Speaking - cloud computing and the sysop professional - how to get ready
10/May/2013Cloud Computing and the SysOpProfessional: How to get ready?Eduardo Coelho - Congresso UNIFACEXFriday, May 10, 13
hold on✤ before we get started, let me show you some interesting factsinvolving information security and privacy in our worldFriday, May 10, 13
Cryptogram newsletter publishedthe following on 15/Apr/2013✤ One: Some of the Chinese military hackers who were implicated in a broad set ofattacks against the U.S. government and corporations were identiﬁed because theyaccessed Facebook from the same network infrastructure they used to carry outtheir attacks.✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, wasidentiﬁed and arrested last year by the FBI. Although he practiced good computersecurity and used an anonymous relay service to protect his identity, he slippedup.✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus,similarly took extensive precautions to hide her identity. She never logged in toher anonymous e-mail service from her home network. Instead, she used hoteland other public networks when she e-mailed him. The FBI correlated hotelregistration data from several different hotels -- and hers was the common name.Friday, May 10, 13
(continuing)✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers,social networking sites, search engines: these have become necessities, and its fanciful to expectpeople to simply refuse to use them just because they dont like the spying, especially since thefull extent of such spying is deliberately hidden from us and there are few alternatives beingmarketed by companies that dont spy.✤ This isnt something the free market can ﬁx. We consumers have no choice in the matter. All themajor companies that provide us with Internet services are interested in tracking us. Visit awebsite and it will almost certainly know who you are; there are lots of ways to be trackedwithout cookies. Cell phone companies routinely undo the webs privacy protection. Oneexperiment at Carnegie Mellon took real-time videos of students on campus and was able toidentify one-third of them by comparing their photos with publicly available tagged Facebookphotos.✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable yourprotections, or click on the wrong link, or type the wrong thing, youve permanently attachedyour name to whatever anonymous service youre using. Monsegur slipped up once, and the FBIgot him. If the director of the CIA cant maintain his privacy on the Internet, weve got no hope.Friday, May 10, 13
(continuing)✤ So, were done. Welcome to a world where Google knows exactly whatsort of porn you all like, and more about your interests than yourspouse does. Welcome to a world where your cell phone companyknows exactly where you are all the time. Welcome to the end of privateconversations, because increasingly your conversations are conductedby e-mail, text, or social networking sites.✤ And welcome to a world where all of this, and everything else that youdo or is done on a computer, is saved, correlated, studied, passedaround from company to company without your knowledge or consent;and where the government accesses it at will without a warrant.✤ Welcome to an Internet without privacy, and weve ended up here withhardly a ﬁght.Friday, May 10, 13
Thoughts✤ How many people actually understand how all of this impacts ourlife?✤ How good is it to be an IT professional which are probably in the bestposition to fully antecipate bad outcomes and prevent bad things?Friday, May 10, 13
Now let’s focus on the IT PRO✤ Which is the set of abilities that will (is) be asked of System Operatorsand Network Admins?Friday, May 10, 13
By the way, what SysOp standsfor? (or will stand for)✤ Windows Server Professionals✤ Unix/Linux Server Professionals✤ Network Appliance Professionals✤ Security Ofﬁcers✤ DBAs✤ Any above, but Management-focusedFriday, May 10, 13
The best SysOp in a nutshell✤ basic dev knowledge✤ basic ITIL best practices knowledge✤ basic PMP knowledge✤ basic COBIT knowledge✤ good to awesome security knowledge✤ advanced cloud platforms knowledge✤ and of course:✤ great communication skills✤ good presentation✤ self-managed✤ self-motivatedFriday, May 10, 13
Difficulties a professional have todeal with✤ how to always keep up-to-date with technologies as a whole✤ choosing the right technologies to be good at✤ focusing too much on enhancing tech knowledge and forgeting aboutbehavioral skill set✤ how to continuously position IT as strategic to the companyFriday, May 10, 13
Insights✤ Cloud is not the problem, scaling IT is✤ Spending less is possible, be creative✤ Decide how YOU will enhance your careerBy the way, that’s your job, not HR’s✤ Infrastructure exists to support software, never forget thatFriday, May 10, 13
Conclusions✤ Cloud demand a good understanding and creative solutions for loadbalancing, clustering, fail-overs✤ Cloud demand good knowledge of virtualization concepts✤ Cloud demand a better understanding of security✤ Cloud will force SysOps to have a more holistic view of ITFriday, May 10, 13
thank you for your time =)✤ facebook.com/eduardocoelholima✤ slideshare.net/eduardocoelholima✤ youtube.com/eduardocoelholimaFriday, May 10, 13
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.