Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cloud Computing

No description
by

David Aguilar

on 14 April 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cloud Computing

Cloud
Computing
Agenda
Introduction
Impact on firms and users
Value of cloud computing
strengths
weaknesses
risks
Cloud Computing
A brief history of the evolution of Cloud Computing:
In the 60s and ’70s, most companies used a centralized computing system which consisting of supercomputers with all the software, storage devices, printers, etc. were quite expensive, typically costing millions of dollars. The 1980s brought the growing demand for increasingly more powerful and less expensive microprocessors and personal computers, paving the way for low costs and simplicity.
Being able to store and accessing data and programs over the Internet instead of your computer’s hard drive, examples:
Google Drive
Apple iCloud

Dr. McCarthy is often credited as the father of Artificial Intelligence. In 1961 speech, Dr. McCarthy compared the future of network computing as a utility. "Computing may someday be organized as a public utility, just as the telephone system is a public utility. Each subscriber needs to pay only for the capacity he actually uses, but he has access to all programming languages characteristic of a very large system. Certain subscribers might offer service to other subscribers.The computer utility could become the basis of a new and important industry."
His vision was for everyone to be interconnected and accessing programs and data at any site, from anywhere, was also a Internet pioneer, with an early vision of a world-wide computer network long before it was built.
Cloud Computing Pioneers
Advantages of Cloud Computing
Cost Efficient
Cloud computing may be possibly the most cost efficient method to use, maintain and upgrade. Traditional desktop software along with the licensing fees for multiple users can be very expensive for companies. With cloud computing, there are many one-time-payment, pay-as-you-go and other scalable options available, which makes it very reasonable for a company to afford.
Almost Unlimited Storage
Storing information in the cloud gives a business almost unlimited storage capacity, a business does not have to worry about running out of storage space or increasing their current storage space availability.
Backup and Recovery
Since a business data is stored in the cloud, backing it up and restoring the data is relatively easier than storing the same data on a physical device. Also, most cloud service providers are usually competent enough to handle recovery of information, this makes the entire process of backup and recovery much simpler than other traditional methods of data storage.
Disadvantages of Cloud Computing
Security in the Cloud
A major concern for any business using the cloud computing has to do with security issues. Before subscribing to a cloud computing provider, management should be aware that they will be surrendering all of their company’s sensitive information to a third-party cloud service provider. This has the potential to put your company at great risk. The company needs to be absolutely sure that when choosing the most reliable service provider, the provider will keep their information totally secure.
Prone to Attack
Storing our company's information in the cloud could make your company vulnerable to external hack attacks and threats, nothing on the Internet is completely secure, there is always the possibility of stealth of your comapny's sensitive data.
Technical Issues
although the information and data on the cloud can be accessed anytime and from anywhere, there can be times when the system can have some serious technical issues.A business should be aware of the fact that this technology is always prone to outages and other technical issues. Even the best cloud service providers run into some kind of trouble, in spite of keeping up high standards of maintenance.
Infrastructure-as-a-Service (IaaS)—the Infrastructure services layer:
servers, network devices, and storage disks are made available to organizations as services on a need-to basis, this allows IaaS providers to offer almost unlimited instances of servers to clients, while making cost-effective use of the hosting hardware.
Platform-as-a-Service (PaaS)the Platform layer
The next level provides a platform for creating applications, the development tool itself is hosted in the Cloud and accessed through a browser. With PaaS, developers can build Web applications without installing any tools on their computer, then deploy those applications without any specialized systems administration skills.
Software-as-a-Service (SaaS)the Application layer
This last level includes applications that run off the Cloud and are available to Web users or businesses on a pay-as-you-go, anytime-anywhere basis.
(September 4, 1927 – October 24, 2011)
(March 11, 1915 – June 26, 1990)
The Three Levels of Cloud Computing
Amazon Web Services
Rackspace Hosting
IBM Cloud
Windows Azure
Clever Cloud
Mendix

Cloud 9
Apprenda
Salesforce
INFORMATION SYSTEMS FOR MANAGEMENT BADM 8317 - SW01
Security Solutions

Because of the cloud's very nature as a shared resource, identity management, privacy and access control are a major concern. With more organizations using cloud computing for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations contracting with a cloud computing provider.

Cloud computing security processes should address the security controls the cloud provider will incorporate in order to maintain the customer's data security, privacy and compliance with necessary regulations. The processes will also likely include a business continuity and data backup plan in the case of a cloud security breach.
Cloud computing is changing the world we live in. By using cloud systems, we are able to have access to information that would otherwise be unavailable to us.
1)Data Encryption: Data encryption is not a “cure all”, but it is essential. It is important to ensure encryption in all modes, in transition, when at rest, and for disposition.

2)Physical Security: Each cloud vendor should have an architecture associated to their physical security. Your provider should produce physical security policies, if not, ask for them. Enquire about layouts, and who will have access to your data.

3)Virtualization Security: Ensure security processes are enabled for their virtualization environment. Enquire about vulnerability testing and correction processes.
Cloud Applications
Google Drive
Boomerang
LinkedIn
Dropbox
A cloud application is an application program that functions in the cloud. This type of application does not need to be on a desk top to operate which is a fast responsiveness to the users any need.
Full transcript