This document discusses cloud computing paradigms. It outlines the history and growth of cloud computing, driven by large internet companies developing scalable infrastructure and data centers. It describes advantages for both service providers and end users, such as simplified installation and maintenance, centralized updates, and on-demand scaling. New applications like mobile and analytics are discussed. Cloud providers operate under a utility computing model of low commitment and pay-as-you-go services.
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
The IoT Era Begins
Components of IoT-Enabled Things
IoT Reference model
IoT Security
IoT Security & Privacy Req. defined by ITU-T
An IoT Security Framework
IoT Security Challenges
Internet of Things - Liability
IoT security tools
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
The IoT Era Begins
Components of IoT-Enabled Things
IoT Reference model
IoT Security
IoT Security & Privacy Req. defined by ITU-T
An IoT Security Framework
IoT Security Challenges
Internet of Things - Liability
IoT security tools
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
Various Security Issues and their Remedies in Cloud ComputingINFOGAIN PUBLICATION
The services of cloud computing is expending day by day. It has given shape to the theoretical infrastructure for future computations. The computational framework is running very fast worldwide towards cloud based architecture, though cloud computing is becoming very popular now a days but there are some other issues which should be considered-one of the major issue is security. In this paper, some major security issues has been analyzed and main emphasis is to rectify those issues.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Find out what's new in SaaS application architecture design (1).pdfPraveen Rastogi
What is the basis of SaaS application architecture design?
Software as a Service (SaaS) is a cloud computing model that allows users to access and use software applications over the internet. SaaS applications are hosted and maintained by a third-party provider, and users typically pay a subscription fee to access and use the software. Being a freelance mobile app developer, I can help you to delivery best services.
Here are the basics of SaaS applications:
Cloud-Based Delivery
Subscription Model
Accessibility
Automatic Updates
Scalability
Multi-Tenancy
Cost Savings
Security and Compliance
New in SaaS application architecture design
There are different new architecture design available and here you will get to know all of those, as a freelance mobile app developer I will help you to determine everything.
Find out what's new in SaaS application architecture design.pdfPraveen Rastogi
What is the basis of SaaS application architecture design?
Software as a Service (SaaS) is a cloud computing model that allows users to access and use software applications over the internet. SaaS applications are hosted and maintained by a third-party provider, and users typically pay a subscription fee to access and use the software. Being a freelance mobile app developer, I can help you to delivery best services.
Here are the basics of SaaS applications:
Cloud-Based Delivery
Subscription Model
Accessibility
Automatic Updates
Scalability
Multi-Tenancy
Cost Savings
Security and Compliance
New in SaaS application architecture design
There are different new architecture design available and here you will get to know all of those, as a freelance mobile app developer I will help you to determine everything.
2.1 Microservices Architecture
Microservices have gained prominence due to their scalability and flexibility. SaaS providers are breaking down their applications into smaller, independently deployable services, enabling faster development and easier maintenance.
2.2 Containerization and Orchestration
Technologies like Docker and Kubernetes have become essential for containerizing SaaS applications. They offer portability, scalability, and automated management of containers, ensuring consistent performance.
2.3 Serverless Computing
Serverless architecture abstracts infrastructure management, allowing developers to focus solely on code. It can reduce operational overhead and lower costs for SaaS providers.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Cloud computing has been a buzzword in the IT industry for quite some time now. Though it has been around for quite a while, its popularity has increased manifold in the last few years. The reason for this is simple – the benefits of cloud computing are simply too hard to ignore.
In a nutshell, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
https://dailytimeupdate.com/cloud-computing-definition/
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)Denny Muktar
This is the slide for IBM Partner Event, November 2015.
Digital Transformation, Innovation, and Industry Transformer through Hybrid Cloud. IBM Scenarios of Hybrid Cloud and Roadmap .An example of how Enterprise can get into Hybrid Cloud through simple Dev/Test Private Cloud as the start.
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
Cloud computing is an emerging technology which could replace long-established IT systems. Cloud computing made big strides forward in 2013, and if a host of industry experts proves correct, it will make even bigger advances in 2014. As Forbes, CxoToday, GigaOM, and other news services that cover technology report, the experts forecast many more companies joining clouds or creating their own; new professional services emerging to manage the clouds and the data within them; and the clouds’ expansion transforming IT and work life in general trough out the world. Cloud computing makes it possible for an organizations’ IT to be more malleable,
save costs and process information and data faster than with long-established IT. Cloud computing is the operating of programs and storage of data and files in an online network, not on physical disks and hardware’s. Cloud computing arises from the IT technicians desire to add another layer of separation in processing information. Cloud Vendor Evaluation & Selection offering leverages the database to accelerate the identification and screening of candidate vendors in four-step vendor evaluation and selection process.
Similar to Topic 2: Cloud Computing Paradigms (20)
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
Topic 2: Cloud Computing Paradigms
1. 2: Cloud Computing Paradigms
Zubair Nabi
zubair.nabi@itu.edu.pk
April 17, 2013
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 1 / 22
2. Outline
1 Introduction
2 Cloud service providers
3 Utility Computing
4 Economics
5 Challenges
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 2 / 22
3. Outline
1 Introduction
2 Cloud service providers
3 Utility Computing
4 Economics
5 Challenges
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 3 / 22
4. Cloud computing
A realization of utility computing in which computation, storage, and
services are offered as a metered service
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
5. Cloud computing
A realization of utility computing in which computation, storage, and
services are offered as a metered service
Encompasses applications delivered as services over the Internet and
hardware and software in the datacenters that enable those services
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
6. Cloud computing
A realization of utility computing in which computation, storage, and
services are offered as a metered service
Encompasses applications delivered as services over the Internet and
hardware and software in the datacenters that enable those services
Software as a Service (SaaS)
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
7. Cloud computing
A realization of utility computing in which computation, storage, and
services are offered as a metered service
Encompasses applications delivered as services over the Internet and
hardware and software in the datacenters that enable those services
Software as a Service (SaaS)
Public Cloud: If available to the public as a pay-as-you-go model, e.g.
Amazon Web Services, Google AppEngine, and Microsoft Azure
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
8. Cloud computing
A realization of utility computing in which computation, storage, and
services are offered as a metered service
Encompasses applications delivered as services over the Internet and
hardware and software in the datacenters that enable those services
Software as a Service (SaaS)
Public Cloud: If available to the public as a pay-as-you-go model, e.g.
Amazon Web Services, Google AppEngine, and Microsoft Azure
Private Cloud: Internal datacenters of an organization that are not
publicly accessible
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
9. Advantages
Advantages to both service providers and end users
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
10. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
11. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Centralized control over versioning
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
12. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Centralized control over versioning
No need to build, provision, and maintain a datacenter
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
13. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Centralized control over versioning
No need to build, provision, and maintain a datacenter
On the fly scaling
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
14. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Centralized control over versioning
No need to build, provision, and maintain a datacenter
On the fly scaling
2 End users:
“Anytime, anywhere” access
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
15. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Centralized control over versioning
No need to build, provision, and maintain a datacenter
On the fly scaling
2 End users:
“Anytime, anywhere” access
Share data and collaborate easily
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
16. Advantages
Advantages to both service providers and end users
1 Service providers:
Simplified software installation and maintenance
Centralized control over versioning
No need to build, provision, and maintain a datacenter
On the fly scaling
2 End users:
“Anytime, anywhere” access
Share data and collaborate easily
Safeguard data stored in the infrastructure (debatable)
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
17. Outline
1 Introduction
2 Cloud service providers
3 Utility Computing
4 Economics
5 Challenges
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 6 / 22
18. History
Phenomenal growth of Web services in late 90s and early 2000s
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
19. History
Phenomenal growth of Web services in late 90s and early 2000s
Large Internet companies, including Amazon, eBay, Google, Microsoft,
Yahoo, etc., already had massive infrastructure
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
20. History
Phenomenal growth of Web services in late 90s and early 2000s
Large Internet companies, including Amazon, eBay, Google, Microsoft,
Yahoo, etc., already had massive infrastructure
To keep up with demand, these companies also developed scalable
software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
21. History
Phenomenal growth of Web services in late 90s and early 2000s
Large Internet companies, including Amazon, eBay, Google, Microsoft,
Yahoo, etc., already had massive infrastructure
To keep up with demand, these companies also developed scalable
software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
They also acquired the operational expertise to deter potential physical
and electronic attacks
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
22. History
Phenomenal growth of Web services in late 90s and early 2000s
Large Internet companies, including Amazon, eBay, Google, Microsoft,
Yahoo, etc., already had massive infrastructure
To keep up with demand, these companies also developed scalable
software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
They also acquired the operational expertise to deter potential physical
and electronic attacks
Therefore, they had already created extremely large datacenters to
leverage statistical multiplexing and bulk purchasing of infrastructure
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
23. Incentive for providers
Incentives include revenue, leveraging existing investment, defending a
franchise, attacking an incumbent, leveraging customer relationships, and
becoming a platform
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
24. Incentive for providers
Incentives include revenue, leveraging existing investment, defending a
franchise, attacking an incumbent, leveraging customer relationships, and
becoming a platform
Data centers are being established in seemingly arbitrary locations
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
25. Incentive for providers
Incentives include revenue, leveraging existing investment, defending a
franchise, attacking an incumbent, leveraging customer relationships, and
becoming a platform
Data centers are being established in seemingly arbitrary locations
Reasons for choosing a location include costs of electricity, cooling,
labour, property, and taxes
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
26. Incentive for providers
Incentives include revenue, leveraging existing investment, defending a
franchise, attacking an incumbent, leveraging customer relationships, and
becoming a platform
Data centers are being established in seemingly arbitrary locations
Reasons for choosing a location include costs of electricity, cooling,
labour, property, and taxes
Cooling and electricity account for 1/3rd of all costs!
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
27. Incentive for providers
Incentives include revenue, leveraging existing investment, defending a
franchise, attacking an incumbent, leveraging customer relationships, and
becoming a platform
Data centers are being established in seemingly arbitrary locations
Reasons for choosing a location include costs of electricity, cooling,
labour, property, and taxes
Cooling and electricity account for 1/3rd of all costs!
Cheaper to ship data over fiber optic cables than to ship electricity over
high-voltage transmission lines
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
28. New technology trends and business models
“High-touch, high-margin, high-commitment” provisioning of service to
“low-touch, low-margin, low-commitment”
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
29. New technology trends and business models
“High-touch, high-margin, high-commitment” provisioning of service to
“low-touch, low-margin, low-commitment”
For instance:
Payment model in Web 1.0: Contractual arrangement with a payment
processing service such as VeriSign or Authorize.net; making it hard for
small businesses to accept credit card payment online
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
30. New technology trends and business models
“High-touch, high-margin, high-commitment” provisioning of service to
“low-touch, low-margin, low-commitment”
For instance:
Payment model in Web 1.0: Contractual arrangement with a payment
processing service such as VeriSign or Authorize.net; making it hard for
small businesses to accept credit card payment online
Web 2.0: With PayPal-like services anyone can sign up and accept credit
payments without a contract and a long-term commitment
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
31. New technology trends and business models
“High-touch, high-margin, high-commitment” provisioning of service to
“low-touch, low-margin, low-commitment”
For instance:
Payment model in Web 1.0: Contractual arrangement with a payment
processing service such as VeriSign or Authorize.net; making it hard for
small businesses to accept credit card payment online
Web 2.0: With PayPal-like services anyone can sign up and accept credit
payments without a contract and a long-term commitment
Another example:
Ad revenue model in Web 1.0: Set up a relationship with an ad placement
company, such as DoubleClick
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
32. New technology trends and business models
“High-touch, high-margin, high-commitment” provisioning of service to
“low-touch, low-margin, low-commitment”
For instance:
Payment model in Web 1.0: Contractual arrangement with a payment
processing service such as VeriSign or Authorize.net; making it hard for
small businesses to accept credit card payment online
Web 2.0: With PayPal-like services anyone can sign up and accept credit
payments without a contract and a long-term commitment
Another example:
Ad revenue model in Web 1.0: Set up a relationship with an ad placement
company, such as DoubleClick
Web 2.0: Use Google AdSense
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
33. New technology trends and business models
“High-touch, high-margin, high-commitment” provisioning of service to
“low-touch, low-margin, low-commitment”
For instance:
Payment model in Web 1.0: Contractual arrangement with a payment
processing service such as VeriSign or Authorize.net; making it hard for
small businesses to accept credit card payment online
Web 2.0: With PayPal-like services anyone can sign up and accept credit
payments without a contract and a long-term commitment
Another example:
Ad revenue model in Web 1.0: Set up a relationship with an ad placement
company, such as DoubleClick
Web 2.0: Use Google AdSense
This same model was used by Amazon Web Services in 2006:
pay-as-you-go computing with no contract, with the only requirement
being a credit card
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
34. New applications
Mobile applications: Require high availability and rely on large data sets
that are most conveniently hosted in large datacenters
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
35. New applications
Mobile applications: Require high availability and rely on large data sets
that are most conveniently hosted in large datacenters
Parallel batch processing: Analytics jobs that analyze terabytes of data
and can take hours to finish can leverage the “cost associativity” of the
cloud
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
36. New applications
Mobile applications: Require high availability and rely on large data sets
that are most conveniently hosted in large datacenters
Parallel batch processing: Analytics jobs that analyze terabytes of data
and can take hours to finish can leverage the “cost associativity” of the
cloud
Business analytics: Understanding customers, supply chains, buying
habits, ranking, and so on
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
37. New applications
Mobile applications: Require high availability and rely on large data sets
that are most conveniently hosted in large datacenters
Parallel batch processing: Analytics jobs that analyze terabytes of data
and can take hours to finish can leverage the “cost associativity” of the
cloud
Business analytics: Understanding customers, supply chains, buying
habits, ranking, and so on
Computation offloading: Compute-intensive tasks are offloaded to the
cloud. For instance, Matlab, Mathematica, image rendering, 3D
animations, etc.
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
38. Outline
1 Introduction
2 Cloud service providers
3 Utility Computing
4 Economics
5 Challenges
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 11 / 22
39. Classes of utility computing
Every application needs computation, storage, and quite possibly
communication
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
40. Classes of utility computing
Every application needs computation, storage, and quite possibly
communication
These resources need to be virtualized to achieve elasticity and the
illusion of infinite capacity
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
41. Classes of utility computing
Every application needs computation, storage, and quite possibly
communication
These resources need to be virtualized to achieve elasticity and the
illusion of infinite capacity
The details of statistical multiplexing and sharing is abstracted away from
the programmer
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
42. Classes of utility computing
Every application needs computation, storage, and quite possibly
communication
These resources need to be virtualized to achieve elasticity and the
illusion of infinite capacity
The details of statistical multiplexing and sharing is abstracted away from
the programmer
Different utility computing offerings can be distinguished on the basis of
the abstraction presented to the programmer
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
43. Bare metal hardware abstraction
An instance looks like physical hardware
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
44. Bare metal hardware abstraction
An instance looks like physical hardware
Programmers control the entire software stack from the kernel upwards
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
45. Bare metal hardware abstraction
An instance looks like physical hardware
Programmers control the entire software stack from the kernel upwards
Employed by Amazon EC2
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
46. Bare metal hardware abstraction
An instance looks like physical hardware
Programmers control the entire software stack from the kernel upwards
Employed by Amazon EC2
A very thin API is exposed to request and configure virtualized hardware
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
47. Bare metal hardware abstraction
An instance looks like physical hardware
Programmers control the entire software stack from the kernel upwards
Employed by Amazon EC2
A very thin API is exposed to request and configure virtualized hardware
No bar on the kinds of applications that can be hosted
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
48. Bare metal hardware abstraction
An instance looks like physical hardware
Programmers control the entire software stack from the kernel upwards
Employed by Amazon EC2
A very thin API is exposed to request and configure virtualized hardware
No bar on the kinds of applications that can be hosted
Low level virtualization, block-device storage, and IP-level connectivity
allow developers to design any application
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
49. Bare metal hardware abstraction
An instance looks like physical hardware
Programmers control the entire software stack from the kernel upwards
Employed by Amazon EC2
A very thin API is exposed to request and configure virtualized hardware
No bar on the kinds of applications that can be hosted
Low level virtualization, block-device storage, and IP-level connectivity
allow developers to design any application
On the downside, scalability and failover are application-dependent
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
50. Domain-specific platform
Target traditional web applications
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
51. Domain-specific platform
Target traditional web applications
Enforce an application structure of clean separation between a stateless
computation tier and a stateful storage tier
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
52. Domain-specific platform
Target traditional web applications
Enforce an application structure of clean separation between a stateless
computation tier and a stateful storage tier
Employed by Google AppEngine
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
53. Domain-specific platform
Target traditional web applications
Enforce an application structure of clean separation between a stateless
computation tier and a stateful storage tier
Employed by Google AppEngine
Applications are expected to be request-reply based
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
54. Domain-specific platform
Target traditional web applications
Enforce an application structure of clean separation between a stateless
computation tier and a stateful storage tier
Employed by Google AppEngine
Applications are expected to be request-reply based
In contrast to the bare metal hardware abstraction, enable automatic
scaling and high-availability mechanisms
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
55. Domain-specific platform
Target traditional web applications
Enforce an application structure of clean separation between a stateless
computation tier and a stateful storage tier
Employed by Google AppEngine
Applications are expected to be request-reply based
In contrast to the bare metal hardware abstraction, enable automatic
scaling and high-availability mechanisms
Not suitable for general-purpose computing
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
56. Hybrid
Offer a sweet spot between flexibility and programmer convenience
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
57. Hybrid
Offer a sweet spot between flexibility and programmer convenience
Offered by Microsoft’s Azure
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
58. Hybrid
Offer a sweet spot between flexibility and programmer convenience
Offered by Microsoft’s Azure
Applications are written using .NET libraries and compiled to the Common
Language Runtime (A language-independent management environment)
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
59. Hybrid
Offer a sweet spot between flexibility and programmer convenience
Offered by Microsoft’s Azure
Applications are written using .NET libraries and compiled to the Common
Language Runtime (A language-independent management environment)
Supports general purpose computing
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
60. Hybrid
Offer a sweet spot between flexibility and programmer convenience
Offered by Microsoft’s Azure
Applications are written using .NET libraries and compiled to the Common
Language Runtime (A language-independent management environment)
Supports general purpose computing
Users have control over the choice of language but not the underlying OS
or runtime
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
61. Hybrid
Offer a sweet spot between flexibility and programmer convenience
Offered by Microsoft’s Azure
Applications are written using .NET libraries and compiled to the Common
Language Runtime (A language-independent management environment)
Supports general purpose computing
Users have control over the choice of language but not the underlying OS
or runtime
Provide some degree of automatic failover and scalability but require
some help from the developer in the form of declaration of some
application properties
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
62. Outline
1 Introduction
2 Cloud service providers
3 Utility Computing
4 Economics
5 Challenges
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 16 / 22
63. Elasticity
Pay-as-you-go model: Only pay for what you use
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
64. Elasticity
Pay-as-you-go model: Only pay for what you use
Add or remove resources at a fine grain (such as one server at a time)
with minimal lead time
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
65. Elasticity
Pay-as-you-go model: Only pay for what you use
Add or remove resources at a fine grain (such as one server at a time)
with minimal lead time
Useful for traffic spikes such as “Black Friday”
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
66. Elasticity
Pay-as-you-go model: Only pay for what you use
Add or remove resources at a fine grain (such as one server at a time)
with minimal lead time
Useful for traffic spikes such as “Black Friday”
Over time, hardware costs come down and vendors acquire updated
hardware. Thus, benefiting the tenant
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
67. Reasons for companies to migrate to the cloud
Pay separately per resource: Pay proportional to resource requirements
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
68. Reasons for companies to migrate to the cloud
Pay separately per resource: Pay proportional to resource requirements
Power, cooling, and physical plant costs: Cost of electricity and
cooling already factored in
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
69. Reasons for companies to migrate to the cloud
Pay separately per resource: Pay proportional to resource requirements
Power, cooling, and physical plant costs: Cost of electricity and
cooling already factored in
Man-power costs: No need to employ sysadmins
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
70. Reasons for companies to migrate to the cloud
Pay separately per resource: Pay proportional to resource requirements
Power, cooling, and physical plant costs: Cost of electricity and
cooling already factored in
Man-power costs: No need to employ sysadmins
Operational costs: Low-level upgrades and software patches
responsibility of the provider
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
71. Outline
1 Introduction
2 Cloud service providers
3 Utility Computing
4 Economics
5 Challenges
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 19 / 22
72. Obstacles
1 Service availability: Possibility of cloud outage
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
73. Obstacles
1 Service availability: Possibility of cloud outage
2 Data lock-in: Reliance on cloud specific APIs
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
74. Obstacles
1 Service availability: Possibility of cloud outage
2 Data lock-in: Reliance on cloud specific APIs
3 Security: Requires strong encrypted storage, VLANs, and network
middleboxes (firewalls, etc.)
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
75. Obstacles
1 Service availability: Possibility of cloud outage
2 Data lock-in: Reliance on cloud specific APIs
3 Security: Requires strong encrypted storage, VLANs, and network
middleboxes (firewalls, etc.)
4 Data transfer bottlenecks: Moving large amounts of data in and out is
expensive
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
76. Obstacles
1 Service availability: Possibility of cloud outage
2 Data lock-in: Reliance on cloud specific APIs
3 Security: Requires strong encrypted storage, VLANs, and network
middleboxes (firewalls, etc.)
4 Data transfer bottlenecks: Moving large amounts of data in and out is
expensive
5 Performance unpredictability: Resource sharing between applications
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
77. Obstacles (2)
6 Scalable storage: No standard model to arbitrarily scale storage up and
down on-demand while ensuring data durability and high availability
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
78. Obstacles (2)
6 Scalable storage: No standard model to arbitrarily scale storage up and
down on-demand while ensuring data durability and high availability
7 Bugs in large-scale distributed systems: Hard to debug large-scale
applications in full deployment
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
79. Obstacles (2)
6 Scalable storage: No standard model to arbitrarily scale storage up and
down on-demand while ensuring data durability and high availability
7 Bugs in large-scale distributed systems: Hard to debug large-scale
applications in full deployment
8 Scaling quickly: Automatically scaling while conserving resources and
money is an open ended problem
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
80. Obstacles (2)
6 Scalable storage: No standard model to arbitrarily scale storage up and
down on-demand while ensuring data durability and high availability
7 Bugs in large-scale distributed systems: Hard to debug large-scale
applications in full deployment
8 Scaling quickly: Automatically scaling while conserving resources and
money is an open ended problem
9 Reputation fate sharing: Bad behaviour by one tenant can reflect badly
on the rest
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
81. Obstacles (2)
6 Scalable storage: No standard model to arbitrarily scale storage up and
down on-demand while ensuring data durability and high availability
7 Bugs in large-scale distributed systems: Hard to debug large-scale
applications in full deployment
8 Scaling quickly: Automatically scaling while conserving resources and
money is an open ended problem
9 Reputation fate sharing: Bad behaviour by one tenant can reflect badly
on the rest
10 Software licensing: Gap between pay-as-you-go model and software
licensing
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
82. References
1 Above the Clouds: A Berkeley View of Cloud Computing" by Michael
Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz,
Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica,
and Matei Zaharia. Technical Report EECS-2009-28, EECS Department,
University of California, Berkeley.
Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 22 / 22