SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CLOUD
COMPUTING
M.R.Lakshika Rasanjali Maththegama
Agenda
1. Cloud Computing ?
4. Stages of Cloud Computing
5. Success points
6. Weak points
7. Future Trends
2. Types of Cloud Computing
3. Cloud Providers
Cloud
Computing ?
Cloud Computing ?
Cloud computing is a computing
style where the IT-related
capabilities are provided as a
service across the Internet.
Cloud Computing ?
Cloud
Use something without knowing what is going
on inside.Users are shielded from the details
how something actually works.
Types of Cloud
Computing
Cloud Categories
Public Cloud
Private Cloud
Hybrid Cloud
This deployment system allows anyone with proper permissions to access some of the
applications and resources.
This infrastructure runs strictly on a private network, which means that people present in the
network can only access it.
It is probably the fascinating form of Cloud Computing that contains the functionality of both
public and private clouds.
Cloud Categories
SaaS - Software as a Service
IaaS - Infrastructure as a Service
PaaS - Platform as a Service
Here, the cloud providers offer you the end product, which could be an application or software
that you can buy directly on a subscription.
Delivers fundamental computing, network, and storage resources to consumers on-demand,
over the internet,..
PaaS vendors offer a development environment to application developers.
Cloud Providers
Cloud Providers
01
Amazon Web Services
Google Cloud
Azure cloud
IBM cloud
ORACLE cloud
Stages of Cloud
Computing
First Stages
1. 1960- 1970 - Time-sharing concept
4. 2008 - Google App engine
2. 1990 - VPN services
3. 2000 - Amazon Web Services
5. 2010 - Microsoft Azure
6. 2011 - IBM cloud / ICloud
8. 2017 - Containers
7. 2012 - Oracle cloud
9. 2019
How we use cloud
computing now ?
1. Store, back up, and recover data
4. Analyze Data
2. Stream sudio and video
3. Software Development
5. Create cloud native applications
Art Applications
Audio Streaming
Video Streaming
Flie Storage
Google Apps
Social Applications
Meeting applications
GPS Applications
Image Editing Applications
Management Application
Success Points
Eliminates the capital
expense of buying hardware
and software and setting up
Cost
Most cloud computing
services are provided self
service , typically with just a
few mouse clicks.
Speed
Reduced network latency for
applications and greater
economies of scale.
Performance
Many cloud providers offer a broad set
of policies, technologies, and controls
that strengthen your security posture
overall, helping protect your data,
apps, and infrastructure from potential
threats.
Security
Success Points
Scalability
You can easily set up an
automated monitoring tool
to do the job for you.
Global scale
Ability to scale widely.
Weak Points
Eliminates the capital
expense of buying hardware
and software and setting up
Technical outages
Every component is online,
which exposes potential
vulnerabilities
Vulnerability to attack
Adopting cloud solutions on
a small scale and for short-
term projects can be
perceived as being
expensive.
Cost conserns
Easy switching between cloud services
is a service that hasn’t yet completely
evolved
Vendor lock-in
Weak Points
Security & Privacy
storing data and important
files on external service
providers always opens up
risks.
Limited Control &
flexibility
Transfers minimal control
over the customer .
Future Trends
The evolution to cloud native network functions
and distributed cloud computing enables service
providers to move beyond traditional connectivity
01
Edge Computing
Increases automation and self-learning capabilities,
greater data security and privacy, and more
personalized cloud experiences.
03
AI and ML
Ability to quickly restore critical systems in the
event of a natural or man-made catastrophe
02
Disaster Recovery
Offer a combination of public and private clouds
dedicated to a specific company
04
Multi & Hybrid Cloud Solutions
New trends in 2023
This trend will expand the usage of managed
“security-as-a-service
05
Cloud Security
Enables large-scale deployments that are highly
scalable and efficient.
07
Kubernetes
will become a significant industry in 2023 with the
introduction of 5G.
06
Cloud Gaming
Compute resources are provided as a service rather
than installed on physical servers.
08
Serverless Computing
Thank You

Weitere ähnliche Inhalte

Ähnlich wie Cloud Computing.pptx

Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper Assem mousa
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxSURBHI SAROHA
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxGoogleGaming2
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 

Ähnlich wie Cloud Computing.pptx (20)

Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 

Mehr von Lakshika Rasanjali

Mehr von Lakshika Rasanjali (8)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Teachers management system
Teachers management systemTeachers management system
Teachers management system
 
Graphics for adjecency matrices
Graphics for adjecency matricesGraphics for adjecency matrices
Graphics for adjecency matrices
 
Vehicle Emission Testing System 2
Vehicle Emission Testing System 2Vehicle Emission Testing System 2
Vehicle Emission Testing System 2
 
Google I/O
Google I/O Google I/O
Google I/O
 
Vehicle Emission Testing System
Vehicle Emission Testing SystemVehicle Emission Testing System
Vehicle Emission Testing System
 
Question/Answers & Query Dialogue
Question/Answers & Query DialogueQuestion/Answers & Query Dialogue
Question/Answers & Query Dialogue
 
Sql Injection
Sql InjectionSql Injection
Sql Injection
 

Kürzlich hochgeladen

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Kürzlich hochgeladen (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

Cloud Computing.pptx

  • 2. Agenda 1. Cloud Computing ? 4. Stages of Cloud Computing 5. Success points 6. Weak points 7. Future Trends 2. Types of Cloud Computing 3. Cloud Providers
  • 4. Cloud Computing ? Cloud computing is a computing style where the IT-related capabilities are provided as a service across the Internet.
  • 6. Cloud Use something without knowing what is going on inside.Users are shielded from the details how something actually works.
  • 8. Cloud Categories Public Cloud Private Cloud Hybrid Cloud This deployment system allows anyone with proper permissions to access some of the applications and resources. This infrastructure runs strictly on a private network, which means that people present in the network can only access it. It is probably the fascinating form of Cloud Computing that contains the functionality of both public and private clouds.
  • 9. Cloud Categories SaaS - Software as a Service IaaS - Infrastructure as a Service PaaS - Platform as a Service Here, the cloud providers offer you the end product, which could be an application or software that you can buy directly on a subscription. Delivers fundamental computing, network, and storage resources to consumers on-demand, over the internet,.. PaaS vendors offer a development environment to application developers.
  • 11. Cloud Providers 01 Amazon Web Services Google Cloud Azure cloud IBM cloud ORACLE cloud
  • 13. First Stages 1. 1960- 1970 - Time-sharing concept 4. 2008 - Google App engine 2. 1990 - VPN services 3. 2000 - Amazon Web Services 5. 2010 - Microsoft Azure 6. 2011 - IBM cloud / ICloud 8. 2017 - Containers 7. 2012 - Oracle cloud 9. 2019
  • 14. How we use cloud computing now ? 1. Store, back up, and recover data 4. Analyze Data 2. Stream sudio and video 3. Software Development 5. Create cloud native applications
  • 15. Art Applications Audio Streaming Video Streaming Flie Storage Google Apps Social Applications Meeting applications GPS Applications Image Editing Applications Management Application
  • 17. Eliminates the capital expense of buying hardware and software and setting up Cost Most cloud computing services are provided self service , typically with just a few mouse clicks. Speed Reduced network latency for applications and greater economies of scale. Performance Many cloud providers offer a broad set of policies, technologies, and controls that strengthen your security posture overall, helping protect your data, apps, and infrastructure from potential threats. Security Success Points Scalability You can easily set up an automated monitoring tool to do the job for you. Global scale Ability to scale widely.
  • 19. Eliminates the capital expense of buying hardware and software and setting up Technical outages Every component is online, which exposes potential vulnerabilities Vulnerability to attack Adopting cloud solutions on a small scale and for short- term projects can be perceived as being expensive. Cost conserns Easy switching between cloud services is a service that hasn’t yet completely evolved Vendor lock-in Weak Points Security & Privacy storing data and important files on external service providers always opens up risks. Limited Control & flexibility Transfers minimal control over the customer .
  • 21. The evolution to cloud native network functions and distributed cloud computing enables service providers to move beyond traditional connectivity 01 Edge Computing Increases automation and self-learning capabilities, greater data security and privacy, and more personalized cloud experiences. 03 AI and ML Ability to quickly restore critical systems in the event of a natural or man-made catastrophe 02 Disaster Recovery Offer a combination of public and private clouds dedicated to a specific company 04 Multi & Hybrid Cloud Solutions New trends in 2023 This trend will expand the usage of managed “security-as-a-service 05 Cloud Security Enables large-scale deployments that are highly scalable and efficient. 07 Kubernetes will become a significant industry in 2023 with the introduction of 5G. 06 Cloud Gaming Compute resources are provided as a service rather than installed on physical servers. 08 Serverless Computing