SlideShare a Scribd company logo
Asmaa Ibrahim
5/6/20141
Part I: Fundamental Cloud Computing
Fundamental Cloud Computing
5/6/20142
 Chapter 1: Understanding Cloud Computing
 Chapter 2: Fundamental Concepts and Models
 Chapter 3: Cloud-EnablingTechnology
 Chapter 4: Fundamental Cloud Security
Understanding Cloud Computing
5/6/20143
 Origins and Influences
 Basic Concepts andTerminology
A Brief History
5/6/20144
“As of now, computer networks are
still in their infancy, but as they
grow up and become
sophisticated, we will probably see
the spread of ‘computer utilities’
…”. Leonard Kleinrock
A Brief History
5/6/20145
What is the next ??
5/6/20146
5/6/20147
Innovation
Technology
8
5/6/20149
 Cloud computing is a new way of delivering
computing resources, not a new technology.
Why Cloud Computing?
5/6/201410
 Business Drivers
 Capacity Planning
 OrganizationalAgility
 Cost Reduction
 Technology Innovations
 Clustering
 Grid Computing
 Virtualization
Capacity planning
5/6/201411
Organizational Agility
5/6/201412
Cost Reduction
5/6/201413
Clustering
5/6/201414
5/6/201415
Grid Computing
5/6/201416
Virtualization
5/6/201417
 Let’s talk about virtualization in details.
Virtualization History
5/6/201418
Virtualization Principles
5/6/201419
Server virtualization separates software
from hardware.
The low-layer virtualization software
abstracts a virtual hardware interface by
means of space segmentation, time
division, and emulation to provide the
upper-layer OSs with an expected
hardware environment.
Virtualization architecture
5/6/201420
Virtualization Implementation
5/6/201421
 VMM virtualizes three types of physical resources: CPU,
memory, and I/O device. CPU virtualization is the most
important.
 We will go through:
 CPU virtualization
 memory virtualization
 I/O device virtualization
1- CPU Virtualization
5/6/201422
 Classical virtualization method
 The modern computer architecture offers at least two levels of privilege
(user mode and kernel mode) to isolate system software from application
programs
 x86 virtualization method
 The x86 architecture offers four levels of privilege known as Ring 0, 1, 2,
and 3.The x86 has the following sensitive instructions:
1. Instructions used to access and modify machine state orVM state
2. Instructions that read or change sensitive registers, such as a clock register or
interrupt registers, or memory locations
3. Instructions that reference the storage protection system, memory, or address
relocation system (such as paging)
4. All I/O instructions
x86 virtualization method
5/6/201423
2- Memory Virtualization
5/6/201424
3- I/O Device Virtualization
5/6/201425
 TheVMM virtualizes I/O devices to reuse limited I/O resources.
It intercepts requests when guest OSs attempt to access I/O
devices and then uses software to emulate real hardware.There are
three types of I/O device virtualization methods: complete
emulation on interface, front-end and back-end emulation, and
direct allocation.
Technology Innovations vs. Enabling
Technologies
5/6/201426
 These are distinguished as cloud-enabling technologies:
 Broadband Networks and InternetArchitecture
 Data CenterTechnology
 (Modern)VirtualizationTechnology
 WebTechnology
 MultitenantTechnology
 ServiceTechnology
Basic Concepts and Terminology
5/6/201427
Cloud
5/6/201428
 A Cloud refers to a distinct IT environment that is designed for
the purpose of remotely provisioning scalable and measured IT
resources.
Figure 1.1
The symbol used to denote the boundary of a cloud
environment.
IT Resource
5/6/201429
 An IT resource is a physical or virtual IT-related artifact that can
be either software based, such as a virtual server or a custom
software program, or hardware-based, such as a physical server or
a network device (Figure 1.2).
Figure 1.2
Examples of common IT resources and their corresponding symbols.
Figure 1.3
A cloud is hosting eight IT resources: three virtual servers, two cloud services, and three
storage devices.
5/6/201430
On-Premise
5/6/201431
 An on-premise IT resource can access and interact with a
cloud-based IT resource.
 An on-premise IT resource can be moved to a cloud, thereby
changing it to a cloud-based IT resource.
 Redundant deployments of an IT resource can exist in both
on-premise and cloud-based environments.
Scaling
5/6/201434
 Scaling, from an IT resource perspective, represents the
ability of the IT resource to handle increased or decreased
usage demands.
 The following are types of scaling:
 Horizontal Scaling – scaling out and scaling in
 Vertical Scaling – scaling up and scaling down
Horizontal Scaling
5/6/201435
Figure 1.4
An IT resource (Virtual ServerA) is scaled out by adding more of the same IT resources
(Virtual Servers B and C).
Vertical Scaling
5/6/201436
Figure 1.5
An IT resource (a virtual server with two CPUs) is scaled up by replacing it with a
more powerful IT resource with increased capacity for data storage (a physical server
with four CPUs).
HS & VS comparison
5/6/201437
Service
5/6/201438
 From an implementation perspective, a service is a software
program that can be remotely invoked via a published
technical interface (or API) referred to as a service
contract.
 When a software program invoked and interacts with a
service, it is labeled as a service consumer.
 Services acting as service consumers can invoke other
services.When two or more services participates to
complete a given task, the services form a service
composition.
 A service can reside on-premise or in a cloud. In the latter
case, I is further qualified as a cloud service (as explained in
the following Cloud Service section).
Cloud Service
5/6/201439
 A cloud service is any IT resource that is made remotely
accessible via a cloud.
 Unlike other IT fields that fall under the service technology
umbrella—such as service- oriented architecture—the term
“service” within the context of cloud computing is especially
broad.
A cloud service that exists as a virtual server is also being accessed from outside of the
cloud’s boundary (right).The cloud service on the right may be accessed by a human user
that has remotely logged on to the virtual server.
5/6/201440
A cloud service with a published technical interface is being accessed by a consumer
outside of the cloud (left).The cloud service on the left is likely being invoked by a
consumer program that was designed to access the cloud service’s published technical
interface.
5/6/201441
Goals and Benefits from Cloud
Computing
5/6/201442
Benefits
5/6/201443
 Reduced Investments and Proportional Costs
 Increased Scalability
 IncreasedAvailability and Reliability
Reduced Investments and Proportional
Costs
5/6/201444
 The most common economic rationale for investing in cloud-
based IT resources is in the reduction or outright elimination of
up-front IT investments, namely hardware and software purchases
and ownership costs.
 A cloud’s Measured Usage characteristic represents a feature-set
that allows measured operational expenditures (directly related to
business performance) to replace anticipated capital expenditures.
This is also referred to as proportional costs.
Reduced Investments and Proportional
Costs
5/6/201445
 The Elimination or minimization of up-front financial
commitments allows enterprises to start small and
accordingly increase IT resource allocation as required.
Moreover, the reduction of up-front capital expenses allows
for the capital to be redirected to the core business
investment.
 IT professionals, and network bandwidth can be obtained at
lower costs, resulting in both
Reduced Investments and Proportional
Costs
5/6/201446
 Common measurable benefits to cloud consumers
include:
 On-demand access to pay-as-you-go computing resources on a
short-term basis (such as processors by the hour), and the
ability to release these computing resources when they are no
longer needed.
 The perception of having unlimited computing resources that
are available on demand, thereby reducing the need to prepare
for provisioning.
 The ability to add or remove IT resources at a fine-grained
level, such as modifying available storage disk space by single
gigabyte increments.
 Abstraction of the infrastructure so applications are not locked into
devices or locations and can be easily moved if needed.
Increased Scalability
5/6/201447
 A simple example of usage demand fluctuations throughout a 24 hour period is
provided in Figure 3.8.
Figure 1.8
An example of an organization’s changing demand for an IT resource over the
course of a day.
Increased Availability and Reliability
5/6/201448
 The availability and reliability of IT resources are directly
associated with tangible business benefits.
 A hallmark of the typical cloud environment is its intrinsic
ability to provide extensive support for increasing the
availability of a cloud-based IT resource to minimize or even
eliminate outages, and for increasing its reliability so as to
minimize the impact of runtime failure conditions.
Increased Availability and Reliability
5/6/201449
Specifically:
 An IT resource with increased availability is accessible for
longer periods of time (for example, 22 hours out of a 24
hour day). Cloud providers generally offer resilient” IT
resources for which they are able to guarantee high levels of
availability.
 An IT resource with increased reliability is able to better
avoid and recover from exception conditions.The modular
architecture of cloud environments provides extensive
failover support that increases reliability.
Risks and Challenges
5/6/201450
Risks and Challenges
5/6/201451
 Increased SecurityVulnerabilities
 Reduced Operational Governance Control
 Limited Portability Between Cloud Providers
 Multi-Regional Compliance and Legal Issue
Increased Security Vulnerabilities
5/6/201452
 The moving of business data to the cloud means that the
responsibility over data security becomes shared with the
cloud provider.The remote usage of IT resources requires an
expansion of trust boundaries by the cloud consumer to
include the external cloud.
5/6/201453
Consider the following examples:
5/6/201454
 An unreliable cloud provider may not maintain the
guarantees it makes in the SLAs that were published for
its cloud services.This can jeopardize the quality of the
cloud consumer solutions that rely on these cloud
services.
 Longer geographic distances between the cloud
consumer and cloud provider can require additional
network hops that introduce fluctuating latency and
potential bandwidth constraints.
Another Scenario
5/6/201455
Figure 1.10
An unreliable network connection compromises the quality of communication between
cloud consumer and cloud provider environments.
5/6/201456
Limited Portability Between Cloud
Providers
5/6/201457
 Due to a lack of established industry standards within the
cloud computing industry, public clouds are commonly
proprietary to various extents. For cloud consumers that
have custom-built solutions with dependencies on these
proprietary environments, it can be challenging to move
from one cloud provider to another.
 Portability is a measure used to determine the impact of
moving cloud consumer IT resources and data between
clouds
Figure 1.11
A cloud consumer’s application has a decreased level of portability when assessing a potential migration from CloudA to Cloud B,
because the cloud provider of Cloud B does not support the same security technologies as CloudA.
5/6/201458
Multi-Regional Compliance and Legal
Issues
5/6/201459
 Third-party cloud providers will frequently establish data centers
in affordable or convenient geographical locations. Cloud
consumers will often not be aware of the physical location of their
IT resources and data when hosted by public clouds.
 For some organizations, this can pose serious legal concerns
pertaining to industry or government regulations that specify data
privacy and storage policies.
 For example, some UK laws require personal data belonging to
UK citizens to be kept within the United Kingdom.
Legal Issues
5/6/201460
 Another potential legal issue pertains to the accessibility and
disclosure of data.
 Countries have laws that require some types of data to be
disclosed to certain government agencies or to the subject of the
data.
 For example, a European cloud consumer’s data that is located in
the U.S. can be more easily accessed by government agencies (due
to the U.S. PatriotAct) when compared to data located in many
European Union countries.
Activity
5/6/201461

More Related Content

What's hot

Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2Ignacio M. Llorente
 
Cluster computing
Cluster computingCluster computing
Cluster computing
Raja' Masa'deh
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
Karishma Patro
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
Mohammed Sajjad Ali
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
Mohammed Sajjad Ali
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
SURESHKUMARG17
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mehul Patel
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mohammad Ilyas Malik
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
Integral university, India
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Biswajit Pratihari
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
RMK ENGINEERING COLLEGE, CHENNAI
 

What's hot (20)

Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
 

Similar to Fundamental of cloud computing

Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
Asmaa Ibrahim
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
Raman Gill
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
ijcsa
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
EMC
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
Scientific Review SR
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
CeleraNetworks
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
ijtsrd
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
V04405122126
V04405122126V04405122126
V04405122126
IJERA Editor
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
eSAT Publishing House
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
inventionjournals
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
imogokate
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 
ENERGY EFFICIENCY IN CLOUD COMPUTING
ENERGY EFFICIENCY IN CLOUD COMPUTINGENERGY EFFICIENCY IN CLOUD COMPUTING
ENERGY EFFICIENCY IN CLOUD COMPUTING
Associate Professor in VSB Coimbatore
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
HTS Hosting
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
Monica Rivera
 

Similar to Fundamental of cloud computing (20)

Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud Computing Improving Organizational Agility
Cloud Computing Improving Organizational AgilityCloud Computing Improving Organizational Agility
Cloud Computing Improving Organizational Agility
 
V04405122126
V04405122126V04405122126
V04405122126
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
ENERGY EFFICIENCY IN CLOUD COMPUTING
ENERGY EFFICIENCY IN CLOUD COMPUTINGENERGY EFFICIENCY IN CLOUD COMPUTING
ENERGY EFFICIENCY IN CLOUD COMPUTING
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 

More from Vietnam Open Infrastructure User Group

Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with CephRoom 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Vietnam Open Infrastructure User Group
 
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Vietnam Open Infrastructure User Group
 
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Vietnam Open Infrastructure User Group
 
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Vietnam Open Infrastructure User Group
 
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Vietnam Open Infrastructure User Group
 
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Vietnam Open Infrastructure User Group
 
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Vietnam Open Infrastructure User Group
 
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Vietnam Open Infrastructure User Group
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Vietnam Open Infrastructure User Group
 
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Vietnam Open Infrastructure User Group
 
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combinationRoom 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Vietnam Open Infrastructure User Group
 
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practiceRoom 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Vietnam Open Infrastructure User Group
 
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Vietnam Open Infrastructure User Group
 
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiRoom 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Vietnam Open Infrastructure User Group
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Vietnam Open Infrastructure User Group
 
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Vietnam Open Infrastructure User Group
 
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Vietnam Open Infrastructure User Group
 
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Vietnam Open Infrastructure User Group
 
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Vietnam Open Infrastructure User Group
 
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache JamesRoom 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Vietnam Open Infrastructure User Group
 

More from Vietnam Open Infrastructure User Group (20)

Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with CephRoom 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
 
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
 
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
 
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
 
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
 
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
 
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
 
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
 
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
 
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combinationRoom 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
 
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practiceRoom 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
 
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
 
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiRoom 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
 
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
 
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
 
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
 
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
 
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache JamesRoom 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Fundamental of cloud computing

  • 1. Asmaa Ibrahim 5/6/20141 Part I: Fundamental Cloud Computing
  • 2. Fundamental Cloud Computing 5/6/20142  Chapter 1: Understanding Cloud Computing  Chapter 2: Fundamental Concepts and Models  Chapter 3: Cloud-EnablingTechnology  Chapter 4: Fundamental Cloud Security
  • 3. Understanding Cloud Computing 5/6/20143  Origins and Influences  Basic Concepts andTerminology
  • 4. A Brief History 5/6/20144 “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of ‘computer utilities’ …”. Leonard Kleinrock
  • 6. What is the next ?? 5/6/20146
  • 9. 5/6/20149  Cloud computing is a new way of delivering computing resources, not a new technology.
  • 10. Why Cloud Computing? 5/6/201410  Business Drivers  Capacity Planning  OrganizationalAgility  Cost Reduction  Technology Innovations  Clustering  Grid Computing  Virtualization
  • 17. Virtualization 5/6/201417  Let’s talk about virtualization in details.
  • 19. Virtualization Principles 5/6/201419 Server virtualization separates software from hardware. The low-layer virtualization software abstracts a virtual hardware interface by means of space segmentation, time division, and emulation to provide the upper-layer OSs with an expected hardware environment.
  • 21. Virtualization Implementation 5/6/201421  VMM virtualizes three types of physical resources: CPU, memory, and I/O device. CPU virtualization is the most important.  We will go through:  CPU virtualization  memory virtualization  I/O device virtualization
  • 22. 1- CPU Virtualization 5/6/201422  Classical virtualization method  The modern computer architecture offers at least two levels of privilege (user mode and kernel mode) to isolate system software from application programs  x86 virtualization method  The x86 architecture offers four levels of privilege known as Ring 0, 1, 2, and 3.The x86 has the following sensitive instructions: 1. Instructions used to access and modify machine state orVM state 2. Instructions that read or change sensitive registers, such as a clock register or interrupt registers, or memory locations 3. Instructions that reference the storage protection system, memory, or address relocation system (such as paging) 4. All I/O instructions
  • 25. 3- I/O Device Virtualization 5/6/201425  TheVMM virtualizes I/O devices to reuse limited I/O resources. It intercepts requests when guest OSs attempt to access I/O devices and then uses software to emulate real hardware.There are three types of I/O device virtualization methods: complete emulation on interface, front-end and back-end emulation, and direct allocation.
  • 26. Technology Innovations vs. Enabling Technologies 5/6/201426  These are distinguished as cloud-enabling technologies:  Broadband Networks and InternetArchitecture  Data CenterTechnology  (Modern)VirtualizationTechnology  WebTechnology  MultitenantTechnology  ServiceTechnology
  • 27. Basic Concepts and Terminology 5/6/201427
  • 28. Cloud 5/6/201428  A Cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. Figure 1.1 The symbol used to denote the boundary of a cloud environment.
  • 29. IT Resource 5/6/201429  An IT resource is a physical or virtual IT-related artifact that can be either software based, such as a virtual server or a custom software program, or hardware-based, such as a physical server or a network device (Figure 1.2). Figure 1.2 Examples of common IT resources and their corresponding symbols.
  • 30. Figure 1.3 A cloud is hosting eight IT resources: three virtual servers, two cloud services, and three storage devices. 5/6/201430
  • 31. On-Premise 5/6/201431  An on-premise IT resource can access and interact with a cloud-based IT resource.  An on-premise IT resource can be moved to a cloud, thereby changing it to a cloud-based IT resource.  Redundant deployments of an IT resource can exist in both on-premise and cloud-based environments.
  • 32. Scaling 5/6/201434  Scaling, from an IT resource perspective, represents the ability of the IT resource to handle increased or decreased usage demands.  The following are types of scaling:  Horizontal Scaling – scaling out and scaling in  Vertical Scaling – scaling up and scaling down
  • 33. Horizontal Scaling 5/6/201435 Figure 1.4 An IT resource (Virtual ServerA) is scaled out by adding more of the same IT resources (Virtual Servers B and C).
  • 34. Vertical Scaling 5/6/201436 Figure 1.5 An IT resource (a virtual server with two CPUs) is scaled up by replacing it with a more powerful IT resource with increased capacity for data storage (a physical server with four CPUs).
  • 35. HS & VS comparison 5/6/201437
  • 36. Service 5/6/201438  From an implementation perspective, a service is a software program that can be remotely invoked via a published technical interface (or API) referred to as a service contract.  When a software program invoked and interacts with a service, it is labeled as a service consumer.  Services acting as service consumers can invoke other services.When two or more services participates to complete a given task, the services form a service composition.  A service can reside on-premise or in a cloud. In the latter case, I is further qualified as a cloud service (as explained in the following Cloud Service section).
  • 37. Cloud Service 5/6/201439  A cloud service is any IT resource that is made remotely accessible via a cloud.  Unlike other IT fields that fall under the service technology umbrella—such as service- oriented architecture—the term “service” within the context of cloud computing is especially broad.
  • 38. A cloud service that exists as a virtual server is also being accessed from outside of the cloud’s boundary (right).The cloud service on the right may be accessed by a human user that has remotely logged on to the virtual server. 5/6/201440
  • 39. A cloud service with a published technical interface is being accessed by a consumer outside of the cloud (left).The cloud service on the left is likely being invoked by a consumer program that was designed to access the cloud service’s published technical interface. 5/6/201441
  • 40. Goals and Benefits from Cloud Computing 5/6/201442
  • 41. Benefits 5/6/201443  Reduced Investments and Proportional Costs  Increased Scalability  IncreasedAvailability and Reliability
  • 42. Reduced Investments and Proportional Costs 5/6/201444  The most common economic rationale for investing in cloud- based IT resources is in the reduction or outright elimination of up-front IT investments, namely hardware and software purchases and ownership costs.  A cloud’s Measured Usage characteristic represents a feature-set that allows measured operational expenditures (directly related to business performance) to replace anticipated capital expenditures. This is also referred to as proportional costs.
  • 43. Reduced Investments and Proportional Costs 5/6/201445  The Elimination or minimization of up-front financial commitments allows enterprises to start small and accordingly increase IT resource allocation as required. Moreover, the reduction of up-front capital expenses allows for the capital to be redirected to the core business investment.  IT professionals, and network bandwidth can be obtained at lower costs, resulting in both
  • 44. Reduced Investments and Proportional Costs 5/6/201446  Common measurable benefits to cloud consumers include:  On-demand access to pay-as-you-go computing resources on a short-term basis (such as processors by the hour), and the ability to release these computing resources when they are no longer needed.  The perception of having unlimited computing resources that are available on demand, thereby reducing the need to prepare for provisioning.  The ability to add or remove IT resources at a fine-grained level, such as modifying available storage disk space by single gigabyte increments.  Abstraction of the infrastructure so applications are not locked into devices or locations and can be easily moved if needed.
  • 45. Increased Scalability 5/6/201447  A simple example of usage demand fluctuations throughout a 24 hour period is provided in Figure 3.8. Figure 1.8 An example of an organization’s changing demand for an IT resource over the course of a day.
  • 46. Increased Availability and Reliability 5/6/201448  The availability and reliability of IT resources are directly associated with tangible business benefits.  A hallmark of the typical cloud environment is its intrinsic ability to provide extensive support for increasing the availability of a cloud-based IT resource to minimize or even eliminate outages, and for increasing its reliability so as to minimize the impact of runtime failure conditions.
  • 47. Increased Availability and Reliability 5/6/201449 Specifically:  An IT resource with increased availability is accessible for longer periods of time (for example, 22 hours out of a 24 hour day). Cloud providers generally offer resilient” IT resources for which they are able to guarantee high levels of availability.  An IT resource with increased reliability is able to better avoid and recover from exception conditions.The modular architecture of cloud environments provides extensive failover support that increases reliability.
  • 49. Risks and Challenges 5/6/201451  Increased SecurityVulnerabilities  Reduced Operational Governance Control  Limited Portability Between Cloud Providers  Multi-Regional Compliance and Legal Issue
  • 50. Increased Security Vulnerabilities 5/6/201452  The moving of business data to the cloud means that the responsibility over data security becomes shared with the cloud provider.The remote usage of IT resources requires an expansion of trust boundaries by the cloud consumer to include the external cloud.
  • 52. Consider the following examples: 5/6/201454  An unreliable cloud provider may not maintain the guarantees it makes in the SLAs that were published for its cloud services.This can jeopardize the quality of the cloud consumer solutions that rely on these cloud services.  Longer geographic distances between the cloud consumer and cloud provider can require additional network hops that introduce fluctuating latency and potential bandwidth constraints.
  • 54. Figure 1.10 An unreliable network connection compromises the quality of communication between cloud consumer and cloud provider environments. 5/6/201456
  • 55. Limited Portability Between Cloud Providers 5/6/201457  Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly proprietary to various extents. For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be challenging to move from one cloud provider to another.  Portability is a measure used to determine the impact of moving cloud consumer IT resources and data between clouds
  • 56. Figure 1.11 A cloud consumer’s application has a decreased level of portability when assessing a potential migration from CloudA to Cloud B, because the cloud provider of Cloud B does not support the same security technologies as CloudA. 5/6/201458
  • 57. Multi-Regional Compliance and Legal Issues 5/6/201459  Third-party cloud providers will frequently establish data centers in affordable or convenient geographical locations. Cloud consumers will often not be aware of the physical location of their IT resources and data when hosted by public clouds.  For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies.  For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom.
  • 58. Legal Issues 5/6/201460  Another potential legal issue pertains to the accessibility and disclosure of data.  Countries have laws that require some types of data to be disclosed to certain government agencies or to the subject of the data.  For example, a European cloud consumer’s data that is located in the U.S. can be more easily accessed by government agencies (due to the U.S. PatriotAct) when compared to data located in many European Union countries.