Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Cloud computing Definition, Types of cloud, Cloud services: Benefits and challenges of cloud computing, Evolution of Cloud Computing, Applications cloud computing, Business models around Cloud, Major Players in Cloud Computing, Issues in Cloud - Eucalyptus - Nimbus - Open Nebula, CloudSim.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
Cloud computing is the latest of computing paradigms. It promises to change the way people use computing resources. Using Internet as the backbone, cloud computing asserts that it is possible to provide computing as a “utility” to end users “as and when needed” basis. Cloud computing has a potential to serve users of all kinds: individual users, institutions, industry at large. This report cover issues such nature and scope of cloud computing, its applications, business rationale etc.
Cloud computing is a business model that harnesses the web as the ultimate business platform. Cloud computing is impregnated with immense potential for array of practical applications. The model is expected make computing needs available via web on retail basis and is called cloud computing. Cloud computing intends to make the Internet the ultimate home of all computing resources- storage, computations, applications and allow end user to available them in quantities of her choice, location of their preferences, for duration of their liking. In other world web become the provision store for all your computing needs.
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Cloud computing is using the internet to access someone else's software running on someone else's hardware in someone else's data center.
OUTLINE-
Definitions of Cloud computing
Architecture of Cloud computing
Benefits of Cloud computing
Opportunities of Cloud Computing
Cloud computing – Google Apps
Grid computing vs Cloud computing
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Cloud computing Definition, Types of cloud, Cloud services: Benefits and challenges of cloud computing, Evolution of Cloud Computing, Applications cloud computing, Business models around Cloud, Major Players in Cloud Computing, Issues in Cloud - Eucalyptus - Nimbus - Open Nebula, CloudSim.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
Cloud computing is the latest of computing paradigms. It promises to change the way people use computing resources. Using Internet as the backbone, cloud computing asserts that it is possible to provide computing as a “utility” to end users “as and when needed” basis. Cloud computing has a potential to serve users of all kinds: individual users, institutions, industry at large. This report cover issues such nature and scope of cloud computing, its applications, business rationale etc.
Cloud computing is a business model that harnesses the web as the ultimate business platform. Cloud computing is impregnated with immense potential for array of practical applications. The model is expected make computing needs available via web on retail basis and is called cloud computing. Cloud computing intends to make the Internet the ultimate home of all computing resources- storage, computations, applications and allow end user to available them in quantities of her choice, location of their preferences, for duration of their liking. In other world web become the provision store for all your computing needs.
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Cloud computing is using the internet to access someone else's software running on someone else's hardware in someone else's data center.
OUTLINE-
Definitions of Cloud computing
Architecture of Cloud computing
Benefits of Cloud computing
Opportunities of Cloud Computing
Cloud computing – Google Apps
Grid computing vs Cloud computing
Introduction
m Definiton of Cloud Computing
p Characteristics of Cloud Computing
p Benefits of Cloud Computing
m Cloud Infrastructure
m Service Delivery Models (IAAS, PAAS and SAAS)
m Cloud Deployment Models/ Types of Cloud
m Pros and Cons of Cloud Computing
A technology called cloud computing has generated a great deal of interest as well as trepidation in health care organizations across the globe. Along with the potential benefits of cost reduction, disaster recovery, and dynamic storage scalability come numerous concerns, of which security and patient information privacy are paramount. These concerns have been identified as a mixture of reality and perception that must be overcome for health care to take advantage of the benefits of cloud computing. To overcome the identified barriers to further expansion of health care into the cloud will require adoption of methodology proposed by others by performing detailed data touch point planning and configuration as well as fully taking advantage of new encryption and data center technology.
Sections:
Introduction
Cloud Computing background
Securing the Cloud
Virtualization
Mobile Cloud Computing
User safety & energy consumption
Author’s proposal
Conclusion
In order to make cloud computing to be adopted by users and enterprises, security concerns of users should be rectified by making cloud environment trustworthy, discussed by Latif et al. in the assessment of cloud computing risks[2].
We address the questions related to:
security concerns and threats over general cloud computing,
(2) the solutions for these problems and
(3) mobile users safety in convergence with energy consumption.
Introduction
m Definiton of Cloud Computing
p Characteristics of Cloud Computing
p Benefits of Cloud Computing
m Cloud Infrastructure
m Service Delivery Models (IAAS, PAAS and SAAS)
m Cloud Deployment Models/ Types of Cloud
m Pros and Cons of Cloud Computing
A technology called cloud computing has generated a great deal of interest as well as trepidation in health care organizations across the globe. Along with the potential benefits of cost reduction, disaster recovery, and dynamic storage scalability come numerous concerns, of which security and patient information privacy are paramount. These concerns have been identified as a mixture of reality and perception that must be overcome for health care to take advantage of the benefits of cloud computing. To overcome the identified barriers to further expansion of health care into the cloud will require adoption of methodology proposed by others by performing detailed data touch point planning and configuration as well as fully taking advantage of new encryption and data center technology.
Sections:
Introduction
Cloud Computing background
Securing the Cloud
Virtualization
Mobile Cloud Computing
User safety & energy consumption
Author’s proposal
Conclusion
In order to make cloud computing to be adopted by users and enterprises, security concerns of users should be rectified by making cloud environment trustworthy, discussed by Latif et al. in the assessment of cloud computing risks[2].
We address the questions related to:
security concerns and threats over general cloud computing,
(2) the solutions for these problems and
(3) mobile users safety in convergence with energy consumption.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Abstract:-
This paper is based on the study of grid computing and cloud computing technology. These two technologies are related with geographically defined network standards. The main aspect of this paper is deep learning of latest technology and trends in the field of networking.
Keywords:-Technology,Cloud Computing,Grid Computing
The Slide Explains the concepts of Cloud Computing. Covers various definitions of Cloud Computing. Its Models, Types, Advantages, Challenges. A must to understand what is Cloud Computing.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
Basic of R Programming Language,
Introduction, How to run R, R Sessions and Functions, Basic Math, Variables, Data Types, Vectors, Conclusion, Advanced Data Structures, Data Frames, Lists, Matrices, Arrays, Classes
Basic of R Programming Language
R is a programming language and environment commonly used in statistical computing, data analytics and scientific research.
Number System, Conversion, Decimal to Binary, Decimal to Octal, Decimal to Binary, Decimal to HexaDecimal, Binary to Decimal, Octal to Decimal, Hexadecimal to Decimal, Binary to Octal, Binary to Hexadecimal, Octal to Hexadecimal, BCD, Binary Addition
HARDWARE ARCHITECTURE OF PARALLEL COMPUTING, THE CLOUD COMPUTING REFERENCE MODEL, BUILDING CLOUD COMPUTING ENVIRONMENT, INFRASTRUCTURE AND SYSTEM DEVELOPMENT, HARDWARE ARCHITECTURES FOR PARALLEL PROCESSING APPROACHES TO
PARALLEL PROGRAMMING,
1. Single-Instruction, Single-Data (SISD) Systems
2. Single-Instruction, Multiple-Data (SIMD) Systems
3. Multiple-Instruction, Single-Data (MISD) Systems
4. Multiple-Instruction, Multiple-Data (MIMD) Systems
Data Link layer design issues, Error Detection and Correction, Elementary Data Link protocols: Unrestricted simplex protocol, Simplex stop-and-wait protocol, Simplex protocol for a noisy channel; Sliding Window protocols: One-bit sliding window protocol, Protocol using Go back N, Example.
Data link protocol: Higher Level Data Link Control, Data link layer in the internet. Internetworking and Advanced Internetworking Switching and Bridging, Basic Internetworking (IP), Routing, The Global Internet, Routing among Mobile Devices
Sensors in Different Application Area Topics Covered: Occupancy and Motion Detectors; Position, Displacement, and Level; Velocity and Acceleration; Force, Strain, and Tactile Sensors; Pressure Sensors, Temperature Sensors
Topics: Interface Electronic Circuits, Input Characteristics of Interface Circuits, Amplifiers, Excitation Circuits, Analog to Digital Converters, Direct Digitization and Processing, Bridge Circuits, Data Transmission, Batteries for Low Power Sensors
Sensors fundamentals and characteristics, physical principle of sensingSweta Kumari Barnwal
Sensors, Signals and Systems; Sensor Classification; Units of Measurements; Sensor Characteristics; Electric Charges, Fields and Potentials Capacitance; Magnetism Induction, Resistance; Piezoelectric Effect, Hall Effect, Temperature and Thermal Properties of Material, Heat Transfer, Light, Dynamic Models of Sensor Elements
Central Processing Unit (CPU) Memory, Communication between Various Units of a Computer System, The Instruction Format, Instruction Set, Processor Speed, Multiprocessor Systems, Multicomputer System
OPERATING SYSTEM AND SERVICES
TOPICS
1 Dos – History, Files and Directories
2 Internal and External Commands
3 Batch Files
4 Types of O.S.
Assignment:
• Draw the block diagram for computers and explain the various the components in few words, viz. Input, Storage, Processing, Output and Control
TOPICS
1 Introduction, Characteristics of Computers, Block Diagram of Computer
2 Types of Computers and Features
3 Types of Programming Languages
4 Data Organization, Types of Memory (Primary and Secondary)
5 I/O Devices, Number System
Standard Client / Server Protocols: Worldwide- web and HTTP,FTP, Electronic mail, Telnet, Secured Shell, Domain name system. Application layer: DNS: Name space – domain name space – distribution of name space Electronic mail Architecture – FILE transfer: FTP WWW and HTTP: Architecture – web documents – HTTP Network Security: Introduction - definitions – two categories - symmetric key cryptography – traditional ciphers – asymmetric key cryptography
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling
Enterprise Information Security Architecture, Vulnerability
Assessment and Penetration Testing
Types of Social Engineering, Insider Attack, Preventing Insider
Threats, Social Engineering Targets and Defence Strategies
Process Improvement: Process and product quality, Process Classification, Process Measurement, Process Analysis and Modeling, Process Change, The CMMI Process Improvement Framework.
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services.
What is Computer, Functionalities of a computer, Computer Components, Hardware, software, Input Devices, Output Devices, CPU (Central Processing Unit), Memory, Unit of Measurements, Classification of Computers, Computer Languages, Generation of Computers, Data, Information and Knowledge, Characteristics of Computer, Computer Viruses,
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Planning Of Procurement o different goods and services
MODULE-2-Cloud Computing.docx.pdf
1. CLOUD COMPUTING
SWETA KUMARI BARNWAL 1
MODULE: 2
CLOUD MODELS
(Topics: Cluster Computing, Grid Computing, Grid Computing Versus Cloud Computing,
Key Characteristics of Cloud Computing. Cloud Models: Benefits of Cloud Models, Public
Cloud, Private Cloud, Hybrid Cloud, Community Cloud, Shared Private Cloud, Dedicated
Private Cloud, and Dynamic Private Cloud.)
Cluster Computing:
A Computer Cluster is a local network of two or more homogeneous (similar kind)
computers. A computation process on such a computer network i.e. cluster is called Cluster
Computing. Such a network is used when a resource hungry task requires high computing
power or memory.
Grid Computing:
Grid Computing can be defined as a network of homogeneous or heterogeneous computers
working together over a long distance to perform a task that would rather be difficult for a
single machine. Its target is to provide an environment where a task can be performed by
multiple computers together on need basis. Each computer can work independently as well.
Difference between Cluster & Grid Computing
Sr.
No.
Key Cluster Computing Grid Computing
1
Computer
Type
Nodes or computers has to be of
same type, like same CPU,
same OS. Cluster computing
needs a homogeneous network.
Nodes or computers can be of
same or different types. Grid
computer can have homogeneous
or heterogeneous network.
2
Task Computers of Cluster
Computing are dedicated to
single task and they cannot be
used to perform any other task.
Computers of Grid Computing
can leverage the unused
computing resources to do other
tasks.
3
Location Computers of Cluster
computing are co-located and
are connected by high speed
network bus cables.
Computers of Grid Computing
can be present at different
locations and are usually
connected by internet or a low
speed network bus.
4
Topology Cluster computing network is
prepared using a centralized
network topology.
Grid computing network is
distributed and have a de-
centralized network topology.
5
Task
Scheduling
A centralized server controls the
scheduling of tasks in cluster
computing.
In Grid Computing, multiple
servers can exist. Each node
behaves independently without
2. CLOUD COMPUTING
SWETA KUMARI BARNWAL 2
Sr.
No.
Key Cluster Computing Grid Computing
need of any centralized
scheduling server.
6
Resource
Manager
Cluster Computing network has
a dedicated centralised resource
manager, managing the
resources of all the nodes
connected.
In Grid Computing, each node is
independently managing each
own resources.
7
Autonomy In Cluster computing network,
whole system works as a unit.
In Grid computing network, each
node is independent and can be
taken down or can be up at any
time without impacting other
nodes.
Key Characteristics of Cloud Computing
Basically there are 5 important characteristics of Cloud Computing.
1. On-demand self-services:
The Cloud computing services does not require any human administrators, user
themselves are able to provision, monitor and manage computing resources as
needed.
2. Broad network access:
The Computing services are generally provided over standard networks and
heterogeneous devices.
3. Rapid elasticity:
The Computing services should have IT resources that are able to scale out and
in quickly and on as needed basis. Whenever the user require services it is
provided to him and it is scale out as soon as its requirement gets over.
4. Resource pooling:
The IT resource (e.g., networks, servers, storage, applications, and services)
present are shared across multiple applications and occupant in an uncommitted
manner. Multiple clients are provided service from a same physical resource.
5. Measured service:
The resource utilization is tracked for each application and occupant, it will
provide both the user and the resource provider with an account of what has
been used. This is done for various reasons like monitoring billing and effective
use of resource.
Benefits:
Cloud computing has been around for approximately two decades and despite the data pointing
to the business efficiencies, cost-benefits, and competitive advantages it holds, a large portion
of the business community continues to operate without it. According to a study by the
International Data Group, 69% of businesses are already using cloud technology in one
capacity or another, and 18% say they plan to implement cloud-computing solutions at some
3. CLOUD COMPUTING
SWETA KUMARI BARNWAL 3
point. At the same time, Dell reports that companies that invest in big data, cloud, mobility,
and security enjoy up to 53% faster revenue growth than their competitors. As this data shows,
an increasing number of tech-savvy businesses and industry leaders are recognising the many
benefits of the cloud-computing trend. But more than that, they are using this technology to
more efficiently run their organisations, better serve their customers, and dramatically increase
their overall profit margins. It operates on a similar principle as web-based email clients,
allowing users to access all of the features and files of the system without having to keep the
bulk of that system on their own computers. In fact, most people already use a variety of cloud
computing services without even realising it. Gmail, Google Drive, TurboTax, and even
Facebook and Instagram are all cloud-based applications. For all of these services, users are
sending their personal data to a cloud-hosted server that stores the information for later access.
And as useful as these applications are for personal use, they're even more valuable for
businesses that need to be able to access large amounts of data over a secure, online network
connection.
For example, employees can access customer information via cloud-based CRM software from
their smartphone or tablet or any other device at home or while traveling or from anywhere and
can quickly share that information with other authorized parties anywhere in the world. There
are several benefits:
a) Cost Savings
b) Security
c) Flexibility
d) Mobility
e) Insight
f) Increased Collaboration
g) Quality Control
h) Disaster Recovery
i) Loss Prevention
j) Automatic Software Updates
k) Competitive Edge
l) Sustainability
Classification of Cloud
Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.
4. CLOUD COMPUTING
SWETA KUMARI BARNWAL 4
Public Cloud
It allows systems and services to be easily accessible to the general public. Public cloud may
be less secure because of its openness. are managed by third parties which provide cloud
services over the internet to public, these services are available as pay-as-you-go billing mode.
They offer solutions for minimizing IT infrastructure costs and act as a good option for
handling peak loads on the local infrastructure. A fundamental characteristic of public clouds
is multitenancy. A public cloud is meant to serve multiple users, not a single customer. A user
requires a virtual computing environment that is separated, and most likely isolated, from
other users.
Private Cloud
It allows systems and services to be accessible within an organization. It is more secured
because of its private nature. It is a distributed systems that work on a private infrastructure
and providing the users with dynamic provisioning of computing resources. Instead of a pay-
as-you-go model as in public clouds, there could be other schemes in that take into account
the usage of the cloud and proportionally billing the different departments or sections of an
enterprise.
5. CLOUD COMPUTING
SWETA KUMARI BARNWAL 5
• Dedicated Private Cloud (DPC): It is defined as physically isolated, single-tenant
collection of compute, network and sometimes storage resources exclusively
provisioned to just one organization or application. DPCs are scalable, isolated
computing environments that are tailored to fit unique requirements and rightsized for
any of workload or application. DPCs are ideal for mission-critical or legacy
applications. When applications can’t be easily refactored for the cloud, a DPC can be
a viable solution. DPC is also ideal for organizations seeking to reduce time spent
maintaining infrastructure. You do not need to sacrifice control, compliance or
performance with a DPC.
• Dynamic Private Cloud: “It is the ability for software and services to grow with your
business. Sometimes that means automatically adjusting itself to adjust to changes in
demand or workloads.” It business to be more agile in how it responds to changes in
the market. It allows a business to quickly develop through composing new
applications using prebuilt components. Dynamic cloud gives companies what they
need, where they need it and how and when they want it. Dynamic cloud is the
foundation of the composable business; it allows relentless innovation at the speed of
business.
Community Cloud
The community cloud allows systems and services to be accessible by a group of
organizations.
6. CLOUD COMPUTING
SWETA KUMARI BARNWAL 6
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which the critical activities are
performed using private cloud while the non-critical activities are performed using public
cloud. It is a heterogeneous distributed system resulted by combining facilities of public cloud
and private cloud. For this reason, it is also known as heterogeneous clouds. A major drawback
of private deployments is the inability to scale on demand and to efficiently address peak
loads. Here public clouds are needed. Hence, a hybrid cloud takes advantages of both public
and private cloud.