SlideShare a Scribd company logo
CloudComputing
SkyDrive
Or
Contents
Introduction
What is Sky Drive
Architecture of SkyDrive
How Sky Drive works
Need of Sky Drive
Hardware and Software
Advantages
Disadvantages
Some Pitchers Related With Skydrive
Conclusion
Introduction
Today's technology and we..
Data Storing technologies
what is Sky Drive?
Main Aim
Definition
The term SkyDrive refers to a Network or Internet. In other words, we can say that SkyDrive is
something, which is present at remote location. SkyDrive can provide services over public and p
rivate
networks, i.e., WAN, LAN or VPN(virtual private network).
Microsoft
Microsoft account holders can store any type of data in the SkyDrive, provided the uploaded data i
s compliant with the SkyDrive terms and conditions, and usage policies.
Architecture of Sky Drive
How it works?
Need of Sky Drive
Everyone wants to work smarter, and SkyDrive helps users and organizations
do so in two ways: file sharing and access. It takes only a few clicks to share a
nd access files using a number of compatible devices and from almost any geo
graphical location.
1: Ease of use 2: Few requirements
3: Quick setup 4: SkyDrive Desktop
5: One-click access 6: Easy file access
7: Plenty of room 8: Lightweight apps
9: Simultaneous sharing 10: Tight security
11: Third-party add-ons 12: Remote access
Hardware and Software
Advantages of Skydrive
1.Lower computer costs 2. Reduced software costs
3. Unlimited storage capacity 4. Universal document access
5. Easier group collaboration 6.Improved performance
7.Instant software updates 8.Increased data reliability
9.Latest version availability 10.Device independence
Disadvantages of Skydrive
Requires a constant Internet connection
Does not work well with low-speed connections
Features might be limited
Can be slow
Stored data might not be secure
Stored data can be lost
SkyDrive's Server Farms
•All data files and folders that you store at the SkyDrive cluster of data farms will b
e stored in two locations for redundancy.
Desktop Look Of SkyDrive
Inner Look Of SkyDrive
Conclusion
Although Cloud computing can be seen as a new phenomenon which is set to re
volutionize the way we use the Internet, there is much to be cautious about. There
are many new technologies emerging at a rapid rate, each with technological ad
vancements and with the potential of making human’s lives easier. However, one
must be very careful to understand the security risks and challenges posed in uti
lizing these technologies. Cloud computing is no exception. In this PPT key securi
ty considerations and challenges which are currently faced in the Cloud computin
g are highlighted. Cloud computing has the potential to become a frontrunner in
promoting a secure, virtual and economically viable IT solution in the future.
Video..
Final cloud computing

More Related Content

What's hot

Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
Predictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesPredictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesVeritas Technologies LLC
 
Rama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessRama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessVeritas Technologies LLC
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsVeritas Technologies LLC
 
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인StartupAlliance
 
Mastering the move
Mastering the moveMastering the move
Mastering the moveTrivadis
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Trivadis - Microsoft Transform your data estate with cloud, data and AI
Trivadis - Microsoft Transform your data estate with cloud, data and AITrivadis - Microsoft Transform your data estate with cloud, data and AI
Trivadis - Microsoft Transform your data estate with cloud, data and AITrivadis
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Veritas Technologies LLC
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyVeritas Technologies LLC
 
No sql understanding
No sql understandingNo sql understanding
No sql understandingVivek Mishra
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...Veritas Technologies LLC
 
Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Veritas Technologies LLC
 
What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?Safe Swiss Cloud
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointVeritas Technologies LLC
 
Cloud Connected – delivering reliability in a hybrid cloud environment
Cloud Connected – delivering reliability in a hybrid cloud environmentCloud Connected – delivering reliability in a hybrid cloud environment
Cloud Connected – delivering reliability in a hybrid cloud environmentSafe Swiss Cloud
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Veritas Technologies LLC
 
10 Good Reasons - NetApp Data Fabric
10 Good Reasons - NetApp Data Fabric10 Good Reasons - NetApp Data Fabric
10 Good Reasons - NetApp Data FabricNetAppUK
 

What's hot (20)

Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Predictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesPredictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web Services
 
Rama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessRama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital business
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
 
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
 
Mastering the move
Mastering the moveMastering the move
Mastering the move
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Trivadis - Microsoft Transform your data estate with cloud, data and AI
Trivadis - Microsoft Transform your data estate with cloud, data and AITrivadis - Microsoft Transform your data estate with cloud, data and AI
Trivadis - Microsoft Transform your data estate with cloud, data and AI
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 
No sql understanding
No sql understandingNo sql understanding
No sql understanding
 
Digitalocean
DigitaloceanDigitalocean
Digitalocean
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.
 
What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPoint
 
Cloud Connected – delivering reliability in a hybrid cloud environment
Cloud Connected – delivering reliability in a hybrid cloud environmentCloud Connected – delivering reliability in a hybrid cloud environment
Cloud Connected – delivering reliability in a hybrid cloud environment
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
 
10 Good Reasons - NetApp Data Fabric
10 Good Reasons - NetApp Data Fabric10 Good Reasons - NetApp Data Fabric
10 Good Reasons - NetApp Data Fabric
 
True IDC Share
True IDC ShareTrue IDC Share
True IDC Share
 

Viewers also liked

RDF Database-as-a-Service with S4
RDF Database-as-a-Service with S4RDF Database-as-a-Service with S4
RDF Database-as-a-Service with S4Marin Dimitrov
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Viewers also liked (6)

Other delivery models
Other delivery modelsOther delivery models
Other delivery models
 
Skydrive
SkydriveSkydrive
Skydrive
 
SkyDrive Pro Details
SkyDrive Pro DetailsSkyDrive Pro Details
SkyDrive Pro Details
 
RDF Database-as-a-Service with S4
RDF Database-as-a-Service with S4RDF Database-as-a-Service with S4
RDF Database-as-a-Service with S4
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Final cloud computing

cloud computing
cloud computingcloud computing
cloud computingnewme19
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
Internship Presentation.pptx
Internship Presentation.pptxInternship Presentation.pptx
Internship Presentation.pptxjisogo
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Level up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using RubrikLevel up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using RubrikJaap Brasser
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
IRJET- Cloud Computing with Encryption
IRJET-  	  Cloud Computing with EncryptionIRJET-  	  Cloud Computing with Encryption
IRJET- Cloud Computing with EncryptionIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing NASIMTAHIR2
 
The Last Frontier- Virtualization, Hybrid Management and the Cloud
The Last Frontier-  Virtualization, Hybrid Management and the CloudThe Last Frontier-  Virtualization, Hybrid Management and the Cloud
The Last Frontier- Virtualization, Hybrid Management and the CloudKellyn Pot'Vin-Gorman
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashankShashank Shekhar
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 

Similar to Final cloud computing (20)

oracle.pptx
oracle.pptxoracle.pptx
oracle.pptx
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
NIDHI KULKARNI.pptx
NIDHI KULKARNI.pptxNIDHI KULKARNI.pptx
NIDHI KULKARNI.pptx
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Internship Presentation.pptx
Internship Presentation.pptxInternship Presentation.pptx
Internship Presentation.pptx
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
U04503119122
U04503119122U04503119122
U04503119122
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Level up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using RubrikLevel up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using Rubrik
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
IRJET- Cloud Computing with Encryption
IRJET-  	  Cloud Computing with EncryptionIRJET-  	  Cloud Computing with Encryption
IRJET- Cloud Computing with Encryption
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
The Last Frontier- Virtualization, Hybrid Management and the Cloud
The Last Frontier-  Virtualization, Hybrid Management and the CloudThe Last Frontier-  Virtualization, Hybrid Management and the Cloud
The Last Frontier- Virtualization, Hybrid Management and the Cloud
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashank
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 

Final cloud computing

  • 2. Contents Introduction What is Sky Drive Architecture of SkyDrive How Sky Drive works Need of Sky Drive Hardware and Software Advantages Disadvantages Some Pitchers Related With Skydrive Conclusion
  • 3. Introduction Today's technology and we.. Data Storing technologies
  • 4. what is Sky Drive? Main Aim Definition The term SkyDrive refers to a Network or Internet. In other words, we can say that SkyDrive is something, which is present at remote location. SkyDrive can provide services over public and p rivate networks, i.e., WAN, LAN or VPN(virtual private network). Microsoft Microsoft account holders can store any type of data in the SkyDrive, provided the uploaded data i s compliant with the SkyDrive terms and conditions, and usage policies.
  • 7. Need of Sky Drive Everyone wants to work smarter, and SkyDrive helps users and organizations do so in two ways: file sharing and access. It takes only a few clicks to share a nd access files using a number of compatible devices and from almost any geo graphical location. 1: Ease of use 2: Few requirements 3: Quick setup 4: SkyDrive Desktop 5: One-click access 6: Easy file access 7: Plenty of room 8: Lightweight apps 9: Simultaneous sharing 10: Tight security 11: Third-party add-ons 12: Remote access
  • 9. Advantages of Skydrive 1.Lower computer costs 2. Reduced software costs 3. Unlimited storage capacity 4. Universal document access 5. Easier group collaboration 6.Improved performance 7.Instant software updates 8.Increased data reliability 9.Latest version availability 10.Device independence
  • 10. Disadvantages of Skydrive Requires a constant Internet connection Does not work well with low-speed connections Features might be limited Can be slow Stored data might not be secure Stored data can be lost
  • 11. SkyDrive's Server Farms •All data files and folders that you store at the SkyDrive cluster of data farms will b e stored in two locations for redundancy.
  • 12.
  • 13. Desktop Look Of SkyDrive
  • 14. Inner Look Of SkyDrive
  • 15. Conclusion Although Cloud computing can be seen as a new phenomenon which is set to re volutionize the way we use the Internet, there is much to be cautious about. There are many new technologies emerging at a rapid rate, each with technological ad vancements and with the potential of making human’s lives easier. However, one must be very careful to understand the security risks and challenges posed in uti lizing these technologies. Cloud computing is no exception. In this PPT key securi ty considerations and challenges which are currently faced in the Cloud computin g are highlighted. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution in the future.