SlideShare a Scribd company logo
PRESENTATION
ON
CLOUD COMPUTING FROM MANAGERS
PERSPECTIVE
11/4/2022
1
CONTENTS
 Introduction
 What is cloud computing
 Cloud Computing Characteristics
 Benefits of Cloud Computing
 Cloud Services
 Cloud Deployment Models
 Trends in Cloud Computing
 Some of Cloud Players
11/4/2022
2
INTRODUCTION
 With the technology advancement, particularly
ubiquitous high-speed internet connectivity and the
ever-decreasing cost of storage have finally made
the realization of cloud computing.
 Cloud computing denotes the infrastructure as a
cloud in which businesses and users are able to use
applications from anywhere in the world on
demand.
 Thus, computing is being transformed to a model
consisting of services that are commoditized and
delivered in a manner similar to utilities such as
electricity, gas and telephony.
11/4/2022
3
CONTD..
 The NIST working definition summarizes cloud
computing as:
 a model for enabling convenient, on-demand
network access to a shared pool of configurable
computing resources (e.g., networks, servers,
storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction
 Clouds are a large pool of easily usable and
accessible virtualized resources (such as hardware,
development platforms and/or services). These
resources can be dynamically re-configured to
adjust to a variable load (scale), allowing also for
optimum resource utilization. This pool of resources
is typically exploited by a pay-per-use model in
11/4/2022
4
CLOUD CHARACTERISTICS
 Scalability - Cloud computing allows an organization
to scale up or down their IT requirements quickly and
efficiently, without hampering productivity.
 Self-Service and On-demand Service - Cloud
computing is based on self- service and on demand
service models. The user should be able to access
computing capabilities as and when they are needed.
 Quality of Service - Cloud computing must assure
the best service level for users. Services outlined in
the service level agreement must include guarantees
on round the clock availability, adequate resources,
performance and bandwidth.
11/4/2022
5
CONTD..
 Virtualization - It is the technology that abstracts
the coupling between the hardware and operating
system. it refers to the abstraction of logical
resources away from their underlying physical
resources in order to improve agility, flexibility.
 Versatility- Cloud computing does not aim at
certain special application. It can produce various
applications supported by cloud, and one cloud can
support different applications running at the same
time.
11/4/2022
6
CLOUD COMPUTING BENEFIT
 Cloud computing allure business
organization in at least two dimensions.
 Firstly cloud can free companies from
drudgery of building and maintaining IT
infrastructure so that firm can focus on value
creating resources.
 Secondly cloud provide flexibility in the form
of high elastic scalability, enabling
organizations to rapidly increase or decrease
their IT infrastructure as fast as their
11/4/2022
7
TYPES OF CLOUD SERVICES
 Software as a service (SaaS)
 Infrastructure as a Service (IaaS)
 Platform as a Service (PaaS)
11/4/2022
8
SAAS
 This is the most familiar and prolific cloud service of
all.
 It provides any software application as a service
through the cloud.
 Today there is a whole range of software
applications available through SaaS, be it ERP, CRM,
workflow system, document management and
much more.
 The cloud service providers offers these services
and the users pay as they use the same.
11/4/2022
9
IAAS
 IaaS is the delivery of computer infrastructure as a
service.
 This give the organization control over different
resources and applications.
 These resources comprise of storage, hardware,
servers, networking components, etc.
 Apart form the higher flexibility, a key benefit of
IaaS is the usage-based payment scheme.
11/4/2022
10
PAAS
 PaaS is a service delivery model in which service
provider provide developers with a platform
including all the system and environments
comprising the end to end life cycle of developing,
testing deploying and hosting of sophisticated web
applications as a service.
 Cost effectiveness is one of the prime benefits of
PaaS
11/4/2022
11
CLOUD DEPLOYMENT MODELS
 Private Cloud
 Public Cloud
 Hybrid Cloud
11/4/2022
12
PRIVATE CLOUD
 A private cloud refers to having user’s own private
cloud computing infrastructure.
 Instead of relying on an external, public cloud service
provider's infrastructure, user have their own.
 A private cloud is more suited for a large enterprise
because it has already invested heavily in its
infrastructure, data center application etc..
 This model does not bring much it terms of cost
efficiency, still it brings in tremendous value from a
security point of view.
11/4/2022
13
PUBLIC CLOUD
 It refers to the resources (hardware, software,
applications) that a service provide offers over the
internet.
 The deployment of a public cloud computing
system is characterized on the one hand by the
public availability of the cloud service offering and
on the other hand by the public network that is
used to communicate with the cloud service.
 The key benefits of moving to a public cloud is that
user do not have to worry about managing the
underlying IT infrastructure, no security patches or
updates to apply, no software upgrades etc.
11/4/2022
14
HYBRID CLOUD
 As the name implies it is a cloud computing
environment that consists of internal/external
provider i.e. a mix of private and public clouds.
 Secure and critical applications are hosted by
organizations in the private cloud while not so
critical ones are hosted in the public cloud.
11/4/2022
15
CLOUD COMPUTING DEPLOYMENT AND SERVICE
MODELS
11/4/2022
16
SERVICE LEVEL AGREEMENT
 As the customer move towards adopting Service
Oriented Architecture, the quality and reliability of
the service become important aspects.
 A service-level agreement is a negotiated
agreement between two or more parties, where one
is the customer and the others are service
providers.
 The SLA records a common understanding about
services, priorities, responsibilities, guarantees, and
warranties. Each area of service scope should have
the "level of service" defined.
11/4/2022
17
CONTD..
 The SLA may specify the levels of availability,
serviceability, performance, operation, or other
attributes of the service, such as billing.
 The "level of service" can also be specified as
"expected" and "minimum," which allows customers
to be informed what to expect (the minimum), while
providing a measurable (average) target value that
shows the level of organization performance.
 SLAs commonly include segments to address: a
definition of services, performance measurement,
problem management, customer duties, warranties,
disaster recovery, termination of agreement.
11/4/2022
18
TRUST IN CLOUD COMPUTING
 Many enterprise customers are hesitant to buy cloud
offerings due to governance and security concerns.
 Many potential users of cloud services lack confidence
that cloud providers will adequately protect their data
and deliver safe and predictable computing results.
 Customers must trust the security and governance of
the cloud environment in order to have confidence that
their data will be protected and its integrity maintained.
 Many potential cloud customers are also looking for
some level of assurance that appropriate security
measures are indeed being properly implemented in
the daily operations of the cloud infrastructure.
11/4/2022
19
CONT..
 Broadly speaking, trust means an act of faith;
confidence and reliance in something that’s expected
to behave or deliver as promised.
 We trust a system less if it gives us insufficient
information about its expertise. Mere claims such as
“secure cloud” or “trust me” don’t help much to
boost the trust level of consumers unless sufficient
information is presented with the services.
11/4/2022
20
FACTORS THAT EFFECT TRUST
 Control - We do not trust a system less when we
don’t have much control over our assets.
 Ownership - We can also see a variation of trust,
depending on the ownership of data assets.
 Prevention - Trust in cloud computing is related
more to preventing a trust violation than to
guaranteeing compensation when a violation occur.
11/4/2022
21
CONT..
 Security - Security plays a central role in preventing
service failures and cultivating trust in cloud
computing.
 In particular, cloud service providers need to secure
the virtual environment, which enables them to run
services for multiple clients and offer separate
services for different clients.
 In the context of virtualization, the key security
issues include identity management, data leakage
(caused by multiple tenants sharing physical
resources), access control, virtual machine (VM)
protection, persistent client-data security, and the
prevention of cross-VM side-channel attacks.
11/4/2022
22
11/4/2022
23
TRENDS IN CLOUD COMPUTING
 During coming 5 years data stored in various
storage systems will increase by 44 times, with the
current rate of data growth.
 It wouldn't be possible for enterprises to increase
their IT budget and scale up their IT infrastructure
with the information explosion that is happening.
 In such instances, cloud computing is increasingly
being looked at by the enterprises as a great
alternative as it lets them scale up or down, save
organizations money, decrease the time to market.
11/4/2022
24
CONT..
 Cisco estimates
that close to 12
percent of
enterprise
workloads will run
in the cloud by
the end of 2013.
This, in turn, will
yield a market for
public-cloud
services of
approximately
US$43 billion.
11/4/2022
25
ADVANTAGES OF CLOUD SERVICES
Workloa
d Type
Current challenges Advantages of
SaaS/IaaS/PaaS
ERP Spiky resource demand
Customers want to
customize the
application
IaaS provides
flexibility
DSS Seasonal variations and
short term projects
Large data sets
expensive to manage
With adequate
latency (I/O) and
security, IaaS
improves efficiency
11/4/2022
26
11/4/2022
27
Application
development
and testing
Developers
make
unplanned
resource
requests
Requirements
on testing
environments
huge and
volatile
Cloud (IaaS or
PaaS can
improve speed
quality and cost
of development
and testing
CONT..
 Currently the trend is that larger enterprises are
exploring public clouds for support applications such
as Dealer Management Systems, Document
Management System, mailing, CRM and learning
solutions.
 The large enterprises having substantial “On-premise”
IT with many legacy applications and systems are
looking to optimize their IT through private clouds.
 The concept of Hybrid clouds, is yet to gather
momentum. This will happen once public clouds
providers begin to follow open standards that will
enable seamless integration with apps or service
running on premise.
11/4/2022
28
CONT..
 Public clouds that can be accessed cheaply and
without a big IT overhead are likely to be chosen by
small, developer friendly companies.
 Several new cloud security trends are also
emerging. The cloud will enable small companies to
access powerful application, security technologies
through new subscription models.
11/4/2022
29
CONT..
 Public cloud computing will defeat internal
clouds.
 There is not much of a chance that an internal
cloud can possibly provide the same computing
power as a huge public cloud going forward.
 Compared to large public clouds, private clouds
created by companies don’t really seem like clouds
at all, but rather a form of virtualization: nothing
but virtual machines shared by a collection of
employees.
11/4/2022
30
CONT..
 These private systems lack the ability to operate
without a dedicated IT team. This makes adoption
of private clouds less realistic for small businesses.
Private clouds are simply more expensive and less
flexible than the alternative. As a result, private
clouds are not likely to grow in popularity this year.
 Cloud Application Protection:
 The exciting new technology enables companies to
scan and protect the source code on web
applications.
 Application protection repeatedly tests an
application to see if changes in code were made,
11/4/2022
31
CONT..
 Establishing trust in cloud computing will
undoubtedly require identity and data privacy
through encryption. It also require data integrity.
 Advances in cryptography are addressing the issue
of confidentiality.
11/4/2022
32
SOME OF CLOUD PLAYERS
11/4/2022
33
HTTP://AWS.AMAZON.COM/EC2/
11/4/2022
35
HTTP://WWW.3TERA.COM/
HTTP://WWW.FLEXISCALE.COM/
GOOGLE APP ENGINE
HTTP://WWW.SALESFORCE.COM/PLATFORM/
THANK YOU
11/4/2022
40

More Related Content

Similar to Cloud Computing_presentation.pptx

A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
ahmed elmeghiny
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
Ajay844
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
MerisCon ARTDesign
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
inventionjournals
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
Minor33
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
imogokate
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
vishnu varunan
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
cloudresearcher
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Mervat Bamiah
 
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicBenefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Netmagic Solutions Pvt. Ltd.
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computingck4eric
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
IOSR Journals
 
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...
APTRON Solutions Noida
 

Similar to Cloud Computing_presentation.pptx (20)

A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicBenefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – Netmagic
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Cloud Computing_presentation.pptx

  • 1. PRESENTATION ON CLOUD COMPUTING FROM MANAGERS PERSPECTIVE 11/4/2022 1
  • 2. CONTENTS  Introduction  What is cloud computing  Cloud Computing Characteristics  Benefits of Cloud Computing  Cloud Services  Cloud Deployment Models  Trends in Cloud Computing  Some of Cloud Players 11/4/2022 2
  • 3. INTRODUCTION  With the technology advancement, particularly ubiquitous high-speed internet connectivity and the ever-decreasing cost of storage have finally made the realization of cloud computing.  Cloud computing denotes the infrastructure as a cloud in which businesses and users are able to use applications from anywhere in the world on demand.  Thus, computing is being transformed to a model consisting of services that are commoditized and delivered in a manner similar to utilities such as electricity, gas and telephony. 11/4/2022 3
  • 4. CONTD..  The NIST working definition summarizes cloud computing as:  a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction  Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically re-configured to adjust to a variable load (scale), allowing also for optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in 11/4/2022 4
  • 5. CLOUD CHARACTERISTICS  Scalability - Cloud computing allows an organization to scale up or down their IT requirements quickly and efficiently, without hampering productivity.  Self-Service and On-demand Service - Cloud computing is based on self- service and on demand service models. The user should be able to access computing capabilities as and when they are needed.  Quality of Service - Cloud computing must assure the best service level for users. Services outlined in the service level agreement must include guarantees on round the clock availability, adequate resources, performance and bandwidth. 11/4/2022 5
  • 6. CONTD..  Virtualization - It is the technology that abstracts the coupling between the hardware and operating system. it refers to the abstraction of logical resources away from their underlying physical resources in order to improve agility, flexibility.  Versatility- Cloud computing does not aim at certain special application. It can produce various applications supported by cloud, and one cloud can support different applications running at the same time. 11/4/2022 6
  • 7. CLOUD COMPUTING BENEFIT  Cloud computing allure business organization in at least two dimensions.  Firstly cloud can free companies from drudgery of building and maintaining IT infrastructure so that firm can focus on value creating resources.  Secondly cloud provide flexibility in the form of high elastic scalability, enabling organizations to rapidly increase or decrease their IT infrastructure as fast as their 11/4/2022 7
  • 8. TYPES OF CLOUD SERVICES  Software as a service (SaaS)  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS) 11/4/2022 8
  • 9. SAAS  This is the most familiar and prolific cloud service of all.  It provides any software application as a service through the cloud.  Today there is a whole range of software applications available through SaaS, be it ERP, CRM, workflow system, document management and much more.  The cloud service providers offers these services and the users pay as they use the same. 11/4/2022 9
  • 10. IAAS  IaaS is the delivery of computer infrastructure as a service.  This give the organization control over different resources and applications.  These resources comprise of storage, hardware, servers, networking components, etc.  Apart form the higher flexibility, a key benefit of IaaS is the usage-based payment scheme. 11/4/2022 10
  • 11. PAAS  PaaS is a service delivery model in which service provider provide developers with a platform including all the system and environments comprising the end to end life cycle of developing, testing deploying and hosting of sophisticated web applications as a service.  Cost effectiveness is one of the prime benefits of PaaS 11/4/2022 11
  • 12. CLOUD DEPLOYMENT MODELS  Private Cloud  Public Cloud  Hybrid Cloud 11/4/2022 12
  • 13. PRIVATE CLOUD  A private cloud refers to having user’s own private cloud computing infrastructure.  Instead of relying on an external, public cloud service provider's infrastructure, user have their own.  A private cloud is more suited for a large enterprise because it has already invested heavily in its infrastructure, data center application etc..  This model does not bring much it terms of cost efficiency, still it brings in tremendous value from a security point of view. 11/4/2022 13
  • 14. PUBLIC CLOUD  It refers to the resources (hardware, software, applications) that a service provide offers over the internet.  The deployment of a public cloud computing system is characterized on the one hand by the public availability of the cloud service offering and on the other hand by the public network that is used to communicate with the cloud service.  The key benefits of moving to a public cloud is that user do not have to worry about managing the underlying IT infrastructure, no security patches or updates to apply, no software upgrades etc. 11/4/2022 14
  • 15. HYBRID CLOUD  As the name implies it is a cloud computing environment that consists of internal/external provider i.e. a mix of private and public clouds.  Secure and critical applications are hosted by organizations in the private cloud while not so critical ones are hosted in the public cloud. 11/4/2022 15
  • 16. CLOUD COMPUTING DEPLOYMENT AND SERVICE MODELS 11/4/2022 16
  • 17. SERVICE LEVEL AGREEMENT  As the customer move towards adopting Service Oriented Architecture, the quality and reliability of the service become important aspects.  A service-level agreement is a negotiated agreement between two or more parties, where one is the customer and the others are service providers.  The SLA records a common understanding about services, priorities, responsibilities, guarantees, and warranties. Each area of service scope should have the "level of service" defined. 11/4/2022 17
  • 18. CONTD..  The SLA may specify the levels of availability, serviceability, performance, operation, or other attributes of the service, such as billing.  The "level of service" can also be specified as "expected" and "minimum," which allows customers to be informed what to expect (the minimum), while providing a measurable (average) target value that shows the level of organization performance.  SLAs commonly include segments to address: a definition of services, performance measurement, problem management, customer duties, warranties, disaster recovery, termination of agreement. 11/4/2022 18
  • 19. TRUST IN CLOUD COMPUTING  Many enterprise customers are hesitant to buy cloud offerings due to governance and security concerns.  Many potential users of cloud services lack confidence that cloud providers will adequately protect their data and deliver safe and predictable computing results.  Customers must trust the security and governance of the cloud environment in order to have confidence that their data will be protected and its integrity maintained.  Many potential cloud customers are also looking for some level of assurance that appropriate security measures are indeed being properly implemented in the daily operations of the cloud infrastructure. 11/4/2022 19
  • 20. CONT..  Broadly speaking, trust means an act of faith; confidence and reliance in something that’s expected to behave or deliver as promised.  We trust a system less if it gives us insufficient information about its expertise. Mere claims such as “secure cloud” or “trust me” don’t help much to boost the trust level of consumers unless sufficient information is presented with the services. 11/4/2022 20
  • 21. FACTORS THAT EFFECT TRUST  Control - We do not trust a system less when we don’t have much control over our assets.  Ownership - We can also see a variation of trust, depending on the ownership of data assets.  Prevention - Trust in cloud computing is related more to preventing a trust violation than to guaranteeing compensation when a violation occur. 11/4/2022 21
  • 22. CONT..  Security - Security plays a central role in preventing service failures and cultivating trust in cloud computing.  In particular, cloud service providers need to secure the virtual environment, which enables them to run services for multiple clients and offer separate services for different clients.  In the context of virtualization, the key security issues include identity management, data leakage (caused by multiple tenants sharing physical resources), access control, virtual machine (VM) protection, persistent client-data security, and the prevention of cross-VM side-channel attacks. 11/4/2022 22
  • 24. TRENDS IN CLOUD COMPUTING  During coming 5 years data stored in various storage systems will increase by 44 times, with the current rate of data growth.  It wouldn't be possible for enterprises to increase their IT budget and scale up their IT infrastructure with the information explosion that is happening.  In such instances, cloud computing is increasingly being looked at by the enterprises as a great alternative as it lets them scale up or down, save organizations money, decrease the time to market. 11/4/2022 24
  • 25. CONT..  Cisco estimates that close to 12 percent of enterprise workloads will run in the cloud by the end of 2013. This, in turn, will yield a market for public-cloud services of approximately US$43 billion. 11/4/2022 25
  • 26. ADVANTAGES OF CLOUD SERVICES Workloa d Type Current challenges Advantages of SaaS/IaaS/PaaS ERP Spiky resource demand Customers want to customize the application IaaS provides flexibility DSS Seasonal variations and short term projects Large data sets expensive to manage With adequate latency (I/O) and security, IaaS improves efficiency 11/4/2022 26
  • 27. 11/4/2022 27 Application development and testing Developers make unplanned resource requests Requirements on testing environments huge and volatile Cloud (IaaS or PaaS can improve speed quality and cost of development and testing
  • 28. CONT..  Currently the trend is that larger enterprises are exploring public clouds for support applications such as Dealer Management Systems, Document Management System, mailing, CRM and learning solutions.  The large enterprises having substantial “On-premise” IT with many legacy applications and systems are looking to optimize their IT through private clouds.  The concept of Hybrid clouds, is yet to gather momentum. This will happen once public clouds providers begin to follow open standards that will enable seamless integration with apps or service running on premise. 11/4/2022 28
  • 29. CONT..  Public clouds that can be accessed cheaply and without a big IT overhead are likely to be chosen by small, developer friendly companies.  Several new cloud security trends are also emerging. The cloud will enable small companies to access powerful application, security technologies through new subscription models. 11/4/2022 29
  • 30. CONT..  Public cloud computing will defeat internal clouds.  There is not much of a chance that an internal cloud can possibly provide the same computing power as a huge public cloud going forward.  Compared to large public clouds, private clouds created by companies don’t really seem like clouds at all, but rather a form of virtualization: nothing but virtual machines shared by a collection of employees. 11/4/2022 30
  • 31. CONT..  These private systems lack the ability to operate without a dedicated IT team. This makes adoption of private clouds less realistic for small businesses. Private clouds are simply more expensive and less flexible than the alternative. As a result, private clouds are not likely to grow in popularity this year.  Cloud Application Protection:  The exciting new technology enables companies to scan and protect the source code on web applications.  Application protection repeatedly tests an application to see if changes in code were made, 11/4/2022 31
  • 32. CONT..  Establishing trust in cloud computing will undoubtedly require identity and data privacy through encryption. It also require data integrity.  Advances in cryptography are addressing the issue of confidentiality. 11/4/2022 32
  • 33. SOME OF CLOUD PLAYERS 11/4/2022 33