This document provides an overview and introduction to cloud services presented by Johan Holder and Mark Thomas of Databarracks. It discusses various cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Backup as a Service, Hosted Exchange, and Disaster Recovery as a Service. It also covers considerations for moving to the cloud, examples of Databarracks' cloud services offerings, and benefits of cloud computing such as reducing capital expenditures and focusing resources.
Hybrid clouds are quickly forming on the horizon, and they are transforming the way that organizations do business. Join David Butler, SVP of Marketing at Eucalyptus, Judith Hurwitz, President and CEO, and Marcia Kaufman, COO and partner, of Hurwitz & Associates and co-authors of “Hybrid Cloud For Dummies” to learn what this new cloud deployment model is all about.
KVH Customer Case Study - Aplix CorporatinKVH Co. Ltd.
Since the founding of Aplix Corporation, a competitive edge in software development technology has been the core of their business. Pursuing business innovation based on high technological capabilities, software development, server expansion, capacity expansion resulted in increased stress on their developers.
In addition, during office relocation due to business expansion, it was essential to have flexibility and short lead time for network construction in order to reduce the down time of critical systems. KVH was selected as a valued network service provider with dedicated pre-sales engineers and specially assigned field engineers consistently offering extensive support from the start of the project, through network design, construction, and all the way through project delivery. KVH offered a dedicated leased line connection to AWS through which it was possible to shorten the down time of critical internal systems.
Hybrid clouds are quickly forming on the horizon, and they are transforming the way that organizations do business. Join David Butler, SVP of Marketing at Eucalyptus, Judith Hurwitz, President and CEO, and Marcia Kaufman, COO and partner, of Hurwitz & Associates and co-authors of “Hybrid Cloud For Dummies” to learn what this new cloud deployment model is all about.
KVH Customer Case Study - Aplix CorporatinKVH Co. Ltd.
Since the founding of Aplix Corporation, a competitive edge in software development technology has been the core of their business. Pursuing business innovation based on high technological capabilities, software development, server expansion, capacity expansion resulted in increased stress on their developers.
In addition, during office relocation due to business expansion, it was essential to have flexibility and short lead time for network construction in order to reduce the down time of critical systems. KVH was selected as a valued network service provider with dedicated pre-sales engineers and specially assigned field engineers consistently offering extensive support from the start of the project, through network design, construction, and all the way through project delivery. KVH offered a dedicated leased line connection to AWS through which it was possible to shorten the down time of critical internal systems.
Making of a Successful Cloud Business:
Current Status & Future Requirements
Rajarshi Bhose and Sumit Kumar Bose
Infosys Technologies Limited
Delivered as part of Cloud symposium, at ACM Bangalore COmpute 2009.
Making of a Successful Cloud Business:
Current Status & Future Requirements
Rajarshi Bhose and Sumit Kumar Bose
Infosys Technologies Limited
Delivered as part of Cloud symposium, at ACM Bangalore COmpute 2009.
Controlling performance in the cloud: taking charge of your hosting environmentDatabarracks
Q&A with Stuart Oliver from SolidFire, explaining why SSD is heralding the next phase of cloud computing.
Recording at http://www.youtube.com/watch?v=6da08PK1YP8
Considerations for cloud computing in charitiesDatabarracks
Mark Thomas, Solutions Architect at Databarracks, talks to former CIO of Save the Children UK Andrew Brenson about his recent research into cloud computing in the charity sector. They cover the common issues that charities face, and the best practice in overcoming these.
Tabletop testing doesn’t have to be complex or time intensive to be effective. It’s as simple as assembling the Crisis Management Team and walking through example recovery scenarios step-by-step.
In this webinar, we show you how to run an effective tabletop test, specific to the risk profile of your business.
How ransomware works and why it is breaching organisational defences
The best methods for prevention
The incident and crisis management & escalation process
A step-by-step guide to recovery
How to Develop and Deploy Web-Scale Applications on AWSDatabarracks
Johan Holder presents our checklist for deployment of web-scale applications on AWS. We cover the fundamentals you need to apply when moving applications from a legacy hosting provider or building new services from scratch.
• How to architect your AWS environment to take advantage of specific services such as Elastic Load Balancing, CloudFront, Amazon SQS and S3.
• How to build for scalability, resilience and security
• How to manage your costs
We also show you how to avoid the common mistakes we see organisations make when getting started with AWS.
Tamir Solomon, Solution Engineer from Zerto explains:
Why hypervisor level replication is replacing tape and disk recovery
How to use Zerto Virtual Manager and Zerto Virtual Replication Appliances
Protecting enterprise applications and grouping VMs
How to perform non-disruptive testing
Yes, the recovery software is crucial, the failover environment must be stable and your connectivity must be reliable, but these are just components. Without a plan they’re useless.
Having a well-designed and thoroughly tested plan in place will substantially increase your ability to withstand, and recover from, disruption. We'll share with you the methods, exercises, tools and expertise needed to create a plan that works when you need it most.
Presented at MPLS 2010 Oct 24-27 Washington D.C.
Monique Morrow, Cisco Distinguished Consulting Engineer, discussed the role of the network in developing as a base for cloud computing in developing XaaS models across a private backbone vs offering Cloud-based services over the Internet.
The presenter further presented the potential evolution of Cloud Computing in the form of Private, Hybrid and Inter-Cloud.
Service Level Management and Security are also highlighted themes in this presentation.
An overview of the various standards organizations and forums that may be specific to cloud computing and emerging inter-cloud was also provided
Discussion and takeaway - the value of these models to your business.
In this presentation, the Eclipse plugins from Amazon (announced at EclipseCon 2009) will be compared with the tooling for Microsoft Azure (announced at Eclipse Summit Europe 2009). Additionally, the features of the g-Eclipse project will be presented. g-Eclipse 1.0 was released in December 2009 as an Eclipse project for Grid and Cloud computing within the Eclipse community. g-Eclipse is a framework that allows users and developers to access Computing Grids and Cloud Computing resources in a unified way.
Storage Management and High Availability 6.0 LaunchSymantec
Symantec announced version 6.0 of the company’s storage management and high availability products. With this release, Symantec enables IT organizations to build resilient private clouds by transforming their existing infrastructure. Organizations can manage entire business services end-to-end with built in resiliency, even if the business service is run across multiple virtualization technologies, operating systems, and storage platforms. This release spans multiple products in Symantec’s portfolio including its flagship Veritas Storage Foundation 6.0, Veritas Cluster Server 6.0, and Veritas Operations Manager 4.1, all tightly integrated to help IT organizations move confidently to a private cloud architecture.
Never before have businesses and IT directors had more choice about how they consume and deliver IT services. With an established IT services market, rampant virtualization, and now Cloud – what is the best way to delivery IT? And critically, how can it be as efficient as possible? The answer for most business is to create a dynamic equilibrium between different delivery models, using the best of in house, outsourced and cloud delivered IT services in a hybrid approach. Simon Daykin, CTO of Logicalis UK, will present a hybrid delivery model, with a case study of Loughborough University where this has been implemented in practice. In t
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
[IT OnAir]데브멘토 동영상 VMware 김세희 차장
클라우드 상의 어플리케이션의 특징<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
PaaS의 핵심 특징
vFabric
Cloud Application Plafform
How to write a Business Continuity PlanDatabarracks
According to our 2023 Data Health Check, less than half of organisations have an up to date Business Continuity Plan. But creating a plan isn't hard, and we will show you the proven methods to deliver something practical and usable.
Listen to the webinar and learn how to:
- Identify your risks and create mitigation strategies
- Create your Business Impact Analysis
- Find the right people for an effective crisis team
- Accurately identify the scope of continuity projects
- Make testing and exercising more frequent, productive and frictionless
How to write an effective Cyber Incident Response PlanDatabarracks
Set the standard for dealing with cyber incidents at your organisation.
What to include & what to pre-prepare
Managing and maintaining the plan
Identifying a cyber incident
Isolating & safely bringing systems back online
Lessons from 100+ ransomware recoveriesDatabarracks
In this session, Databarracks will share lessons learned recovering from complex cyber attacks. These are real-life lessons, learned the hard way.
Agenda:
• The evolution of ransomware attacks
• 5 specific recovery stories that outline different recovery approaches
• The timeline of an attack
• The key lessons to improve your cyber resilience
How to write an IT Disaster Recovery PlanDatabarracks
The written plan is the most important part of any disaster recovery solution. Yes, the recovery software is crucial, the failover environment must be stable and your connectivity must be reliable, but these are just components. Without a plan they’re useless.
Having a well-designed and thoroughly tested plan in place will substantially increase your ability to withstand, and recover from, disruption. We’re going to share with you the methods, exercises, tools and expertise needed to create a plan that works when you need it most.
• Assessing your risks and creating a Business Impact Analysis
• Setting realistic recovery objectives
• Making incident response plans that work
• How to communicate in a disaster
Who's responsible for what in a crisisDatabarracks
Whose responsibility for what in a disaster scenario can become blurred in a stressful situation.
Responsibility lies with the IT admins up to the IT Director and CEO.
Communicating in a crisis, big or small, is one of the most important tasks a leader will have to deliver and must be pre-prepared.
To make sure you get it right here are 4 key elements to remember.
How to protect backups from ransomwareDatabarracks
If cyber criminals can compromise your backups, they leave you with no alternative but to pay up.
So how can you protect your backups to stop them being encrypted along with your production data?
Insurance companies are setting more stringent requirements to obtain cyber insurance cover.
Databarracks spoke to several to review their application questionnaire.
Here is a summary of what's changed and what you need to get cover.
How to make your supply chain resilientDatabarracks
In Business Continuity, your most difficult challenge is making your supply chain resilient.
A cyber attack on a supplier or a shortage of stock can immediately impact your operations but is much harder to resolve.
We're sharing our Toolkit to let you measure, track and improve your supply chain resilience.
Download the toolkit here: https://www.databarracks.com/resources/supplier-continuity-toolkit
How to recover from ransomware lessons from real recoveriesDatabarracks
It’s hard to overstate the magnitude of a ransomware attack.
Ransomware incidents are incredibly complex. They take days, weeks and sometimes months to resolve. There is a huge additional burden on the IT team to co-ordinate, feed information to relevant parties and restore systems.
We share our experience across multiple ransomware recoveries over the last year.
There are lots of reasons to decommission a data centre.
Perhaps you’re closing down an office? Or saving money by outsourcing your Disaster Recovery? Maybe your hardware is reaching end-of-life and you’re moving to the cloud?
But It’s not an easy project. It can take longer than expected, eating into cost-savings and brings an increased risk of service-interruption.
Key takeaways:
• A checklist for Discovery, Implementation and Disposal stages
• How to create an accurate budget and timetable
• Choosing between a phased or ‘big bang’ approach
How to know when combined backup and replication is for youDatabarracks
Why would anyone want to use two different products for backup and DR instead of one? You wouldn’t. If a single product reduces your IT complexity, you’re taking it, right?
Vendors have always combined backup and replication, taking various approaches to deliver backup and DR in one product.
This webinar shows you the pros and cons of each approach. And you’ll get recommendations to fit each use case.
How to write an effective Cyber Incident Response PlanDatabarracks
Set the standard for dealing with cyber incidents at your organisation.
What to include & what to pre-prepare
Managing and maintaining the plan
Identifying a cyber incident
Isolating & safely bringing systems back
Invoking Disaster Recovery isn’t as easy as some might have us believe. In fact, it’s probably one of the most intensely scrutinised and difficult times for any IT professional.
There are two big considerations you need to tackle – one is dealing with the human and operational factors. The other is the nuances of the technology setup. Step-by-step guide to setup Server dependencies and setting recovery priority Planning for connectivity issues Testing and matching performance on the DR environment Completing the project and the move to Business as Usual operations
Microsoft Azure has become the default option for anyone migrating from on-site data centres to the cloud.
It’s an obvious choice.
Most IT departments are familiar and skilled with the Microsoft toolset, so for back-office systems it just makes sense.
The question is, where to start? Setting up disaster recovery to Azure is a logical, low-risk first step.
Profit from tricks on how to achieve a better TCO by using Azure for DRaaS:
Replicating both VMware and Hyper-V environments
Setting up the ZCA (Zerto Cloud Appliance) in Azure
Connecting the ZVM (Zerto Virtual Manager) to your vCenter
Using Blob storage for replica disks and journals
Failing-over into Azure and failing-back
The Databarracks Continuity Toolshed: Free tools for better recoveriesDatabarracks
Over the past 3 years, we’ve been developing practical tools that take the heavy lifting out of in-depth continuity planning, making it faster and more approachable to newcomers.
But there’s an important caveat. Shiny, interactive tools can trick you into feeling productive by outputting important-looking information. Without a plan, instructions, or good data, they’re not useful.
That’s what The Recovery Toolshed: free tools for better recoveries is all about.
Explaining how Databarracks range of free recovery tools combine to output meaningful metrics and useful information that can be practically applied to great continuity planning.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
2. Agenda
• Introduction
• Cloud Services
• Infrastructure as a Service
• Platform as a Service
• Software as a Service
• Backup as a Service
• Hosted Exchange
• DR as a Service
• Considerations in moving to the cloud
• Databarracks Cloud Services
4. Evolution of Cloud
Cloud federation,
VMware Amazon offer more virtual
release first public IAAS servers than
First virtual physical
worlds first cloud offering, private clouds
x86 bare- Application EC2
metal Service Server
hypervisor Providers (ASP) virtualisation IaaS, Paas, Saas
(ESX) via web services seen as terminology
Amazon mainstream coined
offer first
PaaS AWS
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
Databarracks Infrastructure as a
Founded Service
Disaster Recovery
Office Hosted Exchange
Backup as a Service ISO 9001 Certified
Virtual Disaster Recovery ISO 27001 Certified
Colocation Services
Partnered with the Bunker
Virtual Private Cloud
Replication as a Service
5. Delivery Platforms
Directly hosted on IaaS
Cloud Service Offerings
API Links to PaaS
API Links to IaaS
DR as a service
Services
Backup as a service
Layered Managed
7. Benefits of Cloud Computing
30% 70%
On-Premise Your Managing All of the
Infrastructure Business “Undifferentiated Heavy Lifting”
Cloud-Based Configuring
Infrastructure More Time to Focus on
Your Cloud
Your Business
Assets
70% 30%
9. Shared Responsibility
Customer Data
You
Platform, Applications,& Access Management
Operating System, Network & Firewall Configuration
Databarracks
Virtualisation Layer
User Portals Catalogues Security
Foundation Services
Compute Storage Database Networking
Databarracks Datacentre Infrastructure
10. IaaS Service Model
Cloud
Computing
Enterprises Public Cloud/
Private Cloud Hybrid Cloud Virtual Private
Cloud
Private Cloud Public Cloud/Virtual
Dedicated solely for an Hybrid Cloud Private Cloud
organisation, typically Extending current Delivering applications
within private firewalls infrastructure into and over the internet
between both public and
private clouds.
17. Hosted Exchange
Upgrade without Increase availability Re-focus IT Resource
Capital Expenditure Time
Scale as you grow 24/7/365 Support Simple pricing models
18. Backup as a Service
Easily Accessible
Tapes/ Discs
Online
21. Considerations
Technology Business
-Connectivity -Where is the data hosted
-Application portability -Service Level Agreements
-Security -Certifications and Accreditations
-Licensing -Where does the support start and finish
-Retention of data -Availability of Service/ Downtime
-Migration Strategy
23. Networking
Internet
Direct Connection VPN Connection
Dedicated connection between your IT VPN connection connects Databarracks
infrastructure and the Databarracks environment to your datacenter
datacenters Internet Protocol security (IPsec) VPN
connection.
26. Key Benefits
Upgrade without Improve Agility & Pay Only for
Capital Expenditure Time to Market What you reserve
Simple to Deploy Scale as you grow Focus IT Resource
28. Databarracks Global Map
Norway
(1)
Russia
en
ed
Sw
Canada UK
German
y Poland
SWZ
USA
Spain Italy Greece
China
UAE India
Hong Kong
Thailand
Singapore
Brazil
Peru
Australia
RSA
31. What do our customer say
"To manage our IT systems and to ensure they are up and running for all our staff is a time
consuming job, so to find a service provider that completely managed our data lifecycle,
from backup to recovery and from live data to archival, was imperative"
Duncan Wood, Save the Children UK
"Now that our email is hosted in the cloud, it's easy for remote workers to get
access. It also fits into our DR policy. We don't have to worry about how we
replicate our entire Exchange system. It's Databarracks' responsibility,"
Bob McMeekin, Head of IT, Scottish Youth Hostel
Our charges are now scalable and predictable - with no hidden costs.
Louisa Palmer, Caspian One
"Our virtual private cloud with Databarracks has consolidated our IT infrastructure
and reduced our hardware costs. Whereas our IT systems used to be on 8 different
sites, now we have only one. This makes maintenance and updating much easier."
Ben Fox, Head of IT, Yacht Haven Group
Editor's Notes
Introduction about Johan and Mark As you know we have been invited by Laura Dawson to talk about the cloud. Briefly I have been working with Databarracks for the past five years as part of the business development team My experience is solely around cloud services and the best way organisations can adopt these services Mark Introduction
Johan Holder To Introduce - A bit about Databarracks, we have been providing IT services since 2002, started as an online backup or backup as a service provider We have grown over the years and developed our product portfolio, adding disaster recovery as a service through to hosted exchange, and various private cloud services In this presentation we are going to cover the following areas: As above What are the different services available What the main benefits are to your organisation And how backup, hosted exchange and disaster recovery fit into these models
UK’s leading Asigra online backup provider for almost a decade Disaster Recovery and Business Continuity specialist Private and Public Cloud integrator Protect many Petabytes of client data IT solutions provider to locations worldwide ISO 27001 and 9001 Certified Excellent retention record with over 30% of customers having been with the company for 5 years or more.
What are we going to cover during this presentation And how services fit into these different models available
What is cloud computing helping organisations achieve Change the current challenges faced in managing infrastructure Can now focus more on the busy as shown by the diagram above
What does this represent Physical Space Cabling Power Cooling Networking Racks Servers Storage Certification Labour
What does this represent Physical Space Cabling Power Cooling Networking Racks Servers Storage Certification Labour Additional MS can cover the top section for fully managed solution, IAAS definition is just the bottom section
What does this represent Physical Space Cabling Power Cooling Networking Racks Servers Storage Certification Labour Additional MS can cover the top section for fully managed solution, IAAS definition is just the bottom section
Upgrade without capital expenditure Increase availability Improve disaster recovery procedure – 99.99% uptime Scale as you grow No Scalability Challenges. Scaling an in-house Exchange environment can require purchasing additional servers or upgrading hardware or software. Hosted Exchange customers avoid these costs by simply adding more email mailboxes as needed. Cut administration time 20GB of storage per mailbox – let Databarracks take care of your storage footprint 24/7/365 technical support - Have shifted the burden to a vendor Simple pricing model easier to plan budgets as the workforce grows
Centralisation of backup operations Reduce in house administration through fully managed service 24/7/365 Enables IT staff to concentrate on production and business critical systems Solution allows for flexibility and can adapt should business requirements change Simple pricing structure which ensures economies of scale Pricing model ensures that no extra costs are incurred for the inclusion of future sites or end point devices Scalable to meet demands of increasing data volumes Reduces carbon footprint Key Benefits - Agentless Software - AES Encryption (military grade) - Compression - De-duplication and common file elimination – reduce storage footprint - Data Validation and Autonomous Self Healing – ensures data integrity - Backup Lifecycle Management – for e-discovery, cost savings and compliance - Incremental forever backup/ Delta blocking technology - for reduced backup windows and storage costs - Continuous Data Protection to reduce RPO’s
Where is your data hosted Connectivity SLA’s Security Certifications Migrations What does managed service mean
If we start at the bottom of the stack, physical data centre infrastructure, where is your cloud actually located. Former MOD Nuclear bunkers - Tier 4, PCI Compliant and ISO 27001 accredited - Military level security - UK Based in remote locations – natural and urban disaster proof - Two independent feeds from the National Grid - Independent power source capable of running for three months without refuelling - BGP4 MPLS enabled internet connectivity - Manned and patrolled 24/7/365 - Faraday Cages , Tempest and EMP Protection (electronic eavesdropping)
Why Databarracks? Accredited - chosen by Amazon as trusted AWS Solution Provider Knowledgeable - we have the technical expertise for your project, however complex Support - 24/7/365 assistance from UK based engineers Reliable - we have built an enviable reputation for performance and customer care Databarracks Services Analyse, Design, Build and Migrate Manage and Support
Upgrade without capital expenditure Lower costs Pay only for what you reserve Scale as you grow – no need to plan your storage footprint Reduce management overhead Improve agility and time to market