SlideShare a Scribd company logo
1 of 14
Download to read offline
Cloud Computing
A Working Definition of Cloud Computing
 Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction.
 This cloud model promotes availability and is composed of five essential
characteristics, three service models, and four deployment models.
.
Objectives of Cloud Computing
 Elasticity: Ability to scale virtual machines resources up or down
 On-demand usage: Ability to add or delete computing power (CPU, memory),
and storage according to demand
 Pay-per-use: Pay only for what you use
 Multitenancy: Ability to have multiplecustomers access their servers in the data
center in an isolated manner
.
5 Essential Cloud Characteristics
 On-demand self-service
 Broad network access
 Resource pooling
 Location independence
 Rapid elasticity
 Measured service
.
3 Cloud Service Models
 Cloud Software as a Service (SaaS)
 The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and accessible from various
client devices through a thin client interface such as a Web browser (e.g., web-based email). The consumer does not manage or control the
underlying cloud infrastructure, network, servers, operating systems, storage, or even individual application capabilities, with the possible exception
of limited user-specific application configuration settings.
 Cloud Platform as a Service (PaaS)
 The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created applications using programming
languages and tools supported by the provider (e.g., Java, Python, .Net). The consumer does not manage or control the underlying cloud
infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application
hosting environment configurations.
 Cloud Infrastructure as a Service (IaaS)
 The capability provided to the consumer is to rent processing, storage, networks, and other fundamental computing resources where the
consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or
control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking
components (e.g., firewalls, load balancers).
 To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics
.
Service Model Architectures
.
Cloud Infrastructure
IaaS
PaaS
SaaS
Infrastructure as a Service (IaaS)
Architectures
Platform as a Service (PaaS)
Architectures
Software as a Service
(SaaS)
Architectures
Cloud Infrastructure
SaaS
Cloud Infrastructure
PaaS
SaaS
Cloud Infrastructure
IaaS
PaaS
Cloud Infrastructure
PaaS
Cloud Infrastructure
IaaS
Saas, PaaS, IaaS

.
3 Features of
Mature SaaS Applications
 SaaS is hosting applications on the Internet as a service (both consumer and enterprise)
 Features of Mature Saas applications:
 Scalable
 Handle growing amounts of work in a graceful manner
 Multi-tenancy
 One application instance may be serving hundreds of companies
 Opposite of multi-instance where each customer is provisioned their own server running one instance
 Metadata driven configurability
 Instead of customizing the application for a customer (requiring code changes), one allows the user to
configure the application through metadata
.
SaaS Maturity Levels
 Level 1: Ad-Hoc/Custom
 Level 2: Configurable
 Level 3: Configurable,
Multi-Tenant-Efficient
 Level 4: Scalable,
Configurable,
Multi-Tenant-Efficient
Source: Microsoft MSDN Architecture Center
3 Cloud Deployment Models
 Private cloud
 The cloud infrastructure is operated solely for an organization. It may be
managed by the organization or a third party and may exist on premise or off
premise.
 Public cloud
 Mega-scale cloud infrastructure is made available to the general public or a
large industry group and is owned by an organization selling cloud services.
 Hybrid cloud
 The cloud infrastructure is a composition of two or more clouds (private or
public) that remain unique entities but are bound together by standardized or
proprietary technology that enables data and application portability
.
Common Cloud Characteristics
 Cloud computing often leverages:
 Massive scale
 Homogeneity
 Virtualization
 Low cost software
 Geographic distribution
 Advanced security technologies
.
Security is the Major Issue
 Cloud computing often leverages:
 Massive scale
 Homogeneity
 Virtualization
 Low cost software
 Geographic distribution
 Advanced security technologies
.
Top Motivators for Adopting Cloud
Computing
Source: IBM Tech Trends Report 2011
.
Cloud Security Advantages
 Shifting public data to a external cloud reduces the exposure of the internal sensitive
data
 Dedicated Security Team
 Greater Investment in Security Infrastructure
 Cloud homogeneity makes security auditing/testing simpler
 Clouds enable automated security management and real-time detection of system
tampering
 Rapid Re-Constitution of Services
 Redundancy / Disaster Recovery
.

More Related Content

What's hot

Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingMohammed Sajjad Ali
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computingAsmaa Ibrahim
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computingRaj Sarode
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
Cloud computing it703 unit iii
Cloud computing it703 unit iiiCloud computing it703 unit iii
Cloud computing it703 unit iiiJitendra s Rathore
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
NIST Definition of Cloud Computing v15
NIST Definition of Cloud Computing v15NIST Definition of Cloud Computing v15
NIST Definition of Cloud Computing v15Bill Annibell
 

What's hot (20)

The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Cloud computing it703 unit iii
Cloud computing it703 unit iiiCloud computing it703 unit iii
Cloud computing it703 unit iii
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
NIST Definition of Cloud Computing v15
NIST Definition of Cloud Computing v15NIST Definition of Cloud Computing v15
NIST Definition of Cloud Computing v15
 

Viewers also liked

Studies in johns letters
Studies in johns lettersStudies in johns letters
Studies in johns lettersGLENN PEASE
 
“La oportunidad de la vida” ximena alexandra pilla pilla
“La oportunidad de la vida”  ximena alexandra pilla pilla“La oportunidad de la vida”  ximena alexandra pilla pilla
“La oportunidad de la vida” ximena alexandra pilla pillaXimena Pilla
 
Investigacion de accidentes e incidentes
Investigacion de accidentes e incidentesInvestigacion de accidentes e incidentes
Investigacion de accidentes e incidentes1991freaks
 
Building trust on remote teams: online workshop
Building trust on remote teams: online workshopBuilding trust on remote teams: online workshop
Building trust on remote teams: online workshopLisette Sutherland
 
Shamnad's assignment
Shamnad's assignmentShamnad's assignment
Shamnad's assignmentJinu Lazer
 
Campus Compact 2012 Annual Member Survey
Campus Compact 2012 Annual Member SurveyCampus Compact 2012 Annual Member Survey
Campus Compact 2012 Annual Member SurveyOhio Campus Compact
 
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"Jan Schmidt
 
Vishunus power point
Vishunus power pointVishunus power point
Vishunus power pointvishnuvn
 
ODERINDE AFOLABI CHRISTOPHER
ODERINDE AFOLABI CHRISTOPHERODERINDE AFOLABI CHRISTOPHER
ODERINDE AFOLABI CHRISTOPHERAfolabi Oderinde
 
Proyecto de marketing. parte 1
Proyecto de marketing. parte 1Proyecto de marketing. parte 1
Proyecto de marketing. parte 1kareleympot
 
Lesson 5- Audience 2 Film Poster Evaluation Sheet
Lesson 5- Audience 2 Film Poster Evaluation SheetLesson 5- Audience 2 Film Poster Evaluation Sheet
Lesson 5- Audience 2 Film Poster Evaluation SheetSamee251
 
Ley Federal de Protección de Datos Personales
Ley Federal de Protección de Datos PersonalesLey Federal de Protección de Datos Personales
Ley Federal de Protección de Datos PersonalesBrayan Becerril Perez
 

Viewers also liked (18)

La Amistad
La AmistadLa Amistad
La Amistad
 
Studies in johns letters
Studies in johns lettersStudies in johns letters
Studies in johns letters
 
“La oportunidad de la vida” ximena alexandra pilla pilla
“La oportunidad de la vida”  ximena alexandra pilla pilla“La oportunidad de la vida”  ximena alexandra pilla pilla
“La oportunidad de la vida” ximena alexandra pilla pilla
 
Investigacion de accidentes e incidentes
Investigacion de accidentes e incidentesInvestigacion de accidentes e incidentes
Investigacion de accidentes e incidentes
 
Building trust on remote teams: online workshop
Building trust on remote teams: online workshopBuilding trust on remote teams: online workshop
Building trust on remote teams: online workshop
 
Shamnad's assignment
Shamnad's assignmentShamnad's assignment
Shamnad's assignment
 
Campus Compact 2012 Annual Member Survey
Campus Compact 2012 Annual Member SurveyCampus Compact 2012 Annual Member Survey
Campus Compact 2012 Annual Member Survey
 
CV4LinkedIn
CV4LinkedInCV4LinkedIn
CV4LinkedIn
 
Adm est proj (alunos parte i)
Adm est proj (alunos   parte i)Adm est proj (alunos   parte i)
Adm est proj (alunos parte i)
 
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
 
Vishunus power point
Vishunus power pointVishunus power point
Vishunus power point
 
ODERINDE AFOLABI CHRISTOPHER
ODERINDE AFOLABI CHRISTOPHERODERINDE AFOLABI CHRISTOPHER
ODERINDE AFOLABI CHRISTOPHER
 
Proyecto de marketing. parte 1
Proyecto de marketing. parte 1Proyecto de marketing. parte 1
Proyecto de marketing. parte 1
 
Mercosur
MercosurMercosur
Mercosur
 
Informe Final PEMAC 2012-2014
Informe Final PEMAC 2012-2014Informe Final PEMAC 2012-2014
Informe Final PEMAC 2012-2014
 
Lesson 5- Audience 2 Film Poster Evaluation Sheet
Lesson 5- Audience 2 Film Poster Evaluation SheetLesson 5- Audience 2 Film Poster Evaluation Sheet
Lesson 5- Audience 2 Film Poster Evaluation Sheet
 
Ley Federal de Protección de Datos Personales
Ley Federal de Protección de Datos PersonalesLey Federal de Protección de Datos Personales
Ley Federal de Protección de Datos Personales
 
Mapping analysis
Mapping analysisMapping analysis
Mapping analysis
 

Similar to Cloudmod4

Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
Cloud def-v15
Cloud def-v15Cloud def-v15
Cloud def-v15sengura
 

Similar to Cloudmod4 (20)

Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
cloud computing
cloud computing cloud computing
cloud computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Cloud def-v15
Cloud def-v15Cloud def-v15
Cloud def-v15
 
Cloud Def V15
Cloud Def V15Cloud Def V15
Cloud Def V15
 
Intoduction of cloud computing
Intoduction of cloud computingIntoduction of cloud computing
Intoduction of cloud computing
 

More from kongara

K.chaitanya sm
K.chaitanya smK.chaitanya sm
K.chaitanya smkongara
 
Stakeholder management
Stakeholder managementStakeholder management
Stakeholder managementkongara
 
K.chaitanya pm
K.chaitanya pmK.chaitanya pm
K.chaitanya pmkongara
 
2 e salesforce objectives.pdf (3 files merged)
2 e salesforce objectives.pdf (3 files merged)2 e salesforce objectives.pdf (3 files merged)
2 e salesforce objectives.pdf (3 files merged)kongara
 
Linear logisticregression
Linear logisticregressionLinear logisticregression
Linear logisticregressionkongara
 
Adwords introduction (1)
Adwords introduction (1)Adwords introduction (1)
Adwords introduction (1)kongara
 
Offpage optimization
Offpage optimizationOffpage optimization
Offpage optimizationkongara
 
Basics of search engines and algorithms (1)
Basics of search engines and algorithms (1)Basics of search engines and algorithms (1)
Basics of search engines and algorithms (1)kongara
 
Isttm evol, dynamics, trends hrm
Isttm evol, dynamics, trends hrmIsttm evol, dynamics, trends hrm
Isttm evol, dynamics, trends hrmkongara
 
Isttm hyd ir v2.0
Isttm hyd ir v2.0Isttm hyd ir v2.0
Isttm hyd ir v2.0kongara
 
Isstm merit rating, promotions & transfers
Isstm merit rating, promotions & transfersIsstm merit rating, promotions & transfers
Isstm merit rating, promotions & transferskongara
 
Matching entrepreneur
Matching entrepreneurMatching entrepreneur
Matching entrepreneurkongara
 
Marketing channel selection
Marketing channel selection Marketing channel selection
Marketing channel selection kongara
 
Market feasibility
Market feasibilityMarket feasibility
Market feasibilitykongara
 
Innovation & entrepreneurship development program
Innovation & entrepreneurship development programInnovation & entrepreneurship development program
Innovation & entrepreneurship development programkongara
 
Industrial policy
Industrial policyIndustrial policy
Industrial policykongara
 
government industrial policies
government industrial policies government industrial policies
government industrial policies kongara
 
Current scenario
Current scenarioCurrent scenario
Current scenariokongara
 
Feasibilitystudy
FeasibilitystudyFeasibilitystudy
Feasibilitystudykongara
 

More from kongara (20)

K.chaitanya sm
K.chaitanya smK.chaitanya sm
K.chaitanya sm
 
Stakeholder management
Stakeholder managementStakeholder management
Stakeholder management
 
K.chaitanya pm
K.chaitanya pmK.chaitanya pm
K.chaitanya pm
 
2 e salesforce objectives.pdf (3 files merged)
2 e salesforce objectives.pdf (3 files merged)2 e salesforce objectives.pdf (3 files merged)
2 e salesforce objectives.pdf (3 files merged)
 
Linear logisticregression
Linear logisticregressionLinear logisticregression
Linear logisticregression
 
Adwords introduction (1)
Adwords introduction (1)Adwords introduction (1)
Adwords introduction (1)
 
Offpage optimization
Offpage optimizationOffpage optimization
Offpage optimization
 
Basics of search engines and algorithms (1)
Basics of search engines and algorithms (1)Basics of search engines and algorithms (1)
Basics of search engines and algorithms (1)
 
Isttm evol, dynamics, trends hrm
Isttm evol, dynamics, trends hrmIsttm evol, dynamics, trends hrm
Isttm evol, dynamics, trends hrm
 
Isttm hyd ir v2.0
Isttm hyd ir v2.0Isttm hyd ir v2.0
Isttm hyd ir v2.0
 
Isstm merit rating, promotions & transfers
Isstm merit rating, promotions & transfersIsstm merit rating, promotions & transfers
Isstm merit rating, promotions & transfers
 
Matching entrepreneur
Matching entrepreneurMatching entrepreneur
Matching entrepreneur
 
Marketing channel selection
Marketing channel selection Marketing channel selection
Marketing channel selection
 
Market feasibility
Market feasibilityMarket feasibility
Market feasibility
 
Innovation & entrepreneurship development program
Innovation & entrepreneurship development programInnovation & entrepreneurship development program
Innovation & entrepreneurship development program
 
Industrial policy
Industrial policyIndustrial policy
Industrial policy
 
government industrial policies
government industrial policies government industrial policies
government industrial policies
 
Current scenario
Current scenarioCurrent scenario
Current scenario
 
Feasibilitystudy
FeasibilitystudyFeasibilitystudy
Feasibilitystudy
 
Dpr
DprDpr
Dpr
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Cloudmod4

  • 2. A Working Definition of Cloud Computing  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.  This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. .
  • 3. Objectives of Cloud Computing  Elasticity: Ability to scale virtual machines resources up or down  On-demand usage: Ability to add or delete computing power (CPU, memory), and storage according to demand  Pay-per-use: Pay only for what you use  Multitenancy: Ability to have multiplecustomers access their servers in the data center in an isolated manner .
  • 4. 5 Essential Cloud Characteristics  On-demand self-service  Broad network access  Resource pooling  Location independence  Rapid elasticity  Measured service .
  • 5. 3 Cloud Service Models  Cloud Software as a Service (SaaS)  The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.  Cloud Platform as a Service (PaaS)  The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created applications using programming languages and tools supported by the provider (e.g., Java, Python, .Net). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application hosting environment configurations.  Cloud Infrastructure as a Service (IaaS)  The capability provided to the consumer is to rent processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load balancers).  To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics .
  • 6. Service Model Architectures . Cloud Infrastructure IaaS PaaS SaaS Infrastructure as a Service (IaaS) Architectures Platform as a Service (PaaS) Architectures Software as a Service (SaaS) Architectures Cloud Infrastructure SaaS Cloud Infrastructure PaaS SaaS Cloud Infrastructure IaaS PaaS Cloud Infrastructure PaaS Cloud Infrastructure IaaS
  • 8. 3 Features of Mature SaaS Applications  SaaS is hosting applications on the Internet as a service (both consumer and enterprise)  Features of Mature Saas applications:  Scalable  Handle growing amounts of work in a graceful manner  Multi-tenancy  One application instance may be serving hundreds of companies  Opposite of multi-instance where each customer is provisioned their own server running one instance  Metadata driven configurability  Instead of customizing the application for a customer (requiring code changes), one allows the user to configure the application through metadata .
  • 9. SaaS Maturity Levels  Level 1: Ad-Hoc/Custom  Level 2: Configurable  Level 3: Configurable, Multi-Tenant-Efficient  Level 4: Scalable, Configurable, Multi-Tenant-Efficient Source: Microsoft MSDN Architecture Center
  • 10. 3 Cloud Deployment Models  Private cloud  The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.  Public cloud  Mega-scale cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.  Hybrid cloud  The cloud infrastructure is a composition of two or more clouds (private or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability .
  • 11. Common Cloud Characteristics  Cloud computing often leverages:  Massive scale  Homogeneity  Virtualization  Low cost software  Geographic distribution  Advanced security technologies .
  • 12. Security is the Major Issue  Cloud computing often leverages:  Massive scale  Homogeneity  Virtualization  Low cost software  Geographic distribution  Advanced security technologies .
  • 13. Top Motivators for Adopting Cloud Computing Source: IBM Tech Trends Report 2011 .
  • 14. Cloud Security Advantages  Shifting public data to a external cloud reduces the exposure of the internal sensitive data  Dedicated Security Team  Greater Investment in Security Infrastructure  Cloud homogeneity makes security auditing/testing simpler  Clouds enable automated security management and real-time detection of system tampering  Rapid Re-Constitution of Services  Redundancy / Disaster Recovery .