SlideShare a Scribd company logo
1 of 33
Software as
                                        a Service

A windows Azure approach towards building SAAS Solutions
Introduction
• Software as a service (SaaS, pronounced sæs or sɑs), sometimes
  referred to as "on-demand software", is a software delivery
  model in which software and associated data are
  centrally hosted on the cloud. SaaS is typically accessed
  by users using a thin client via a web browser.

• SAAS is fundamentally a business model where the application is
  owned, operated and managed by the vendor. The consumer
  pays for the usage and consumes the application.

• SAAS offers a “hands-off” model for consumers which frees the
  consumer from pain of server/application management and
  instead allows the consumer to focus on business.
                                                                    2
SAAS
                                         Intranet
                                         Solutions
                               Desktop
                               Applications
                         Mainfra
                         mes


SAAS and Windows Azure

SAAS AND THE ISV                                            3
SAAS and ISV
                     Operational
                      Structure




                     SAAS
      Technology                   Business
      Architecture                  Model

                                              4
ISV Realignments
• Operational Structure

  • Operational structure of the organization needs to be realigned to
    support an internet based solution both in terms of rapid
    development and also in terms of support offerings

• Business Model

  • SAAS enabling the solution offering requires may require a change in
    terms of pricing models from traditional boxed offerings

• Application Architecture

  • By bringing in multi tenancy, economies of scale can be achieved by     5
    better utilization of infrastructure and the savings can be passed on
    to consumers
SAAS Advantages
• SAAS offerings are increasingly being considered within
  enterprises due to the following advantages

  • Pricing – Most of the SAAS offerings are Multi Tenant enabling
    vendors to reduce prices due to economies of scale

  • Accelerated Feature Delivery – SAAS offerings are delivered from
    Internet allowing vendors to update and offer new features regularly

  • Open Protocols – Increased competition and multi tenant nature of
    software forces vendors offer standard API’s for data access over
    open protocols

  • Customization and Configuration – To reduce onboarding effort of
    customers, SAAS offerings typically offer self service customization   6
    and configuration options to end users
SAAS

                              PAAS

                              IAAS
SAAS and ISV

ARCHITECTURE CONSIDERATIONS          7
Multi Tenancy
• Multi Tenancy is considered an essential part of SAAS systems. By
  adding an abstraction layer over the product, it enables ISV to optimally
  utilize the hardware and achieve economies of scale

• Compared to on-premise installation, bringing multi tenancy introduces
  additional complexity in terms of customization and data privacy

• Customization is a tricky topic as analysts have made both pro and anti
  customization calls
  • Customization branches the code making code management problems
  • Without customization, customers may move not decide to buy the
    service as every business is unique

• Ideal SAAS product should have “Single Code base used by multiple           8
  customers”.
Theming
• Theming is an essential strategy within the application
  architecture to ensure that the customer feels that the solution
  aligns with the rest of the internal applications

• Theming may include one or more of the following elements
  •   Customer Logo
  •   Application colors and themes
  •   Application Layout
  •   Dashboards

• To ensure that the product branding is intact, the product logo
  can be part of the footer with a link to the product portal

• It may not be necessary to offer a user level color theme as part   9
  of customization
Metering
• Metering is the process of monitoring usage and tracking application
  use

• Recommendation is to log all requests and all access requests

• Metering should also log business metrics
  • Number of invoices generated
  • Number of courses played


• Helps in multiple billing methodology for different flavors of customers

• Metering also helps in capacity planning and knowing system health

                                                                             10
• Consolidated metering information related to tenant can be made
  available pro-actively to customer administrators
Billing
• Pricing models for SAAS applications vary based on type of application,
  usage, customer profile, etc…

• Unlike the boxed product, a SAAS product can have innovative pricing
  models
  •   User based
  •   Usage based
  •   Fixed monthly cost
  •   Fixed yearly cost
  •   Freemium
  •   Multi year contracts

• Billing models can be tested out early during trials to identify usage and
  can be finalized later
                                                                               11
• Amortization of total cost can be over multiple customers – multiple
  billing cycles
Identity and Access Management
• Security is paramount in a SAAS system

• Enterprises are used to having their own infrastructure to access
  products through intranet

• SAAS needs to offer a comprehensive system to manage users,
  roles and access permissions for different features of the
  application.

• In addition, as part of the infrastructure, it is imperative to enable
  intrusion prevention, DDOS prevention and Firewall management.

                                                                           12
• Extending identity from customer infrastructure reduces identity
  management pains for the customer
Data and Application Integration
• Integration is a core need to every enterprise to ensure that data
  from one application is available for consumption by other

• Integration needs vary based on different types and usage of
  SAAS application

• Data integration and connectivity capabilities are important to
  reduce support calls and help customer teams to work without
  hindrance

• Multiple choices can be offered by SAAS ISV to enable integration
  • CSV download of core data through graphical interface
  • REST/ODATA based API for full access to database                          13
  • Read only access to database through firewall whitelisting of client IP
SLA Monitoring
• With Product hosted on Internet and managed by the ISV, it is
  essential to guarantee SLA for customers to have confidence in
  the solution

• SLA guarantee can be promised for the following aspects
  • Availability
  • Performance
  • Security

• A service guarantee to customer also helps in to build the
  necessary monitoring layer into the application that governs all
  the aspects of the application
                                                                     14
Automated Provisioning
• Onboard customers automatically with the shortest time and
  customer support effort

• Automated provisioning also helps with offering trial plans for
  prospects

• Self service customization makes it easier for customers to modify
  the service offering to fit their company needs

• Self managed tenant accounts liberates the support team from
  routine activities and reduces support calls

• Provisioning on multi tenant SAAS systems require no changes to
  infrastructure and only adds records to Tenant Information           15
  Database
Customization
• Customization can be offered at multiple levels depending on the
  need of the industry

• Table Structure
  • Allow additional fields to have tenant specific information
  • Fixed number of columns in each table for customization
  • Fully extensible EAV tables for complex and unlimited extensibility

• Workflow
  • Control process flow and customize flow authorization
  • Drag and Drop managed workflow for self service
  • Factory pattern based coded workflow by ISV support team for
    complex scenarios                                                     16
Governance
• SAAS application being owned, hosted and managed by ISV, the
  onus of governance and compliance needs if any falls on the ISV

• Compliance rules may require verification of the following aspects
  • Infrastructure
      • Physical Security, Firewall, etc…

  • Data Security
      • Encryption in Transit and at rest

  • Certifications
      • Industry specific validations

• Governance concerns are high in enterprises and
  compliance/certifications can allay the fears of IT decision         17
  authorities
Hybrid SAAS Architecture
• Not all customers look at cost as a factor when it comes to buying
  SAAS solutions

• Customers are worried about data security and privacy in multi
  tenant solutions. Due to governance rules within the customer
  legal department, customers may not prefer SAAS solutions

• To ensure that the product caters to all customers, developing a
  hybrid solution covers all types of customers
  • Multi tenant SAAS solution for SMB’s
  • Independent hosting for other customers
  • Boxed product of same codebase for intranet customers

• Architecture needs to have a Factory based implementation of         18
  critical components to support both on-premise and cloud based
  services
Disaster Recovery
• Disaster recovery policy for SAAS applications are necessary since
  the infrastructure management is handled by the ISV

• DR Strategies can vary based on time to recovery, point of
  recovery objectives

• Cloud based infrastructure enables quick recovery

• For Hot DR, it is essential to have an effective DNS services that
  quickly updates the DNS records
   DR Type           Cost               Time to recover
   Cold              Low                High
                                                                       19
   Warm              Medium             Medium
   Hot               High               Low
Software + Service: An Enterprise Perspective              20
          Courtesy: Microsoft Architecture Strategy Team
SAAS and Windows Azure

DESIGN CONSIDERATIONS    21
SAAS - Application Access
• Application access via Internet can be customized to allow the customer
  to personalize the product

• URL is the singular way to identify a tenant in a multi tenant setup
  without exposing the list of tenants to others
  • Subdomains
      •   http://customer.product-brand.com
      •   Supports both the customer and product branding
      •   CNAME redirection to the Azure hosted service URL using DNS dashboard
      •   ISV managed DNS mappings
  • Customer URL
      • http://productname.customer.com
      • Product branding in URL is lost even though the application may have product
        logo displayed in the UI
      • Customer managed DNS mappings
                                                                                       22
• For both methods, map the tenant URL to Windows Azure application
  URL using DNS CNAME records
Multi Tenancy – Data Privacy
• Multi Tenancy adds the complexity of data privacy to the
  architecture.
• Data Privacy has to be enforced at 2 levels – Data and File Storage
• For File storage, use multiple storage accounts on Windows Azure
  Blob Storage
• At Database level, there’re 3 different ways to do multi-tenancy
  • Single Schema for all customers – Using TenantID column on all
    tables, low cost, high risk
  • Multiple Schema – Allow different tenants to have different schemas
    and at application level have multiple SQL user based access – Low
    cost, high complexiety
  • Multiple Database – Independent database for each customer, high
    cost, no risk
                                                                          23
  • SQL Azure Federations – Shard database using TenantID, low cost,
    optimized
High Availability
• Application Availability can be improved by consuming inherent fault
  tolerant code blocks/services

• Windows Azure compute is by default fault tolerant and starts up
  automatically in case of failures

• Application SLA targets can be achieved by enabling the application to
  run in high availability mode

• Windows Azure by default guarantees 99.5% uptime guarantee if an
  application is run on a minimum of 2 nodes

• SQL Azure guarantees an uptime of 99.5% for their services

• By building stateless web/app tier and by adding retry logic within data   24
  access calls, SLA guarantee for SAAS applications can be made to
  customer
Identity Management
• For enterprises, integration with their internal IT security for
  identity management is important
  • Microsoft Active Directory
  • LDAP

• Federated identity is the easiest way for integration with
  enterprise security for SAAS applications
  • Microsoft Active Directory Federation Services
  • Windows Azure Active Directory

• SAAS systems need to cater for both SMB and Enterprises. It is
  essential to build an integrated identity management solution
  within the product to cater to SMB needs.                          25
  • SQL Authentication
Session
• For high availability, Stateless web/app tiers are necessary

• Web tier usually maintains session state in memory for active
  users

• To enable Stateless web server design, state information can be
  moved to any of the following Windows Azure Services
  • SQL Azure
  • Windows Azure Table Storage
  • Windows AppFabric Caching

• Moving session state out of memory increases session access
  latency but the impact is usually minimal                         26
Caching
• Application performance and throughput can be improve manifold by
  incorporating a caching strategy within the product

• Caching can be employed in multiple layers with minimal or no cost
  •   Data
  •   HTML Server Pages
  •   Proxy Server
  •   Browser

• For Data and Server Caching needs, employ cloud based caching
  services for high availability and scalability
  • Windows Azure Appfabric Cache
  • Memcache

• For proxy/browser caching, set the appropriate HTTP headers to ensure
  that data is cached in transit
                                                                          27
• Employ strategies to invalidate stale data in both scenarios
Scalability
• Windows Azure is an elastic environment which allows machines to be
  added/removed to the cluster at ease

• By adding auto scaling block to the web/app tier, an application can
  dynamically add/remove servers to the tier without lowering
  performance and with minimal cost considerations

• Scaling rules can be applied on web/app tier as
  • Add new instance to the group if average CPU utilization is over 75% for
    last 60 seconds
  • Add new instance to the group if the number of pending items in Queue
    is over 250 for last 180 seconds
  • Remove an instance from the web/app tier if the average memory
    utilization is less than 20% for last 120 seconds

• Scaling works without issues in the following scenarios
  • Stateless services                                                         28
  • Lock based object lookup / processing
Performance
• Split the application into multiple types
   • Static Data
   • Dynamic Data

• Use Windows Azure Blob Storage for delivering static data
   • Javascript
   • Images
   • CSS

• By splitting the load between multiple domains, the browser optimally downloads
  the content increasing throughput of web servers

• Effective caching strategy reduces the amount of download making web applications
  load quickly

• Configuring multiple buckets and having multiple URL’s configured improves overall
  content delivery to User browser

• CDN enabling the blob storage can reduce the network latency and deliver files from
  a closer data center location                                                         29

• Compress web content using GZIP/Deflate methods to reduce the content size
Encryption
• Encryption is a core part of security compliance for certificates
  like PCI

• Encryption has to be done for data in both forms
  • In Transit
  • In Rest

• Connectivity between Browser and Web Server can be encrypted
  using SSL/TLS services
  • Web roles can be secured using Server certificates
  • Blob storage allows both http/https access using MS certificate

• Enable Secure connection for database calls                         30
Logging
• Plugging Logging module into applications are easier due to
  existence of multiple frameworks
  • Log4Net
  • Microsoft Enterprise Library Logging block

• Securely transfer all logs to Windows Azure Table storage and
  Windows Azure blobs
  •   IIS Logs
  •   Application Logs
  •   Performance Metrics
  •   Errors and Exception logs
  •   Crash dumps

• Data is paramount to analyze and monitor SLA. The data is also   31
  essential to scale out applications during heavy loads
SAAS – Multi Tenant Design




                             32
Contact Us @

AZURE@8KMILES.COM OR   33

CLOUD@8KMILES.COM

More Related Content

What's hot

Storage strategy and tsm roadmap
Storage strategy and tsm roadmapStorage strategy and tsm roadmap
Storage strategy and tsm roadmapIBM Danmark
 
Software as a service, software engineering
Software as a service, software engineeringSoftware as a service, software engineering
Software as a service, software engineeringRupesh Vaishnav
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)johndorian555
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterjmustac
 
Address Citrix XenApp/XenDesktop issues with Parallels RAS
Address Citrix XenApp/XenDesktop issues with Parallels RASAddress Citrix XenApp/XenDesktop issues with Parallels RAS
Address Citrix XenApp/XenDesktop issues with Parallels RASParallels Inc
 
Estrategias para explotar las tendencias de SaaS y Cloud Computing
Estrategias para explotar las tendencias de SaaS y Cloud ComputingEstrategias para explotar las tendencias de SaaS y Cloud Computing
Estrategias para explotar las tendencias de SaaS y Cloud ComputingSoftware Guru
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
VMworld 2013: View Planner 3.0 as a VDI Benchmark
VMworld 2013: View Planner 3.0 as a VDI Benchmark VMworld 2013: View Planner 3.0 as a VDI Benchmark
VMworld 2013: View Planner 3.0 as a VDI Benchmark VMworld
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine
 
Implementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field OperationsImplementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field OperationsSmartbridge
 
FlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexera
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Gennadiy Civil
 
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTUNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTMicro Focus
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
WSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosWSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosAfkham Azeez
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategyMicro Focus
 
21 Secrets of Self-Service IT Request Fulfillment
21 Secrets of Self-Service IT Request Fulfillment21 Secrets of Self-Service IT Request Fulfillment
21 Secrets of Self-Service IT Request FulfillmentnewScale
 

What's hot (20)

Storage strategy and tsm roadmap
Storage strategy and tsm roadmapStorage strategy and tsm roadmap
Storage strategy and tsm roadmap
 
Software as a service, software engineering
Software as a service, software engineeringSoftware as a service, software engineering
Software as a service, software engineering
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
 
Address Citrix XenApp/XenDesktop issues with Parallels RAS
Address Citrix XenApp/XenDesktop issues with Parallels RASAddress Citrix XenApp/XenDesktop issues with Parallels RAS
Address Citrix XenApp/XenDesktop issues with Parallels RAS
 
Estrategias para explotar las tendencias de SaaS y Cloud Computing
Estrategias para explotar las tendencias de SaaS y Cloud ComputingEstrategias para explotar las tendencias de SaaS y Cloud Computing
Estrategias para explotar las tendencias de SaaS y Cloud Computing
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Productivity in the Software World
Productivity in the Software WorldProductivity in the Software World
Productivity in the Software World
 
VMworld 2013: View Planner 3.0 as a VDI Benchmark
VMworld 2013: View Planner 3.0 as a VDI Benchmark VMworld 2013: View Planner 3.0 as a VDI Benchmark
VMworld 2013: View Planner 3.0 as a VDI Benchmark
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 
Implementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field OperationsImplementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field Operations
 
FlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexNet Delivery Datasheet
FlexNet Delivery Datasheet
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...
 
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTUNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
WSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosWSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to Stratos
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
21 Secrets of Self-Service IT Request Fulfillment
21 Secrets of Self-Service IT Request Fulfillment21 Secrets of Self-Service IT Request Fulfillment
21 Secrets of Self-Service IT Request Fulfillment
 
DataFort_Opt_V7
DataFort_Opt_V7DataFort_Opt_V7
DataFort_Opt_V7
 

Viewers also liked

The john butler trio.pptx2
The john butler trio.pptx2The john butler trio.pptx2
The john butler trio.pptx2Sony-echelon
 
Cuadro comparativo angel cardenas-alexandermendez
Cuadro comparativo angel cardenas-alexandermendezCuadro comparativo angel cardenas-alexandermendez
Cuadro comparativo angel cardenas-alexandermendezAngel Cardenas
 
Renders 2013 ing. arq. david lópez
Renders 2013 ing. arq. david lópezRenders 2013 ing. arq. david lópez
Renders 2013 ing. arq. david lópezDavid López
 
Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...
Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...
Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...Михаил Бычков
 
메가888카지노 실제카지노
메가888카지노 실제카지노메가888카지노 실제카지노
메가888카지노 실제카지노rimochegep
 
Fish fillets with Greek crocus in bread buns
Fish fillets with Greek crocus in bread bunsFish fillets with Greek crocus in bread buns
Fish fillets with Greek crocus in bread bunschristinakas
 
Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...
Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...
Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...Netgear Italia
 
SCREEN INTERNATIONAL Women on top
SCREEN INTERNATIONAL Women on topSCREEN INTERNATIONAL Women on top
SCREEN INTERNATIONAL Women on topDeepti Datt
 
After Market Parts Explained
After Market Parts ExplainedAfter Market Parts Explained
After Market Parts Explainedhellishindividu09
 
Fs12 manuel-blazquez-ochando
Fs12 manuel-blazquez-ochandoFs12 manuel-blazquez-ochando
Fs12 manuel-blazquez-ochandoFESABID
 
On income and utilty Transfer Principles when households differ in needs
On income and utilty Transfer Principles when households differ in needsOn income and utilty Transfer Principles when households differ in needs
On income and utilty Transfer Principles when households differ in needsMarc Dubois
 
12.106.115.budi.sunanda
12.106.115.budi.sunanda12.106.115.budi.sunanda
12.106.115.budi.sunandacalderaboys
 
СКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015Г
СКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015ГСКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015Г
СКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015ГМихаил Бычков
 
Hospital acquired infections new
Hospital acquired infections newHospital acquired infections new
Hospital acquired infections newPranjal Agarwal
 
11 Classificação dos Sistemas de Produção - Parte 1
11 Classificação dos Sistemas de Produção - Parte 111 Classificação dos Sistemas de Produção - Parte 1
11 Classificação dos Sistemas de Produção - Parte 1Philippe Elias
 
Magnestic abrasive finishing process
Magnestic abrasive finishing processMagnestic abrasive finishing process
Magnestic abrasive finishing processrahul lokhande
 

Viewers also liked (19)

The john butler trio.pptx2
The john butler trio.pptx2The john butler trio.pptx2
The john butler trio.pptx2
 
Cuadro comparativo angel cardenas-alexandermendez
Cuadro comparativo angel cardenas-alexandermendezCuadro comparativo angel cardenas-alexandermendez
Cuadro comparativo angel cardenas-alexandermendez
 
TIK BAB 5 KELAS 9
TIK BAB 5 KELAS 9TIK BAB 5 KELAS 9
TIK BAB 5 KELAS 9
 
Renders 2013 ing. arq. david lópez
Renders 2013 ing. arq. david lópezRenders 2013 ing. arq. david lópez
Renders 2013 ing. arq. david lópez
 
Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...
Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...
Скидки и акции на непродовольственные товары в магазинах Metro с 3 по 16 сент...
 
메가888카지노 실제카지노
메가888카지노 실제카지노메가888카지노 실제카지노
메가888카지노 실제카지노
 
Fish fillets with Greek crocus in bread buns
Fish fillets with Greek crocus in bread bunsFish fillets with Greek crocus in bread buns
Fish fillets with Greek crocus in bread buns
 
Flower Design Portfolio
Flower Design PortfolioFlower Design Portfolio
Flower Design Portfolio
 
Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...
Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...
Webinar NETGEAR - Connettività 10Gigabit in rame ed introduzione del nuovo Sw...
 
SCREEN INTERNATIONAL Women on top
SCREEN INTERNATIONAL Women on topSCREEN INTERNATIONAL Women on top
SCREEN INTERNATIONAL Women on top
 
After Market Parts Explained
After Market Parts ExplainedAfter Market Parts Explained
After Market Parts Explained
 
Fs12 manuel-blazquez-ochando
Fs12 manuel-blazquez-ochandoFs12 manuel-blazquez-ochando
Fs12 manuel-blazquez-ochando
 
On income and utilty Transfer Principles when households differ in needs
On income and utilty Transfer Principles when households differ in needsOn income and utilty Transfer Principles when households differ in needs
On income and utilty Transfer Principles when households differ in needs
 
12.106.115.budi.sunanda
12.106.115.budi.sunanda12.106.115.budi.sunanda
12.106.115.budi.sunanda
 
Laporan populasi
Laporan populasiLaporan populasi
Laporan populasi
 
СКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015Г
СКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015ГСКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015Г
СКИДКИ И АКЦИИ В ГИПЕРМАРКЕТАХ ЛЕНТА С 05 ПО 18 НОЯБРЯ 2015Г
 
Hospital acquired infections new
Hospital acquired infections newHospital acquired infections new
Hospital acquired infections new
 
11 Classificação dos Sistemas de Produção - Parte 1
11 Classificação dos Sistemas de Produção - Parte 111 Classificação dos Sistemas de Produção - Parte 1
11 Classificação dos Sistemas de Produção - Parte 1
 
Magnestic abrasive finishing process
Magnestic abrasive finishing processMagnestic abrasive finishing process
Magnestic abrasive finishing process
 

Similar to Software as a service

Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
What are cloud service models
What are cloud service modelsWhat are cloud service models
What are cloud service modelsLivin Jose
 
Soa 22 software as a service and soa
Soa 22 software as a service and soaSoa 22 software as a service and soa
Soa 22 software as a service and soaVaibhav Khanna
 
1.Service Models of Cloud Computing .pptx
1.Service Models of Cloud Computing .pptx1.Service Models of Cloud Computing .pptx
1.Service Models of Cloud Computing .pptxGSCWU
 
Lecture 10.ppt
Lecture 10.pptLecture 10.ppt
Lecture 10.pptYesuRaju8
 
Difference between Iaas Saas Paas.pptx
Difference between Iaas Saas Paas.pptxDifference between Iaas Saas Paas.pptx
Difference between Iaas Saas Paas.pptxHarshAgrawal211
 
Microsoft cloud continuum
Microsoft cloud continuumMicrosoft cloud continuum
Microsoft cloud continuumMathews Job
 
Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%AppViewX
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
CloudComputing
CloudComputingCloudComputing
CloudComputingAdi Challa
 
Salesforce.com
Salesforce.comSalesforce.com
Salesforce.comRohit Bedi
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 
How to move to the cloud
How to move to the cloudHow to move to the cloud
How to move to the cloudInterxion
 

Similar to Software as a service (20)

Building SaaS products with Windows Azure
Building SaaS products with Windows Azure Building SaaS products with Windows Azure
Building SaaS products with Windows Azure
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
What are cloud service models
What are cloud service modelsWhat are cloud service models
What are cloud service models
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Software-as-a-Service
Software-as-a-ServiceSoftware-as-a-Service
Software-as-a-Service
 
Soa 22 software as a service and soa
Soa 22 software as a service and soaSoa 22 software as a service and soa
Soa 22 software as a service and soa
 
Architecting SaaS
Architecting SaaSArchitecting SaaS
Architecting SaaS
 
1.Service Models of Cloud Computing .pptx
1.Service Models of Cloud Computing .pptx1.Service Models of Cloud Computing .pptx
1.Service Models of Cloud Computing .pptx
 
Lecture 10.ppt
Lecture 10.pptLecture 10.ppt
Lecture 10.ppt
 
Difference between Iaas Saas Paas.pptx
Difference between Iaas Saas Paas.pptxDifference between Iaas Saas Paas.pptx
Difference between Iaas Saas Paas.pptx
 
Microsoft cloud continuum
Microsoft cloud continuumMicrosoft cloud continuum
Microsoft cloud continuum
 
Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
CloudComputing
CloudComputingCloudComputing
CloudComputing
 
SaaS.pptx
SaaS.pptxSaaS.pptx
SaaS.pptx
 
Salesforce.com
Salesforce.comSalesforce.com
Salesforce.com
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
How to move to the cloud
How to move to the cloudHow to move to the cloud
How to move to the cloud
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Software as a service

  • 1. Software as a Service A windows Azure approach towards building SAAS Solutions
  • 2. Introduction • Software as a service (SaaS, pronounced sæs or sɑs), sometimes referred to as "on-demand software", is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. • SAAS is fundamentally a business model where the application is owned, operated and managed by the vendor. The consumer pays for the usage and consumes the application. • SAAS offers a “hands-off” model for consumers which frees the consumer from pain of server/application management and instead allows the consumer to focus on business. 2
  • 3. SAAS Intranet Solutions Desktop Applications Mainfra mes SAAS and Windows Azure SAAS AND THE ISV 3
  • 4. SAAS and ISV Operational Structure SAAS Technology Business Architecture Model 4
  • 5. ISV Realignments • Operational Structure • Operational structure of the organization needs to be realigned to support an internet based solution both in terms of rapid development and also in terms of support offerings • Business Model • SAAS enabling the solution offering requires may require a change in terms of pricing models from traditional boxed offerings • Application Architecture • By bringing in multi tenancy, economies of scale can be achieved by 5 better utilization of infrastructure and the savings can be passed on to consumers
  • 6. SAAS Advantages • SAAS offerings are increasingly being considered within enterprises due to the following advantages • Pricing – Most of the SAAS offerings are Multi Tenant enabling vendors to reduce prices due to economies of scale • Accelerated Feature Delivery – SAAS offerings are delivered from Internet allowing vendors to update and offer new features regularly • Open Protocols – Increased competition and multi tenant nature of software forces vendors offer standard API’s for data access over open protocols • Customization and Configuration – To reduce onboarding effort of customers, SAAS offerings typically offer self service customization 6 and configuration options to end users
  • 7. SAAS PAAS IAAS SAAS and ISV ARCHITECTURE CONSIDERATIONS 7
  • 8. Multi Tenancy • Multi Tenancy is considered an essential part of SAAS systems. By adding an abstraction layer over the product, it enables ISV to optimally utilize the hardware and achieve economies of scale • Compared to on-premise installation, bringing multi tenancy introduces additional complexity in terms of customization and data privacy • Customization is a tricky topic as analysts have made both pro and anti customization calls • Customization branches the code making code management problems • Without customization, customers may move not decide to buy the service as every business is unique • Ideal SAAS product should have “Single Code base used by multiple 8 customers”.
  • 9. Theming • Theming is an essential strategy within the application architecture to ensure that the customer feels that the solution aligns with the rest of the internal applications • Theming may include one or more of the following elements • Customer Logo • Application colors and themes • Application Layout • Dashboards • To ensure that the product branding is intact, the product logo can be part of the footer with a link to the product portal • It may not be necessary to offer a user level color theme as part 9 of customization
  • 10. Metering • Metering is the process of monitoring usage and tracking application use • Recommendation is to log all requests and all access requests • Metering should also log business metrics • Number of invoices generated • Number of courses played • Helps in multiple billing methodology for different flavors of customers • Metering also helps in capacity planning and knowing system health 10 • Consolidated metering information related to tenant can be made available pro-actively to customer administrators
  • 11. Billing • Pricing models for SAAS applications vary based on type of application, usage, customer profile, etc… • Unlike the boxed product, a SAAS product can have innovative pricing models • User based • Usage based • Fixed monthly cost • Fixed yearly cost • Freemium • Multi year contracts • Billing models can be tested out early during trials to identify usage and can be finalized later 11 • Amortization of total cost can be over multiple customers – multiple billing cycles
  • 12. Identity and Access Management • Security is paramount in a SAAS system • Enterprises are used to having their own infrastructure to access products through intranet • SAAS needs to offer a comprehensive system to manage users, roles and access permissions for different features of the application. • In addition, as part of the infrastructure, it is imperative to enable intrusion prevention, DDOS prevention and Firewall management. 12 • Extending identity from customer infrastructure reduces identity management pains for the customer
  • 13. Data and Application Integration • Integration is a core need to every enterprise to ensure that data from one application is available for consumption by other • Integration needs vary based on different types and usage of SAAS application • Data integration and connectivity capabilities are important to reduce support calls and help customer teams to work without hindrance • Multiple choices can be offered by SAAS ISV to enable integration • CSV download of core data through graphical interface • REST/ODATA based API for full access to database 13 • Read only access to database through firewall whitelisting of client IP
  • 14. SLA Monitoring • With Product hosted on Internet and managed by the ISV, it is essential to guarantee SLA for customers to have confidence in the solution • SLA guarantee can be promised for the following aspects • Availability • Performance • Security • A service guarantee to customer also helps in to build the necessary monitoring layer into the application that governs all the aspects of the application 14
  • 15. Automated Provisioning • Onboard customers automatically with the shortest time and customer support effort • Automated provisioning also helps with offering trial plans for prospects • Self service customization makes it easier for customers to modify the service offering to fit their company needs • Self managed tenant accounts liberates the support team from routine activities and reduces support calls • Provisioning on multi tenant SAAS systems require no changes to infrastructure and only adds records to Tenant Information 15 Database
  • 16. Customization • Customization can be offered at multiple levels depending on the need of the industry • Table Structure • Allow additional fields to have tenant specific information • Fixed number of columns in each table for customization • Fully extensible EAV tables for complex and unlimited extensibility • Workflow • Control process flow and customize flow authorization • Drag and Drop managed workflow for self service • Factory pattern based coded workflow by ISV support team for complex scenarios 16
  • 17. Governance • SAAS application being owned, hosted and managed by ISV, the onus of governance and compliance needs if any falls on the ISV • Compliance rules may require verification of the following aspects • Infrastructure • Physical Security, Firewall, etc… • Data Security • Encryption in Transit and at rest • Certifications • Industry specific validations • Governance concerns are high in enterprises and compliance/certifications can allay the fears of IT decision 17 authorities
  • 18. Hybrid SAAS Architecture • Not all customers look at cost as a factor when it comes to buying SAAS solutions • Customers are worried about data security and privacy in multi tenant solutions. Due to governance rules within the customer legal department, customers may not prefer SAAS solutions • To ensure that the product caters to all customers, developing a hybrid solution covers all types of customers • Multi tenant SAAS solution for SMB’s • Independent hosting for other customers • Boxed product of same codebase for intranet customers • Architecture needs to have a Factory based implementation of 18 critical components to support both on-premise and cloud based services
  • 19. Disaster Recovery • Disaster recovery policy for SAAS applications are necessary since the infrastructure management is handled by the ISV • DR Strategies can vary based on time to recovery, point of recovery objectives • Cloud based infrastructure enables quick recovery • For Hot DR, it is essential to have an effective DNS services that quickly updates the DNS records DR Type Cost Time to recover Cold Low High 19 Warm Medium Medium Hot High Low
  • 20. Software + Service: An Enterprise Perspective 20 Courtesy: Microsoft Architecture Strategy Team
  • 21. SAAS and Windows Azure DESIGN CONSIDERATIONS 21
  • 22. SAAS - Application Access • Application access via Internet can be customized to allow the customer to personalize the product • URL is the singular way to identify a tenant in a multi tenant setup without exposing the list of tenants to others • Subdomains • http://customer.product-brand.com • Supports both the customer and product branding • CNAME redirection to the Azure hosted service URL using DNS dashboard • ISV managed DNS mappings • Customer URL • http://productname.customer.com • Product branding in URL is lost even though the application may have product logo displayed in the UI • Customer managed DNS mappings 22 • For both methods, map the tenant URL to Windows Azure application URL using DNS CNAME records
  • 23. Multi Tenancy – Data Privacy • Multi Tenancy adds the complexity of data privacy to the architecture. • Data Privacy has to be enforced at 2 levels – Data and File Storage • For File storage, use multiple storage accounts on Windows Azure Blob Storage • At Database level, there’re 3 different ways to do multi-tenancy • Single Schema for all customers – Using TenantID column on all tables, low cost, high risk • Multiple Schema – Allow different tenants to have different schemas and at application level have multiple SQL user based access – Low cost, high complexiety • Multiple Database – Independent database for each customer, high cost, no risk 23 • SQL Azure Federations – Shard database using TenantID, low cost, optimized
  • 24. High Availability • Application Availability can be improved by consuming inherent fault tolerant code blocks/services • Windows Azure compute is by default fault tolerant and starts up automatically in case of failures • Application SLA targets can be achieved by enabling the application to run in high availability mode • Windows Azure by default guarantees 99.5% uptime guarantee if an application is run on a minimum of 2 nodes • SQL Azure guarantees an uptime of 99.5% for their services • By building stateless web/app tier and by adding retry logic within data 24 access calls, SLA guarantee for SAAS applications can be made to customer
  • 25. Identity Management • For enterprises, integration with their internal IT security for identity management is important • Microsoft Active Directory • LDAP • Federated identity is the easiest way for integration with enterprise security for SAAS applications • Microsoft Active Directory Federation Services • Windows Azure Active Directory • SAAS systems need to cater for both SMB and Enterprises. It is essential to build an integrated identity management solution within the product to cater to SMB needs. 25 • SQL Authentication
  • 26. Session • For high availability, Stateless web/app tiers are necessary • Web tier usually maintains session state in memory for active users • To enable Stateless web server design, state information can be moved to any of the following Windows Azure Services • SQL Azure • Windows Azure Table Storage • Windows AppFabric Caching • Moving session state out of memory increases session access latency but the impact is usually minimal 26
  • 27. Caching • Application performance and throughput can be improve manifold by incorporating a caching strategy within the product • Caching can be employed in multiple layers with minimal or no cost • Data • HTML Server Pages • Proxy Server • Browser • For Data and Server Caching needs, employ cloud based caching services for high availability and scalability • Windows Azure Appfabric Cache • Memcache • For proxy/browser caching, set the appropriate HTTP headers to ensure that data is cached in transit 27 • Employ strategies to invalidate stale data in both scenarios
  • 28. Scalability • Windows Azure is an elastic environment which allows machines to be added/removed to the cluster at ease • By adding auto scaling block to the web/app tier, an application can dynamically add/remove servers to the tier without lowering performance and with minimal cost considerations • Scaling rules can be applied on web/app tier as • Add new instance to the group if average CPU utilization is over 75% for last 60 seconds • Add new instance to the group if the number of pending items in Queue is over 250 for last 180 seconds • Remove an instance from the web/app tier if the average memory utilization is less than 20% for last 120 seconds • Scaling works without issues in the following scenarios • Stateless services 28 • Lock based object lookup / processing
  • 29. Performance • Split the application into multiple types • Static Data • Dynamic Data • Use Windows Azure Blob Storage for delivering static data • Javascript • Images • CSS • By splitting the load between multiple domains, the browser optimally downloads the content increasing throughput of web servers • Effective caching strategy reduces the amount of download making web applications load quickly • Configuring multiple buckets and having multiple URL’s configured improves overall content delivery to User browser • CDN enabling the blob storage can reduce the network latency and deliver files from a closer data center location 29 • Compress web content using GZIP/Deflate methods to reduce the content size
  • 30. Encryption • Encryption is a core part of security compliance for certificates like PCI • Encryption has to be done for data in both forms • In Transit • In Rest • Connectivity between Browser and Web Server can be encrypted using SSL/TLS services • Web roles can be secured using Server certificates • Blob storage allows both http/https access using MS certificate • Enable Secure connection for database calls 30
  • 31. Logging • Plugging Logging module into applications are easier due to existence of multiple frameworks • Log4Net • Microsoft Enterprise Library Logging block • Securely transfer all logs to Windows Azure Table storage and Windows Azure blobs • IIS Logs • Application Logs • Performance Metrics • Errors and Exception logs • Crash dumps • Data is paramount to analyze and monitor SLA. The data is also 31 essential to scale out applications during heavy loads
  • 32. SAAS – Multi Tenant Design 32
  • 33. Contact Us @ AZURE@8KMILES.COM OR 33 CLOUD@8KMILES.COM