Cloud Computing models : Cloud Computing models Cloud Computing consists of all types of outsourced IT services: Application, Platform, Infrastructure, Security... as a Service: XaaS Two typical deployments: SaaS: applications may be outsourced to different providers in the Cloud, using their own technology IaaS/PaaS: applications are housed by an Infrastructure/ Data Center provider and are downloaded as Virtual Machines
Cloud Computing impacts on IT : Cloud Computing impacts on IT The IT becomes a separate entity from the firm: The technology in the Enterprise cloud, may run in another time zone, country... Cloud computing may reduce the IT branch to the architecture, strategy and planning functions Technology buy, upgrades, licensing and management are not a firm’s concern any longer Replaced by contracts and utility like charging, the bitter relation between business and IT vanishes
Cloud Computing characteristics : Cloud Computing characteristics Web interface for self provisioning and reporting Charging mechanisms for actual consumption Multi-tenant data centers with frequently used platforms (PaaS) Technology is typically virtualized Blades technology could be used for scalability, low cost, reduced space & reduced power consumption Comes with development and deployment tools
The Virtual Enterprise & Business Utilities : The Virtual Enterprise & Business Utilities The Virtual Enterprise business concept, known also as the Networked Enterprise, consists of distributed business functions and utilities, outsourced to partners that work together with the firm to deliver the product to end customers “Business Process Utilities are an emerging form of business process outsourcing. BPU is useful when a more standardized solution is sought that can be paid for on a transactional basis”, Gartner http://www.gartner.com/DisplayDocument?id=527120
The evolution to the Cloud Enterprise : The evolution to the Cloud Enterprise The Monolithic Enterprise The Virtual Enterprise Company 8 Company 9 The Cloud Enterprise
The Cloud Enterprise and EA : The Cloud Enterprise and EA The Business Architecture layer rests on top of the computing cloud consisting of the IT Application and Technology layers The Cloud Enterprise Architecture (EA) consists mostly of Business Architecture, rather than technology detail The Data Center, its virtualization become the concern of the cloud services providers
The EA layers and current outsourcing types : The EA layers and current outsourcing types BPUtility outsourcing Managed Services (Apps,Infra) Outsourcing type Data Centre outsourcing Application outsourcing (SaaS) Call Centre (people) outsourcing The Enterprise
The increasing EA layers virtualization : The increasing EA layers virtualization But virtualization increasingly occurs at interfaces between the EA layers (business, applications...) progressively abstracting and decoupling them, enabling as such business and IT outsourcing The UI become
Cloud computing services enable you to plan, build, migrate, and manage a cloud journey that prompts increased agility and value to your business. For more information visit https://www.onefederalsolution.com/
Cloud computing consists of hardware and software resources made available on the internet as managed third-party services.These services provide access to advanced software applications and high-end networks of server computers.
Know more about Grazitti Salesforce services, visit http://goo.gl/5jJYJ
Public vs private vs hybrid cloud what is best for your business-Everdata Technologies
What are the benefits and disadvantages to each solution? Why might a business choose public over private cloud, or hybrid over public or private? Is there a “best” cloud solution?
Here in this presentation, we’ll take a look at these questions in an attempt to help organizations that are still in the process of choosing the best solution for their business.
Recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise IT solutions.
Many parties claim that “cloud computing” can help enterprises meet the increased requirements of lower TCO, higher ROI, increased efficiency, dynamic provisioning and utility-like services.
However, many IT professionals are citing the increased risks associated with trusting information assets to the cloud as something that must be clearly understood and managed by relevant stakeholders.
This presentation examines the potential business benefits, risks and assurance considerations.
Cloud Computing models : Cloud Computing models Cloud Computing consists of all types of outsourced IT services: Application, Platform, Infrastructure, Security... as a Service: XaaS Two typical deployments: SaaS: applications may be outsourced to different providers in the Cloud, using their own technology IaaS/PaaS: applications are housed by an Infrastructure/ Data Center provider and are downloaded as Virtual Machines
Cloud Computing impacts on IT : Cloud Computing impacts on IT The IT becomes a separate entity from the firm: The technology in the Enterprise cloud, may run in another time zone, country... Cloud computing may reduce the IT branch to the architecture, strategy and planning functions Technology buy, upgrades, licensing and management are not a firm’s concern any longer Replaced by contracts and utility like charging, the bitter relation between business and IT vanishes
Cloud Computing characteristics : Cloud Computing characteristics Web interface for self provisioning and reporting Charging mechanisms for actual consumption Multi-tenant data centers with frequently used platforms (PaaS) Technology is typically virtualized Blades technology could be used for scalability, low cost, reduced space & reduced power consumption Comes with development and deployment tools
The Virtual Enterprise & Business Utilities : The Virtual Enterprise & Business Utilities The Virtual Enterprise business concept, known also as the Networked Enterprise, consists of distributed business functions and utilities, outsourced to partners that work together with the firm to deliver the product to end customers “Business Process Utilities are an emerging form of business process outsourcing. BPU is useful when a more standardized solution is sought that can be paid for on a transactional basis”, Gartner http://www.gartner.com/DisplayDocument?id=527120
The evolution to the Cloud Enterprise : The evolution to the Cloud Enterprise The Monolithic Enterprise The Virtual Enterprise Company 8 Company 9 The Cloud Enterprise
The Cloud Enterprise and EA : The Cloud Enterprise and EA The Business Architecture layer rests on top of the computing cloud consisting of the IT Application and Technology layers The Cloud Enterprise Architecture (EA) consists mostly of Business Architecture, rather than technology detail The Data Center, its virtualization become the concern of the cloud services providers
The EA layers and current outsourcing types : The EA layers and current outsourcing types BPUtility outsourcing Managed Services (Apps,Infra) Outsourcing type Data Centre outsourcing Application outsourcing (SaaS) Call Centre (people) outsourcing The Enterprise
The increasing EA layers virtualization : The increasing EA layers virtualization But virtualization increasingly occurs at interfaces between the EA layers (business, applications...) progressively abstracting and decoupling them, enabling as such business and IT outsourcing The UI become
Cloud computing services enable you to plan, build, migrate, and manage a cloud journey that prompts increased agility and value to your business. For more information visit https://www.onefederalsolution.com/
Cloud computing consists of hardware and software resources made available on the internet as managed third-party services.These services provide access to advanced software applications and high-end networks of server computers.
Know more about Grazitti Salesforce services, visit http://goo.gl/5jJYJ
Public vs private vs hybrid cloud what is best for your business-Everdata Technologies
What are the benefits and disadvantages to each solution? Why might a business choose public over private cloud, or hybrid over public or private? Is there a “best” cloud solution?
Here in this presentation, we’ll take a look at these questions in an attempt to help organizations that are still in the process of choosing the best solution for their business.
Recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise IT solutions.
Many parties claim that “cloud computing” can help enterprises meet the increased requirements of lower TCO, higher ROI, increased efficiency, dynamic provisioning and utility-like services.
However, many IT professionals are citing the increased risks associated with trusting information assets to the cloud as something that must be clearly understood and managed by relevant stakeholders.
This presentation examines the potential business benefits, risks and assurance considerations.
Cloud Application Development – The Future is nowSPEC INDIA
Cloud computing has been carving a niche for itself in each and every business, be it any domain, any geography. Providing a big relief to the business owners in terms of maintaining infrastructure, costs, efficiency, security and profitability, Cloud Application Development has a strong hold in the present as well as in the future to come. Have a look at certain attributes that makes cloud computing as the technology of today and tomorrow.
Get More at: http://blog.spec-india.com/cloud-application-development-set-rule-today-tomorrow/
The presentation discusses and introduces cloud computing - its history and present challenges.
It also discusses topical cloud-computing related events.
Presented at ISSA CISO Executive forum 2012
Comments/Questions: bill.burns@netflix.com
(3/8: Replaced Keynote for PDF version for compatibility)
An adjunct to Jason Chan's Practical Cloud Security preso: http://www.slideshare.net/jason_chan/practical-cloud-security
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
Deploying SaaS Application on the Cloud - Case StudyNati Shalom
This presentation provides a case study on how to overcome some of the challenges involved in deploying a SaaS application on the cloud using GigaSpaces. In this specific case were referring to a risk analysis application (Primatics) and describe how we've dealt with multi tenancy, high availability, scalability and how we were able to optimize the architecture for reduced cost.
The presentation was given during the cloud connect 2010 conference.
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Stuart Charlton
Stuart Charlton's presentation at the 2008 Sys-Con Cloud Computing Expo in San Jose, CA
Revised for the 2009 Sys-Con Cloud Computing Expo in New York City
Have you heard of cloud computing? Well you should of! Cloud computing is not something that is new, it has been around for a few years now. This presentation helps readers to understand what cloud computing is and how a business should use it.
CloudOpen Japan - Controlling the cost of your first cloudTim Mackey
As presented at CloudOpen Japan in Tokyo in 2015.
Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements.
Cloud Application Development – The Future is nowSPEC INDIA
Cloud computing has been carving a niche for itself in each and every business, be it any domain, any geography. Providing a big relief to the business owners in terms of maintaining infrastructure, costs, efficiency, security and profitability, Cloud Application Development has a strong hold in the present as well as in the future to come. Have a look at certain attributes that makes cloud computing as the technology of today and tomorrow.
Get More at: http://blog.spec-india.com/cloud-application-development-set-rule-today-tomorrow/
The presentation discusses and introduces cloud computing - its history and present challenges.
It also discusses topical cloud-computing related events.
Presented at ISSA CISO Executive forum 2012
Comments/Questions: bill.burns@netflix.com
(3/8: Replaced Keynote for PDF version for compatibility)
An adjunct to Jason Chan's Practical Cloud Security preso: http://www.slideshare.net/jason_chan/practical-cloud-security
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
Deploying SaaS Application on the Cloud - Case StudyNati Shalom
This presentation provides a case study on how to overcome some of the challenges involved in deploying a SaaS application on the cloud using GigaSpaces. In this specific case were referring to a risk analysis application (Primatics) and describe how we've dealt with multi tenancy, high availability, scalability and how we were able to optimize the architecture for reduced cost.
The presentation was given during the cloud connect 2010 conference.
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Stuart Charlton
Stuart Charlton's presentation at the 2008 Sys-Con Cloud Computing Expo in San Jose, CA
Revised for the 2009 Sys-Con Cloud Computing Expo in New York City
Have you heard of cloud computing? Well you should of! Cloud computing is not something that is new, it has been around for a few years now. This presentation helps readers to understand what cloud computing is and how a business should use it.
CloudOpen Japan - Controlling the cost of your first cloudTim Mackey
As presented at CloudOpen Japan in Tokyo in 2015.
Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements.
Enterprise Blockchains – A Pragmatic & Realistic Guide for CIOs/CDOSIceventure
Enterprise Blockchains – A Pragmatic & Realistic Guide for CIOs/CDOS – an Iceventure briefing
Background for the Enterprise Blockchain briefing
The blockchain promises to alter the way business transactions, data storage, industry value chains and associated revenue models. And unlike other innovation first deployed by start-ups many Enterprises as well as SMEs investigate the various use cases.
For example, Banking & Financial Services is the leading sector in enterprise blockchain adoption with a high number of PoCs. Adoption of use cases around payments, trade finance, and wallets are advancing rapidly.
Challenges for Enterprises/SMEs adopting an Enterprise Blockchain
But the novelty of the Enterprise Blockchain technology brings also about a lot of questions asked by market participants and our customers alike. Some examples are:
How to evaluate the advantages/disadvantages
What are the value drivers
Fitting it into the existing IT landscape
Where is the market and what are my risks
In a webinar, we therefore discuss the challenges of a successful Enterprise Blockchain use-case to separate the hype from reality. We also introduce a framework for evaluation
Watch the slides for:
A picture of the possibilities and challenges of the Blockchain
The Blockchain technology in the Enterprise context
A different use case valuation approach
An overview of the current market with focus on Germany
All Iceventure studies: https://www.iceventure.de/studien.html
Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services),
Introduction to Microsoft Azure. Covers the change to a cloud development paradigm. Motivations for the change, Pricing structures, and an exercise in IT portfolio evaluation.
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
Despite the rapid evolution and growth of public cloud usage, enterprises are finding value in on-premises IT infrastructure. As a result, some organizations are moving their workloads back, partially or entirely, to their own data centers. In fact, according to a survey conducted by IDC, over ½ of the IT spent on servers and storage is still driven by on-prem deployments, and over 70% of those surveyed said they plan to repatriate workloads back from public cloud to an On-Prem Infrastructure.
estrat and Amazon Web Services (AWS) breakfast in Perth with presenters from MINEMAN, Present Group, AWS and estrat. An informative session on cloud adoption as the new normal in IT strategy.
Slides of the workshop conducted in Model Engineering College, Ernakulam, and Sree Narayana Gurukulam College, Kadayiruppu Kerala, India in December 2010
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
Network devices play a crucial role; they are not just in the Data Center. It's the Wifi, VOIP, WAN and recently underlays and overlays. Network teams are essential for operations. It's about time we highlight to the configuration management community the importance of Network teams and include them in our discussions. This talk describes the personal experience of systems engineer on how to kickstart a network team into automation. Most importantly, how and where to start, challenges faced, and progress made. The network team in question uses multi-vendor network devices in a large traditional enterprise.
NetDevOps, we do not hear that term as frequent as we should. Every time we hear about automation, or configuration management, it is usually the application, if not, it is the systems that host the applications. How about the network systems and devices that interconnect and protects our services? This talk aims to describe the journey a systems engineer had as part of an automation assignment with the network management team. Building from lessons learned and challenges faced with system automation, how one can kickstart an automation project and gain small wins quickly. Where and how to start the journey? What to avoid? What to prioritise? How to overcome the lack of network skills for the automation engineer and lack of automation and Linux/Unix skills for network engineers. What challenges were faced and how to overcome them? What fights to give up? Where do I see network automation and configuration management as a systems engineer? What are the status quo and future expectations?
Taming the cost of your first cloud - CCCEU 2014Tim Mackey
Today everyone is talking about clouds, and a few are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts IT makes when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and pre-existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm.
Key topics covered include:
- Successful transition of operational and management paradigm
- How the VM density of clouds change Ops
- What it means to monitor the network in a cloud environment, at hyper-dense virtualization levels
- Preventing storage costs from outpacing delivery costs
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
4. Qualities of an Enterprise Cloud
• On-Demand, Services-Oriented Computing
• Drastically reduced lead times
• Demand trends are predicted by the provider
• Variable cost consumption
• Pay-per-use or over time; decouple fixed overhead from demand
• Self-service
• Resources directly/indirectly reserved with a GUI or API
• Elastic Scalability
• Grow or shrink resources as required
• Mandatory Network
• The network is essential to consume the service
• Governance and Compliance
• Tracking and matching of cloud providers to policies
5. When Cloud Computing may be a fit
• When the processes, applications, and data are largely
independent.
• When the points of integration are well defined.
• When a lower level of security will work just fine.
• When the core internal enterprise architecture is healthy.
• When the Web is the desired platform.
• When cost is an issue … when isn’t it though!
• When the applications are new.
6. What do we mean by... architecture?
Architecture
• The fundamental organisation of a system, embodied in
its components, their relationships to each other, and the
environment, and the principles governing its design and
evolution.
(ISO 42010 / IEEE 1471-2000 definition)
Enterprise Architecture
• Enterprise Architecture is the organising logic for
businesses and their IT infrastructure reflecting the
integration and standardisation requirements of the firm’s
operating model.
Peter Weill, MIT
7. Architecture as Strategy
Strategy Idea 1 Idea 2 Idea 3
Defines Limits Constrains Set Policy
Learning
Enterprise
Operating Model
Architecture
Provides Capabilities Requires
Execution Systems Processes Infrastructure
Adapted from: Enterprise Architecture as Strategy: Creating a Foundation for Business Execution, J. Ross, P. Weill, and D. Robertson, Harvard Business School Press, 2006.
8. Is the Business Case for Cloud open
and shut?
“Cloud computing, far from saving IT organizations money,
actually costs more than providing the same services in-house.”
http://www.cio.com/article/480595/The_Case_Against_Cloud_Computing_Part_Four
9. Is the Business Case for Cloud open
and shut?
Data Center Economics Cloud Economics (Amazon EC2)
Windows Large instance
•15 GB memory 8 EC2 Compute Units (4 virtual
cores with 2 EC2 Compute Units each)
Outsource Cost: • 1,690 GB instance storage, 64-bit platform
±$10,000/annum (4 by 420 GB plus 10 GB root partition)
• Windows Server 2003, Microsoft Authentication
Services, and SQL Server
Costs $3.20/hr or $2,304/month or $27,000/annum
Windows small instance
• 1.7 GB of memory, 1 EC2 Compute Unit
(1 virtual core with 1 EC2 Compute Unit)
• 160 GB of instance storage, 32-bit platform
Costs $.125/hr, $90/month for Windows.
http://www.cio.com/article/480595/The_Case_Against_Cloud_Computing_Part_Four
13. 15 Ways to Tell Its Not Cloud Computing
• If you peel back the label and its says “Grid” or “OGSA” underneath… it is not a cloud.
• If you need to send a 40 page requirements document to the vendor … it is not cloud.
• If you can’t buy it on your personal credit card… it is not a cloud
• If they are trying to sell you hardware… it is not a cloud.
• If there is no API… it is not a cloud.
• If you need to re-architect your systems for it… It is not a cloud.
• If it takes more than ten minutes to provision… it is not a cloud.
• If you can’t de-provision in less than ten minutes… it is not a cloud.
• If you know where the machines are… it is not a cloud.
• If there is a consultant in the room… it is not a cloud.
• If you need to specify the number of machines you want upfront… it is not a cloud.
• If it only runs one operating system… it is not a cloud.
• If you can’t connect to it from your own machine… it is not a cloud.
• If you need to install software to use it… it is not a cloud.
• If you own all the hardware… it is not a cloud.
• If it takes 20 slides to explain…. It is not a cloud
Courtesy James Governor’s Monkchips Blog: http://www.redmonk.com/jgovernor/
14. 15 Ways to Tell Its Not Cloud Computing
• If you peel back the label and its says “Grid” or “OGSA” underneath… it is not a cloud.
• If you need to send a 40 page requirements document to the vendor … it is not cloud.
• If you can’t buy it on your personal credit card… it is not a cloud
• If they are trying to sell you hardware… it is not a cloud.
• If there is no API… it is not a cloud.
• If you need to re-architect your systems for it… It is not a cloud.
• If it takes more than ten minutes to provision… it is not a cloud.
• If you can’t de-provision in less than ten minutes… it is not a cloud.
• If you know where the machines are… it is not a cloud.
• If there is a consultant in the room… it is not a cloud.
• If you need to specify the number of machines you want upfront… it is not a cloud.
• If it only runs one operating system… it is not a cloud.
• If you can’t connect to it from your own machine… it is not a cloud.
• If you need to install software to use it… it is not a cloud.
• If you own all the hardware… it is not a cloud.
• If it takes 20 slides to explain…. It is not a cloud
Courtesy James Governor’s Monkchips Blog: http://www.redmonk.com/jgovernor/
15. Open Space Workshop
The Laws of Open Space
• Respect for others
• Whoever comes is the right people
• Whatever happens is the only thing that could have
• Whenever it starts is the right time
• When it's over it's over
• The law of two feet
16. Impact of the Cloud on EA
Agenda
• What is Cloud Computing?
• Why should Enterprise Architecture care?
Open Space Workshop:
• Is the business case for Cloud Computing open & shut?
• Is Cloud Computing not merely an opportunity for vendors
to rebrand “old” technologies?
• 2005 Revisited!!
• Does IT Matter? And, if it does, for how long?