Cloud Basics

Author(s):  
John P. MaGuirk

Cloud computing was made necessary by the birth of the smartphone. It created scatted data for users. Initially, smartphones used a different operating system than common computers. A letter or note might exist on your smartphone but could not be shared with your personal computer unless manufactured by the same supplier. A workaround for a single user was to email a copy to himself. The internet being device neutral, Dropbox was the first neutral service to permit document sharing between users and devices regardless of format. This chapter explores cloud basics.

2014 ◽  
Vol 651-653 ◽  
pp. 2510-2513 ◽  
Author(s):  
Li Ping Yang ◽  
Da Wei Xu ◽  
Wei Wang

Cloud computing is a model about the increase , usage and delivery of related services in Internet, usually provides dynamically scalable and often virtualized resources by the Internet. This paper first introduces the cloud computing technology, then discusses the system structure, system flow and system function, and finally expounds the cloud computing role and the realization of the examination system .


Author(s):  
Ramanujam Elangovan ◽  
Prianga M.

Cloud computing is used for storing and managing information using the remote servers, which is hosted on the internet instead of storing it in a normal server or personal computer. The main purpose of why most of the companies use the cloud for storing and managing data is to not have to pay money for storing data. The main aim is to allow users to benefit from all technologies. Virtualization is considered to be the main technology of cloud computing. Several privacy concerns are caused by the cloud because the service provider can access the data at any time. Cloud providers can also share the information for the purpose of law and order. The information gathered from the physical implementation is called a side channel attack. Some technical knowledge is required for side channel attacks and these attacks are based on statistical methods. It works by monitoring the security critical operations. The side channel attack is based on the information which is leaking and the information which is kept secret.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


1991 ◽  
Vol 45 (10) ◽  
pp. 1739-1745
Author(s):  
Min J. Yang ◽  
Paul W. Yang

A computerized infrared interpreter has been developed on an IBM personal computer (PC) running under the Microsoft disk operating system (DOS). Based on the original Merck Sharp & Dhome Research Laboratory Program for the Analysis of InfRared Spectra (PAIRS), this infrared interpreter, PC PAIRS+, is capable of analyzing infrared spectra measured from a wide variety of spectrophotometers. Modifications to PAIRS now allow the application of both artificial intelligence and library searching techniques in the program. A new algorithm has been devised to combine the results from the library searching and the PAIRS program to enhance the dependability of interpretational data. The increased capability of this infrared interpreter along with its applicability on a personal computer results in a powerful, general-purpose, and easy-to-use infrared interpretation system. Applications of PC PAIRS+ on petrochemical samples are described.


Author(s):  
Kai Zhang

With the development of emerging technology innovations such as the internet of things, classroom management has also shown an informatization trend. Among them, smart classrooms are an important part of the current university information environment construction. The purpose of this article is to build a smart classroom into an intelligent teaching environment with many functions such as intelligent perception and identification, real-time monitoring based on the internet of things technology and cloud computing technology. A questionnaire survey was conducted among freshman students in some majors, and interviews were conducted with the instructors. It was found that 92.19% of the students were satisfied with the classroom learning in the smart classroom environment, and most teachers thought that the teaching effect had been improved. Experiments have proven that the operation of smart classrooms based on the internet of things and cloud computing realizes the intelligence of teaching management services and improves the level of education informationization in schools.


2019 ◽  
Vol 9 (2) ◽  
pp. 103-105
Author(s):  
S. Saravana Raj ◽  
K. Vijayakumar

The present study deals with Utilization of ICT among the faculty members of Siddha Colleges and various level of operating system with the information accessed by the faculty through the internet. The survey was conducted with the help of the questionnaire and personal interview. The responses received from the available faculty are presented in tables and data is analyzed by using simple statistical method. The findings reveals that the access of electronic information is an important component of research activities for faculty members like E-Journals, E-books, E-databases are most preferred electronic information resources.


Author(s):  
Leila Zemmouchi-Ghomari

Industry 4.0 is a technology-driven manufacturing process that heavily relies on technologies, such as the internet of things (IoT), cloud computing, web services, and big real-time data. Industry 4.0 has significant potential if the challenges currently being faced by introducing these technologies are effectively addressed. Some of these challenges consist of deficiencies in terms of interoperability and standardization. Semantic Web technologies can provide useful solutions for several problems in this new industrial era, such as systems integration and consistency checks of data processing and equipment assemblies and connections. This paper discusses what contribution the Semantic Web can make to Industry 4.0.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Sign in / Sign up

Export Citation Format

Share Document