SlideShare a Scribd company logo
Deploying and Utilizing a
Statewide Private Cloud
Dr. Curtis A. Carver Jr.
Vice Chancellor and CIO
John Scoville
Chief Technology Officer
Board of Regents of the University System of Georgia
Agenda
• ITS Overview
• Example of a PeachNet Service
• Clouds
• PeachNet Technical Rundown
• Questions, Comments, a Conversation
3,300 mile Private Cloud
Virtual Library
Software Store
Enterprise Security and ePrivacy
Distance Education Learning Management
Enterprise Financials Enterprise BI
Library Operations
Student Information
Collaboration
Why a Educational Private Cloud?
• Cost
– Work as a system
– Negotiate as a system
• Agility
– No contracts and thus 15 minute response.
– No set bandwidth, storage, data center, backup.
– Particularly pertinent to rural institutions and
research institutions.
Private
Cloud
Services
Campus
Control
System
Control
Shadow
IT
Control
PeachNet Service Example
Desire2Learn
– Deployed as Software as a Service to 30/31 institutions.
– 100% system availability since launch in May 2012.
– 34 million hits a day.
Projected to be 50 million in September.
– 15,000 concurrent sessions pretty much 7 days a week, 24
hours a day.
PeachNet
Georgia’s Private Cloud providing:
• Bandwidth as a service
• Storage as a Service
• Backup as a Service
• Virtual Data Centers as a Service
• Used by:
– 31/31 USG institutions,
– 7/28 TCSG institutions,
– Potentially all DOE schools
Cloud computing is all the rage. "It's become the phrase du jour," says Gartner
senior analyst Ben Pring, echoing many of his peers. The problem is that (as
with Web 2.0) everyone seems to have a different definition.
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when
combined with "computing," the meaning gets bigger and fuzzier. Some
analysts and vendors define cloud computing narrowly as an updated version
of utility computing: basically virtual servers available over the Internet.
Others go very broad, arguing anything you consume outside the firewall is
"in the cloud," including conventional outsourcing.
What Cloud Computing Really Means
Eric Knorr & Galen Gruman, InfoWorld 2011
What is the Cloud?
Cloud computing is a marketing term for technologies that provide
computation, software, data access, and storage services that do not require
end-user knowledge of the physical location and configuration of the system
that delivers the services.
Also, it’s delivery model for IT services is based on Internet protocols.
Wikipedia 2011
What is the Cloud?
• Software as a Service (SaaS). Quite simply, SaaS is a software application
hosted in a central location and delivered via a web browser or other thin
client.
• Platform as a Service (PaaS). PaaS is a software-development platform
that is stored in the cloud and can be accessed via a web browser. It makes
a variety of programming languages, operating systems, and tools
available to developers, saving them the cost of purchasing and installing
everything themselves.
• Infrastructure as a Service (IaaS). The capability provided the consumer is
to provision processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy and run
arbitrary software, which can include operating systems and applications.
Service Models
PeachNet Cloud Storage Service
The cloud-based storage service is based on EMC Atmos, and is similar to Amazon's cloud-based storage
service, S3. The native interface is a REST-based (http) API, but there are also a number of other access
methods that you can use (including appliances that you can purchase) that are designed to write data to
Atmos. The service is designed for large, typically archive dataset.
ADVANTAGES
Solution for implementation of NSF mandated Data Management Plans
Export control over privacy from a trusted community
Scalable flexibility based on your growth
Fully replicated, redundant, high availability storage
Multiple access methods (CIFS/NFS/IFS/Web2.0/Sync & Share)
No additional network or bandwidth charges
PeachNet Backup Service
Getting data offsite as part of a data protection plan has been difficult in the past. Plans that look
good on paper are often too difficult and cost-prohibitive to implement.
The backup service is based on EMC's Avamar system, which offers source-based de-duplication. But
the idea is the same as with traditional systems: You install a backup agent on each host that you wish
to backup, and backups are streamed to our backup systems here in Athens. You can login to the
backup management system and control various aspects of your backups including the ability to
perform self-service restores.
The price is $.30 / GB / retention-copy / year. For example, if you had 10TB of source data with 5
days of retention (50TB total), the price would be $15,000 annually. However, once you get above
100TB total, we have volume discounts ranging from 25% to over 60%.
PeachNet Data Center Service
The Virtual Data Center service provides you with virtual machines that you manage (including
console access, the ability to install operating systems, etc.). It also includes a private firewall that
you can use to control access to and from your virtual machines.
The annual cost of the service is calculated as follows:
• System Administration Personal Services $3,450.00 per Customer
• Virtual Machines $ 115.00 per Virtual Machine
• Server and related infrastructure* $ 49.00 per GB RAM
• Storage $ 1.25 per GB storage
*Note: Server and related infrastructure covers the cost of physical servers, per-server software
licensing, and other data center infrastructure. It is charged based on GB RAM, which is a key
indicator of total infrastructure usage.
Summary
The University System of Georgia provides a
private cloud environment called PeachNet to
empower the inspiration and education of the
future leaders of Georgia and the world.
Questions, Comments,
a Conversation?

More Related Content

What's hot

Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
eShikshak
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
GAURAV SINHA
 
cloud computing
 cloud computing cloud computing
cloud computing
Tapesh Chalisgaonkar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Selvaraj Kesavan
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...EuroCloud
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Garuda Trainings
 
Cloud Computing System models for Distributed and cloud computing & Performan...
Cloud Computing System models for Distributed and cloud computing & Performan...Cloud Computing System models for Distributed and cloud computing & Performan...
Cloud Computing System models for Distributed and cloud computing & Performan...
hrmalik20
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
Naga Dinesh
 
Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
Karan Kukreja
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
solarisyougood
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
pallavi_gaurav
 
Cloud computing
Cloud computingCloud computing
Cloud computingsandita12
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationPriyanka Sharma
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Arysha Channa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Payal Vaswani
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
Raman Gill
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mehul Patel
 
Topic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsTopic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing Paradigms
Zubair Nabi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Rupak Chaulagain
 

What's hot (20)

Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 
Cloud Computing System models for Distributed and cloud computing & Performan...
Cloud Computing System models for Distributed and cloud computing & Performan...Cloud Computing System models for Distributed and cloud computing & Performan...
Cloud Computing System models for Distributed and cloud computing & Performan...
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
 
Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Topic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsTopic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing Paradigms
 
Jjm cloud computing
Jjm cloud computingJjm cloud computing
Jjm cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Viewers also liked

davos3
davos3davos3
Pacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment Powerpoint
PacificBulletproof
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessmentbradburns
 
Unit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - BabeliUnit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - BabeliLianna Babeli
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2mojo_5
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
Curtis A. Carver Jr.
 
Threat assessment and the active shooter
Threat assessment and the active shooterThreat assessment and the active shooter
Threat assessment and the active shooterworkthreatgroup
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
TaekHyeun Kim
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk Management
Ramiro Cid
 
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Cory Scott
 

Viewers also liked (10)

davos3
davos3davos3
davos3
 
Pacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment Powerpoint
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessment
 
Unit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - BabeliUnit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - Babeli
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
 
Threat assessment and the active shooter
Threat assessment and the active shooterThreat assessment and the active shooter
Threat assessment and the active shooter
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk Management
 
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
 

Similar to Deploying and utilizing statewide private cloud lessons learned

Cloud computing
Cloud computingCloud computing
Cloud computing
waghu
 
CLOUD SEMINAR.pptx
CLOUD SEMINAR.pptxCLOUD SEMINAR.pptx
CLOUD SEMINAR.pptx
sakshi126838
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
ssuserbb23da
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Vaishnavi Mishra
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
Agaram Technologies
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
vishnu varunan
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
Nabi Hasan
 
oracle.pptx
oracle.pptxoracle.pptx
oracle.pptx
Minakshee Patil
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
ApthiriSurekha
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
Laud Randy Amofah
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
UtkarshKumar608655
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
vishnu varunan
 
Intro To Cloud Computing
Intro To Cloud ComputingIntro To Cloud Computing
Intro To Cloud Computing
prakashjjaya
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Misha Ali
 
cloud computing
cloud computingcloud computing
cloud computing
Kalai Selvi
 

Similar to Deploying and utilizing statewide private cloud lessons learned (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD SEMINAR.pptx
CLOUD SEMINAR.pptxCLOUD SEMINAR.pptx
CLOUD SEMINAR.pptx
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
 
oracle.pptx
oracle.pptxoracle.pptx
oracle.pptx
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Intro To Cloud Computing
Intro To Cloud ComputingIntro To Cloud Computing
Intro To Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloud computing
cloud computingcloud computing
cloud computing
 

More from Curtis A. Carver Jr.

Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from Georgia
Curtis A. Carver Jr.
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growth
Curtis A. Carver Jr.
 
Threat assessment new normal
Threat assessment new normalThreat assessment new normal
Threat assessment new normal
Curtis A. Carver Jr.
 
Rock eagle thursday presentation
Rock eagle thursday presentationRock eagle thursday presentation
Rock eagle thursday presentation
Curtis A. Carver Jr.
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Community
Curtis A. Carver Jr.
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
Curtis A. Carver Jr.
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult Learners
Curtis A. Carver Jr.
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Curtis A. Carver Jr.
 
Four important trends in it and security implications
Four important trends in it and security implicationsFour important trends in it and security implications
Four important trends in it and security implications
Curtis A. Carver Jr.
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke County
Curtis A. Carver Jr.
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision making
Curtis A. Carver Jr.
 
Transform today to innovate for tomorrow
Transform today to innovate for tomorrowTransform today to innovate for tomorrow
Transform today to innovate for tomorrow
Curtis A. Carver Jr.
 
System level innovation
System level innovationSystem level innovation
System level innovation
Curtis A. Carver Jr.
 
It innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingIt innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingCurtis A. Carver Jr.
 
Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutes
Curtis A. Carver Jr.
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local state
Curtis A. Carver Jr.
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usg
Curtis A. Carver Jr.
 

More from Curtis A. Carver Jr. (20)

100 day letter
100 day letter100 day letter
100 day letter
 
Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from Georgia
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growth
 
Threat assessment new normal
Threat assessment new normalThreat assessment new normal
Threat assessment new normal
 
Rock eagle thursday presentation
Rock eagle thursday presentationRock eagle thursday presentation
Rock eagle thursday presentation
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Community
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
 
Emerging world order
Emerging world orderEmerging world order
Emerging world order
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult Learners
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
 
Four important trends in it and security implications
Four important trends in it and security implicationsFour important trends in it and security implications
Four important trends in it and security implications
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke County
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision making
 
Transform today to innovate for tomorrow
Transform today to innovate for tomorrowTransform today to innovate for tomorrow
Transform today to innovate for tomorrow
 
System level innovation
System level innovationSystem level innovation
System level innovation
 
It innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingIt innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcing
 
Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutes
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local state
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usg
 
Galileo at a Crossroads
Galileo at a CrossroadsGalileo at a Crossroads
Galileo at a Crossroads
 

Recently uploaded

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Deploying and utilizing statewide private cloud lessons learned

  • 1. Deploying and Utilizing a Statewide Private Cloud Dr. Curtis A. Carver Jr. Vice Chancellor and CIO John Scoville Chief Technology Officer Board of Regents of the University System of Georgia
  • 2. Agenda • ITS Overview • Example of a PeachNet Service • Clouds • PeachNet Technical Rundown • Questions, Comments, a Conversation
  • 3. 3,300 mile Private Cloud Virtual Library Software Store Enterprise Security and ePrivacy Distance Education Learning Management Enterprise Financials Enterprise BI Library Operations Student Information Collaboration
  • 4. Why a Educational Private Cloud? • Cost – Work as a system – Negotiate as a system • Agility – No contracts and thus 15 minute response. – No set bandwidth, storage, data center, backup. – Particularly pertinent to rural institutions and research institutions. Private Cloud Services Campus Control System Control Shadow IT Control
  • 5. PeachNet Service Example Desire2Learn – Deployed as Software as a Service to 30/31 institutions. – 100% system availability since launch in May 2012. – 34 million hits a day. Projected to be 50 million in September. – 15,000 concurrent sessions pretty much 7 days a week, 24 hours a day.
  • 6.
  • 7. PeachNet Georgia’s Private Cloud providing: • Bandwidth as a service • Storage as a Service • Backup as a Service • Virtual Data Centers as a Service • Used by: – 31/31 USG institutions, – 7/28 TCSG institutions, – Potentially all DOE schools
  • 8. Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition. As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing. What Cloud Computing Really Means Eric Knorr & Galen Gruman, InfoWorld 2011 What is the Cloud?
  • 9. Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Also, it’s delivery model for IT services is based on Internet protocols. Wikipedia 2011 What is the Cloud?
  • 10. • Software as a Service (SaaS). Quite simply, SaaS is a software application hosted in a central location and delivered via a web browser or other thin client. • Platform as a Service (PaaS). PaaS is a software-development platform that is stored in the cloud and can be accessed via a web browser. It makes a variety of programming languages, operating systems, and tools available to developers, saving them the cost of purchasing and installing everything themselves. • Infrastructure as a Service (IaaS). The capability provided the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. Service Models
  • 11. PeachNet Cloud Storage Service The cloud-based storage service is based on EMC Atmos, and is similar to Amazon's cloud-based storage service, S3. The native interface is a REST-based (http) API, but there are also a number of other access methods that you can use (including appliances that you can purchase) that are designed to write data to Atmos. The service is designed for large, typically archive dataset. ADVANTAGES Solution for implementation of NSF mandated Data Management Plans Export control over privacy from a trusted community Scalable flexibility based on your growth Fully replicated, redundant, high availability storage Multiple access methods (CIFS/NFS/IFS/Web2.0/Sync & Share) No additional network or bandwidth charges
  • 12. PeachNet Backup Service Getting data offsite as part of a data protection plan has been difficult in the past. Plans that look good on paper are often too difficult and cost-prohibitive to implement. The backup service is based on EMC's Avamar system, which offers source-based de-duplication. But the idea is the same as with traditional systems: You install a backup agent on each host that you wish to backup, and backups are streamed to our backup systems here in Athens. You can login to the backup management system and control various aspects of your backups including the ability to perform self-service restores. The price is $.30 / GB / retention-copy / year. For example, if you had 10TB of source data with 5 days of retention (50TB total), the price would be $15,000 annually. However, once you get above 100TB total, we have volume discounts ranging from 25% to over 60%.
  • 13. PeachNet Data Center Service The Virtual Data Center service provides you with virtual machines that you manage (including console access, the ability to install operating systems, etc.). It also includes a private firewall that you can use to control access to and from your virtual machines. The annual cost of the service is calculated as follows: • System Administration Personal Services $3,450.00 per Customer • Virtual Machines $ 115.00 per Virtual Machine • Server and related infrastructure* $ 49.00 per GB RAM • Storage $ 1.25 per GB storage *Note: Server and related infrastructure covers the cost of physical servers, per-server software licensing, and other data center infrastructure. It is charged based on GB RAM, which is a key indicator of total infrastructure usage.
  • 14. Summary The University System of Georgia provides a private cloud environment called PeachNet to empower the inspiration and education of the future leaders of Georgia and the world.