SlideShare a Scribd company logo
MOBILE CLOUDS




Presented
By
t.Baskar,
2nd MCA,
ADHIYAMAAN COLLEGE OF ENGNIEERING,
HOSUR. MAIL ID:t.baskar25@gmail.com
1.INTRODUCTION

                            2. ARCHITECTURE

                            3.INFRASTUCTURE

                            4.APPLICATION

                            5.SECURITY

                            6.CURRENT STATUS


                            7.CONCLUSION



ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
INTRODUCTION
 Mobile cloud computing is the combination of cloud computing and
  mobile networks to bring benefits for mobile users, network operators, as
  well as cloud providers . Cloud computing exists when tasks and data are
  kept on the Internet rather than on individual devices, providing on-demand
  access.

 Applications are run on a remote server and then sent to the user. Because
  of the advanced improvement in mobile browsers like
 Apple
 Google
 Microsoft

 Mobile devices (e.g., smartphone, tablet pcs, etc) are increasingly
  becoming an essential part of human life as the most effective and
  convenient communication tools not bounded by time and place

       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
ARCHITECTURE




  ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
3 MAJOR FUNCTION




   ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
INFRASTUCTURE




  ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
APPLICATION

 1.Mobile Computing

 2.Mobile Commerce

 3.Mobile Learning
 4.Mobile Healthcare

 5.Mobile Gaming




    ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
SECURITY
• Enjoy Better Security For Your Data — Many people erroneously
  assume that the security they provide in the workplace is better than the
  security for cloud based applications. Nothing could be further from the
  truth. In this case it is important to ask your provider about security but in
  general providers work hard to harden security to make your data safe and
  secure. Whereas data stored on your




       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
CURRENT STATUS
• Use of cloud services at home, in the workplace and in large enterprises has
  steadily and significantly increased. Now we are seeing a similar trend with
  mobile devices and cloud technology. Mobile devices are already accessing
  a number of cloud services, such as Dropbox, and more third-party
  applications utilize cloud computing technology. It is only a matter of time
  until the technology becomes the central force to mobile applications

• Mobile cloud computing gives new company chances for mobile network
  providers. Several operators such as Vodafone , Orange and Verizon have
  started to offer cloud computing services for companies.




       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
CONCLUSION
          We have covered several representative mobile cloud approaches.
Much other related work exist, but the purpose of this paper is to give an
overview of the wide spectrum of mobile cloud computing possibilities. None
of the existing approaches meets completely the requirements of mobile
clouds. Native (offline) and Web (online) applications are the two extremes of
mobile applications.

 Break the storage device to stored unlimited data in cloud.

 Essentially, back-end systems will be linked up to the cloud, and from there
  they can be more easily accessed from mobile devices as well as from other
  online services.




       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
Thank You
                  for your attention…
ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.

More Related Content

What's hot

Balancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age EmployabilityBalancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age Employability
Denpong Soodphakdee
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
WithTheBest
 
Handheld Learning
Handheld LearningHandheld Learning
Handheld Learning
Neil Milliken
 
Technology in mobile
Technology in mobileTechnology in mobile
Technology in mobile
ACMT Group of college Saket
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
Information Technology
Information TechnologyInformation Technology
Information Technology
arhyel gerald
 
Technology update
Technology updateTechnology update
Technology update
jumus jumbuck
 

What's hot (7)

Balancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age EmployabilityBalancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age Employability
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
Handheld Learning
Handheld LearningHandheld Learning
Handheld Learning
 
Technology in mobile
Technology in mobileTechnology in mobile
Technology in mobile
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Technology update
Technology updateTechnology update
Technology update
 

Viewers also liked

TFIOS Fandom Presentation
TFIOS Fandom PresentationTFIOS Fandom Presentation
TFIOS Fandom Presentation
Allison Williams
 
The fault in our stars case study
The fault in our stars case studyThe fault in our stars case study
The fault in our stars case study
اسية صديقة
 
Project final
Project finalProject final
Project final
Ayesha Bhatti
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
Sundas Kayani
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
Belal Raslan
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
Durairaja
 

Viewers also liked (6)

TFIOS Fandom Presentation
TFIOS Fandom PresentationTFIOS Fandom Presentation
TFIOS Fandom Presentation
 
The fault in our stars case study
The fault in our stars case studyThe fault in our stars case study
The fault in our stars case study
 
Project final
Project finalProject final
Project final
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 

Similar to Mobile clouds

40120130405016
4012013040501640120130405016
40120130405016
IAEME Publication
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET Journal
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Fatih Özlü
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
audeleypearl
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
Ankit Gupta
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
IJECEIAES
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
Usman Sait
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
 
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
BRNSSPublicationHubI
 

Similar to Mobile clouds (20)

40120130405016
4012013040501640120130405016
40120130405016
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based Learning
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
 
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Mobile clouds

  • 1. MOBILE CLOUDS Presented By t.Baskar, 2nd MCA, ADHIYAMAAN COLLEGE OF ENGNIEERING, HOSUR. MAIL ID:t.baskar25@gmail.com
  • 2. 1.INTRODUCTION 2. ARCHITECTURE 3.INFRASTUCTURE 4.APPLICATION 5.SECURITY 6.CURRENT STATUS 7.CONCLUSION ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 3. INTRODUCTION  Mobile cloud computing is the combination of cloud computing and mobile networks to bring benefits for mobile users, network operators, as well as cloud providers . Cloud computing exists when tasks and data are kept on the Internet rather than on individual devices, providing on-demand access.  Applications are run on a remote server and then sent to the user. Because of the advanced improvement in mobile browsers like  Apple  Google  Microsoft  Mobile devices (e.g., smartphone, tablet pcs, etc) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 4. ARCHITECTURE ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 5. 3 MAJOR FUNCTION ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 6.
  • 7.
  • 8. ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 9. INFRASTUCTURE ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 10. APPLICATION 1.Mobile Computing 2.Mobile Commerce 3.Mobile Learning 4.Mobile Healthcare 5.Mobile Gaming ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 11. SECURITY • Enjoy Better Security For Your Data — Many people erroneously assume that the security they provide in the workplace is better than the security for cloud based applications. Nothing could be further from the truth. In this case it is important to ask your provider about security but in general providers work hard to harden security to make your data safe and secure. Whereas data stored on your ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 12. CURRENT STATUS • Use of cloud services at home, in the workplace and in large enterprises has steadily and significantly increased. Now we are seeing a similar trend with mobile devices and cloud technology. Mobile devices are already accessing a number of cloud services, such as Dropbox, and more third-party applications utilize cloud computing technology. It is only a matter of time until the technology becomes the central force to mobile applications • Mobile cloud computing gives new company chances for mobile network providers. Several operators such as Vodafone , Orange and Verizon have started to offer cloud computing services for companies. ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 13. CONCLUSION We have covered several representative mobile cloud approaches. Much other related work exist, but the purpose of this paper is to give an overview of the wide spectrum of mobile cloud computing possibilities. None of the existing approaches meets completely the requirements of mobile clouds. Native (offline) and Web (online) applications are the two extremes of mobile applications.  Break the storage device to stored unlimited data in cloud.  Essentially, back-end systems will be linked up to the cloud, and from there they can be more easily accessed from mobile devices as well as from other online services. ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 14.
  • 15. Thank You for your attention… ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.