SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
MOBILE CLOUDS




Presented
By
t.Baskar,
2nd MCA,
ADHIYAMAAN COLLEGE OF ENGNIEERING,
HOSUR. MAIL ID:t.baskar25@gmail.com
1.INTRODUCTION

                            2. ARCHITECTURE

                            3.INFRASTUCTURE

                            4.APPLICATION

                            5.SECURITY

                            6.CURRENT STATUS


                            7.CONCLUSION



ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
INTRODUCTION
 Mobile cloud computing is the combination of cloud computing and
  mobile networks to bring benefits for mobile users, network operators, as
  well as cloud providers . Cloud computing exists when tasks and data are
  kept on the Internet rather than on individual devices, providing on-demand
  access.

 Applications are run on a remote server and then sent to the user. Because
  of the advanced improvement in mobile browsers like
 Apple
 Google
 Microsoft

 Mobile devices (e.g., smartphone, tablet pcs, etc) are increasingly
  becoming an essential part of human life as the most effective and
  convenient communication tools not bounded by time and place

       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
ARCHITECTURE




  ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
3 MAJOR FUNCTION




   ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
INFRASTUCTURE




  ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
APPLICATION

 1.Mobile Computing

 2.Mobile Commerce

 3.Mobile Learning
 4.Mobile Healthcare

 5.Mobile Gaming




    ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
SECURITY
• Enjoy Better Security For Your Data — Many people erroneously
  assume that the security they provide in the workplace is better than the
  security for cloud based applications. Nothing could be further from the
  truth. In this case it is important to ask your provider about security but in
  general providers work hard to harden security to make your data safe and
  secure. Whereas data stored on your




       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
CURRENT STATUS
• Use of cloud services at home, in the workplace and in large enterprises has
  steadily and significantly increased. Now we are seeing a similar trend with
  mobile devices and cloud technology. Mobile devices are already accessing
  a number of cloud services, such as Dropbox, and more third-party
  applications utilize cloud computing technology. It is only a matter of time
  until the technology becomes the central force to mobile applications

• Mobile cloud computing gives new company chances for mobile network
  providers. Several operators such as Vodafone , Orange and Verizon have
  started to offer cloud computing services for companies.




       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
CONCLUSION
          We have covered several representative mobile cloud approaches.
Much other related work exist, but the purpose of this paper is to give an
overview of the wide spectrum of mobile cloud computing possibilities. None
of the existing approaches meets completely the requirements of mobile
clouds. Native (offline) and Web (online) applications are the two extremes of
mobile applications.

 Break the storage device to stored unlimited data in cloud.

 Essentially, back-end systems will be linked up to the cloud, and from there
  they can be more easily accessed from mobile devices as well as from other
  online services.




       ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
Thank You
                  for your attention…
ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.

Weitere ähnliche Inhalte

Was ist angesagt?

Balancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age EmployabilityBalancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age EmployabilityDenpong Soodphakdee
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...WithTheBest
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Information Technology
Information TechnologyInformation Technology
Information Technologyarhyel gerald
 

Was ist angesagt? (7)

Balancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age EmployabilityBalancing Graduate Skills for Digital Age Employability
Balancing Graduate Skills for Digital Age Employability
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
Handheld Learning
Handheld LearningHandheld Learning
Handheld Learning
 
Technology in mobile
Technology in mobileTechnology in mobile
Technology in mobile
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Technology update
Technology updateTechnology update
Technology update
 

Andere mochten auch

The fault in our stars case study
The fault in our stars case studyThe fault in our stars case study
The fault in our stars case studyاسية صديقة
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control systemSundas Kayani
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing BasicsBelal Raslan
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobilesDurairaja
 

Andere mochten auch (6)

TFIOS Fandom Presentation
TFIOS Fandom PresentationTFIOS Fandom Presentation
TFIOS Fandom Presentation
 
The fault in our stars case study
The fault in our stars case studyThe fault in our stars case study
The fault in our stars case study
 
Project final
Project finalProject final
Project final
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 

Ähnlich wie Mobile clouds

Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicranjana dalwani
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based LearningIRJET Journal
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingDr Amira Bibo
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxaudeleypearl
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportUsman Sait
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdfKarla Long
 
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...BRNSSPublicationHubI
 

Ähnlich wie Mobile clouds (20)

40120130405016
4012013040501640120130405016
40120130405016
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based Learning
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
 
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
Optimizing Using the Offloading Technique and Dynamic Computation in the Mobi...
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Mobile clouds

  • 1. MOBILE CLOUDS Presented By t.Baskar, 2nd MCA, ADHIYAMAAN COLLEGE OF ENGNIEERING, HOSUR. MAIL ID:t.baskar25@gmail.com
  • 2. 1.INTRODUCTION 2. ARCHITECTURE 3.INFRASTUCTURE 4.APPLICATION 5.SECURITY 6.CURRENT STATUS 7.CONCLUSION ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 3. INTRODUCTION  Mobile cloud computing is the combination of cloud computing and mobile networks to bring benefits for mobile users, network operators, as well as cloud providers . Cloud computing exists when tasks and data are kept on the Internet rather than on individual devices, providing on-demand access.  Applications are run on a remote server and then sent to the user. Because of the advanced improvement in mobile browsers like  Apple  Google  Microsoft  Mobile devices (e.g., smartphone, tablet pcs, etc) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 4. ARCHITECTURE ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 5. 3 MAJOR FUNCTION ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 6.
  • 7.
  • 8. ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 9. INFRASTUCTURE ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 10. APPLICATION 1.Mobile Computing 2.Mobile Commerce 3.Mobile Learning 4.Mobile Healthcare 5.Mobile Gaming ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 11. SECURITY • Enjoy Better Security For Your Data — Many people erroneously assume that the security they provide in the workplace is better than the security for cloud based applications. Nothing could be further from the truth. In this case it is important to ask your provider about security but in general providers work hard to harden security to make your data safe and secure. Whereas data stored on your ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 12. CURRENT STATUS • Use of cloud services at home, in the workplace and in large enterprises has steadily and significantly increased. Now we are seeing a similar trend with mobile devices and cloud technology. Mobile devices are already accessing a number of cloud services, such as Dropbox, and more third-party applications utilize cloud computing technology. It is only a matter of time until the technology becomes the central force to mobile applications • Mobile cloud computing gives new company chances for mobile network providers. Several operators such as Vodafone , Orange and Verizon have started to offer cloud computing services for companies. ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 13. CONCLUSION We have covered several representative mobile cloud approaches. Much other related work exist, but the purpose of this paper is to give an overview of the wide spectrum of mobile cloud computing possibilities. None of the existing approaches meets completely the requirements of mobile clouds. Native (offline) and Web (online) applications are the two extremes of mobile applications.  Break the storage device to stored unlimited data in cloud.  Essentially, back-end systems will be linked up to the cloud, and from there they can be more easily accessed from mobile devices as well as from other online services. ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.
  • 14.
  • 15. Thank You for your attention… ADHIYAMAAN COLLEGE OF ENGNIEERING,HOSUR.