Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
46 views
12 pages
EIS CH 4
Uploaded by
Kartik
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save EIS Ch 4 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
46 views
12 pages
EIS CH 4
Uploaded by
Kartik
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save EIS Ch 4 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save EIS Ch 4 For Later
You are on page 1
/ 12
Search
Fullscreen
CLOUD COMPUTING CHARACTERISTICS OSM RE PAPPU On Demand - We invoke cloud services only when we need them, they are not permanent parts of the IT infrastructure Scalability - ability to expand and reduce resources Multi tenancy - multiple users within the same infrastructure Workload Movement - migrate workloads across servers both inside the data center and across data centers Resiliency - Work is migrated to a different physical resource in the cloud with or without user awareness and intervention. Pay as per use - We pay for cloud services only when we use them Pertinent Issues B LIST Bugs Unexpected Behaviour - An application which perform well at the company's internal data centre , so before installing on cloud we should check once Legal Issues - Cloud systems need to adhere to several regulatory requirements, privacy laws and data security laws. Interoperability — If we keep data with one cloud , difficult to shift to another , as there are no standards for importing / exporting data Security Issues - the management of the data might not be fully trust worthy & the risk of malicious insider attacks in the cloud Software Development in Cloud - Application development processes are flexible enough to keep up with the changes Threshold Policy - there is no standard format for the SLA and also how the cloud service provider will handle sudden increases or decreases in demand etc. Bugs in Large Scale Distributed System - removing bugs and errors in their very large-scale and distributed cloud systems. Drawbacks of Cloud (sia) Security - Data and applications depend ‘on other cloud vendors or providers. Scalability - does not permit the control on these resources as these are not owned by the user or customer. Interoperability - Applications may not reside with a single cloud vendor and ‘two vendors may have applications that do not cooperate with each other Internet connection - data and applications islost. Availability options for infra , o/s & application - customers may have to face restrictions on the availability of applications, operating systems and infrastructure options. ‘ADVANTAGES Flexible LPG se (MAR) 2 Improved Flexibility - fast changes in our work environment L-Less personal training is needed - a minimal learning curve on hardware and software issues. P- Streamline business process - more work done in less time with less resources are possible. G- Globalize workforce M-Minimize Maintenance - too much of non- premise computing resources, maintenance becomes simple M-Monitor Projects effectively - feasible to confine within budgetary allocationsandcompletion cycle times. A-Achieving economies of scale — Output can be increased reducing cost per unit Pervasive Accessibility - Data and applications can be accesses any time anywhere R- Reduce Capital Costs - Not required to spend huge money on hardware, software, or licensing fee:Types of Cloud & it’s Characteristics Private- Secure - as it is owned and managed by the organization itself, Central Control- as it is owned and managed by the organization itself, Weak SLA - Formal SLAs do not exist or are weak as it is between the organization and user of the same organization PUBLIC- Highly Scalable - Available Affordable Less Secure - Since it is offered by a third party and they have full control over the cloud, Stringent SLA - service provider's business reputation and customer strength are totally dependent on the cloud services HYBRID — Scalable - as the public cloud is scalable; the hybrid cloud is also scalable Partially Secure - Private cloud is considered as secured and public cloud has high risk of security breach. Stringent SLA - SLAs are more stringent than the private cloud Complex Cloud Management - complex as it involves more than one type of deployment models. * The Advantages of Hybrid Cloud include the following Community Collaborative - no single company has full control over the whole cloud Cost Effective - complete cloud is being shared by several organizations or community Partially Secure - data can be leaked from one organization to another, though it is safe from the external world. CLOUD COMPUTING SERVICE MODELS IAAS - laaS, a hardware-level service, provides computing resources such as processing power, memory, storage, and networks for cloud users. The user’s need not maintain physical servers as. it is maintained by service provider. * laaS providers provide the infrastructure/ storage required to host the services by the cloud clients. Characteristics of IAAS — Web access Centralized management: Highly scalable Shared infrastructure Metered Services Different instances of IAAS are Network as a Service , Storage as a Service , Database as a service PAAS - PaaS provides the users the ability to develop an application software on the development platform provided by the service provider Cloud providers deliver a computing platform including operating system, programming language, software development tools, database etc SAAS - SaaS provides ability to the end users to access an application over the Internet that is hosted and managed by the service provider. Thus, the end users are exempted from managing or controlling an application, the development platform, and the underlying infrastructure. SaaS provides users to access large variety of applications over internets that are hosted on service provider's infrastructure. Different instances of SAAS are Testing as a Service , Application Program Interface as a service , Email as a serviceIntroduction It means employees can bring their own device at the work place provided it is company policy It will save cost for the companies It will also increase efficiency of the employees Web 3.0 Web 1.0 & Web 2.0 are within boundaries of organization , but as more & more devices like oven , mobiles , cars are connected to internet, internet is omnipresent and should be utilised in best manner Web 3.0 uses SEMANTICS technology to drag & drop mash up , widgets , collect data about user behaviour & generate content based on interest of user Advantages Happy Employees - reduces the number of devices, otherwise he would be carrying his personal as well as organization provided devices. Increased Employee Efficiency - efficiency of employees is more when the employee works on his / her own device Early Adoption of New Technology - proactive in adoption of new technologies Less IT Cost - Employees could involve financial savings to the organization Less Maintainance Cost - IT department Emerging B.Y.0.D Threats INDIA Implementation Risk - Mandate the development of a robust implementation policy. Absence of a strong BYOD policy would fail to communicate employee expectations, thereby increasing the chances of device misuse Network Risk - But if the company hasa policy of BYOD, the IT practice team maybe unaware about the number of devices being connected to the network Device Risk - A lost or stolen device can result in an enormous financial and reputational embarrassment does not have to provide end user support and maintenance Components of Web 3.0 Semanti machines are able to take decisions on their own by finding, combining and acting upon relevant information on the web. Web services - software system that supports computer- to-computer interaction over the Internet. Application Risk - not clear in deciding that ‘who is responsible for device security -organization or the user’ WEB 4.0 Web 4.0 is set to evolve; proposed to be autonomous, proactive, content-exploring, self- learning, collaborative, and content generating agents based on fully matured semantic and reasoning technologies as well as Artificial Intelligence. These services will support adaptive content presentation that will use the Web database via an intelligent agent WEB 5.0 - The Web 5.0, “The Telepathic Web/The Symbionet Web” is set to be highly complex future Web generation, to be present after the year 2030 in which things like brain implants are expected to be popular. Brain implants will give people the ability to communicate with the internet through thought like to think of a question and open up a web page even without giving any physical command.‘ations of Mobile Computing BIPS HUMAN Insufficient Bandwidth - Mobile Internet access is generally slower than direct cable connections Transmission Interferences - Weather, terrain, and the range from the nearest signal point can all interfere with signal reception Power Consumption - power outlet is not available, mobile computers must rely entirely on battery power Potential Health Hazards - traffic accidents. Cell phones may interfere with sensitive medical devices Security Standards - dependent on public network i.e. Internet. Security is major concern as one can easily attack public network including VPN Human Interface - Screens and keyboards tend to be small, which may make them hard to use. Benefits of Mobile Computing * Mobile work force with access to work order details * Users can work anytime * Productivity can be increased as can work effectively & efficiently from any location Improve services offered to customer * Improves management effectiveness Introduction Mobile Computing refers to the technology that allows transmission of data via any portable device without being connected to fixed physical link Components Mobile Hardware - includes mobile devices or device components that receive or access the service of mobility. Mobile Software - actual Program that runs on the mobile hardware. Mobile Communication — Refers to infrastructure put in place to ensure that seamless and reliable communication goes on Drawbacks NEW METHODS Advantages Immediate Payment Service (IMPS) -Itis an instant cana interbank electronic fund transfer service through (TDs) ‘mobile phones. + Anywhere ’ Mobile Banking - It is a service provided by a bank or © Easy & © Difficult = Debit other financial institution that allows its customers to Convenieni for non- Card conduct different types of financial transactions techntelt Mobile Wallets © Less Risk Credit |) Unified Payment interface (UPI) * Discount person Mobile Applications (BHARAT INTERFACE FOR from Take © Risk of Card} money) Bkin (aharat interface for Money) i : data a Mobile App developed by National Payments ° Written Smart} Corporation of india (NPC!) based on UPI (Unified Record © Over- Card Pavment interface) By Competitive spending Unstructured Supplementary Service Data - A - Bi increasetl Tevolutionary idea, where to make payments through Advantage i 2. Net mobiles there is neither need for internet nor any to Business Business Banking | smart phone. Environment Cost ‘Aadhar Enabled Payment Services © Need of Cryptocurrency -s a digital currency produced by a meendly public network, rather than any government, that uses cryptography to ensure that payments are sent and received safely Internet e-Rupi- Voucher or OR Code , Person & Purpose soecificIt is a system of interrelated computing devices , mechanical & digital machines , objects , animals or people that are provided with unique identifiers & ability to transfer data over a network without human to human or human to computer interaction . Risks Product Manufacturer * Impact on Business — Out of business , if loT becomes necessary product feature * Data Storage & Analyics — Keep data secured or it can create problem for entity as well as individual * Intentional obsolescence of device — Companies which want usertouse | new product , may dump old products, by disabling | o/s of old product Risk to user (SP) * Security — Hit by network related issues like hacking, | virus , stealing confidential data * Privacy, Autonomy& — | Control — Individuals may loose control , their | personal data can be made | public Technology Risks~Every device | has different hardware & software , which makes task of developing application tough Environmental Risk due to technology — Impact on environment house air quality , soil etc due to use of heavy earth metals Internet of Things Application Home Devices - Home owners can keep track of all activities in house through their hand held devices. Office Activities - Human resource managers shall be able to see how many people have had a cup of coffee from vending machine and how many are present ‘Swatch Mission - Under SWACHH mission government can tag all dustbins with IOT sensors. They (dustbins) generate a message once they are full. Electronic chip - This chip allows him/her to connect to home / office ‘Once connected person can enter home / office and perform designated function Wearables — Apple smart watch Smart Grids - extract information on the behaviors of consumers and electricity suppliers in an automated fashion ‘Smart City - water distribution and traffic management to waste management and environmental monitoring. ‘Smart Retail - improve store operations, increasing purchases, reducing theft, enabling inventory management, and enhancing the consumer's shopping experience. ‘Smart Supply Chain- tracking of goods while they are on the road or in transit or helping suppliers exchange inventory information Connected Car - navigate in our complex world, Connected Health - remote ‘monitoring equipment to advance and smart sensors to equipment integration. Industrial Internet of Things - different parameters, such as pressure, temperature, and utilization of the machine. wifINTRODUCTION It is the process of creating logical resources from available physical resource It means to create virtual version of device / resource such as servers, storage, O/S where framework divides resource into one or more environment j VIRTUALISATION Applications DPS ME Test * Disaster Recovery - Virtual machines can be used as "hot standby" environments for physical production servers. © Portable Appn - Running an application from a removable drive, without installing it on the system's main disk drive. * Portable Workspaces - portable workspaces ‘on devices like iPods and USB memory sticks. * Server Consolidation - consolidate many physical servers into fewer servers, which in turn host virtual machines © Testing & Training - Hardware virtualization also help to act as training platforms — ld Common Types of Virtualization Hardware Virtualization (Server) ~The basic idea of Hardware virtualization is to consolidate many small physical servers into ‘one large physical server so that the processor can be used more effectively. The software that creates a virtual machine on the host hardware is called a hypervisor or Virtual Machine Manager. Network Virtualization (Mobile Network) -It is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others Storage Virtualization (Cloud) — It is the apparent pooling of data from multiple storage devices, even different types of storage devices, into what appears to be a single device that is managed from a central console. dINTRODUCTION In this multiple computers come together in a network and resources are shared with each other in the system In this all computers come together and they can solve complex problems Types of Resources Computations - This contains the CPUs which perform the computation or process the given request. Storage - Each machine usually contains some storage and together a grid use large volume of storage resources. Communication - This resource helps in data flow between different servers Special Equipment - Some machines may be designated to only be used for medical research. Software & Licenses - Software is one of the most expensive resources of grid and installing software at each server requires software and license Application Areas (CIA) Complex Science & Engineering research Civil Engineers work together to design , execute & analyse shake table experiments (Earthquake structure for building structure) Insurance company from partner hospitals for fraud detection Application server offloads excess load to other server ‘Amazon uses grid to move resources to E-BUSINESS Benefits Management PVR ke Resources underutilize kar rahi he Management - The grid offers management of priorities among different projects. Parallel CPU Capacity - helps to use many CPUs of different servers in parallel which further helps to increase the performance, Virtual resources & Virtual Organizations - provide collaboration among large number of organizations and large no of users for performing complex task. Reliability — There are multiple processors, if one fails there is another Resource Balancing - perform the resource balancing by using all the resources in an optimum manner to provide efficient performance. Access to Additional Resources - Additional resources than multiple servers and storage devices based on requirements. Making use of Underutilized Resources - Exploiting these underutilized resources and thus has the possibility of substantially increasing the efficiency of resource usage. Security Constraints Single sign-on - A user should be authenticated once and they should be able to acquire resources, use them, and release them Support for secure group communication - Secure group communication to provide coordinated activities for group Support for multiple Implementation - Security policy which should provide a common security to multiple resources / installations based on public and private key cryptography. Interoperability with local security solutions - Access to local resources should have local security policy at a local level. Protection of credential - User's password and private key should be protectedDisadvantages Risks Benefits Security in LIC is PERISHABLE Quality issues - original product differs from the one that was ordered. Delay in goods and Hidden costs - ordered from another country Access to internet — Lacks personal touch Problem of anonymity - authenticate users in the virtual global market where anyone can sell to or buy from anyone User Security - Due to the increased Anytime Access Convenience Various Options Time Saving Easy to find Reviews Coupon & Deals spywares and malwares in the internet. Legal Issues - new legal issues which the vendor needs to handle properly. The user data protection laws are also getting more Seller stringent Repudiation of Contract - sale Increased Customer order or purchase by the trading Internet Connecorie rey neta partner or customer maybe Base denied. available in rural or remote areas Non-recognition of electronic transaction - may not be recognized as evidence in courts of law Lack of authenticity of transactions - electronic may not be authentic and reliable Data loss Attack from hacker Denial of Services - non- availability of system as it may be affected by viruses, e-mail bombs and floods. Problem of piracy - Intellectual property may not be adequately protected Privacy & Security - often issues of security and privacy due to lack of personalized digital access and cnowledge security & Credit Card issues — here is cloning possible of debit . credit cards Instant Transactions Reduction in costs Reduction in time Creation of new markets Easier entry into new markets Provides a dynamic market Better Quality of Goods High Start up Costs — Start up cost in form of internet connection , hardware/ software . set-up cost & maintainance of web pages Culture Impediments to E- Business - Many customers are uncomfortable with ecommerce and prefer traditional shopping only Government Perishable Food Items - perishable food items or high-cost items such as jewellery and antiques may never get into e-commerce Instrument to fight corruption Reduction in use of ecologically damaging materialE-Commerce Models & E-Commerce Markets ‘Some of the E-Markets are as follows : E-Shops (Amazon , Nike) - allow manufacturers to bypass intermediate operators and thereby reduce costs and delivery times E-Malls (Brand factory) - conglomeration of different shops ituated in a convenient location in e-commerce. E-Auctions (Government websites that run auctions) - bidding process for products and services can take place between competing buyers Portal (Amazon Prime) - control of content can be a source of revenue for firms through charging firms for advertising or charging consumers a subscription for access. Buyer Aggregator (Zomato) - brings together large numbers of individual buyers so that they can gain the types of savings Virtual Communities (What's App Group) - customers who share a common interest E-Marketing (Youtube Advts) - information on websites also empowers customers and helps them achieve their objectives E-Procurement - Specialize in providing up-todate and real-time information on all aspects of the supply of materials to businesses. E-Distribution - Helps distributors to achieve efficiency savings by managing large volumes of customers, automating orders, ‘communicating with partners and facilitating value-adding services such as order tracking Commercial laws Governing E-Commerce © Income Tax Act, 1961 Companies Act , 2013 Foreign Trade Act , 1992 The Factories Act , 1948 The Custom Act , 1962 The Goods and Service Tax Act , 2017 Indian Contract Act , 1872 The Competition Act , 2002 e Foreign Exchange Management Act , 1999 Consumer Protection Act , 1986 Special Laws governing E-Commerce = IT Act, 2000 ™ Reserve Bank of India . 1932 Some Business Models for E-Commerce . Business to Consumer (B to C) - focuses on sell-side activities. Business to Business (B to B) - repeat commerce between a company and its suppliers or other partners. Consumer to Consumer (Cto C) - commercial extension of community activities. Consumer to Business (C to B) - consumers set prices and companies bid to match those prices Consumer to Government (C to G) Business to Government (B TO G) Government to Consumer (G to C) - Consumers can reach higher authority digitally. The aim is to reduce the average time for fulfilling citizen’s requests for various governmentUser - Selling products like medicine / drugs need to ensure that such products are not delivered to wrong person/user E-Commerce Vendor E-Commerce Catalogue & Product Display - gauge the products / services being sold. A good catalogue makes a lot of difference to whole customer experience. Showroom & Offline Purchase - products can be sold fast if customers are able to feel / touch / see those products Different ordering methods Guarantees - Money back guarantees help generate a security in customer's mind that in case of any problems there money shall be safely returned back. Privacy Policy - Represents policy adopted by the e- ‘commerce vendor vis-8-vis customer data/information. Security - Vendor is using appropriate security including security systems like SSL ‘Suppliers & SCM - They have enough and the right goods suppliers , they (suppliers) financially and operational safe. ‘Marketing & Loyalty Programs - Loyalty programs, establish a long-term relationship with customer Warehouse - These operations have become very critical to the success of the whole ecommerce business. Shipping - Fast returns have become Unique Selling Preposition (USP) for many e-commerce vendors, so these vendors need very effective and efficient return processing. Technology Infrastructure Mobile Applications - A mobile app is a software application programmed to run specifically on a mobile device. One option many companies have is to create a website that is mobile friendly Web portal - Web Portal is the application through which user interacts with the ecommerce vendor. The front end through which user interacts for an e-commerce transaction Payment Gateway - The payment mode through which ‘customers shall make payments. Computers, Servers & Database - These are the backbone for the success of the venture. Big ecommerce organization invest huge amount of money / time in creating these systems. Digital Library - A Digital Library is a special library with a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats (along with means for organizing, storing, and retrieving the files and media contained in the library collection. Data Interchange — Secured Protocols like HTTPS , SSL Internet / Network - Controls in E-Commerce (CE) C-Communication of organizational policy to customer - it is necessary to make the following information clear throughout your website including: Privacy Policies, Information security, Shipping and billing policies, Refund policies C- Compliance with Industry standards - All e- Commerce organisations are required to be complying with and adhere to the rules outlined by the law E-Educating the participant about nature of risk - Every participant needs to be educated towards risk associated with such transactions . All bank in India, allowing on line payments put ads on their websites “Dos and Don'ts for online payments E- Protect your E-commerce business from Intrusion Virus , Hackers , Password , Sensitive data Guidelines of E-Commerce Billing Product Guarantee / Warranty Shipping Delivery Return Payment Steps in E-Commerce Work Flow Diagram Customer Login Product Selection Customer Places Order Payment Gateway Dispatch & Shipping Delivery Tracking Cash on Delivery Architecture of E-Commerce 1Tier 2 Tier - In this work of input , process , output & storage is shared between client & server 3 Tier — In this input & output is done by client , processing is done by application server & storage is. done by Database serverIntroduction It means usage of computers & IT resources in a more efficient & environment friendly & responsible way Itis environment friendly usage of computer & related resources Make Environmentally Sound Purchase Decisions Purchase of desktop computers , notebooks & monitors based on environment benefits Provide clear , consistent set of performance for design of products Select such manufacturer which use less enviroment sensitive material , design for longetivity & reduce packaging material Use server & storage Virtualization that can reduce energy cost & increase utilization Green Security Challenges If administered properly, Green IT can become cost efficient How can sustainable technology immediately help environment How to evaluate client's infrastructure to accommodate Green IT isa vital issue Role of security , tools, methods that reduce company's environmental impact Develop a Sustainable Green Computing Plan Involving Stakeholders to include checklists , recycling policies , recommendations for disposal , Govt guidelines On communication about & campus commitment to green IT best practises Frame Guidelines for using best practices Recycle old equipment , make environmentally sound purchase. decision , reduce paper , & reduce power Use cloud computing , so multiple organizations share same ‘computing resources ensuring best utiliz Reduce Paper Consumption Use e-mail & e-papers Use of track changes feature in word rather than doing corrections on paper Use online marketing rather than paper marketing , e-mail marketing is greener , less paper , low cost While printing use both sides of paper , recycle regularly , use small fonts & margins Recycle Old Equipments Disposal e-waste according to central, state & local regulations Discard used or unwanted equipments in convenient & environmentally responsible manner Manufacturers must offer safe end of life management & recycling options (Hardware retirement plan) Recycle computers through manufacturer's recycling services Conserve Energy Use LCD rather than CRT monitors Develop a thin client strategy when clients are smaller , cheaper , simpler for manufacturers rather than traditional PC’s Use notebook rather than desktop whenever possible Power down CPU during extended period of inactivity Power up & down energy intensive peripherals according to need Employ alternative energy sources for computing workstations , servers etc ‘Adapt more use of web conferences rather than travelling to meetings to save energyBlock Chain Technology Introduction Itis distributed ledger technology is shared, peer to peer & decentralized open ledger of transactions systems with no trusted parties in between It is every transaction is permenant and cannot be changed or altered It uses chain of blocks with each block representing the digital information stored in public database Application of Blockchain Technology Financial — Automated trade lifecycle in terms of transaction log of any transaction of asset or property — laptops, smartphones Economic Forecasts — Financial & economic forecasts based on decentralised prediction markets, decentralised voting & stock trading Government - Land registration, vehicle registration, e-voting Healthcare — Sharing of data by increasing privacy, security & interoperability of data by eliminating third party Travel Industry — Storing important documents like passport, ID, reservation, travel insurance etc Risks in Blockchain Technology Who is responsible for maintaining data, as there is no central authority & who is accountable for anything wrong? If consensus is tempered, financial transaction can become inaccurate & unreliable As there is no central authority, difficult in establishment of Development & Maintenance of process controls activi As more & more data is getting added, itis difficult to find competent people to design & perform effective monitoring Artificial Intelligence & Machine Learning Al-When machines are able to use memory , knowledge , judgment , experience , understanding , reasoning & imagination to solve problems & adapt to new situations it is Artificial Intelligence ML - It is a type of Al, that provides computers with ability to learn without being explicitly programmed Risks of Al & ML(TDS) Application of Al & ML It may kill human skills of thinking the unthinkable Autonomous Vehicles Medical Diagonisis Incorrect data can lead to incorrect decision Proving Mathematical Security threats - Countries are algorithms discussing to have a KILL button in all Al capable machines, otherwise machines will start controlling humans Playing Games Search Engines Online Assistants
You might also like
CLOUD-lesson 2-23
PDF
No ratings yet
CLOUD-lesson 2-23
35 pages
Cloud Computing Important Questions & Answers
PDF
90% (10)
Cloud Computing Important Questions & Answers
14 pages
Cloud Computing Unit 1 and 2
PDF
No ratings yet
Cloud Computing Unit 1 and 2
33 pages
Introduction To Cloud Computing
PDF
No ratings yet
Introduction To Cloud Computing
122 pages
Chapter 1 - Introduction To Cloud Computing
PDF
No ratings yet
Chapter 1 - Introduction To Cloud Computing
122 pages
Cloud Computing Unit 1
PDF
No ratings yet
Cloud Computing Unit 1
23 pages
Cloud Computing Notes - 220131 - 153214
PDF
No ratings yet
Cloud Computing Notes - 220131 - 153214
28 pages
Research On Cloud Computing
PDF
No ratings yet
Research On Cloud Computing
39 pages
Lecture 7 - Core Technologie Cloud Computing and Fog Computing
PDF
No ratings yet
Lecture 7 - Core Technologie Cloud Computing and Fog Computing
56 pages
Learning Aim A
PDF
No ratings yet
Learning Aim A
12 pages
Module 1
PDF
No ratings yet
Module 1
50 pages
MN Unit 1 Notes
PDF
No ratings yet
MN Unit 1 Notes
11 pages
5CS022 Lecture 4
PDF
No ratings yet
5CS022 Lecture 4
28 pages
Module 3.2
PDF
No ratings yet
Module 3.2
35 pages
Compilation of Handouts
PDF
No ratings yet
Compilation of Handouts
105 pages
Lecture 2 - Introduction To Cloud Computing
PDF
100% (1)
Lecture 2 - Introduction To Cloud Computing
122 pages
Residential Status & Scope of Total Income
PDF
No ratings yet
Residential Status & Scope of Total Income
23 pages
ETEM S04 - (Cloud Computing)
PDF
No ratings yet
ETEM S04 - (Cloud Computing)
28 pages
Cloud Computing Concepts
PDF
No ratings yet
Cloud Computing Concepts
59 pages
1-Introduction To Cloud Computing
PDF
No ratings yet
1-Introduction To Cloud Computing
112 pages
Agriculture Income
PDF
No ratings yet
Agriculture Income
6 pages
CEO - Final Exam Prep
PDF
No ratings yet
CEO - Final Exam Prep
32 pages
Cloud Computing Short Notes
PDF
No ratings yet
Cloud Computing Short Notes
7 pages
Introduction To Cloud Computing
PDF
No ratings yet
Introduction To Cloud Computing
22 pages
Final Cetech
PDF
No ratings yet
Final Cetech
10 pages
Cloud Computing Introduction
PDF
100% (1)
Cloud Computing Introduction
147 pages
Cloud Computing
PDF
100% (1)
Cloud Computing
44 pages
Cloud Computing: Unit 1
PDF
100% (1)
Cloud Computing: Unit 1
76 pages
Cloud Computing Notes
PDF
No ratings yet
Cloud Computing Notes
21 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
22 pages
Lecture 2 Introduction To Cloud Computing
PDF
0% (1)
Lecture 2 Introduction To Cloud Computing
122 pages
CETech - Module 8 PDF
PDF
No ratings yet
CETech - Module 8 PDF
6 pages
Cloud Computing
PDF
100% (2)
Cloud Computing
20 pages
Cloud Computing Is Changing How We Communicate: By-Ravi Ranjan (1NH06CS084)
PDF
No ratings yet
Cloud Computing Is Changing How We Communicate: By-Ravi Ranjan (1NH06CS084)
32 pages
Bangladesh University of Professionals (BUP) : Requirements To Transfer Information Technology To A Service
PDF
No ratings yet
Bangladesh University of Professionals (BUP) : Requirements To Transfer Information Technology To A Service
8 pages
Cloud Computing Unit1 - Intro
PDF
No ratings yet
Cloud Computing Unit1 - Intro
80 pages
Cloud Computing: by Manok and Baso
PDF
No ratings yet
Cloud Computing: by Manok and Baso
39 pages
Cloud Computing - Unit1
PDF
No ratings yet
Cloud Computing - Unit1
26 pages
Unit 1 - Cloud Computing Fundamentals
PDF
No ratings yet
Unit 1 - Cloud Computing Fundamentals
19 pages
Cloud Computing
PDF
100% (1)
Cloud Computing
35 pages
Cloud Computing: (Business Needs)
PDF
No ratings yet
Cloud Computing: (Business Needs)
38 pages
Gopallapuram, Renigunta-Srikalahasti Road, Tirupati: by B. Hari Prasad, Asst - Prof
PDF
No ratings yet
Gopallapuram, Renigunta-Srikalahasti Road, Tirupati: by B. Hari Prasad, Asst - Prof
25 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
36 pages
Cloud Computing: By: Waqar Ahmad Uot, Nowshera
PDF
No ratings yet
Cloud Computing: By: Waqar Ahmad Uot, Nowshera
24 pages
Introduction To Cloud Computing
PDF
No ratings yet
Introduction To Cloud Computing
27 pages
Cloud Computing: Pes Institute of Technology 1 Sem MBA-2010
PDF
No ratings yet
Cloud Computing: Pes Institute of Technology 1 Sem MBA-2010
21 pages
Personal Computing - Mobile Computing - Distributed Computing
PDF
No ratings yet
Personal Computing - Mobile Computing - Distributed Computing
32 pages
Chapter 3 Building Cloud Network
PDF
100% (1)
Chapter 3 Building Cloud Network
7 pages
Group6 Project
PDF
No ratings yet
Group6 Project
5 pages
Iii-B.Sc Semister-Vi: Cloud Computing
PDF
No ratings yet
Iii-B.Sc Semister-Vi: Cloud Computing
17 pages
Cloud Computing Unit-1 PDF
PDF
No ratings yet
Cloud Computing Unit-1 PDF
27 pages
Cloud Computing Handouts
PDF
No ratings yet
Cloud Computing Handouts
9 pages
Cloud Computing Notes
PDF
No ratings yet
Cloud Computing Notes
10 pages
Introduction To Cloud Platform
PDF
No ratings yet
Introduction To Cloud Platform
10 pages
BIS 8 Trends
PDF
No ratings yet
BIS 8 Trends
36 pages
51 Limit Based Chart For CA IPCC & INTER
PDF
No ratings yet
51 Limit Based Chart For CA IPCC & INTER
14 pages
CA ABC Analysis
PDF
No ratings yet
CA ABC Analysis
28 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
8 pages
Chapter III Vouching of Cash Transactions
PDF
No ratings yet
Chapter III Vouching of Cash Transactions
23 pages
Chapter IV Vouching of Trading Transactions
PDF
No ratings yet
Chapter IV Vouching of Trading Transactions
15 pages
Synopsis On CLOUD COMPUTING by Prashant Gupta
PDF
No ratings yet
Synopsis On CLOUD COMPUTING by Prashant Gupta
6 pages
Eis Charts
PDF
No ratings yet
Eis Charts
35 pages
Chapter II Internal Check or Control
PDF
No ratings yet
Chapter II Internal Check or Control
7 pages
1001 Motivational Quotes For Success Great Quotes F 35
PDF
No ratings yet
1001 Motivational Quotes For Success Great Quotes F 35
2 pages
EIS CH 3
PDF
No ratings yet
EIS CH 3
12 pages
1001 Motivational Quotes For Success Great Quotes F 30
PDF
No ratings yet
1001 Motivational Quotes For Success Great Quotes F 30
2 pages
Eis Imp
PDF
No ratings yet
Eis Imp
5 pages
1001 Motivational Quotes For Success Great Quotes F 29
PDF
No ratings yet
1001 Motivational Quotes For Success Great Quotes F 29
2 pages
1001 Motivational Quotes For Success Great Quotes F 17
PDF
No ratings yet
1001 Motivational Quotes For Success Great Quotes F 17
2 pages