cloud
• the platform for cloud computing is implemented on a
cloud-based secure environment that is safeguarded by a
firewall
• Private cloud as it permits only the authorized users,
gives the organization greater and direct control over
their data
• Businesses that have dynamic or unforeseen needs,
assignments which are mission critical, security alarms,
management demands and uptime requirements are
better suited to adopt private cloud
47. Hybrid Cloud
• It is integrated and can be an arrangement of two or
more cloud servers
• Organizations can use the hybrid cloud model for
processing big data
• It permits the user to increase the capacity or the
capability by aggregation, assimilation or
customization with another cloud package / service
• Hybrid cloud hosting is enabled with features like
scalability, flexibility and security
48. Others Cloud Models
• is a type of cloud hosting in which the setup is
mutually shared between many Organizations that
belong to a particular community, i.e. banks and
trading firms.
• The community members generally share similar
privacy, performance and security concerns
• The cost is shared by the specific Organizations
within the community, hence, community cloud has
cost saving capacity
Community Model
49. Others Cloud Models
A cloud computing platform can be assembled from a distributed
set of machines in different locations, connected to a single network
or hub service.
Distributed Cloud
Inter cloud
is an interconnected global "cloud of clouds“The focus is on
direct interoperability between public cloud service providers,
more so than between providers and consumers
51. Security
• potentially sensitive data is at risk from insider
attacks
• More than one user on same server by Cloud
service provider
• Hacked interfaces and APIs
• Exploited system vulnerabilities
52. Security
Cloud security controls are as follows:
• Deterrent Control
• Preventive Control
• Detective Control
• Corrective Control
53. Cloud security controls
• Deterrent controls
These controls are intended to
reduce attacks on a cloud system. Much
like a warning sign.
Preventive controls
Examples of these include:
Logon Warning – Ensure that a
person is aware of the rights to
enter your site or information
storage.
54. Cloud security controls
Preventive Control:
It controls strengthen the system against
incidents, generally by reducing if not actually
eliminating vulnerabilities.
One example of this would be the inclusion of a
proxy server.
This can act as a ‘bouncer’ between your
information and the person(s) wishing to access
it. Requests for your information can pass
through this server, reducing the risk of a security
breach.
55. Cloud security controls
• Detective controls are intended to
detect and react appropriately to
any incidents that occur.
• An example might be hiring or
yourself trying to unlawfully access
your information in an attempt to
test the defenses.
Detective Control
56. Cloud security controls
Corrective controls reduce the
consequences of an incident,
normally by limiting the damage
An example might include
the changing of passwords and
usernames as soon as you are alerted
to the security breach
Corrective Control
57. Privacy
• service provider can access the data that is in
the cloud at any time
• Privacy Laws of Specific region
• Data ownership
• Security Breaches
• Data Location
58. Challenges
• Organizational barrier
• Reliability
• Customization
• Integration with others Apps
• Limited languages and API’s
• Encryption needs and Standards
59. Software development
• Reduce the cost of application
development
• Limit the time constrain
• the efficient use of resources of IT
deployments
• The pay-per-use model of cloud eliminates
unnecessary expenses
• required software available in the cloud,
developers can work more efficiently
61. examples of cloud computing
• Google Drive
This is a pure cloud computing service,
with all the storage found online so it can
work with the cloud apps: Google Docs,
Google Sheets, and Google Slides
Apple iCloud
Apple's cloud service is primarily used for
online storage, backup, and
synchronization of your mail, contacts,
calendar, and more
62. examples of cloud computing
• Amazon Cloud Drive
Storage at the big retailer is mainly for music,
preferably MP3s that you purchase from
Amazon, and images
65. Disadvantages
• Dependence on service provider
• Security breach
• Unawareness of network
• Physical Location is unknown
• Internet Connection
• Control and Reliability
66. Future !
• We will see more cloud-like capabilities in traditional
datacenter
• Consumer mobility use will continue to drive enterprise
use.
• Big data will continue to drive adoption.
• more industries are turning to cloud technology as an
efficient way to improve quality services due to its
capabilities to reduce overhead costs, downtime, and
automate infrastructure deployment