SlideShare a Scribd company logo
Cloud Computing
Cloud Computing
● Cloud computing is a platform where software,
hardware and internet infrastructure grouped.
● These platforms hide the complexity and details of the
underlying infrastructure from users and applications
by providing very simple graphical interface
● Platform provides on demand services, that are always
on, anywhere, anytime and any place.
● Cloud is most efficient and cost effective w.r.t
traditional data centers.
Cloud Characteristics
● On demand self-service
● Broad network access
● Resource pooling (Storage, processing, memory etc.)
● Rapid elasticity
● Measured services
Cloud Architecture
Service Models
● Software as a Service (SaaS)
– Allows users to run existing online application.
– From end user’s point of view applications are
located in the cloud and software delivered through
the Internet.
● Advantages:
– Free or paid applications via subscription over the
internet.
– Accessible application from any where any time
through internet.
– Facilitate collaborative working.
● Disadvantage: Generic applications not always
suitable for business use.
Service Models ...
● Platform as a Service (PaaS)
– Allows users to create their own tools for creating
new online applications (Google App Engine,
Windows Azure Platform etc.)
● Advantages:
– Rapid development at low cost.
– Private or public deployment.
● Disadvantage:
– Limit developers to provide languages and tools.
Service Models ...
● Infrastructure as a Service (IaaS)
– Allows existing applications to be run on a cloud
suppliers hardware.
– Cloud providers build data centers that include
power, scale, hardware, networking, storage,
distributed system etc.
– Cloud users rent storage, computing and
maintenance from cloud providers.ho want to create
services but don't want to build their own cloud
Cloud Computing
MicroSoft Cloud Platform
Cloud Deployment Models
● Private Cloud:
– The cloud infrastructure is dedicated for single
organization.
– Cloud may be owned, managed, and operated by
the organization, a third party, or some combination
of them.
– It may exist on or off premises.
– Can be a single or multi site deployment.
●
Private Cloud Advantages:
– Fewer security concerns as existing data center
security stays in place.
– IT organization retains control over data center.
Cloud Deployment Models ...
●
Private Cloud Risks:
– High investment hurdle in private cloud
implementation, along with purchases of new
hardware and software.
– Require greater skill-set to manage the private cloud.
Cloud Deployment Models ...
● Public Cloud:
– The cloud infrastructure is provisioned for open use
by the general public.
– It may be owned, managed, and operated by a
business, academic, or government organization, or
some combination of them.
– It exists on the premises of the cloud provider.
– Normally includes pay-as-you-go pricing.
● Public Cloud Advantages:
– Low investment hurdle: pay for what you use.
– Good for test/development environment for applications
that scale to many servers.
Cloud Deployment Models ...
● Public Cloud Risks:
– Security concerns: multi-tenancy and transfers over the
Internet.
– IT organization may react negatively to loss of control
over data center function.
Advantages & Disadvantages
(Private VS Public Cloud)
Cloud Deployment Models ...
● Hybrid Cloud:
– The cloud infrastructure is a composition of two or
more distinct cloud infrastructures (private, public).
– Its deployed on multiple sites.
● Hybrid Cloud Advantages:
– Operational flexibility: run mission critical on private
cloud, dev/test on public cloud.
– Scalability: run peak and bursty workloads on the
public cloud.
● Hybrid Cloud Risks:
– Still under study and not in real use.
– Same security concerns as in public cloud.
Cloud Deployment Models ...
● Hybrid Cloud:
Cloud Deployment Models ...
EnterpriseDB & Google Cloud
● https://console.cloud.google.com/launcher?project=deft-smile-93711&cat=DATABASE
EnterpriseDB Cloud DBMC

More Related Content

What's hot

Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
GLC Networks
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
Md. Hasibur Rashid
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
Cloud Legal Project
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan Holt
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
Deep Ranjan Deb
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
prachupanchal
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
Martin Bioh
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
Shivam Singh
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
Puneet Arora
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
maheralgamdi
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
gangal
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Nithin Raj
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
Rahul Gurnani
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Teja Babu
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
Gopinath Muthusamy
 

What's hot (20)

Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 

Similar to Cloud computing & dbms

Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
Dr.Neeraj Kumar Pandey
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
vijay_m_chaudhary
 
cloud ppt 1.pptx
cloud ppt 1.pptxcloud ppt 1.pptx
cloud ppt 1.pptx
dineshkumar837456146
 
CLOUD
CLOUDCLOUD
Introduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptxIntroduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptx
abcxyz1337
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Suryavamsi51
 
Cloud computing
Cloud computingCloud computing
Cloud computing
neha kamboj
 
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Paul Huertas Apaza
 
Cloud
CloudCloud
Cloud
shan miao
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
A
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Ryan Jay Cabe
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Revathi Ram
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
poojagupta020
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
A
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Jegadeesh Sam
 
Cloud
CloudCloud
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Van Pham
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
sree raj
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Sarvesh Meena
 

Similar to Cloud computing & dbms (20)

Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud ppt 1.pptx
cloud ppt 1.pptxcloud ppt 1.pptx
cloud ppt 1.pptx
 
CLOUD
CLOUDCLOUD
CLOUD
 
Introduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptxIntroduction to Cloud Computing CA03.pptx
Introduction to Cloud Computing CA03.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud
CloudCloud
Cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 

More from Zaid Shabbir

Modern SDLC and QA.pptx
Modern SDLC and QA.pptxModern SDLC and QA.pptx
Modern SDLC and QA.pptx
Zaid Shabbir
 
Software Agility.pptx
Software Agility.pptxSoftware Agility.pptx
Software Agility.pptx
Zaid Shabbir
 
Software Development Guide To Accelerate Performance
Software Development Guide To Accelerate PerformanceSoftware Development Guide To Accelerate Performance
Software Development Guide To Accelerate Performance
Zaid Shabbir
 
Software Testing and Agility
Software Testing and Agility Software Testing and Agility
Software Testing and Agility
Zaid Shabbir
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
No sql bigdata and postgresql
No sql bigdata and postgresqlNo sql bigdata and postgresql
No sql bigdata and postgresql
Zaid Shabbir
 
Files and data storage
Files and data storageFiles and data storage
Files and data storage
Zaid Shabbir
 
Queue
QueueQueue
Queue
QueueQueue
Sorting
SortingSorting
Sorting
Zaid Shabbir
 
Stack
StackStack
Tree and binary tree
Tree and binary treeTree and binary tree
Tree and binary tree
Zaid Shabbir
 
Sorting
SortingSorting
Sorting
Zaid Shabbir
 
Introduction to data structure
Introduction to data structureIntroduction to data structure
Introduction to data structure
Zaid Shabbir
 

More from Zaid Shabbir (14)

Modern SDLC and QA.pptx
Modern SDLC and QA.pptxModern SDLC and QA.pptx
Modern SDLC and QA.pptx
 
Software Agility.pptx
Software Agility.pptxSoftware Agility.pptx
Software Agility.pptx
 
Software Development Guide To Accelerate Performance
Software Development Guide To Accelerate PerformanceSoftware Development Guide To Accelerate Performance
Software Development Guide To Accelerate Performance
 
Software Testing and Agility
Software Testing and Agility Software Testing and Agility
Software Testing and Agility
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
No sql bigdata and postgresql
No sql bigdata and postgresqlNo sql bigdata and postgresql
No sql bigdata and postgresql
 
Files and data storage
Files and data storageFiles and data storage
Files and data storage
 
Queue
QueueQueue
Queue
 
Queue
QueueQueue
Queue
 
Sorting
SortingSorting
Sorting
 
Stack
StackStack
Stack
 
Tree and binary tree
Tree and binary treeTree and binary tree
Tree and binary tree
 
Sorting
SortingSorting
Sorting
 
Introduction to data structure
Introduction to data structureIntroduction to data structure
Introduction to data structure
 

Recently uploaded

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 

Recently uploaded (20)

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 

Cloud computing & dbms

  • 2. Cloud Computing ● Cloud computing is a platform where software, hardware and internet infrastructure grouped. ● These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface ● Platform provides on demand services, that are always on, anywhere, anytime and any place. ● Cloud is most efficient and cost effective w.r.t traditional data centers.
  • 3. Cloud Characteristics ● On demand self-service ● Broad network access ● Resource pooling (Storage, processing, memory etc.) ● Rapid elasticity ● Measured services
  • 5. Service Models ● Software as a Service (SaaS) – Allows users to run existing online application. – From end user’s point of view applications are located in the cloud and software delivered through the Internet. ● Advantages: – Free or paid applications via subscription over the internet. – Accessible application from any where any time through internet. – Facilitate collaborative working. ● Disadvantage: Generic applications not always suitable for business use.
  • 6. Service Models ... ● Platform as a Service (PaaS) – Allows users to create their own tools for creating new online applications (Google App Engine, Windows Azure Platform etc.) ● Advantages: – Rapid development at low cost. – Private or public deployment. ● Disadvantage: – Limit developers to provide languages and tools.
  • 7. Service Models ... ● Infrastructure as a Service (IaaS) – Allows existing applications to be run on a cloud suppliers hardware. – Cloud providers build data centers that include power, scale, hardware, networking, storage, distributed system etc. – Cloud users rent storage, computing and maintenance from cloud providers.ho want to create services but don't want to build their own cloud
  • 10. Cloud Deployment Models ● Private Cloud: – The cloud infrastructure is dedicated for single organization. – Cloud may be owned, managed, and operated by the organization, a third party, or some combination of them. – It may exist on or off premises. – Can be a single or multi site deployment. ● Private Cloud Advantages: – Fewer security concerns as existing data center security stays in place. – IT organization retains control over data center.
  • 11. Cloud Deployment Models ... ● Private Cloud Risks: – High investment hurdle in private cloud implementation, along with purchases of new hardware and software. – Require greater skill-set to manage the private cloud.
  • 12. Cloud Deployment Models ... ● Public Cloud: – The cloud infrastructure is provisioned for open use by the general public. – It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. – It exists on the premises of the cloud provider. – Normally includes pay-as-you-go pricing. ● Public Cloud Advantages: – Low investment hurdle: pay for what you use. – Good for test/development environment for applications that scale to many servers.
  • 13. Cloud Deployment Models ... ● Public Cloud Risks: – Security concerns: multi-tenancy and transfers over the Internet. – IT organization may react negatively to loss of control over data center function.
  • 15. Cloud Deployment Models ... ● Hybrid Cloud: – The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, public). – Its deployed on multiple sites. ● Hybrid Cloud Advantages: – Operational flexibility: run mission critical on private cloud, dev/test on public cloud. – Scalability: run peak and bursty workloads on the public cloud. ● Hybrid Cloud Risks: – Still under study and not in real use. – Same security concerns as in public cloud.
  • 16. Cloud Deployment Models ... ● Hybrid Cloud:
  • 18. EnterpriseDB & Google Cloud ● https://console.cloud.google.com/launcher?project=deft-smile-93711&cat=DATABASE