SlideShare uma empresa Scribd logo
1 de 16
-Vaswani Payal
Bioinformatics
 The practice of using a network of
remote servers hosted on the
Internet to store, manage, and
process data, rather than a local
server or a personal computer.
 Cloud computing is a recently
evolved computing
terminology or metaphor
based on utility and
consumption of computing
resources.
 Cloud computing involves
deploying groups of remote
servers and software networks
that allow centralized data
storage and online access to
computer services or
resources.
i. Agility:- It is very quick and graceful.
ii. Application Programming Interface:- It is a software which
allows the user to interact with the cloud software in a
similar way as a normal interface allows the interaction of
humans and computers.
iii. Cost:- The reduction is claimed by the cloud providers.
Most of the people have concluded that reduction depends
on the type of activities and the infrastructure provided.
iv. Maintenance:- It is easier because they do not need to be
installed on each user's computer and can be accessed
from different places.
v. Multitenancy:- enables sharing of resources and costs
across a large pool of users thus allowing for
centralization, peak load capacity, utilization and
efficiency.
vi. Productivity:- It may be increased when multiple users
can work on the same data simultaneously, rather than
waiting for it to be saved and emailed.
vii.Time:- Time may be saved as information does not
need to be re-entered when fields are matched, nor do
users need to install application software upgrades to
their computer.
viii.Security:- Security can improve due to centralization
of data, increased security-focused resources,
etc. Security is often as good as or better than other
traditional systems, in part because providers are able
to devote resources to solving security issues that many
customers cannot afford to tackle.
 Infrastructure as a service is sometimes referred to Hardware
as a service(HaaS).
 The reason behind this is that it is a model that provides
physical or most often virtual machines.
 Infrastructure as a Service is a provision model in which an
organization outsources the equipment used to support
operations, including storage, hardware, servers and
networking components.
 The service provider owns the equipment and is responsible
for housing, running and maintaining it.
 The client typically pays on a per-use basis.
 Now, as a name suggests, this model provides a platform to us
for getting into the cloud computing.
 It includes operating system, programming language
execution environment, database and web server.
 Application developers can develop and run their software
solutions on a cloud platform without the cost and complexity
of buying and managing the underlying hardware and
software layers.
 Platform as a service (PaaS) provides a computing platform
and a key chimney. It joins with software as a service (SaaS)
and infrastructure as a service (IaaS), model of cloud
computing.
 In the business model using software as a service (SaaS), users
are provided access to application software and databases.
 Cloud providers manage the infrastructure and platforms that
run the applications.
 In the SaaS model, cloud providers install and operate
application software in the cloud and cloud users access the
software from cloud clients.
 Cloud users do not manage the cloud infrastructure and
platform where the application runs.
 This eliminates the need to install and run the application
on the cloud user's own computers, which simplifies
maintenance and support.
 There are three deployment models.
1) Private Cloud:- Private cloud is cloud infrastructure
operated solely for a single organization, whether managed
internally or by a third-party, and hosted either internally or
externally
2) Public Cloud:- A cloud is called a "public cloud" when the
services are rendered over a network that is open for public
use.
3) Hybrid Cloud:- Hybrid cloud is a composition of two or
more clouds that remain distinct entities but are bound
together, offering the benefits of multiple deployment
models.
Cloud computing

Mais conteúdo relacionado

Mais procurados

Cloud computing ravi namboori
Cloud computing ravi nambooriCloud computing ravi namboori
Cloud computing ravi nambooriravi namboori
 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with servicesSuresh Kumar
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsMohammed Sajjad Ali
 
Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computingacemindia
 
Cloud computing
Cloud computingCloud computing
Cloud computingRam Sharma
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingRavi Kumar
 
Cloud reference architecture as per nist
Cloud reference architecture as per nistCloud reference architecture as per nist
Cloud reference architecture as per nistgaurav jain
 

Mais procurados (16)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ravi namboori
Cloud computing ravi nambooriCloud computing ravi namboori
Cloud computing ravi namboori
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with services
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
 
Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud reference architecture as per nist
Cloud reference architecture as per nistCloud reference architecture as per nist
Cloud reference architecture as per nist
 
Kussu.ppt
Kussu.pptKussu.ppt
Kussu.ppt
 

Destaque

Manual do propietário mp nx4 falcon d2203-man-0276
Manual do propietário mp nx4 falcon   d2203-man-0276Manual do propietário mp nx4 falcon   d2203-man-0276
Manual do propietário mp nx4 falcon d2203-man-0276Thiago Huari
 
Puppy in Bubble World Finals Presentation
Puppy in Bubble World Finals PresentationPuppy in Bubble World Finals Presentation
Puppy in Bubble World Finals PresentationMostafa Nageeb
 
Multiple sclerosis
Multiple sclerosisMultiple sclerosis
Multiple sclerosisvichuvichu
 
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...Thiago Huari
 
Primer on Epigenetics given at the IRSF family conference 2011
Primer on Epigenetics given at the IRSF family conference 2011Primer on Epigenetics given at the IRSF family conference 2011
Primer on Epigenetics given at the IRSF family conference 2011Christopher Wynder
 
Ssis.memoria v
Ssis.memoria vSsis.memoria v
Ssis.memoria vimartini
 
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...Thiago Huari
 
PT3 BAHASA INGGERIS 12 ( Section A)
PT3 BAHASA INGGERIS 12 ( Section A)PT3 BAHASA INGGERIS 12 ( Section A)
PT3 BAHASA INGGERIS 12 ( Section A)Miz Malinz
 
The hidden and lost treasures of india
The hidden and lost treasures of indiaThe hidden and lost treasures of india
The hidden and lost treasures of indiaJayakrishnan kichu
 

Destaque (14)

Proyecto diplomado
Proyecto diplomadoProyecto diplomado
Proyecto diplomado
 
The Overflow of Jesus
The Overflow of JesusThe Overflow of Jesus
The Overflow of Jesus
 
Tamgram
TamgramTamgram
Tamgram
 
Manual do propietário mp nx4 falcon d2203-man-0276
Manual do propietário mp nx4 falcon   d2203-man-0276Manual do propietário mp nx4 falcon   d2203-man-0276
Manual do propietário mp nx4 falcon d2203-man-0276
 
Puppy in Bubble World Finals Presentation
Puppy in Bubble World Finals PresentationPuppy in Bubble World Finals Presentation
Puppy in Bubble World Finals Presentation
 
32 38pp bioquimica
32 38pp bioquimica32 38pp bioquimica
32 38pp bioquimica
 
Multiple sclerosis
Multiple sclerosisMultiple sclerosis
Multiple sclerosis
 
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...
 
Primer on Epigenetics given at the IRSF family conference 2011
Primer on Epigenetics given at the IRSF family conference 2011Primer on Epigenetics given at the IRSF family conference 2011
Primer on Epigenetics given at the IRSF family conference 2011
 
Ssis.memoria v
Ssis.memoria vSsis.memoria v
Ssis.memoria v
 
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job   d2203-...
Manual do propietário mp cg150 titan ks es esd cg150 sport cg150 job d2203-...
 
Células gameticas y somáticas
Células gameticas y somáticasCélulas gameticas y somáticas
Células gameticas y somáticas
 
PT3 BAHASA INGGERIS 12 ( Section A)
PT3 BAHASA INGGERIS 12 ( Section A)PT3 BAHASA INGGERIS 12 ( Section A)
PT3 BAHASA INGGERIS 12 ( Section A)
 
The hidden and lost treasures of india
The hidden and lost treasures of indiaThe hidden and lost treasures of india
The hidden and lost treasures of india
 

Semelhante a Cloud computing

Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfpreetajain
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paperShashi Bhushan
 

Semelhante a Cloud computing (20)

cloud computing
cloud computing cloud computing
cloud computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cloud computing

  • 2.  The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
  • 3.
  • 4.  Cloud computing is a recently evolved computing terminology or metaphor based on utility and consumption of computing resources.  Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources.
  • 5. i. Agility:- It is very quick and graceful. ii. Application Programming Interface:- It is a software which allows the user to interact with the cloud software in a similar way as a normal interface allows the interaction of humans and computers. iii. Cost:- The reduction is claimed by the cloud providers. Most of the people have concluded that reduction depends on the type of activities and the infrastructure provided. iv. Maintenance:- It is easier because they do not need to be installed on each user's computer and can be accessed from different places.
  • 6. v. Multitenancy:- enables sharing of resources and costs across a large pool of users thus allowing for centralization, peak load capacity, utilization and efficiency. vi. Productivity:- It may be increased when multiple users can work on the same data simultaneously, rather than waiting for it to be saved and emailed. vii.Time:- Time may be saved as information does not need to be re-entered when fields are matched, nor do users need to install application software upgrades to their computer. viii.Security:- Security can improve due to centralization of data, increased security-focused resources, etc. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle.
  • 7.
  • 8.  Infrastructure as a service is sometimes referred to Hardware as a service(HaaS).  The reason behind this is that it is a model that provides physical or most often virtual machines.  Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components.  The service provider owns the equipment and is responsible for housing, running and maintaining it.  The client typically pays on a per-use basis.
  • 9.
  • 10.  Now, as a name suggests, this model provides a platform to us for getting into the cloud computing.  It includes operating system, programming language execution environment, database and web server.  Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers.  Platform as a service (PaaS) provides a computing platform and a key chimney. It joins with software as a service (SaaS) and infrastructure as a service (IaaS), model of cloud computing.
  • 11.
  • 12.  In the business model using software as a service (SaaS), users are provided access to application software and databases.  Cloud providers manage the infrastructure and platforms that run the applications.  In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients.  Cloud users do not manage the cloud infrastructure and platform where the application runs.  This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support.
  • 13.
  • 14.
  • 15.  There are three deployment models. 1) Private Cloud:- Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally 2) Public Cloud:- A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. 3) Hybrid Cloud:- Hybrid cloud is a composition of two or more clouds that remain distinct entities but are bound together, offering the benefits of multiple deployment models.

Notas do Editor

  1. Graphical user interface
  2. centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) peak-load capacity increases (users need not engineer for highest possible load-levels) utilisation and efficiency improvements for systems that are often only 10–20% utilised