SlideShare a Scribd company logo
MALLAREDDY INSTITUTE OF
TECHNOLOGY
A
SEMINAR REPORT ON
PRESENTED BY:
KONAKATI
SAIKUMAR
CONTENTS
• Introduction
• History
• System Requirements
• Applications
• Basic Features
• Setting up iCloud
• Competitors
• Conclusion
INTRODUCTION
• iCloud is a cloud storage and cloud computing
service from Apple Inc. launched on October 12,
2011.
• The service allows users to store data such as music
or iOS applications on remote computer servers.
HISTORY
• Previously been branded as:
– iTools in 2000
– .Mac in 2002
– MobileMe in 2008
• Announced on June 6,2011, at the 2011Apple
Worldwide Developers Conference(WWDC).
• Official website, www.icloud.com, went live in early
August for Apple Developers.
• On Oct 12, 2011 iCloud became available to use via
an iTunes update.
CONTENT EVERYWHERE
Anything you purchase from the iTunes Store,
App Store, and iBooks Store is automatically
available on all your devices. You can also
access past purchases from any of your devices.
SYSTEM REQUIREMENTS
• iOS device running iOS5.X or later or a Mac
running OS X 10.7.2 “Lion” or later to create a
new account.
• Synchronizing with a PC requires Windows
Vista(Service Pack 2) or Windows 7 using
iCloud Control Panel.
• Online access to iCloud requires a compatible
web browser.
APPLICATIONS
BACKUP ANDRESTORE
• Backup settings and data on iOS devices running
iOS5 or later.
• Data backed up include:
– Photos
– Videos
– App data
– Messages
– Ringtones
– Voicemails
• Occur daily when device locked and connected to
Wi-Fi and a Power source.
BACK TO MY MAC
• Allow users to log in remotely to other
computers that have Back To My Mac enabled
and are configured with the same Apple ID.
FIND MY FRIENDS
• Users can follow & track people
• Share their location
• Location determined when location services
are turned ON.
• Notification appears when a user requests
another user to see where they are.
FIND MY IPHONE
• Allow users to track the location of their iOS devices or
Mac if lost.
• User can do following:
– Locate device on map
– Play a sound
– Use Lost Mode
– Remotely erase all personal information
• New feature “Actication Lock”. Apple ID &Password
required before anyone can:
– Turn off Find My iPhone
– Sign out of iCloud
– Erase & reactivate your device
ICLOUD KEYCHAIN
• Functions as a secure database
• Includes information including user’s website
login passwords, Wi-Fi network passwords &
other account data.
• Securely stored for quick access & auto-fill on
web pages.
• Stored encrypted using 256-bitAES
encryption.
ITUNES MATCH
• Customers can scan & match tracks in their
iTunes library with those in iTunes Store.
• No need to purchase said tracks.
SAFARI BROWSING
• Keeps tabs you’ve open in Safari up to date on
your iPad, iPhone, iPod Touch & Mac.So you
can pick up browsing wherever you left off.
• Saves web pages.
• Keeps bookmarks in sync between Safari on
iOs devices &on Mac as well as Internet
Explorer,Firefox or Google Chrome on PC.
STORAGE
• 5GBof free storage
• Additional storage canbe purchased in tiersof
10,20 or 50 GB-50GBbeing maximum.
• Amount of storage shared acrossalldevices
per iCloudAppleID.
SETTING UP ICLOUD
COMPETITORS
GoogleDrive Microsoft SkyDrive Dropbox Apple iCloud
15GBfree space 7GBfree space 2GBfree space 5GBfree space
Platforms:Windows
,Mac,iOS,Android
Windows,Mac,iO
S,
Android,Windows
Phone
Windows,Mac,Linux
,iOS,Android,Blac
kB erry
Mac,iOS,Windows
File SizeLimit:10GB 2GB Unlimited(via
desktop app)
25MB free/250MB
paid
Bestfor: Storage
spaceand web apps
Windows/MS Office
integration
Seamless document
syncing
HeavyiTunes/Mac
users
CONCLUSION
• Apple’s iCloud can automatically synchronize
data from Macs, PCs and iOS devices, which
can help people who are forced to deal with
multiple computer worlds.
QUERIES?
Ppt by saikumar icloud

More Related Content

What's hot

Apple iCloud
Apple iCloudApple iCloud
Apple iCloud
우일 권
 
Customer Service Gone Mobile
Customer Service Gone MobileCustomer Service Gone Mobile
Customer Service Gone Mobile
Sarena Fletcher
 
Ipad technologies
Ipad technologiesIpad technologies
Ipad technologies
JAI SHANKER
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
Richa Dewani
 
icloud
icloudicloud
I cloud
I cloudI cloud
iCloud
iCloudiCloud
iCloud Presentation Notes
iCloud Presentation NotesiCloud Presentation Notes
iCloud Presentation Notes
avsorrent
 
iCloud - get your head in the iCloud
iCloud - get your head in the iCloudiCloud - get your head in the iCloud
iCloud - get your head in the iCloud
Newington College
 
Belenko, sklyarov dark and bright sides of i cloud (in)security
Belenko, sklyarov   dark and bright sides of i cloud (in)securityBelenko, sklyarov   dark and bright sides of i cloud (in)security
Belenko, sklyarov dark and bright sides of i cloud (in)security
DefconRussia
 
Troopers14 Advanced Smartphone forensics - Vladimir Katalov
Troopers14 Advanced Smartphone forensics - Vladimir KatalovTroopers14 Advanced Smartphone forensics - Vladimir Katalov
Troopers14 Advanced Smartphone forensics - Vladimir Katalov
Jose Moruno Cadima
 
I cloud
I cloudI cloud
I cloud
Fahad Mansoor
 
iCloud
iCloud iCloud
iCloud
amanmanocha
 
History of iOS
History of iOSHistory of iOS
History of iOS
pyro2927
 
A seminar report on i cloud
A  seminar report on i cloudA  seminar report on i cloud
A seminar report on i cloud
Nagamalleswararao Tadikonda
 
Icloud computing seminar
Icloud computing seminarIcloud computing seminar
Icloud computing seminar
munaani
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple Technology
Asmita Kalena
 
I os class 1 of 3 actual
I os class 1 of 3 actualI os class 1 of 3 actual
I os class 1 of 3 actual
Vic Ward
 
iOS platform
iOS platformiOS platform
iOS platform
maya_slides
 
iPad Workshop
iPad WorkshopiPad Workshop
iPad Workshop
Vic Ward
 

What's hot (20)

Apple iCloud
Apple iCloudApple iCloud
Apple iCloud
 
Customer Service Gone Mobile
Customer Service Gone MobileCustomer Service Gone Mobile
Customer Service Gone Mobile
 
Ipad technologies
Ipad technologiesIpad technologies
Ipad technologies
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
icloud
icloudicloud
icloud
 
I cloud
I cloudI cloud
I cloud
 
iCloud
iCloudiCloud
iCloud
 
iCloud Presentation Notes
iCloud Presentation NotesiCloud Presentation Notes
iCloud Presentation Notes
 
iCloud - get your head in the iCloud
iCloud - get your head in the iCloudiCloud - get your head in the iCloud
iCloud - get your head in the iCloud
 
Belenko, sklyarov dark and bright sides of i cloud (in)security
Belenko, sklyarov   dark and bright sides of i cloud (in)securityBelenko, sklyarov   dark and bright sides of i cloud (in)security
Belenko, sklyarov dark and bright sides of i cloud (in)security
 
Troopers14 Advanced Smartphone forensics - Vladimir Katalov
Troopers14 Advanced Smartphone forensics - Vladimir KatalovTroopers14 Advanced Smartphone forensics - Vladimir Katalov
Troopers14 Advanced Smartphone forensics - Vladimir Katalov
 
I cloud
I cloudI cloud
I cloud
 
iCloud
iCloud iCloud
iCloud
 
History of iOS
History of iOSHistory of iOS
History of iOS
 
A seminar report on i cloud
A  seminar report on i cloudA  seminar report on i cloud
A seminar report on i cloud
 
Icloud computing seminar
Icloud computing seminarIcloud computing seminar
Icloud computing seminar
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple Technology
 
I os class 1 of 3 actual
I os class 1 of 3 actualI os class 1 of 3 actual
I os class 1 of 3 actual
 
iOS platform
iOS platformiOS platform
iOS platform
 
iPad Workshop
iPad WorkshopiPad Workshop
iPad Workshop
 

Similar to Ppt by saikumar icloud

iCloud.pptx
iCloud.pptxiCloud.pptx
iCloud.pptx
luke466359
 
Icloud by Apple doc
Icloud  by Apple docIcloud  by Apple doc
Icloud by Apple doc
Kokonda Nikhil Kumar
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
Reality Net System Solutions
 
I pad class 3 maple grove
I pad class 3 maple groveI pad class 3 maple grove
I pad class 3 maple grove
Vic Ward
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8
Nimap Infotech
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
Tom Eston
 
Icloud presentation
Icloud presentationIcloud presentation
Icloud presentation
Sana Saleem
 
I os
I osI os
iCloud
iCloudiCloud
iCloud Powerpoint presentation
iCloud Powerpoint presentationiCloud Powerpoint presentation
iCloud Powerpoint presentation
Jezreel Noel
 
iOS 5
iOS 5iOS 5
(130622) #fitalk i cloud keychain forensics
(130622) #fitalk   i cloud keychain forensics(130622) #fitalk   i cloud keychain forensics
(130622) #fitalk i cloud keychain forensics
INSIGHT FORENSIC
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
eightbit
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
 
Apple iOS Technology Market
Apple iOS Technology MarketApple iOS Technology Market
Apple iOS Technology Market
Bharat Gera
 
iOS 9 (Seminar)
iOS 9 (Seminar)iOS 9 (Seminar)
iOS 9 (Seminar)
Rikky Joshy
 
iCloud history and uses
iCloud history and usesiCloud history and uses
iCloud history and uses
Jelo Carzon
 
iCloud
iCloudiCloud
iCloud
Jelo Carzon
 

Similar to Ppt by saikumar icloud (20)

iCloud.pptx
iCloud.pptxiCloud.pptx
iCloud.pptx
 
Icloud by Apple doc
Icloud  by Apple docIcloud  by Apple doc
Icloud by Apple doc
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
 
I pad class 3 maple grove
I pad class 3 maple groveI pad class 3 maple grove
I pad class 3 maple grove
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Icloud presentation
Icloud presentationIcloud presentation
Icloud presentation
 
I os
I osI os
I os
 
iCloud
iCloudiCloud
iCloud
 
iCloud Powerpoint presentation
iCloud Powerpoint presentationiCloud Powerpoint presentation
iCloud Powerpoint presentation
 
iOS 5
iOS 5iOS 5
iOS 5
 
(130622) #fitalk i cloud keychain forensics
(130622) #fitalk   i cloud keychain forensics(130622) #fitalk   i cloud keychain forensics
(130622) #fitalk i cloud keychain forensics
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
 
Apple iOS Technology Market
Apple iOS Technology MarketApple iOS Technology Market
Apple iOS Technology Market
 
iOS 9 (Seminar)
iOS 9 (Seminar)iOS 9 (Seminar)
iOS 9 (Seminar)
 
iCloud history and uses
iCloud history and usesiCloud history and uses
iCloud history and uses
 
iCloud
iCloudiCloud
iCloud
 

Recently uploaded

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Ppt by saikumar icloud

  • 1. MALLAREDDY INSTITUTE OF TECHNOLOGY A SEMINAR REPORT ON PRESENTED BY: KONAKATI SAIKUMAR
  • 2. CONTENTS • Introduction • History • System Requirements • Applications • Basic Features • Setting up iCloud • Competitors • Conclusion
  • 3. INTRODUCTION • iCloud is a cloud storage and cloud computing service from Apple Inc. launched on October 12, 2011. • The service allows users to store data such as music or iOS applications on remote computer servers.
  • 4. HISTORY • Previously been branded as: – iTools in 2000 – .Mac in 2002 – MobileMe in 2008 • Announced on June 6,2011, at the 2011Apple Worldwide Developers Conference(WWDC). • Official website, www.icloud.com, went live in early August for Apple Developers. • On Oct 12, 2011 iCloud became available to use via an iTunes update.
  • 5. CONTENT EVERYWHERE Anything you purchase from the iTunes Store, App Store, and iBooks Store is automatically available on all your devices. You can also access past purchases from any of your devices.
  • 6. SYSTEM REQUIREMENTS • iOS device running iOS5.X or later or a Mac running OS X 10.7.2 “Lion” or later to create a new account. • Synchronizing with a PC requires Windows Vista(Service Pack 2) or Windows 7 using iCloud Control Panel. • Online access to iCloud requires a compatible web browser.
  • 8. BACKUP ANDRESTORE • Backup settings and data on iOS devices running iOS5 or later. • Data backed up include: – Photos – Videos – App data – Messages – Ringtones – Voicemails • Occur daily when device locked and connected to Wi-Fi and a Power source.
  • 9. BACK TO MY MAC • Allow users to log in remotely to other computers that have Back To My Mac enabled and are configured with the same Apple ID.
  • 10. FIND MY FRIENDS • Users can follow & track people • Share their location • Location determined when location services are turned ON. • Notification appears when a user requests another user to see where they are.
  • 11. FIND MY IPHONE • Allow users to track the location of their iOS devices or Mac if lost. • User can do following: – Locate device on map – Play a sound – Use Lost Mode – Remotely erase all personal information • New feature “Actication Lock”. Apple ID &Password required before anyone can: – Turn off Find My iPhone – Sign out of iCloud – Erase & reactivate your device
  • 12. ICLOUD KEYCHAIN • Functions as a secure database • Includes information including user’s website login passwords, Wi-Fi network passwords & other account data. • Securely stored for quick access & auto-fill on web pages. • Stored encrypted using 256-bitAES encryption.
  • 13. ITUNES MATCH • Customers can scan & match tracks in their iTunes library with those in iTunes Store. • No need to purchase said tracks.
  • 14. SAFARI BROWSING • Keeps tabs you’ve open in Safari up to date on your iPad, iPhone, iPod Touch & Mac.So you can pick up browsing wherever you left off. • Saves web pages. • Keeps bookmarks in sync between Safari on iOs devices &on Mac as well as Internet Explorer,Firefox or Google Chrome on PC.
  • 15. STORAGE • 5GBof free storage • Additional storage canbe purchased in tiersof 10,20 or 50 GB-50GBbeing maximum. • Amount of storage shared acrossalldevices per iCloudAppleID.
  • 17. COMPETITORS GoogleDrive Microsoft SkyDrive Dropbox Apple iCloud 15GBfree space 7GBfree space 2GBfree space 5GBfree space Platforms:Windows ,Mac,iOS,Android Windows,Mac,iO S, Android,Windows Phone Windows,Mac,Linux ,iOS,Android,Blac kB erry Mac,iOS,Windows File SizeLimit:10GB 2GB Unlimited(via desktop app) 25MB free/250MB paid Bestfor: Storage spaceand web apps Windows/MS Office integration Seamless document syncing HeavyiTunes/Mac users
  • 18. CONCLUSION • Apple’s iCloud can automatically synchronize data from Macs, PCs and iOS devices, which can help people who are forced to deal with multiple computer worlds.