0% found this document useful (0 votes)
107 views71 pages

Virtualization: Presentors: Krystal Gayle Apiado Nikolai Veron Glorioso

The document summarizes virtualization and web technologies. It discusses virtualization concepts like virtual machines and hypervisors. It also outlines different types of web technologies including programming languages, frameworks, databases, protocols, and data formats used in web development. Examples are provided for each category.

Uploaded by

Thraia Smurf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views71 pages

Virtualization: Presentors: Krystal Gayle Apiado Nikolai Veron Glorioso

The document summarizes virtualization and web technologies. It discusses virtualization concepts like virtual machines and hypervisors. It also outlines different types of web technologies including programming languages, frameworks, databases, protocols, and data formats used in web development. Examples are provided for each category.

Uploaded by

Thraia Smurf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 71

Virtualization

PRESENTORS:
KRYSTAL GAYLE APIADO
NIKOLAI VERON GLORIOSO
Virtual Virtual Machine
Not physically existing as The virtualization/ emulation
such but made by software of a computer system.
to appear to do so.

2
VIRTUALIZATION
The process of running a virtual instance of a computer system in a
layer abstracted from the actual hardware. Most commonly, it refers
to running multiple operating systems on a computer system
simultaneously.

3
EXAMPLE

TRADITIONAL

WITH VIRTUALIZATION
4
What is a hypervisor?

5
Does virtualization slow down
PC?

6
Virtualization Process
1. Hypervisors detach the physical resources from their
physical environments.
2. Resources are taken and divided, as needed, from the
physical environment to the various virtual environments.
3. System users work with and perform computations within
the virtual environment.
4. Once the virtual environment is running, a user or program
can send an instruction that requires extra resources form
the physical environment. 
 

7
Types of Virtualization
Network virtualization - a Storage virtualization - is the
method of combining the available pooling of physical storage from
resources in a network by splitting multiple network storage devices
up the available bandwidth into into what appears to be a single
channels, each of which is storage device that is managed
independent from the others and from a central console.
can be assigned or reassigned to
a particular server or device in real
time.

8
Types of Virtualization
Server virtualization - is the Data virtualization - is
masking of server resources abstracting the traditional
including the number and identity technical details of data and data
of individual physical servers, management.
processors and operating systems
from server users.

Application virtualization - is Desktop virtualization - is


abstracting the application layer virtualizing a workstation load
away from the operating system. rather than a server.

9
ADVANTAGES
OF
VIRTUALIZATION
Easier
Lower costs disaster Easier testing
recovery

Quicker Improved
backups productivity

11
DISADVANTAGES
OF
VIRTUALIZATION
1. It can have a high cost of
implementation.

2. It still has limitations.

3. It creates a security risk.

4. It creates an availability issue.

13
WEB
TECHNOLOGIE
S PRESENTORS:
IVY NICHOLE SEANDREI Q. SALES
JERLY P. IBAÑEZ

14
What Are Web Technologies?
Web technologies are the various tools and techniques
that are utilised in the process of communication between
different types of devices over the internet.

15
‘Web’
It refers to the World Wide Web, more commonly known
as WWW.

‘Technology’
The knowledge of tools, machines, techniques, crafts,
systems, methods of organization, etc.

16
What Are The Different Types Of
Web Technologies?
 The basic: Web browsers and Web app development
 Programming languages and Frameworks
 Databases
 Some protocols
 Graphic, audiovisual, and multimedia
 Data formats
 Other miscellaneous web technologies 
 

17
The Basics
Web Browser

Web browsers, often just called browsers, make


it possible for us to view all the resources that
are part of the World Wide Web.

18
The Basics
Web App Development

Web development refers to the process of


creating websites.

19
Two parts of a
Place your screenshot here

Typical Website

20
Frontend Backend

Client-side Server-side

Website design Databases

UI/UX Servers

Some UI technologies: Some backend technologies:

HTML PHP

CSS Java

JavaScript Python

AJAX Ruby

.NET

21
HTML
HyperText Markup Language, more commonly
referred to as HTML, is where the WWW
started.

22
CSS
CSS is one of the most fundamental website
design technologies.

23
Programming
Languages
Programming languages are the most basic
component of website creation.
PROGRAMMING LANGUAGES
 Java
 Java was created in 1991 as a general-purpose
programming language.
 JavaScript
 JavaScript was first created in 1995. Today, it is a
favorite of developers all around the world.
 Python
 Python has been around for years but is only recently
gaining popularity due to its extremely easy-to-learn,
readable syntax as well as its high productivity.
 
25
PROGRAMMING LANGUAGES
 PHP
 PHP, a recursive acronym, stands for PHP: Hypertext
Preprocessor.
 Ruby
 Introduced in the mid-90s, Ruby is a powerful
general-purpose programming language.
 Objective-C & Swift
 Both Objective-C and Swift are general-purpose
programming languages that are used specifically to
build apps for Apple devices which run macOS and
iOS.
  26
Frameworks
In simple terms, a framework can be defined
as skeleton code.
Frameworks Languages

Vue.js JavaScript

Express Node.js (JavaScript)

React.js JavaScript

AngularJS JavaScript

Django Python

Flask Python

Laravel PHP

Ruby on Rails Ruby

Catalyst Perl

Cocoa & Cocoa Touch Swift

28
Databases
Most websites have their own databases
associated with them.
DATABASES
 MySQL
 SQL Server
 Postgres
 Oracle
 MongoDB
 Redis 

30
Data Formats
Data is packaged properly for transmission
from the source to the destination.
DATA FORMATS
 XML
 XML stands for Extensible Markup Language. XML
operates in a similar manner in that it breaks down
data into elements identified by various types of tags.
 JSON
 JSON stands for JavaScript Object Notation. Unlike
XML, JSON focuses more on quick and easy data
exchange rather than detailed data definition and
modelling.

32
<student>

<studentname>Regina George</studentname>
{
<year>2</year>
"studentname": "Regina George",
<courses>
"year": "2",
<course>Compiler Design</course>
"courses": ["Compiler Design", "Film Studies",
<course>Film Studies</course> "Accounting"]

<course>Accounting</course> }

</courses>

</student>

33
Protocols
Web protocols are some predefined rules that
must be followed by everyone communicating
over the web.
PROTOCOLS
 HTTP
 HyperText Transfer Protocol, better known as HTTP, is
a web protocol that defines two concepts:

1. How client requests are relayed to servers


2. How servers respond to client requests

35
Protocol Stands for Usage

For establishing a connection


between two devices on the web
and managing the delivery of data
TCP Transmission Control Protocol packets

For transferring data packets


IP Internet Protocol between two devices on the web

These two web technologies often


TCP/IP work together.

For establishing a connection


UDP User Datagram Protocol between two devices on the web

For transferring files between the


FTP File Transfer Protocol client and the server
For sending email messages to
SMTP Simple Mail Transfer Protocol the server

For fetching email messages from


POP Post Office Protocol the server
For sending XML messages via
SOAP Simple Object Access Protocol HTTP
36
Graphics
Graphical elements are a key feature of any
webpage.
GRAPHICS
 Canvas
 Canvas is an element which is a part of HTML.
 SVG
 SVG stands for Scalable Vector Graphics.
 WebGL
 Web Graphics Library, better known as WebGL, is a
web technology resource that allows browsers to
render both 2D and 3D images on the screen.

38
Others
OTHERS
 Perl & CGI
 Perl is a general-purpose cross-platform programming
language.
 CGI is a web protocol.
 MathML
 Like HTML, MathML (Mathematical Markup
Language) is a markup language.
 XSL, XSLT & EXSLT
 XSL (Extensible Stylesheet Language)
 XSLT (Extensible Stylesheet Language
Transformations)
 EXSLT is a means to extend the functionality of XSLT.

40
The Future of
Web Technologies
41
52%

Report by CISCO

42
WWW

WEB 1.0 WEB 2.0 WEB 3.0

43
Storage
Devices
44
What is Storage Devices ?
Alternatively referred to as digital storage, storage, storage
media, or storage medium, a storage device is any hardware
that store information

45
Why Storage is needed in a computer ?
Without a storage device, a computer cannot save or remember
any settings or information and would be considered a dumb
terminal.

46
Types of
Storage

47
Primary Storage
 Also known as Main memory.

 Main memory is directly or indirectly connected to the central


processing unit via a memory bus.

 Example: RAM, ROM

48
Primary Storage
 RAM

 ROM

49
Secondary Storage
 It is not directly accessible by the
CPU.
 Computer usually uses its
input/output channels to access
secondary storage and transfers the
desired data using intermediate area
in primary storage
 Example: Hard Drive Disk
50
Tertiary Storage
 Typically it involves a robotic
mechanism which will mount
(insert) and dismount removable
mass storage media into a storage
device.
 Example: CD

51
Off-line Storage
 It must be inserted or connected
by a human operator before a
computer can access it again.

 Example: Flash drive, Floppy


Disk

52
Volatility

53
Volatile Memory
 Requires constant power to maintain the stored
information.

 All contents are erased when the system's power is


turned off or interrupted.

 It has been more popularly known as temporary memory


54
Non-Volatile Memory
 Will retain the stored information even if it is not
constantly supplied with electric power.

 Non volatile memory is the device which keeps the data


even when the current is off.

55
Accessibility
 Refers to reading or writing data
records

 Two types of accessibility:


- Random access
- Sequential access

56
Mutability
 Allows information to be overwritten at any time.
 A computer without some amount of read/write storage
for primary storage purposes would be useless for many
tasks.
 Three types of mutability:
– Read/write storage or mutable storage
– Read only storage
– Slow write, fast read storage
57
Addressability
 Three types of addressability
– Location-addressable
– File addressable
– Content-addressable

58
Other Examples of Storage Devices:

 Punched card
 Cloud Storage
 RAID

59
 “Put simply, edge computing is data analysis that takes place
on a device in real-time” - Nima Negahban, CTO of Kinetica.

 “Edge computing refers to the engagement and analysis of data


at its point of origin with available computing and storage
capabilities.” - Jason Mann, Vice President of IoT at SAS

 "Edge computing refers to the concept of bringing computing


services closer to service consumers or data sources. - Rosa
Guntrip, senior principal marketing manager, cloud platforms at Red
Hat
EDGE COMPUTING is a
networking philosophy focused on
bringing computing as close to the
source of data as possible in order to
reduce latency and bandwidth use.
 Runs fewer processes in the cloud
and moving those processes to local
places

 Bringing computation to the


network’s edge minimizes the
amount of long-distance
communication
EARLY COMPUTING Centralized applications only
running on one isolated computer

PERSONAL Decentralized applications running


locally
COMPUTING
CLOUD COMPUTING Centralized applications running in
data centers

Centralized applications running


EDGE COMPUTING close to users, either on the device
itself or on the network edge
Internet of Things
by : Renz Denzell A. Rubio
TRIVIA
IoT in the Philippines
IoT ranked as the #1 Internet of Things have a
technology that the great impact on the different
Filipino youth expect to aspects of the Filipino’s,
create the biggest impact including wearable,
in their lives. vehicles, home appliances,
and sensors.
The History and
Future of IoT

It all started in the early 1980s when


Carnegie Mellon University students
developed the first internet-connected
device. It was a Coke vending machine
that would tell the programmers if the
soda was cold enough for them to want to
make the trip from their desks to the
machine.
IoT security and privacy: What you need
to know
Convenience is good. But connectedness can also open
the door to cybercriminals. Cyberattacks already access
data like bank logins, credit card numbers, and more.
Strong security is essential.

Consider some of the potential risks of IoT — and


those mini CPUs. What if someone hacks your IoT
security cameras and watches your every move? What
if a cybercriminal commandeers your smart TV, smoke
alarms, or front-door lock? Connectedness can create
vulnerabilities.
Thank
you!
Any questions?

71

You might also like