SlideShare a Scribd company logo
1 of 21
24/01/2013 1John Rhoton – 2013
Cloud Deployment Strategy
Challenges to Consider
John Rhoton
Cloud Weekend, Giza, Egypt
11-12 May 2013
24/01/2013 2John Rhoton – 2013
Agenda
• Business/Financial
• Risk & Security
• Technical
• Process
24/01/2013 3John Rhoton – 2013
Business Case
• Sunk Cost
– Irrelevant?
– Political, Marginal Costs
• Return on Investment
– Calculated with NPV / IRR
– Payback period
• Cash Flow effects
• Revenue impact of flexibility and speed
24/01/2013 4John Rhoton – 2013
Cost Tradeoffs
Initial Ongoing
Private
Cloud
Capital Expenditures Licensing
Operations
Public
Cloud
Migration Subscription
Hardware, Software, Deployment, Administration, Support
24/01/2013 5John Rhoton – 2013
Hybrid Usage Profile
Base
Base Usage Peak
Spikes
24/01/2013 6John Rhoton – 2013
Risk Analysis
• Governance
• Risk
• Security
• Compliance
24/01/2013 7John Rhoton – 2013
Risk Mitigation Options
Data Leakage
Data Loss
Service Loss
Service Impairment
Damaged Reputation
Lock-In
Provider Assessment
Contract Negotiation
Encryption
Additional Backup
Multi-sourcing
Standardization
24/01/2013 8John Rhoton – 2013
• Personal observation
• Personal experience
• Insight
Employees Contractors
Partners Suppliers
• Public verification
• Contracts
• Compensation
Experts
Legal Counsel
Auditors
Public Scrutiny
Segmentation
Access controls
Encryption
Access controls
Shifting Trust
Adapt Corporate Culture
24/01/2013 9John Rhoton – 2013
Confidentiality
• Data Governance
– Data loss prevention
• Compartmentalization
• Encryption
Classify data, Select and Combine Options
24/01/2013 10John Rhoton – 2013
Compliance
Enforce Logical Barriers
Global Internet versus National Laws
24/01/2013 11John Rhoton – 2013
Business
Continuity
Eliminate
High
Probability
Low
Probability
High ImpactLow Impact
Resilience
Risk Treatment
24/01/2013 12John Rhoton – 2013
Technical Considerations
• Technologies
• Integration
• Availability
• Automation
24/01/2013 13John Rhoton – 2013
Lock-in vs. Cloud Stacks
• Servers
• Storage
• Network
• Hypervisor
• Operating
System
• Orchestration
Proprietary
Hardware
Proprietary
Software
Open
Source
Consortium
Driven
Balance ease with flexibility
24/01/2013 14John Rhoton – 2013
Integration
• Connectivity
• Application Compatibility
• Authorization and Isolation
Internal External
Users
Functions
Resources
24/01/2013 15John Rhoton – 2013
Identity Federation
Identity challenges
• Password
proliferation
• Weak
authentication
• Support costs
• User
productivity
Implement Identity Standards (SAML, SCIM)
24/01/2013 16John Rhoton – 2013
Redundancy
• Dimensions
– Physical
– Geographical
– Technological
– Organizational
• Horizontal Scalability
• ACID (Atomic Consistent Isolated Durable)
=> BASE (Basic Availability, Soft-state, Eventual consistency)
Architect for scale
24/01/2013 17John Rhoton – 2013
Automation
• Efficiency, Quality, Traceability, Compliance
• Scripting
• Workflow
• Sizing
• Best practice configuration
• Puppet, Chef, Capistrano
• OpenStack Heat, Juju Charms
24/01/2013 18John Rhoton – 2013
Process
• Culture
– Job Security Career Enhancement
– Political Power shift
• Skills
– Virtualization, Networking, Storage
– Linux, Python, Ruby, OpenStack, OpenFlow
• Procedures
– Workflow definition
• Project Management
– Rollout pace, schedule
– Continuous integration, continuous deployment
24/01/2013 19John Rhoton – 2013
Emotional vs Factual
• Fear, Uncertainty and Doubt
• Increased Effort
– Evaluation
– Negotiation
– Integration
– Implementation
• Reduce CAPEX benefits
Plan early, think objectively
24/01/2013 20John Rhoton – 2013
Summary
• Build the business case around agility
• New trust model is inevitable
• Security challenges real but addressable
• Integration the biggest technical hurdle
• Don’t forget the human element!
24/01/2013 21John Rhoton – 2013
Contact Details
Follow me: @johnrhoton
Connect: linkedin/in/rhoton
Read the books:
amazon.com/author/rhoton
Download the presentation:
slideshare.net/rhoton

More Related Content

What's hot

What's hot (19)

Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
Three aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPRThree aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPR
 
Privacy in Computer Vision
Privacy in Computer Vision Privacy in Computer Vision
Privacy in Computer Vision
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
 

Similar to Cloud Deployment Strategy: Challenges to consider

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
inevitablecloud
 
The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency Imperative
Distil Networks
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
Timothy Krupinski
 

Similar to Cloud Deployment Strategy: Challenges to consider (20)

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
 
Privacy by Design or Privacy by Re-engineering
Privacy by Design or Privacy by Re-engineeringPrivacy by Design or Privacy by Re-engineering
Privacy by Design or Privacy by Re-engineering
 
Digital trends rhoton-20111205
Digital trends rhoton-20111205Digital trends rhoton-20111205
Digital trends rhoton-20111205
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Inria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationInria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentation
 
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal YaronA deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
 
The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency Imperative
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Your only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward OgdenYour only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward Ogden
 
Orsyp Software
Orsyp SoftwareOrsyp Software
Orsyp Software
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 

More from John Rhoton

Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
John Rhoton
 

More from John Rhoton (16)

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Cloud Deployment Strategy: Challenges to consider

  • 1. 24/01/2013 1John Rhoton – 2013 Cloud Deployment Strategy Challenges to Consider John Rhoton Cloud Weekend, Giza, Egypt 11-12 May 2013
  • 2. 24/01/2013 2John Rhoton – 2013 Agenda • Business/Financial • Risk & Security • Technical • Process
  • 3. 24/01/2013 3John Rhoton – 2013 Business Case • Sunk Cost – Irrelevant? – Political, Marginal Costs • Return on Investment – Calculated with NPV / IRR – Payback period • Cash Flow effects • Revenue impact of flexibility and speed
  • 4. 24/01/2013 4John Rhoton – 2013 Cost Tradeoffs Initial Ongoing Private Cloud Capital Expenditures Licensing Operations Public Cloud Migration Subscription Hardware, Software, Deployment, Administration, Support
  • 5. 24/01/2013 5John Rhoton – 2013 Hybrid Usage Profile Base Base Usage Peak Spikes
  • 6. 24/01/2013 6John Rhoton – 2013 Risk Analysis • Governance • Risk • Security • Compliance
  • 7. 24/01/2013 7John Rhoton – 2013 Risk Mitigation Options Data Leakage Data Loss Service Loss Service Impairment Damaged Reputation Lock-In Provider Assessment Contract Negotiation Encryption Additional Backup Multi-sourcing Standardization
  • 8. 24/01/2013 8John Rhoton – 2013 • Personal observation • Personal experience • Insight Employees Contractors Partners Suppliers • Public verification • Contracts • Compensation Experts Legal Counsel Auditors Public Scrutiny Segmentation Access controls Encryption Access controls Shifting Trust Adapt Corporate Culture
  • 9. 24/01/2013 9John Rhoton – 2013 Confidentiality • Data Governance – Data loss prevention • Compartmentalization • Encryption Classify data, Select and Combine Options
  • 10. 24/01/2013 10John Rhoton – 2013 Compliance Enforce Logical Barriers Global Internet versus National Laws
  • 11. 24/01/2013 11John Rhoton – 2013 Business Continuity Eliminate High Probability Low Probability High ImpactLow Impact Resilience Risk Treatment
  • 12. 24/01/2013 12John Rhoton – 2013 Technical Considerations • Technologies • Integration • Availability • Automation
  • 13. 24/01/2013 13John Rhoton – 2013 Lock-in vs. Cloud Stacks • Servers • Storage • Network • Hypervisor • Operating System • Orchestration Proprietary Hardware Proprietary Software Open Source Consortium Driven Balance ease with flexibility
  • 14. 24/01/2013 14John Rhoton – 2013 Integration • Connectivity • Application Compatibility • Authorization and Isolation Internal External Users Functions Resources
  • 15. 24/01/2013 15John Rhoton – 2013 Identity Federation Identity challenges • Password proliferation • Weak authentication • Support costs • User productivity Implement Identity Standards (SAML, SCIM)
  • 16. 24/01/2013 16John Rhoton – 2013 Redundancy • Dimensions – Physical – Geographical – Technological – Organizational • Horizontal Scalability • ACID (Atomic Consistent Isolated Durable) => BASE (Basic Availability, Soft-state, Eventual consistency) Architect for scale
  • 17. 24/01/2013 17John Rhoton – 2013 Automation • Efficiency, Quality, Traceability, Compliance • Scripting • Workflow • Sizing • Best practice configuration • Puppet, Chef, Capistrano • OpenStack Heat, Juju Charms
  • 18. 24/01/2013 18John Rhoton – 2013 Process • Culture – Job Security Career Enhancement – Political Power shift • Skills – Virtualization, Networking, Storage – Linux, Python, Ruby, OpenStack, OpenFlow • Procedures – Workflow definition • Project Management – Rollout pace, schedule – Continuous integration, continuous deployment
  • 19. 24/01/2013 19John Rhoton – 2013 Emotional vs Factual • Fear, Uncertainty and Doubt • Increased Effort – Evaluation – Negotiation – Integration – Implementation • Reduce CAPEX benefits Plan early, think objectively
  • 20. 24/01/2013 20John Rhoton – 2013 Summary • Build the business case around agility • New trust model is inevitable • Security challenges real but addressable • Integration the biggest technical hurdle • Don’t forget the human element!
  • 21. 24/01/2013 21John Rhoton – 2013 Contact Details Follow me: @johnrhoton Connect: linkedin/in/rhoton Read the books: amazon.com/author/rhoton Download the presentation: slideshare.net/rhoton

Editor's Notes

  1. ACID: Atomic Consistent Isolated DurableBASE: Basic Availability, Soft-state,Eventual consistency