SlideShare a Scribd company logo
1 of 11
An IP Convergence
              Company




Cloud Computing
        Michael Sandberg
 SVP and CTO, Federal Systems
Vision Technologies, Incorporated
Overview

Agenda
 Why Cloud?
 Essential Characteristics
 Cloud Service Models
 Infrastructure as a Service (IaaS)
 Benefits of IaaS
 Challenges of IaaS
 Adoption of IaaS
 Summary


                          2
                                       www.visiontech.biz
Why Cloud?

Value Proposition
   Provides a way to exploit virtualization and
    consolidation
   Aggregates computing resources
   Offers economies of scale
   Offers opportunities to immediately take
    advantage of installed
    software, hardware, infrastructure, and
    applications
   Provides on-demand network access to a
    shared pool of configurable computing resources
   Lower IT costs


                                  3
                                                      www.visiontech.biz
Essential Characteristics

 On-Demand    Self-Service
 Broad Network Access
 Resource Pooling
 Rapid Elasticity
 Measured Service




                      4
                              www.visiontech.biz
Cloud Service Models

   Software as a Service (SaaS)
    ― The capability provided to the consumer to the
       provider’s applications running on a cloud
       infrastructure
   Platform as a Service
    ― The capability to deploy onto the cloud
       infrastructure consumer-related or acquired
       applications using programming languages and
       tools supported by the provider
   Infrastructure as a Service (IaaS)
    ― The capability to provision
       processing, storage, networks and other
       computing resources


                                     5
                                                       www.visiontech.biz
Infrastructure as a Service (Iaas)

 Consumer provisioned
  processing, storage, networks, and other
  computing resources
 Consumer is able to deploy and run random
  software Consumer does not manage or control
  the underlying cloud infrastructure
 Consumer has control over operating
  systems, storage or deployed applications
 Consumer may have some limited control of
  selecting network components (e.g., host firewalls)

                          6
                                             www.visiontech.biz
Benefits of IaaS

   Virtualization and consolidation of IT infrastructure
   Reduction in IT operating expenses and capital
    expenses
   Improvement of resource utilization and administrator-
    to-server ratios
   Faster time to market through increased efficiency and
    automation of standardized solutions
   Simplified integrated management
   Greater visibility into business processes and system
    performance to identify redundancies and bottlenecks
   Scaled operations that can meet IT demands, market
    dynamics, and business strategy
                             7
                                                 www.visiontech.biz
Challenges of Iaas

   Performance and security depend on a cloud
    deployment model
    ― Private
    ― Community
    ― Public
    ― Hybrid
   Global political hybrid environment
    ― National laws and restrictions
    ― Need for worldwide agreement on data
      securities, privacy policies and data interconnection


                              8
                                                    www.visiontech.biz
Adoption of IaaS

 Adoption Process and Issues
  ―Analyze IaaS offerings in terms of TCO/ROI and
   risks (e.g., vendor lock-in, interoperability, existing
   IT infrastructure)
  ―Define a clear IaaS strategy for both private and
   public implementation
  ―Start with a proof of concept – private on-site
   deployment (e.g., infrastructure virtualization
   project to establish a foundation for future cloud
   adoption)

                            9
                                                 www.visiontech.biz
Adoption of IaaS

   Considerations
    ―Consider added business value of private
     (outsourced) and public deployment models
     (e.g., security and reliability issues, integration
     with existing enterprise services
    ―Public deployments should move only non-
     critical, low-risk applications in early transition
     stages



                             10
                                                   www.visiontech.biz
Summary
Cloud computing
   Offers a centralized, remote facility for computing, leading to
    economies of scale in both software and hardware and a reduction in
    required administrative management.
   Permits the expense of infrastructure and its management to become
    an operational expense rather than a capital investment.
   Offers agility and speed for the use of computing resources on an
    immediate basis
   Is not an answer for every problem. Requirements force very high
    levels of control and/or security may not be appropriate.
   Is not necessarily cheaper than conventional computing
    environments. It is the mix of computing workloads and their cost in
    traditional and cloud computing environments which will determine if
    savings can be made.


                                   11
                                                             www.visiontech.biz

More Related Content

What's hot

Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Grid and Cloud Computing Intro
Grid and Cloud Computing IntroGrid and Cloud Computing Intro
Grid and Cloud Computing IntroOleg Podsechin
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Cloud computing
Cloud computingCloud computing
Cloud computingBrizGo
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center TransformationArraya Solutions
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactivejerianasmith
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
 
Data Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformationData Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformationCisco Canada
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Raj Sarode
 

What's hot (20)

Multi cloud networking
Multi cloud networkingMulti cloud networking
Multi cloud networking
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Grid and Cloud Computing Intro
Grid and Cloud Computing IntroGrid and Cloud Computing Intro
Grid and Cloud Computing Intro
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center Transformation
 
Dell - Converged infrastructure
Dell - Converged infrastructureDell - Converged infrastructure
Dell - Converged infrastructure
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
 
Data Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformationData Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformation
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 

Similar to CRTC Cloud- Michael Sandberg

Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
The ABC of Private Clouds
The ABC of Private CloudsThe ABC of Private Clouds
The ABC of Private CloudsCTRLS
 
Cloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data CenterCloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data CenterDataCore Software
 
SAIC Next-Gen Transformational IT
SAIC Next-Gen Transformational ITSAIC Next-Gen Transformational IT
SAIC Next-Gen Transformational ITGovCloud Network
 
2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.pptrawdnsr
 
IDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudIDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudEMC
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Cyrus Sorab
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarSaif Ahmad
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxDr Geetha Mohan
 
Vendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSVendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSOpSource
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 

Similar to CRTC Cloud- Michael Sandberg (20)

Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
The ABC of Private Clouds
The ABC of Private CloudsThe ABC of Private Clouds
The ABC of Private Clouds
 
Cloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data CenterCloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data Center
 
Cloud
CloudCloud
Cloud
 
SAIC Next-Gen Transformational IT
SAIC Next-Gen Transformational ITSAIC Next-Gen Transformational IT
SAIC Next-Gen Transformational IT
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt
 
IDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudIDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private Cloud
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
Cloud management march 20 - v7 sgc
Cloud management  march 20 - v7 sgcCloud management  march 20 - v7 sgc
Cloud management march 20 - v7 sgc
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
Vendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSVendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaS
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 

CRTC Cloud- Michael Sandberg

  • 1. An IP Convergence Company Cloud Computing Michael Sandberg SVP and CTO, Federal Systems Vision Technologies, Incorporated
  • 2. Overview Agenda  Why Cloud?  Essential Characteristics  Cloud Service Models  Infrastructure as a Service (IaaS)  Benefits of IaaS  Challenges of IaaS  Adoption of IaaS  Summary 2 www.visiontech.biz
  • 3. Why Cloud? Value Proposition  Provides a way to exploit virtualization and consolidation  Aggregates computing resources  Offers economies of scale  Offers opportunities to immediately take advantage of installed software, hardware, infrastructure, and applications  Provides on-demand network access to a shared pool of configurable computing resources  Lower IT costs 3 www.visiontech.biz
  • 4. Essential Characteristics  On-Demand Self-Service  Broad Network Access  Resource Pooling  Rapid Elasticity  Measured Service 4 www.visiontech.biz
  • 5. Cloud Service Models  Software as a Service (SaaS) ― The capability provided to the consumer to the provider’s applications running on a cloud infrastructure  Platform as a Service ― The capability to deploy onto the cloud infrastructure consumer-related or acquired applications using programming languages and tools supported by the provider  Infrastructure as a Service (IaaS) ― The capability to provision processing, storage, networks and other computing resources 5 www.visiontech.biz
  • 6. Infrastructure as a Service (Iaas)  Consumer provisioned processing, storage, networks, and other computing resources  Consumer is able to deploy and run random software Consumer does not manage or control the underlying cloud infrastructure  Consumer has control over operating systems, storage or deployed applications  Consumer may have some limited control of selecting network components (e.g., host firewalls) 6 www.visiontech.biz
  • 7. Benefits of IaaS  Virtualization and consolidation of IT infrastructure  Reduction in IT operating expenses and capital expenses  Improvement of resource utilization and administrator- to-server ratios  Faster time to market through increased efficiency and automation of standardized solutions  Simplified integrated management  Greater visibility into business processes and system performance to identify redundancies and bottlenecks  Scaled operations that can meet IT demands, market dynamics, and business strategy 7 www.visiontech.biz
  • 8. Challenges of Iaas  Performance and security depend on a cloud deployment model ― Private ― Community ― Public ― Hybrid  Global political hybrid environment ― National laws and restrictions ― Need for worldwide agreement on data securities, privacy policies and data interconnection 8 www.visiontech.biz
  • 9. Adoption of IaaS  Adoption Process and Issues ―Analyze IaaS offerings in terms of TCO/ROI and risks (e.g., vendor lock-in, interoperability, existing IT infrastructure) ―Define a clear IaaS strategy for both private and public implementation ―Start with a proof of concept – private on-site deployment (e.g., infrastructure virtualization project to establish a foundation for future cloud adoption) 9 www.visiontech.biz
  • 10. Adoption of IaaS  Considerations ―Consider added business value of private (outsourced) and public deployment models (e.g., security and reliability issues, integration with existing enterprise services ―Public deployments should move only non- critical, low-risk applications in early transition stages 10 www.visiontech.biz
  • 11. Summary Cloud computing  Offers a centralized, remote facility for computing, leading to economies of scale in both software and hardware and a reduction in required administrative management.  Permits the expense of infrastructure and its management to become an operational expense rather than a capital investment.  Offers agility and speed for the use of computing resources on an immediate basis  Is not an answer for every problem. Requirements force very high levels of control and/or security may not be appropriate.  Is not necessarily cheaper than conventional computing environments. It is the mix of computing workloads and their cost in traditional and cloud computing environments which will determine if savings can be made. 11 www.visiontech.biz