The document provides an overview of fundamental cloud computing concepts. It discusses the origins and basic definitions of cloud computing, including cloud, IT resource, on-premise, scaling, service, and cloud service. It also covers the benefits of cloud computing such as reduced costs, increased scalability, and improved availability/reliability. Finally, it outlines some risks and challenges like security vulnerabilities, loss of governance control, limited portability between cloud providers, and legal/compliance issues across regions.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
This is summary on Virtualization. It contains benefits and different types of Virtualization. For example:Server Virtualization, Network Virtualization, Data Virtualization etc.
Cloud computing is used to define a new class of computing that is based on the network technology. Cloud computing takes place over the internet. It comprises of a collection of integrated and networked hardware, software and internet infrastructures. These infrastructures are used to provide various services to the users. Distributed computing comprises of multiple software components that belong to multiple computers. The system works or runs as a single system. Cloud computing can be referred to as a form that originated from distributed computing and virtualization.
A cluster is a type of parallel or distributed computer system, which consists of a collection of inter-connected stand-alone computers working together as a single integrated computing resource.
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
Introduction to Cloud Computing, Roots of Cloud Computing ,Desired Features of Cloud Computing ,Challenges and Risks ,Benefits and Disadvantages of Cloud Computing
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services),
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
This is summary on Virtualization. It contains benefits and different types of Virtualization. For example:Server Virtualization, Network Virtualization, Data Virtualization etc.
Cloud computing is used to define a new class of computing that is based on the network technology. Cloud computing takes place over the internet. It comprises of a collection of integrated and networked hardware, software and internet infrastructures. These infrastructures are used to provide various services to the users. Distributed computing comprises of multiple software components that belong to multiple computers. The system works or runs as a single system. Cloud computing can be referred to as a form that originated from distributed computing and virtualization.
A cluster is a type of parallel or distributed computer system, which consists of a collection of inter-connected stand-alone computers working together as a single integrated computing resource.
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
Introduction to Cloud Computing, Roots of Cloud Computing ,Desired Features of Cloud Computing ,Challenges and Risks ,Benefits and Disadvantages of Cloud Computing
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services),
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Virtualization 2.0: The Next Generation of VirtualizationEMC
In this paper, Frost & Sullivan define virtualization 2.0 and show the enhanced benefits that the latest virtualization platforms can deliver to the business.
You will learn how the virtualization 2.0 can:
- Improve your business agility, productivity, and application performance
- Provide new benefits of next generation virtualization platforms, including capacity management, predicitive analytics and data protection
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
Virtual Machine Migration and Allocation in Cloud Computing: A Reviewijtsrd
Cloud computing is an emerging computing technology that maintains computational resources on large data centers and accessed through internet, rather than on local computers. VM migration provides the capability to balance the load, system maintenance, etc. Virtualization technology gives power to cloud computing. The virtual machine migration techniques can be divided into two categories that is pre copy and post copy approach. The process to move running applications or VMs from one physical machine to another is known as VM migration. In migration process the processor state, storage, memory and network connection are moved from one host to another.. Two important performance metrics are downtime and total migration time that the users care about most, because these metrics deals with service degradation and the time during which the service is unavailable. This paper focus on the analysis of live VM migration Techniques in cloud computing. Khushbu Singh Chandel | Dr. Avinash Sharma "Virtual Machine Migration and Allocation in Cloud Computing: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29556.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/29556/virtual-machine-migration-and-allocation-in-cloud-computing-a-review/khushbu-singh-chandel
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Today Cloud computing is used in a wide range of domains. By using cloud computing a user
can utilize services and pool of resources through internet. The cloud computing platform
guarantees subscribers that it will live up to the service level agreement (SLA) in providing
resources as service and as per needs. However, it is essential that the provider be able to
effectively manage the resources. One of the important roles of the cloud computing platform is
to balance the load amongst different servers in order to avoid overloading in any host and
improve resource utilization.
It is defined as a distributed system containing a collection of computing and communication
resources located in distributed data enters which are shared by several end users. It has widely
been adopted by the industry, though there are many existing issues like Load Balancing, Virtual
Machine Migration, Server Consolidation, Energy Management, etc.
The process of virtualization enables the creation of virtual forms of servers, applications, networks and storage. The four main types of virtualization are network virtualization, storage virtualization, application virtualization and desktop virtualization.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
4. A Brief History
5/6/20144
“As of now, computer networks are
still in their infancy, but as they
grow up and become
sophisticated, we will probably see
the spread of ‘computer utilities’
…”. Leonard Kleinrock
19. Virtualization Principles
5/6/201419
Server virtualization separates software
from hardware.
The low-layer virtualization software
abstracts a virtual hardware interface by
means of space segmentation, time
division, and emulation to provide the
upper-layer OSs with an expected
hardware environment.
21. Virtualization Implementation
5/6/201421
VMM virtualizes three types of physical resources: CPU,
memory, and I/O device. CPU virtualization is the most
important.
We will go through:
CPU virtualization
memory virtualization
I/O device virtualization
22. 1- CPU Virtualization
5/6/201422
Classical virtualization method
The modern computer architecture offers at least two levels of privilege
(user mode and kernel mode) to isolate system software from application
programs
x86 virtualization method
The x86 architecture offers four levels of privilege known as Ring 0, 1, 2,
and 3.The x86 has the following sensitive instructions:
1. Instructions used to access and modify machine state orVM state
2. Instructions that read or change sensitive registers, such as a clock register or
interrupt registers, or memory locations
3. Instructions that reference the storage protection system, memory, or address
relocation system (such as paging)
4. All I/O instructions
25. 3- I/O Device Virtualization
5/6/201425
TheVMM virtualizes I/O devices to reuse limited I/O resources.
It intercepts requests when guest OSs attempt to access I/O
devices and then uses software to emulate real hardware.There are
three types of I/O device virtualization methods: complete
emulation on interface, front-end and back-end emulation, and
direct allocation.
26. Technology Innovations vs. Enabling
Technologies
5/6/201426
These are distinguished as cloud-enabling technologies:
Broadband Networks and InternetArchitecture
Data CenterTechnology
(Modern)VirtualizationTechnology
WebTechnology
MultitenantTechnology
ServiceTechnology
28. Cloud
5/6/201428
A Cloud refers to a distinct IT environment that is designed for
the purpose of remotely provisioning scalable and measured IT
resources.
Figure 1.1
The symbol used to denote the boundary of a cloud
environment.
29. IT Resource
5/6/201429
An IT resource is a physical or virtual IT-related artifact that can
be either software based, such as a virtual server or a custom
software program, or hardware-based, such as a physical server or
a network device (Figure 1.2).
Figure 1.2
Examples of common IT resources and their corresponding symbols.
30. Figure 1.3
A cloud is hosting eight IT resources: three virtual servers, two cloud services, and three
storage devices.
5/6/201430
31. On-Premise
5/6/201431
An on-premise IT resource can access and interact with a
cloud-based IT resource.
An on-premise IT resource can be moved to a cloud, thereby
changing it to a cloud-based IT resource.
Redundant deployments of an IT resource can exist in both
on-premise and cloud-based environments.
32. Scaling
5/6/201434
Scaling, from an IT resource perspective, represents the
ability of the IT resource to handle increased or decreased
usage demands.
The following are types of scaling:
Horizontal Scaling – scaling out and scaling in
Vertical Scaling – scaling up and scaling down
34. Vertical Scaling
5/6/201436
Figure 1.5
An IT resource (a virtual server with two CPUs) is scaled up by replacing it with a
more powerful IT resource with increased capacity for data storage (a physical server
with four CPUs).
36. Service
5/6/201438
From an implementation perspective, a service is a software
program that can be remotely invoked via a published
technical interface (or API) referred to as a service
contract.
When a software program invoked and interacts with a
service, it is labeled as a service consumer.
Services acting as service consumers can invoke other
services.When two or more services participates to
complete a given task, the services form a service
composition.
A service can reside on-premise or in a cloud. In the latter
case, I is further qualified as a cloud service (as explained in
the following Cloud Service section).
37. Cloud Service
5/6/201439
A cloud service is any IT resource that is made remotely
accessible via a cloud.
Unlike other IT fields that fall under the service technology
umbrella—such as service- oriented architecture—the term
“service” within the context of cloud computing is especially
broad.
38. A cloud service that exists as a virtual server is also being accessed from outside of the
cloud’s boundary (right).The cloud service on the right may be accessed by a human user
that has remotely logged on to the virtual server.
5/6/201440
39. A cloud service with a published technical interface is being accessed by a consumer
outside of the cloud (left).The cloud service on the left is likely being invoked by a
consumer program that was designed to access the cloud service’s published technical
interface.
5/6/201441
42. Reduced Investments and Proportional
Costs
5/6/201444
The most common economic rationale for investing in cloud-
based IT resources is in the reduction or outright elimination of
up-front IT investments, namely hardware and software purchases
and ownership costs.
A cloud’s Measured Usage characteristic represents a feature-set
that allows measured operational expenditures (directly related to
business performance) to replace anticipated capital expenditures.
This is also referred to as proportional costs.
43. Reduced Investments and Proportional
Costs
5/6/201445
The Elimination or minimization of up-front financial
commitments allows enterprises to start small and
accordingly increase IT resource allocation as required.
Moreover, the reduction of up-front capital expenses allows
for the capital to be redirected to the core business
investment.
IT professionals, and network bandwidth can be obtained at
lower costs, resulting in both
44. Reduced Investments and Proportional
Costs
5/6/201446
Common measurable benefits to cloud consumers
include:
On-demand access to pay-as-you-go computing resources on a
short-term basis (such as processors by the hour), and the
ability to release these computing resources when they are no
longer needed.
The perception of having unlimited computing resources that
are available on demand, thereby reducing the need to prepare
for provisioning.
The ability to add or remove IT resources at a fine-grained
level, such as modifying available storage disk space by single
gigabyte increments.
Abstraction of the infrastructure so applications are not locked into
devices or locations and can be easily moved if needed.
45. Increased Scalability
5/6/201447
A simple example of usage demand fluctuations throughout a 24 hour period is
provided in Figure 3.8.
Figure 1.8
An example of an organization’s changing demand for an IT resource over the
course of a day.
46. Increased Availability and Reliability
5/6/201448
The availability and reliability of IT resources are directly
associated with tangible business benefits.
A hallmark of the typical cloud environment is its intrinsic
ability to provide extensive support for increasing the
availability of a cloud-based IT resource to minimize or even
eliminate outages, and for increasing its reliability so as to
minimize the impact of runtime failure conditions.
47. Increased Availability and Reliability
5/6/201449
Specifically:
An IT resource with increased availability is accessible for
longer periods of time (for example, 22 hours out of a 24
hour day). Cloud providers generally offer resilient” IT
resources for which they are able to guarantee high levels of
availability.
An IT resource with increased reliability is able to better
avoid and recover from exception conditions.The modular
architecture of cloud environments provides extensive
failover support that increases reliability.
49. Risks and Challenges
5/6/201451
Increased SecurityVulnerabilities
Reduced Operational Governance Control
Limited Portability Between Cloud Providers
Multi-Regional Compliance and Legal Issue
50. Increased Security Vulnerabilities
5/6/201452
The moving of business data to the cloud means that the
responsibility over data security becomes shared with the
cloud provider.The remote usage of IT resources requires an
expansion of trust boundaries by the cloud consumer to
include the external cloud.
52. Consider the following examples:
5/6/201454
An unreliable cloud provider may not maintain the
guarantees it makes in the SLAs that were published for
its cloud services.This can jeopardize the quality of the
cloud consumer solutions that rely on these cloud
services.
Longer geographic distances between the cloud
consumer and cloud provider can require additional
network hops that introduce fluctuating latency and
potential bandwidth constraints.
54. Figure 1.10
An unreliable network connection compromises the quality of communication between
cloud consumer and cloud provider environments.
5/6/201456
55. Limited Portability Between Cloud
Providers
5/6/201457
Due to a lack of established industry standards within the
cloud computing industry, public clouds are commonly
proprietary to various extents. For cloud consumers that
have custom-built solutions with dependencies on these
proprietary environments, it can be challenging to move
from one cloud provider to another.
Portability is a measure used to determine the impact of
moving cloud consumer IT resources and data between
clouds
56. Figure 1.11
A cloud consumer’s application has a decreased level of portability when assessing a potential migration from CloudA to Cloud B,
because the cloud provider of Cloud B does not support the same security technologies as CloudA.
5/6/201458
57. Multi-Regional Compliance and Legal
Issues
5/6/201459
Third-party cloud providers will frequently establish data centers
in affordable or convenient geographical locations. Cloud
consumers will often not be aware of the physical location of their
IT resources and data when hosted by public clouds.
For some organizations, this can pose serious legal concerns
pertaining to industry or government regulations that specify data
privacy and storage policies.
For example, some UK laws require personal data belonging to
UK citizens to be kept within the United Kingdom.
58. Legal Issues
5/6/201460
Another potential legal issue pertains to the accessibility and
disclosure of data.
Countries have laws that require some types of data to be
disclosed to certain government agencies or to the subject of the
data.
For example, a European cloud consumer’s data that is located in
the U.S. can be more easily accessed by government agencies (due
to the U.S. PatriotAct) when compared to data located in many
European Union countries.