SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
BASICS OF CLOUD COMPUTING 
Anshi Bhadoria 
September 2013 
© 2013 Anshi Bhadoria
Agenda 
‱What is ‘Cloud Computing’? 
‱Service models 
‱Essential characteristics 
‱Deployment models 
‱Industry and international standards 
‱Drivers and concerns 
‱Adoption statistics 
2 
© 2013 Anshi Bhadoria
What is ‘Cloud Computing’? 
“Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” 
-NIST (National Institute of Standards and Technology) 
3 
“Cloud computing is not a product you buy. It’s not a SKU. It’s not a technology. It’s an IT delivery model.” 
-Mike Martin, Director of Cloud Computing for Logicalis 
© 2013 Anshi Bhadoria
Service models (1/4) 
4 
IaaS(Infrastructure as a Service) 
PaaS(Platform as a Service) 
SaaS 
(Software as a Service) 
© 2013 Anshi Bhadoria
Service models (2/4) –IaaS 
5 
Instead of owning, managing, and operating your own computer hardware, you can use computers that someone else owns, manages, and operates! 
Infrastructure:Storage, networks, and other fundamental computing resources 
Usage: Deploy and run software, OS, etc. 
Key premises: 
‱Economies of scale 
‱Virtualization 
Definition 
“The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating system and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating system, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).” 
© 2013 Anshi Bhadoria
Service models (3/4) –PaaS 
6 
Service provider is responsible for run-time monitoring and management. The consumer defines the configuration for service provider to follow. 
This requires middleware and application deployment mechanism is defined. 
Typical technology support: 
‱Linux, Windows OS 
‱SQL database 
‱Java, PHP, others 
Definition 
“The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed application s and possibly application hosting environment configurations.” 
© 2013 Anshi Bhadoria
Service models (4/4) –SaaS 
7 
Ultimately, you can let the service provider run all your software. You may need different applications from different vendors. In that case, you may have to worry about integration. 
Variations: 
‱Thin client (browsers) 
‱Mobile applications (browser- less) 
Definition 
“The capability provided to the consumer is to use provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a think client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration setting.” 
© 2013 Anshi Bhadoria
Essential characteristics 
8 
© 2013 Anshi Bhadoria
Deployment models (1/2) –The measure 
9 
Cost 
Security 
Private/ Virtual private cloud 
Community cloud 
Hybrid cloud 
Public cloud 
© 2013 Anshi Bhadoria
Deployment models (2/2) –Definitions 
10 
Private/ Virtual private cloud 
“The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premise or off-premise.” 
Public cloud 
“The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.” 
Community cloud 
“The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on-premise or off-premise.” 
Hybrid cloud 
“The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).” 
© 2013 Anshi Bhadoria
Industry and international standards 
11 
Use of standards is fundamental to the existence of cloud. Standards assist in: 
(1) Portability (2) Uniformity 
Areas of standardization: 
Physical networking: The IEEE (Institute for Electrical and Electronics Engineers) provides standards for physical networking, such as Ethernet. 
Logical networking: The ISO (International Standards Organization) provides logical networking standards, such as the networking framework known as the OSI (Open System Interface) model. The Internet Engineering Task Force provides logical networking standards, such as the protocol standard such TCP/IP, the foundation of the Internet. 
Security protocols: Security is another area where standards are necessary. Some security standards, such as 802.1X, are part of the IEEE part networking protocols. This standard deals with port security, switches, and wireless access points. 
Industry specific privacy regulations: 
‱HIPAA (Health Insurance Portability and Accountability Act) 
‱GLBA (TheGramm– Leach–Bliley Act, also known as the Financial Services Modernization Act of 1999) 
‱Other international privacy regulations 
© 2013 Anshi Bhadoria
Drivers and concerns 
12 
Based on a survey done by Cisco and PC Connection. Refer: http://www.formtek.com/blog/?p=3984 
65% 
Security 
34% 
Inability to integrate current systems/ applications 
32% 
Legal and security compliance 
28% 
Lack of cloud standards 
27% 
Lack of visibility into future costs 
20% 
Managing a vendor/ partner 
42% 
Improved backup and disaster recovery 
40% 
Always available application access 
40% 
Cost savings 
38% 
Reduction of onsite infrastructure 
35% 
Easier scalability in capacity 
33% 
Improved workforce mobility 
Drivers 
Concerns 
© 2013 Anshi Bhadoria
Adoption statistics 
13 
Source: IDC-Infosys Cloud Study 2012 
© 2013 Anshi Bhadoria
THANK YOU! 
References 
Drivers and concerns: http://www.formtek.com/blog/?p=3984 
Adoption statistics: IDC-Infosys Cloud Study 2012 
Key definitions: Cloud Computing for Business –The Open Group Guide 
© 2013 Anshi Bhadoria

Weitere Àhnliche Inhalte

Was ist angesagt?

Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computingBIJIT GHOSH
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationVivek Ravindran
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptSarvesh Meena
 
Cloud computing
Cloud computingCloud computing
Cloud computingArar Fahem
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1Md. Mashiur Rahman
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGEShalini Toluchuri
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computingeShikshak
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingNaveed Farooq
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
cloud-computing
cloud-computingcloud-computing
cloud-computingSuneel Dogra
 
Cloud computing
Cloud computingCloud computing
Cloud computingWaseem Ahmed
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Cloud computing
Cloud computingCloud computing
Cloud computingSarthakNawal1
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Was ist angesagt? (20)

cloud computing
 cloud computing cloud computing
cloud computing
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Presentation on Cloud computing
Presentation on Cloud computingPresentation on Cloud computing
Presentation on Cloud computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Ähnlich wie Basics of Cloud Computing

ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understandRahulBhole12
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computingRaj Sarode
 
oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373Prithvi Rajkumar
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained Juan Pablo
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694Sandeep Saxena
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 

Ähnlich wie Basics of Cloud Computing (20)

ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
 
oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373oracle-cloud-computing-wp-076373
oracle-cloud-computing-wp-076373
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
Cloud pres (1)
Cloud pres (1)Cloud pres (1)
Cloud pres (1)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 

KĂŒrzlich hochgeladen

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

KĂŒrzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Basics of Cloud Computing

  • 1. BASICS OF CLOUD COMPUTING Anshi Bhadoria September 2013 © 2013 Anshi Bhadoria
  • 2. Agenda ‱What is ‘Cloud Computing’? ‱Service models ‱Essential characteristics ‱Deployment models ‱Industry and international standards ‱Drivers and concerns ‱Adoption statistics 2 © 2013 Anshi Bhadoria
  • 3. What is ‘Cloud Computing’? “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” -NIST (National Institute of Standards and Technology) 3 “Cloud computing is not a product you buy. It’s not a SKU. It’s not a technology. It’s an IT delivery model.” -Mike Martin, Director of Cloud Computing for Logicalis © 2013 Anshi Bhadoria
  • 4. Service models (1/4) 4 IaaS(Infrastructure as a Service) PaaS(Platform as a Service) SaaS (Software as a Service) © 2013 Anshi Bhadoria
  • 5. Service models (2/4) –IaaS 5 Instead of owning, managing, and operating your own computer hardware, you can use computers that someone else owns, manages, and operates! Infrastructure:Storage, networks, and other fundamental computing resources Usage: Deploy and run software, OS, etc. Key premises: ‱Economies of scale ‱Virtualization Definition “The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating system and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating system, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).” © 2013 Anshi Bhadoria
  • 6. Service models (3/4) –PaaS 6 Service provider is responsible for run-time monitoring and management. The consumer defines the configuration for service provider to follow. This requires middleware and application deployment mechanism is defined. Typical technology support: ‱Linux, Windows OS ‱SQL database ‱Java, PHP, others Definition “The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed application s and possibly application hosting environment configurations.” © 2013 Anshi Bhadoria
  • 7. Service models (4/4) –SaaS 7 Ultimately, you can let the service provider run all your software. You may need different applications from different vendors. In that case, you may have to worry about integration. Variations: ‱Thin client (browsers) ‱Mobile applications (browser- less) Definition “The capability provided to the consumer is to use provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a think client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration setting.” © 2013 Anshi Bhadoria
  • 8. Essential characteristics 8 © 2013 Anshi Bhadoria
  • 9. Deployment models (1/2) –The measure 9 Cost Security Private/ Virtual private cloud Community cloud Hybrid cloud Public cloud © 2013 Anshi Bhadoria
  • 10. Deployment models (2/2) –Definitions 10 Private/ Virtual private cloud “The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premise or off-premise.” Public cloud “The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.” Community cloud “The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on-premise or off-premise.” Hybrid cloud “The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).” © 2013 Anshi Bhadoria
  • 11. Industry and international standards 11 Use of standards is fundamental to the existence of cloud. Standards assist in: (1) Portability (2) Uniformity Areas of standardization: Physical networking: The IEEE (Institute for Electrical and Electronics Engineers) provides standards for physical networking, such as Ethernet. Logical networking: The ISO (International Standards Organization) provides logical networking standards, such as the networking framework known as the OSI (Open System Interface) model. The Internet Engineering Task Force provides logical networking standards, such as the protocol standard such TCP/IP, the foundation of the Internet. Security protocols: Security is another area where standards are necessary. Some security standards, such as 802.1X, are part of the IEEE part networking protocols. This standard deals with port security, switches, and wireless access points. Industry specific privacy regulations: ‱HIPAA (Health Insurance Portability and Accountability Act) ‱GLBA (TheGramm– Leach–Bliley Act, also known as the Financial Services Modernization Act of 1999) ‱Other international privacy regulations © 2013 Anshi Bhadoria
  • 12. Drivers and concerns 12 Based on a survey done by Cisco and PC Connection. Refer: http://www.formtek.com/blog/?p=3984 65% Security 34% Inability to integrate current systems/ applications 32% Legal and security compliance 28% Lack of cloud standards 27% Lack of visibility into future costs 20% Managing a vendor/ partner 42% Improved backup and disaster recovery 40% Always available application access 40% Cost savings 38% Reduction of onsite infrastructure 35% Easier scalability in capacity 33% Improved workforce mobility Drivers Concerns © 2013 Anshi Bhadoria
  • 13. Adoption statistics 13 Source: IDC-Infosys Cloud Study 2012 © 2013 Anshi Bhadoria
  • 14. THANK YOU! References Drivers and concerns: http://www.formtek.com/blog/?p=3984 Adoption statistics: IDC-Infosys Cloud Study 2012 Key definitions: Cloud Computing for Business –The Open Group Guide © 2013 Anshi Bhadoria