An Introduction to Cloud Computing

Slides:



Advertisements
Similar presentations
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Advertisements

By Glenn Z.  A network is 2 or more computers connected to each other.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Page 1 CITS Active Directory Implementation UMass Dartmouth.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Privacy in a Public World ISACA North Alabama Chapter March 11, 2008.
EVERYTHING YOU NEED TO KNOW ABOUT CLOUD STORAGE BY: JONATHAN SANBORN SECTION 005.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
Computation for Physics 計算物理概論 Introduction to Linux.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Google cloud Vs Apple Cloud Made By: Pooja Dubey (ITSNS)
LANs and WANs Coatbridge High School Computing Department.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
Cloud Computing.
In the name of God :).
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Module 5: Configuring Access for Remote Clients and Networks.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
© 2010 Computer Science Faculty, Kabul University HTTP CONTINUED… 4 TH LECTURE 2, May, 2010 Baseer Ahmad Baheer.
Technology Vocabulary Words. Understanding the meaning A motherboard is the main circuit board of the computer. Why do you think it is called a motherboard.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
How to create a SharePoint site MICROSOFT OFFICE SHAREPOINT DESIGNER.
Communications & Networks National 4 & 5 Computing Science.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
Configuring and Deploying Web Applications Lesson 7.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Introduction to Networking. What is a Network? Discuss in groups.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
The Functions of Operating Systems Network Operating Systems (NOS)
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
INFSO-RI Enabling Grids for E-sciencE Grid & Cloud Computing Introduction
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Investigation authentication using AAF for the CVL on NeCTAR
Technology Vocabulary Words
Virtual Network Computing
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
practice-questions.html If you Are Thinking about your dumps? Introduction:
Client-Server Computing
COMPUTER PRIVACY.
Magento Enterprise Hosting Magento enterprise hosting is an internet space provider which provides website space and other services to make their website.
File Transfer Protocol
Tiers vs. Layers.
How ICT is used Businesses, Organisations and Individuals use Information Technology in many ways.
Communications & Computer Networks Resource Notes - Introduction
Online software and backups
ONLINE SECURE DATA SERVICE
LO3 – Understand Business IT Systems
Revision PowerPoint By Nicole Davidson.
Chapter 2 Application Layer
Done by:Thikra abdullah
Computer Applications Unit B
Presentation transcript:

An Introduction to Cloud Computing What is The Cloud? An Introduction to Cloud Computing

Defining The Cloud The Cloud: A broad term used when talking about "The Internet" but with an emphasis on web applications and online storage.   Cloud Computing: Internet-based computing in which large groups of remote servers are networked so as to allow sharing of data-processing tasks, centralized data storage, and online access to computer services or resources. - www.dictionary.com

How does it work? Data Centers: The facilities that house cloud storage systems.         Where stuff you upload into "the cloud" lives. "A client (e.g., a computer user subscribing to a cloud storage service) sends copies of files over the Internet to the data server, which then records the information. When the client wishes to retrieve the information, he or she accesses the data server through a Web-based interface. The server then either sends the files back to the client or allows the client to access and manipulate the files on the server itself." - www.howstuffworks.com   What would be some benefits to cloud computing? Can you think of any cloud services you might already use?

Examples of Cloud Services

Issues and Concerns 1. Reliability 2. Security & Privacy Encryption Authentication- usernames & passwords Authorization    Philosophical Question- Who owns the data you upload into the cloud?