SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Cloud Computing
1
Cloud Computing
Table of Contents
 What is Cloud Computing
 Cloud Services
 Cloud Architecture
 Comparative Study
 Expenditure
 Features
 Traditional in-house business
 Cloud Penetration
2
Cloud Computing
What is Cloud Computing
Cloud Computing is a buzzword…………
The concept, quite simply, is that vast computing
resources will reside in a remote location
(rather than in your computer room) and we’ll
connect to them and use them as needed.
3
Cloud Computing
4 Cloud Computing
Software as a Service [SaaS]:
 Instead of obtaining desktop and server
licenses for software products it uses, an
enterprise can obtain the same functions
through a hosted service from a provider
through a network connection. This common
cloud-computing model is known as So ftware
as a Se rvice (SaaS), the pro vide r is kno wn as
the SaaS Pro vide r. These applications could
be in ERP, VCC to name a few.
5
Cloud Computing
Advantages of SaaS
 Saves the complexity of software installation.
 No need for maintenance, upgrades, and
patches (for example, for security fixes) for the
IT team within the enterprise.
 SaaS provider can provide this service to
multiple customers and enterprises, resulting
in a multitenant model.
 Monitoring application-delivery performance is
the responsibility of the SaaS provider.
6
Cloud Computing
Platform as a Service [PaaS]
 Platfo rm as a Se rvice (PaaS) pro vide s a
so ftware platfo rm o n which use rs can build
the ir o wn applicatio ns and ho st the m o n the
PaaS pro vide r’s infrastructure . The so ftware
platfo rm is use d as a de ve lo pm e nt fram e wo rk
to build, de bug , and de plo y applicatio ns. It
o fte n pro vide s m iddle ware -style se rvice s such
as database and co m po ne nt se rvice s fo r use
by applicatio ns.
7
Cloud Computing
Advantages of PaaS
 PaaS is a true cloud model in that applications
do not need to worry about the scalability of
the underlying platform (hardware and
software).
 When enterprises write their application to run
over the PaaS provider’s software platform,
the elasticity and scalability is guaranteed
transparently by the PaaS platform.
8
Cloud Computing
Infrastructure as a Service [IaaS]
 Amazon is arguably the first major proponent
of Infrastructure as a Se rvice (IaaS) thro ug h
its Elastic Co m puting Clo ud (EC2) se rvice . An
IaaS pro vide r o ffe rs yo u “raw” co m puting ,
sto rag e , and ne two rk infrastructure so that yo u
can lo ad yo ur o wn so ftware , including
o pe rating syste m s and applicatio ns, o n to this
infrastructure .
9
Cloud Computing
Advantages of IaaS
 Offers you the greatest degree of control of
the three models.
 Scaling and elasticity are your—not the
provider’s—responsibility.
 It is a mini do-it-yourself data center that you
have to configure to get the job done.
 Amazon uses virtualization as a critical
underpinning of its EC2 service, so you
actually get a VM when you ask for a specific
machine configuration
10
Cloud Computing
Cloud Architectures
1. Public Cloud
2. Community Cloud
3. Private Cloud
4. Hybrid Cloud
11
Cloud Computing
Cloud Architectures: Public Cloud
 We have focused on cloud service providers
whose data centers are external to the users
of the service (businesses or individuals).
These clouds are known as public clouds—
both the infrastructure and control of these
clouds is with the service provider.
12
Cloud Computing
Cloud Architectures: Private Cloud
 A variation on this scenario is the private
clo ud. He re , the clo ud pro vide r is re spo nsible
o nly fo r the infrastructure and no t fo r the
co ntro l. This se tup is e q uivale nt to a se ctio n o f
a share d data ce nte r be ing partitio ne d fo r use
by a spe cific custo m e r. The private cloud can
offer SaaS, PaaS, or IaaS services, though
IaaS might appear to be a more natural fit.
13
Cloud Computing
Cloud Architectures: Hybrid Cloud
 A hybrid cloud involves data centers storing
secure and important data on the enterprise
premises and less important data to be stores
at a remote location in the cloud. So t is a
mixture of public and private cloud that yields
the most benefit.
14
Cloud Computing
15
Cloud Computing
Comparative Study
Traditional In-house system
implementation
Cloud services in the formof SaaS, Paas
and IaaS
1. High CapEx 1. OpEx oriented
2. Time required to implement the system 2. Comparatively low startup cost
3. Maintenance Cost 3. Pay for what you use
4. Equipment depreciation 4. Low maintenance cost
5. Dedicated staff for 24 * 7 support 5. Scalable and secure environment
6. Under-utilized resources 6. Business companies can focus on
business development, not on IT.
16
Cloud Computing
Expenditure
By 2011 16 billion or
4% of total IT
s:pending will be on
cloud.
By 2012, it is likely to
go upto 9%.
Reasons: Cost
controls, Better Peak
time Economy,
Readily Scalable,
Concentrate on the
business and less on
IT infrastructure.
17
Cloud Computing
Features

Agility

Reliability

Scalability

Performance

Security

Maintenance
18
Cloud Computing
Feature 1: Scalability
 Clo ud co m puting g ive s yo u the ability to
e xpand and re duce re so urce s acco rding to
yo ur spe cific se rvice re q uire m e nt.
 Fo r e xam ple , yo u m ay ne e d a larg e num be r
o f se rve r re so urce s fo r the duratio n o f a
spe cific task. Yo u can the n re le ase the se
se rve r re so urce s afte r yo u co m ple te yo ur task.
 twitterfo r instance
19
Cloud Computing
Feature2: Pay-per-use
 Yo u pay fo r clo ud se rvice s o nly whe n yo u use
the m .
 The sho rt te rm (fo r e xam ple , fo r CPUtim e )
o r
 fo r a lo ng e r duratio n (fo r e xam ple , fo r clo ud-
base d sto rag e o r vault se rvice s).
20
Cloud Computing
Feature 3: On-demand service
 Be cause yo u invo ke clo ud se rvice s o nly whe n
yo u ne e d the m , the y are no t pe rm ane nt parts
o f yo ur IT infrastructure — a sig nificant
advantag e fo r clo ud use as o ppo se d to
inte rnal IT se rvice s. With clo ud se rvice s the re
is no ne e d to have de dicate d re so urce s
waiting to be use d, as is the case with inte rnal
se rvice s.
21
Cloud Computing
Feature 3: Resiliency
 The re silie ncy o f a clo ud se rvice o ffe ring can
co m ple te ly iso late the failure o f se rve r and
sto rag e re so urce s fro m clo ud use rs. Wo rk is
m ig rate d to a diffe re nt physicalre so urce in the
clo ud with o r witho ut use r aware ne ss and
inte rve ntio n.
22
Cloud Computing
Traditional in-house business
software
Employees Your business Servers
CRM
POS
ERP
HRM
Email
VCC
Hardware dependency
Operating systems
Databases
Security patches
Unpredictable costs
Softwares
23
Cloud Computing
Cloud Computing Penetration
software
Employees Your business Servers
CRM
POS
ERP
HRM
Email
VCC
Hardware dependency
Operating systems
Databases
Security patches
Unpredictable costs
Softwares
Cloud Computing
24
Cloud Computing
Traditional in-house business
Employers Your business
CRM
POS
ERP
HRM
Email
VCC
Softwares
Cloud Computing
ERP
Hosted
PBX
Email
More
More
10 employees =
10 subscriptions
25
Cloud Computing
Traditional in-house business
Employers Your business
CRM
POS
ERP
HRM
Email
VCC
Softwares
Cloud Computing
datacenters
10 employees =
10 subscriptions
Hardware dependency
Operating systems
Databases
Security patches
Unpredictable costs
26
Cloud Computing
Traditional in-house business
Cloud Computing
datacenters
Hardware dependency
Operating systems
Databases
Security patches
Unpredictable costs
Economies of
Scale
30% to 50% less
in expenditure
27
Cloud Computing
Areas of cloud computing

Banking

Hospitals

Educational institutions
28
Cloud Computing

Weitere ähnliche Inhalte

Was ist angesagt?

Wp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-cloudsWp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-cloudsFaisal Farooq
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Project
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudEmbotics Corp.
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
Making secret sharing based cloud storage usable
Making secret sharing based  cloud storage usableMaking secret sharing based  cloud storage usable
Making secret sharing based cloud storage usableYing wei (Joe) Chou
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewsri_kanth0526
 
Cisco Cloud Computing White Paper
Cisco Cloud Computing White PaperCisco Cloud Computing White Paper
Cisco Cloud Computing White Paperlamcindoe
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingMohammed Sajjad Ali
 
Design of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackDesign of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackYing wei (Joe) Chou
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadFaisal Shehzad
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noidataramandal
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 

Was ist angesagt? (20)

CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Wp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-cloudsWp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-clouds
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Cloud management
Cloud managementCloud management
Cloud management
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Making secret sharing based cloud storage usable
Making secret sharing based  cloud storage usableMaking secret sharing based  cloud storage usable
Making secret sharing based cloud storage usable
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cisco Cloud Computing White Paper
Cisco Cloud Computing White PaperCisco Cloud Computing White Paper
Cisco Cloud Computing White Paper
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
 
Design of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackDesign of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstack
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 

Ähnlich wie Features of cloud

Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purposeAsif Anik
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purposeAsif Anik
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewjaimehra05
 
Cloud computing by Rajat Shukla
Cloud computing by Rajat ShuklaCloud computing by Rajat Shukla
Cloud computing by Rajat ShuklaRajat Shukla
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsShaun Thomas
 
An Insight into Cloud Computing Paradigm and Services
An Insight into Cloud Computing Paradigm and ServicesAn Insight into Cloud Computing Paradigm and Services
An Insight into Cloud Computing Paradigm and Servicesijtsrd
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptMunmunSaha7
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptahmedraed19
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 

Ähnlich wie Features of cloud (20)

Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purpose
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purpose
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud computing by Rajat Shukla
Cloud computing by Rajat ShuklaCloud computing by Rajat Shukla
Cloud computing by Rajat Shukla
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
An Insight into Cloud Computing Paradigm and Services
An Insight into Cloud Computing Paradigm and ServicesAn Insight into Cloud Computing Paradigm and Services
An Insight into Cloud Computing Paradigm and Services
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
Sunil
SunilSunil
Sunil
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Mehr von sagaroceanic11

Module 21 investigative reports
Module 21 investigative reportsModule 21 investigative reports
Module 21 investigative reportssagaroceanic11
 
Module 20 mobile forensics
Module 20 mobile forensicsModule 20 mobile forensics
Module 20 mobile forensicssagaroceanic11
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimessagaroceanic11
 
Module 18 investigating web attacks
Module 18 investigating web attacksModule 18 investigating web attacks
Module 18 investigating web attackssagaroceanic11
 
Module 17 investigating wireless attacks
Module 17 investigating wireless attacksModule 17 investigating wireless attacks
Module 17 investigating wireless attackssagaroceanic11
 
Module 04 digital evidence
Module 04 digital evidenceModule 04 digital evidence
Module 04 digital evidencesagaroceanic11
 
Module 03 searching and seizing computers
Module 03 searching and seizing computersModule 03 searching and seizing computers
Module 03 searching and seizing computerssagaroceanic11
 
Module 01 computer forensics in todays world
Module 01 computer forensics in todays worldModule 01 computer forensics in todays world
Module 01 computer forensics in todays worldsagaroceanic11
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mwaresagaroceanic11
 
Virtualisation overview
Virtualisation overviewVirtualisation overview
Virtualisation overviewsagaroceanic11
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisationsagaroceanic11
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
1 introduction to itil v[1].3
1 introduction to itil v[1].31 introduction to itil v[1].3
1 introduction to itil v[1].3sagaroceanic11
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overviewsagaroceanic11
 

Mehr von sagaroceanic11 (20)

Module 21 investigative reports
Module 21 investigative reportsModule 21 investigative reports
Module 21 investigative reports
 
Module 20 mobile forensics
Module 20 mobile forensicsModule 20 mobile forensics
Module 20 mobile forensics
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
 
Module 18 investigating web attacks
Module 18 investigating web attacksModule 18 investigating web attacks
Module 18 investigating web attacks
 
Module 17 investigating wireless attacks
Module 17 investigating wireless attacksModule 17 investigating wireless attacks
Module 17 investigating wireless attacks
 
Module 04 digital evidence
Module 04 digital evidenceModule 04 digital evidence
Module 04 digital evidence
 
Module 03 searching and seizing computers
Module 03 searching and seizing computersModule 03 searching and seizing computers
Module 03 searching and seizing computers
 
Module 01 computer forensics in todays world
Module 01 computer forensics in todays worldModule 01 computer forensics in todays world
Module 01 computer forensics in todays world
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
 
Virtualisation overview
Virtualisation overviewVirtualisation overview
Virtualisation overview
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
6 service operation
6 service operation6 service operation
6 service operation
 
5 service transition
5 service transition5 service transition
5 service transition
 
4 service design
4 service design4 service design
4 service design
 
3 service strategy
3 service strategy3 service strategy
3 service strategy
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
1 introduction to itil v[1].3
1 introduction to itil v[1].31 introduction to itil v[1].3
1 introduction to itil v[1].3
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overview
 
Vb introduction.
Vb introduction.Vb introduction.
Vb introduction.
 

Kürzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Features of cloud

  • 2. Table of Contents  What is Cloud Computing  Cloud Services  Cloud Architecture  Comparative Study  Expenditure  Features  Traditional in-house business  Cloud Penetration 2 Cloud Computing
  • 3. What is Cloud Computing Cloud Computing is a buzzword………… The concept, quite simply, is that vast computing resources will reside in a remote location (rather than in your computer room) and we’ll connect to them and use them as needed. 3 Cloud Computing
  • 5. Software as a Service [SaaS]:  Instead of obtaining desktop and server licenses for software products it uses, an enterprise can obtain the same functions through a hosted service from a provider through a network connection. This common cloud-computing model is known as So ftware as a Se rvice (SaaS), the pro vide r is kno wn as the SaaS Pro vide r. These applications could be in ERP, VCC to name a few. 5 Cloud Computing
  • 6. Advantages of SaaS  Saves the complexity of software installation.  No need for maintenance, upgrades, and patches (for example, for security fixes) for the IT team within the enterprise.  SaaS provider can provide this service to multiple customers and enterprises, resulting in a multitenant model.  Monitoring application-delivery performance is the responsibility of the SaaS provider. 6 Cloud Computing
  • 7. Platform as a Service [PaaS]  Platfo rm as a Se rvice (PaaS) pro vide s a so ftware platfo rm o n which use rs can build the ir o wn applicatio ns and ho st the m o n the PaaS pro vide r’s infrastructure . The so ftware platfo rm is use d as a de ve lo pm e nt fram e wo rk to build, de bug , and de plo y applicatio ns. It o fte n pro vide s m iddle ware -style se rvice s such as database and co m po ne nt se rvice s fo r use by applicatio ns. 7 Cloud Computing
  • 8. Advantages of PaaS  PaaS is a true cloud model in that applications do not need to worry about the scalability of the underlying platform (hardware and software).  When enterprises write their application to run over the PaaS provider’s software platform, the elasticity and scalability is guaranteed transparently by the PaaS platform. 8 Cloud Computing
  • 9. Infrastructure as a Service [IaaS]  Amazon is arguably the first major proponent of Infrastructure as a Se rvice (IaaS) thro ug h its Elastic Co m puting Clo ud (EC2) se rvice . An IaaS pro vide r o ffe rs yo u “raw” co m puting , sto rag e , and ne two rk infrastructure so that yo u can lo ad yo ur o wn so ftware , including o pe rating syste m s and applicatio ns, o n to this infrastructure . 9 Cloud Computing
  • 10. Advantages of IaaS  Offers you the greatest degree of control of the three models.  Scaling and elasticity are your—not the provider’s—responsibility.  It is a mini do-it-yourself data center that you have to configure to get the job done.  Amazon uses virtualization as a critical underpinning of its EC2 service, so you actually get a VM when you ask for a specific machine configuration 10 Cloud Computing
  • 11. Cloud Architectures 1. Public Cloud 2. Community Cloud 3. Private Cloud 4. Hybrid Cloud 11 Cloud Computing
  • 12. Cloud Architectures: Public Cloud  We have focused on cloud service providers whose data centers are external to the users of the service (businesses or individuals). These clouds are known as public clouds— both the infrastructure and control of these clouds is with the service provider. 12 Cloud Computing
  • 13. Cloud Architectures: Private Cloud  A variation on this scenario is the private clo ud. He re , the clo ud pro vide r is re spo nsible o nly fo r the infrastructure and no t fo r the co ntro l. This se tup is e q uivale nt to a se ctio n o f a share d data ce nte r be ing partitio ne d fo r use by a spe cific custo m e r. The private cloud can offer SaaS, PaaS, or IaaS services, though IaaS might appear to be a more natural fit. 13 Cloud Computing
  • 14. Cloud Architectures: Hybrid Cloud  A hybrid cloud involves data centers storing secure and important data on the enterprise premises and less important data to be stores at a remote location in the cloud. So t is a mixture of public and private cloud that yields the most benefit. 14 Cloud Computing
  • 16. Comparative Study Traditional In-house system implementation Cloud services in the formof SaaS, Paas and IaaS 1. High CapEx 1. OpEx oriented 2. Time required to implement the system 2. Comparatively low startup cost 3. Maintenance Cost 3. Pay for what you use 4. Equipment depreciation 4. Low maintenance cost 5. Dedicated staff for 24 * 7 support 5. Scalable and secure environment 6. Under-utilized resources 6. Business companies can focus on business development, not on IT. 16 Cloud Computing
  • 17. Expenditure By 2011 16 billion or 4% of total IT s:pending will be on cloud. By 2012, it is likely to go upto 9%. Reasons: Cost controls, Better Peak time Economy, Readily Scalable, Concentrate on the business and less on IT infrastructure. 17 Cloud Computing
  • 19. Feature 1: Scalability  Clo ud co m puting g ive s yo u the ability to e xpand and re duce re so urce s acco rding to yo ur spe cific se rvice re q uire m e nt.  Fo r e xam ple , yo u m ay ne e d a larg e num be r o f se rve r re so urce s fo r the duratio n o f a spe cific task. Yo u can the n re le ase the se se rve r re so urce s afte r yo u co m ple te yo ur task.  twitterfo r instance 19 Cloud Computing
  • 20. Feature2: Pay-per-use  Yo u pay fo r clo ud se rvice s o nly whe n yo u use the m .  The sho rt te rm (fo r e xam ple , fo r CPUtim e ) o r  fo r a lo ng e r duratio n (fo r e xam ple , fo r clo ud- base d sto rag e o r vault se rvice s). 20 Cloud Computing
  • 21. Feature 3: On-demand service  Be cause yo u invo ke clo ud se rvice s o nly whe n yo u ne e d the m , the y are no t pe rm ane nt parts o f yo ur IT infrastructure — a sig nificant advantag e fo r clo ud use as o ppo se d to inte rnal IT se rvice s. With clo ud se rvice s the re is no ne e d to have de dicate d re so urce s waiting to be use d, as is the case with inte rnal se rvice s. 21 Cloud Computing
  • 22. Feature 3: Resiliency  The re silie ncy o f a clo ud se rvice o ffe ring can co m ple te ly iso late the failure o f se rve r and sto rag e re so urce s fro m clo ud use rs. Wo rk is m ig rate d to a diffe re nt physicalre so urce in the clo ud with o r witho ut use r aware ne ss and inte rve ntio n. 22 Cloud Computing
  • 23. Traditional in-house business software Employees Your business Servers CRM POS ERP HRM Email VCC Hardware dependency Operating systems Databases Security patches Unpredictable costs Softwares 23 Cloud Computing
  • 24. Cloud Computing Penetration software Employees Your business Servers CRM POS ERP HRM Email VCC Hardware dependency Operating systems Databases Security patches Unpredictable costs Softwares Cloud Computing 24 Cloud Computing
  • 25. Traditional in-house business Employers Your business CRM POS ERP HRM Email VCC Softwares Cloud Computing ERP Hosted PBX Email More More 10 employees = 10 subscriptions 25 Cloud Computing
  • 26. Traditional in-house business Employers Your business CRM POS ERP HRM Email VCC Softwares Cloud Computing datacenters 10 employees = 10 subscriptions Hardware dependency Operating systems Databases Security patches Unpredictable costs 26 Cloud Computing
  • 27. Traditional in-house business Cloud Computing datacenters Hardware dependency Operating systems Databases Security patches Unpredictable costs Economies of Scale 30% to 50% less in expenditure 27 Cloud Computing
  • 28. Areas of cloud computing  Banking  Hospitals  Educational institutions 28 Cloud Computing