CW13 Cloud Ddeployment Strategy by John Rhoton

240 views

Published on

The Inevitable Cloud Conference (CLOUD WEEKEND) is the biggest Cloud Computing event in Egypt that is held annually since 2012.

For more information:
Facebook: https://www.facebook.com/TheInevitableCloud
Linkedin: http://www.linkedin.com/company/2990722?goback=%2Efps_PBCK_inevitable+cloud_*1_*1_*1_*1_*1_*1_*2_*1_Y_*1_*1_*1_false_1_R_*1_*51_*1_*51_true_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2&trk=prof-exp-company-name

Contact us:
info@inevitablecloud.org

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
240
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • ACID: Atomic Consistent Isolated DurableBASE: Basic Availability, Soft-state,Eventual consistency
  • CW13 Cloud Ddeployment Strategy by John Rhoton

    1. 1. 24/01/2013 1John Rhoton – 2013Cloud Deployment StrategyChallenges to ConsiderJohn RhotonCloud Weekend, Giza, Egypt11-12 May 2013
    2. 2. 24/01/2013 2John Rhoton – 2013Agenda• Business/Financial• Risk & Security• Technical• Process
    3. 3. 24/01/2013 3John Rhoton – 2013Business Case• Sunk Cost– Irrelevant?– Political, Marginal Costs• Return on Investment– Calculated with NPV / IRR– Payback period• Cash Flow effects• Revenue impact of flexibility and speed
    4. 4. 24/01/2013 4John Rhoton – 2013Cost TradeoffsInitial OngoingPrivateCloudCapital Expenditures LicensingOperationsPublicCloudMigration SubscriptionHardware, Software, Deployment, Administration, Support
    5. 5. 24/01/2013 5John Rhoton – 2013Hybrid Usage ProfileBaseBase Usage PeakSpikes
    6. 6. 24/01/2013 6John Rhoton – 2013Risk Analysis• Governance• Risk• Security• Compliance
    7. 7. 24/01/2013 7John Rhoton – 2013Risk Mitigation OptionsData LeakageData LossService LossService ImpairmentDamaged ReputationLock-InProvider AssessmentContract NegotiationEncryptionAdditional BackupMulti-sourcingStandardization
    8. 8. 24/01/2013 8John Rhoton – 2013• Personal observation• Personal experience• InsightEmployees ContractorsPartners Suppliers• Public verification• Contracts• CompensationExpertsLegal CounselAuditorsPublic ScrutinySegmentationAccess controlsEncryptionAccess controlsShifting TrustAdapt Corporate Culture
    9. 9. 24/01/2013 9John Rhoton – 2013Confidentiality• Data Governance– Data loss prevention• Compartmentalization• EncryptionClassify data, Select and Combine Options
    10. 10. 24/01/2013 10John Rhoton – 2013ComplianceEnforce Logical BarriersGlobal Internet versus National Laws
    11. 11. 24/01/2013 11John Rhoton – 2013BusinessContinuityEliminateHighProbabilityLowProbabilityHigh ImpactLow ImpactResilienceRisk Treatment
    12. 12. 24/01/2013 12John Rhoton – 2013Technical Considerations• Technologies• Integration• Availability• Automation
    13. 13. 24/01/2013 13John Rhoton – 2013Lock-in vs. Cloud Stacks• Servers• Storage• Network• Hypervisor• OperatingSystem• OrchestrationProprietaryHardwareProprietarySoftwareOpenSourceConsortiumDrivenBalance ease with flexibility
    14. 14. 24/01/2013 14John Rhoton – 2013Integration• Connectivity• Application Compatibility• Authorization and IsolationInternal ExternalUsersFunctionsResources
    15. 15. 24/01/2013 15John Rhoton – 2013Identity FederationIdentity challenges• Passwordproliferation• Weakauthentication• Support costs• UserproductivityImplement Identity Standards (SAML, SCIM)
    16. 16. 24/01/2013 16John Rhoton – 2013Redundancy• Dimensions– Physical– Geographical– Technological– Organizational• Horizontal Scalability• ACID (Atomic Consistent Isolated Durable)=> BASE (Basic Availability, Soft-state, Eventual consistency)Architect for scale
    17. 17. 24/01/2013 17John Rhoton – 2013Automation• Efficiency, Quality, Traceability, Compliance• Scripting• Workflow• Sizing• Best practice configuration• Puppet, Chef, Capistrano• OpenStack Heat, Juju Charms
    18. 18. 24/01/2013 18John Rhoton – 2013Process• Culture– Job Security Career Enhancement– Political Power shift• Skills– Virtualization, Networking, Storage– Linux, Python, Ruby, OpenStack, OpenFlow• Procedures– Workflow definition• Project Management– Rollout pace, schedule– Continuous integration, continuous deployment
    19. 19. 24/01/2013 19John Rhoton – 2013Emotional vs Factual• Fear, Uncertainty and Doubt• Increased Effort– Evaluation– Negotiation– Integration– Implementation• Reduce CAPEX benefitsPlan early, think objectively
    20. 20. 24/01/2013 20John Rhoton – 2013Summary• Build the business case around agility• New trust model is inevitable• Security challenges real but addressable• Integration the biggest technical hurdle• Don’t forget the human element!
    21. 21. 24/01/2013 21John Rhoton – 2013Contact DetailsFollow me: @johnrhotonConnect: linkedin/in/rhotonRead the books:amazon.com/author/rhotonDownload the presentation:slideshare.net/rhoton

    ×