|A Collection of Informative and Interesting Articles|
|HOME||LOGIN||SUBMIT ARTICLES||TOP AUTHORS||WANT AN ACCOUNT?|
Some Findings in Cloud ComputingBY: NILAMADHAB MISHRA | Category: Technology | Submitted: 2013-04-24 06:35:30
Article Summary: "A broad anticipation has hold your horses concerning cloud computing as the next cutting edge in the modern technological world..."
A broad anticipation has hold your horses concerning cloud computing as the next cutting edge
in the modern technological world.
In this talk, prof chang over ally focuses the prospective of BYOD, BYON, Big-data, green cloud and avoid total control.
The cloud is an integrations of services over the networks with numerous driving forces like data intensive applications, data center pressure, increase network capacity and availability, rising energy cost and green compliance, shared across enterprises and many more.
The speaker articulates that cloud computing == God computing, in which put all your data/ faith, where you can't see or touch, but the cloud/God will never forgets your data and never punitive you to access, which is the focal peculiar in cloud computing.
A broad anticipation has made by prof chang regarding cloud computing as the next cutting edge in the modern technological world.
The various key applications and trends for cloud computing are media entertainment, social collaborations, location based services, e-commerce services and big data analytic.
A discussion has made about BYOD strategy i.e. bring your own device to link the various smart electronic devices with the use of IP, which ultimately does followings: reduce demand on network operations with self-service, secured and audit BYOD onboarding, track users, devices and IP activity and integrate device registrations with DNS, DHCP and IPAM.
This strategy mainly defines " who is eligible to access which type of data " .
Three keys issues of big data are discussed i.e. large volume, velocity and large variety.
The large volume of data includes scientific data, business data, internet data, sensor data, government data, enterprise data and many more.
The source says every day 2.5 exa bytes data i.e. Power (10, 18) created from numerous data sources.
To create big data, Microsoft F# programming language can be effectively used.
The big data visualizations can be done through following visualizations techniques: tag cloud, history flow, spatial information flow, information graphics/ simple figure.
The final focus has made in Green computing and avoids total control.
The green computing mainly focuses on SW and system to reduce energy consumptions i.e. the power saver computing over clouds to deal with natural environments, global warming, natural
calamities etc. with broad aim in low cost- low power energy usages to enable the expectations of making IT green because cloud computing may be a cause of global warming.
The cloud computing has a ubiquitous aim to manage the centralist control, which has seen in case of robotics. The robotics control may be distributed either by some remote devices or by using clouds.
In the future scenarios, the cloud management will be a big problem , because it includes the issues like manage shared infrastructure and data , visualizations managements and the visualization management includes the various methods to deals with.
Belief to GOD and Belief to Cloud has same morality with a broad aim to use and implement in a diversified environment.
The applications of computational intelligence and machine learning mechanisms can be used effectively in cloud computing.
1. Explores aimed at 4G small cell. - in this topic a discussion is made with a aim to overall effectives of small cell which is a substitute of microcell 4G cellular network. In a 3-tier heterogeneous network: tier-1-macro cell, tier-2-small cell, tier-3-wifi (femto cell).
In an N-tier heterogeneous network the femto cell is used to measure signal strength so as to upgrade the data and quality of services, with a broad aim that femto cell can beat WIFI.
In terms of coverage a relationship can be developed in between the multi-tier cellular networks i.e. macro cell > small cell > WIFI (femto cell).
The small cell can be setup out door to measure signal strength with objectives to achieve upgrade data rate, quality of service and quality of experience.
Finally discussion is fully focused on the proposed research scopes, related issues and system model of the small cell to just its potentiality in 4G applications.
2. Information security: here the initial discussion is started with two security terms: stenography which maintains the secrecy of massage and water marking which makes the authentications of massages.
Related to information hiding numerous security issues are discussed along with capacity with a aim to optimum the amount of data that can be embedded.
There are always challenges in information hiding technology for medical image security. The Ni's method is fully reviewed in a systematic ways to ensure loss less data hiding in the digital imaging process in which medical images are transformed into histograms for the purpose of analysis.
Finally idea is spread about the fragmentation of an entire image into number of fragments, and for each fragment individual histogram should be developed to enlarge the security, capacity and quality.
About Author / Additional Info:
Comments on this article: (0 comments so far)
• Some Research Bursts
• A Brief Biography of Michael Trent Reznor
• Is Oil a Good Investment ?
• How to Become a Successful Information Technology Generalist
Latest Articles in "Technology" category:
• Security Robots on Patrol
• Apple Pay Overview
• Enterprise Mobility - Overview Part 1
• M-OTA: Mobile 'Over-The- Air' (OTA) Overview
• MDM: Mobile Device Management Overview
• 3M MAC Protocol Review
• Build, Deploy and Test - Advanced Software Development Practice - Part 1
Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.
Copyright © 2010 saching.com - Do not copy articles from this website.
|| Home | Disclaimer | Xhtml ||