SlideShare a Scribd company logo
Accolades
Firstly, I’d like to thank everyone attending,
taking the time out of their day, and allowing me
to present…
This methodology was developed for military
application, and therefore this presentation is
the theory of applying this same methodology
to a more consumer based model…
Cloud Burst Methodology
• Methodology
• Explanations of Cloud Burst Methods
• Network Access Methodologies – Inclusive of Cloud
Bursting
• Identity Management Methodologies, inclusive of
Cloud Bursting
• Special Purpose Computing – Cloud Bursting
• Business and Use Cases Applied to Special Purpose
Computing
• High Level Architecture Walkthrough
• Q & A
Cloud Burst Methodology
Cloud Burst Methodology is the practical theory,
and application of, the formation of an autonomous
cloud computing fabric, intended for the creation of
dedicated fabrics, established for single use, to
officiate a process/mission/directive, after which
that fabrics contents are then warehoused, and the
core destroyed, eliminating any access structure
and/or access to the data. The data is warehoused
in a separate environment, with exclusionary access
rights, different from and in contrast to the rights
assessed within the special purpose fabric.
Cloud Burst Methodologies - Explained
The concept of ‘Cloud Burst Methodology’ came
from a project named ‘MVII’ Vehicle Intelligence
Initiative for Mobility, and the use of a technology
terms Ad-Hoc VPN spawning. Ad-Hoc VPN
spawning would occur, as one MVII equipped car
approached another, creating an Ad-Hoc network
VPN, via a spontaneously created network access
key, then piggybacking to the POP (Point of
Presence). The process in which, was
spontaneously created, made the chance of
penetration, or intrusion almost negligible.
Network Access Methodologies –
Explained
The key purpose of Network, or Systems security is
to create an environment where security
‘remediation’ was osmotic, establishing a healthy
environment where CISO’s could rectify issues. The
key issue here is the word remediate, meaning to
cure a defect, and/or issue. Even with the current
behavioral ‘AI’ technology being implemented
within standardized Network Security platforms, we
are still ‘remediating’ network penetration issues
rather then proactively avoiding them.
Security Implications
Such as, in any network access structure, the
more perpetual time, users, and traffic in/out of
even a contained network unit increases the
possibility of penetration and/or intrusion,
either by an internal, or external entities.
Access Management Solutions
Cloud Burst methodologies can, by proxy,
mitigate possible penetrations/intrusions, not by
instantiating new network protocols, but by
limiting access, to single use fabrics, disallowing
perpetual access by utilizing these units for
special purpose computing procedures…
Special Purpose Computing Solutions
• Special Purpose (Use) Computing
– Using special purpose fabrics, for single use
computing instances
• Such as transactional processing during high traffic
periods
• Limit Network Accessibility
– By limited access
• Access Control
– By instantiating spontaneous user controls
• Identity Management
Access Management Architecture
Special purpose computing reduces the chances
of intrusion by establishing access rights, via
1024 bit encrypted keys, spontaneously created
at instantiation. These key pairs have a half life,
that of the users access capabilities and or
accessibility, and are tied to that specific fabric.
Cloud Burst Methodology
• Practical Applications
– Business Cases
– Use Cases
• Best Practices
– Methodology
– Architecture
Practical Applications of a Cloud Burst
Methodology
• Originally designed surrounding a military
application
– Other potential applications
• High traffic, high volume shopping seasons
– PCI, and SOX compliancy packages
• Compliancy driven arenas, such as health care,
specifically in disaster situations
– HIPAA, PCI, and SOX compliancy packages
• Mergers and Acquisitions
– SOX, and other compliancy packages
Business Case – Retail
Problem: Majority of credit, checking account, and
identity theft occurs during high traffic seasonal shopping
periods
• Christmas, Thanksgiving, Easter, New Release, other
applications
Solution: Using a derivative of a Cloud Burst
Methodology, onboarding compliancy packages, you can
process transactions, utilize CRM packages, create
management protocols, and destroy the fabric after use,
thereby eliminating all access control assigned to that
fabric, and any other associations…
Business Case – Medical HIPAA
Problem: In 2014 the clinical application, of the new HIPAA laws, will come into effect.
HIPAA will now not only govern patient care, but also the application of new laws
surrounding DLP, Network Security, and systems hardening…
• Patient file storage
• Patient demographic storage
• Medical records storage
• Patient care applications
Solution: Using a derivative of a Cloud Burst Methodology, onboarding compliancy
packages, you can establish special purpose cloud to officiate disaster initiatives, such
as Hurricane Katrina, or Sandy, for the soul purpose of medical care, storage of
documents, patients data, morgue and autopsy data. This would allow that facility to
bring a fully functioning, prebuilt fabric, up in minutes. This in turn would allow
unfettered access, limited by the half-life of the assessors credentials, for a certain
time period, and/or until that fabrics life has expired; in turn allowing life saving
medical information to be shared, safely and in a secure environment, for the time
allotted.
Business Case – Financial
Problem: XXX
Solution: XXX
Introduction to the Stack
• Intro to hardware and support infrastructure
• Hardware
– Vendor Blade Servers
• HP, IBM, Cisco choices, the original theory was to utilize
HP equipment, i.e. 25 ‘C’ series HP Blade Servers
• Software
Stack Architecture
• Hardware
– Vendor Blade Servers
• HP, IBM, Cisco choices, the original theory was to utilize HP
equipment, i.e. 3 pools, consisting of, 24 (8 per chassis per
pool) ‘C’ series HP Blade Servers, in a (3) NetApp 500 TB
Flexpod Configurations
• Software
– Orchestration and Server Automation
– Access Management, Identity Management
– Management Portal
– User Authentication Portal
– User Environment
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Management Environment
• Administration Portal
– Controls Orchestration
• Creation of Flows
• Delivery of Special Purpose Infrastructure
– Access Control
• Management of Access Control
– Identity Management
• Control and input of Identity Management Environment
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
Admin
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Special Purpose Computing
Environment Instantiation
• Request would be initialized by internal ticket
– Flow would be built
• Providing the functionality, and in this case compliancy
packages, were pre-built, would then be injected into the
flow
– Package retrieval
• Golden (or Root) images, originally a mission protocol, built
into image form, with precise locations, mission status,
mission scope, so on
– Package Instantiation
• Flow would be initialized and executed, based on
predetermined requirements
• Authentication keys are generated, based on prerequisites
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
Admin
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Identity Management
• Access Rights
– Keys would then be assigned to mission handlers,
i.e. mission stakeholders, or in this case project
stakeholders
• Identity Management
– Keys would then be assigned to mission executors,
i.e. operatives, in this case project managers
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Pass-through or pass-off
• Administrators would then be reassigned, and
ownership passed off to the mission, or in this
case project, stakeholders
– Although the pass-off has take place,
administrators still have some authority for
break/fix scenarios
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Authentication Process
• Mission, or in this case project, stakeholders
take control of the Special Purpose Computing
environment
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Next Steps – Authentication Process
• Mission, or in this case project, stakeholders
assign operators
• Verify requirements
• Identify key processes
• In this case, execute compliancy packages
At this point the half life of the authentication
process has been initiated
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Access Rights
• Mission (project) stakeholders initiate
operators requested identities
– Access is granted to operators
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Contained User Authentication Portal
• Mission (project) operators take control of the
user environment, and execute requested
protocols
– This pertains to mission, or project status, mission,
or project objectives
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1 Fabric Instance 2
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Repetition
• The same protocols and procedures would be
executed, in order, subsequent to further
instantiations…
• After each mission, or in this case project,
concludes, the fabrics’ data is warehoused, and
the core destroyed, taking with it all keys
associated, as well as access rights granted…
– Pass-off is then given back to the administrators, to
access raw data collected
• Event correlation, data mining, so on, is initiated
• Depending on the department and/or organization, internal
handling of the data will differ…
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1 Fabric Instance 2
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
User Owner
Instance
Control
Users
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1 Fabric Instance 2 Fabric Instance 3
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
User Owner
Instance
Control
Users
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1 Fabric Instance 2 Fabric Instance 3
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
User Owner
Instance
Control
Users
User Owner
Instance
Control
Users
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
OPEN API LAYER
Identity Management
Access Control
Process Management
Service Oriented
Architecture
Application Servers/Middleware
Orchestration
Provisioning
Element Management
Event Correlation
Storage Management
Data Warehousing Access
Layer
Contained User Portal Environment
Fabric Instance 1 Fabric Instance 2 Fabric Instance 3
Shared Components (Access Management)
Cloud Bursting Methodology – High Level Reference Architecture
Distributed
Fabrics
Management
Control
Environment
Middleware Clients
API Access Layers
Data
Warehouse
User Owner
Admin
Instance
Control
Users
Fabric Administrators
Physical
Infrstructure
User Owner
Instance
Control
Users
User Owner
Instance
Control
Users
POOLS
NAS NAS NAS
Storage
Network
Provisioning
Compute
Provisioning
Pool 1 Pool 2 Pool 3
Round Robin
Load Balancing
Algorithms
Conclusion
As stated, at the beginning, of this presentation,
originally this methodology was created for
purely military application… However I have
seen the necessity to carry it forward to more of
a consumer application, such as fabrics that
further more of a compliancy driven model.
This being said, there would be a need for
business and use cases to determine
sustainability within that model, and
subsequent configuration changes, if need be.
Presentation End
Q & A
Ladies and Gentlemen, thank you for your time and
consideration… I look forward to working with you
all, in the near future. Please feel free to contact
me, with any questions…
Jonathan Spindel
Email: jspindel@ieee.org
Phone: (954) 299-2132

More Related Content

What's hot

Using Time Window Compaction Strategy For Time Series Workloads
Using Time Window Compaction Strategy For Time Series WorkloadsUsing Time Window Compaction Strategy For Time Series Workloads
Using Time Window Compaction Strategy For Time Series Workloads
Jeff Jirsa
 
Eucaristia
EucaristiaEucaristia
Eucaristia
Jean
 
Os essênios e o cristianismo
Os essênios e o cristianismoOs essênios e o cristianismo
Os essênios e o cristianismo
V.X. Carmo
 
Sustentabilidade como valor espiritual
Sustentabilidade como valor espiritualSustentabilidade como valor espiritual
Sustentabilidade como valor espiritual
ARILMA TAVARES
 
A Física Quântica na Vida Real
A Física Quântica na Vida RealA Física Quântica na Vida Real
A Física Quântica na Vida Real
Ademir Alves de Abreu
 
Apostila crisma-2015
Apostila crisma-2015Apostila crisma-2015
Apostila crisma-2015
Catequese Anjos dos Céus
 
Slides: Success Stories for Data-to-Cloud
Slides: Success Stories for Data-to-CloudSlides: Success Stories for Data-to-Cloud
Slides: Success Stories for Data-to-Cloud
DATAVERSITY
 
PARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene Nobre
PARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene NobrePARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene Nobre
PARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene Nobre
Denise Aguiar
 
Your tuning arsenal: AWR, ADDM, ASH, Metrics and Advisors
Your tuning arsenal: AWR, ADDM, ASH, Metrics and AdvisorsYour tuning arsenal: AWR, ADDM, ASH, Metrics and Advisors
Your tuning arsenal: AWR, ADDM, ASH, Metrics and Advisors
John Kanagaraj
 
Gain 3 Benefits with Delta Sharing
Gain 3 Benefits with Delta SharingGain 3 Benefits with Delta Sharing
Gain 3 Benefits with Delta Sharing
Databricks
 
História de Nossa Senhora Aparecida
História de Nossa Senhora AparecidaHistória de Nossa Senhora Aparecida
História de Nossa Senhora Aparecida
Fábio Fernandes
 
Incapucciato legile belagine comentate - v.1.0
Incapucciato   legile belagine comentate - v.1.0Incapucciato   legile belagine comentate - v.1.0
Incapucciato legile belagine comentate - v.1.0
Robin Cruise Jr.
 
Big Data & Data Lakes Building Blocks
Big Data & Data Lakes Building BlocksBig Data & Data Lakes Building Blocks
Big Data & Data Lakes Building Blocks
Amazon Web Services
 
Atendimento espiritual na casa espírita
Atendimento espiritual na casa espíritaAtendimento espiritual na casa espírita
Atendimento espiritual na casa espírita
Alexandre Pinheiro
 
Worst Splunk practices...and how to fix them
Worst Splunk practices...and how to fix themWorst Splunk practices...and how to fix them
Worst Splunk practices...and how to fix them
Splunk
 
Dumitruconstantindulcan mintea de dincolo-
Dumitruconstantindulcan mintea de dincolo-Dumitruconstantindulcan mintea de dincolo-
Dumitruconstantindulcan mintea de dincolo-
ana daniela
 
No Mundo Maior Cap 10 Dolorosa Perda parte 2 de 2
No Mundo Maior Cap 10  Dolorosa Perda parte 2 de 2No Mundo Maior Cap 10  Dolorosa Perda parte 2 de 2
No Mundo Maior Cap 10 Dolorosa Perda parte 2 de 2
Fernando Pinto
 
27 a epifise e o mecanismo da comunicação mediunica
27 a epifise e o mecanismo da comunicação mediunica27 a epifise e o mecanismo da comunicação mediunica
27 a epifise e o mecanismo da comunicação mediunicaAntonio SSantos
 
Os segredos da respiracao
  Os segredos da respiracao  Os segredos da respiracao
Os segredos da respiracao
MICHELLE SMITH C. M. TEIXEIRA
 

What's hot (20)

Using Time Window Compaction Strategy For Time Series Workloads
Using Time Window Compaction Strategy For Time Series WorkloadsUsing Time Window Compaction Strategy For Time Series Workloads
Using Time Window Compaction Strategy For Time Series Workloads
 
Eucaristia
EucaristiaEucaristia
Eucaristia
 
Os essênios e o cristianismo
Os essênios e o cristianismoOs essênios e o cristianismo
Os essênios e o cristianismo
 
Irmãs fox
Irmãs foxIrmãs fox
Irmãs fox
 
Sustentabilidade como valor espiritual
Sustentabilidade como valor espiritualSustentabilidade como valor espiritual
Sustentabilidade como valor espiritual
 
A Física Quântica na Vida Real
A Física Quântica na Vida RealA Física Quântica na Vida Real
A Física Quântica na Vida Real
 
Apostila crisma-2015
Apostila crisma-2015Apostila crisma-2015
Apostila crisma-2015
 
Slides: Success Stories for Data-to-Cloud
Slides: Success Stories for Data-to-CloudSlides: Success Stories for Data-to-Cloud
Slides: Success Stories for Data-to-Cloud
 
PARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene Nobre
PARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene NobrePARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene Nobre
PARTE 4 - O PASSE COMO CURA MAGNÉTICA de Marlene Nobre
 
Your tuning arsenal: AWR, ADDM, ASH, Metrics and Advisors
Your tuning arsenal: AWR, ADDM, ASH, Metrics and AdvisorsYour tuning arsenal: AWR, ADDM, ASH, Metrics and Advisors
Your tuning arsenal: AWR, ADDM, ASH, Metrics and Advisors
 
Gain 3 Benefits with Delta Sharing
Gain 3 Benefits with Delta SharingGain 3 Benefits with Delta Sharing
Gain 3 Benefits with Delta Sharing
 
História de Nossa Senhora Aparecida
História de Nossa Senhora AparecidaHistória de Nossa Senhora Aparecida
História de Nossa Senhora Aparecida
 
Incapucciato legile belagine comentate - v.1.0
Incapucciato   legile belagine comentate - v.1.0Incapucciato   legile belagine comentate - v.1.0
Incapucciato legile belagine comentate - v.1.0
 
Big Data & Data Lakes Building Blocks
Big Data & Data Lakes Building BlocksBig Data & Data Lakes Building Blocks
Big Data & Data Lakes Building Blocks
 
Atendimento espiritual na casa espírita
Atendimento espiritual na casa espíritaAtendimento espiritual na casa espírita
Atendimento espiritual na casa espírita
 
Worst Splunk practices...and how to fix them
Worst Splunk practices...and how to fix themWorst Splunk practices...and how to fix them
Worst Splunk practices...and how to fix them
 
Dumitruconstantindulcan mintea de dincolo-
Dumitruconstantindulcan mintea de dincolo-Dumitruconstantindulcan mintea de dincolo-
Dumitruconstantindulcan mintea de dincolo-
 
No Mundo Maior Cap 10 Dolorosa Perda parte 2 de 2
No Mundo Maior Cap 10  Dolorosa Perda parte 2 de 2No Mundo Maior Cap 10  Dolorosa Perda parte 2 de 2
No Mundo Maior Cap 10 Dolorosa Perda parte 2 de 2
 
27 a epifise e o mecanismo da comunicação mediunica
27 a epifise e o mecanismo da comunicação mediunica27 a epifise e o mecanismo da comunicação mediunica
27 a epifise e o mecanismo da comunicação mediunica
 
Os segredos da respiracao
  Os segredos da respiracao  Os segredos da respiracao
Os segredos da respiracao
 

Viewers also liked

Finding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology StartupFinding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology Startup
Non-dilutive.com
 
Social Media The Good, The Bad And The Ugly
Social Media The Good, The Bad And The UglySocial Media The Good, The Bad And The Ugly
Social Media The Good, The Bad And The Ugly
TNO
 
전국미디어운동네트워크 5년
전국미디어운동네트워크 5년전국미디어운동네트워크 5년
전국미디어운동네트워크 5년
reunion10
 
NRG-Advice | Praktisch Verandermanagement
NRG-Advice | Praktisch VerandermanagementNRG-Advice | Praktisch Verandermanagement
NRG-Advice | Praktisch Verandermanagement
NRG-Advice
 
Passive voice
Passive voicePassive voice
Passive voice
Bradley Wilson
 
van eParticipatie naar cocreatie
van eParticipatie naar cocreatievan eParticipatie naar cocreatie
van eParticipatie naar cocreatie
TNO
 
Keynote Steve Outram Elluminate 12 Nov
Keynote   Steve Outram   Elluminate 12 NovKeynote   Steve Outram   Elluminate 12 Nov
Keynote Steve Outram Elluminate 12 NovJISC SSBR
 
Communication Capacity Development Presentation
Communication Capacity Development PresentationCommunication Capacity Development Presentation
Communication Capacity Development Presentationdshattuck
 
Project Management Cornucopia
Project Management  CornucopiaProject Management  Cornucopia
Project Management Cornucopia
MarkKohls
 
Youth Announcements 11-22-2009
Youth  Announcements 11-22-2009Youth  Announcements 11-22-2009
Youth Announcements 11-22-2009realifesigma
 
Greece (acrostic).Activity 3. By Michael Terezakis
Greece (acrostic).Activity 3. By Michael TerezakisGreece (acrostic).Activity 3. By Michael Terezakis
Greece (acrostic).Activity 3. By Michael TerezakisCarlos Ajamil Royo
 
L\'Affare dell\'Influenza A
L\'Affare dell\'Influenza AL\'Affare dell\'Influenza A
L\'Affare dell\'Influenza A
Andrea Fabrizi
 
Presentation Prepvisit-09
Presentation Prepvisit-09Presentation Prepvisit-09
Presentation Prepvisit-09
Carlos Ajamil Royo
 
Macromolecules Structure And Function
Macromolecules Structure And FunctionMacromolecules Structure And Function
Macromolecules Structure And FunctionHyde Park
 
APHA Tabora, Tanzania
APHA Tabora, TanzaniaAPHA Tabora, Tanzania
APHA Tabora, Tanzania
dshattuck
 
Tecnologías Web - paviles.net - TransCyberiano
Tecnologías Web - paviles.net - TransCyberianoTecnologías Web - paviles.net - TransCyberiano
Tecnologías Web - paviles.net - TransCyberiano
Pablo Aviles
 

Viewers also liked (20)

Ethical Issues
Ethical IssuesEthical Issues
Ethical Issues
 
Finding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology StartupFinding Non-dilutive Funding for Your Technology Startup
Finding Non-dilutive Funding for Your Technology Startup
 
Social Media The Good, The Bad And The Ugly
Social Media The Good, The Bad And The UglySocial Media The Good, The Bad And The Ugly
Social Media The Good, The Bad And The Ugly
 
전국미디어운동네트워크 5년
전국미디어운동네트워크 5년전국미디어운동네트워크 5년
전국미디어운동네트워크 5년
 
NRG-Advice | Praktisch Verandermanagement
NRG-Advice | Praktisch VerandermanagementNRG-Advice | Praktisch Verandermanagement
NRG-Advice | Praktisch Verandermanagement
 
Passive voice
Passive voicePassive voice
Passive voice
 
van eParticipatie naar cocreatie
van eParticipatie naar cocreatievan eParticipatie naar cocreatie
van eParticipatie naar cocreatie
 
Keynote Steve Outram Elluminate 12 Nov
Keynote   Steve Outram   Elluminate 12 NovKeynote   Steve Outram   Elluminate 12 Nov
Keynote Steve Outram Elluminate 12 Nov
 
Communication Capacity Development Presentation
Communication Capacity Development PresentationCommunication Capacity Development Presentation
Communication Capacity Development Presentation
 
Project Management Cornucopia
Project Management  CornucopiaProject Management  Cornucopia
Project Management Cornucopia
 
Youth Announcements 11-22-2009
Youth  Announcements 11-22-2009Youth  Announcements 11-22-2009
Youth Announcements 11-22-2009
 
Greece (acrostic).Activity 3. By Michael Terezakis
Greece (acrostic).Activity 3. By Michael TerezakisGreece (acrostic).Activity 3. By Michael Terezakis
Greece (acrostic).Activity 3. By Michael Terezakis
 
L\'Affare dell\'Influenza A
L\'Affare dell\'Influenza AL\'Affare dell\'Influenza A
L\'Affare dell\'Influenza A
 
U.K. Presentation
U.K. PresentationU.K. Presentation
U.K. Presentation
 
Presentation Prepvisit-09
Presentation Prepvisit-09Presentation Prepvisit-09
Presentation Prepvisit-09
 
Macromolecules Structure And Function
Macromolecules Structure And FunctionMacromolecules Structure And Function
Macromolecules Structure And Function
 
APHA Tabora, Tanzania
APHA Tabora, TanzaniaAPHA Tabora, Tanzania
APHA Tabora, Tanzania
 
Turkish Traditional Menu
Turkish Traditional MenuTurkish Traditional Menu
Turkish Traditional Menu
 
Tecnologías Web - paviles.net - TransCyberiano
Tecnologías Web - paviles.net - TransCyberianoTecnologías Web - paviles.net - TransCyberiano
Tecnologías Web - paviles.net - TransCyberiano
 
Gvl Berkeley University Of Melbourne Nirmalathas
Gvl Berkeley University Of Melbourne NirmalathasGvl Berkeley University Of Melbourne Nirmalathas
Gvl Berkeley University Of Melbourne Nirmalathas
 

Similar to Cloud bursting methodology

Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
Rahul Gurnani
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
CloudPassage
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
maheralgamdi
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
bhanu krishna
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcDataTactics
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
Uni Systems S.M.S.A.
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
Pawan Sharma
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
Devyani Vaidya
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
Anya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptAnya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.ppt
TaskinKhaleque
 
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
Sharique Rizvi
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud Forensics
Sharique Rizvi
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
CloudHesive
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Abderrahmane TEKFI
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
William McBorrough
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
Kiran Kumar Chittoori
 
Cloud computing in biomedicine intel talk
Cloud computing in biomedicine intel talkCloud computing in biomedicine intel talk
Cloud computing in biomedicine intel talk
Ketan Paranjape
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
Amazon Web Services
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
Juan Pablo
 

Similar to Cloud bursting methodology (20)

Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Anya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptAnya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.ppt
 
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud Forensics
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Cloud computing in biomedicine intel talk
Cloud computing in biomedicine intel talkCloud computing in biomedicine intel talk
Cloud computing in biomedicine intel talk
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Cloud bursting methodology

  • 1. Accolades Firstly, I’d like to thank everyone attending, taking the time out of their day, and allowing me to present… This methodology was developed for military application, and therefore this presentation is the theory of applying this same methodology to a more consumer based model…
  • 2. Cloud Burst Methodology • Methodology • Explanations of Cloud Burst Methods • Network Access Methodologies – Inclusive of Cloud Bursting • Identity Management Methodologies, inclusive of Cloud Bursting • Special Purpose Computing – Cloud Bursting • Business and Use Cases Applied to Special Purpose Computing • High Level Architecture Walkthrough • Q & A
  • 3. Cloud Burst Methodology Cloud Burst Methodology is the practical theory, and application of, the formation of an autonomous cloud computing fabric, intended for the creation of dedicated fabrics, established for single use, to officiate a process/mission/directive, after which that fabrics contents are then warehoused, and the core destroyed, eliminating any access structure and/or access to the data. The data is warehoused in a separate environment, with exclusionary access rights, different from and in contrast to the rights assessed within the special purpose fabric.
  • 4. Cloud Burst Methodologies - Explained The concept of ‘Cloud Burst Methodology’ came from a project named ‘MVII’ Vehicle Intelligence Initiative for Mobility, and the use of a technology terms Ad-Hoc VPN spawning. Ad-Hoc VPN spawning would occur, as one MVII equipped car approached another, creating an Ad-Hoc network VPN, via a spontaneously created network access key, then piggybacking to the POP (Point of Presence). The process in which, was spontaneously created, made the chance of penetration, or intrusion almost negligible.
  • 5. Network Access Methodologies – Explained The key purpose of Network, or Systems security is to create an environment where security ‘remediation’ was osmotic, establishing a healthy environment where CISO’s could rectify issues. The key issue here is the word remediate, meaning to cure a defect, and/or issue. Even with the current behavioral ‘AI’ technology being implemented within standardized Network Security platforms, we are still ‘remediating’ network penetration issues rather then proactively avoiding them.
  • 6. Security Implications Such as, in any network access structure, the more perpetual time, users, and traffic in/out of even a contained network unit increases the possibility of penetration and/or intrusion, either by an internal, or external entities.
  • 7. Access Management Solutions Cloud Burst methodologies can, by proxy, mitigate possible penetrations/intrusions, not by instantiating new network protocols, but by limiting access, to single use fabrics, disallowing perpetual access by utilizing these units for special purpose computing procedures…
  • 8. Special Purpose Computing Solutions • Special Purpose (Use) Computing – Using special purpose fabrics, for single use computing instances • Such as transactional processing during high traffic periods • Limit Network Accessibility – By limited access • Access Control – By instantiating spontaneous user controls • Identity Management
  • 9. Access Management Architecture Special purpose computing reduces the chances of intrusion by establishing access rights, via 1024 bit encrypted keys, spontaneously created at instantiation. These key pairs have a half life, that of the users access capabilities and or accessibility, and are tied to that specific fabric.
  • 10. Cloud Burst Methodology • Practical Applications – Business Cases – Use Cases • Best Practices – Methodology – Architecture
  • 11. Practical Applications of a Cloud Burst Methodology • Originally designed surrounding a military application – Other potential applications • High traffic, high volume shopping seasons – PCI, and SOX compliancy packages • Compliancy driven arenas, such as health care, specifically in disaster situations – HIPAA, PCI, and SOX compliancy packages • Mergers and Acquisitions – SOX, and other compliancy packages
  • 12. Business Case – Retail Problem: Majority of credit, checking account, and identity theft occurs during high traffic seasonal shopping periods • Christmas, Thanksgiving, Easter, New Release, other applications Solution: Using a derivative of a Cloud Burst Methodology, onboarding compliancy packages, you can process transactions, utilize CRM packages, create management protocols, and destroy the fabric after use, thereby eliminating all access control assigned to that fabric, and any other associations…
  • 13. Business Case – Medical HIPAA Problem: In 2014 the clinical application, of the new HIPAA laws, will come into effect. HIPAA will now not only govern patient care, but also the application of new laws surrounding DLP, Network Security, and systems hardening… • Patient file storage • Patient demographic storage • Medical records storage • Patient care applications Solution: Using a derivative of a Cloud Burst Methodology, onboarding compliancy packages, you can establish special purpose cloud to officiate disaster initiatives, such as Hurricane Katrina, or Sandy, for the soul purpose of medical care, storage of documents, patients data, morgue and autopsy data. This would allow that facility to bring a fully functioning, prebuilt fabric, up in minutes. This in turn would allow unfettered access, limited by the half-life of the assessors credentials, for a certain time period, and/or until that fabrics life has expired; in turn allowing life saving medical information to be shared, safely and in a secure environment, for the time allotted.
  • 14. Business Case – Financial Problem: XXX Solution: XXX
  • 15. Introduction to the Stack • Intro to hardware and support infrastructure • Hardware – Vendor Blade Servers • HP, IBM, Cisco choices, the original theory was to utilize HP equipment, i.e. 25 ‘C’ series HP Blade Servers • Software
  • 16. Stack Architecture • Hardware – Vendor Blade Servers • HP, IBM, Cisco choices, the original theory was to utilize HP equipment, i.e. 3 pools, consisting of, 24 (8 per chassis per pool) ‘C’ series HP Blade Servers, in a (3) NetApp 500 TB Flexpod Configurations • Software – Orchestration and Server Automation – Access Management, Identity Management – Management Portal – User Authentication Portal – User Environment
  • 17. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 18. Management Environment • Administration Portal – Controls Orchestration • Creation of Flows • Delivery of Special Purpose Infrastructure – Access Control • Management of Access Control – Identity Management • Control and input of Identity Management Environment
  • 19. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse Admin Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 20. Special Purpose Computing Environment Instantiation • Request would be initialized by internal ticket – Flow would be built • Providing the functionality, and in this case compliancy packages, were pre-built, would then be injected into the flow – Package retrieval • Golden (or Root) images, originally a mission protocol, built into image form, with precise locations, mission status, mission scope, so on – Package Instantiation • Flow would be initialized and executed, based on predetermined requirements • Authentication keys are generated, based on prerequisites
  • 21. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse Admin Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 22. Identity Management • Access Rights – Keys would then be assigned to mission handlers, i.e. mission stakeholders, or in this case project stakeholders • Identity Management – Keys would then be assigned to mission executors, i.e. operatives, in this case project managers
  • 23. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 24. Pass-through or pass-off • Administrators would then be reassigned, and ownership passed off to the mission, or in this case project, stakeholders – Although the pass-off has take place, administrators still have some authority for break/fix scenarios
  • 25. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 26. Authentication Process • Mission, or in this case project, stakeholders take control of the Special Purpose Computing environment
  • 27. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 28. Next Steps – Authentication Process • Mission, or in this case project, stakeholders assign operators • Verify requirements • Identify key processes • In this case, execute compliancy packages At this point the half life of the authentication process has been initiated
  • 29. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 30. Access Rights • Mission (project) stakeholders initiate operators requested identities – Access is granted to operators
  • 31. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 32. Contained User Authentication Portal • Mission (project) operators take control of the user environment, and execute requested protocols – This pertains to mission, or project status, mission, or project objectives
  • 33. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Fabric Instance 2 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 34. Repetition • The same protocols and procedures would be executed, in order, subsequent to further instantiations… • After each mission, or in this case project, concludes, the fabrics’ data is warehoused, and the core destroyed, taking with it all keys associated, as well as access rights granted… – Pass-off is then given back to the administrators, to access raw data collected • Event correlation, data mining, so on, is initiated • Depending on the department and/or organization, internal handling of the data will differ…
  • 35. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Fabric Instance 2 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure User Owner Instance Control Users POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 36. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Fabric Instance 2 Fabric Instance 3 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure User Owner Instance Control Users POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 37. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Fabric Instance 2 Fabric Instance 3 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure User Owner Instance Control Users User Owner Instance Control Users POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 38. OPEN API LAYER Identity Management Access Control Process Management Service Oriented Architecture Application Servers/Middleware Orchestration Provisioning Element Management Event Correlation Storage Management Data Warehousing Access Layer Contained User Portal Environment Fabric Instance 1 Fabric Instance 2 Fabric Instance 3 Shared Components (Access Management) Cloud Bursting Methodology – High Level Reference Architecture Distributed Fabrics Management Control Environment Middleware Clients API Access Layers Data Warehouse User Owner Admin Instance Control Users Fabric Administrators Physical Infrstructure User Owner Instance Control Users User Owner Instance Control Users POOLS NAS NAS NAS Storage Network Provisioning Compute Provisioning Pool 1 Pool 2 Pool 3 Round Robin Load Balancing Algorithms
  • 39. Conclusion As stated, at the beginning, of this presentation, originally this methodology was created for purely military application… However I have seen the necessity to carry it forward to more of a consumer application, such as fabrics that further more of a compliancy driven model. This being said, there would be a need for business and use cases to determine sustainability within that model, and subsequent configuration changes, if need be.
  • 40. Presentation End Q & A Ladies and Gentlemen, thank you for your time and consideration… I look forward to working with you all, in the near future. Please feel free to contact me, with any questions… Jonathan Spindel Email: jspindel@ieee.org Phone: (954) 299-2132

Editor's Notes

  1. Firstly, I’d like to thank everyone attending, taking the time out of their day, and allowing me to present, I hope computing theory doesn’t bore you too much… What is cloud computing? Really an old idea, (spanning from the AS 400 series Mainframe days, which touted the early use of ‘Virtualization’, and ‘VDI’, Virtual Desktop Infrastructure), officiated with new technology. The reason I bring this up, is not to go into the typical NIST definition of cloud, as I’m sure we call know and understand the terminology, but to preface this presentation with a little bit of my personal career path, as it applies to this methodology. From the beginning of my career, I have been greatly interested, in what was originally termed ‘Distributed Networking and Computing’, as we know now, to be ‘Cloud’. My first introduction to ‘Cloud’ was in my early institutional years, and a project termed “Planet Lab’, which was created to serve as be a virtual lab, containing virtual slices, hosted by virtualized, light weight, Linux kernels. From there on out, I have pretty much focused on Cloud Computing, and the theory based research of distributed computing… The concept of a Cloud Burst methodology, as I’ll later explain more in depth, was originally applied to the Israeli Military, on my sabbatical in Israel, in reference to reconnaissance drone missions. Now there is only so much I can digress into the actual military model, however the presentation surrounds the application of this methodology in more of consumer based model. My intention is not to challenge current network or systems security methodologies, rather introduce a new application of those methodologies, in an innovative format.
  2. During this presentation I’d like to touch on several points, to bring across the overall definition of a Cloud Burst Methodology. Firstly I’d like to touch on the Methodology itself, then delve into a brief explanation of the methods, surrounding the methodology itself. After that brief overview, I’ll go into the network access, and identity management methodologies that go into the overall architect, then segue into, what I like to term, Special Purpose, or use, computing… Once we cover the overall methodology, I’ll digress into the business and use cases I felt to be an appropriate vehicle into the consumer marketplace, after which we’ll take a small dive into the high level architecture of the technology viewpoint of cloud bursting. I’ll end the presentation with a short Q & A session, however my objective is to cohesively tie this together, to avoid wasting too much of your valuable time.
  3. An introduction to Cloud Burst Methodology. The purpose of this application is the instantiation, in practical theory, is the formation of an autonomous unit, or special purpose, computing fabric. This fabrics’ creation hinges upon the application of a single use process, to officiate a mission, or in this case project objective, and to create a platform for those operators to work on, for a limited time period, in a safe/secure environment. After the mission/project has been executed and the process has been completed, the fabrics core then is destroyed, storing the raw data in a centralized warehouse, eliminating the access structure created, and or overall access to the data, by the original operators. The data, ultimately stored, in a different environment, with exclusionary access rights, different from, and in contract to, those issued to mission/project stake holders and/or operators.
  4. The idea, I coined a Cloud Burst Methodology, originally came from a DOT (Department of Transportation) project, I work on over a decade ago, named MVII (Vehicle Intelligence Initiative for Mobility. A project designed to use specially equipped vehicles, in more of a MESH network environment, using themselves as bouncing, or repeating points, for perpetual connectivity of the smart highway system. The idea, specifically came from, what is termed an ‘Ad-Hoc VPN, a spontaneous Virtual Private Network created for vehicles, in range, to bounce or repeat their signals, connecting to its’ parent a POP (Point of Presence) located along the freeways. This project was created in theory, and was a research grant, leading to an eventual design, but was before technology was able to support the magnanimity of this design. Nevertheless, I derived the idea, from the theoretical creation of that ‘Ad-Hoc’ VPN…
  5. The purpose of this slide, isn’t to argue the merits of a network/systems security platform, as they are a direct necessity to any secured environment. My main point is to highlight that regardless what protocols we set forth, or precautions we take, we still find ourselves trailing behind individuals who thoughts are to do harm with malice… Whether is be for recreation, the intention of syphoning funds from an account, or the unauthorized access of proprietary data, there will always be elements that intend to breach a network, we still find ourselves remediating those issues, rather then proactively avoiding them. By no means does this mean the parents network should not be protected, only that the fabric itself, since it’s inherent structure is one of spontaneity, simply reduces the risk of potential penetration, yet does not eliminate such risk, ergo that being said, a comprehensive support structure is certainly necessary.
  6. In reference to the last slide, again noting this methodology does not replace a comprehensive security support environment, it does however add to the efficiency, and reduce the chances of infiltration, corruption, or theft of data. Simply put, the more time we perpetually allow the same users, regardless of forced password or username changes, we by proxy, increase the chances of such an event transpiring… This methodology denotes that fact, and allows for the creation of a dynamic accessibility structure, with access rights assigned at instantiation, and after completion those rights are as if they never existed.
  7. The methodology itself was designed to utilize stealth tactics, such as spontaneous instantiation, access rights assigned at creation, utilizing a strong support structure, and destruction of the core, thereby destroying any access rights that were assigned at the flow level.
  8. Special purpose, or use, computing was a term coined in the early 1980’s, much like ‘Distributed Computing’, or ‘Cloud’, I’ve repurposed the term, (A LITTLE TANGENT) originally used for SUN Microsystems DEC VAX computers, in the study of lattice quantum chromodynamics (QCD), essentially the particles, specifically Quarks and Gluons, not to delve too far into particle physics, and truly make this already boring presentation much worse… loosely translated how particles, precisely related to the exchange proton particulates in an electromagnetically changed field. The term seemed to be a perfect fit, considering its’ course, and how this methodology, designed for military use, functioned to assess and execute a single task, such as a mission, project so on…
  9. Special purpose computing reduces the chances of intrusion by establishing access rights, via 1024 bit encrypted keys, spontaneously created at instantiation. These key pairs have a half life, that of the users access capabilities and or accessibility, and are tied to that specific fabric. Not to delve to far into encryption and access related to cryptography, as I don’t want to veer from the overall methodology, as currently the technology has changed, especially with VMware instituting 2048 bit encrypted keys…
  10. The application, or use, in other arenas is a practice I’ve only just started to address. Through some research, and common knowledge, associated with some of the assumptions I’ve made, I opted on three arenas, mentioned on the next slide. In theory, be at as it may, this methodology was originally designed specifically for military application, however as of late, some of the security procedures, being implemented in these three groups have adopted some of the same processes and procedures, making it a prime choice to hypothesize computing theory.
  11. As I’ve explained in the previous slides, Cloud Burst Methodology, was though of, and implemented in a military application. I’ve taken a few different private and public sector business cases, and put them to pen and paper, localizing their potential, as candidates, and categorizing the results based on necessity .
  12. Problem: Majority of credit, checking account, and identity theft occurs during high traffic seasonal shopping periods - Christmas, Thanksgiving, Easter, New Release, other applications Solution: Using a derivative of a Cloud Burst Methodology, onboarding compliancy packages, you can process transactions, utilize CRM packages, create management protocols, and destroy the fabric after use, thereby eliminating all access control assigned to that fabric, and any other associations…
  13. Problem: In 2014 the clinical application, of the new HIPAA laws, will come into effect. HIPAA will now not only govern patient care, but also the application of new laws surrounding DLP, Network Security, and systems hardening… - Patient file storage - Patient demographic storage - Medical records storage - Patient care applications Solution: Using a derivative of a Cloud Burst Methodology, onboarding compliancy packages, you can establish special purpose cloud to officiate disaster initiatives, such as Hurricane Katrina, or Sandy, for the soul purpose of medical care, storage of documents, patients data, morgue and autopsy data. This would allow that facility to bring a fully functioning, prebuilt fabric, up in minutes. This in turn would allow unfettered access, limited by the half-life of the assessors credentials, for a certain time period, and/or until that fabrics life has expired; in turn allowing life saving medical information to be shared, safely and in a secure environment, for the time allotted.
  14. I was going to write this amazing business case, for the financial sector, however with the IRS scandal, and every other god forsaken scandal out there, no one seems to be paying too much attention to them anymore anyway, so I thought we would just skip this section. No, truthfully, I just didn’t have enough time to do the due diligence necessary…
  15. Intro to hardware and support infrastructure Hardware Vendor Blade Servers HP, IBM, Cisco choices, the original theory was to utilize HP equipment, i.e. 25 ‘C’ series HP Blade Servers Software
  16. Hardware Vendor Blade Servers HP, IBM, Cisco choices, the original theory was to utilize HP equipment, i.e. 3 pools, consisting of, 24 (8 per chassis per pool) ‘C’ series HP Blade Servers, in a (3) NetApp 500 TB Flexpod Configurations Software Orchestration and Server Automation Access Management, Identity Management Management Portal User Authentication Portal User Environment
  17. This is a representation of a full stack, consisting of an several components mentioned before, namely the SOA backbone, infrastructure as a service model, orchestration, automation fabrics, as well as access control, identity management, and other shared components
  18. Administration Portal Controls Orchestration Creation of Flows Delivery of Special Purpose Infrastructure Access Control Management of Access Control Identity Management Control and input of Identity Management Environment
  19. Request would be initialized by internal ticket Flow would be built Providing the functionality, and in this case compliancy packages, were pre-built, would then be injected into the flow Package retrieval Golden (or Root) images, originally a mission protocol, built into image form, with precise locations, mission status, mission scope, so on Package Instantiation Flow would be initialized and executed, based on predetermined requirements Authentication keys are generated, based on prerequisites
  20. Access Rights Keys would then be assigned to mission handlers, i.e. mission stakeholders, or in this case project stakeholders Identity Management Keys would then be assigned to mission executors, i.e. operatives, in this case project managers
  21. Administrators would then be reassigned, and ownership passed off to the mission, or in this case project, stakeholders Although the pass-off has take place, administrators still have some authority for break/fix scenarios
  22. Mission, or in this case project, stakeholders take control of the Special Purpose Computing environment
  23. Mission, or in this case project, stakeholders assign operators Verify requirements Identify key processes In this case, execute compliancy packages At this point the half life of the authentication process has been initiated
  24. Mission (project) stakeholders initiate operators requested identities Access is granted to operators
  25. Mission (project) operators take control of the user environment, and execute requested protocols This pertains to mission, or project status, mission, or project objectives
  26. The same protocols and procedures would be executed, in order, subsequent to further instantiations… After each mission, or in this case project, concludes, the fabrics’ data is warehoused, and the core destroyed, taking with it all keys associated, as well as access rights granted… Pass-off is then given back to the administrators, to access raw data collected Event correlation, data mining, so on, is initiated Depending on the department and/or organization, internal handling of the data will differ…
  27. As stated, at the beginning, of this presentation, originally this methodology was created for purely military application… However I have seen the necessity to carry it forward to more of a consumer application, such as fabrics that further more of a compliancy driven model. This being said, there would be a need for business and use cases to determine sustainability within that model, and subsequent configuration changes, if need be.
  28. Ladies and Gentlemen, thank you so much for your time and consideration… I look forward to working with you all, in the near future. Please feel free to contact me, with any questions…