SlideShare a Scribd company logo
Submitted By: Submitted To.
Ms. Sonu Bhatt Mr. Hemant Sahu
MCA 5th Sem.(3rd Year) Assoc.Prof.&Head
Of MCA Department
7/24/2014
Resiliency
Resilient computing is a form of failover that distributes redundant
implementations of IT resources across physical locations.
 IT resources can be pre-configured so that if one becomes
deficient, processing is automatically handed over to another
redundant implementation.
 Within cloud computing, the characteristic of resiliency can refer to
redundant IT resources within the same cloud (but in different
physical locations) or across multiple clouds.
 Cloud consumers can increase both the reliability
and availability of their applications by leveraging
the resiliency of cloud-based IT resources.
Figure 1 - A resilient system
in which Cloud B hosts a
redundant implementation of
Cloud Service A to provide
failover in case Cloud Service
A on Cloud A becomes
unavailable.
 Cloud provisioning is the allocation of a cloud
provider's resources to a customer.
When a cloud provider accepts a request from a customer, it must
create the appropriate number of virtual machines (VMs) and allocate
resources to support them. The process is conducted in several
different ways: advance provisioning, dynamic provisioning and user
self-provisioning. In this context, the term Provisioning simply means
" to provide."
 With advance provisioning, the customer
contracts with the provider for services and
the provider prepares the appropriate
resources in advance of start of service. The
customer is charged a flat fee or is billed on a
monthly basis.
 With dynamic provisioning, the provider
allocates more resources as they are needed
and removes them when they are not. The
customer is billed on a pay-per-use basis.
When dynamic provisioning is used to create
a hybrid cloud, it is sometimes referred to as
cloud bursting.
 With user self-provisioning (also known as
cloud self-service), the customer purchases
resources from the cloud provider through a
web form, creating a customer account and
paying for resources with a credit card. The
provider's resources are available for
customer use within hours, if not minutes.
 Hardware, software and digital assets can be
managed from within the cloud. For example,
suppliers offer the ability to view and manage
your company's PCs - whether connected to
your own internal network or not - and judge
whether they're security compliant or need a
software upgrade.
 MapReduce is a software framework that
allows developers to write programs that
process massive amounts of unstructured
data in parallel across a distributed cluster of
processors or stand-alone computers.
MapReduce is a programming model introduced by Google for
processing and generating large data sets on clusters of computers.
The MapReduce framework has two parts:
 A function called "Map," which allows
different points of the distributed cluster to
distribute their work
 A function called "Reduce," which is designed
to reduce the final form of the clusters’
results into one output
 The MapReduce framework is fault-tolerant
because each node in the cluster is expected
to report back periodically with completed
work and status updates.
 If a node remains silent for longer than the
expected interval, a master node makes note
and re-as
 implementations of MapReduce are available
in a variety of programming languages,
including Java, C++, Python, Perl, Ruby, C#
and C. signs the work to other nodes.
 The business benefit of cloud governance is
rather easy to define. It includes meshing the
value of cloud governance with the value of
leveraging cloud computing in general. Thus,
this is a driver of the core benefits of cloud
computing, including faster time to market,
operational cost savings, the ability to
expand elastically, and the ability to better
secure and control your business assets.
 As we move from simple, single cloud
solutions, to complex multicloud
implementations, the need for governance
becomes much more apparent. Indeed, the
tipping point of resources and services under
management is easily reached, and processes
and automated governance tools are
required.
 While the benefits of governance are clear,
leveraging cloud governance requires some
initial planning around the use of this
technology, including understanding your
own requirements and mapping them to the
right cloud governance solution.

More Related Content

What's hot

CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
Tushar Dhoot
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Vaibhav Khanna
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
E42053035
E42053035E42053035
E42053035
IJERA Editor
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
The Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingThe Economic Benefits of Cloud Computing
The Economic Benefits of Cloud Computing
Sean Teague
 
Scalability and Reliability in the Cloud
Scalability and Reliability in the CloudScalability and Reliability in the Cloud
Scalability and Reliability in the Cloud
gmthomps
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsAhmed Hammam
 
Testing under cloud
Testing under cloudTesting under cloud
Testing under cloud
gaurav jain
 
Cloud building
Cloud buildingCloud building
Cloud building
Wahid Cirebon
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
Mohammed Kharma
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computingKruthikka Palraj
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
muhammed jassim k
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
John Rhoton
 
Cloud computing altanai bisht , collge 2nd year , part i
Cloud computing   altanai bisht , collge 2nd year , part iCloud computing   altanai bisht , collge 2nd year , part i
Cloud computing altanai bisht , collge 2nd year , part i
ALTANAI BISHT
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
gaurav jain
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentSurvey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Editor IJCATR
 

What's hot (19)

CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
E42053035
E42053035E42053035
E42053035
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
The Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingThe Economic Benefits of Cloud Computing
The Economic Benefits of Cloud Computing
 
Scalability and Reliability in the Cloud
Scalability and Reliability in the CloudScalability and Reliability in the Cloud
Scalability and Reliability in the Cloud
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
 
Testing under cloud
Testing under cloudTesting under cloud
Testing under cloud
 
Cloud building
Cloud buildingCloud building
Cloud building
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computing
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Cloud computing altanai bisht , collge 2nd year , part i
Cloud computing   altanai bisht , collge 2nd year , part iCloud computing   altanai bisht , collge 2nd year , part i
Cloud computing altanai bisht , collge 2nd year , part i
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentSurvey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
 

Viewers also liked

Critical 2(second version)
Critical 2(second version)Critical 2(second version)
Critical 2(second version)
Emily Shaw
 
RESUME SATYENDRA YADAV planning engineer (2)
RESUME SATYENDRA YADAV planning engineer (2)RESUME SATYENDRA YADAV planning engineer (2)
RESUME SATYENDRA YADAV planning engineer (2)satyendra yadav
 
1. ganbaran umum perekonomian indonesia
1. ganbaran umum perekonomian indonesia1. ganbaran umum perekonomian indonesia
1. ganbaran umum perekonomian indonesia
Fahmi Me
 
How to Handle and Let Go of Negative Thinking in 2017
How to Handle and Let Go of Negative Thinking in 2017How to Handle and Let Go of Negative Thinking in 2017
How to Handle and Let Go of Negative Thinking in 2017
Jason and LaKisha Williams
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
Shivangi Maddheshia
 
Meu Trabalho Pronto
Meu Trabalho Pronto   Meu Trabalho Pronto
Meu Trabalho Pronto
Meu Trabalho Pronto
 
Ficha de revisoes cidades medias etc
Ficha de revisoes cidades medias etcFicha de revisoes cidades medias etc
Ficha de revisoes cidades medias etcCacilda Basto
 
Ee_publico_entrevista-1
  Ee_publico_entrevista-1  Ee_publico_entrevista-1
Ee_publico_entrevista-1
Elisio Estanque
 
Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung
 Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung
Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung
access KellyOCG GmbH
 
Assessment-Center
Assessment-Center Assessment-Center
Assessment-Center
access KellyOCG GmbH
 
Linux-Prinzipien für die Netzökonomie #NEO15 Session
Linux-Prinzipien für die Netzökonomie #NEO15 SessionLinux-Prinzipien für die Netzökonomie #NEO15 Session
Linux-Prinzipien für die Netzökonomie #NEO15 Session
Gunnar Sohn
 

Viewers also liked (13)

Critical 2(second version)
Critical 2(second version)Critical 2(second version)
Critical 2(second version)
 
RESUME SATYENDRA YADAV planning engineer (2)
RESUME SATYENDRA YADAV planning engineer (2)RESUME SATYENDRA YADAV planning engineer (2)
RESUME SATYENDRA YADAV planning engineer (2)
 
Point of Sale
Point of SalePoint of Sale
Point of Sale
 
1. ganbaran umum perekonomian indonesia
1. ganbaran umum perekonomian indonesia1. ganbaran umum perekonomian indonesia
1. ganbaran umum perekonomian indonesia
 
ภูมิใจ.Pdf8
ภูมิใจ.Pdf8ภูมิใจ.Pdf8
ภูมิใจ.Pdf8
 
How to Handle and Let Go of Negative Thinking in 2017
How to Handle and Let Go of Negative Thinking in 2017How to Handle and Let Go of Negative Thinking in 2017
How to Handle and Let Go of Negative Thinking in 2017
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
Meu Trabalho Pronto
Meu Trabalho Pronto   Meu Trabalho Pronto
Meu Trabalho Pronto
 
Ficha de revisoes cidades medias etc
Ficha de revisoes cidades medias etcFicha de revisoes cidades medias etc
Ficha de revisoes cidades medias etc
 
Ee_publico_entrevista-1
  Ee_publico_entrevista-1  Ee_publico_entrevista-1
Ee_publico_entrevista-1
 
Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung
 Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung
Webinar: Gehaltsverhandlung Die Do's und Dont's in der Gehaltsverhandlung
 
Assessment-Center
Assessment-Center Assessment-Center
Assessment-Center
 
Linux-Prinzipien für die Netzökonomie #NEO15 Session
Linux-Prinzipien für die Netzökonomie #NEO15 SessionLinux-Prinzipien für die Netzökonomie #NEO15 Session
Linux-Prinzipien für die Netzökonomie #NEO15 Session
 

Similar to Sonu seminar ppt

Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
Liming Liu
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
A017620123
A017620123A017620123
A017620123
IOSR Journals
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Rhitik Kumar
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Iaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with cost
Iaetsd Iaetsd
 
Smca in a nut shell
Smca in a nut shellSmca in a nut shell
Smca in a nut shell
Swathi Nandakumar
 
Smca in a nut shell
Smca in a nut shellSmca in a nut shell
Smca in a nut shell
Swathi Nandakumar
 
Smca in a nut shell
Smca in a nut shellSmca in a nut shell
Smca in a nut shell
Swathi Nandakumar
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment ’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment
Intel Corporation
 
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGGROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGGROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
ijcsit
 
T04503113118
T04503113118T04503113118
T04503113118
IJERA Editor
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Bijay Bhandari
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
Scientific Review SR
 

Similar to Sonu seminar ppt (20)

Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
A017620123
A017620123A017620123
A017620123
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Iaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with cost
 
Smca in a nut shell
Smca in a nut shellSmca in a nut shell
Smca in a nut shell
 
Smca in a nut shell
Smca in a nut shellSmca in a nut shell
Smca in a nut shell
 
Smca in a nut shell
Smca in a nut shellSmca in a nut shell
Smca in a nut shell
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment ’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment
 
F1034047
F1034047F1034047
F1034047
 
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGGROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
 
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGGROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
 
T04503113118
T04503113118T04503113118
T04503113118
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 

More from Ajay Chawda

Mastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journeyMastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journey
Ajay Chawda
 
Android technlogy
Android technlogyAndroid technlogy
Android technlogy
Ajay Chawda
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Ajay Chawda
 
Virtualization
VirtualizationVirtualization
Virtualization
Ajay Chawda
 
linux
linuxlinux
4g technology
4g technology4g technology
4g technology
Ajay Chawda
 

More from Ajay Chawda (6)

Mastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journeyMastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journey
 
Android technlogy
Android technlogyAndroid technlogy
Android technlogy
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Virtualization
VirtualizationVirtualization
Virtualization
 
linux
linuxlinux
linux
 
4g technology
4g technology4g technology
4g technology
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Sonu seminar ppt

  • 1. Submitted By: Submitted To. Ms. Sonu Bhatt Mr. Hemant Sahu MCA 5th Sem.(3rd Year) Assoc.Prof.&Head Of MCA Department 7/24/2014
  • 2. Resiliency Resilient computing is a form of failover that distributes redundant implementations of IT resources across physical locations.  IT resources can be pre-configured so that if one becomes deficient, processing is automatically handed over to another redundant implementation.  Within cloud computing, the characteristic of resiliency can refer to redundant IT resources within the same cloud (but in different physical locations) or across multiple clouds.
  • 3.  Cloud consumers can increase both the reliability and availability of their applications by leveraging the resiliency of cloud-based IT resources. Figure 1 - A resilient system in which Cloud B hosts a redundant implementation of Cloud Service A to provide failover in case Cloud Service A on Cloud A becomes unavailable.
  • 4.  Cloud provisioning is the allocation of a cloud provider's resources to a customer. When a cloud provider accepts a request from a customer, it must create the appropriate number of virtual machines (VMs) and allocate resources to support them. The process is conducted in several different ways: advance provisioning, dynamic provisioning and user self-provisioning. In this context, the term Provisioning simply means " to provide."
  • 5.  With advance provisioning, the customer contracts with the provider for services and the provider prepares the appropriate resources in advance of start of service. The customer is charged a flat fee or is billed on a monthly basis.
  • 6.  With dynamic provisioning, the provider allocates more resources as they are needed and removes them when they are not. The customer is billed on a pay-per-use basis. When dynamic provisioning is used to create a hybrid cloud, it is sometimes referred to as cloud bursting.
  • 7.  With user self-provisioning (also known as cloud self-service), the customer purchases resources from the cloud provider through a web form, creating a customer account and paying for resources with a credit card. The provider's resources are available for customer use within hours, if not minutes.
  • 8.  Hardware, software and digital assets can be managed from within the cloud. For example, suppliers offer the ability to view and manage your company's PCs - whether connected to your own internal network or not - and judge whether they're security compliant or need a software upgrade.
  • 9.  MapReduce is a software framework that allows developers to write programs that process massive amounts of unstructured data in parallel across a distributed cluster of processors or stand-alone computers. MapReduce is a programming model introduced by Google for processing and generating large data sets on clusters of computers.
  • 10. The MapReduce framework has two parts:  A function called "Map," which allows different points of the distributed cluster to distribute their work  A function called "Reduce," which is designed to reduce the final form of the clusters’ results into one output
  • 11.  The MapReduce framework is fault-tolerant because each node in the cluster is expected to report back periodically with completed work and status updates.  If a node remains silent for longer than the expected interval, a master node makes note and re-as  implementations of MapReduce are available in a variety of programming languages, including Java, C++, Python, Perl, Ruby, C# and C. signs the work to other nodes.
  • 12.
  • 13.  The business benefit of cloud governance is rather easy to define. It includes meshing the value of cloud governance with the value of leveraging cloud computing in general. Thus, this is a driver of the core benefits of cloud computing, including faster time to market, operational cost savings, the ability to expand elastically, and the ability to better secure and control your business assets.
  • 14.  As we move from simple, single cloud solutions, to complex multicloud implementations, the need for governance becomes much more apparent. Indeed, the tipping point of resources and services under management is easily reached, and processes and automated governance tools are required.
  • 15.  While the benefits of governance are clear, leveraging cloud governance requires some initial planning around the use of this technology, including understanding your own requirements and mapping them to the right cloud governance solution.