SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen


Cloud computing is a model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider
interaction.
NIST

Shared Infrastructure
Dynamic Provisioning
Managed Metering
Network Access
Cloud computing is an evolving paradigm. It is a potential technology to
change IT Services. The elasticity of resources plays an important part in
cloud computing.
Cloud computing provides,
OnDemand
Services
Broad
Network
Access

Measured
Services

Resource

Rapid

Pooling

Elasticity
Public Cloud

Private Cloud
Community Cloud
Hybrid Cloud
SaaS

IaaS

PaaS

Softyware as a Service

Platform as a Service

Infrastructure as a Service

-ERP

-Application Developement

-Caching

-CRM

-Web streaming

-Networking

-Email

-Decision Support

-Security

-Collaborative

CONSUME

-System Management

BUILD

HOST
Easy Connectivity
Inexpensive
Efficient Storage and Computing
Widespread Availability
Reliable and Redundant


Cloud computing makes eminent sense for small scale
enterprises. With no upfront investment; it allows SMEs a cost
effective solution with their capital.



It just a flat monthly rate and you’re sorted; no need to worry
about buying those expensive hardware solutions or to take
care of scalability issues.



As per your business demands; you can scale up and down.
Cloud computing provides better functionality then a
conventional solutions which are so expensive.


Cloud computing provides mobility; be it your office or a
comfort of your own home, you can access your business
software and all you need to do is ‘Login’.



Cloud computing makes sharing a cake walk. It expands your
business boundaries.



Better resilience and security is a key feature of cloud
computing which SMEs couldn’t afford otherwise.



Cloud computing effectively cuts down the labor cost up to
15-20%.


When it comes to implying mission-critical application; large
scale enterprise gives cloud system a second thought.



As the mission-critical application has sensitive
information, vulnerability issues are higher; that’s the main
reason for large scale enterprise to not adapt cloud
computing as it still contains some deficiencies.



Though the scenario is changing these days, especially after
Microsoft office 365 adopted cloud computing.


Hybrid cloud is a solution for large scale enterprises when
affordability of public cloud and security of private cloud is
needed.



Cloud computing provides best breed of services if it is
managed well by the large scale enterprises.



Cloud computing implies “Green approach”, we are not just
talking about environment; cloud computing also cuts down
the expenditures of large scale enterprise by 30%. Energy cost
goes tremendously down by adapting cloud computing.


Cloud computing has several security loopholes which makes it
vulnerable.



Cloud computing is yet to adhere several regulatory requirements
and security laws.



As cyber policy differs from country to country, there are some
legal issues in cloud computing.



Confidentiality is the major issue in cloud system, as all the
information is stored at remote location.



Another big issue with cloud system is encryption; it is very
essential for ensuring the security of data which is yet to be
implemented.


Denial of Service attack:
Denial of service attacks are the most common hacking attacks. Hackers flood
network host by invalid requests that occupies all the resources. This ultimately
affects in responding the legitimate requests.



Authentication attack:
In hosted and virtual services, authentication is a weak point. The methods and
mechanism used to secure the authentication process are frequently targeted.



Side channel attack:
Malicious virtual machine in close proximity to host system is placed in host
system. Side channel attack has emerged as effective security threat targeting
systems. Hence resilience to side channel attack is important.



Man in middle attack:
In man in middle attack, attacker gets in the middle of our interactions with
others and eavesdrops on data coming back and forth.
Research is being done on security issues in cloud computing
system. Researchers are still discovering the security issues
that are needed to be resolved in order to provide reliable
and robust solutions.
Cloud Computing  - True Vision Technologies

Weitere ähnliche Inhalte

Was ist angesagt?

Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computinggaurav jain
 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with servicesSuresh Kumar
 
2017 Cloud Computing Primer
2017 Cloud Computing Primer2017 Cloud Computing Primer
2017 Cloud Computing PrimerRajesh Math
 
Cloud reference architecture as per nist
Cloud reference architecture as per nistCloud reference architecture as per nist
Cloud reference architecture as per nistgaurav jain
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing TSplusIndia
 
1 introduction to cloud computing
1 introduction to cloud computing1 introduction to cloud computing
1 introduction to cloud computingVaibhav Khanna
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAllwyn24
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructureGaurav Jain
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingieeepondy
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesIntel Corporation
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
Testing under cloud
Testing under cloudTesting under cloud
Testing under cloudgaurav jain
 

Was ist angesagt? (20)

Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
Cloud computing with services
Cloud computing with servicesCloud computing with services
Cloud computing with services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
2017 Cloud Computing Primer
2017 Cloud Computing Primer2017 Cloud Computing Primer
2017 Cloud Computing Primer
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud reference architecture as per nist
Cloud reference architecture as per nistCloud reference architecture as per nist
Cloud reference architecture as per nist
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
1 introduction to cloud computing
1 introduction to cloud computing1 introduction to cloud computing
1 introduction to cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructure
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Testing under cloud
Testing under cloudTesting under cloud
Testing under cloud
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 

Ähnlich wie Cloud Computing - True Vision Technologies

Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing coursesndshkgowda
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉ki779521
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentationrichszy
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 

Ähnlich wie Cloud Computing - True Vision Technologies (20)

Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉Benefits of cloud computing key points 👉
Benefits of cloud computing key points 👉
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
70 74
70 7470 74
70 74
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 

Kürzlich hochgeladen

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Kürzlich hochgeladen (20)

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Cloud Computing - True Vision Technologies

  • 1.
  • 2.  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST Shared Infrastructure Dynamic Provisioning Managed Metering Network Access
  • 3. Cloud computing is an evolving paradigm. It is a potential technology to change IT Services. The elasticity of resources plays an important part in cloud computing. Cloud computing provides, OnDemand Services Broad Network Access Measured Services Resource Rapid Pooling Elasticity
  • 5.
  • 6.
  • 7. SaaS IaaS PaaS Softyware as a Service Platform as a Service Infrastructure as a Service -ERP -Application Developement -Caching -CRM -Web streaming -Networking -Email -Decision Support -Security -Collaborative CONSUME -System Management BUILD HOST
  • 8. Easy Connectivity Inexpensive Efficient Storage and Computing Widespread Availability Reliable and Redundant
  • 9.  Cloud computing makes eminent sense for small scale enterprises. With no upfront investment; it allows SMEs a cost effective solution with their capital.  It just a flat monthly rate and you’re sorted; no need to worry about buying those expensive hardware solutions or to take care of scalability issues.  As per your business demands; you can scale up and down. Cloud computing provides better functionality then a conventional solutions which are so expensive.
  • 10.  Cloud computing provides mobility; be it your office or a comfort of your own home, you can access your business software and all you need to do is ‘Login’.  Cloud computing makes sharing a cake walk. It expands your business boundaries.  Better resilience and security is a key feature of cloud computing which SMEs couldn’t afford otherwise.  Cloud computing effectively cuts down the labor cost up to 15-20%.
  • 11.  When it comes to implying mission-critical application; large scale enterprise gives cloud system a second thought.  As the mission-critical application has sensitive information, vulnerability issues are higher; that’s the main reason for large scale enterprise to not adapt cloud computing as it still contains some deficiencies.  Though the scenario is changing these days, especially after Microsoft office 365 adopted cloud computing.
  • 12.  Hybrid cloud is a solution for large scale enterprises when affordability of public cloud and security of private cloud is needed.  Cloud computing provides best breed of services if it is managed well by the large scale enterprises.  Cloud computing implies “Green approach”, we are not just talking about environment; cloud computing also cuts down the expenditures of large scale enterprise by 30%. Energy cost goes tremendously down by adapting cloud computing.
  • 13.  Cloud computing has several security loopholes which makes it vulnerable.  Cloud computing is yet to adhere several regulatory requirements and security laws.  As cyber policy differs from country to country, there are some legal issues in cloud computing.  Confidentiality is the major issue in cloud system, as all the information is stored at remote location.  Another big issue with cloud system is encryption; it is very essential for ensuring the security of data which is yet to be implemented.
  • 14.  Denial of Service attack: Denial of service attacks are the most common hacking attacks. Hackers flood network host by invalid requests that occupies all the resources. This ultimately affects in responding the legitimate requests.  Authentication attack: In hosted and virtual services, authentication is a weak point. The methods and mechanism used to secure the authentication process are frequently targeted.  Side channel attack: Malicious virtual machine in close proximity to host system is placed in host system. Side channel attack has emerged as effective security threat targeting systems. Hence resilience to side channel attack is important.  Man in middle attack: In man in middle attack, attacker gets in the middle of our interactions with others and eavesdrops on data coming back and forth.
  • 15. Research is being done on security issues in cloud computing system. Researchers are still discovering the security issues that are needed to be resolved in order to provide reliable and robust solutions.