I had the honour to present all the great work we are doing in transforming to cloud and running hybrid infrastructure for our clients at Gartner Summit in Berlin, and to discuss with current and potential clients.
Kespry | 3 Keys to Lowering the Cost of Roof Inspections with a Drone ProgramKespry, Inc.
When evaluating the best way to lower roof claim costs via drone-based inspections, Claims and Innovation teams are applying a laser focus on 3 key areas:
1. Select a solution that slashes your claims processing to as little as 1 hour
2. Focus on adjuster productivity and eliminate 3rd-party costs to drive down LAE
3. Implement an easy-to-use & deployable solution that every claim adjuster can leverage
Join us as we explore these 3 key areas, breaking down the primary differences between drone solution types, and sharing practical knowledge from the field and our top P&C insurance customers.
I had the honour to present all the great work we are doing in transforming to cloud and running hybrid infrastructure for our clients at Gartner Summit in Berlin, and to discuss with current and potential clients.
Kespry | 3 Keys to Lowering the Cost of Roof Inspections with a Drone ProgramKespry, Inc.
When evaluating the best way to lower roof claim costs via drone-based inspections, Claims and Innovation teams are applying a laser focus on 3 key areas:
1. Select a solution that slashes your claims processing to as little as 1 hour
2. Focus on adjuster productivity and eliminate 3rd-party costs to drive down LAE
3. Implement an easy-to-use & deployable solution that every claim adjuster can leverage
Join us as we explore these 3 key areas, breaking down the primary differences between drone solution types, and sharing practical knowledge from the field and our top P&C insurance customers.
OHUG Employment Eligibility and Onboarding | Automating Compliance RequirementsSmart ERP Solutions, Inc.
Organizations are finding enhancing and maintaining a positive employee experience pays dividends from attracting and keeping the best talent to increasing productivity and lowering staffing costs. This session covers some examples and the benefits of providing a positive employee experience and how automation can help deliver and maintain the positive experience within your PeopleSoft HCM from preboarding, onboarding, offboarding and in between. Particularly for the "me" generation of younger millennials, organizations are finding employees crave and desire a positive employee experience throughout their relationship with the organization and that providing such is beneficial for all concerned, including the organization's bottom line. Presenters will cover how leveraging automation and current tools can enhance the employee experience and ensure a positive employee experience is consistently provided for all employees in all positions in your organization.
IT infrastructure colocation is one of those few things in life where you have to ask yourself, “Why wouldn't I want this?” Colocation can unburden you from some of the routine and resource-sapping chores that come with the care and feeding of running your own data center. For that reason alone, you’d assume it must be expensive. It’s not. Quite the contrary because a top-notch colocation facility enjoys big-time economies of scale that you could never hope to realize on your own. And in all likelihood, its services will be more complete and more secure, and will deliver better availability and performance from your systems. Here are the top 10 reasons why this is true.
It’s called data center in a box, unified computing and dynamic computing. Cisco, our technology partner, calls its offering Unified Computing System (UCS), which is what Peak 10 has standardized on for its data centers. Whatever you call it, converged infrastructure (CI) is getting bigger by the day. The global CI market is expected to grow to nearly $34 billion by 2019, a CAGR of 24.1 percent.
Don’t fear Shadow IT, it offers great value to the organization. IT needs to work to minimize the any possible negative impact from security risks and spend control challenges. Learn how to provide users a “carrot” without the “stick” through an approved marketplace for purchasing public cloud. At the same time, you give IT the visibility and traceability to manage security and costs.
Gen-i FWD_LIVE presentation about our exciting four step Pathway to Cloud, the latest information on the real benefits, the maturity stages of Cloud and Gen-i’s new ReadyCloud Backup service which launches in 2011.
Sutedjo menjelaskan secara singkat mengenai sistem ERP SAP, beserta dengan manfaat yang diberikan seperti mampu menurunkan biaya inventory sebesar 20%, mempercepat proses bisnis sampai 50% dan mengurangi biaya TCO sampai 30%. Sutedjo juga menjelaskan mengenai pembagian tanggungjawab antara provider dengan konsumen ketika menjalankan SAP secara on-premise, hosted, dan menjalankan keseluruhan sistem di cloud.
Cloud delivered desktop is the perfect answer for those companies that need to have complete control over their information. These are virtual desktops delivered via the cloud allowing you to enable you and your employees to securely access your applications and data from any device, from anywhere and at any time –– with the same access, security and productivity as from your own office environment.
Cut Costs and Boost Efficiency With QuickBooks HostingPooja Dhingra
Hosting QuickBooks on the cloud servers means that you can access the application from anywhere, at any time, and from any device. Not only this saves you a lot of time but boosts the efficiency of the team. QuickBooks Hosting offers a lot more benefits. Let's find out:
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.
To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common vulnerabilities.
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks
Building managedprivatecloud kvh_vancouversummitmatsunota
In 2013, KVH began looking to broaden its market by offering more open cloud solutions besides VMware cloud to its customer base. KVH quickly settled on OpenStack as the foundation for a new type of managed private data center, but also wanted to create an environment where customers could easily place application workloads in any of its data centers. Today, using OpenStack and MidoNet, KVH offers managed a private cloud service for enterprises, all while meeting a wide range of their specific requirements and minimizing operation complexity.
The initial promise of cloud computing has rapidly become reality for many early adopters. Organizations that have moved to a cloud environment are seeing greater agility and cost savings through standardization, scalability, automation and self service.For many organizations, cloud has been the catalyst for more flexible infrastructures, competitive innovation and improved growth and profitability.
OHUG Employment Eligibility and Onboarding | Automating Compliance RequirementsSmart ERP Solutions, Inc.
Organizations are finding enhancing and maintaining a positive employee experience pays dividends from attracting and keeping the best talent to increasing productivity and lowering staffing costs. This session covers some examples and the benefits of providing a positive employee experience and how automation can help deliver and maintain the positive experience within your PeopleSoft HCM from preboarding, onboarding, offboarding and in between. Particularly for the "me" generation of younger millennials, organizations are finding employees crave and desire a positive employee experience throughout their relationship with the organization and that providing such is beneficial for all concerned, including the organization's bottom line. Presenters will cover how leveraging automation and current tools can enhance the employee experience and ensure a positive employee experience is consistently provided for all employees in all positions in your organization.
IT infrastructure colocation is one of those few things in life where you have to ask yourself, “Why wouldn't I want this?” Colocation can unburden you from some of the routine and resource-sapping chores that come with the care and feeding of running your own data center. For that reason alone, you’d assume it must be expensive. It’s not. Quite the contrary because a top-notch colocation facility enjoys big-time economies of scale that you could never hope to realize on your own. And in all likelihood, its services will be more complete and more secure, and will deliver better availability and performance from your systems. Here are the top 10 reasons why this is true.
It’s called data center in a box, unified computing and dynamic computing. Cisco, our technology partner, calls its offering Unified Computing System (UCS), which is what Peak 10 has standardized on for its data centers. Whatever you call it, converged infrastructure (CI) is getting bigger by the day. The global CI market is expected to grow to nearly $34 billion by 2019, a CAGR of 24.1 percent.
Don’t fear Shadow IT, it offers great value to the organization. IT needs to work to minimize the any possible negative impact from security risks and spend control challenges. Learn how to provide users a “carrot” without the “stick” through an approved marketplace for purchasing public cloud. At the same time, you give IT the visibility and traceability to manage security and costs.
Gen-i FWD_LIVE presentation about our exciting four step Pathway to Cloud, the latest information on the real benefits, the maturity stages of Cloud and Gen-i’s new ReadyCloud Backup service which launches in 2011.
Sutedjo menjelaskan secara singkat mengenai sistem ERP SAP, beserta dengan manfaat yang diberikan seperti mampu menurunkan biaya inventory sebesar 20%, mempercepat proses bisnis sampai 50% dan mengurangi biaya TCO sampai 30%. Sutedjo juga menjelaskan mengenai pembagian tanggungjawab antara provider dengan konsumen ketika menjalankan SAP secara on-premise, hosted, dan menjalankan keseluruhan sistem di cloud.
Cloud delivered desktop is the perfect answer for those companies that need to have complete control over their information. These are virtual desktops delivered via the cloud allowing you to enable you and your employees to securely access your applications and data from any device, from anywhere and at any time –– with the same access, security and productivity as from your own office environment.
Cut Costs and Boost Efficiency With QuickBooks HostingPooja Dhingra
Hosting QuickBooks on the cloud servers means that you can access the application from anywhere, at any time, and from any device. Not only this saves you a lot of time but boosts the efficiency of the team. QuickBooks Hosting offers a lot more benefits. Let's find out:
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.
To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common vulnerabilities.
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks
Building managedprivatecloud kvh_vancouversummitmatsunota
In 2013, KVH began looking to broaden its market by offering more open cloud solutions besides VMware cloud to its customer base. KVH quickly settled on OpenStack as the foundation for a new type of managed private data center, but also wanted to create an environment where customers could easily place application workloads in any of its data centers. Today, using OpenStack and MidoNet, KVH offers managed a private cloud service for enterprises, all while meeting a wide range of their specific requirements and minimizing operation complexity.
The initial promise of cloud computing has rapidly become reality for many early adopters. Organizations that have moved to a cloud environment are seeing greater agility and cost savings through standardization, scalability, automation and self service.For many organizations, cloud has been the catalyst for more flexible infrastructures, competitive innovation and improved growth and profitability.
(ISM201) Migrating to AWS: 7,700 Systems & 5 Global Data CentersAmazon Web Services
A major communications company, home to some of the world's premier entertainment brands, evaluated both AWS and other cloud providers in preparation for a migration from its five global data centers to the cloud. After selecting AWS, the company worked with AWS Premier Partner 2nd Watch to assess over 7,700 systems that stretched across all five global data centers in order to prepare for the migration and create a roadmap to AWS. Learn about the vendor selection process, what it learned during its Cloud Readiness Assessment, and how it plans to move forward with the migration.
As you consider moving out of your data center and begin developing a cloud-first strategy, you will need support for large-scale migrations. Learning from the journey undertaken by some of our largest customers, we will share best practices, provide guidance on planning your large-scale migrations, and focus on business processes over just technology. Join us and learn how the AWS ecosystem of AWS Partner Network (APN) consulting and technology partners along with AWS Professional Services can facilitate your large-scale migrations needs.
Cloud Computing Principles and Paradigms: 2 migration into a cloudMajid Hajibaba
migration of an application into the cloud can happen in one of several ways: Either the application is clean and independent, so it runs as is; or perhaps some degree of code needs to be modified and adapted; or the design (and therefore the code) needs to be first migrated into the cloud computing service environment;
In fact, the migration industry thrives on these custom and proprietary best practices. Many of these best practices are specialized at the level of the components of an enterprise application—like migrating application servers or the enterprise databases.
Ahead of the NFV Curve with Truly Scale-out Network Function CloudificationMellanox Technologies
Presented at OpenStack Summit Vancouver by Chloe Jian Ma, Senior Director, Cloud Market Development (@chloe_ma)
Colin Tregenza Dancer, Director of Architecture
Unlock the Cloud: Building a Vendor Independent Private CloudAbiquo, Inc.
Standards in cloud computing are essential to its growth. Learn how to create a private cloud without being locked in to any one vendor. Abiquo uses OVF standards to help its customers create private clouds with multiple hypervisor technologies in the same cloud.
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...Cisco DevNet
Several enterprises find themselves wondering how to use public cloud resources while maintaining security, consistent network policies and avoid cloud vendor lock-in. This session will introduce Cisco Intercloud Fabric (ICF) and how it provides a single pane of glass to manage hybrid cloud infrastructure. By extending enterprise network onto public cloud, Cisco ICF enables customers to have the same level of security on public cloud as is present in their private cloud.
One And Done Multi-Cloud Load Balancing Done Right.pptxAvi Networks
Did you know that on average, it takes organizations more than three months using legacy load balancers to scale their load balancing capacity? That includes tedious policy management, expensive over-provisioning (or even more expensive under-provisioning), and the risk of supply-chain delays.
Join us for an eye-opening discussion of application delivery done right. By following the guiding principles of a cloud operating model, your team can get operational simplicity, multi-cloud consistency, pervasive analytics, holistic security and full life-cycle automation. This means less time spent on manual, repetitive tasks and troubleshooting, freeing up more time to proactively manage and automate your load balancers.
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Cohesive Networks
At the 2015 Cloud Security Alliance Congress in Berlin, CEO Patrick Kerpan presented in Track 1. His talk was titled "Overlay Networks: Connecting Resources Across Regions with Docker"
About the presentation:
While container mania is sweeping the industry, what customers really want is infrastructure they control. With network virtualization, the network becomes part of the application stack. Learn how Docker-based network functions can allow customers greater levels of control and security in public and hybrid clouds.
Why a Multi-cloud Strategy is EssentialAlibaba Cloud
See webinar recording of this presentation at: https://resource.alibabacloud.com/webinar/live.htm?&webinarId=62
When first discussing a multi-cloud strategy, we must start with its importance, its reasoning (why you need it) and what formats can be adopted. Only then can we dive deeper into the different ways a customer could distribute their infrastructure across multiple clouds as well as the business and technical considerations that should be kept in mind while adopting any of these models. Finally, we will touch upon why Alibaba Cloud fits well in your Multi-cloud strategy.
David Brock, Director of Sales South central Region, and Michael Schofield, Equinix Senior Global Solutions Architect, discuss The Evolution Story at EVOLUTION Dallas on November 12, 2015. In highlighting Equinix as the World's Leading Interconnection Platform, they addressed typical enterprise data challenges and trends driving new requirements for today's data center, both of which can be solved using Equinix Interconnection Platform™. The result: Equinix empowers its customers to interconnect and thrive in today's 24x7 global economy.
Discover how Equinix can support and enable your enterprise's IT strategies, and contact a Sales Rep today: http://www.equinix.com/contact-us/sales/.
VMware NSX-T Data Center delivers a complete L2-L7 networking and security virtualization platform. It enables your virtual cloud network to connect and protect applications across your data center, multi cloud, bare metal, and container infrastructure. With the acquisition of Avi Networks last year, VMware now offer enterprise-grade load balancing and WAF capabilities for VCF and NSX-T environments. The VMware NSX Advanced Load Balancer (formerly Avi Networks) delivers software load balancing, WAF, and Kubernetes application networking services. Digital, app-centric companies are replacing traditional appliance-based load balancers that cause over-provisioning, don’t support automation, and don’t work for cloud use cases.
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld
VMworld 2013
Chris Colotti, VMware
David Hill, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Similar to Cloud Expo - The Challenge of Workload Portability in a Multi-provider Cloud (20)
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDatapipe
Presented at Cloud Expo, February 2014.
Contents:
Why VDI at all? The challenges facing corporate desktop IT
DIY VDI: Not a bank holiday project
Desktop as a Service: Hosted, Managed, foolproof!
Webinar: Outstanding customer experiences, with Pizza Express, Made.com, and ...Datapipe
Adapt customers Made.com, Smiffy's and Gondola Group (owners of Pizza Express and Zizzi), discuss how cloud can create outstanding customer experiences.
Webcast available from: http://www.adapt.com/whats-new/events/webcast-creating-outstanding-customer-experiences-the-cloud-in-context.html
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Cloud Expo - The Challenge of Workload Portability in a Multi-provider Cloud
1. The Challenge of
Workload
Portability in a
Multi-Provider
Cloud
Kevin Linsell
Director, Strategy & Architecture, Adapt
Steve Bianciardi
Solution Architecture Manager, Adapt
Cloud Expo 2015
Software Defined Data Centre and Networks Theatre
2. Kevin Linsell
Director, Strategy & Architecture, Adapt
The Challenge
The Challenge of Workload Portability in a Multi-Provider Cloud
5. 05
Source: Cloud Industry Forum, 2014
Are We Comfortable Yet?
53%
of UK businesses
agree that one cloud
provider cannot do it all
(and 62% are already using more
than one)
6. 06 In Pursuit of Multi-Provider
> Inflexible contracts
designed to tie you
down
> Difficult to migrate
between platforms
> Difficult to
integrate platforms
> Resource
overheads of
managing different
providers at once
> Complex billing
processes
> Impact of having
multiple short term
contracts
> Strategic advice
and alignment is
limited as each
provider has an
incomplete picture
of the estate
Provider
lock-in
Management
overhead
No single point
of contact
Incomplete
picture
> Difficult to migrate
between platforms
> Difficult to
integrate platforms
7. 07 Portability: What Has To Be Moved?
Internal & external
data.
Size & speed is
everything!
Compatibility,
licensing &
dependencies
Virtual hardware,
storage, network,
etc
Impact on end user
#1
State
#2
Configuration
#3
Applications
#4
Operating
System
#5
Data
8. 08 #5 Data
Key considerations:
Volume/ size of data
Rate at which that data is changing
Security considerations around that data
Speed at which it must be accessed
#5
Data
How big a pipe do you need to
move the data?
The laws of physics always win!
9. 09
Key considerations:
Operating System licensing: Can it be used on a shared
platform?
Application licensing: Will it be cost effective?
Per CPU/ socket; per hour options
Dependencies: What else do the OS & applications need?
AD & DNS; middleware, database or web server
#4 Operating System & Applications
Software licensing can be
very confusing
#3
Applications
#4
Operating
System
10. 010 Configuration
Key considerations:
VM config: vCPU, RAM, vNICs, etc
Storage: Size, Speed, Tiers, Replication, Backup
Network: VLANs, Firewalls, IP Addressing, etc
Monitoring
Policies & controls
#2
Config
Different clouds speak
different languages.
Who will translate for you?
11. 011 #1 State
Key considerations:
Impact on the end user
DNS updates: time to update
Load balancing
Scheduled downtime
#1
State
Like changing an engine
mid flight…
13. 013 Zerto
Hypervisor-based replication
Compatible with VMware and Hyper-V and AWS
Full orchestration to move between hypervisors
Continuous data replication to your chosen cloud provider:
AWS, Azure, VMware
Granular movement of VMs
Disaster Recovery or Workload Migration
14. 014 Cisco ICF
Intercloud Fabric
Extend network into AWS / Azure / Intercloud enabled provider
No vendor lock-in
Any Hypervisor to any provider
End-to-end secure fabric
Extend VLAN/VXLAN with TLS tunnel
15. 015 VMware
vCloud Air
Ability to move workloads from a vSphere environment to VMware
public cloud
Common toolset
Use of NSX allows transparent movement of networking at the
Hypervisor layer
Security travels with the VM
16. 016 Alert Logic
Cloud Defender
Provides Security-as-a-Service for Hybrid, Private & Public Clouds
Certified on all major cloud platforms including AWS, Azure, vCloud
Air
“Single Pane of Glass” for monitoring multi-cloud environments
Consistent level of detection & protection that moves
with the workload
17. 017 Bringing It All Together
> Inflexible contracts
designed to tie you
down
> Difficult to migrate
between platforms
> Difficult to
integrate platforms
> Resource
overheads of
managing different
providers at once
> Complex billing
processes
> Impact of having
multiple short term
contracts
> Strategic advice
and alignment is
limited as each
provider has an
incomplete picture
of the estate
Provider
lock-in
Management
overhead
No single point
of contact
Incomplete
picture
Facing the risks & challenges
19. Get in touch:
T: 020 3714 4666
W: www.adapt.com
E: domore@adapt.com
@The_Adapters
@domore_Adapt
Thanks for viewing!
Any questions?
Visit us at
www.adapt.com
Editor's Notes
Cloud Adoption
Large private enterprises are showing the highest rates of adoption at just over 80%, whilst the sub 200 employee organizations are tracking at around 75% and public sector specifically is lagging at around 68% despite the increased focus on this sector to improve efficiency.
This is where the why needs to be further addressed albeit briefly; how does multi-provider offer greater efficiencies?
Raise-of-hand audience poll:
Who is looking to use cloud to host a range of workloads that require varying levels of performance, availability, and security?
Whoever raises their hand is at the right seminar, as they are likely to benefit from a multi-provider strategy. This session will provide some key insights as to the why’s, what’s and how’s of multi-provider cloud.
See if we can repeat the question at the end.
Security, shadow IT, and transparency of costs are high on people’s minds.
The perception of shadow IT and the organiation ability to handle it.
Have you got the ability to manage multiple providers whilst governing and security
With the rise of shadow TI, how confident are you to be able to manager multiple prviders?
Would you know how to
Are you assured that you are sure the security of IT
Portability -> mobility -> overcome that entirely – software?
Portability -> mobility -> overcome that entirely – software?
Need to have a think about the transition here and whether we would need to add in a title slide in between