24/01/2013 1John Rhoton – 2013Cloud Deployment StrategyChallenges to ConsiderJohn RhotonCloud Weekend, Giza, Egypt11-12 Ma...
24/01/2013 2John Rhoton – 2013Agenda• Business/Financial• Risk & Security• Technical• Process
24/01/2013 3John Rhoton – 2013Business Case• Sunk Cost– Irrelevant?– Political, Marginal Costs• Return on Investment– Calc...
24/01/2013 4John Rhoton – 2013Cost TradeoffsInitial OngoingPrivateCloudCapital Expenditures LicensingOperationsPublicCloud...
24/01/2013 5John Rhoton – 2013Hybrid Usage ProfileBaseBase Usage PeakSpikes
24/01/2013 6John Rhoton – 2013Risk Analysis• Governance• Risk• Security• Compliance
24/01/2013 7John Rhoton – 2013Risk Mitigation OptionsData LeakageData LossService LossService ImpairmentDamaged Reputation...
24/01/2013 8John Rhoton – 2013• Personal observation• Personal experience• InsightEmployees ContractorsPartners Suppliers•...
24/01/2013 9John Rhoton – 2013Confidentiality• Data Governance– Data loss prevention• Compartmentalization• EncryptionClas...
24/01/2013 10John Rhoton – 2013ComplianceEnforce Logical BarriersGlobal Internet versus National Laws
24/01/2013 11John Rhoton – 2013BusinessContinuityEliminateHighProbabilityLowProbabilityHigh ImpactLow ImpactResilienceRisk...
24/01/2013 12John Rhoton – 2013Technical Considerations• Technologies• Integration• Availability• Automation
24/01/2013 13John Rhoton – 2013Lock-in vs. Cloud Stacks• Servers• Storage• Network• Hypervisor• OperatingSystem• Orchestra...
24/01/2013 14John Rhoton – 2013Integration• Connectivity• Application Compatibility• Authorization and IsolationInternal E...
24/01/2013 15John Rhoton – 2013Identity FederationIdentity challenges• Passwordproliferation• Weakauthentication• Support ...
24/01/2013 16John Rhoton – 2013Redundancy• Dimensions– Physical– Geographical– Technological– Organizational• Horizontal S...
24/01/2013 17John Rhoton – 2013Automation• Efficiency, Quality, Traceability, Compliance• Scripting• Workflow• Sizing• Bes...
24/01/2013 18John Rhoton – 2013Process• Culture– Job Security Career Enhancement– Political Power shift• Skills– Virtualiz...
24/01/2013 19John Rhoton – 2013Emotional vs Factual• Fear, Uncertainty and Doubt• Increased Effort– Evaluation– Negotiatio...
24/01/2013 20John Rhoton – 2013Summary• Build the business case around agility• New trust model is inevitable• Security ch...
24/01/2013 21John Rhoton – 2013Contact DetailsFollow me: @johnrhotonConnect: linkedin/in/rhotonRead the books:amazon.com/a...
Upcoming SlideShare
Loading in …5
×

Cloud Deployment Strategy: Challenges to consider

320
-1

Published on

Cloud Weekend '13
ITI Smart Village, Giza, Egypt
11 May 2013

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
320
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
19
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • ACID: Atomic Consistent Isolated DurableBASE: Basic Availability, Soft-state,Eventual consistency
  • Cloud Deployment Strategy: Challenges to consider

    1. 1. 24/01/2013 1John Rhoton – 2013Cloud Deployment StrategyChallenges to ConsiderJohn RhotonCloud Weekend, Giza, Egypt11-12 May 2013
    2. 2. 24/01/2013 2John Rhoton – 2013Agenda• Business/Financial• Risk & Security• Technical• Process
    3. 3. 24/01/2013 3John Rhoton – 2013Business Case• Sunk Cost– Irrelevant?– Political, Marginal Costs• Return on Investment– Calculated with NPV / IRR– Payback period• Cash Flow effects• Revenue impact of flexibility and speed
    4. 4. 24/01/2013 4John Rhoton – 2013Cost TradeoffsInitial OngoingPrivateCloudCapital Expenditures LicensingOperationsPublicCloudMigration SubscriptionHardware, Software, Deployment, Administration, Support
    5. 5. 24/01/2013 5John Rhoton – 2013Hybrid Usage ProfileBaseBase Usage PeakSpikes
    6. 6. 24/01/2013 6John Rhoton – 2013Risk Analysis• Governance• Risk• Security• Compliance
    7. 7. 24/01/2013 7John Rhoton – 2013Risk Mitigation OptionsData LeakageData LossService LossService ImpairmentDamaged ReputationLock-InProvider AssessmentContract NegotiationEncryptionAdditional BackupMulti-sourcingStandardization
    8. 8. 24/01/2013 8John Rhoton – 2013• Personal observation• Personal experience• InsightEmployees ContractorsPartners Suppliers• Public verification• Contracts• CompensationExpertsLegal CounselAuditorsPublic ScrutinySegmentationAccess controlsEncryptionAccess controlsShifting TrustAdapt Corporate Culture
    9. 9. 24/01/2013 9John Rhoton – 2013Confidentiality• Data Governance– Data loss prevention• Compartmentalization• EncryptionClassify data, Select and Combine Options
    10. 10. 24/01/2013 10John Rhoton – 2013ComplianceEnforce Logical BarriersGlobal Internet versus National Laws
    11. 11. 24/01/2013 11John Rhoton – 2013BusinessContinuityEliminateHighProbabilityLowProbabilityHigh ImpactLow ImpactResilienceRisk Treatment
    12. 12. 24/01/2013 12John Rhoton – 2013Technical Considerations• Technologies• Integration• Availability• Automation
    13. 13. 24/01/2013 13John Rhoton – 2013Lock-in vs. Cloud Stacks• Servers• Storage• Network• Hypervisor• OperatingSystem• OrchestrationProprietaryHardwareProprietarySoftwareOpenSourceConsortiumDrivenBalance ease with flexibility
    14. 14. 24/01/2013 14John Rhoton – 2013Integration• Connectivity• Application Compatibility• Authorization and IsolationInternal ExternalUsersFunctionsResources
    15. 15. 24/01/2013 15John Rhoton – 2013Identity FederationIdentity challenges• Passwordproliferation• Weakauthentication• Support costs• UserproductivityImplement Identity Standards (SAML, SCIM)
    16. 16. 24/01/2013 16John Rhoton – 2013Redundancy• Dimensions– Physical– Geographical– Technological– Organizational• Horizontal Scalability• ACID (Atomic Consistent Isolated Durable)=> BASE (Basic Availability, Soft-state, Eventual consistency)Architect for scale
    17. 17. 24/01/2013 17John Rhoton – 2013Automation• Efficiency, Quality, Traceability, Compliance• Scripting• Workflow• Sizing• Best practice configuration• Puppet, Chef, Capistrano• OpenStack Heat, Juju Charms
    18. 18. 24/01/2013 18John Rhoton – 2013Process• Culture– Job Security Career Enhancement– Political Power shift• Skills– Virtualization, Networking, Storage– Linux, Python, Ruby, OpenStack, OpenFlow• Procedures– Workflow definition• Project Management– Rollout pace, schedule– Continuous integration, continuous deployment
    19. 19. 24/01/2013 19John Rhoton – 2013Emotional vs Factual• Fear, Uncertainty and Doubt• Increased Effort– Evaluation– Negotiation– Integration– Implementation• Reduce CAPEX benefitsPlan early, think objectively
    20. 20. 24/01/2013 20John Rhoton – 2013Summary• Build the business case around agility• New trust model is inevitable• Security challenges real but addressable• Integration the biggest technical hurdle• Don’t forget the human element!
    21. 21. 24/01/2013 21John Rhoton – 2013Contact DetailsFollow me: @johnrhotonConnect: linkedin/in/rhotonRead the books:amazon.com/author/rhotonDownload the presentation:slideshare.net/rhoton
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×