This document provides an overview of cloud architecture and cloud computing reference architecture. It discusses:
1. The scope covers defining functional requirements and reference architecture for cloud computing, including functional layers, blocks, and service architectures.
2. The cloud computing reference architecture includes layers like the user layer, access layer, services layer, resources and network layer, and cross-layer functions. It also describes functional blocks within these layers.
3. Requirements for cloud architecture are outlined, such as supporting standards, deployment models, and enabling services to appear like intranet services.
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Cloud computing :
Accessibility: Cloud computing facilitates the access of applications and data from any location worldwide and from any device with an internet connection.
Cost savings: Cloud computing offers businesses scalable computing resources hence saving them on the cost of acquiring and maintaining them.
Security: Cloud providers especially those offering private cloud services, have strived to implement the best security standards and procedures in order to protect client’s data saved in the cloud.
Disaster recovery: Cloud computing offers the most efficient means for small, medium, and even large enterprises to backup and restore their data and applications in a fast and reliable way.
Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.
Speaker: Tom Whateley, Solutions Architect and Stephanie Zieno, Account Manager, Amazon Web Services
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Cloud computing :
Accessibility: Cloud computing facilitates the access of applications and data from any location worldwide and from any device with an internet connection.
Cost savings: Cloud computing offers businesses scalable computing resources hence saving them on the cost of acquiring and maintaining them.
Security: Cloud providers especially those offering private cloud services, have strived to implement the best security standards and procedures in order to protect client’s data saved in the cloud.
Disaster recovery: Cloud computing offers the most efficient means for small, medium, and even large enterprises to backup and restore their data and applications in a fast and reliable way.
Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.
Speaker: Tom Whateley, Solutions Architect and Stephanie Zieno, Account Manager, Amazon Web Services
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Cloud Application Development – The Future is nowSPEC INDIA
Cloud computing has been carving a niche for itself in each and every business, be it any domain, any geography. Providing a big relief to the business owners in terms of maintaining infrastructure, costs, efficiency, security and profitability, Cloud Application Development has a strong hold in the present as well as in the future to come. Have a look at certain attributes that makes cloud computing as the technology of today and tomorrow.
Get More at: http://blog.spec-india.com/cloud-application-development-set-rule-today-tomorrow/
Building A Cloud Strategy PowerPoint Presentation SlidesSlideTeam
It covers all the important concepts and has relevant templates which cater to your business needs. This complete deck has PPT slides on Building A Cloud Strategy PowerPoint Presentation Slides with well suited graphics and subject driven content. This deck consists of total of twenty five slides. All templates are completely editable for your convenience. You can change the colour, text and font size of these slides. You can add or delete the content as per your requirement. Get access to this professionally designed complete deck presentation by clicking the download button below. https://bit.ly/2LuZsQP
Explore the challenges of migrating existing applications to a cloud infrastructure, then present proven strategies for mitigating the risks You'll learn how to:
- Prioritize application migration
- Plan for “big-blocks”
- Assess your existing applications' ‘fit’ for cloud
- Leverage a centralized development testing platform to align your business goals with coding decisions
- Create a cloud migration policy
- Use process to mitigate the risks associated with cloud migration
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
This PPT covers the following topics...
Definition’s
CC in a Nutshell
Roots of CC
Layers and Types of Clouds
Desired Features of Cloud
Cloud Infrastructure Management
Infrastructure as a Service Providers
Platform as a Service Providers
Challenge and Risks
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Cloud Application Development – The Future is nowSPEC INDIA
Cloud computing has been carving a niche for itself in each and every business, be it any domain, any geography. Providing a big relief to the business owners in terms of maintaining infrastructure, costs, efficiency, security and profitability, Cloud Application Development has a strong hold in the present as well as in the future to come. Have a look at certain attributes that makes cloud computing as the technology of today and tomorrow.
Get More at: http://blog.spec-india.com/cloud-application-development-set-rule-today-tomorrow/
Building A Cloud Strategy PowerPoint Presentation SlidesSlideTeam
It covers all the important concepts and has relevant templates which cater to your business needs. This complete deck has PPT slides on Building A Cloud Strategy PowerPoint Presentation Slides with well suited graphics and subject driven content. This deck consists of total of twenty five slides. All templates are completely editable for your convenience. You can change the colour, text and font size of these slides. You can add or delete the content as per your requirement. Get access to this professionally designed complete deck presentation by clicking the download button below. https://bit.ly/2LuZsQP
Explore the challenges of migrating existing applications to a cloud infrastructure, then present proven strategies for mitigating the risks You'll learn how to:
- Prioritize application migration
- Plan for “big-blocks”
- Assess your existing applications' ‘fit’ for cloud
- Leverage a centralized development testing platform to align your business goals with coding decisions
- Create a cloud migration policy
- Use process to mitigate the risks associated with cloud migration
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
This PPT covers the following topics...
Definition’s
CC in a Nutshell
Roots of CC
Layers and Types of Clouds
Desired Features of Cloud
Cloud Infrastructure Management
Infrastructure as a Service Providers
Platform as a Service Providers
Challenge and Risks
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
Metaverse - Let's learn to understand when business becomes virtual and when ...Arief Gunawan
https://www.youtube.com/watch?v=G1GsJPqRCww
This session will dissect the main architecture of the Metaverse. This will provide enlightenment for participants to understand when business becomes virtual and when virtual becomes business. This session will begin to discuss the transition to the Metaverse, how the Metaverse world itself is, and how business is in the Metaverse.
APWiMob 2014 (Bali, 28-30 August 2014) CFPArief Gunawan
About APWiMob
APWiMob is international event in Asia Pacific designed for audience working in the wireless communications and mobile technology communities. As the Asia Pacific conference focusing on wireless and mobile technologies, APWiMob is very suitable for wireless communications researchers, industry professionals, and academics interested in the latest development and design of wireless systems and mobile technologies.
Sponsored by the IEEE Communications Society Indonesia Chapter, APWiMob has a strong foundation of bringing together industry and academia. In 2014, Bali will become the wireless foundation by hosting APWiMob 2014. The conference will include technical sessions, tutorials, and technology and business panels. You are invited to submit papers in all areas of wireless communications and mobile technologies, networks, services, and applications.
Prof Ekram Hossain on DLT 2013 in IndonesiaArief Gunawan
IEEE Communications Society (COMSOC) Indonesia Chapter proudly presest Prof Ekram Hossain on DLT 2013 in Bandung, Jakarta, Yogyakarta and Banten.
Institut Teknologi Telkom, Bandung, 27 August.
Universitas Mercu Buana, Jakarta, 28 August.
Universitas Gadjah Mada, Yogyakarta, 29 August.
Universitas Multimedia Nusantara, Banten, 30 August.
Lectures:
"Radio Resource Management in Multi-tier Cellular Wireless Networks"
and
"Modeling, Analysis, and Design of Multi-tier and Cognitive Cellular Wireless Networks"
M2M Optimizations in Public Mobile Networks
M2M Over a Telecommunications Network
Network Optimizations for M2M
The Role of IP in M2M
IPv6 for M2M
6LoWPAN
Routing Protocol for Low-Power and Lossy Networks (RPL) CoRE
M2M Security
Trust Relationships in the M2M Ecosystem
Security Requirements
Which Types of Solutions are Suitable?
Standardization Efforts on Securing M2M and MTC Communications
M2M Terminals and Modules
M2M Module Categorization
Hardware Interfaces
Temperature and Durability Services
Software Interface
Cellular Certification
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Search and Society: Reimagining Information Access for Radical Futures
Cloud Architecture
1. Cloud Architecture
(half day edition)
An Cloud Computing Course
IT Telkom, 11 August 2012
Arief Hamdani Gunawan
2. Scope
• The scope of this Course is to define the
functional requirements and reference
architecture of cloud computing, which
includes the functional architecture,
functional layers and blocks.
3. Contents
• Cloud architecture • Cloud computing reference
requirements architecture – Functional
• Cloud computing reference blocks
architecture - Layering – User layer
framework – Access layer
– Cloud architecture layering – Services layer
– User layer – Resources and network layer
– Access layer – Cross-layer functions
– Services layer • Service architecture for
– Resources and network layer desktop as a service (DaaS)
– Cross-layer functions – Main functions of the DaaS
service architecture
– Interaction process between
client and functional
components of the DaaS
4. Contents
• Cloud architecture • Cloud computing reference
requirements architecture – Functional
• Cloud computing reference blocks
architecture - Layering – User layer
framework – Access layer
– Cloud architecture layering – Services layer
– User layer – Resources and network layer
– Access layer – Cross-layer functions
– Services layer • Service architecture for
– Resources and network layer desktop as a service (DaaS)
– Cross-layer functions – Main functions of the DaaS
service architecture
– Interaction process between
client and functional
components of the DaaS
5. Cloud architecture requirements
• The cloud architecture must meet several
requirements to enable sustained innovation
and development of cloud services.
• With multiple stakeholders involved, the cloud
architecture must be flexible to fit the needs
of infrastructure CSPs, CSPs and service
resellers.
6. Cloud architecture requirements: 1
The following high-level requirements are broadly
envisioned for the cloud architecture:
1. Cloud deployments will have to support many
standards within the same cloud infrastructure,
e.g. in terms of resource allocation, orchestration,
or CSU access.
– The cloud architecture must allow and support the
evolution of these standards, without requiring
disruptive infrastructure changes from the CSP
perspective.
7. Cloud architecture requirements: 2
2. A cloud CSP must be able to support multiple
standards within the same architecture and
migrate to a newer standard if they so wish,
without having to change everything in the
CSP network or lose the existing customer
base.
8. Cloud architecture requirements: 3
3. Broadband access is fundamental in making
cloud services viable.
– The cloud architecture may benefit from integration
with the support of network resource reservation and
guaranteed QoS capabilities through the network over
which services are delivered.
– Without the network access guaranteeing bounded
delay, jitter, bandwidth, and reliability, the cloud
experience for CSUs may be worse than the intranet
experience.
9. Cloud architecture requirements: 4
4. The cloud architecture must enable multiple
deployment models, cloud service categories
and use cases, some currently known and
others to be envisioned in the future.
– Currently known cloud service categories include
IaaS, PaaS, SaaS, CaaS, and NaaS, and it is possible
that these will also co-exist in the same cloud
deployment.
– The same architecture must allow a CSP to
provide either all, or a subset, of these services.
10. Cloud architecture requirements: 5
5. For private and hybrid cloud operations, cloud
services must appear like intranet services.
– This means a user must be able to access
resources using the same domain names as on the
intranet.
– Hosts and resources that have been migrated
from private to public clouds should be accessed
transparently where they are being currently
hosted.
11. Cloud architecture requirements: 6
6. The cloud architecture must enable
early detection,
diagnosis and
fixing
of infrastructure or service-related problems.
12. Cloud architecture requirements: 7
7. CSUs must be able to (request) audit CSP’s
services and get assurance that the agreed-
upon SLAs are being complied with.
– To that end, the cloud architecture must enable,
among others, service-level monitoring of
resources allocated to a user and generate SLA
compliance reports.
13. Cloud architecture requirements: 8
8. Cloud resource allocations should be invisible
to the CSUs, even though services are visible.
– A CSP may choose to expose service-operation
details without having to share cloud internal
infrastructure allocation and provisioning details.
– This is important for a CSP for security and
business reasons.
14. Cloud architecture requirements: 9
9. Users consuming cloud services must be able
to control cloud resource access to the CSP
transparently, and enable IT procedures to
work without compromise in legal or
organizational mandates.
– This includes, for instance, the ability to
dynamically add or remove a user from access to a
cloud without CSP intervention.
15. Cloud architecture requirements: 10
10. The cloud architecture must enable intranet-
level security on the network.
– This may include access records, activity reports,
session monitoring, and packet inspections on the
network.
– It must also include firewalling, access control and
malicious attack detection and prevention.
– Prevention of one user disrupting others’ services
is paramount.
16. Cloud architecture requirements: 11
11. The cloud architecture must support cloud
resource mobility which includes virtual
machine mobility within a Performance-
Optimized Data centre (POD) or data centre,
between PODs or data centres within the
same CSP’s infrastructure, or between
different CSPs’ infrastructures, or from a CSU
to a CSP.
17. Cloud architecture requirements: 12
12. Resource mobility depends upon being able
to treat an entire network as a single entity,
which implies the need of the cloud
architecture to scale.
– With a huge number of computing, storage and
network resources, and an even greater number
of virtualized resources, the cloud architecture
must have scalability as a primary requirement.
18. Cloud architecture requirements: 13
13. Naming extensions are necessary to meet
cloud needs.
– Users who move their private resources into the
cloud may need to access their resources by the
same names as they did prior to those resources
being migrated.
– Since hosts are associated with user’s domain
names, it is necessary to translate the user’s
domain names into cloud names.
19. Cloud architecture requirements: 14
14. Cloud-service deployment needs to be
automated in order to support scalable resource
operations, including configuration, provisioning,
charging, etc.
– In a typical scenario, a user would want to specify the
computing, storage and virtual machine (VM)
resources needed, as well as the network resources.
– This includes how the network resources should be
reserved, configured and managed during lifetime for
optimized connectivity between the distributed
computing, storage and VM resources, and finally
retired.
20. Contents
• Cloud architecture • Cloud computing reference
requirements architecture – Functional
• Cloud computing reference blocks
architecture - Layering – User layer
framework – Access layer
– Cloud architecture layering – Services layer
– User layer – Resources and network layer
– Access layer – Cross-layer functions
– Services layer • Service architecture for
– Resources and network layer desktop as a service (DaaS)
– Cross-layer functions – Main functions of the DaaS
service architecture
– Interaction process between
client and functional
components of the DaaS
21. CC Reference Architecture
Layering Framework
• Cloud Architecture Layering shows the cloud
layering framework that is defining the layers
of the cloud functional architecture.
• These functional layers in the architecture are
derived by grouping cloud related functions.
23. User Layer (1/2)
• The User Layer performs interaction between the CSU
and the cloud infrastructure.
– The User Layer is used to
• setup secure mechanism with cloud,
• send cloud service requests to cloud and receive cloud services
from cloud,
• perform cloud service access,
• administrate and
• monitor cloud resources.
– When the cloud receives service requests, it orchestrates
its own resources and/or other clouds’ resources (in case
of other clouds’ resources via the inter-cloud function) and
provides back cloud services through the User Layer.
24. User Layer (2/2)
• The User Layer is where the CSU resides.
– The CSU is an essential actor of the cloud
ecosystem. It represents the entities that use the
services offered by the CSP.
– A CSU may use a service directory from a CSP and
after setting up appropriate contract would use
the services accordingly.
25. CSU
• CSUs demand SLAs. SLAs govern the characteristics of
the services provided by CSPs.
– SLAs govern many aspects of the services provided, for
example QoS, governance, security, performance and data
portability.
• The CSU typically consumes services in five service
categories:
– CaaS
– SaaS
– PaaS
– IaaS
– NaaS
26. Access Layer
• The access layer provides a common interface
for both manual and automated cloud service
capabilities and service consumption.
• The access layer accepts
– CSU’s cloud service consumption requests and/or
– CSN’s cloud service consumption requests and/or
– other CSP’s cloud service consumption requests
using cloud APIs to access CSPs’ services and
resources.
27. Service Layer
• The Services Layer is where the CSP orchestrates
and exposes services of the five cloud service
categories.
• It is the entity responsible for making a service
available to interested parties.
• The Cloud Service Layer manages the cloud
infrastructure required for providing the services,
runs the software that implements the services,
and arranges to deliver the cloud services to the
CSU through network access
28. Service Layer: SaaS and CaaS
• For Saas or CaaS, the services layer deploys,
configures, maintains and updates the
operation of the software or communication
applications on a cloud infrastructure so that
the services are provisioned at the expected
service levels to the layers above.
29. Service Layer: PaaS
• For PaaS, the services layer manages the cloud
infrastructure for the platform and runs the software that
provides the components of the platform, such as runtime
software execution stack, databases, and other middleware
components.
• The CSP of PaaS services typically also supports the
development, deployment and management process of the
CSUs of PaaS services by providing tools such as integrated
development environments (IDEs), software development
kits (SDKs), deployment and management tools.
• The CSUs of PaaS services have control over the
applications and possibly some of the hosting environment
settings, but has no or limited access to the underlying
infrastructure .
30. Service Layer: IaaS
• For IaaS, the services layer controls the resources
underlying the service, including the servers,
networks, storage and hosting infrastructure.
• The services layer then runs the software
necessary to makes the resources available to the
CSUs of IaaS services through a set of service
interfaces and resource abstractions, such as
virtual machines and virtual network interfaces.
31. Service Layer: NaaS
• For NaaS, the services layer uses the
underlying networking and transport facilities
to deliver networking services in a cloud
environment.
• Examples are network virtualization services
like VPNs (see Ecosystems NaaS definition).
32. Resources & Network Layer
• The Resources and Network layer is where the physical resources
reside.
• This includes equipment typically used in a data center such
servers, networking switches, storage, etc.
• It also represents and houses the cloud core transport network
functionality which is required to provide underlying network
connectivity between the CSP and the CSUs.
• CSUs can obtain cloud services through different network access
devices, such as desktop computers, laptops, mobile phones, and
mobile Internet devices.
• The connectivity to cloud services is normally provided by CSPs.
• Note that for a CSP to provide services consistent with the level of
SLAs offered to the CSUs, it may require dedicated and/or secure
connections between CSUs and CSPs.
33. Cross-Layer Functions
• The Cross-Layer functions perform overall system
management (i.e., operations, administration,
maintenance and provisioning (OAM&P)) and
monitoring, and provide secure mechanisms.
• Secure mechanisms provide protections from
threats to cloud computing services and
infrastructure.
– Secure mechanisms are required by both CSUs and
CSPs to create a secure cloud environment.
34. Contents
• Cloud architecture • Cloud computing reference
requirements architecture – Functional
• Cloud computing reference blocks
architecture - Layering – User layer
framework – Access layer
– Cloud architecture layering – Services layer
– User layer – Resources and network layer
– Access layer – Cross-layer functions
– Services layer • Service architecture for
– Resources and network layer desktop as a service (DaaS)
– Cross-layer functions – Main functions of the DaaS
service architecture
– Interaction process between
client and functional
components of the DaaS
35. CC Reference Architecture:
Functional Blocks
• Based on the layering framework shows the
major functional blocks of the Cloud
Computing Reference Architecture.
• It is recognized that CSPs will decide which
functional blocks are appropriate to their
business, and how the chosen functional
blocks are implemented.
36. CC Functional Reference Architecture
User Layer Partner Administrator Cross-Layer
User Function Function
Function Functions
Access Endpoint Inter Cloud
Layer Function Function Operational
Management
Function
SaaS / CaaS
Cloud
Services Performance
PaaS
Service Function
Layer
IaaS Orchestration
NaaS Security &
Privacy
Function
Resource Orchestration
Resources & Pooling &
VN VS VM
Software & Virtual Path
Virtualization Platform Assets Virtual Circuit
Network
Layer Physical Intra Cloud
Storage Computing
Core
Transport
Inter Cloud
Resources Network Network
Network
37. User Layer
The user layer includes the end-user function, the
partner function and the administrator function.
• User function: The user function supports a CSU
to access and consume cloud services
• Partner function: The partner function enables
the CSN relationship with CSP
• Administrator function: The administrator
function supports the enterprise administrator to
manage and administrate cloud resources and
services within business processes
38. Access Layer
• The access layer includes the endpoint
function and the inter-cloud function.
39. Access Layer:
endpoint function (1/3)
• The endpoint function controls cloud traffic
and improves cloud service delivery.
– This function, which has some similarity with the
NGN border gateway function (located at the edge
of the network), can perform traffic classification,
packet marking and firewall.
40. Access Layer:
endpoint function (2/3)
• This function also provides internet domain
names, ports and/or Internet addresses that are
“published” to the user as endpoints from where
the user can (a) view and (b) request services.
– A published endpoint may internally “route” or
“transform” the incoming service request to one or
more service endpoints, based on CSP policy in effect.
– For instance, a published endpoint may forward the
request to a location nearest to the requestor.
41. Access Layer:
endpoint function (3/3)
• The endpoint function can include a
subscription/publication functionality that is a
subscribe-notify feature for publishing, and for
obtaining notification of different cloud
services and resource information from CSPs.
• The endpoint function may route the requests
to the inter-cloud function to be routed to
external CSPs.
42. Access Layer:
Inter-cloud function (1/3)
• Cloud services are expected to be offered by
CSPs on a global basis. To enable delivery of
such services ubiquitously, a CSP will have to
establish inter-cloud connections with other
CSPs who offer these services in areas that are
not within the preview of the original CSP.
• Within functional view, the inter-cloud
function is used to support the “inter-cloud”
role as described in Cloud Ecosystem.
43. Access Layer:
Inter-cloud function (2/3)
• The inter-cloud function addresses different
aspects of delivering any cloud service across
two or more CSPs, including SLAs, resource
management, performance, reliability and
security; OAM&P; ordering and charging;
service brokering and environmental
sustainability.
44. Access Layer:
Inter-cloud function (3/3)
• The scope of the inter-connection is between
two cloud domains (operated by two CSPs).
• The inter-cloud function can be implemented
in different manners, including inter-cloud
peering, inter-cloud service broker and inter-
cloud federation.
45. Inter-cloud function:
Inter-Cloud Service Broker (1/3)
• The Inter-cloud function can be implemented as
inter-cloud service broker (ISB). In this case, it
provides brokering service functions to CSPs or
CSUs.
• According to the requirements of the Inter-Cloud
Service Broker (ISB) capability, the Inter-Cloud
Service Broker (ISB) provides and execute services
of three categories:
– Service Intermediation
– Service Aggregation
– Service Arbitrage
46. Inter-cloud function:
Inter-Cloud Service Broker (2/3)
– Service Intermediation: The ISB enhances a given service by
improving some specific capability and providing value-added
services to CSUs. Examples of capability improvements include
management of the access to cloud services, identity
management, performance reporting, security enhancements,
etc.
– Service Aggregation: The ISB combines and integrates multiple
services into one or more new services. The ISB provides data
integration and ensures the secure movement of data between
the CSUs and CSPs.
– Service Arbitrage: Service arbitrage is similar to service
aggregation except that the services being aggregated are not
fixed. In this case, the ISB has the flexibility to choose services
from multiple sources. For example, the ISB can use a credit-
scoring service to measure and select the source with the best
score.
47. Inter-cloud function:
Inter-Cloud Service Broker (3/3)
• When a CSP plays the Inter-cloud Service Broker role, the
requesting entity (CSU or CSP) continue to access the
brokered services via the Endpoint Function, however the
implementation of the Access Layer will decide whether to
serve the request locally, or route them to external CSPs via
the Inter-cloud function.
• The Inter-cloud function receives the requests by the
Endpoint function, analyses the requests, selects
appropriate service logics and function patterns, executes
related operations, then invokes the concrete cloud
services and resources from external CSPs through cloud
service adapters (by sending cloud service adaptation
requests to CSPs and receiving cloud service adaptation
responses from CSPs).
48. Inter-cloud function:
Inter-Cloud Peering
• Inter-cloud peering happens when two CSPs
interact with each other using already
established interfaces.
• Each CSP could invoke the interfaces offered
by the other CSP, when needed, to perform
the functions that the CSP would like to
delegate to its peer CSP.
49. Inter-cloud function:
Inter-Cloud Federation (1/3)
• Inter-Cloud federation capability provides an
alliance among several CSPs in which mutually
trusted clouds join together logically thru
agreed-upon interfaces.
– Inter-Cloud federation allows a CSP to dynamically
outsource resources to other CSP in response to
demand variations.
50. Inter-cloud function:
Inter-Cloud Federation (2/3)
• Inter-Cloud federation manages the
consistency and the access controls when two
or more independent CSPs share either
authentication, data, computing resources,
command and control, or access to storage
resources.
– Inter-Cloud federation shall provide the identity
syndication to support federated authentication
across all sources and federated user across the
different CSPs.
51. Inter-cloud function:
Inter-Cloud Federation (3/3)
• The Inter-Cloud Function supports federation
capability and may include federation initiator
which initiates operations within a federation
relationship and federation target which
processes operations within a federation
relationship.
52. Services Layer
• The Services Layer includes the service
orchestration function and provides cloud
services.
53. Services Layer:
Services Orchestration Function (1/2)
• Cloud Service Orchestration is the process of
deploying and managing “Cloud Services".
• “Cloud Services” are implemented using cloud
service interfaces; examples are
– Simple Object Access Protocol (SOAP),
– Representational state transfer (REST),
– HyperText Markup Language(HTML) rendered
pages,
– etc.
54. Services Layer:
Services Orchestration Function (2/3)
• This function is required to provide mechanisms
for:
– composing services (services provided by the CSP as
well as services from other CSPs) to create new
composite services;
• Composing services is the process of generation of the
service logic (i.e. the logic of the service to be provided by
the CSP).
– executing composite services.
• Executing composite services includes parsing and running
the service logic.
55. Services Layer:
Services Orchestration Function (2/2)
• This function also provides message routing and
message exchange mechanisms within the Cloud
architecture and its different components as well
as with external components.
– Message routing can be based on various criteria, e.g.
context, policies.
– The message exchange mechanisms control the
message flows between CSUs, CSP (internally) and
externally with other CSPs via the Inter-cloud
Function.
56. Services Layer:
Cloud Services
• The Services Layer provides instances of IaaS,
PaaS, SaaS, CaaS, NaaS service categories and any
composition of these services.
• Examples of such services are:
– The ability for users to request, configure, and execute
one or more VMs,
– The ability for users to invoke a software application
from within a web browser,
– The ability for developers to invoke programming
interfaces through a cloud interface.
57. Resources & Network Layer:
Resource Orchestration
• Resource Orchestration is defined as the management,
monitoring, scheduling of computing, storage, and
network resources into consumable services by the
upper layers and users.
• Resource Orchestration controls the creation,
modification, customization and release of virtualized
resources. It holds capability directories about what is
possible within a cloud segment, based upon the total
resource capacity and the incremental allocations that
have been done for currently honoured requests.
58. Resources & Network Layer:
Pooling & Virtualization
• Pooling and virtualization of physical resources are
essential means to achieve the on-demand and elastic
characteristics of cloud computing. Through these
processes, physical resources are turned into virtual
machines, virtual storages, and virtual networks. These
virtual resources are in turn managed and controlled by the
Resource Orchestration based on user demand. Software
and Platforms assets in Pooling & Virtualization Layer are
the runtime environment, applications and other software
assets used to orchestrate and implement cloud services.
• “Software & platform assets” is the architectural block that
represents the use oftraditional software assets to
implement the cloud services layer
59. Resources & Network Layer:
Physical Resources
• Physical Resources refer to the computing,
storage, and network resources that are
fundamental to providing cloud services.
– These resources may include those that reside
inside cloud data centers (e.g., computing servers,
storage servers, and intra-cloud networks) and
those that reside outside of a data center, typically
networking resources such as inter-cloud
networks and core transport networks.
60. Cross-Layer Functions (1/3)
• The Cross-Layer functions include
– security& privacy,
– cloud operational management, and
– cloud performance functions.
61. Cross-Layer Functions (2/3)
• This layer caters to a CSP’s need for monitoring of
resources, and generates a consolidated view of
current resource allocations and how efficiently
the resources are being utilized.
– Resource monitoring allows the CSP to exercise load
balance to ensure the performance of cloud services.
It also flags network and service related problems
such as hardware or software resource failures,
missing SLA targets or if a CSP’s network is
experiencing security violations or other forms of
compromised situation.
62. Cross-Layer Functions (3/3)
• As the point that collects availability,
performance and security information, it is
central source of information on a CSP’s
service excellence.
63. Cross-Layer Functions:
Security & Privacy (1/3)
• This section describes a high-level summary of security
and privacy functions with regard to the Reference
Architecture. For further details, please refer to the
Security output document.
• Cloud security and privacy refer to the cross-layer
functions responsible for applying security related
controls to mitigate the potential threats in cloud
computing environments. CSPs (CSPs) need to
consider applicable privacy requirements and
regulations.
• Security threats can be dived into two areas, threats for
CSUs and threats for CSPs.
64. Cross-Layer Functions:
Security & Privacy (2/3)
Threats for CSUs Threats for CSPs
• Responsibility Ambiguity • Responsibility Ambiguity
• Loss of Governance • Protection Inconsistency
• Loss of Trust • Evolutional Risks
• CSP Lock-in • Business Discontinuity
• Unsecure Customer Access • Supplier Lock-in
• Lack of Information/Asset • License Risks
Management • Bylaw Conflict
• Data loss and Leakage • Bad Integration
• Unsecure Administration API
• Shared Environment
• Hypervisor Isolation Failure
• Service Unavailability
• Data unreliability
• Abuse Right of CSP
65. Cross-Layer Functions:
Security & Privacy (3/3)
• Cloud Security and Privacy use a set of requirements to
mitigate the above listed threats. These requirements
cover actions and technologies that are deployed for both
CSUs and CSPs. (Details of the requirements can be found
in the Cloud Security output document)
• Security and Privacy tie closely with SLA and service
monitoring which often depend on the user identity. The
identity information must be propagated in the cloud
computing environment, to enable linking SLA and services
with identity. For instance, to regulate the consumed
network bandwidth to the total bandwidth the user has
requested for, the monitoring point must associate the
user’s IP address with the identity that comes from user
authentication.
66. Cross-Layer Functions:
Cloud Performance Function
The Cloud Performance Function serves the
following purposes:
– Aggregates or summarizes cloud network
information for the management node
– Used to make service routing decisions by the
Published Endpoints
– Monitors customer SLAs, and flags SLA violations
– Point of monitoring and control for the
management node
67. Cross-Layer Functions:
Cloud Operational Management Function
• Power Management
• Configuration Function
• Charging
68. Cloud Operational Management Function:
Power Management
• Power Management is to be seen as a part of the
Management function and as such it is a cross layer
function.
• Power management represents a collection of IT
processes and supporting technologies geared toward
optimizing data center performance against cost and
structural constraints. This includes increasing the
deployable number of servers per rack when racks are
subject to power or thermal limitations and making
power consumption more predictable and easier to
plan for.
69. Cloud Operational Management Function:
Configuration Function
• This function comprises of databases and provisioning
information using which cloud services can be customized.
It will include user databases for authentication and
authorization, policy servers for defining end-user SLAs,
geographical or legal customizations on services, name
servers for describing virtual and physical hosts along with
cloud domain names, automatic configuration servers for
devices that can be auto configured when they are
powered on and TFTP or HTTP based software servers from
where prior loaded images can be downloaded.
• Cloud Configuration Databases comprise of configuration
information that is necessary to coordinate cloud services.
70. Cloud Operational Management Function:
Charging (1/2)
• Charging is critical for an operational cloud
service platform.
• Detailed logs of the users’ resource
consumption should be correctly collected
and retained.
• The charging records should carry
comprehensive information about how
customers use the infrastructure resources
71. Cloud Operational Management Function:
Charging (2/2)
• Specifically, the resource management system should
collect the following charging data:
– Computation consumption usage. This should reflect how much
computation resources have been used by the customers. Data
of computation consumption include the number of CPUs and
the corresponding using time.
– Storage consumption usage. This should show how much
storage resources have been used by the customers.
– Network bandwidth usage. This should keep the information of
how much bandwidth has been used by the customers.
– Other information that may affect charging, such as delivered
QoS.
– Other information for statistics.
72. Contents
• Cloud architecture • Cloud computing reference
requirements architecture – Functional
• Cloud computing reference blocks
architecture - Layering – User layer
framework – Access layer
– Cloud architecture layering – Services layer
– User layer – Resources and network layer
– Access layer – Cross-layer functions
– Services layer • Service architecture for
– Resources and network layer desktop as a service (DaaS)
– Cross-layer functions – Main functions of the DaaS
service architecture
– Interaction process between
client and functional
components of the DaaS
73. Service Architecture for DaaS:
Main functions of the DaaS service architecture:
Connection Brokering (CB) function
The main functions in the DaaS service architecture are given
as follows:
• Connection Brokering (CB) function
– A connection broker is a software program that allows a CSU to
connect to an available virtualized desktop.
– The connection broker performs tasks which include: user
authentication and license verification to validate the user and
user’s software; management of a virtual machine (VM) for user
assignment; server monitoring to measure the activity level of a
given VM, and protocol coordination to coordinate on the
protocol to be used between user and server.
– The connection broker can also support the connection
between a backup storage and virtualized desktop servers.
74. Service Architecture for DaaS:
Main functions of the DaaS service architecture:
Resource Pooling function
• Resource Pooling function
– In order to provide on-demand virtualized desktop
services, a resource pool can manage three different types
of high-capacity software resources such as operating
systems (OS), applications and user profiles. These
software resources are transferred to a certain VM in
streaming form timely and run on the VM. A resource pool
can offer provisioning information regarding the software
resources on request by a CB.
– A user profile contains individual information about
hardware configuration (i.e. CPU, RAM, I/O), used OS,
selected applications, and user’s computing environment
information (i.e. display resolution, Internet access way).
75. Service Architecture for DaaS:
Main functions of the DaaS service architecture
VM Infrastructure function
• VM Infrastructure function
– The main role of the VM infrastructure is to support hardware
resources and create VMs.
– In a virtualized desktop server, a virtualization functionality
called hypervisor is highly necessary to employ hardware
resources efficiently.
– A hypervisor can abstract physical hardware resources and
assign them to higher level of software dynamically.
– Consequently, the VM infrastructure provides VMs – the
“virtualized desktops”- on which user’s software is operated.
– It is recommended that the VM Infrastructure consists of a
cluster environment with high availability features, and within
which many running VM instances are created from the same
VM template with pre-defined configuration parameters.
76. Service Architecture for DaaS:
Main functions of the DaaS service architecture
Virtual desktop delivery function
• Virtual desktop delivery function
– This function involves encapsulating and delivering
either access to an entire information system
environment or the environment itself to a remote
client device through the network.
– The virtual desktop delivery protocol (VDDP) is the
core component to realize this function and provides
the communication channels between user terminals
and servers for DaaS in order to transfer all the
interaction information.
– This information includes display information, control
and configuration information, monitoring
information etc.
77. Conceptual diagram of the DaaS service architecture
VM Infrastructure
Vir tual Desktop Ser ver
User B
Virtual Desktop
User B
VM VM
VM VM VM
VM VM
VM VM visor
Hyper VM
Hyper visor
Hardware
Hardware
Virtual Desktop Deliver y Protocol
(VDDP)
Resource Pool
Connection Broker
User Profile Pool
Client
Resource Provision
User C User D
User Authentication User A User B
Application Pool
License Verification
VM M onitoring/
M anagement
User B Protocol Coordination OS Pool
Windows
7
Service User Service Provider
78. Interaction process for DaaS (1/2)
The various steps of the interaction process for DaaS are as follows:
• A user accesses a CB through a security protocol (such as SSH or
TLS) and the CB validates the user with a user-ID and associated
password.
• The CB identifies a corresponding user profile and, in order to
assign a VM, a provisioning function helps the CB to search the VM
that satisfies user’s hardware configuration and is optimal to
computing environment.
• In case there is no proper VM, the CB requests the VM
infrastructure to create a VM by sending information of hardware
configuration.
• After a VM is assigned or created, the CB applies the user profile to
the VM including installation of OS and applications to construct a
virtualized desktop.
79. Interaction process for DaaS (2/2)
• A connection to deliver a corresponding virtualized desktop is
created in the VM infrastructure and the information of the
connection is dispatched to the CB.
• The CB sends the connection information to the user and the user
connects to the desktop in the VM infrastructure.
• The user communicates with the virtualized desktop through the
network using the virtualized desktop delivery protocol (VDDP).
• The user does execute a log-off operation to prevent the
elimination of user data when he or she terminates a virtualized
desktop service.
• During the log-off operation, the CB updates the modified user
profile in a user profile pool to keep the most recent information
and returns the VM whose state becomes available.
80. Cloud Computing Courses
Fundamental Specialization
• Cloud Ecosystem • Saas and Web Applications
• Cloud Architecture • Virtualization
• Cloud Infrastructure • Platform and Storage
• Cloud Resource Management
Management • Cloud Profiles
• Cloud Security • Inter-cloud