This document provides an overview of cloud computing models and platforms. It defines cloud computing and describes its key characteristics, service models, and deployment models. The objectives of cloud computing are discussed, including elasticity, on-demand usage, and pay-per-use. Common cloud platforms like Amazon EC2, S3, and RDS are introduced along with how they provide infrastructure, platform, and software services. Virtual machine provisioning workflows on cloud platforms are outlined. The cloud ecosystem is depicted showing the relationship between cloud users, management, and virtual infrastructure layers.
Cloud computing provides on-demand access to shared configurable computing resources like servers, storage, databases, networking, software, analytics and more via the internet with minimal management effort. It has 5 essential characteristics, 3 service models (SaaS, PaaS, IaaS), and 4 deployment models (private, public, hybrid, community). Security is a major concern in cloud computing due to issues like data ownership, multi-tenancy, loss of physical control and proprietary implementations. A typical use case of provisioning a virtual machine involves a user request, provisioning by cloud management, and access to the ready VM.
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
The document proposes a security requirement specification model for cloud computing services. It discusses (1) existing security issues and specification languages, (2) the need for a new model to describe security interactions and requirements, and (3) how the model can be used to specify security for use cases, components, and intrusion detection system rules for a cloud computing case study.
What is Cloud Computing
virtualization
Cloud Networking
Cloud networking (and Cloud based networking) is a term describing the access of networking resources from a centralized third-party provider using Wide Area Networking (WAN) or Internet-based access technologies.
Cloud networking is related the concept of cloud computing, in which centralized computing resources are shared for customers or clients. In cloud networking, the network can be shared as well as the computing resources. It has spurred a trend of pushing more network management functions into the cloud, so that fewer customer devices are needed to manage the network.
This document discusses implementing cloud computing capabilities in JCISA to improve information sharing and collaboration. It provides an overview of cloud computing concepts including definitions, service models, and deployment models. It then evaluates three courses of action for JCISA: doing nothing and letting "big Army" direct implementation; optimizing legacy systems to facilitate a future private or hybrid cloud; or immediately implementing a cloud regardless of Army efforts. The document analyzes requirements, service level agreements, comparisons of the courses of action, and ultimately recommends optimizing legacy systems to support future migration to a private or hybrid cloud.
The document provides recommendations for books on cloud computing concepts and technologies. It then discusses the history and drivers of the Fourth Industrial Revolution powered by cloud, social, mobile, IoT, and AI technologies. The document defines cloud computing and discusses characteristics such as on-demand access to computing resources, utility computing models, and service delivery of infrastructure, platforms, and applications. It also outlines some major cloud platform providers including Eucalyptus, Nimbus, OpenNebula, and the CloudSim simulation framework.
Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System VM, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM - supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
Virtualization is a new method regarding using computing resources efficiently, by maximizing energy efficiency, extend the life of the hardware and also recycles. Virtualization technology is a system of work done by the software can merge some real physical systems into a single virtual form commonly known as virtualization without prejudice advantages over the single system. Of course, this system can reduce the amount of hardware, electrical energy consumption and time used thereby increasing the level of efficiency and effectiveness. Also, virtualization certainly reduces heat energy arising from the number of installed hardware, thereby reducing the increase in temperature geothermal (Global Warming). Some virtualization includes Server Virtualization, Network Virtualization, Memory Virtualization, Grid Computing, Application Virtualization, Storage Virtualization, Virtualization and Thin Client Platform.
Cloud computing provides on-demand access to shared configurable computing resources like servers, storage, databases, networking, software, analytics and more via the internet with minimal management effort. It has 5 essential characteristics, 3 service models (SaaS, PaaS, IaaS), and 4 deployment models (private, public, hybrid, community). Security is a major concern in cloud computing due to issues like data ownership, multi-tenancy, loss of physical control and proprietary implementations. A typical use case of provisioning a virtual machine involves a user request, provisioning by cloud management, and access to the ready VM.
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
The document proposes a security requirement specification model for cloud computing services. It discusses (1) existing security issues and specification languages, (2) the need for a new model to describe security interactions and requirements, and (3) how the model can be used to specify security for use cases, components, and intrusion detection system rules for a cloud computing case study.
What is Cloud Computing
virtualization
Cloud Networking
Cloud networking (and Cloud based networking) is a term describing the access of networking resources from a centralized third-party provider using Wide Area Networking (WAN) or Internet-based access technologies.
Cloud networking is related the concept of cloud computing, in which centralized computing resources are shared for customers or clients. In cloud networking, the network can be shared as well as the computing resources. It has spurred a trend of pushing more network management functions into the cloud, so that fewer customer devices are needed to manage the network.
This document discusses implementing cloud computing capabilities in JCISA to improve information sharing and collaboration. It provides an overview of cloud computing concepts including definitions, service models, and deployment models. It then evaluates three courses of action for JCISA: doing nothing and letting "big Army" direct implementation; optimizing legacy systems to facilitate a future private or hybrid cloud; or immediately implementing a cloud regardless of Army efforts. The document analyzes requirements, service level agreements, comparisons of the courses of action, and ultimately recommends optimizing legacy systems to support future migration to a private or hybrid cloud.
The document provides recommendations for books on cloud computing concepts and technologies. It then discusses the history and drivers of the Fourth Industrial Revolution powered by cloud, social, mobile, IoT, and AI technologies. The document defines cloud computing and discusses characteristics such as on-demand access to computing resources, utility computing models, and service delivery of infrastructure, platforms, and applications. It also outlines some major cloud platform providers including Eucalyptus, Nimbus, OpenNebula, and the CloudSim simulation framework.
Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System VM, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM - supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
Virtualization is a new method regarding using computing resources efficiently, by maximizing energy efficiency, extend the life of the hardware and also recycles. Virtualization technology is a system of work done by the software can merge some real physical systems into a single virtual form commonly known as virtualization without prejudice advantages over the single system. Of course, this system can reduce the amount of hardware, electrical energy consumption and time used thereby increasing the level of efficiency and effectiveness. Also, virtualization certainly reduces heat energy arising from the number of installed hardware, thereby reducing the increase in temperature geothermal (Global Warming). Some virtualization includes Server Virtualization, Network Virtualization, Memory Virtualization, Grid Computing, Application Virtualization, Storage Virtualization, Virtualization and Thin Client Platform.
The document is a question bank for the cloud computing course CS8791. It contains 26 multiple choice or short answer questions related to key concepts in cloud computing including definitions of cloud computing, characteristics of clouds, deployment models, service models, elasticity, horizontal and vertical scaling, live migration techniques, and dynamic resource provisioning.
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
The document proposes a cloud environment for backup and data storage using remote servers that can be accessed through the Internet. It involves using the disks of cluster nodes as a global storage system with PVFS2 parallel file system for improved performance. The proposed system aims to increase data availability and reduce information loss by storing data on a private cloud using PVFS2 and developing a multiplatform client application for fast data transfer. It allows reuse of existing infrastructure to reduce costs and gives users experience of managing a private cloud.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
This document discusses different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Database as a Service (DaaS), and Monitoring as a Service. It describes the key characteristics and advantages of each service type. Some potential issues and disadvantages are also outlined such as security concerns, vendor lock-in, and network dependence. Examples of major cloud service providers are provided for each service layer including Google, Amazon, Microsoft, and Salesforce.
The document discusses how cloud computing and virtualization can support grid infrastructures. It introduces key concepts like virtualization platforms, distributed virtual machine management, and provisioning virtual resources as a cloud service. The RESERVOIR project aims to integrate these technologies with grid computing to provide dynamic, on-demand access to resources like a utility. Virtualization can help address barriers to adopting grid computing by isolating workloads and dynamically allocating resources.
Innovation for Participation - Paul De Decker, Sun Microsystemsrobinwauters
The document discusses Sun Microsystems' strategy of providing an open source software stack called Solaris AMP (Apache, MySQL, PHP) that is optimized to run on their Solaris operating system. It promotes the benefits of the Solaris operating system and tools to help speed development and deployment. Additionally, it outlines Sun's approach of providing many free and open source software options along with support services to gain customers.
This document discusses various cloud deployment models and categories of cloud computing services. It provides details on public, private, hybrid, and community cloud models, comparing their advantages and disadvantages. Additionally, it describes the three main categories of cloud services - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Public clouds promote standardization and flexibility while private clouds attempt customization and higher efficiency. Hybrid clouds operate with compromises around resource sharing.
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms in relation to these architectures are explored.
This document discusses security challenges and solutions related to cloud computing. It begins by outlining common business and IT challenges, then defines cloud computing and reviews security concerns such as data privacy, reliability, and loss of control. The document proposes that identity and access management, data security, and regulatory compliance are top security risks for cloud computing. It presents IBM solutions for privileged user access control, identity federation, and application isolation that aim to address these risks.
This document discusses cloud computing characteristics, service models, deployment models, risks, and security benefits. It defines cloud computing as on-demand access to configurable computing resources over a network. Key characteristics include rapid elasticity, broad network access, resource pooling, measured service, and self-service. Common models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Risks include vendor lock-in, loss of governance, and isolation failures, but cloud security can also be improved through large-scale implementation.
This document discusses the deployment of private clouds with IBM systems and software. It outlines the basic technical requirements for private clouds, such as robust virtualization platforms and good management tools. It also discusses the need for standardizing virtual machine images and automating provisioning tasks. Once these practices are in place, private clouds can introduce cost savings by eliminating administrative overhead through self-service catalogs. IBM is well-positioned to help customers deploy private clouds through solutions like CloudBurst, IBM Service Delivery Manager, and Tivoli Service Automation Manager that support virtualization on IBM server platforms.
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
Virtually Secure: Uncovering the risks of virtualization
Organizations have been quickly leveraging the benefits of virtualized platforms in their datacenters, often unknowingly increasing the exposure of their most prized assets.
Michael will highlight the key concerns around virtualization technologies including the answers to questions such as are virtualized servers PCI compliant and what minimum controls must exist to protect the hypervisor? He will walk the audience through the latest technical threats and shed light on the solutions and controls available to secure your virtual environments.
Performance, fault tolerance and scalability analysis of virtual infrastructu...www.pixelsolutionbd.com
This document analyzes the performance, fault-tolerance, and scalability of virtual infrastructure management systems with three typical structures: centralized, hierarchical, and peer-to-peer. It defines metrics for evaluating these properties and provides a quantitative analysis of each structure. The analysis finds that centralized structures have the lowest performance due to a single point of failure, while hierarchical and peer-to-peer structures demonstrate better fault-tolerance and scalability by distributing management responsibilities across multiple nodes.
Parveen Yadav is a security researcher and freelance ethical hacker who has received recognition from Google, Amazon, Paypal, and Adobe for their work. Their paper titled "Cloud Computing & Security" discusses the basics of cloud computing including characteristics like multi-tenancy, scalability, elasticity, device independence, and reliability. It also covers cloud service models, deployment models, opportunities and challenges of cloud computing, and common attacking methods. The document provides an overview of cloud computing concepts.
Cloud computing introduces new risks that must be addressed. It relies on sharing resources over the internet rather than local servers. This introduces vulnerabilities like insecure APIs, data leaks when data is shared on virtual machines, and issues with the virtual networks. However, cloud security can be improved through measures like encryption, access control, data tracing, and masking sensitive data. Overall cloud computing improves accessibility and scalability but also requires secure virtualization and clear responsibility over data protection.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
The webinar discusses multi-tenant business intelligence in a cloud computing environment. It defines multi-tenancy as a software architecture where a single instance of an application serves multiple organizations. The webinar then covers use cases for multi-tenant BI and the benefits of the approach. It also outlines four main approaches to multi-tenant BI and the steps to onboard new clients for each approach.
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Architecting for the public and the private cloudHammad Rajjoub
The document discusses architectural best practices for building applications in the public and private cloud. It recommends designing systems to be loosely coupled, asynchronous, and eventually consistent to enable failure tolerance and scalability. Other practices include caching, security, automation, and designing for elastic scale out. The cloud offers benefits like reduced costs, flexibility, and agility compared to on-premises infrastructure, but architectures need to consider consistency, availability, and partitioning to leverage the cloud effectively.
The document is a question bank for the cloud computing course CS8791. It contains 26 multiple choice or short answer questions related to key concepts in cloud computing including definitions of cloud computing, characteristics of clouds, deployment models, service models, elasticity, horizontal and vertical scaling, live migration techniques, and dynamic resource provisioning.
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
The document proposes a cloud environment for backup and data storage using remote servers that can be accessed through the Internet. It involves using the disks of cluster nodes as a global storage system with PVFS2 parallel file system for improved performance. The proposed system aims to increase data availability and reduce information loss by storing data on a private cloud using PVFS2 and developing a multiplatform client application for fast data transfer. It allows reuse of existing infrastructure to reduce costs and gives users experience of managing a private cloud.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
This document discusses different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Database as a Service (DaaS), and Monitoring as a Service. It describes the key characteristics and advantages of each service type. Some potential issues and disadvantages are also outlined such as security concerns, vendor lock-in, and network dependence. Examples of major cloud service providers are provided for each service layer including Google, Amazon, Microsoft, and Salesforce.
The document discusses how cloud computing and virtualization can support grid infrastructures. It introduces key concepts like virtualization platforms, distributed virtual machine management, and provisioning virtual resources as a cloud service. The RESERVOIR project aims to integrate these technologies with grid computing to provide dynamic, on-demand access to resources like a utility. Virtualization can help address barriers to adopting grid computing by isolating workloads and dynamically allocating resources.
Innovation for Participation - Paul De Decker, Sun Microsystemsrobinwauters
The document discusses Sun Microsystems' strategy of providing an open source software stack called Solaris AMP (Apache, MySQL, PHP) that is optimized to run on their Solaris operating system. It promotes the benefits of the Solaris operating system and tools to help speed development and deployment. Additionally, it outlines Sun's approach of providing many free and open source software options along with support services to gain customers.
This document discusses various cloud deployment models and categories of cloud computing services. It provides details on public, private, hybrid, and community cloud models, comparing their advantages and disadvantages. Additionally, it describes the three main categories of cloud services - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Public clouds promote standardization and flexibility while private clouds attempt customization and higher efficiency. Hybrid clouds operate with compromises around resource sharing.
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms in relation to these architectures are explored.
This document discusses security challenges and solutions related to cloud computing. It begins by outlining common business and IT challenges, then defines cloud computing and reviews security concerns such as data privacy, reliability, and loss of control. The document proposes that identity and access management, data security, and regulatory compliance are top security risks for cloud computing. It presents IBM solutions for privileged user access control, identity federation, and application isolation that aim to address these risks.
This document discusses cloud computing characteristics, service models, deployment models, risks, and security benefits. It defines cloud computing as on-demand access to configurable computing resources over a network. Key characteristics include rapid elasticity, broad network access, resource pooling, measured service, and self-service. Common models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Risks include vendor lock-in, loss of governance, and isolation failures, but cloud security can also be improved through large-scale implementation.
This document discusses the deployment of private clouds with IBM systems and software. It outlines the basic technical requirements for private clouds, such as robust virtualization platforms and good management tools. It also discusses the need for standardizing virtual machine images and automating provisioning tasks. Once these practices are in place, private clouds can introduce cost savings by eliminating administrative overhead through self-service catalogs. IBM is well-positioned to help customers deploy private clouds through solutions like CloudBurst, IBM Service Delivery Manager, and Tivoli Service Automation Manager that support virtualization on IBM server platforms.
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
Virtually Secure: Uncovering the risks of virtualization
Organizations have been quickly leveraging the benefits of virtualized platforms in their datacenters, often unknowingly increasing the exposure of their most prized assets.
Michael will highlight the key concerns around virtualization technologies including the answers to questions such as are virtualized servers PCI compliant and what minimum controls must exist to protect the hypervisor? He will walk the audience through the latest technical threats and shed light on the solutions and controls available to secure your virtual environments.
Performance, fault tolerance and scalability analysis of virtual infrastructu...www.pixelsolutionbd.com
This document analyzes the performance, fault-tolerance, and scalability of virtual infrastructure management systems with three typical structures: centralized, hierarchical, and peer-to-peer. It defines metrics for evaluating these properties and provides a quantitative analysis of each structure. The analysis finds that centralized structures have the lowest performance due to a single point of failure, while hierarchical and peer-to-peer structures demonstrate better fault-tolerance and scalability by distributing management responsibilities across multiple nodes.
Parveen Yadav is a security researcher and freelance ethical hacker who has received recognition from Google, Amazon, Paypal, and Adobe for their work. Their paper titled "Cloud Computing & Security" discusses the basics of cloud computing including characteristics like multi-tenancy, scalability, elasticity, device independence, and reliability. It also covers cloud service models, deployment models, opportunities and challenges of cloud computing, and common attacking methods. The document provides an overview of cloud computing concepts.
Cloud computing introduces new risks that must be addressed. It relies on sharing resources over the internet rather than local servers. This introduces vulnerabilities like insecure APIs, data leaks when data is shared on virtual machines, and issues with the virtual networks. However, cloud security can be improved through measures like encryption, access control, data tracing, and masking sensitive data. Overall cloud computing improves accessibility and scalability but also requires secure virtualization and clear responsibility over data protection.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
The webinar discusses multi-tenant business intelligence in a cloud computing environment. It defines multi-tenancy as a software architecture where a single instance of an application serves multiple organizations. The webinar then covers use cases for multi-tenant BI and the benefits of the approach. It also outlines four main approaches to multi-tenant BI and the steps to onboard new clients for each approach.
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Architecting for the public and the private cloudHammad Rajjoub
The document discusses architectural best practices for building applications in the public and private cloud. It recommends designing systems to be loosely coupled, asynchronous, and eventually consistent to enable failure tolerance and scalability. Other practices include caching, security, automation, and designing for elastic scale out. The cloud offers benefits like reduced costs, flexibility, and agility compared to on-premises infrastructure, but architectures need to consider consistency, availability, and partitioning to leverage the cloud effectively.
This document discusses call tracking and cloud telephony services. It explains how call tracking allows businesses to see where calls are coming from across online and offline marketing campaigns. The technology uses cloud telephony, which refers to scalable telephony services running on distributed servers. This allows businesses to route calls in real-time to teams based on the source and measure results to analyze campaign performance. Cloud telephony provides higher scalability and uptime compared to on-premise systems.
This is PPT created on cloud computing. We acknowledge the contribution from following: R. Raja and V. Verma, Faculties at IIIT Hyderabad; ibm.com; wikipedia and other anonymous persons who contributed throught their uploaded images etc.
Ankit & Group
FMS Delhi
2009-11
The document discusses new features in Veeam Backup & Replication version 7, including two disruptive innovations, seven market-leading features, and over 75 other enhancements. The two disruptive innovations allow for off-host backups using storage snapshots as often as every 5 minutes without impacting production, and built-in WAN acceleration to remove hurdles for offsite backups. New features include native tape support, enhanced support for VMware vCloud Director, a vSphere web client plugin, and self-service recovery of VMs and files. The document provides details on how these features improve upon the previous version.
Global cloud services market (service type, cloud type, end user and geograph...Allied Market Research
Cloud computing is the practice of sharing network of remote servers which are hosted on the Internet to store, process, share, and manage data rather than on a local server or a personal computer. The services provided by the cloud computing technology are referred to as cloud services.
This document discusses using public cloud resources for "context data" while reserving scarce resources like time, talent, and management attention for core data that provides a competitive advantage. It defines context data as things like supplier data, asset classifications, and geographic information that are less critical. The document advocates using open web identifiers and publishing systems to define master data entities externally rather than within individual organizations. This allows offsetting costs by leveraging public cloud resources for context data operations and synchronization.
This document compares SAAS (Software as a Service) and PAAS (Platform as a Service) models for cloud telephony. SAAS offers pre-deployed telephony applications that are easier to use but less flexible, while PAAS uses VXML (Voice XML) to provide APIs for developers to build custom voice applications, offering more control but higher costs. Overall, SAAS provides better data security, uptime, and support while PAAS allows for more flexibility and lower per-call costs. Both have tradeoffs between ease of use and flexibility.
This document discusses 8 cloud security mechanisms:
1. Encryption protects data confidentiality during transmission using encryption keys. Symmetric encryption uses one key while asymmetric uses two keys.
2. Hashing creates a unique code to verify data integrity and detect unauthorized changes using one-way functions.
3. Digital signatures provide authentication and non-repudiation by encrypting a hash of a message with a private key.
4. PKI uses digital certificates and certificate authorities to securely associate public keys with identities.
5. IAM controls user identities and access privileges using authentication, authorization, user management, and credential management.
6. SSO allows single authentication across multiple services using tokens from a security broker.
Cloud Service Management. A New Beginning. This presentation looks at the disruptive nature of cloud computing and cloud based services. It explores organizations current ability to understand the impact cloud. The final section provides a number of suggested and recommended sources of information regarding cloud service management in an ITIL environment.
CentriLogic is a leading provider of outsourced data center and hosting solutions that enables customers to seamlessly outsource their IT infrastructure and gain peace of mind. CentriLogic offers state-of-the-art data center facilities in the United States and Canada that adhere to industry best practices for security, fire detection, and more. Their solutions help organizations do brand and mission-critical business on the internet through experienced technical resources and proactive customer support.
The document provides information about the astrological sign of Aries, including their strengths as independent, generous and optimistic individuals. It also discusses their weaknesses of being moody and short-tempered. Aries make good friends who are caring and protective. In relationships, Aries men seek adventure and novelty. The document is sponsored by BIOD Consulting and provides a website for further astrology information.
Composing a case management solution with SaaS, PaaS, On-premise productsLeon Smiers
Case management is supporting the core processes of a company. Big challenges, both internal and external, have impact on the core processes. Internal drivers related to costs, external drivers to customers demanding better and faster delivered services. Should we continue with our on-premise application landscape, should we move to the cloud or do we end up with a hyrbid landscape. An holistic approach leads to better insight in the solution! This holistic approach consists of a Case Management Framework that gives insight where internal/external changes impact the solution and how these can be mapped towards on-prem/cloud products. Three examples are used to explain this methodology, a mortgage request, police investigation and the hotel overbooking scenario.
More information can be found in the book 'Oracle Case Management Solutions' http://oraclecasemanagementsolutions.com/
This presented is given at the AMIS25 conference June 2nd 2016 http://www.amis.nl/en/events-eng/jubileumconferentie/
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It has several advantages like lower costs, automatic software updates, unlimited storage and reliability. However, it also has disadvantages like requiring a constant internet connection and potential slowness. The document discusses key concepts of cloud computing including characteristics, service models, virtualization, opportunities and challenges of cloud sourcing, commercial offerings and the future of cloud computing.
The Netflix recipe for migrating your organization from building a datacenter based product to a cloud based product. First presented at the Silicon Valley Cloud Computing Meetup "Speak Cloudy to Me" on Saturday April 30th, 2011
Cloud computing allows on-demand access to shared computing resources like servers, storage, databases, networking, software, analytics and more. It has 5 essential characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The three main service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud deployment models include private, public, hybrid and community clouds.
The document discusses cloud computing and defines it as a model that enables convenient, on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. It describes the essential characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. It also outlines the three main service models - SaaS, PaaS and IaaS - and the four deployment models - private, public, community and hybrid cloud. The document provides examples and diagrams to illustrate cloud taxonomy and different cloud services.
The document provides an overview of cloud computing, including definitions of cloud, cloud characteristics, common cloud features, deployment models, service models, and examples of major cloud vendors like Amazon Web Services. It discusses how cloud computing provides on-demand access to shared computing resources over the internet and the business benefits of reduced costs and increased flexibility. However, some concerns include data security, latency issues for real-time applications, and lack of control over proprietary systems.
Cloud Computing genral for all concepts.pptxraghavanp4
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services via the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are four deployment models - public, private, hybrid and community clouds. Key enabling technologies include virtualization, distributed resource management and reservation-based provisioning to meet service level agreements.
Cloud computing is the delivery of computing resources such as applications, data storage, and computing power over the internet on an as-needed basis. It provides users access to shared pools of configurable computing resources like networks, servers, storage, applications, and services that can be quickly provisioned with minimal management effort. There are three main service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtualized computing resources, PaaS provides platforms for developing and hosting applications, and SaaS provides users access to applications hosted by the service provider.
Basic Cloud Computing and underlying technology, Hypervisor, Cloud Services, Cloud Deployment Models, AWS, REST APIs, Cloud Investment Trends, Cloud Investments, Cloud Value chain and lot of terms and references for further reading.
Cloud computing is a model that provides on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services. It has essential characteristics of on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. There are three main service models - Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Deployment models include private cloud, community cloud, public cloud, and hybrid cloud.
This document provides information about cloud computing types and deployment models. It discusses private cloud, which is for a single organization; public cloud, which provides services to the general public; hybrid cloud, which uses a combination of private and public clouds; and community cloud, which is shared between organizations with common interests. It also outlines common cloud software including OpenStack for managing resources, Hadoop for big data, and VMware for virtualization.
This document provides an overview of cloud computing. It defines cloud computing as manipulating, configuring, and accessing applications online through virtualization of network resources that are managed and maintained remotely. The key components of cloud infrastructure are servers, storage, networking hardware, management software, deployment platforms, and hypervisors that allow sharing of physical resources. There are various cloud deployment models including public, private, hybrid, and community clouds. In addition, the document outlines several cloud service models such as IaaS, PaaS, SaaS, and IDaaS. Technologies that enable cloud computing are also discussed, including virtualization, service-oriented architecture, grid computing, and utility computing.
The document provides an overview of cloud computing concepts including definitions, characteristics, deployment and service models. It defines cloud computing as providing on-demand access to computing resources and applications over the internet. The key characteristics are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The common deployment models are public, private and hybrid clouds. The main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Private Cloud With System Center ProjectAbhijit Kundu
The document provides an overview of creating a private cloud using Microsoft System Center 2012, including an introduction to private clouds and their benefits, an overview of the key System Center 2012 components used to create and manage a private cloud, and prerequisites for installing a private cloud such as required virtual machines, software, and physical server configurations.
Virtualization & it`s utilization for load in cloud data centersBheemsen Singh
Virtualization & it`s utilization for load in cloud data centers:-
What is Cloud Computing,
Essential Characteristics of Cloud.
Common Characteristics of Cloud.
Cloud Service Model[SaaS,PaaS,IaaS]
Cloud Data Centers Load Balancing By VM Migration
This is the firs presentation I created for training IBM EBIS community on cloud computing and apporach to cloud sales and projects. All the materials come from IBM internal documentation and precedent classes slide.
Cloud computing delivers computing services as utilities over the internet, similar to how electricity or water are provided. There are different types of cloud deployment models including public, private, hybrid, and community clouds. Additionally, there are three main service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtual computing resources, PaaS provides development platforms, and SaaS provides complete software solutions delivered over the internet. Cloud computing offers benefits like on-demand provisioning, elastic scaling, pay-per-use billing, workload resilience, and migration flexibility.
This document provides an introduction to cloud computing. It discusses the benefits of cloud computing like pay-as-you-go models and operational expense instead of capital expense. It defines cloud computing and introduces its essential characteristics, service models of SaaS, PaaS and IaaS, and deployment models of private, public and hybrid clouds. It demonstrates using Amazon EC2 as an example of infrastructure as a service.
This presentation provides a detailed coverage on Cloud services: Software as a Service, Platform as a Service, Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as Services. Service providers- Google, Amazon, Microsoft Azure, IBM, Sales force.
Cloud Computing (Infrastructure as a Service)UNIT 2SURBHI SAROHA
This document provides an overview of Infrastructure as a Service (IaaS) cloud computing models. It defines IaaS and describes its key characteristics. It then discusses the three main IaaS deployment models - private cloud, public cloud, and hybrid cloud. For each model, it outlines their definition, examples, advantages and disadvantages. Finally, it lists several important aspects to consider when managing a hybrid cloud environment, such as integration, security, resource optimization, and automation.
Cloud computing refers to on-demand access to shared computing resources via the internet. It provides scalable, elastic resources that can be rapidly provisioned with minimal management effort. There are various types of cloud models including private, public, hybrid and community clouds. Cloud services are delivered through software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) models. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Cloud computing provides access to applications over the Internet as utilities. It allows users to create, configure, and customize applications online without installing them. The cloud refers to the Internet or network and provides services like email, web conferencing, and CRM through public or private networks. Cloud computing offers online data storage, infrastructure, and applications without platform dependency by accessing everything through a web browser.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Communications Mining Series - Zero to Hero - Session 1
Cloud models and platforms
1. Cloud Models and Platforms
Dr. Sanjay P. Ahuja, Ph.D.
Fidelity National Financial Distinguished Professor of
CIS
School of Computing, UNF
2. A Working Definition of Cloud
Computing
Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service
provider interaction.
This cloud model promotes availability and is composed of five essential
characteristics, three service models, and four deployment models.
.
3. Objectives of Cloud Computing
Elasticity: Ability to scale virtual machines resources up or down
On-demand usage: Ability to add or delete computing power (CPU,
memory), and storage according to demand
Pay-per-use: Pay only for what you use
Multitenancy: Ability to have multiple customers access their servers in the
data center in an isolated manner
.
5. 3 Cloud Service Models
Cloud Software as a Service (SaaS)
Cloud Platform as a Service (PaaS)
The capability provided to the consumer is to deploy onto the cloud infrastructure
consumer-created applications using programming languages and tools supported by
the provider (e.g., Java, Python, .Net). The consumer does not manage or control the
underlying cloud infrastructure, network, servers, operating systems, or storage, but the
consumer has control over the deployed applications and possibly application hosting
environment configurations.
Cloud Infrastructure as a Service (IaaS)
The capability provided to the consumer is to use the provider’s applications running
on a cloud infrastructure and accessible from various client devices through a thin client
interface such as a Web browser (e.g., web-based email). The consumer does not manage
or control the underlying cloud infrastructure, network, servers, operating systems, storage,
or even individual application capabilities, with the possible exception of limited user-specific
application configuration settings.
The capability provided to the consumer is to rent processing, storage, networks, and
other fundamental computing resources where the consumer is able to deploy and run
arbitrary software, which can include operating systems and applications. The consumer
does not manage or control the underlying cloud infrastructure but has control over operating
systems, storage, deployed applications, and possibly select networking components (e.g.,
firewalls, load balancers).
To be considered “cloud” they must be deployed on top of cloud
infrastructure that has the key characteristics
8. 3 Features of
Mature SaaS Applications
SaaS is hosting applications on the Internet as a service (both consumer
and enterprise)
Features of Mature Saas applications:
Scalable
Multi-tenancy
Handle growing amounts of work in a graceful manner
One application instance may be serving hundreds of companies
Opposite of multi-instance where each customer is provisioned
their own server running one instance
Metadata driven configurability
Instead of customizing the application for a customer (requiring
code changes), one allows the user to configure the application
through metadata
10. 3 Cloud Deployment Models
Private cloud
Public cloud
The cloud infrastructure is operated solely for an organization. It may be
managed by the organization or a third party and may exist on premise
or off premise.
Mega-scale cloud infrastructure is made available to the general public
or a large industry group and is owned by an organization selling cloud
services.
Hybrid cloud
The cloud infrastructure is a composition of two or more clouds (private
or public) that remain unique entities but are bound together by
standardized or proprietary technology that enables data and application
portability
11. Common Cloud
Characteristics
Cloud computing often leverages:
.
Massive scale
Homogeneity
Virtualization
Low cost software
Geographic distribution
Advanced security technologies
12. Security is the Major Issue
Cloud computing often leverages:
.
Massive scale
Homogeneity
Virtualization
Low cost software
Geographic distribution
Advanced security technologies
13. Cloud Security Advantages
Shifting public data to a external cloud reduces the exposure of the
internal sensitive data
Dedicated Security Team
Greater Investment in Security Infrastructure
Cloud homogeneity makes security auditing/testing simpler
Clouds enable automated security management and real-time
detection of system tampering
Rapid Re-Constitution of Services
Redundancy / Disaster Recovery
14. Cloud Security Challenges
Trusting vendor’s security model
Multi-tenancy
Data ownership issues
QoS guarantees
Attraction to hackers (high-value target)
Security of virtual OSs in the cloud
Obtaining support from cloud vendor for security related investigations
15. Cloud Security Challenges
Indirect administrator accountability
Proprietary cloud vendor implementations can’t be examined
Loss of physical control
Possibility for massive outages
Encryption needs for cloud computing
.
Encrypting access to the cloud resource control interface
Encrypting administrative access to OS instances
Encrypting access to applications
Encrypting application data at rest
17. Typical use case of provisioning
a virtual machine
The management environment consists of components required to
effectively deliver services to consumers. The various services offered span
from image management and provisioning of machines to billing,
accounting, metering, and more. The cloud management system (CMS)
forms the heart of the management environment along with the hardware
components.
The managed environment is composed of physical servers and in turn the
virtual servers that are “managed-by” the management environment. The
servers in the managed environment belong to a customer pool; where
customers or users can create virtual servers on-demand and scale
up/down as needed.
The management environment controls and processes all incoming
requests to create, destroy, manage, and monitor virtual machines and
storage devices. In the context of a public cloud, the users get direct access
to the VMs created in the managed environment, through the Internet. They
can access the machines after they are provisioned by the management
layer.
18. Typical use case of provisioning
a virtual machine
The previous figure describes the following actions:
1.
User makes a request to create a VM by logging onto the cloud portal.
2.
The request is intercepted by the request manager and is forwarded to the
management environment.
3.
The management environment, on receiving the request, interprets it and
applies to it provisioning logic to create a VM from the set of available
physical servers.
4.
External storage is attached to the VM from a storage area network (SAN)
store during provisioning in addition to the local storage.
5.
After the VM is provisioned and ready to use, the user is notified of this
information and finally gains total control of the VM. The user can access
this VM through the public Internet because the VM has a public IP address
(e.g. through SSH).
19. Cloud Ecosystem
Figure. The cloud ecosystem for building private clouds. (a) Cloud consumers need flexible infrastructure on demand.
(b) Cloud management provides remote and secure interfaces for creating, controlling, and monitoring virtualized
resources on an infrastructure-as-a-service cloud. (c) Virtual infrastructure (VI) management provides primitives to
schedule and manage VMs across multiple physical hosts. (d) VM managers provide simple primitives (start, stop,
suspend) to manage VMs on a single host.
Figure from Virtual Infrastructure Management in Private and Hybrid Clouds, Internet Computing, September 2009.
20. Cloud Ecosystem
The public cloud ecosystem has evolved around providers, users, and technologies.
The previous figure suggests one possible ecosystem for private clouds. There are 4
levels of development of ecosystem development: cloud users/consumers, cloud
management, VI management, and VM managers.
At the cloud management level, the cloud manager provides virtualized resources
over an IaaS platform.
At the virtual infrastructure (VI) management level, the manager allocates VMs over
multiple server clusters. Examples: OpenNebula, VMWare vSphere. These can
manage VM managers like Xen, KVM etc. These support dynamic placement and VM
management on a pool of physical resources, automatic load balancing, server
consolidation, and dynamic infrastructure resizing and partitioning.
Finally, at the VM management level the VM managers handles VMs installed on
individual host machines. Examples: Xen, VMWare, KVM.
An ecosystem of cloud tools attempts to span both cloud management and VI
management. Besides public clouds such as Amazon EC2, open source cloud tools
for virtualization of cloud infrastructure include Eucalyptus and Globus Nimbus.
To access these cloud tools, one can use the Amazon EC2WS interface among
others.
21. Amazon Cloud: EC2
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides
resizeable computing capacity—literally, servers in Amazon's data centers—that you
use to build and host your software systems. You can access the components and
features that EC2 provides using a web-based GUI, command line tools, and APIs.
With EC2, you use and pay for only the capacity that you need. This eliminates the
need to make large and expensive hardware purchases, reduces the need to forecast
traffic, and enables you to automatically scale your IT resources to deal with changes
in requirements or spikes in popularity related to your application or service.
Components of EC2: Amazon Machine Images and Instances, Regions and
Availability Zones, Storage, Databases, Networking and Security, Monitoring, AutoScaling and Load Balancing, AWS Identity and Access Management.
http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/concepts.html
.
22. Amazon Cloud EC2: AMI
An Amazon Machine Image (AMI) is a template that contains a software configuration
(operating system, application server, and applications). From an AMI, you
launch instances, which are running copies of the AMI. You can launch multiple
instances of an AMI, as shown in the following figure.
Your instances keep running until you stop
or you terminate them, or until they fail.
If an instance fails, you can launch a new
one from the AMI.
You can use a single AMI or multiple AMIs
depending on your needs. From a single AMI,
you can launch different types of instances.
.
23. Amazon Cloud EC2: AMI
An instance type is essentially a hardware archetype. As illustrated in the following
figure, you select a particular instance type based on the amount of memory and
computing power you need for the application or software that you plan to run on the
instance.
Amazon publishes many AMIs that contain common software configurations for public
use. In addition, members of the AWS developer community have published their
own custom AMIs.
For example, if your application is a web site or web service, your AMI could be
preconfigured with a web server, the associated static content, and the code for all
dynamic pages. Alternatively, you could configure your AMI to install all required
software components and content itself by running a bootstrap script as soon as the
instance starts. As a result, after launching the AMI, your web server will start and
your application can begin accepting requests.
24. Amazon Cloud EC2: Regions and
Availability Zones
Amazon has data centers in different areas of the world (for example, North
America, Europe, and Asia). Correspondingly, Amazon EC2 is available to use
in different Regions. By launching instances in separate Regions, you can
design your application to be closer to specific customers or to meet legal or
other requirements. Prices for Amazon EC2 usage vary by Region.
Each Region contains multiple distinct locations called Availability
Zones (illustrated in the following diagram). Each Availability Zone is engineered
to be isolated from failures in other Availability zones and to provide
inexpensive, low-latency network connectivity to other zones in the same
Region. By launching instances in separate Availability Zones, you can protect
your applications from the failure of a single location.
.
25. Amazon Cloud EC2: Storage
1.
2.
3.
.
To store data, Amazon EC2 offers the following storage options:
Amazon Elastic Block Store (Amazon EBS)
Amazon EC2 Instance Store
Amazon Simple Storage Service (Amazon S3)
Amazon EBS
Amazon EBS volumes are the recommended storage option for the majority of use cases.
Amazon EBS provides the instances with persistent, block-level storage. Amazon EBS
volumes are essentially hard disks that you can attach to a running instance.
Amazon EBS is particularly suited for applications that require a database, file system, or
access to raw block-level storage.
26. Amazon Cloud EC2: Storage
To keep a back-up copy, you can create a snapshot of the volume. As illustrated in
the following figure, snapshots are stored in Amazon S3.
You can create a new Amazon EBS volume from a snapshot, and attach it to another
instance, as illustrated in the
following figure.
27. Amazon Cloud EC2: Storage
You can also detach a volume from an instance and attach it to a different one, as
illustrated in the following figure.
Instance Store
All instance types, with the exception of Micro instances, offer instance store. This is
storage that doesn't persist if the instance is stopped or terminated. Instance store is
an option for inexpensive temporary storage. You can use instance store volumes if
you don't require data persistence.
Amazon S3
Amazon S3 is storage for the Internet. It provides a simple web service interface that
enables you to store and retrieve any amount of data from anywhere on the web.
28. Amazon Cloud S3
Amazon S3 Functionality
1.
Write, read, and delete objects containing from 1 byte to 5 terabytes of data
each.
2.
The number of objects you can store is unlimited.
Each object is stored in a bucket and retrieved via a unique, developer-assigned
key.
A bucket can be stored in one of several Regions. You can choose a Region to
optimize for latency, minimize costs, or address regulatory requirements.
Objects stored in a Region never leave the Region unless you transfer them
out. For example, objects stored in the EU (Ireland) Region never leave the EU.
Authentication mechanisms are provided to ensure that data is kept secure from
unauthorized access. Objects can be made private or public, and rights can be
granted to specific users.
Options for secure data upload/download and encryption of data at rest are
provided for additional data protection.
Uses standards-based REST and SOAP interfaces designed to work with any
Internet-development toolkit.
3.
4.
5.
6.
7.
8.
29. Amazon Cloud S3: Use Cases
Content Storage and Distribution
Amazon S3 can store a variety of content ranging from web applications to
media files. A user can offload an entire storage infrastructure onto the cloud.
Storage for Data Analysis
Whether a user is storing pharmaceutical data for analysis, financial data for
computation and pricing, or photo images for resizing, Amazon S3 can be used
to store the original content. The user can then send this content to Amazon
EC2 for computation, resizing, or other large scale analytics – without incurring
any data transfer charges for moving the data between the services.
Backup, Archiving and Disaster Recovery
The Amazon S3 solution offers a scalable and secure solution for backing up
and archiving critical data.
30. Amazon Cloud: Databases
If the application running on EC2 needs a database, the common ways to
implement a database for the application are:
1.
Use Amazon Relational Database Service (Amazon RDS) to get a managed
relational database in the cloud
2.
Launch an instance of a database AMI, and use that EC2 instance as the
database
Amazon RDS offers the advantage of handling database management tasks,
such as patching the software, backing up and storing the backups
31. Amazon Cloud: Networking
and Security
Each instance is launched into the Amazon EC2 network space and assigned a
public IP address. If an instance fails and a replacement instance is launched,
the replacement will have a different public IP address than the original.
Security groups are used to control access to user instances. These are
analogous to an inbound network firewall that allows a user to specify the
protocols, ports, and source IP ranges that are allowed to reach user instances.
A user can create multiple security groups and assign different rules to each
group. Each instance can be assigned to one or more security groups, and the
rules determine which traffic is allowed in to the instance. A security group can
be configured so that only specific IP addresses or specific security groups have
access to the instance.
32. Amazon Cloud: Networking
and Security
The following figure shows a basic three-tier web-hosting architecture running
on Amazon EC2 instances. Each layer has a different security group (indicated
by the dotted line around each set of instances). The security group for the web
servers only allows access from hosts over TCP on ports 80 and 443 (HTTP
and HTTPS) and from instances in the App Servers security group on port 22
(SSH) for direct host management.
The security group for the app servers allows access from the Web
Servers security group for web requests, and from the corporate subnet over
TCP on port 22 (SSH) for direct host management. The user’s support
engineers could log directly into the application servers from the corporate
network, and then access the other instances from the application server boxes.
The DB Servers security group permits only the App Servers security group to
access the database servers.
34. Amazon Cloud: Monitoring, Auto
Scaling, and Load Balancing
AWS provides several features that enable the following:
Monitor basic statistics for instances and Amazon EBS volumes.
Automatically scale EC2 capacity up or down according to conditions defined by
the user.
Automatically distribute incoming application traffic across multiple EC2
instances. It detects unhealthy instances and reroutes traffic to healthy
instances until the unhealthy instances have been restored. Elastic Load
Balancing automatically scales its request handling capacity in response to
incoming traffic.
Elastic Load Balancing provides several different interfaces that can be used to
manage a user’s load balancers. Users can create, access, and manage their
load balancers using the AWS Management Console, the command line
interface (CLI), or the Query API. Users need to install the command line
interface and the Query API before they can be used.
35. Amazon Cloud: Identity and
Access Management (IAM)
Amazon EC2 integrates with AWS Identity and Access
Management (IAM), a service that lets the user organization do
the following:
Create users and groups under user organization's AWS account
Share an organization’s AWS account resources between the users in the
account
Assign unique security credentials to each user
Granularly control users access to services and resources
Get a single AWS bill for all users under the AWS account
For example, you can use IAM with Amazon EC2 to control which users under
an AWS account can create AMIs or launch instances.
Editor's Notes
Note 1: Cloud computing is still an evolving paradigm. Its definitions, use cases, underlying technologies, issues, risks, and benefits will be refined in a spirited debate by the public and private sectors. These definitions, attributes, and characteristics will evolve and change over time.
Note 2: The cloud computing industry represents a large ecosystem of many models, vendors, and market niches. This definition attempts to encompass all of the various cloud approaches
ISDM, IBM System Director and blade servers are shown to depict the components of a cloud system.
You can attach multiple volumes to an instance.
Using Amazon S3 is easy. To get started you:
Create a Bucket to store your data. You can choose a Region where your bucket and object(s) reside to optimize latency, minimize costs, or address regulatory requirements.
Upload Objects to your Bucket. Your data is durably stored and backed by the Amazon S3 Service Level Agreement.
Using Amazon S3 is easy. To get started you:
Create a Bucket to store your data. You can choose a Region where your bucket and object(s) reside to optimize latency, minimize costs, or address regulatory requirements.
Upload Objects to your Bucket. Your data is durably stored and backed by the Amazon S3 Service Level Agreement.
Optionally, set access controls. You can grants others access to your data from anywhere in the world.
However, your application might need a static IP address. Amazon EC2 offers elastic IP addresses for those situations. For more information, see Instance IP Addresses.