The document provides an overview of cloud computing, including:
1) Cloud computing involves using networked computers and virtualization to provide on-demand services and resources over the internet. It aims to provide cheap, scalable computing resources to users.
2) Key aspects include vast data centers and resource pools that users can dynamically access on-demand, with resources that tend to be priced like utilities based on usage.
3) Cloud computing delivers resources, platforms, and software as services through models like SaaS, PaaS, and IaaS, using virtualization technology and computer clusters behind interfaces like web services.
Chapter 1 Introduction to Cloud Computingnewbie2019
The document discusses cloud computing, including definitions from various sources, properties and characteristics of cloud computing, and service and deployment models. It defines cloud computing as on-demand access to shared configurable computing resources over the internet. The key properties discussed are high scalability, availability, reliability, manageability, interoperability, accessibility, and optimization through techniques like virtualization, parallel computing, and load balancing. It outlines service models of SaaS, PaaS, and IaaS and deployment models of private, public, hybrid and community clouds.
Cloud computing refers to accessing software and data storage over the internet rather than locally. There are three main types of cloud services - Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides end users access to online applications, PaaS provides developers platforms to build apps, and IaaS provides network architects computational resources like storage, servers, and networking. Cloud computing offers advantages like reduced costs, scalability, and accessibility but also risks like dependence on providers and potential performance issues.
Shift to Application & Infrastructure Hostingtechzimslides
- Dandemutande deployed a tier 3 data center in 2011 to provide infrastructure hosting for cloud services like Microsoft Exchange, Symantec security solutions, and Zimbra email. They also offer software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS).
- There is a shift toward the cloud and hybrid cloud models for cost savings, scalability, and reduced provisioning times. However, local hosting provides benefits like improved latency, bandwidth requirements, regulatory factors, and customer support.
- Key considerations for enterprises moving to the cloud include security, data volume, organizational readiness, and developing comprehensive IT policies. Reliable broadband is also essential
This document discusses cloud computing and its potential applications and benefits for libraries. It begins by defining cloud computing as the delivery of computing resources such as storage, software, and processing over a network. It then outlines different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Examples of each service model are provided. The document also discusses characteristics of cloud computing such as rapid elasticity, resource pooling, and pay-per-use billing. Potential uses for libraries are suggested, such as using cloud services for storage or hosting applications like WordPress or Omeka. Security concerns with cloud services are also briefly addressed.
This document provides an overview of cloud computing. It introduces Nathaniel Gates and Keith Dobson, who will discuss cloud computing. The agenda includes an overview of cloud computing, why it is relevant now, how to get started, and the future of IT in Alaska. Cloud computing provides on-demand computing resources over the internet. It can save companies money compared to traditional infrastructure models by providing flexibility and scaling. There are different types of cloud including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Cloud adoption is growing rapidly and expected to continue growing strongly in coming years.
The document defines cloud computing and discusses its key characteristics and service models. It outlines the different types of cloud deployments including public, private, community, and hybrid clouds. It also discusses the advantages of cloud computing such as cost savings, scalability, and device independence, as well as concerns around internet dependency and vendor lock-in.
Cloud computing provides various advantages such as reduced costs, improved scalability, mobility and collaboration. However, migrating to the cloud also presents some challenges including security concerns, vendor lock-in, integration issues, and loss of control over IT resources. A successful cloud migration requires careful planning and execution of key stages - planning the project, executing the migration, and monitoring outcomes. It is also important to start small, trust cloud vendors to protect data, maintain user identity management, and plan for potential latency and outages.
The document provides an overview of cloud computing, including:
1) Cloud computing involves using networked computers and virtualization to provide on-demand services and resources over the internet. It aims to provide cheap, scalable computing resources to users.
2) Key aspects include vast data centers and resource pools that users can dynamically access on-demand, with resources that tend to be priced like utilities based on usage.
3) Cloud computing delivers resources, platforms, and software as services through models like SaaS, PaaS, and IaaS, using virtualization technology and computer clusters behind interfaces like web services.
Chapter 1 Introduction to Cloud Computingnewbie2019
The document discusses cloud computing, including definitions from various sources, properties and characteristics of cloud computing, and service and deployment models. It defines cloud computing as on-demand access to shared configurable computing resources over the internet. The key properties discussed are high scalability, availability, reliability, manageability, interoperability, accessibility, and optimization through techniques like virtualization, parallel computing, and load balancing. It outlines service models of SaaS, PaaS, and IaaS and deployment models of private, public, hybrid and community clouds.
Cloud computing refers to accessing software and data storage over the internet rather than locally. There are three main types of cloud services - Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides end users access to online applications, PaaS provides developers platforms to build apps, and IaaS provides network architects computational resources like storage, servers, and networking. Cloud computing offers advantages like reduced costs, scalability, and accessibility but also risks like dependence on providers and potential performance issues.
Shift to Application & Infrastructure Hostingtechzimslides
- Dandemutande deployed a tier 3 data center in 2011 to provide infrastructure hosting for cloud services like Microsoft Exchange, Symantec security solutions, and Zimbra email. They also offer software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS).
- There is a shift toward the cloud and hybrid cloud models for cost savings, scalability, and reduced provisioning times. However, local hosting provides benefits like improved latency, bandwidth requirements, regulatory factors, and customer support.
- Key considerations for enterprises moving to the cloud include security, data volume, organizational readiness, and developing comprehensive IT policies. Reliable broadband is also essential
This document discusses cloud computing and its potential applications and benefits for libraries. It begins by defining cloud computing as the delivery of computing resources such as storage, software, and processing over a network. It then outlines different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Examples of each service model are provided. The document also discusses characteristics of cloud computing such as rapid elasticity, resource pooling, and pay-per-use billing. Potential uses for libraries are suggested, such as using cloud services for storage or hosting applications like WordPress or Omeka. Security concerns with cloud services are also briefly addressed.
This document provides an overview of cloud computing. It introduces Nathaniel Gates and Keith Dobson, who will discuss cloud computing. The agenda includes an overview of cloud computing, why it is relevant now, how to get started, and the future of IT in Alaska. Cloud computing provides on-demand computing resources over the internet. It can save companies money compared to traditional infrastructure models by providing flexibility and scaling. There are different types of cloud including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Cloud adoption is growing rapidly and expected to continue growing strongly in coming years.
The document defines cloud computing and discusses its key characteristics and service models. It outlines the different types of cloud deployments including public, private, community, and hybrid clouds. It also discusses the advantages of cloud computing such as cost savings, scalability, and device independence, as well as concerns around internet dependency and vendor lock-in.
Cloud computing provides various advantages such as reduced costs, improved scalability, mobility and collaboration. However, migrating to the cloud also presents some challenges including security concerns, vendor lock-in, integration issues, and loss of control over IT resources. A successful cloud migration requires careful planning and execution of key stages - planning the project, executing the migration, and monitoring outcomes. It is also important to start small, trust cloud vendors to protect data, maintain user identity management, and plan for potential latency and outages.
Cloud computing refers to accessing computer resources such as data storage and processing power via the internet rather than a direct connection to a physical server or device. Key aspects of cloud computing include on-demand access to scalable and virtualized resources, utility-based pricing, and centralized management. Major cloud providers offer infrastructure, platform, and software services that allow users and organizations to access applications and store data remotely.
The document discusses cloud computing and its benefits, including increased flexibility and reduced costs. It notes that cloud computing provides standardized offerings that can rapidly scale resources in a flexible and easy-to-access manner. The document outlines a strategy for developing a cloud architecture and implementation plan to help organizations manage IT challenges and realize the opportunities of cloud computing.
The document discusses cloud enablement and IT service models. It defines different types of cloud including private, public, and hybrid clouds. It outlines the key benefits of cloud such as scalability, cost savings, and speed of innovation. The document then presents four characteristics of IT services - commodity, agile, scale, and growth - and provides examples of how different types of IT systems and applications align with these characteristics and a cloud strategy. Finally, contact information is provided for Vishal Sharma.
This document provides an architectural overview of cloud computing and describes how a payroll processing application could be migrated to the cloud. It discusses the key attributes and layers of cloud computing including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then describes how the existing payroll application, which is installed at over 300 locations, could be deployed as a multi-tenant SaaS application in the cloud to reduce costs and maintenance burdens. The document outlines how the application's components would map to a SaaS architecture and how new tenants could be provisioned.
Emergence of cloud computing and internet of things an overviewSelvaraj Kesavan
This document provides an overview of cloud computing and the Internet of Things (IoT). It defines cloud computing as the on-demand delivery of computing resources over the Internet. It describes the common cloud service models of SaaS, PaaS, and IaaS. It also discusses characteristics of cloud computing like resource pooling, elasticity, and measured service. The document then introduces IoT and describes components of an IoT system including sensors, gateways, communication protocols, cloud platforms, and applications. It provides examples of services from major cloud platforms and discusses tools for visualizing IoT data.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud computing provides opportunities for lower costs and more flexibility compared to traditional computing but also raises security and control concerns when sensitive data and applications are moved to external providers.
The document provides an overview of cloud computing, including definitions, models, advantages, disadvantages, characteristics, and applications. It discusses the history of cloud computing concepts dating back to the 1960s. The key models of cloud computing are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document outlines the advantages of cloud computing like reduced costs, scalability, and accessibility, as well as disadvantages around security, internet dependence, and speed. Common characteristics are pooled computing resources, virtualization, elastic scaling, flexible pricing, and resources delivered as a service. The future of cloud computing is predicted to include increased customization, mission-critical applications in the
The document discusses the cloud ecosystem, including concepts of cloud computing, technologies like virtualization and service-oriented architecture, security considerations, challenges around data protection and management capabilities, and benefits such as reduced costs and increased flexibility. Cloud computing provides on-demand access to shared computing resources over a network in various service models like SaaS, PaaS and IaaS. While cloud offers benefits, challenges remain around data security, availability and regulatory compliance.
Cloud computing allows users to access applications and store data on remote servers accessed through the internet rather than installing software locally. Examples include web-based email services like Gmail where users access their accounts through a web interface rather than storing email on their own computer. Cloud computing systems divide the front end, which users access, from the back end servers. Services are provided through various models including Software as a Service (SaaS), Platform as a Service (PaaS), and Hardware as a Service (HaaS). Cloud deployment can be private, only for a single organization, public for any user, or hybrid using both public and private systems.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It delivers hardware and software on an as-needed basis from a remote location. Key advantages include lower costs, improved collaboration and universal access to documents from any device with an internet connection. However, cloud computing also relies on a constant internet connection to function and data security in the cloud cannot be guaranteed.
- Salesforce is a CRM company that has expanded into other areas through acquisitions. It was ranked 52nd on Fortune's 100 Best Companies to Work For in 2011.
- The document discusses cloud computing, defining it as a style of computing that provides dynamism, abstraction, and resource sharing. It allows resources to expand or contract based on changing needs.
- Cloud services are divided into 3 models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides the basic cloud infrastructure, PaaS provides platforms for developers, and SaaS provides applications for end users.
This document provides an introduction to cloud computing. It defines cloud computing as IT services delivered on demand over the internet. Resources are pooled and accessed virtually, allowing for flexible scaling. The main advantages are reduced costs since users no longer need to maintain their own infrastructure, and pay only for what they use. Various cloud models are described including SaaS, PaaS, and IaaS. Careers in cloud computing involve roles in areas like provisioning, monitoring, security, virtualization, and software architecture.
The document discusses the shift in the IT industry towards cloud computing. It notes that cloud computing represents a new deployment option that offers flexible consumption of computing resources and storage on demand. While cloud computing promises potential cost savings and business agility, organizations need to carefully assess which workloads and applications are suitable for a cloud environment versus maintaining existing on-premises infrastructure. A hybrid approach that combines on-premises systems with cloud-based services may provide the optimal solution for most businesses.
This document provides an overview of cloud computing presented by Dan Haurey, President and Founder of Exigent Technologies. The agenda includes defining cloud computing, demystifying cloud terms and acronyms, making the business case for cloud, understanding options and conducting a proper return on investment analysis. Key points covered are public versus private cloud models, software as a service, platform as a service and infrastructure as a service models, benefits to stakeholders like reduced costs and increased productivity, and factors to consider when vetting cloud providers. The presentation promotes Exigent's private cloud "Turnkey Cloud" platform and shares a success story with Tri-County Orthopedics who moved to Exigent's cloud.
Data continues to grow exponentially – especially with the advent of social content. Approximately 70% of data is unstructured. This impacts on storage costs and management, Data Protection, and SLAs.
New deployment options such as cloud provide alternatives but how do you know what you should move to the cloud?
This document provides an overview of cloud computing. It defines cloud computing as network-based computing that takes place over the Internet, providing hardware, software, and networking services to clients. Key characteristics of cloud computing include on-demand services that are available anywhere and anytime, elastic scaling, and pay-as-you-go pricing. The document discusses different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers advantages such as lower costs, improved performance and collaboration, and unlimited storage, as well as disadvantages like reliance on internet connectivity and potential security and data loss issues.
Cloud computing is a general term for internet-based computing where shared servers provide resources, software, and data to computers and other devices on demand. It provides scalable and elastic resources, accessible from anywhere on the internet. Key characteristics include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud services can be software, platforms, or infrastructure delivered as a service via private, public or hybrid clouds.
This document provides an overview of cloud computing. It defines cloud computing as network-based computing that takes place over the Internet, providing hardware, software, and networking services to clients. Key characteristics of cloud computing include on-demand services that are available anywhere and anytime, elastic scaling, and pay-as-you-go pricing. The document discusses different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers advantages such as lower costs, improved performance and collaboration, and unlimited storage, as well as disadvantages like reliance on internet connectivity and potential security and data loss issues.
Cloud computing refers to delivering computing services over the internet. It allows users to access resources and services on-demand without needing to manage physical infrastructure. There are three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtual computing resources, PaaS offers platforms for developing applications, and SaaS delivers software through web browsers. Cloud deployment models include public, private, hybrid, community, and multi-cloud options.
This document discusses various cloud deployment models and categories of cloud computing services. It provides details on public, private, hybrid, and community cloud models, comparing their advantages and disadvantages. Additionally, it describes the three main categories of cloud services - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Public clouds promote standardization and flexibility while private clouds attempt customization and higher efficiency. Hybrid clouds operate with compromises around resource sharing.
Cloud computing refers to accessing computer resources such as data storage and processing power via the internet rather than a direct connection to a physical server or device. Key aspects of cloud computing include on-demand access to scalable and virtualized resources, utility-based pricing, and centralized management. Major cloud providers offer infrastructure, platform, and software services that allow users and organizations to access applications and store data remotely.
The document discusses cloud computing and its benefits, including increased flexibility and reduced costs. It notes that cloud computing provides standardized offerings that can rapidly scale resources in a flexible and easy-to-access manner. The document outlines a strategy for developing a cloud architecture and implementation plan to help organizations manage IT challenges and realize the opportunities of cloud computing.
The document discusses cloud enablement and IT service models. It defines different types of cloud including private, public, and hybrid clouds. It outlines the key benefits of cloud such as scalability, cost savings, and speed of innovation. The document then presents four characteristics of IT services - commodity, agile, scale, and growth - and provides examples of how different types of IT systems and applications align with these characteristics and a cloud strategy. Finally, contact information is provided for Vishal Sharma.
This document provides an architectural overview of cloud computing and describes how a payroll processing application could be migrated to the cloud. It discusses the key attributes and layers of cloud computing including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then describes how the existing payroll application, which is installed at over 300 locations, could be deployed as a multi-tenant SaaS application in the cloud to reduce costs and maintenance burdens. The document outlines how the application's components would map to a SaaS architecture and how new tenants could be provisioned.
Emergence of cloud computing and internet of things an overviewSelvaraj Kesavan
This document provides an overview of cloud computing and the Internet of Things (IoT). It defines cloud computing as the on-demand delivery of computing resources over the Internet. It describes the common cloud service models of SaaS, PaaS, and IaaS. It also discusses characteristics of cloud computing like resource pooling, elasticity, and measured service. The document then introduces IoT and describes components of an IoT system including sensors, gateways, communication protocols, cloud platforms, and applications. It provides examples of services from major cloud platforms and discusses tools for visualizing IoT data.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud computing provides opportunities for lower costs and more flexibility compared to traditional computing but also raises security and control concerns when sensitive data and applications are moved to external providers.
The document provides an overview of cloud computing, including definitions, models, advantages, disadvantages, characteristics, and applications. It discusses the history of cloud computing concepts dating back to the 1960s. The key models of cloud computing are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document outlines the advantages of cloud computing like reduced costs, scalability, and accessibility, as well as disadvantages around security, internet dependence, and speed. Common characteristics are pooled computing resources, virtualization, elastic scaling, flexible pricing, and resources delivered as a service. The future of cloud computing is predicted to include increased customization, mission-critical applications in the
The document discusses the cloud ecosystem, including concepts of cloud computing, technologies like virtualization and service-oriented architecture, security considerations, challenges around data protection and management capabilities, and benefits such as reduced costs and increased flexibility. Cloud computing provides on-demand access to shared computing resources over a network in various service models like SaaS, PaaS and IaaS. While cloud offers benefits, challenges remain around data security, availability and regulatory compliance.
Cloud computing allows users to access applications and store data on remote servers accessed through the internet rather than installing software locally. Examples include web-based email services like Gmail where users access their accounts through a web interface rather than storing email on their own computer. Cloud computing systems divide the front end, which users access, from the back end servers. Services are provided through various models including Software as a Service (SaaS), Platform as a Service (PaaS), and Hardware as a Service (HaaS). Cloud deployment can be private, only for a single organization, public for any user, or hybrid using both public and private systems.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It delivers hardware and software on an as-needed basis from a remote location. Key advantages include lower costs, improved collaboration and universal access to documents from any device with an internet connection. However, cloud computing also relies on a constant internet connection to function and data security in the cloud cannot be guaranteed.
- Salesforce is a CRM company that has expanded into other areas through acquisitions. It was ranked 52nd on Fortune's 100 Best Companies to Work For in 2011.
- The document discusses cloud computing, defining it as a style of computing that provides dynamism, abstraction, and resource sharing. It allows resources to expand or contract based on changing needs.
- Cloud services are divided into 3 models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides the basic cloud infrastructure, PaaS provides platforms for developers, and SaaS provides applications for end users.
This document provides an introduction to cloud computing. It defines cloud computing as IT services delivered on demand over the internet. Resources are pooled and accessed virtually, allowing for flexible scaling. The main advantages are reduced costs since users no longer need to maintain their own infrastructure, and pay only for what they use. Various cloud models are described including SaaS, PaaS, and IaaS. Careers in cloud computing involve roles in areas like provisioning, monitoring, security, virtualization, and software architecture.
The document discusses the shift in the IT industry towards cloud computing. It notes that cloud computing represents a new deployment option that offers flexible consumption of computing resources and storage on demand. While cloud computing promises potential cost savings and business agility, organizations need to carefully assess which workloads and applications are suitable for a cloud environment versus maintaining existing on-premises infrastructure. A hybrid approach that combines on-premises systems with cloud-based services may provide the optimal solution for most businesses.
This document provides an overview of cloud computing presented by Dan Haurey, President and Founder of Exigent Technologies. The agenda includes defining cloud computing, demystifying cloud terms and acronyms, making the business case for cloud, understanding options and conducting a proper return on investment analysis. Key points covered are public versus private cloud models, software as a service, platform as a service and infrastructure as a service models, benefits to stakeholders like reduced costs and increased productivity, and factors to consider when vetting cloud providers. The presentation promotes Exigent's private cloud "Turnkey Cloud" platform and shares a success story with Tri-County Orthopedics who moved to Exigent's cloud.
Data continues to grow exponentially – especially with the advent of social content. Approximately 70% of data is unstructured. This impacts on storage costs and management, Data Protection, and SLAs.
New deployment options such as cloud provide alternatives but how do you know what you should move to the cloud?
This document provides an overview of cloud computing. It defines cloud computing as network-based computing that takes place over the Internet, providing hardware, software, and networking services to clients. Key characteristics of cloud computing include on-demand services that are available anywhere and anytime, elastic scaling, and pay-as-you-go pricing. The document discusses different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers advantages such as lower costs, improved performance and collaboration, and unlimited storage, as well as disadvantages like reliance on internet connectivity and potential security and data loss issues.
Cloud computing is a general term for internet-based computing where shared servers provide resources, software, and data to computers and other devices on demand. It provides scalable and elastic resources, accessible from anywhere on the internet. Key characteristics include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud services can be software, platforms, or infrastructure delivered as a service via private, public or hybrid clouds.
This document provides an overview of cloud computing. It defines cloud computing as network-based computing that takes place over the Internet, providing hardware, software, and networking services to clients. Key characteristics of cloud computing include on-demand services that are available anywhere and anytime, elastic scaling, and pay-as-you-go pricing. The document discusses different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers advantages such as lower costs, improved performance and collaboration, and unlimited storage, as well as disadvantages like reliance on internet connectivity and potential security and data loss issues.
Cloud computing refers to delivering computing services over the internet. It allows users to access resources and services on-demand without needing to manage physical infrastructure. There are three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtual computing resources, PaaS offers platforms for developing applications, and SaaS delivers software through web browsers. Cloud deployment models include public, private, hybrid, community, and multi-cloud options.
This document discusses various cloud deployment models and categories of cloud computing services. It provides details on public, private, hybrid, and community cloud models, comparing their advantages and disadvantages. Additionally, it describes the three main categories of cloud services - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Public clouds promote standardization and flexibility while private clouds attempt customization and higher efficiency. Hybrid clouds operate with compromises around resource sharing.
- The document discusses cloud computing concepts including virtualization, essential cloud features, cloud service models (SaaS, PaaS, IaaS, BPaaS), deployment models (private, public, hybrid, community cloud), and benefits of cloud computing.
- It outlines security concerns in cloud environments related to issues like physical controls being replaced by virtual controls, expanded access and shifted control, and increased speed of provisioning. It discusses how security domains map to cloud environments.
- Finally, it presents two viewpoints on cloud security - security from the cloud focuses on security-as-a-service, while security for the cloud focuses on secure usage of cloud applications.
The public cloud model allows for easy accessibility of systems and services over the internet for general use. Major companies like Amazon, Google, and Microsoft offer public cloud services on a pay-per-use basis, eliminating the need for users to host services on their own. Public clouds offer benefits like flexibility, scalability, and low costs but have potential disadvantages around security and customization compared to private clouds.
This document provides an overview of cloud computing, including definitions, architecture, services, deployment models, features, and advantages/disadvantages. Cloud computing is defined as on-demand access to shared configurable computing resources like networks, servers, storage, and services that can be provisioned with minimal management effort. The main types of cloud services are SaaS, PaaS, and IaaS. Deployment models include public, private, hybrid, and community clouds. Key features are self-service, elasticity, metering/billing, and customization. Advantages are reduced costs and increased flexibility.
This document provides an overview of cloud computing. It defines cloud computing as storing and accessing data and programs over the Internet instead of a computer's hard drive. The cloud delivers computing resources like storage, databases, and computing power over the Internet. There are different types of cloud services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Cloud computing provides advantages like reduced costs, scalability, and accessibility but also risks around security, privacy, and dependency on cloud providers.
The document discusses cloud computing delivery and deployment models. It defines cloud computing according to the National Institute of Standards and Technology (NIST) as a model for enabling network access to configurable computing resources that can be rapidly provisioned with minimal management effort. There are five essential cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The four deployment models are public cloud, private cloud, community cloud, and hybrid cloud. The three main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It allows users to access applications from anywhere using a web browser. Cloud computing offers advantages like cost savings, speed, security, unlimited storage and access to data from anywhere. While cloud services like AWS have become very popular, cloud computing also presents risks like security vulnerabilities and inconsistent performance on shared infrastructure. The growth of cloud computing is impacting IT jobs by creating new roles while reducing needs for some traditional IT positions.
This document provides an overview of cloud computing. It begins with defining cloud computing and outlining its key characteristics: broad network access, resource pooling, elasticity, measured service, and self-service. It then discusses the benefits of cloud computing for organizations, including reducing costs, improving scalability and agility. It also covers the main cloud service models of IaaS, PaaS and SaaS. The document concludes with an overview of common cloud products and services, deployment models of public, private and hybrid clouds, and a quick recap of the key topics.
Cloud deployment involves deploying applications using services like SaaS, PaaS, and IaaS that leverage the cloud. The main types of cloud deployment models are public cloud, private cloud, hybrid cloud, community cloud, and multi-cloud. Choosing the right deployment model depends on factors like data access, control, costs, and security needs. Business benefits of cloud deployment include faster deployments, cost savings, scalability, agility, and operational efficiency.
This document discusses cloud computing, including definitions, advantages, and types of cloud services. Cloud computing provides scalable infrastructure over networks to host applications, data, and files. It reduces costs for computation, hosting, storage, and delivery. The cloud allows access to information from anywhere and removes the need to store data locally. Small businesses can use cloud storage instead of purchasing hardware. The cloud offers low barriers to entry, scalability, multi-tenancy, and device independence. Companies move to the cloud to reduce costs, optimize personnel usage, and gain scalability. The cloud delivers infrastructure, self-service management, and pay-per-use models. Both consumers and businesses widely use cloud services like email, social media, reservations
This document provides an overview of cloud computing including definitions, service types, deployment patterns, market drivers and pros and cons. It defines cloud computing as a pay-as-you-go model where consumers pay only for what they use. The main service types are SaaS, PaaS and IaaS. Common deployment patterns are public, private and hybrid clouds. Key market drivers include cost reduction and scalability while disadvantages include availability issues and data ownership concerns.
Cloud computing is a model for delivering computing resources over the internet. It allows users to access servers, storage, databases, and other resources without owning the physical infrastructure. Key characteristics include on-demand self-service, broad network access, resource pooling, rapid elasticity, and pay-per-use pricing. There are three main service models - Infrastructure as a Service provides virtual machines and storage, Platform as a Service offers development tools, and Software as a Service delivers applications through a web browser. Cloud services can also be public, private, hybrid, or community-based.
Cloud computing involves delivering computing services over the Internet. It relies on sharing resources rather than having local servers. There are different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides access to application software in the cloud. PaaS delivers computing platforms for developing applications. IaaS offers physical or virtual machines and other resources that can be rented.
The document discusses the key characteristics, principles, deployment models, and advantages of cloud computing. Specifically, it outlines the five essential characteristics of cloud computing as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also describes the basic principles of cloud computing as federation, independence, isolation, elasticity, business orientation, and trust. Finally, it summarizes the main deployment models of public cloud, private cloud, hybrid cloud, and community cloud and their respective advantages.
Similar to Microsoft Azure Cloud fundamentals (20)
This confidential document provides a primer on design thinking, outlining its human-centered and collaborative approach. It emphasizes empathizing with people, showing rather than telling, experimenting, collaborating, being action-oriented and mindful. The document describes design thinking's iterative process of empathizing with users, analyzing problems by defining and ideating solutions, prototyping solutions, testing them with feedback to repeat the cycle.
Procurement Workflow in terms of SAP Tables ChangesANURAG SINGH
1. The document outlines the key SAP tables involved in the procure-to-pay process, including tables for purchase requisitions (EBAN, EBKN), purchase orders (EKKO, EKPO, EKKN), goods receipts (COOI), and invoices (EKBE, BKPF, BSEG, RBKP, RSEG).
2. It describes how transactions like creating a requisition, purchase order, and invoice populate and link these tables. For example, a requisition creates records in EBAN and EBKN, a purchase order creates records in EKKO, EKPO, EKKN and links to the requisition records.
3. It also
This document provides an overview and agenda for a hands-on introduction to data science. It includes the following sections: Data Science Overview and Intro to R (90 minutes), Exploratory Data Analysis (60 minutes), and Logistic Regression Model (30 minutes). Key topics that will be covered include collecting and analyzing data to find insights to help decision making, predicting problems before they occur, using analytics to improve operations and innovations, and examples of predicting loan defaults. Machine learning concepts such as supervised and unsupervised learning and common machine learning models will also be introduced.
Unit testing Behaviour Driven DevelopmentANURAG SINGH
Unit testing involves evaluating isolated parts of code to protect against changes, understand design, enable code reuse, and create living documentation. There are two main approaches: test-driven development (TDD) and behavior-driven development (BDD). BDD focuses on describing behaviors using natural language for collaboration and easy understanding, and tools like SpecFlow, NUnit and Moq help automate testing using a business-readable language called Gherkin.
This document provides an overview and agenda for a hands-on introduction to data science. It includes the following sections: Data Science Overview and Intro to R (90 minutes), Exploratory Data Analysis (60 minutes), and Logistic Regression Model (30 minutes). The document then covers key concepts in data science including collecting and analyzing data to find insights to help decision making, using analytics to improve operations and innovations, and predicting problems before they occur. Machine learning and statistical techniques are also introduced such as supervised and unsupervised learning, parameters versus statistics, and calculating variance and standard deviation.
This document discusses how data science can be used to enhance customer experiences and business opportunities for banks. It provides examples of problems banks face around dormant accounts, cross-selling, and irrelevant offers. It then describes how various data analysis techniques like clustering, recommendations engines, and outlier detection can be applied to transaction data to better understand customers and their needs in order to increase engagement and sales. The key applications of data science highlighted are personalized offers, reviving dormant accounts, identifying new opportunities, and enhancing cross-selling capabilities.
The document provides an introduction to object oriented programming in C# and covers key concepts such as classes, objects, encapsulation, methods, constructors, static members, and partial classes. It includes examples to demonstrate how to define classes, create objects, control access to class members, pass objects to methods, and divide class definitions across multiple files. The overall goal is to help readers understand the basic principles of OOP in C# and how to write and use classes and objects in programs.
C# is an object-oriented programming language where all program logic must be contained within classes. It has features like garbage collection, inheritance, interfaces, namespaces, and data types similar to Java. Key concepts include value types vs reference types, boxing and unboxing, arrays, enums, structs, and parameter passing modes like pass by value, reference, and output. The language has control structures like if/else, switch, while, for, and foreach loops to control program flow. Methods can be instance methods or static methods.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
20240609 QFM020 Irresponsible AI Reading List May 2024
Microsoft Azure Cloud fundamentals
1. AGENDA
WHY CLOUD?
WHAT IS CLOUD
TYPES OF CLOUD
CLOUD DEPLOYMENT MODEL
TYPES OF CLOUD SERVICE
EXPLORING THE AZURE CLOUD ENVIRONMENT
2. WHY CLOUD?!
BUYING A HOUSE?
• Buy (On-premises), you might invest a significant sum upfront.
• Benefits- Security, a place for you away from the public, you can configure and
run it how you want.
3. RENTING A HOUSE
• Rent(Cloud), you might rent a house, rent a room or stay in a hotel.
• Benefits- Something wrong? House/Room-it's the landlords (cloud providers)
job to fix. Hotel-Hotel takes care of just about everything including your linen.
4. WHAT IS CLOUD
• Delivery of computing services—servers, storage, databases, networking,
software, analytics, intelligence and more—over the internet, enabling faster
innovation, flexible resources, and economies of scale.
• The company providing these services is referred to as a cloud provider.
Example providers are Microsoft Azure, Amazon Web Services (AWS), and the
Google Cloud Platform (GCP).
5. CLOUD
COMPUTING
SERVICES
• Every business has different needs and requirements, and
cloud computing is flexible and cost-efficient. The goal of
cloud computing is to make running a business easier and
more efficient, whether it's a small start-up or a large
enterprise.
• The two most common services that all cloud providers offer
– compute power and storage.
6. ECONOMIES OF SCALE
Ability to do things more efficiently or at a lower-cost per unit when operating at a
larger scale.
Benefits
• Reduce costs and gain efficiency
• Pass those benefits on to their customers
But…do we have limits to the benefits?
• Competition
• Core cost
7. COMPARE CAPEX VS OPEX
• Organisations used to buy new datacenters or new servers to allow them build
out new services, which they could then deliver to their customers. That is no
longer the case.
• Just sign up for a service from a cloud provider to get up and running
8. ..COMPARE CAPEX VS OPEX
Two Approaches to Investments
• Capital Expenditure (CapEx)
• Storage
• Server costs
• Storage costs
• Network costs
• Backup and archive costs
• Organization continuity and disaster recovery costs
• Datacenter infrastructure costs
• Technical personnel
• Operational Expenditure (OpEx):
• Leasing software and customized features
• Scaling charges based on usage/demand instead of fixed hardware or capacity.
• Billing at the user or organization level.
9. CLOUD DEPLOYMENT MODELS
Defines where your data is stored and how your customers interact with it
• Public-Owned by the cloud services provider (also known as a hosting
provider). It provides resources and services to multiple organizations and
users, who connect to the cloud service via a secure network connection.
• Ownership-Resources do not belong to the organization that is utilizing them
• Multiple end users -resources available to multiple organizations.
• Connectivity-over the internet using a web browser.
• Skills-do not require deep technical knowledge
10. …CLOUD DEPLOYMENT MODELS
• Private-Organisations create a cloud environment in their own datacenter and
provide self-service access to compute resources to users within their organization.
• OwnershipThe owner and user of the cloud services are the same.
• Hardware-owner is entirely responsible for the purchase, maintenance, and management of
the cloud hardware
• Users-operates only within one organization and cloud computing resources are used
exclusively by a single business or organization.
• Connectivity-private network that is highly secure./ Does not provide access to the public.
• Skills-deep technical knowledge to set up, manage, and maintain
11. …CLOUD DEPLOYMENT MODELS
• Hybrid-Combines both public and private clouds, allowing you to run your
applications in the most appropriate location
• Resource location. run or are used in a public cloud, and others run or are used in a private
cloud.
• Cost and efficiency-leverage some of the benefits of cost, efficiency, and scale that are
available with a public cloud model.
• Control- retain management control in private clouds.
• Skills-still required to maintain the private cloud and ensure both cloud models can operate
together.
12. TYPES OF CLOUD SERVICE
• Infrastructure as a Service(IAAS)- The most basic, you rent IT infrastructure servers
and virtual machines (VMs), storage, networks, and operating systems from a cloud
provider on a pay-as-you-go basis.
• Upfront costs. IaaS has no upfront costs. Users pay only for what they consume.
• User ownership. The user is responsible for the purchase, installation, configuration, and
management of their own software operating systems, middleware, and applications.
• Cloud provider ownership. The cloud provider is responsible for ensuring that the underlying
cloud infrastructure (such as virtual machines, storage and networking) is available for the user.
13. …TYPES OF CLOUD SERVICE
• Platform as a Service (PaaS) provides an environment for building, testing, and deploying
software applications. The goal of PaaS is to help create an application as quickly as
possible without having to worry about managing the underlying infrastructure.
• Upfront costs. There are no upfront costs, and users pay only for what they consume.
• User ownership. The user is responsible for the development of their own applications. However, they
are not responsible for managing the server or infrastructure. This allows the user to focus on the
application or workload they want to run.
• Cloud provider ownership. The cloud provider is responsible for operating system management, and
network and service configuration. Cloud providers are typically responsible for everything apart from
the application that a user wants to run. They provide a complete managed platform on which to run
an application.
14. …TYPES OF CLOUD SERVICE
• Software as a Service (SaaS) is software that is centrally hosted and managed
for the end customer. It allows users to connect to and use cloud-based apps
over the internet.
• Upfront costs. Users have no upfront costs; they pay a subscription, typically on a
monthly or annual basis.
• User ownership. Users just use the application software; they are not responsible for
any maintenance or management of that software.
• Cloud provider ownership. The cloud provider is responsible for the provision,
management, and maintenance of the application software.
16. SO WHERE DOES AZURE FIT IN?
• Cloud provider from one of the worlds most reliable
Software provider Microsoft
• Azure provides over 100 services that enable you to
do everything from running your existing applications
on virtual machines to exploring new software
paradigms such as intelligent bots and mixed reality.
19. AZURE ARCHITECTURE AND SERVICE
GUARANTEES
• Datacenters-Azure is made up of datacenters located around the globe. The
specific datacenters aren't exposed to end users directly; instead, Azure organizes them
into regions.
• Region-geographical area on the planet containing at least one, but potentially multiple
datacenters that are nearby and networked together with a low-latency network. Azure
intelligently assigns and controls the resources within each region to ensure workloads are
appropriately balanced.
• This gives you the flexibility to bring applications closer to your users no matter where they
are. It also provides better scalability, redundancy, and preserves data residency for your
services.
21. …AZURE ARCHITECTURE AND SERVICE
GUARANTEES
• Azure geography is a discrete market typically containing two or more regions that preserve data residency
and compliance boundaries.
• Geographies ensure that data residency, sovereignty, compliance, and resiliency requirements are honored
within geographical boundaries. customers with specific data residency and compliance needs to keep their
data and applications close.
• Geographies are broken up into the following areas:
• Americas
• Europe
• Asia Pacific
• Middle East and Africa
• Each region belongs to a single geography and has specific service availability, compliance, and data
residency/sovereignty rules applied to it.
22. …AZURE ARCHITECTURE AND SERVICE
GUARANTEES
• Availability Zones are physically separate datacenters within an Azure
region.
• Each Availability Zone is made up of one or more datacenters equipped
with independent power, cooling, and networking. It is set up to be
an isolation boundary
23. …AZURE ARCHITECTURE AND SERVICE
GUARANTEES
• Azure geography is a discrete market typically containing two or more regions that preserve data residency
and compliance boundaries.
• Geographies ensure that data residency, sovereignty, compliance, and resiliency requirements are honored
within geographical boundaries. customers with specific data residency and compliance needs to keep their
data and applications close.
• Geographies are broken up into the following areas:
• Americas
• Europe
• Asia Pacific
• Middle East and Africa
• Each region belongs to a single geography and has specific service availability, compliance, and data
residency/sovereignty rules applied to it.
24. NAVIGATING THE AZURE PORTAL
• The Azure portal is a public website that you can access with any web browser.
Once you sign in with your Azure account, you can create, manage, and
monitor any available Azure services. You can identify a service you're looking
for, get links for help on a topic, and deploy, manage, and delete resources. It
also guides you through complex administrative tasks using wizards and
tooltips.
• Access the same on the internet using the public url
portal.azure.com
25. AZURE SERVICES ACCOUNT STRUCTURE
• Tenant ID- ID of the AAD directory in which you created the application.
• Subscription ID- A subscription is an agreement with Microsoft to use one or
more Microsoft cloud platforms or services, for which charges accrue based on
either a per-user license fee or on cloud-based resource consumption.
• Resource Groups-approach to group a collection of assets in logical groups for
easy or even automatic provisioning, monitoring, and access control, and for
more effective management of their costs.
27. AZURE NETWORKING
• A virtual network is a logically isolated network on Azure. A virtual network allows
Azure resources to securely communicate with each other, the internet, and on-
premises networks. A virtual network is scoped to a single region; however, multiple
virtual networks from different regions can be connected together using virtual
network peering.
• Virtual networks can be segmented into one or more subnets. Subnets help you
organize and secure your resources in discrete sections.
• A network security group, or NSG, allows or denies inbound network traffic to your
Azure resources. Think of a network security group as a cloud-level firewall for your
network.
28. SCALE WITH AZURE LOAD BALANCER
• You now have your site up and running on Azure. But how can you help ensure
your site is running 24/7?
• Say you start by adding additional VMs, each configured identically, to each tier. The
idea is to have additional systems ready, in case one goes down, or is serving too
many users at the same time. The answer is to use a load balancer to distribute
traffic. The load balancer becomes the entry point to the user. The user doesn't
know (or need to know) which system the load balancer chooses to receive the
request.
29. AZURE SECURITY A SHARED RESPONSIBILITY
• Security of the operational environment is now a concern shared by both cloud providers and customers. By shifting
these responsibilities to a cloud service like Azure, organizations can reduce focus on activities that aren't core business
competencies. Depending on the specific technology choices, some security protections will be built into the particular
service, while addressing others will remain the customer's responsibility.
• For all cloud deployment types, you own your data and identities. You are responsible for helping secure your data and
identities, your on-premises resources, and the cloud components you control (which vary by service type).
• Regardless of the deployment type, you always retain responsibility for the following items:
• Data
• Endpoints
• Accounts
• Access management
30. PROTECTING YOUR NETWORK
• Azure follows a layered approach providing multiple levels of protection, so that if an attacker gets through
one layer, there are further protections in place to limit further attack.
• To provide inbound protection at the perimeter, you have several choices.
• Azure Firewall a fully stateful firewall as a service with built-in high availability and unrestricted cloud
scalability. Azure Firewall provides inbound protection for non-HTTP/S protocols
• Azure Application Gateway is a load balancer that includes a Web Application Firewall (WAF) that provides
protection from common, known vulnerabilities in websites.
• Network virtual appliances (NVAs) are ideal options for non-HTTP services or advanced configurations, and
are similar to hardware firewall appliances.
31. …PROTECTING YOUR NETWORK
• DDoS Protection leverages the scale and elasticity of Microsoft's global network to bring DDoS mitigation
capacity to every Azure region. The Azure DDoS Protection service protects your Azure applications by
monitoring traffic at the Azure network edge before it can impact your service's availability. Within a few
minutes of attack detection, you are notified using Azure Monitor metrics
• Virtual network security once inside a virtual network (VNet), it's crucial that you limit communication
between resources to only what is required. For communication between virtual machines, Network Security
Groups (NSGs) are a critical piece to restrict unnecessary communication. Network Security Groups allow you
to filter network traffic to and from Azure resources in an Azure virtual network. An NSG can contain multiple
inbound and outbound security rules that enable you to filter traffic to and from resources by source and
destination IP address, port, and protocol.
• Virtual private network (VPN) connections are a common way of establishing secure communication
channels between networks. Connections between Azure Virtual Network and an on-premises VPN device
are a great way to provide secure communication between your network and your VNet on Azure.