SlideShare a Scribd company logo
1
Cloud Computing –
Opportunities, Definitions,
Options, and Risks (Part-1)
Manoj Kumar (Sr. Architect)
2
3
Cloud Market
Business and Technical benefits
What is cloud computing? Cloud Architecture?
Cloud Deployment models
Leading cloud providers
Dev models: IaaS Vs PaaS Vs SaaS
Cloud Migration strategy and challenges
Cloud market growth
4
Source: KPMG(2015)
Cloud is one of the top 10 strategic technology trends
Business drivers for cloud
Lower TCO
Just-in-time Infrastructure to scale
Higher Resource Utilization Rate
CAPEX  OPEX
Focus on core business apps
Pay as you go instead of long-term contracts
Reduced administration effort
Reduced time to market
5
Better Resource Utilization with Cloud
6
With Cloud Re-allocate IT expenditures
7
DATACENTER COSTS
Deploy 10%
Operate 25%
Support 10%
Facilities 7%
Network 11%
SW 9%
HW 23%
50%
Labor
Expense
Cloud Computing reduces
Labor costs
Cloud Computing reduces
Facilities, Network,
Hardware, Software
maintenance costs
Plan 5%
50%
Other
Expenses
Most companies today spend roughly 80% of their IT budget on
operations and maintenance.
Cloud Computing gives:
8
Cloud Infrastructure (Mega Datacenters)
9
With industry best practices. Billions of dollar pumped in
every year. More than $15Billion by Microsoft alone.
Global reach: Azure Footprint (Hyper scale)
10
Top reasons for cloud rush
11
Factors that denote significant impact include a high potential for
disruption to the business, end users or IT, the need for a major
investment, or the risk of being late to adopt.
Technical Benefits of Cloud Computing
Automation – “Scriptable infrastructure”- easy DevOps
Auto/ Proactive scaling
Improved Testability: On demand “instant test lab” with pre-configured
environments only for the duration of testing phase.
Easy Disaster Recovery and Business Continuity: Take
advantage of geo-distribution and replicate the environment in other locations
within minutes at much lower TCO.
Out of box Load balancing / Traffic management: “Overflow”
the traffic to the cloud
12
13
Common Cloud Terms
14
Cloud Computing,
Public Cloud,
Private Cloud,
Hybrid cloud, Govt Cloud
Compute, Storage
(Blob/Table/Queue),
Service bus, IoT, Big Data
IaaS, PaaS,
SaaS, DaaS
Elasticity,
Scale up/down/in/out
latency,
availability,
reliability
What is cloud computing?
“the practice of using a network of remote servers hosted
on the Internet to store, manage, and process data, rather
than a local server or a personal computer”
“cloud computing relies on sharing of resources to achieve
coherence and economies of scale”
15
The Next Frontier - On Demand Solutions For Your Business
Cloud
Web
Client-Server Computing
Personal Computers
Mainframe
Cloud: High Level Architecture
16
Giant
SaaS
Cloud – Enabling technology
Virtualization
An abstraction of an execution environment that can be made
dynamically available to authorized clients by using well-defined
protocols, Resource quota (e.g. CPU, memory share), and Software
configuration (e.g. O/S, provided services)
SOA
Cloud computing adopts concepts from Service-oriented
Architecture (SOA): Composition of services with easy global
access.
17
Cloud VMs
18
Hardware
Virtual Machine Monitor (VMM) / Hypervisor
Guest OS
(Linux)
Guest OS
(NetBSD)
Guest OS
(Windows)
VM VM VM
AppApp AppAppApp
Xen
VMWare
UML
Denali
etc.
Performance: Para-virtualization (e.g. Xen) is very close to raw
physical performance!
Cloud – Virtualization Advantages
Autonomic computing automates the process through which the user
can provision resources (VMs) on-demand.
Provides the agility required to speed up IT operations
Reduces cost by increasing infrastructure utilization.
By minimizing user involvement, automation speeds up the process,
reduces labor costs and reduces the possibility of human errors.
19
Cloud : Elasticity
20
Elastic Cloud VMs
Scale Up/Down:
Cloud computing shares characteristics with other
computing techniques
Client–server model — request & response
Grid computing — Distributed and parallel computing (super and virtual computer
is composed of a cluster of networked, loosely coupled computers)
Mainframe computer
Utility computing — similar to a traditional public utility, such as electricity
Peer-to-peer — Participants are both suppliers and consumers of resources (in
contrast to the traditional client–server model)
21
Essential characteristics for cloud apps
22
National Institute of Standards and Technology's (NIST) identifies "five
essential characteristics"
• On-demand self-service: Manual or Automatic
• Broad network access: Easily available for heterogeneous thin or thick client
platforms (e.g., mobile phones, tablets, laptops, and workstations)
• Resource pooling: Resources are pooled to serve multiple consumers using a
multi-tenant model with different physical and virtual resources dynamically
assigned and reassigned
• Rapid elasticity: Capabilities can be elastically provisioned and released to
scale rapidly outward and inward. Limitless.
• Measured service: Resource usage can be monitored, controlled, and
reported, providing transparency for both the provider and consumer.
Cloud Deployment Models
23
Govt
Cloud
Security in Cloud (Azure)
Identity and access: WAAD and Multi-Factor Authentication
Encryption and key management: Implement additional encryption and manage
your own keys, Azure Key Vault to manage key.
Network security: Site-to-site VPN (On-premise to Azure migration). Min SSL for
internal comm.
Threat management: Azure offers Microsoft Antimalware for cloud services and
virtual machines
Monitoring, logging, and reporting: Centralized monitoring and analysis systems
that provide continuous visibility and timely alerts
Penetration testing: Microsoft conducts regular penetration testing to improve Azure
security
24
Risks with Cloud Computing
Stored or data-in-transit might not be safe
Stored data can be lost
Requires a constant Internet connection
Does not work well with low-speed connections
Can be Slow: Difference of Web vs Desktop app Capabilities
Not easy to switch cloud provider
25
(Nothing Unique, many of these exist for on premise)
Options – Leading Cloud services providers
Amazon (AWS-IaaS)
Microsoft (PaaS/IaaS – Azure)
Google (SaaS, PaaS)
VMware (vCloud)
Rackspace (IaaS)
Salesforce.com (SaaS – CRM)
26
Market Share (2014):
• Joyent (3*aaS)
• IBM (Blue Cloud)
• Net Suite (SaaS - SuitCloud)
• 3Tera (CloudWare)
Some of the newcomers in the market are:
• Enomaly (services to cloud providers)
• GoGrid (IaaS)
AWS:
28%
Microsoft
: 10%
IBM: 7%
Google: 5%,
Salesforce:
4%,
Rackspace
3%
Year on year growth (2014):
Microsoft (96%), Google (88%),
Amazon (51%) and IBM (48%)
Microsoft’s Azure
since 2010
4 general categories: Build infrastructure, Develop modern
applications, Gain insights from data, and Manage identity and
access
Features: Hybrid app development, Identity management,
auditing, encryption key creation/control/storage, monitoring
and logging, powerful analytics (HDInsight Hadoop framework),
and Apache Storm (data stream processing) and others.
27
Azure site – Demo
http://azure.microsoft.com/en-in/
28
AWS (Amazon web services)
since 2006
4 core features: Compute, Storage & Content Delivery,
Databases, and Networking
Features: Identity management, auditing, encryption key
creation/control/storage, monitoring and logging, powerful
analytics (Amazon EMR Hadoop framework), and Kinesis (data
stream processing) and others.
29
AWS site – Demo
http://aws.amazon.com/
30
Azure vs AWS Cloud – Feature comparisons
31
Parameter Azure Amazon
Enterprise feature
coverage
75 92
More features 7 of 8 categories
Required feature not in
Azure
18
Capacity 5 times of next 14 cloud
competitors combined
Quality Much better at scale and
public cloud offering
Acceptability Good because of Microsoft
existing relationship with
enterprise customers
More discount
Hybrid Seamless extension of existing
on-premise ops.
Relies on partner
Better at DR 60 day notice for SLA review 30 days
Govt Cloud Azure Government GovCloud
OS Windows/Linux(SUSE & Oracle)
No RedHat (RHEL)
All
Cloud Price comparisons: AWS vs Azure vs Google
32
Per GB of data
Cloud Dev Models: IaaS / PaaS / SaaS
33
34
IaaS/PaaS/SaaS: Business Use cases
35
UseCase?
Dev Model Common business use cases
IaaS Extend on-premise data center infrastructure,
Quickly move existing appln to cloud (Like Legacy apps)
PaaS New development
Redesign
Increased developers productivity and faster time-to-market
SaaS Collaboration software – Email, Office 365
CRM, HR systems
Advantages/Disadvantages of PaaS vs IaaS
36
Model Advantage Disadvantage
PaaS Business:
• Low TCO
• Accelerates Innovation
Technical:
• Better/Easier DevOps
• Mitigates Platform Risks
Business:
• Harder Transition to Cloud
Technical:
• Application Portability Issues
• Not as mature as IaaS
• Different Codebases for Cloud and On-
premise
IaaS Business:
• Quick transition to Cloud
Technical:
• Mature ISV Ecosystem
• Complete Control
• Solution Portability
Business:
• Expensive to Operate
• Slows Down Innovation
• Security Risks from Unpatched Servers
Technical:
• Difficult to Maintain Legacy Apps
• Requires Rigorous Processes for Enabling
DevOps
• Requires Rigorous Server Maintenance
Processes
Application’s cloud migration strategy
37
Common Cloud Terms : Revisited
38
Cloud Computing,
Public Cloud,
Private Cloud,
Hybrid cloud, Govt Cloud
Compute, Storage
(Blob/Table/Queue,
Service bus, IoT, Big
Data
IaaS, PaaS,
SaaS, DaaS
Elasticity, Scale
up/down/in/out
latency,
availability,
reliability
39
40
Thank You
Manoj Kumar
Manoj.kumar11@cognizant.com

More Related Content

What's hot

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
Lorenzo Barbieri
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
Alert Logic
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
Cheah Eng Soon
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
vivekbhat
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Alert Logic
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
Alert Logic
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Alert Logic
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
Lalit Rawat
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
Alert Logic
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
Allen Brokken
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
Karl Ots
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
Alert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Alert Logic
 
Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
Alert Logic
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
Scott Hoag
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
Alert Logic
 

What's hot (20)

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 

Viewers also liked

Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesPiloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Nitin Badjatia
 
IBM Connect: Enabling Culture Change to Transform into a Social Business
IBM Connect: Enabling Culture Change to Transform into a Social BusinessIBM Connect: Enabling Culture Change to Transform into a Social Business
IBM Connect: Enabling Culture Change to Transform into a Social Business
Meredith B. Singer
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Alessandro Iudica
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
RedZone Technologies
 
The Cloud: Privacy and Forensics
The Cloud: Privacy and ForensicsThe Cloud: Privacy and Forensics
The Cloud: Privacy and Forensics
Info_Studies_Aberystwyth
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
Great Bay Software
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Kuniyasu Suzaki
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
Azure Group
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
Brent Muir
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
sdavis532
 
2017 03-01-forensics 1488330715
2017 03-01-forensics 14883307152017 03-01-forensics 1488330715
2017 03-01-forensics 1488330715
APNIC
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
INSIGHT FORENSIC
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
Revolution Analytics
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The Internet
Carl J. Levine
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
Digital Bond
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Positive Hack Days
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
Camilo Fandiño Gómez
 

Viewers also liked (20)

Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesPiloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
 
IBM Connect: Enabling Culture Change to Transform into a Social Business
IBM Connect: Enabling Culture Change to Transform into a Social BusinessIBM Connect: Enabling Culture Change to Transform into a Social Business
IBM Connect: Enabling Culture Change to Transform into a Social Business
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
The Cloud: Privacy and Forensics
The Cloud: Privacy and ForensicsThe Cloud: Privacy and Forensics
The Cloud: Privacy and Forensics
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
2017 03-01-forensics 1488330715
2017 03-01-forensics 14883307152017 03-01-forensics 1488330715
2017 03-01-forensics 1488330715
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The Internet
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 

Similar to Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)

Diadem Technologies - Cloud Computing - Nasscom Workshop
Diadem Technologies - Cloud Computing - Nasscom WorkshopDiadem Technologies - Cloud Computing - Nasscom Workshop
Diadem Technologies - Cloud Computing - Nasscom Workshop
Diadem Technologies
 
Logicalis Cloud Briefing
Logicalis Cloud BriefingLogicalis Cloud Briefing
Logicalis Cloud Briefing
Logicalis Australia
 
Azure Overview Csco
Azure Overview CscoAzure Overview Csco
Azure Overview Csco
rajramab
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Mathews Job
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
Amit Gatenyo
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
Cloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoCloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - Novosco
Novosco
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
jayapal385
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
charan7575
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
MunmunSaha7
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
DevendraPathak22
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
AmitPaul775033
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
ahmedraed19
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
Patrick Theuri
 
Cloud management
Cloud managementCloud management
Cloud management
surbhi jha
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
meycham
 
Modern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale ComputingModern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale Computing
Giragadurai Vallirajan
 
Cloud Computing Pascal Walschots
Cloud Computing   Pascal WalschotsCloud Computing   Pascal Walschots
Cloud Computing Pascal Walschots
PWalschots
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
AhmedRebai8
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
Ajit Mali
 

Similar to Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1) (20)

Diadem Technologies - Cloud Computing - Nasscom Workshop
Diadem Technologies - Cloud Computing - Nasscom WorkshopDiadem Technologies - Cloud Computing - Nasscom Workshop
Diadem Technologies - Cloud Computing - Nasscom Workshop
 
Logicalis Cloud Briefing
Logicalis Cloud BriefingLogicalis Cloud Briefing
Logicalis Cloud Briefing
 
Azure Overview Csco
Azure Overview CscoAzure Overview Csco
Azure Overview Csco
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Cloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoCloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - Novosco
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
Cloud management
Cloud managementCloud management
Cloud management
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Modern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale ComputingModern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale Computing
 
Cloud Computing Pascal Walschots
Cloud Computing   Pascal WalschotsCloud Computing   Pascal Walschots
Cloud Computing Pascal Walschots
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 

More from Manoj Kumar

Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)
Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)
Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)
Manoj Kumar
 
BizTalk Orchestration Fundamentals
BizTalk Orchestration FundamentalsBizTalk Orchestration Fundamentals
BizTalk Orchestration Fundamentals
Manoj Kumar
 
BizTalk Messaging Fundamentals
BizTalk  Messaging FundamentalsBizTalk  Messaging Fundamentals
BizTalk Messaging Fundamentals
Manoj Kumar
 
BizTalk Fundamentals
BizTalk  FundamentalsBizTalk  Fundamentals
BizTalk Fundamentals
Manoj Kumar
 
Structural Design pattern - Adapter
Structural Design pattern - AdapterStructural Design pattern - Adapter
Structural Design pattern - Adapter
Manoj Kumar
 
Introduction to ASP.Net Mvc3 with Razor
Introduction to ASP.Net Mvc3 with RazorIntroduction to ASP.Net Mvc3 with Razor
Introduction to ASP.Net Mvc3 with Razor
Manoj Kumar
 
Server vs Client in real life and in programming world
Server vs Client in real life and in programming worldServer vs Client in real life and in programming world
Server vs Client in real life and in programming world
Manoj Kumar
 
Html5 Introduction
Html5 IntroductionHtml5 Introduction
Html5 Introduction
Manoj Kumar
 
N-Tier Application Architecture
N-Tier Application ArchitectureN-Tier Application Architecture
N-Tier Application Architecture
Manoj Kumar
 

More from Manoj Kumar (9)

Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)
Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)
Cloud Computing – Jump start cloud development with Microsoft Azure (Part-2)
 
BizTalk Orchestration Fundamentals
BizTalk Orchestration FundamentalsBizTalk Orchestration Fundamentals
BizTalk Orchestration Fundamentals
 
BizTalk Messaging Fundamentals
BizTalk  Messaging FundamentalsBizTalk  Messaging Fundamentals
BizTalk Messaging Fundamentals
 
BizTalk Fundamentals
BizTalk  FundamentalsBizTalk  Fundamentals
BizTalk Fundamentals
 
Structural Design pattern - Adapter
Structural Design pattern - AdapterStructural Design pattern - Adapter
Structural Design pattern - Adapter
 
Introduction to ASP.Net Mvc3 with Razor
Introduction to ASP.Net Mvc3 with RazorIntroduction to ASP.Net Mvc3 with Razor
Introduction to ASP.Net Mvc3 with Razor
 
Server vs Client in real life and in programming world
Server vs Client in real life and in programming worldServer vs Client in real life and in programming world
Server vs Client in real life and in programming world
 
Html5 Introduction
Html5 IntroductionHtml5 Introduction
Html5 Introduction
 
N-Tier Application Architecture
N-Tier Application ArchitectureN-Tier Application Architecture
N-Tier Application Architecture
 

Recently uploaded

SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)

  • 1. 1 Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1) Manoj Kumar (Sr. Architect)
  • 2. 2
  • 3. 3 Cloud Market Business and Technical benefits What is cloud computing? Cloud Architecture? Cloud Deployment models Leading cloud providers Dev models: IaaS Vs PaaS Vs SaaS Cloud Migration strategy and challenges
  • 4. Cloud market growth 4 Source: KPMG(2015) Cloud is one of the top 10 strategic technology trends
  • 5. Business drivers for cloud Lower TCO Just-in-time Infrastructure to scale Higher Resource Utilization Rate CAPEX  OPEX Focus on core business apps Pay as you go instead of long-term contracts Reduced administration effort Reduced time to market 5
  • 7. With Cloud Re-allocate IT expenditures 7 DATACENTER COSTS Deploy 10% Operate 25% Support 10% Facilities 7% Network 11% SW 9% HW 23% 50% Labor Expense Cloud Computing reduces Labor costs Cloud Computing reduces Facilities, Network, Hardware, Software maintenance costs Plan 5% 50% Other Expenses Most companies today spend roughly 80% of their IT budget on operations and maintenance.
  • 9. Cloud Infrastructure (Mega Datacenters) 9 With industry best practices. Billions of dollar pumped in every year. More than $15Billion by Microsoft alone.
  • 10. Global reach: Azure Footprint (Hyper scale) 10
  • 11. Top reasons for cloud rush 11 Factors that denote significant impact include a high potential for disruption to the business, end users or IT, the need for a major investment, or the risk of being late to adopt.
  • 12. Technical Benefits of Cloud Computing Automation – “Scriptable infrastructure”- easy DevOps Auto/ Proactive scaling Improved Testability: On demand “instant test lab” with pre-configured environments only for the duration of testing phase. Easy Disaster Recovery and Business Continuity: Take advantage of geo-distribution and replicate the environment in other locations within minutes at much lower TCO. Out of box Load balancing / Traffic management: “Overflow” the traffic to the cloud 12
  • 13. 13
  • 14. Common Cloud Terms 14 Cloud Computing, Public Cloud, Private Cloud, Hybrid cloud, Govt Cloud Compute, Storage (Blob/Table/Queue), Service bus, IoT, Big Data IaaS, PaaS, SaaS, DaaS Elasticity, Scale up/down/in/out latency, availability, reliability
  • 15. What is cloud computing? “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer” “cloud computing relies on sharing of resources to achieve coherence and economies of scale” 15 The Next Frontier - On Demand Solutions For Your Business Cloud Web Client-Server Computing Personal Computers Mainframe
  • 16. Cloud: High Level Architecture 16 Giant SaaS
  • 17. Cloud – Enabling technology Virtualization An abstraction of an execution environment that can be made dynamically available to authorized clients by using well-defined protocols, Resource quota (e.g. CPU, memory share), and Software configuration (e.g. O/S, provided services) SOA Cloud computing adopts concepts from Service-oriented Architecture (SOA): Composition of services with easy global access. 17
  • 18. Cloud VMs 18 Hardware Virtual Machine Monitor (VMM) / Hypervisor Guest OS (Linux) Guest OS (NetBSD) Guest OS (Windows) VM VM VM AppApp AppAppApp Xen VMWare UML Denali etc. Performance: Para-virtualization (e.g. Xen) is very close to raw physical performance!
  • 19. Cloud – Virtualization Advantages Autonomic computing automates the process through which the user can provision resources (VMs) on-demand. Provides the agility required to speed up IT operations Reduces cost by increasing infrastructure utilization. By minimizing user involvement, automation speeds up the process, reduces labor costs and reduces the possibility of human errors. 19
  • 20. Cloud : Elasticity 20 Elastic Cloud VMs Scale Up/Down:
  • 21. Cloud computing shares characteristics with other computing techniques Client–server model — request & response Grid computing — Distributed and parallel computing (super and virtual computer is composed of a cluster of networked, loosely coupled computers) Mainframe computer Utility computing — similar to a traditional public utility, such as electricity Peer-to-peer — Participants are both suppliers and consumers of resources (in contrast to the traditional client–server model) 21
  • 22. Essential characteristics for cloud apps 22 National Institute of Standards and Technology's (NIST) identifies "five essential characteristics" • On-demand self-service: Manual or Automatic • Broad network access: Easily available for heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations) • Resource pooling: Resources are pooled to serve multiple consumers using a multi-tenant model with different physical and virtual resources dynamically assigned and reassigned • Rapid elasticity: Capabilities can be elastically provisioned and released to scale rapidly outward and inward. Limitless. • Measured service: Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer.
  • 24. Security in Cloud (Azure) Identity and access: WAAD and Multi-Factor Authentication Encryption and key management: Implement additional encryption and manage your own keys, Azure Key Vault to manage key. Network security: Site-to-site VPN (On-premise to Azure migration). Min SSL for internal comm. Threat management: Azure offers Microsoft Antimalware for cloud services and virtual machines Monitoring, logging, and reporting: Centralized monitoring and analysis systems that provide continuous visibility and timely alerts Penetration testing: Microsoft conducts regular penetration testing to improve Azure security 24
  • 25. Risks with Cloud Computing Stored or data-in-transit might not be safe Stored data can be lost Requires a constant Internet connection Does not work well with low-speed connections Can be Slow: Difference of Web vs Desktop app Capabilities Not easy to switch cloud provider 25 (Nothing Unique, many of these exist for on premise)
  • 26. Options – Leading Cloud services providers Amazon (AWS-IaaS) Microsoft (PaaS/IaaS – Azure) Google (SaaS, PaaS) VMware (vCloud) Rackspace (IaaS) Salesforce.com (SaaS – CRM) 26 Market Share (2014): • Joyent (3*aaS) • IBM (Blue Cloud) • Net Suite (SaaS - SuitCloud) • 3Tera (CloudWare) Some of the newcomers in the market are: • Enomaly (services to cloud providers) • GoGrid (IaaS) AWS: 28% Microsoft : 10% IBM: 7% Google: 5%, Salesforce: 4%, Rackspace 3% Year on year growth (2014): Microsoft (96%), Google (88%), Amazon (51%) and IBM (48%)
  • 27. Microsoft’s Azure since 2010 4 general categories: Build infrastructure, Develop modern applications, Gain insights from data, and Manage identity and access Features: Hybrid app development, Identity management, auditing, encryption key creation/control/storage, monitoring and logging, powerful analytics (HDInsight Hadoop framework), and Apache Storm (data stream processing) and others. 27
  • 28. Azure site – Demo http://azure.microsoft.com/en-in/ 28
  • 29. AWS (Amazon web services) since 2006 4 core features: Compute, Storage & Content Delivery, Databases, and Networking Features: Identity management, auditing, encryption key creation/control/storage, monitoring and logging, powerful analytics (Amazon EMR Hadoop framework), and Kinesis (data stream processing) and others. 29
  • 30. AWS site – Demo http://aws.amazon.com/ 30
  • 31. Azure vs AWS Cloud – Feature comparisons 31 Parameter Azure Amazon Enterprise feature coverage 75 92 More features 7 of 8 categories Required feature not in Azure 18 Capacity 5 times of next 14 cloud competitors combined Quality Much better at scale and public cloud offering Acceptability Good because of Microsoft existing relationship with enterprise customers More discount Hybrid Seamless extension of existing on-premise ops. Relies on partner Better at DR 60 day notice for SLA review 30 days Govt Cloud Azure Government GovCloud OS Windows/Linux(SUSE & Oracle) No RedHat (RHEL) All
  • 32. Cloud Price comparisons: AWS vs Azure vs Google 32 Per GB of data
  • 33. Cloud Dev Models: IaaS / PaaS / SaaS 33
  • 34. 34
  • 35. IaaS/PaaS/SaaS: Business Use cases 35 UseCase? Dev Model Common business use cases IaaS Extend on-premise data center infrastructure, Quickly move existing appln to cloud (Like Legacy apps) PaaS New development Redesign Increased developers productivity and faster time-to-market SaaS Collaboration software – Email, Office 365 CRM, HR systems
  • 36. Advantages/Disadvantages of PaaS vs IaaS 36 Model Advantage Disadvantage PaaS Business: • Low TCO • Accelerates Innovation Technical: • Better/Easier DevOps • Mitigates Platform Risks Business: • Harder Transition to Cloud Technical: • Application Portability Issues • Not as mature as IaaS • Different Codebases for Cloud and On- premise IaaS Business: • Quick transition to Cloud Technical: • Mature ISV Ecosystem • Complete Control • Solution Portability Business: • Expensive to Operate • Slows Down Innovation • Security Risks from Unpatched Servers Technical: • Difficult to Maintain Legacy Apps • Requires Rigorous Processes for Enabling DevOps • Requires Rigorous Server Maintenance Processes
  • 38. Common Cloud Terms : Revisited 38 Cloud Computing, Public Cloud, Private Cloud, Hybrid cloud, Govt Cloud Compute, Storage (Blob/Table/Queue, Service bus, IoT, Big Data IaaS, PaaS, SaaS, DaaS Elasticity, Scale up/down/in/out latency, availability, reliability
  • 39. 39