• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Getting an open systems cloud strategy right the first time linthicm
 

Getting an open systems cloud strategy right the first time linthicm

on

  • 595 views

The ability for enterprise IT to effectively leverage cloud computing means a transformational change in the way that IT thinks about and executes system design, development, and implementation. For ...

The ability for enterprise IT to effectively leverage cloud computing means a transformational change in the way that IT thinks about and executes system design, development, and implementation. For many organizations, there is still much confusion around technical approaches, including the proper use of open systems technology. Those who sell highly proprietary technology are creating both hype and confusion. In many instances, the proper approaches get pushed to the back of the room. This presentation will take the mystery out of both cloud computing, and the proper fit and function of open systems technology when building a cloud computing strategy. Instead of mere theory, this session will guide you through a step-by-step process for understanding your own requirements, creating the business cases, and selecting the right technology that will lead your enterprise to success in the cloud.

Statistics

Views

Total Views
595
Views on SlideShare
595
Embed Views
0

Actions

Likes
0
Downloads
10
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Bussman’s please change to new logo if you can….with the “A Bick Group Company” couldn’t get the white background to go away.
  • Where is Iaas on this chart?
  • Action Items. Can happen all at same time or sequentially. Consider combining title of each header with the content in each box.
  • Frame your requirements-Network, Compute, Storage, Mobility-Choose a provider that has all these capabilities-high level requirements. These are all Services. Physical, Virtual and Logical. Logical reference architecture. By the time they select the technology may not use existing systems
  • Define core primitive services---How much space, performance expectations. Dave to add 3 to 5 bullets on each of the slides of things to consider.
  • . Dave to add 3 to 5 bullets on each of the slides of things to consider.
  • . Dave to add 3 to 5 bullets on each of the slides of things to consider.
  • . Dave to add 3 to 5 bullets on each of the slides of things to consider.
  • . Dave to add 3 to 5 bullets on each of the slides of things to consider. Ask Dave if we have a requirements list on a document I can snapshot and insert the image.

Getting an open systems cloud strategy right the first time linthicm Getting an open systems cloud strategy right the first time linthicm Presentation Transcript

  • Getting an Open Systems Cloud Strategy Right the First Time David S. Linthicum CTO, Blue Mountain Labs Email: david@bluemountainlabs.com August 29, 2012© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 1
  • Abstract:The ability for enterprise IT to effectively leverage cloud computing means atransformational change in the way that IT thinks about and executes systemdesign, development, and implementation. For many organizations, there is stillmuch confusion around technical approaches, including the proper use of opensystems technology. Those who sell highly proprietary technology are creatingboth hype and confusion. In many instances, the proper approaches get pushedto the back of the room.This presentation will take the mystery out of both cloud computing, and theproper fit and function of open systems technology when building a cloudcomputing strategy. Instead of mere theory, this session will guide you through astep-by-step process for understanding your own requirements, creating thebusiness cases, and selecting the right technology that will lead your enterpriseto success in the cloud.© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 2
  • Where To Find Out More Slides available:© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 3
  • Where to find me.• @DavidLinthicum• david@bluemountainlabs.com• www.bluemountainlabs.com• www.davidlinthicum.com• http://www.linkedin.com/in/davidlinthicum• Grab a card after the presentation.© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 4
  • Geek Level for this PresentationYour Grandparents that Systems Programmer andare Still Using AOL Dialup Dungeon Master© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 5
  • Setting the Stage© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 6
  • © 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 7
  • Source: Chander Khanna© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 8
  • The fight begins…© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 9
  • …and, things are getting crowded.© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 10
  • “Inside Baseball”• Watch… the number of offerings out there, and the quality of the distributions. the hype, what’s real versus perception.• Understand… that rigorous testing is required, before implementation. your own security requirements. that you may be mixing and matching technology. the roadmap for each product. the near-term and long-term costs.© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 11
  • Why You Should Care© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 12
  • Most Open System Cloud-Based Systems areLacking Architecture© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 13
  • © 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 14
  • The results:• Inefficient utilization of resources.• Resource saturation.• Lack of elasticity and scalability.• Lack of security and governance.• Frequent outages.• Bad or no tenant management.• Other very bad things.© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 15
  • Common Mistakes• Not understanding how to make architectures scale.• Not dealing with tenant management issues.• Not understanding that security is systemic.• Not understanding the proper use of services.• Tossing technology at the problem.• Listening to the wrong people.• Managing-by-magazine.© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 16
  • The Multitenant Thing• No two multitenant architectures are alike.• Needs to be effective in the context of the problem.• Needs to leverage best architecture practices.• Needs to practice isolation and protection. “With a multitenant architecture, a software application is designed to virtually partition its data and configuration so that each client organization works with a customized virtual application instance.” Source: Wikipedia © 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 17
  • © 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 18
  • ABCs of Multitenancy Amazon Machine Images Source: Steve Bobrowski© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 19
  • Virtualization is Not Always a Requirement© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 20
  • The Big Picture© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 21
  • ObjectiveProvide Examine Createa future vision for the infrastructure a starting point tohow the cloud can be aspect of cloud identifying potentialadopted within the technologies to open source vendorsenterprise to determine a path that may be a fit toincrease agility and the needs of of thedrive innovation enterprise to build a solution 1 2 3© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 22
  • The Journey to the Cloud Tactical IT Efficiency Leveraging Shared Services IT-as-a-Service Lower Costs Improve Quality of Service Improve Agility 85% 95%% Efficiency 50% Platinum Gold 30% IaaS 15% Run IT as a Business Manual Provisioning Self-Service Provisioning© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 23
  • Actions to Support an Open Systems CloudStrategyOptimize Identify Build and Build a Lab Establish athe Current Candidate Cloud Communicate and conduct Center of ExcellenceEnvironment Opportunities a Project Plan POC’s Designate a cross-Optimize the current Identify cloud Communicate with Experiment with functional team toIT environment services the BUs about and pilot various monitor continuallywith the goal of opportunities cloud services and services, both which new services,providing an internal based on business the roadmap and internal and providers, andset of cloud services needs, value process for external, to identify standards are in thisand enabling the proposition, and incorporating them where the real space and determineincorporation of the ability to into the issues will arise. if they affect theexternal services. adopt/support architecture, wheth This will be roadmap. This will beThis will be the those services. er the services are the lab. the sensing andservices. roadmap This will be the internal or external. strategy-evolution services portfolio This will be the function. communication plan. 1 2345© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 24
  • How You Should Proceed© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 25
  • IaaS Building Blocks This is a logical framework for IaaS and all of these components need to exist. Use this as a framework of understanding to evaluate the core components of an open IaaS product. For each area identified, there are dozens of requirements that must be defined- Monitoring and Management Services Management & Service Governance Use-Based Accounting Provisioning Tenant Management Security & Identity Services Services Services Services APIs/Services Database Services File System Services Primitives: Network, Storage and Compute© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 26
  • Gather the Requirements for the CloudStep 1: Define core primitive services.Requirements: 1. Storage capacity requirements 2. Storage growth requirements 3. Existing technology analysis 4. Security planning 5. Governance planning 6. Existing network analysis 7. Elasticity requirements 8. Integration requirements 9. Management requirements 10. API service design 11. ..….. 12. ……. Primitive Services: Network, Storage and Compute© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 27
  • Gather the Requirements for the CloudStep 2: Define database and file systems services, as well as access service/APIs.Requirements: 1. Use cases 2. Data growth 3. Security planning 4. File system growth 5. File system performance 6. API/service implementation 7. Database service analysis 8. Migration planning APIs/Services 9. Database performance 10. File system security requirements 11. ….. Database Services File System Services 12. ….. Primitive Services: Network, Storage and Compute© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 28
  • Gather the Requirements for the CloudStep 3: Define approaches and technology for use-based accounting, provisioningservices, and tenant management services.Requirements: 1. Accounting use cases 2. Governance planning 3. Service management 4. Tenant management requirements Use-Based Tenant 5. Provisioning use case planning Provisioning Accounting Management Services 6. Provisioning security Services Services 7. Cost models APIs/Services 8. Tenant management approaches 9. Integration planning 10. Migration planning Database Services File System Services 11. ….. 12. ….. Primitive Services: Network, Storage and Compute© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 29
  • Gather the Requirements for the CloudStep 4: Define monitoring and management services.Requirements: 1. Use cases monitoring 2. Use cases management 3. BC/DR requirements Monitoring and Management Services 4. BC/DR planning 5. Compliance requirements Use-Based Tenant Provisioning 6. Auditing requirements Accounting Management Services 7. Management interface requirements Services Services 8. Security planning APIs/Services 9. Integration with governance 10. Integration with security 11. ….. Database Services File System Services 12. ….. Primitive Services: Network, Storage and Compute© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 30
  • Gather the Requirements for the CloudStep 5: Define Security, Identity Management and Service GovernanceRequirements: 1. Compliance planning 2. Governance approach Monitoring and Management Services Management & Service Governance 3. Approaches to encryption 4. Identity design Use-Based Tenan 5. Integration with existing directory Provisioning Accounting Managem Security & Identity management Services Services Servic 6. Policy requirements Services APIs/Services 7. Policy design 8. Policy implementation planning 9. Policy life-cycle management 10. Security and governance Database Services File System Serv integration 11. ….. Primitive Services: Network Storage and Com 12. …..© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 31
  • “as-is”© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 32
  • “to be”© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 33
  • deploy© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 34
  • Q&A© 2012 Blue Mountain Labs, A Bick Group Company August 29, 2012| Page 35