SlideShare a Scribd company logo
1 of 29
Sensitivity: Internal & Restricted
Cloud Computing: Concept &
Technology
Amit Kumar
Sensitivity: Internal & Restricted
Outline of the course
• Introduction to cloud context
o Technology context
o Cloud models
o Why cloud computing
• Demonstration of cloud capabilities
o Elasticity
o Pay per use
o On-demand service
• Security
o Data security
o Security Model
• AWS Lab Exercises
o EC2, VPC, S3 configuration
o 10 scenario based labs
• A case-study of real business application of the cloud
Sensitivity: Internal & Restricted
Why Cloud Computing
Situation 1 – There is a start up organization which primarily deals with
Digital assets and work towards image encoding, suppression and
transformation. What should be Infrastructure architecture ?
Situation 2 – There is a car rental company who wants to promote their
business by putting its business online but don’t have IT expertise. How
they should proceed ?
Situation 3– There is an e-commerce firm which is going to run sale for
3 days and they anticipate their resource utilization will be high for
those 3 days and then it will come back to normal after sale period.
Create solution for this situation ?
Sensitivity: Internal & Restricted
Cloud Computing Structure
Sensitivity: Internal & Restricted
Hands-On lab
Lab 1 – Setup cloud elasticity and auto-scaling in AWS
Lab 2 – Configure Virtual Private Cloud
Lab 3 – Create cloud storage and data management solutions in AWS
Lab 4 – Introduction to serverless technology by creating small website
Lab 5 – Implementation of security and governance in cloud
Sensitivity: Internal & Restricted
Business Case Study
Create highly available word press website having low latency,
scalability, data and application layer security
Sensitivity: Internal & Restricted
Cloud Concepts, Enabling-
technologies, and Models: The
Cloud Context
Sensitivity: Internal & Restricted
Challenges
• Alignment with the needs of the business / user / non-computer
specialists / community and society
• Need to address the scalability issue: large scale data, high
performance computing, automation, response time, rapid prototyping,
and rapid time to production
• Need to effectively address (i) ever shortening cycle of obsolescence,
(ii) heterogeneity and (iii) rapid changes in requirements
• Transform data from diverse sources into intelligence and deliver
intelligence to right people/user/systems
• What about providing all this in a cost-effective manner?
Sensitivity: Internal & Restricted
Enter the cloud
• Cloud computing is Internet-based computing, whereby shared
resources, software and information are provided to computers and
other devices on-demand, like the electricity grid.
• The cloud computing is a culmination of numerous attempts at large
scale computing with seamless access to virtually limitless
resources.
Sensitivity: Internal & Restricted
It is a changed world now…
• Explosive growth in applications: biomedical informatics, space exploration,
business analytics, web 2.0 social networking: YouTube, Facebook
• Extreme scale content generation: e-science and e-business data deluge
• Extraordinary rate of digital content consumption: digital gluttony: Apple
iPhone, iPad, Amazon Kindle
• Exponential growth in compute capabilities: multi-core, storage, bandwidth,
virtual machines (virtualization)
• Very short cycle of obsolescence in technologies: Windows Vista
Windows 7; Java versions; CC#; Phython
• Newer architectures: web services, persistence models, distributed file
systems/repositories (Google, Hadoop), multi-core, wireless and mobile
• Diverse knowledge and skill levels of the workforce
• You simply cannot manage this complex situation with your traditional IT
infrastructure:
Sensitivity: Internal & Restricted
Answer: The Cloud Computing?
• Typical requirements and models:
o platform (PaaS)
o software (SaaS),
o infrastructure (IaaS),
• A cloud computing environment can provide one or more of these
requirements for a cost
• Pay as you go model of business
• When using a public cloud the model is similar to renting a property than
owning one.
• An organization could also maintain a private cloud and/or use both.
Sensitivity: Internal & Restricted
Cloud Computing Models
Sensitivity: Internal & Restricted
Cloud Computing Models - Difference
Sensitivity: Internal & Restricted
Enabling Technologies
64-bit
processor
Multi-core architectures
Virtualization: bare metal, hypervisor. …
VM0 VM1 VMn
Web-services, SOA, WS standards
Services interface
Cloud applications: data-intensive,
compute-intensive, storage-intensive
Storage
Models: S3,
BigTable,
BlobStore, ...
Bandwidth
WS
Sensitivity: Internal & Restricted
Common Features of Cloud Providers
Development
Environment:
IDE, SDK, Plugins
Production
Environment
Simple
storage
Table Store
<key, value>
Drives
Accessible through
Web services
Management Console and Monitoring tools
& multi-level security
Sensitivity: Internal & Restricted
Windows Azure
• Enterprise-level on-demand capacity builder
• Fabric of cycles and storage available on-request for a cost
• You have to use Azure API to work with the infrastructure offered by
Microsoft
• Significant features: web role, worker role , blob storage, table and
drive-storage
Sensitivity: Internal & Restricted
Amazon EC2
• Amazon EC2 is one large complex web service.
• EC2 provided an API for instantiating computing instances with any
of the operating systems supported.
• It can facilitate computations through Amazon Machine Images
(AMIs) for various other models.
• Signature features: S3, Cloud Management Console, MapReduce
Cloud, Amazon Machine Image (AMI)
• Excellent distribution, load balancing, cloud monitoring tools
Sensitivity: Internal & Restricted
Google App Engine
• This is more a web interface for a development environment that
offers a one stop facility for design, development and deployment
Java and Python-based applications in Java, Go and Python.
• Google offers the same reliability, availability and scalability at par
with Google’s own applications
• Interface is software programming based
• Comprehensive programming platform irrespective of the size (small
or large)
• Signature features: templates and appspot, excellent monitoring and
management console
Sensitivity: Internal & Restricted
Demos
• Amazon AWS: EC2 & S3 (among the many infrastructure services)
o Linux machine
o Windows machine
o A three-tier enterprise application
Sensitivity: Internal & Restricted
Cloud Programming Models
Sensitivity: Internal & Restricted
The Context: Big-data
• Data mining huge amounts of data collected in a wide range of domains
from astronomy to healthcare has become essential for planning and
performance.
• We are in a knowledge economy.
o Data is an important asset to any organization
o Discovery of knowledge; Enabling discovery; annotation of data
o Complex computational models
o No single environment is good enough: need elastic, on-demand
capacities
• We are looking at newer
o Programming models, and
o Supporting algorithms and data structures.
Sensitivity: Internal & Restricted
Google File System
• Internet introduced a new challenge in the form web logs, web
crawler’s data: large scale “peta scale”
• But observe that this type of data has an uniquely different
characteristic than your transactional or the “customer order” data :
“write once read many (WORM)” ;
• Privacy protected healthcare and patient information;
• Historical financial data;
• Other historical data
• Google exploited this characteristics in its Google file system (GFS)
Sensitivity: Internal & Restricted
A Case-study in Business:
Cloud Strategies
Sensitivity: Internal & Restricted
Predictive Quality Project Overview
• Identify special causes that relate to bad outcomes for the quality-related
parameters of the products and visually inspected defects
• Complex upstream process conditions and dependencies making the
problem difficult to solve using traditional statistical / analytical methods
• Determine the optimal process settings that can increase the yield and
reduce defects through predictive quality assurance
• Potential savings huge as the cost of rework and rejects are very high
Problem / Motivation:
Solution:
• Use ontology to model the complex manufacturing processes and utilize
semantic technologies to provide key insights into how outcomes and causes
are related
• Develop a rich internet application that allows the user to evaluate process
outcomes and conditions at a high level and drill down to specific areas of
interest to address performance issues
Sensitivity: Internal & Restricted
Why Cloud Computing for this Project
• Well-suited for incubation of new technologies
o Semantic technologies still evolving
o Use of Prototyping and Extreme Programming
o Server and Storage requirements not completely known
• Technologies used (TopBraid, Tomcat) not part of emerging or core
technologies supported by corporate IT
• Scalability on demand
• Development and implementation on a private cloud
Sensitivity: Internal & Restricted
Public Cloud vs. Private Cloud
Rationale for Private Cloud:
• Security and privacy of business data was a big concern
• Potential for vendor lock-in
• SLA’s required for real-time performance and reliability
• Cost savings of the shared model achieved because of the multiple
projects involving semantic technologies that the company is actively
developing
Sensitivity: Internal & Restricted
Cloud Computing for the Enterprise
What should IT Do
• Revise cost model to utility-based computing: CPU/hour, GB/day
etc.
• Include hidden costs for management, training
• Different cloud models for different applications - evaluate
• Use for prototyping applications and learn
• Link it to current strategic plans for Services-Oriented Architecture,
Disaster Recovery, etc.
Sensitivity: Internal & Restricted
References & useful links
• Amazon AWS: http://aws.amazon.com/free/
• AWS Cost Calculator:
http://calculator.s3.amazonaws.com/calc5.html
• Windows Azure: http://www.azurepilot.com/
• Google App Engine (GAE):
http://code.google.com/appengine/docs/whatisgoogleappengine.htm
l
• Graph Analytics:
http://www.umiacs.umd.edu/~jimmylin/Cloud9/docs/content/Lin_Sch
atz_MLG2010.pdf
• For miscellaneous information: http://www.cse.buffalo.edu/~bina
Sensitivity: Internal & Restricted
Summary
• We illustrated cloud concepts and demonstrated the cloud capabilities
through simple applications
• We also explored some real business issues in adoption of cloud.
• Cloud is indeed an impactful technology that is sure to transform
computing in business.

More Related Content

What's hot (20)

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing & Cloud Storage
Cloud Computing & Cloud Storage Cloud Computing & Cloud Storage
Cloud Computing & Cloud Storage
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and development
Cloud computing and developmentCloud computing and development
Cloud computing and development
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction Cloud Computing
Introduction Cloud ComputingIntroduction Cloud Computing
Introduction Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey pots
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
cloude computing
cloude computingcloude computing
cloude computing
 

Similar to Cloud computing

Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliAmr Ali
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingDr Ganesh Iyer
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computingkrisbliesner
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing Loughtec
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingNishant Munjal
 
Cloud computing v3 mar 2016
Cloud computing v3 mar 2016Cloud computing v3 mar 2016
Cloud computing v3 mar 2016Roshan Goolaup
 
Right scale enterprise solution
Right scale enterprise solution Right scale enterprise solution
Right scale enterprise solution Brad , Yun Lee
 
Right scale enterprise solution
Right scale enterprise solution Right scale enterprise solution
Right scale enterprise solution Brad , Yun Lee
 
Cloud computing 13 principal enabling technologies
Cloud computing 13 principal  enabling technologiesCloud computing 13 principal  enabling technologies
Cloud computing 13 principal enabling technologiesVaibhav Khanna
 
Cloud computing by Luqman
Cloud computing by LuqmanCloud computing by Luqman
Cloud computing by LuqmanLuqman Shareef
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing FundamentalDony Riyanto
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorialAnna Liu
 
Leveraging Operational Data in the Cloud
 Leveraging Operational Data in the Cloud Leveraging Operational Data in the Cloud
Leveraging Operational Data in the CloudInductive Automation
 

Similar to Cloud computing (20)

Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Cc
CcCc
Cc
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr Ali
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
 
cloud computing Architecture in Details.ppt
cloud computing Architecture in Details.pptcloud computing Architecture in Details.ppt
cloud computing Architecture in Details.ppt
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Cloud computing v3 mar 2016
Cloud computing v3 mar 2016Cloud computing v3 mar 2016
Cloud computing v3 mar 2016
 
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and History
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and HistoryLecture 1.Basics of cloud computing, Advantage and Disadvantage and History
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and History
 
Right scale enterprise solution
Right scale enterprise solution Right scale enterprise solution
Right scale enterprise solution
 
Right scale enterprise solution
Right scale enterprise solution Right scale enterprise solution
Right scale enterprise solution
 
Cloud computing 13 principal enabling technologies
Cloud computing 13 principal  enabling technologiesCloud computing 13 principal  enabling technologies
Cloud computing 13 principal enabling technologies
 
Cloud computing by Luqman
Cloud computing by LuqmanCloud computing by Luqman
Cloud computing by Luqman
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing Fundamental
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
Leveraging Operational Data in the Cloud
 Leveraging Operational Data in the Cloud Leveraging Operational Data in the Cloud
Leveraging Operational Data in the Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 

Cloud computing

  • 1. Sensitivity: Internal & Restricted Cloud Computing: Concept & Technology Amit Kumar
  • 2. Sensitivity: Internal & Restricted Outline of the course • Introduction to cloud context o Technology context o Cloud models o Why cloud computing • Demonstration of cloud capabilities o Elasticity o Pay per use o On-demand service • Security o Data security o Security Model • AWS Lab Exercises o EC2, VPC, S3 configuration o 10 scenario based labs • A case-study of real business application of the cloud
  • 3. Sensitivity: Internal & Restricted Why Cloud Computing Situation 1 – There is a start up organization which primarily deals with Digital assets and work towards image encoding, suppression and transformation. What should be Infrastructure architecture ? Situation 2 – There is a car rental company who wants to promote their business by putting its business online but don’t have IT expertise. How they should proceed ? Situation 3– There is an e-commerce firm which is going to run sale for 3 days and they anticipate their resource utilization will be high for those 3 days and then it will come back to normal after sale period. Create solution for this situation ?
  • 4. Sensitivity: Internal & Restricted Cloud Computing Structure
  • 5. Sensitivity: Internal & Restricted Hands-On lab Lab 1 – Setup cloud elasticity and auto-scaling in AWS Lab 2 – Configure Virtual Private Cloud Lab 3 – Create cloud storage and data management solutions in AWS Lab 4 – Introduction to serverless technology by creating small website Lab 5 – Implementation of security and governance in cloud
  • 6. Sensitivity: Internal & Restricted Business Case Study Create highly available word press website having low latency, scalability, data and application layer security
  • 7. Sensitivity: Internal & Restricted Cloud Concepts, Enabling- technologies, and Models: The Cloud Context
  • 8. Sensitivity: Internal & Restricted Challenges • Alignment with the needs of the business / user / non-computer specialists / community and society • Need to address the scalability issue: large scale data, high performance computing, automation, response time, rapid prototyping, and rapid time to production • Need to effectively address (i) ever shortening cycle of obsolescence, (ii) heterogeneity and (iii) rapid changes in requirements • Transform data from diverse sources into intelligence and deliver intelligence to right people/user/systems • What about providing all this in a cost-effective manner?
  • 9. Sensitivity: Internal & Restricted Enter the cloud • Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid. • The cloud computing is a culmination of numerous attempts at large scale computing with seamless access to virtually limitless resources.
  • 10. Sensitivity: Internal & Restricted It is a changed world now… • Explosive growth in applications: biomedical informatics, space exploration, business analytics, web 2.0 social networking: YouTube, Facebook • Extreme scale content generation: e-science and e-business data deluge • Extraordinary rate of digital content consumption: digital gluttony: Apple iPhone, iPad, Amazon Kindle • Exponential growth in compute capabilities: multi-core, storage, bandwidth, virtual machines (virtualization) • Very short cycle of obsolescence in technologies: Windows Vista Windows 7; Java versions; CC#; Phython • Newer architectures: web services, persistence models, distributed file systems/repositories (Google, Hadoop), multi-core, wireless and mobile • Diverse knowledge and skill levels of the workforce • You simply cannot manage this complex situation with your traditional IT infrastructure:
  • 11. Sensitivity: Internal & Restricted Answer: The Cloud Computing? • Typical requirements and models: o platform (PaaS) o software (SaaS), o infrastructure (IaaS), • A cloud computing environment can provide one or more of these requirements for a cost • Pay as you go model of business • When using a public cloud the model is similar to renting a property than owning one. • An organization could also maintain a private cloud and/or use both.
  • 12. Sensitivity: Internal & Restricted Cloud Computing Models
  • 13. Sensitivity: Internal & Restricted Cloud Computing Models - Difference
  • 14. Sensitivity: Internal & Restricted Enabling Technologies 64-bit processor Multi-core architectures Virtualization: bare metal, hypervisor. … VM0 VM1 VMn Web-services, SOA, WS standards Services interface Cloud applications: data-intensive, compute-intensive, storage-intensive Storage Models: S3, BigTable, BlobStore, ... Bandwidth WS
  • 15. Sensitivity: Internal & Restricted Common Features of Cloud Providers Development Environment: IDE, SDK, Plugins Production Environment Simple storage Table Store <key, value> Drives Accessible through Web services Management Console and Monitoring tools & multi-level security
  • 16. Sensitivity: Internal & Restricted Windows Azure • Enterprise-level on-demand capacity builder • Fabric of cycles and storage available on-request for a cost • You have to use Azure API to work with the infrastructure offered by Microsoft • Significant features: web role, worker role , blob storage, table and drive-storage
  • 17. Sensitivity: Internal & Restricted Amazon EC2 • Amazon EC2 is one large complex web service. • EC2 provided an API for instantiating computing instances with any of the operating systems supported. • It can facilitate computations through Amazon Machine Images (AMIs) for various other models. • Signature features: S3, Cloud Management Console, MapReduce Cloud, Amazon Machine Image (AMI) • Excellent distribution, load balancing, cloud monitoring tools
  • 18. Sensitivity: Internal & Restricted Google App Engine • This is more a web interface for a development environment that offers a one stop facility for design, development and deployment Java and Python-based applications in Java, Go and Python. • Google offers the same reliability, availability and scalability at par with Google’s own applications • Interface is software programming based • Comprehensive programming platform irrespective of the size (small or large) • Signature features: templates and appspot, excellent monitoring and management console
  • 19. Sensitivity: Internal & Restricted Demos • Amazon AWS: EC2 & S3 (among the many infrastructure services) o Linux machine o Windows machine o A three-tier enterprise application
  • 20. Sensitivity: Internal & Restricted Cloud Programming Models
  • 21. Sensitivity: Internal & Restricted The Context: Big-data • Data mining huge amounts of data collected in a wide range of domains from astronomy to healthcare has become essential for planning and performance. • We are in a knowledge economy. o Data is an important asset to any organization o Discovery of knowledge; Enabling discovery; annotation of data o Complex computational models o No single environment is good enough: need elastic, on-demand capacities • We are looking at newer o Programming models, and o Supporting algorithms and data structures.
  • 22. Sensitivity: Internal & Restricted Google File System • Internet introduced a new challenge in the form web logs, web crawler’s data: large scale “peta scale” • But observe that this type of data has an uniquely different characteristic than your transactional or the “customer order” data : “write once read many (WORM)” ; • Privacy protected healthcare and patient information; • Historical financial data; • Other historical data • Google exploited this characteristics in its Google file system (GFS)
  • 23. Sensitivity: Internal & Restricted A Case-study in Business: Cloud Strategies
  • 24. Sensitivity: Internal & Restricted Predictive Quality Project Overview • Identify special causes that relate to bad outcomes for the quality-related parameters of the products and visually inspected defects • Complex upstream process conditions and dependencies making the problem difficult to solve using traditional statistical / analytical methods • Determine the optimal process settings that can increase the yield and reduce defects through predictive quality assurance • Potential savings huge as the cost of rework and rejects are very high Problem / Motivation: Solution: • Use ontology to model the complex manufacturing processes and utilize semantic technologies to provide key insights into how outcomes and causes are related • Develop a rich internet application that allows the user to evaluate process outcomes and conditions at a high level and drill down to specific areas of interest to address performance issues
  • 25. Sensitivity: Internal & Restricted Why Cloud Computing for this Project • Well-suited for incubation of new technologies o Semantic technologies still evolving o Use of Prototyping and Extreme Programming o Server and Storage requirements not completely known • Technologies used (TopBraid, Tomcat) not part of emerging or core technologies supported by corporate IT • Scalability on demand • Development and implementation on a private cloud
  • 26. Sensitivity: Internal & Restricted Public Cloud vs. Private Cloud Rationale for Private Cloud: • Security and privacy of business data was a big concern • Potential for vendor lock-in • SLA’s required for real-time performance and reliability • Cost savings of the shared model achieved because of the multiple projects involving semantic technologies that the company is actively developing
  • 27. Sensitivity: Internal & Restricted Cloud Computing for the Enterprise What should IT Do • Revise cost model to utility-based computing: CPU/hour, GB/day etc. • Include hidden costs for management, training • Different cloud models for different applications - evaluate • Use for prototyping applications and learn • Link it to current strategic plans for Services-Oriented Architecture, Disaster Recovery, etc.
  • 28. Sensitivity: Internal & Restricted References & useful links • Amazon AWS: http://aws.amazon.com/free/ • AWS Cost Calculator: http://calculator.s3.amazonaws.com/calc5.html • Windows Azure: http://www.azurepilot.com/ • Google App Engine (GAE): http://code.google.com/appengine/docs/whatisgoogleappengine.htm l • Graph Analytics: http://www.umiacs.umd.edu/~jimmylin/Cloud9/docs/content/Lin_Sch atz_MLG2010.pdf • For miscellaneous information: http://www.cse.buffalo.edu/~bina
  • 29. Sensitivity: Internal & Restricted Summary • We illustrated cloud concepts and demonstrated the cloud capabilities through simple applications • We also explored some real business issues in adoption of cloud. • Cloud is indeed an impactful technology that is sure to transform computing in business.