Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Internet Technologies, Cloud and Mobile Technologies

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

Internet technologies, cloud

and mobile technologies


Koshkimbai, T., Kaidar, A., Nurkanov, Z. Software
development department, Astana IT
University
SE-2232: Information and Communication 
Technologies
Olzhas Kazhybayev  
2nd October 11:59 PM
Outline of the
project
1. Introduction
2. Explaination  
3. How it works  
4. Developments
5. Comparing
6. Summary
7. Responsibilities
8. References.
Introduction

https://tehnichka.pro/wp-content/uploads/2021/12/main-qimg-cf85302ee99bc813f89441b77087691d-c.jpg

does not have enough memory on the


device?
Then this presentation for you!
How it
works?
Uses servers to store data.
Most of the servers used are virtual
machines hosted on a physical
server.
Developments

1969 1982 1990's


Joseph Carl Robnett I BM — Ethernet Adapter Online Backup Storage
Lic klider —
ARPANET

199 20 0 6 20 0 8
4
A T&T — Amazon – AWS Dropbox — Personal
PersonaLink S3 c loud storage
2012
Google – Google
Drive
Comparing

Essentially, the fundamental difference between cloud vs on-premise software is where it resides.
Providing real-time access to systems and data from a variety of devices regardless of the
location
Summary
Cloud storage technologies expand the possibilities of information technology in all possible
directions. Using this technology, anyone can store the information, file or data he needs
without wasting the resources of his own device, and also has access and can grant access to
anyone to them at any time.
Koshkimbai, T.
Kaidar, A.
Nurkanov, Z.

We worked on the
References.

Javaid, M., Haleem, A., Singh, R. P., Rab, S., Suman, R., & Khan, I. H. (2022, June). Evolutionary
trends in 
                             progressive cloud computing based healthcare: Ideas, enablers, and
barriers. 
                               International Journal  of Cognitive Computing in Engineering, 3, 124–135. 
                                https://doi.org/10.1016/j.ijcce.2022.06.001

Selvamani, K.; Jayanthi, S. (2015). A Review on Cloud Data Security and its Mitigation Techniques.
Procedia Computer Science, 48(), 347–352.
https://doi.org/10.1016/j.procs.2015.04.192 
https://www.xperience-group.com/news-item/cloud-vs-on-premise-software/

You might also like