SlideShare a Scribd company logo
CLOUD COMPUTING
BY
MUHAMMAD ARSLAN – BSIT 4
Content
 Introduction of Cloud Computing & Historical Background
 Cloud Service Models & Cloud Deployment Models
 Benefits of Cloud Computing
 Risks and Challenges
 Future Trends in Cloud Computing
 Edge Computing, Serverless Computing, AI & Machine Learning in Cloud, Security and
Compliance
 Needs and Obstacles for Cloud Deployment
 Conclusion
Introduction of Cloud Computing &
Historical Background
 Cloud computing is a technology that allows users to access and use computing resources, such as
servers, storage, databases, networking, software, and more, over the internet on a pay-as-you-go
basis.
 It eliminates the need for organizations to invest in and maintain their own physical infrastructure,
offering flexibility and scalability.
History
• Cloud computing concepts date back to the 1950s, with early experiments in time-sharing and remote
access.
• The term "cloud computing" gained prominence in the early 21st century with the advent of virtualization
and internet-based services.
Cloud Service Models
 There are three service models:
 IaaS (Infrastructure as a Service)
 PaaS (Platform as a Service)
 SaaS (Software as a Service)
Cloud Service Models
 IaaS (Infrastructure as a Service): IaaS provides virtualized computing resources over the internet,
including servers, storage, and networking.
 It offers a range of essential IT infrastructure components, including servers, storage, networking, and
sometimes additional services like load balancers, firewalls, and virtual machines.
 Key Characteristics and Features of IaaS:
• Virtualization
• Scalability
• Self-Service
• Pay-as-You-Go Billing
• Customization
Cloud Service Models
 Use Cases of IaaS:
• Web Hosting
• Development and Testing
• Data Backup and Recovery
• Big Data Processing
Cloud Service Models
 Platform as a Service (PaaS): is a cloud computing model that provides a platform and environment for
developers to build, deploy, and manage applications without the complexities of managing the
underlying infrastructure.
 PaaS abstracts infrastructure management, allowing developers to focus solely on coding and
application logic.
 Key Characteristics and Features of PaaS:
• Development Tools
• Middleware
• Scalability
• Automated Management
• Multi-Tenancy
Cloud Service Models
 Use Cases of PaaS:
• Web Application Development
• Database Management
• Continuous Integration and Deployment (CI/CD)
Cloud Service Models
 Software as a Service (SaaS): is a cloud computing model where software applications are
delivered over the internet on a subscription basis. Instead of purchasing and installing software on
individual devices or servers, users access and use the software through a web browser.
 Key Characteristics and Features of SaaS:
• Accessibility
• Subscription-Based
• Maintenance and Updates
Cloud Service Models
 Use Cases of SaaS:
• Email and Collaboration Tools
• Customer Relationship Management (CRM)
• Enterprise Resource Planning (ERP)
• Cloud Storage and File Sharing
Cloud Service Models
Cloud Deployment Models
• Public Cloud: Public cloud services are provided by third-party cloud providers and are accessible
to the general public.
• Private Cloud: Private cloud infrastructure is dedicated to a single organization, offering greater
control and security.
• Hybrid Cloud: Hybrid cloud combines both public and private clouds, allowing data and
applications to be shared between them.
• Community Cloud: A community cloud in computing is a collaborative effort in which infrastructure
is shared between several organizations from a specific community with common concerns
(security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted
internally or externally.
Cloud Deployment Models
Key Characteristics of Cloud Computing
 Key Characteristics
• On-Demand Self-Service: Users can provision and manage resources as needed without human
intervention.
• Broad Network Access: Cloud services are accessible over the internet from various devices.
• Resource Pooling: Computing resources are shared among multiple users to maximize efficiency.
• Rapid Elasticity: Resources can be scaled up or down quickly to meet demand.
• Measured Service: Cloud usage is metered, and users pay only for what they consume.
Benefits of Cloud Computing
 Cost Savings: Cloud computing reduces capital expenses, as organizations pay for resources as
they use them.
 Scalability: Easily scale resources up or down to accommodate changing needs.
 Flexibility: Access resources from anywhere with an internet connection.
 Reliability: Cloud providers offer high availability and redundancy.
 Innovation: Cloud enables the adoption of new technologies quickly.
Risks and Challenges of Cloud Computing
 Security Concerns: Data breaches and unauthorized access can be concerns.
 Data Privacy: Storing data off-site may raise privacy and compliance issues.
 Downtime: Reliance on cloud providers can lead to downtime in case of outages.
 Data Transfer Costs: Transmitting large amounts of data to and from the cloud may incur
charges.
 Vendor Lock-In: Organizations may become dependent on a single cloud provider.
Future Trends in Cloud Computing
 Edge Computing ()
 Serverless Computing ()
 AI and Machine Learning in the Cloud ()
 Quantum Computing
 Security and Compliance
Need for Cloud Deployment
 Business Needs for Cloud Deployment
 1. Cost Efficiency:
• Cost Savings: One of the primary drivers for businesses to adopt cloud deployment is cost savings.
Cloud computing eliminates the need for organizations to invest heavily in physical hardware, data
centers, and maintenance. Instead, they pay for cloud resources as they use them, following a pay-as-
you-go model. This reduces upfront capital expenditures and allows organizations to allocate resources
more efficiently.
• Resource Optimization: Cloud services provide resource optimization, allowing businesses to scale up
or down as needed. This means they can avoid overprovisioning or underutilization of resources,
optimizing costs.
• Reduced Operational Costs: By offloading the management and maintenance of infrastructure to cloud
providers, businesses can reduce their operational costs, including IT staff and hardware maintenance
expenses.
Need for Cloud Deployment
 2. Scalability:
• Elasticity: Cloud platforms offer elastic scalability, enabling businesses to respond to changing
workloads and demand in real-time. This scalability ensures that businesses can handle sudden
spikes in traffic without disruptions.
• Business Growth: As businesses expand, their IT infrastructure needs to grow accordingly. Cloud
computing allows for seamless and rapid scaling, ensuring that infrastructure can keep up with the
pace of business growth.
Need for Cloud Deployment
 3. Flexibility and Agility:
• Global Reach: Cloud services are accessible from anywhere with an internet connection, providing
global reach.
• Faster Time-to-Market: Cloud deployment speeds up the development and deployment of applications
and services.
• Experimentation: Cloud computing enables businesses to experiment with new ideas and technologies
without significant upfront investments.
 4. Reliability and Availability:
• High Availability: Leading cloud providers offer robust data centers with redundancy and failover
capabilities. This ensures high availability and minimizes downtime, which is critical for businesses that
rely on continuous operations.
• Disaster Recovery: Cloud providers offer built-in disaster recovery solutions, allowing businesses to
recover data and operations quickly in case of disasters or system failures.
Need for Cloud Deployment
 5. Security:
• Security Services: Many cloud providers offer advanced security services and features, including
encryption, identity and access management, and threat detection. This helps businesses enhance
their overall security posture.
 6. Collaboration and Remote Work:
• Collaboration Tools: Cloud-based collaboration tools and platforms enable remote and distributed
teams to work together effectively. This is especially valuable in today's global and remote work
environments.
• Access Anytime, Anywhere: Cloud solutions allow employees to access business-critical
applications and data from anywhere, facilitating remote work and improving productivity.
Obstacles for Cloud Deployment
 1. Security Concerns:
• Data Breaches: One of the primary security concerns in cloud adoption is the potential for data
breaches. Organizations worry about unauthorized access to sensitive data, which can lead to
financial losses, legal repercussions, and damage to reputation.
• Shared Responsibility: Understanding the shared responsibility model is crucial. Cloud providers
are responsible for securing the infrastructure, but organizations are responsible for securing their
data and configurations. Misconfigurations can expose data to threats.
• Cloud-specific Threats: Cloud environments introduce unique security threats, such as
misconfigured security settings, insider threats, and unauthorized access to cloud management
consoles.
Obstacles for Cloud Deployment
 2. Data Privacy:
• Data Sovereignty: Data sovereignty concerns arise when data crosses national borders. Some
countries have strict regulations governing where data can be stored and processed.
Organizations must navigate these regulations to ensure compliance.
• Data Residency: Some industries, like healthcare and finance, have strict requirements regarding
where data can be stored and processed. Cloud providers may have data centers in multiple
regions, making it essential to choose a provider with the right data residency options.
• Data Encryption: Encrypting data both in transit and at rest is crucial for maintaining data privacy.
Organizations need to understand the encryption options provided by their cloud provider and
implement appropriate encryption practices.
Obstacles for Cloud Deployment
 3. Integration:
• Legacy Systems: Migrating existing on-premises systems and legacy applications to the cloud
can be complex. Compatibility issues, differing architecture, and data migration challenges often
arise.
• Interoperability: Ensuring that cloud-based services work seamlessly with existing systems and
other cloud services can be challenging. Integration may require custom development or third-party
solutions.
• Data Migration: Data migration to the cloud can be time-consuming and error-prone.
Organizations must carefully plan and execute data migration strategies to minimize downtime and
data loss.
• Vendor Lock-In: Depending too heavily on a single cloud provider can lead to vendor lock-in,
making it difficult to migrate away from that provider in the future. Businesses should consider
strategies to mitigate this risk, such as adopting multi-cloud or hybrid cloud solutions.
Mitigating Obstacles in Cloud Deployment
 Few Solutions:
• Encryption: Implement robust encryption mechanisms for data in transit and at rest. Utilize
encryption protocols for network traffic and encryption keys management services provided by your
cloud provider.
• Access Controls: Implement strict access controls and authentication mechanisms. Utilize
Identity and Access Management (IAM) solutions to manage user permissions effectively. Ensure
the principle of least privilege to restrict access only to necessary personnel.
• Security Monitoring: Deploy advanced security monitoring and alerting tools to detect and
respond to security threats in real-time.
• Regular Auditing: Conduct regular security audits and vulnerability assessments to identify and
remediate potential weaknesses in your cloud infrastructure.
Mitigating Obstacles in Cloud Deployment
 Data Classification: Classify your data to determine which data is subject to specific regulations
and compliance requirements. Apply appropriate security and access controls to sensitive data.
 Data Retention and Deletion Policies: Implement data retention and deletion policies to ensure
compliance with data protection regulations, including the right to be forgotten (GDPR).
Conclusion / Recap
• We started by defining / introduction of Cloud Computing and a little history
• Exploring the fundamental cloud service models: IaaS, PaaS, and SaaS.
• Exploring the cloud deployment models: Private, Public, Hybrid and Community
• Delved into the business needs driving cloud adoption, such as cost efficiency, scalability, flexibility,
reliability and security.
• Examined the obstacles organizations may encounter when considering cloud adoption, including
security concerns, data privacy challenges, and integration complexities.
• Finally, we discussed few solutions to mitigate the obstacles to reap the benefits of cloud
computing.
What you need to do?
Write an Article on Edge Computing / Serverless Computing / AI and Machine Learning in the Cloud
1. Post it on your account of medium.com
2. Share the medium post on your LinkedIn profile
3. Add me in your LinkedIn and Tag me in your post
Don’t forget to use proper hashtags
LinkedIn profile:
https://www.linkedin.com/in/marslanalvi/
Deadline: Monday, September 18, 2023 till 6 PM

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
Vivek Ravindran
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Jihed Kaouech
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Sarvesh Meena
 
Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
Varun Vijay
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
Big data unit 2
Big data unit 2Big data unit 2
Big data unit 2
RojaT4
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
Jaya Silwal
 
High–Performance Computing
High–Performance ComputingHigh–Performance Computing
High–Performance Computing
BRAC University Computer Club
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
SURESHKUMARG17
 
Introduction to CloudStack
Introduction to CloudStack Introduction to CloudStack
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
Rkrishna Mishra
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Big data unit 2
Big data unit 2Big data unit 2
Big data unit 2
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
High–Performance Computing
High–Performance ComputingHigh–Performance Computing
High–Performance Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Introduction to CloudStack
Introduction to CloudStack Introduction to CloudStack
Introduction to CloudStack
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to Cloud Computing (Lecture 1 & 2).pptx

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
Dss
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy
 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
SumitSaini169007
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
gunvinit931
 
Cloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptxCloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptx
ArifKhursheedAcademi
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Naveed Farooq
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
HarpreetKaur1382
 
Presentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptxPresentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptx
HarpreetKaur1382
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Suryavamsi51
 
Cloud computing
Cloud computingCloud computing
Cloud computing
neha kamboj
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
SURBHI SAROHA
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptx
OmSatpathy
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
BHASKAR CHAUDHURY
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
sarahabbas40
 
Unit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptxUnit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptx
Rahul Borate
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Muhammad Yaqoob
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
BhuvneshYadav13
 
Bca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptxBca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptx
itsmekunaljha
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
Deepak Shukla
 

Similar to Cloud Computing (Lecture 1 & 2).pptx (20)

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 
Cloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptxCloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
Presentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptxPresentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptx
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptx
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Unit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptxUnit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptx
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Bca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptxBca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptx
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 

Cloud Computing (Lecture 1 & 2).pptx

  • 2. Content  Introduction of Cloud Computing & Historical Background  Cloud Service Models & Cloud Deployment Models  Benefits of Cloud Computing  Risks and Challenges  Future Trends in Cloud Computing  Edge Computing, Serverless Computing, AI & Machine Learning in Cloud, Security and Compliance  Needs and Obstacles for Cloud Deployment  Conclusion
  • 3. Introduction of Cloud Computing & Historical Background  Cloud computing is a technology that allows users to access and use computing resources, such as servers, storage, databases, networking, software, and more, over the internet on a pay-as-you-go basis.  It eliminates the need for organizations to invest in and maintain their own physical infrastructure, offering flexibility and scalability. History • Cloud computing concepts date back to the 1950s, with early experiments in time-sharing and remote access. • The term "cloud computing" gained prominence in the early 21st century with the advent of virtualization and internet-based services.
  • 4. Cloud Service Models  There are three service models:  IaaS (Infrastructure as a Service)  PaaS (Platform as a Service)  SaaS (Software as a Service)
  • 5. Cloud Service Models  IaaS (Infrastructure as a Service): IaaS provides virtualized computing resources over the internet, including servers, storage, and networking.  It offers a range of essential IT infrastructure components, including servers, storage, networking, and sometimes additional services like load balancers, firewalls, and virtual machines.  Key Characteristics and Features of IaaS: • Virtualization • Scalability • Self-Service • Pay-as-You-Go Billing • Customization
  • 6. Cloud Service Models  Use Cases of IaaS: • Web Hosting • Development and Testing • Data Backup and Recovery • Big Data Processing
  • 7. Cloud Service Models  Platform as a Service (PaaS): is a cloud computing model that provides a platform and environment for developers to build, deploy, and manage applications without the complexities of managing the underlying infrastructure.  PaaS abstracts infrastructure management, allowing developers to focus solely on coding and application logic.  Key Characteristics and Features of PaaS: • Development Tools • Middleware • Scalability • Automated Management • Multi-Tenancy
  • 8. Cloud Service Models  Use Cases of PaaS: • Web Application Development • Database Management • Continuous Integration and Deployment (CI/CD)
  • 9. Cloud Service Models  Software as a Service (SaaS): is a cloud computing model where software applications are delivered over the internet on a subscription basis. Instead of purchasing and installing software on individual devices or servers, users access and use the software through a web browser.  Key Characteristics and Features of SaaS: • Accessibility • Subscription-Based • Maintenance and Updates
  • 10. Cloud Service Models  Use Cases of SaaS: • Email and Collaboration Tools • Customer Relationship Management (CRM) • Enterprise Resource Planning (ERP) • Cloud Storage and File Sharing
  • 12. Cloud Deployment Models • Public Cloud: Public cloud services are provided by third-party cloud providers and are accessible to the general public. • Private Cloud: Private cloud infrastructure is dedicated to a single organization, offering greater control and security. • Hybrid Cloud: Hybrid cloud combines both public and private clouds, allowing data and applications to be shared between them. • Community Cloud: A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally.
  • 14. Key Characteristics of Cloud Computing  Key Characteristics • On-Demand Self-Service: Users can provision and manage resources as needed without human intervention. • Broad Network Access: Cloud services are accessible over the internet from various devices. • Resource Pooling: Computing resources are shared among multiple users to maximize efficiency. • Rapid Elasticity: Resources can be scaled up or down quickly to meet demand. • Measured Service: Cloud usage is metered, and users pay only for what they consume.
  • 15. Benefits of Cloud Computing  Cost Savings: Cloud computing reduces capital expenses, as organizations pay for resources as they use them.  Scalability: Easily scale resources up or down to accommodate changing needs.  Flexibility: Access resources from anywhere with an internet connection.  Reliability: Cloud providers offer high availability and redundancy.  Innovation: Cloud enables the adoption of new technologies quickly.
  • 16. Risks and Challenges of Cloud Computing  Security Concerns: Data breaches and unauthorized access can be concerns.  Data Privacy: Storing data off-site may raise privacy and compliance issues.  Downtime: Reliance on cloud providers can lead to downtime in case of outages.  Data Transfer Costs: Transmitting large amounts of data to and from the cloud may incur charges.  Vendor Lock-In: Organizations may become dependent on a single cloud provider.
  • 17. Future Trends in Cloud Computing  Edge Computing ()  Serverless Computing ()  AI and Machine Learning in the Cloud ()  Quantum Computing  Security and Compliance
  • 18. Need for Cloud Deployment  Business Needs for Cloud Deployment  1. Cost Efficiency: • Cost Savings: One of the primary drivers for businesses to adopt cloud deployment is cost savings. Cloud computing eliminates the need for organizations to invest heavily in physical hardware, data centers, and maintenance. Instead, they pay for cloud resources as they use them, following a pay-as- you-go model. This reduces upfront capital expenditures and allows organizations to allocate resources more efficiently. • Resource Optimization: Cloud services provide resource optimization, allowing businesses to scale up or down as needed. This means they can avoid overprovisioning or underutilization of resources, optimizing costs. • Reduced Operational Costs: By offloading the management and maintenance of infrastructure to cloud providers, businesses can reduce their operational costs, including IT staff and hardware maintenance expenses.
  • 19. Need for Cloud Deployment  2. Scalability: • Elasticity: Cloud platforms offer elastic scalability, enabling businesses to respond to changing workloads and demand in real-time. This scalability ensures that businesses can handle sudden spikes in traffic without disruptions. • Business Growth: As businesses expand, their IT infrastructure needs to grow accordingly. Cloud computing allows for seamless and rapid scaling, ensuring that infrastructure can keep up with the pace of business growth.
  • 20. Need for Cloud Deployment  3. Flexibility and Agility: • Global Reach: Cloud services are accessible from anywhere with an internet connection, providing global reach. • Faster Time-to-Market: Cloud deployment speeds up the development and deployment of applications and services. • Experimentation: Cloud computing enables businesses to experiment with new ideas and technologies without significant upfront investments.  4. Reliability and Availability: • High Availability: Leading cloud providers offer robust data centers with redundancy and failover capabilities. This ensures high availability and minimizes downtime, which is critical for businesses that rely on continuous operations. • Disaster Recovery: Cloud providers offer built-in disaster recovery solutions, allowing businesses to recover data and operations quickly in case of disasters or system failures.
  • 21. Need for Cloud Deployment  5. Security: • Security Services: Many cloud providers offer advanced security services and features, including encryption, identity and access management, and threat detection. This helps businesses enhance their overall security posture.  6. Collaboration and Remote Work: • Collaboration Tools: Cloud-based collaboration tools and platforms enable remote and distributed teams to work together effectively. This is especially valuable in today's global and remote work environments. • Access Anytime, Anywhere: Cloud solutions allow employees to access business-critical applications and data from anywhere, facilitating remote work and improving productivity.
  • 22. Obstacles for Cloud Deployment  1. Security Concerns: • Data Breaches: One of the primary security concerns in cloud adoption is the potential for data breaches. Organizations worry about unauthorized access to sensitive data, which can lead to financial losses, legal repercussions, and damage to reputation. • Shared Responsibility: Understanding the shared responsibility model is crucial. Cloud providers are responsible for securing the infrastructure, but organizations are responsible for securing their data and configurations. Misconfigurations can expose data to threats. • Cloud-specific Threats: Cloud environments introduce unique security threats, such as misconfigured security settings, insider threats, and unauthorized access to cloud management consoles.
  • 23. Obstacles for Cloud Deployment  2. Data Privacy: • Data Sovereignty: Data sovereignty concerns arise when data crosses national borders. Some countries have strict regulations governing where data can be stored and processed. Organizations must navigate these regulations to ensure compliance. • Data Residency: Some industries, like healthcare and finance, have strict requirements regarding where data can be stored and processed. Cloud providers may have data centers in multiple regions, making it essential to choose a provider with the right data residency options. • Data Encryption: Encrypting data both in transit and at rest is crucial for maintaining data privacy. Organizations need to understand the encryption options provided by their cloud provider and implement appropriate encryption practices.
  • 24. Obstacles for Cloud Deployment  3. Integration: • Legacy Systems: Migrating existing on-premises systems and legacy applications to the cloud can be complex. Compatibility issues, differing architecture, and data migration challenges often arise. • Interoperability: Ensuring that cloud-based services work seamlessly with existing systems and other cloud services can be challenging. Integration may require custom development or third-party solutions. • Data Migration: Data migration to the cloud can be time-consuming and error-prone. Organizations must carefully plan and execute data migration strategies to minimize downtime and data loss. • Vendor Lock-In: Depending too heavily on a single cloud provider can lead to vendor lock-in, making it difficult to migrate away from that provider in the future. Businesses should consider strategies to mitigate this risk, such as adopting multi-cloud or hybrid cloud solutions.
  • 25. Mitigating Obstacles in Cloud Deployment  Few Solutions: • Encryption: Implement robust encryption mechanisms for data in transit and at rest. Utilize encryption protocols for network traffic and encryption keys management services provided by your cloud provider. • Access Controls: Implement strict access controls and authentication mechanisms. Utilize Identity and Access Management (IAM) solutions to manage user permissions effectively. Ensure the principle of least privilege to restrict access only to necessary personnel. • Security Monitoring: Deploy advanced security monitoring and alerting tools to detect and respond to security threats in real-time. • Regular Auditing: Conduct regular security audits and vulnerability assessments to identify and remediate potential weaknesses in your cloud infrastructure.
  • 26. Mitigating Obstacles in Cloud Deployment  Data Classification: Classify your data to determine which data is subject to specific regulations and compliance requirements. Apply appropriate security and access controls to sensitive data.  Data Retention and Deletion Policies: Implement data retention and deletion policies to ensure compliance with data protection regulations, including the right to be forgotten (GDPR).
  • 27. Conclusion / Recap • We started by defining / introduction of Cloud Computing and a little history • Exploring the fundamental cloud service models: IaaS, PaaS, and SaaS. • Exploring the cloud deployment models: Private, Public, Hybrid and Community • Delved into the business needs driving cloud adoption, such as cost efficiency, scalability, flexibility, reliability and security. • Examined the obstacles organizations may encounter when considering cloud adoption, including security concerns, data privacy challenges, and integration complexities. • Finally, we discussed few solutions to mitigate the obstacles to reap the benefits of cloud computing.
  • 28. What you need to do? Write an Article on Edge Computing / Serverless Computing / AI and Machine Learning in the Cloud 1. Post it on your account of medium.com 2. Share the medium post on your LinkedIn profile 3. Add me in your LinkedIn and Tag me in your post Don’t forget to use proper hashtags LinkedIn profile: https://www.linkedin.com/in/marslanalvi/ Deadline: Monday, September 18, 2023 till 6 PM

Editor's Notes

  1. Virtualization: IaaS relies heavily on virtualization technology, where physical hardware resources are abstracted and partitioned into virtual resources. Users can provision and manage these virtual resources as needed. Scalability: One of the primary advantages of IaaS is its scalability. Users can scale resources up or down based on demand, ensuring that they have the computing power they need when they need it. This elasticity is cost-effective and efficient. Self-Service: IaaS platforms often provide self-service portals or APIs, allowing users to provision and manage resources autonomously. Users can create, configure, and manage virtual machines, storage, and networking resources through a web interface or programmatically. Pay-as-You-Go Billing: IaaS typically follows a pay-as-you-go or utility-based pricing model. Users are billed based on their actual resource consumption, which is measured by metrics like CPU usage, storage capacity, and network bandwidth. Customization: Users have control over the operating system, software, and configurations on the virtual machines. This allows for a high degree of customization to meet specific application requirements.
  2. Web Hosting: IaaS can be used to host websites, web applications, and e-commerce platforms, providing the necessary computing power and storage. Development and Testing: Developers often use IaaS for creating and testing applications in isolated environments. Data Backup and Recovery: IaaS offers scalable storage solutions for data backup and disaster recovery. Big Data Processing: It's suitable for running big data analytics, as users can scale resources as needed to process large datasets.
  3. Development Tools: PaaS platforms typically offer a set of development tools, programming languages, libraries, and APIs that enable developers to create applications. Middleware: PaaS often includes middleware services such as databases, messaging systems, and application servers, simplifying application development. Scalability: Like IaaS, PaaS platforms offer scalability, but it is focused on scaling the application itself, not infrastructure components. Developers can easily scale their applications to accommodate changing workloads. Automated Management: PaaS platforms handle many aspects of application management, including load balancing, security, and runtime environments. This reduces the burden on developers and operations teams. Multi-Tenancy: PaaS allows multiple users or organizations to share the same platform while keeping their applications and data isolated.
  4. Web Application Development: PaaS is popular for building web and mobile applications, as it provides development frameworks and tools. Database Management: PaaS platforms often include database services, making it easier to create and manage databases for applications. Continuous Integration and Deployment (CI/CD): PaaS supports automated CI/CD pipelines, enabling seamless application deployment and updates.
  5. Accessibility: SaaS applications are accessible from anywhere with an internet connection and a compatible device, which can be a desktop, laptop, tablet, or smartphone. Subscription-Based: SaaS follows a subscription pricing model. Users pay a regular fee (monthly or annually) to access and use the software. This eliminates the need for upfront software licensing costs. Maintenance and Updates: SaaS providers handle software maintenance, updates, security, and infrastructure management. Users don't need to worry about software patches or upgrades.
  6. Email and Collaboration Tools: Examples include Gmail, Microsoft 365 (formerly Office 365), and Slack. Customer Relationship Management (CRM): Salesforce, HubSpot, and Zoho CRM are popular SaaS CRM solutions. Enterprise Resource Planning (ERP): SaaS ERP systems like NetSuite and SAP Business ByDesign streamline business operations. Cloud Storage and File Sharing: Services like Dropbox and Google Drive offer cloud-based storage and file-sharing capabilities.
  7. In summary, IaaS provides virtualized infrastructure resources, PaaS offers a platform for application development, and SaaS delivers software applications over the internet. Each of these cloud service models has distinct characteristics and use cases, catering to different needs and preferences in the cloud computing landscape.