SlideShare a Scribd company logo
HUMAN COMPUTER INTERACTION
PRESENTATION
GROUP MEMBERS:
NOMAN YAQOOB

(10-SE-135)

AHMAD JAHANZAIB

(10-SE-85)

NOUMAN LATIF

(10-SE-105)

FAHAD ALTAF

(10-SE-49)

AMMAR MAQSOOD

(10-SE-39)

WAQAS RANDHAWA

(10-SE-163)

SUFYAN QAYYUM

(10-SE-131)

UMAR WAQAS

(10-SE-107)
ADVANTAGES OF CLOUD
COMPUTING
High Availability (24*7)
 High availability refers to the availability continuously operational system for a
longer period of time.
 Of course, high availability means greater number of customers and potential
business deals for the organization.


High Availability Cloud Servers provide a distinct
advantage over traditional shared or dedicated
server hosting by eliminating single points of
failure which in turn increases your overall
uptime
High Availability (cont…)
There are lot of benefits of highly available cloud Servers:
 You receive guaranteed Cloud Hosting resources such as CPU, memory
and network bandwidth.
 Cloud Servers are EASY to upgrade when needed and are scalable to
meet your needs as your business grows.
 Improve overall speed and load times of your websites which is increasingly
important for good ranking with Google and other search engines.
Inexpensive
 The use of a cloud system removes the need for the potentially large
capital and operating costs associated with purchasing or leasing such
software and hardware.
 So organizations can reduce their cost by having the cloud computing
service and also organization can concentrate more to expand their
business rather than concentrating on Software and hardware updates.
 You do not need a high-powered and high-priced computer to run cloud
computing's web-based applications.
Inexpensive (cont…)
 Cloud computing allows you and your employees easy access to
applications and data from different computers and devices.
 You no longer have to buy software
 Cloud computing lets you start up or grow your small business quickly.
 A cloud computing application may make integration easier.
Cloud Backup
 Cloud backup, or cloud computer backup, refers to backing up data to a
remote, cloud-based server. As a form of cloud storage.
 Store Data On Internet using Storage Service provider.
 User can access data by a secure Client Login Application.
Cloud Backup (Cont...)
 To update or restore a cloud backup, customers need to use the service
provider's specific client application or a Web browser interface.
 Cloud Backup provides some essential features to Enterprises to make sure
the safety of their data.
 Cloud backup may also be referred to
as online backup or online storage.
Less Maintenance Require
 The modification of a software product after delivery to correct faults, to
improve performance or other attributes.

 Maintenance of cloud computing applications is easier because they do
not need to be installed on each user's computer and can be accessed
from different places
Less Maintenance Require (Cont…)
Driven by 2 factors:
 Less hardware and outsourced

 shared IT staff.
Scalability and Speed
 Enterprises no longer have to invest time in buying and setting up the
hardware, software and other resources necessary for a new application.
They can quickly scale up or scale down their usage of services on the
Cloud as per market demands, during hours of maximum activity, while
launching sales campaigns, etc.
 Cloud services are most usually reliable, since many service providers have
data centers in multiple locations for keeping the processing near
users, reduce spending on technology infrastructure. Maintain easy access
to your information with minimal upfront spending.
No Expertise Require
 Cloud Computing is a style of computing in which dynamically scalable
and often virtualized resources are provided as a service over the Internet.
 Users need not have knowledge of, expertise in, or control over the
technology infrastructure in the "cloud" that supports them.
 Many Cloud Computing offerings have adopted the utility computing
model, which is analogous to how traditional utilities like electricity are
consumed, while others are billed on a subscription basis.
Redundancy
 Adding cloud capability to your architecture allows improved scalability
and provides increased stability and security by providing the infrastructure
to accommodate even very large spikes in demand or other sudden
increases in bandwidth requirements.
 If your enterprise is located in a major city right on the internet
backbone, odds are that this isn’t true of all of your customers and field
offices, and in any event any of you can be affected by traffic rerouted
around an outage. At such times the value of redundant server locations
quickly becomes apparent.
Redundancy (cont…)
 Your Enterprise Needs Redundant Server Locations:
Customers today expect web servers to remain online and are not necessarily
sympathetic even when the outage is due to the type of malicious targeting
that result in a denial of service attack.
Pay as You go (Pay on Demand)
 Pay as you go
 Just pay and get the required
computing power.

 Easy upgrade
 Cloud computing also provide
flexibility to upgrade the system at
lower cost.
Pay as You go (cont…)
 More computing power at lower costs
 The cost to get the required computing power is less then actual implementing
physical system

 Provide different packages
 Companies provide server type of packages
 Client level packages
 For small or new organizations
 For medium size organizations
 For large organizations
NEGATIVE IMPACTS OF
TECHNOLOGY ON LIFE
Generation Gap
 Generation gap, which is defined as differences of
opinions, tastes, beliefs, and other social and cultural norms that exist
between older and younger age groups , has occurred among
grandparents, parents and their children so far.
Two major changes have created a catalytic effect on generation gap:

 Social media: Your kids are attached to their smart phones or tablets or
laptops because they use social media tools. Internet offers them a new
world, literally.
Generation Gap (cont...)
 Implementing technology into education: To make things worse, the
educational system is changing in a way you can’t follow. This means
everything; your kids’ learning style, type of assignments, evaluation systems
are all changing.
 when you go into your 12-year-old daughter’s room and see that she is
chatting with a stranger in the Facebook, you warn her but you might hear
her saying “You don’t even know how to open a Google Doc. You don’t
understand this stuff.”
Emotional and Mental Issues
 Internet is an electronic drug.
 Interactions with people in the physical world is clearly vast

 We find ourselves finely replacing electronic relationships for physical ones.
 Mistaking our electronic relationships for physical
ones.
Emotional and Mental Issues (cont…)
 Absence of connection causes isolation.
 We write things like "LOL" and "LMOA" to describe our laughter, but they're
no real substitute for hearing people laugh.
 Electronic media transmit emotion so poorly compared to in-person
interaction
 More than one relations for marriages.
Health Issues
 Hearing loss from headphones.
 Sitting in front of computer for a long time may cause shoulder, hand, Neck
and Backbone Problems.
 Heavy thumb use could lead to painful swelling of the sheath around the
tendons in the thumb.

 Eye Sight Problems.
 Acne caused by cell phones.
Health Issues (cont…)
 The artificial light from screens can suppress the release of
melatonin, which helps us sleep.
 Cell phones and car accidents.
 No Sports and Other Social Activities. That may cause of unnecessary Fats.
 Research shows the longer you sit, the greater the likelihood you’ll die at a
younger age.
Wastage of Time And Money
 Technology helps us a lot in saving our time and money.
 But on other hand It also wastes our precious time and money.
 Time wastage on social networking sites, chatting on mobile phones and
playing games
 Money wastage on night packages, internet clubs, buying expensive
Mobiles to change life style
Wastage of Time And Money (cont…)
Such activities results in:
 bad habits
 Laziness
 Poor performance

 mental issues (e.g. mind stress)and
 physical health issues (due to bad habits)
Increase In Cyber Crimes
 The Internet has radically changed the way we communicate.
 We can now interrelate with people across the world we may never meet
in person.
 In all countries around the globe where social networking has made life
easy, it has also affected the lives of millions.

 Cybercrime is the one of the biggest threats all over the world.
Increase In Cyber Crimes (cont…)
 Fake accounts of Facebook are one of the biggest cybercrimes in the
social networking world. Facebook and other social networking websites
along with blackmailing can be a threat to a person’s life sometimes.
 Another serious cyber crime includes fraudulent emails, e.g. sometimes we
receive emails regarding jack points.

 Pakistan is one of those countries of Asia where the usage of latest
technology, the Internet and social networking is constantly increasing, and
hence affecting hundreds of teenage girls and women
Isolation (Imaginary Relation)
 Social isolation is characterized by a lack of contact with other people in normal daily
living.
 We isolate ourselves by walking around in our own little world, listening to our iPods or
staring at the screen of the latest mobile device even when we are with our friends and
family members.
Lack of Physical Activities
 Make the man idle
 Technology makes our life so much easier that
we use bike to go to shop which is at some
minutes walk .

 No physical games and Exercise
 We play no physical games like football,
table tennis, badminton etc.
 No exercise like jogging, gym
 Internet and computer are cause of wastage
of time
Lack of Physical Activities (cont…)
 New technologies are causing us to be less
physically active and gain weight because
calorie intake.
Lack of cultural and moral values
 The invasion of modern technologies in our lives has caused us the loss of
moral and cultural values; internet is one of those technologies due to
which we have lost our values.
 The Internet advocates the Western lifestyle and portrays it as superior to
any other lifestyle. It also depicts life in the West as that of unrestrained
freedom and unlimited possibilities, without presenting all sides of this
perspective.
Lack of cultural and moral values
(cont…)
 The Internet presents cultures other than those of the English language as
lacking in the basic freedoms of the West. This can make people believe
that life outside of the Western hemisphere is devoid of value and meaning.
 Because of the widespread availability of information, people become
unappreciative of the things they have and desire more and more.

 The Internet has the potential to corrupt people's minds, change their moral
perspectives and ethical values.
 Paul Walker’s death……….
Cloud computing & disadvantages of technology

More Related Content

What's hot

An assesment of Cybersecurity challenge in Arusha
An assesment of Cybersecurity challenge in ArushaAn assesment of Cybersecurity challenge in Arusha
An assesment of Cybersecurity challenge in Arusha
Ismail Settenda
 
Acla Final Success Story
Acla Final Success StoryAcla Final Success Story
Acla Final Success Story
Onshoring
 
PCs for People october 2012 broadband taskforce presentation
PCs for People october 2012 broadband taskforce presentationPCs for People october 2012 broadband taskforce presentation
PCs for People october 2012 broadband taskforce presentation
Ann Treacy
 
The Revolution Will Not Be Centralized
The Revolution Will Not Be CentralizedThe Revolution Will Not Be Centralized
The Revolution Will Not Be Centralized
Edward Faulkner
 
Social Media: an Obligation, an Opportunity, or a Threat
Social Media:  an Obligation, an Opportunity, or a ThreatSocial Media:  an Obligation, an Opportunity, or a Threat
Social Media: an Obligation, an Opportunity, or a Threat
NinetyTen
 
Virtual worlds, So what?
Virtual worlds, So what?Virtual worlds, So what?
Virtual worlds, So what?
Atman Patel
 

What's hot (6)

An assesment of Cybersecurity challenge in Arusha
An assesment of Cybersecurity challenge in ArushaAn assesment of Cybersecurity challenge in Arusha
An assesment of Cybersecurity challenge in Arusha
 
Acla Final Success Story
Acla Final Success StoryAcla Final Success Story
Acla Final Success Story
 
PCs for People october 2012 broadband taskforce presentation
PCs for People october 2012 broadband taskforce presentationPCs for People october 2012 broadband taskforce presentation
PCs for People october 2012 broadband taskforce presentation
 
The Revolution Will Not Be Centralized
The Revolution Will Not Be CentralizedThe Revolution Will Not Be Centralized
The Revolution Will Not Be Centralized
 
Social Media: an Obligation, an Opportunity, or a Threat
Social Media:  an Obligation, an Opportunity, or a ThreatSocial Media:  an Obligation, an Opportunity, or a Threat
Social Media: an Obligation, an Opportunity, or a Threat
 
Virtual worlds, So what?
Virtual worlds, So what?Virtual worlds, So what?
Virtual worlds, So what?
 

Similar to Cloud computing & disadvantages of technology

Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
निवेश गगॆ
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
TechSoup
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
Peter Coffee
 
APPLICATIONS OF NETWORKS, Computer Network
APPLICATIONS OF NETWORKS, Computer NetworkAPPLICATIONS OF NETWORKS, Computer Network
APPLICATIONS OF NETWORKS, Computer Network
HasankaNayanjith
 
6.-Contemporary-Technology-about ICT.pptx
6.-Contemporary-Technology-about ICT.pptx6.-Contemporary-Technology-about ICT.pptx
6.-Contemporary-Technology-about ICT.pptx
PurnaBahadurRana1
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer Centre
Simran Grover
 
How To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. ExamHow To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. Exam
Crystal Carter
 
20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web
Govind Sridharan
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
Tina Jordan
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
ShohanaakterKakon
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
TechSoup Global
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing report
Product Reviews
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
Hardini_HD
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
Mubashir Ali
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
Vennimalai N
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our Society
Jennifer York
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docx
makdul
 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docx
cherry686017
 

Similar to Cloud computing & disadvantages of technology (18)

Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
 
APPLICATIONS OF NETWORKS, Computer Network
APPLICATIONS OF NETWORKS, Computer NetworkAPPLICATIONS OF NETWORKS, Computer Network
APPLICATIONS OF NETWORKS, Computer Network
 
6.-Contemporary-Technology-about ICT.pptx
6.-Contemporary-Technology-about ICT.pptx6.-Contemporary-Technology-about ICT.pptx
6.-Contemporary-Technology-about ICT.pptx
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer Centre
 
How To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. ExamHow To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. Exam
 
20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing report
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our Society
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docx
 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docx
 

Recently uploaded

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 

Recently uploaded (20)

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 

Cloud computing & disadvantages of technology

  • 1. HUMAN COMPUTER INTERACTION PRESENTATION GROUP MEMBERS: NOMAN YAQOOB (10-SE-135) AHMAD JAHANZAIB (10-SE-85) NOUMAN LATIF (10-SE-105) FAHAD ALTAF (10-SE-49) AMMAR MAQSOOD (10-SE-39) WAQAS RANDHAWA (10-SE-163) SUFYAN QAYYUM (10-SE-131) UMAR WAQAS (10-SE-107)
  • 3. High Availability (24*7)  High availability refers to the availability continuously operational system for a longer period of time.  Of course, high availability means greater number of customers and potential business deals for the organization.  High Availability Cloud Servers provide a distinct advantage over traditional shared or dedicated server hosting by eliminating single points of failure which in turn increases your overall uptime
  • 4. High Availability (cont…) There are lot of benefits of highly available cloud Servers:  You receive guaranteed Cloud Hosting resources such as CPU, memory and network bandwidth.  Cloud Servers are EASY to upgrade when needed and are scalable to meet your needs as your business grows.  Improve overall speed and load times of your websites which is increasingly important for good ranking with Google and other search engines.
  • 5. Inexpensive  The use of a cloud system removes the need for the potentially large capital and operating costs associated with purchasing or leasing such software and hardware.  So organizations can reduce their cost by having the cloud computing service and also organization can concentrate more to expand their business rather than concentrating on Software and hardware updates.  You do not need a high-powered and high-priced computer to run cloud computing's web-based applications.
  • 6. Inexpensive (cont…)  Cloud computing allows you and your employees easy access to applications and data from different computers and devices.  You no longer have to buy software  Cloud computing lets you start up or grow your small business quickly.  A cloud computing application may make integration easier.
  • 7. Cloud Backup  Cloud backup, or cloud computer backup, refers to backing up data to a remote, cloud-based server. As a form of cloud storage.  Store Data On Internet using Storage Service provider.  User can access data by a secure Client Login Application.
  • 8. Cloud Backup (Cont...)  To update or restore a cloud backup, customers need to use the service provider's specific client application or a Web browser interface.  Cloud Backup provides some essential features to Enterprises to make sure the safety of their data.  Cloud backup may also be referred to as online backup or online storage.
  • 9. Less Maintenance Require  The modification of a software product after delivery to correct faults, to improve performance or other attributes.  Maintenance of cloud computing applications is easier because they do not need to be installed on each user's computer and can be accessed from different places
  • 10. Less Maintenance Require (Cont…) Driven by 2 factors:  Less hardware and outsourced  shared IT staff.
  • 11. Scalability and Speed  Enterprises no longer have to invest time in buying and setting up the hardware, software and other resources necessary for a new application. They can quickly scale up or scale down their usage of services on the Cloud as per market demands, during hours of maximum activity, while launching sales campaigns, etc.  Cloud services are most usually reliable, since many service providers have data centers in multiple locations for keeping the processing near users, reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending.
  • 12. No Expertise Require  Cloud Computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.  Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them.  Many Cloud Computing offerings have adopted the utility computing model, which is analogous to how traditional utilities like electricity are consumed, while others are billed on a subscription basis.
  • 13. Redundancy  Adding cloud capability to your architecture allows improved scalability and provides increased stability and security by providing the infrastructure to accommodate even very large spikes in demand or other sudden increases in bandwidth requirements.  If your enterprise is located in a major city right on the internet backbone, odds are that this isn’t true of all of your customers and field offices, and in any event any of you can be affected by traffic rerouted around an outage. At such times the value of redundant server locations quickly becomes apparent.
  • 14. Redundancy (cont…)  Your Enterprise Needs Redundant Server Locations: Customers today expect web servers to remain online and are not necessarily sympathetic even when the outage is due to the type of malicious targeting that result in a denial of service attack.
  • 15. Pay as You go (Pay on Demand)  Pay as you go  Just pay and get the required computing power.  Easy upgrade  Cloud computing also provide flexibility to upgrade the system at lower cost.
  • 16. Pay as You go (cont…)  More computing power at lower costs  The cost to get the required computing power is less then actual implementing physical system  Provide different packages  Companies provide server type of packages  Client level packages  For small or new organizations  For medium size organizations  For large organizations
  • 18. Generation Gap  Generation gap, which is defined as differences of opinions, tastes, beliefs, and other social and cultural norms that exist between older and younger age groups , has occurred among grandparents, parents and their children so far. Two major changes have created a catalytic effect on generation gap:  Social media: Your kids are attached to their smart phones or tablets or laptops because they use social media tools. Internet offers them a new world, literally.
  • 19. Generation Gap (cont...)  Implementing technology into education: To make things worse, the educational system is changing in a way you can’t follow. This means everything; your kids’ learning style, type of assignments, evaluation systems are all changing.  when you go into your 12-year-old daughter’s room and see that she is chatting with a stranger in the Facebook, you warn her but you might hear her saying “You don’t even know how to open a Google Doc. You don’t understand this stuff.”
  • 20. Emotional and Mental Issues  Internet is an electronic drug.  Interactions with people in the physical world is clearly vast  We find ourselves finely replacing electronic relationships for physical ones.  Mistaking our electronic relationships for physical ones.
  • 21. Emotional and Mental Issues (cont…)  Absence of connection causes isolation.  We write things like "LOL" and "LMOA" to describe our laughter, but they're no real substitute for hearing people laugh.  Electronic media transmit emotion so poorly compared to in-person interaction  More than one relations for marriages.
  • 22. Health Issues  Hearing loss from headphones.  Sitting in front of computer for a long time may cause shoulder, hand, Neck and Backbone Problems.  Heavy thumb use could lead to painful swelling of the sheath around the tendons in the thumb.  Eye Sight Problems.  Acne caused by cell phones.
  • 23. Health Issues (cont…)  The artificial light from screens can suppress the release of melatonin, which helps us sleep.  Cell phones and car accidents.  No Sports and Other Social Activities. That may cause of unnecessary Fats.  Research shows the longer you sit, the greater the likelihood you’ll die at a younger age.
  • 24. Wastage of Time And Money  Technology helps us a lot in saving our time and money.  But on other hand It also wastes our precious time and money.  Time wastage on social networking sites, chatting on mobile phones and playing games  Money wastage on night packages, internet clubs, buying expensive Mobiles to change life style
  • 25. Wastage of Time And Money (cont…) Such activities results in:  bad habits  Laziness  Poor performance  mental issues (e.g. mind stress)and  physical health issues (due to bad habits)
  • 26. Increase In Cyber Crimes  The Internet has radically changed the way we communicate.  We can now interrelate with people across the world we may never meet in person.  In all countries around the globe where social networking has made life easy, it has also affected the lives of millions.  Cybercrime is the one of the biggest threats all over the world.
  • 27. Increase In Cyber Crimes (cont…)  Fake accounts of Facebook are one of the biggest cybercrimes in the social networking world. Facebook and other social networking websites along with blackmailing can be a threat to a person’s life sometimes.  Another serious cyber crime includes fraudulent emails, e.g. sometimes we receive emails regarding jack points.  Pakistan is one of those countries of Asia where the usage of latest technology, the Internet and social networking is constantly increasing, and hence affecting hundreds of teenage girls and women
  • 28. Isolation (Imaginary Relation)  Social isolation is characterized by a lack of contact with other people in normal daily living.  We isolate ourselves by walking around in our own little world, listening to our iPods or staring at the screen of the latest mobile device even when we are with our friends and family members.
  • 29. Lack of Physical Activities  Make the man idle  Technology makes our life so much easier that we use bike to go to shop which is at some minutes walk .  No physical games and Exercise  We play no physical games like football, table tennis, badminton etc.  No exercise like jogging, gym  Internet and computer are cause of wastage of time
  • 30. Lack of Physical Activities (cont…)  New technologies are causing us to be less physically active and gain weight because calorie intake.
  • 31. Lack of cultural and moral values  The invasion of modern technologies in our lives has caused us the loss of moral and cultural values; internet is one of those technologies due to which we have lost our values.  The Internet advocates the Western lifestyle and portrays it as superior to any other lifestyle. It also depicts life in the West as that of unrestrained freedom and unlimited possibilities, without presenting all sides of this perspective.
  • 32. Lack of cultural and moral values (cont…)  The Internet presents cultures other than those of the English language as lacking in the basic freedoms of the West. This can make people believe that life outside of the Western hemisphere is devoid of value and meaning.  Because of the widespread availability of information, people become unappreciative of the things they have and desire more and more.  The Internet has the potential to corrupt people's minds, change their moral perspectives and ethical values.  Paul Walker’s death……….