Cloud migration slides
 

Cloud migration slides

on

  • 627 views

Explore the challenges of migrating existing applications to a cloud infrastructure, then present proven strategies for mitigating the risks You'll learn how to: ...

Explore the challenges of migrating existing applications to a cloud infrastructure, then present proven strategies for mitigating the risks You'll learn how to:

- Prioritize application migration
- Plan for “big-blocks”
- Assess your existing applications' ‘fit’ for cloud
- Leverage a centralized development testing platform to align your business goals with coding decisions
- Create a cloud migration policy
- Use process to mitigate the risks associated with cloud migration

Statistics

Views

Total Views
627
Views on SlideShare
598
Embed Views
29

Actions

Likes
1
Downloads
10
Comments
0

2 Embeds 29

https://twitter.com 28
http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Use well-defined componentsEasy to reuseEasy to testEasy to secure
  • Check cyclical (circular) dependencyRun metrics analysisStatic analysis to find high dependencies
  • Giant files (over xxx lines)Giant methods/functions (over xxx lines)Poor coverage can point to monolithic code
  • What is “global” in a service oriented context?Use static analysis to pin-point and remove global variables
  • Uncaught exceptions are more troublesome in a cloud infrastructureNull pointers can wreak havocWhat to do:Static for unhandled exceptions and nullsAuto-generation for nulls and unhandled runtime exceptions

Cloud migration slides Cloud migration slides Presentation Transcript

  • Migrating Applications to the CloudPrevent the Most Common Reasons for Failure Parasoft November 2012
  • Cloud “Migration”…What we see Stage Characterized SummaryRogue Experimentation  Against or before an internal mandate  Pure simplicity versus internal processes  Cool factorAd Hoc Fun with Virtualization  Leverage server virtualization in cloud  Only increases risk (and cost) due to duplicationTrial and Error Business Interest  Opportunity to deliver business value  In “Cloud we Trust…”Responsibility Service Level Agreement  Architecture analyzed  Business penalties palpable  Real refactoring / redesign starts
  • Major Cloud Application Considerations Infrastructure Architecture Monitoring Security Instrumentation Automation Latency Parallel Event-Driven Fault Tolerance Resource Consumption
  • Where To Start Create your policy Determine your basic desired architecture Align with a service provider that meets your business needs and realize that this will be a give and take Don’t remodel - rebuild
  • The old into the new UI database authentication computation legacy systemParasoft Proprietary and Confidential 5
  • Break it down  Plan out your components  Select the pieces to be reworked and peer-review the plan  Well designed components use API only  Public member fields are a no-noParasoft Proprietary and Confidential 6
  • Architectures Tips & Tricks  You want to be:  Parallelizable  Fault tolerant  Resource independentParasoft Proprietary and Confidential 7
  • Don’t Run in Circles Package A Package C Package BParasoft Proprietary and Confidential 8
  • No Monoliths in the Cloud Giant Files Giant FunctionsParasoft Proprietary and Confidential 9
  • Thinking GloballyParasoft Proprietary and Confidential 10
  • Be ExceptionalParasoft Proprietary and Confidential 11
  • Security is vital  Suddenly there are openings everywhere  Can’t rely on “it was checked elsewhere in the application”  Input validation covers wide swath of potential problems  OWASP Top 10  CWE Top 25Parasoft Proprietary and Confidential 12
  • Policy – Plan, Measure, Monitor  Decide what you’re going to allow and create specific policy  Measure / monitor  Flag violations as errors (policy enforcement)Parasoft Proprietary and Confidential 13
  • Questions  info@parasoft.com webinar@parasoft.comParasoft Proprietary and Confidential