SlideShare a Scribd company logo
1 of 47
Download to read offline
© Copyright 2015 – Keyrus 2
IBM PLANNING ANALYTICS
To Cloud or Not To Cloud
– Real Life Case Experience
Stefan LEONI, Senior Manager CPM
TUPA - 28th May 2018
© Copyright 2015 – Keyrus 3
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 4
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 5
DEFINITION OF CLOUD
CLOUD STORAGE IS A MODEL OF DATA STORAGE IN WHICH
. THE DIGITAL DATA IS STORED IN LOGICAL POOLS
. THE PHYSICAL STORAGE SPANS MULTIPLE SERVERS (AND OFTEN LOCATIONS)
. AND THE PHYSICAL ENVIRONMENT IS TYPICALLY OWNED/MANAGED BY A
HOSTING COMPANY
Cloud Storage Architecture
CLOUD STORAGE PROVIDERS ARE RESPONSIBLE FOR KEEPING THE DATA AVAILABLE AND
ACCESSIBLE, AND THE PHYSICAL ENVIRONMENT PROTECTED AND RUNNING.
PEOPLE AND ORGANIZATIONS BUY OR LEASE STORAGE CAPACITY FROM THE PROVIDERS TO
STORE USER, COMPANY, OR APPLICATION DATA.
TM1 Data Directory
RAM-based
Cubes
IBM
Data Center(s)
© Copyright 2015 – Keyrus 6
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 7
IBM Planning Analytics On-Cloud
Cognos Analytics CA11
On-Premise Environment
Cloud-Hosted Applications
. TM1 Perspectives
. TM1 Architect
. TM1 Performance Modeler
Cloud Services
. IBM Planning Analytics WORKSPACE
. TM1 Web
. TM1 Application
. TM1 Operations Console
. TM1 SERVER
ODBC
Driver
Secure Gateway
Shared Folder
IBM Planning Analytics Control
Computer Users
Mobile Users
DATA INTEGRATION
Remote Desktop
Connection
Web Browser
Local Application :
IBM Planning Analytics for Excel
Mobile Application :
IBM Cognos Mobile App
Secure Gateway Client
On-Premise
Data Source(s)
- Authorization
- Analysis
- Reporting
RDC : Developer
Excel : End-User
Web : End-User/Admin
LEGEND :
File Transfer
ARCHITECTURE
© Copyright 2015 – Keyrus 8
ARCHITECTURE
© Copyright 2015 – Keyrus 9
WELCOME KIT
REMOTE DESKTOP CONNECTIONS :
. macosx Apple
. rhel Red Hat Edition Linux
. Win Windows
© Copyright 2015 – Keyrus 10
WELCOME KIT
© Copyright 2015 – Keyrus 11
WELCOME KIT
© Copyright 2015 – Keyrus 12
WELCOME KIT
© Copyright 2015 – Keyrus 13
WELCOME KIT
© Copyright 2015 – Keyrus 14
WELCOME KIT
© Copyright 2015 – Keyrus 15
WELCOME KIT
© Copyright 2015 – Keyrus 16
WELCOME KIT
© Copyright 2015 – Keyrus 17
WELCOME KIT
© Copyright 2015 – Keyrus 18
WELCOME KIT
© Copyright 2015 – Keyrus 19
WELCOME KIT
© Copyright 2015 – Keyrus 20
WELCOME KIT
© Copyright 2015 – Keyrus 21
WELCOME KIT
Download !!!
© Copyright 2015 – Keyrus 22
WELCOME KIT
© Copyright 2015 – Keyrus 23
WELCOME KIT
© Copyright 2015 – Keyrus 24
© Copyright 2015 – Keyrus 25
SECURE GATEWAY – WHAT IS IT?
AN ANALOGY
Home
(New Jersey)
Work
(NYC)
Lincoln &
Holland tunnels
“Secure Shell”
Private Tunnel
Gateway ID
(private)
Come to
work!
© Copyright 2015 – Keyrus 26
SECURE GATEWAY –
ARCHITECTURE, INFRASTRUCTURE, DATA FLOW
© Copyright 2015 – Keyrus 27
SECURE GATEWAY – SETUP & CONFIGURATION 1/3
. Log into the “IBM PA Control” Panel
(URL via Cloud Welcome Kit)
. Click the lock icon (the icon below the cube icon)
. Click “+” to Create a New Gateway
. Name the Gateway :
>>> Let’s Call it “RDBMSGateway”
. Select “Enforce Security Token” :
meaning we will want the Gateway clients to authenticate
themselves with a security token generated by the Gateway
service. This way, no unauthorized client can connect to the
gateway.
© Copyright 2015 – Keyrus 28
SECURE GATEWAY – SETUP & CONFIGURATION 2/3
The information in the grey window
is important:
It contains:
a) The location of the Gateway Client
files/package (only for Docker Secure Gateway Client):
b) the Gateway ID: c) The security Token:
© Copyright 2015 – Keyrus 29
SECURE GATEWAY – SETUP & CONFIGURATION 3/3
. Go to “Planning Analytics Control” Panel
. Gateway is connected
(it says ‘connected’ and is also in green) :
INSTALL/CONFIGURE : Secure Gateway Client
>>> connection is established !!!
© Copyright 2015 – Keyrus 30
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 31
CONCEPTS OF CLOUD
On-Demand Usage
a Planning Analytics Cloud Consumer can unilaterally access cloud-based Planning Analytics Components providing
the freedom to self-provision these resources. Once configured, usage of the self-provisioned resources can be
automated, requiring no further human involvement by the cloud consumer or cloud provider.
Ubiquitous Access
represents the ability for a cloud service to be widely accessible. Establishing ubiquitous access for a cloud service can
require support for a range of devices, transport protocols, interfaces, and security technologies. To enable this level of
access generally requires that the cloud service architecture be tailored to the particular needs of different cloud
service consumers.
Elasticity
is the automated ability of a cloud to transparently scale resources, as required in response to runtime conditions
or as pre-determined by the cloud consumer or cloud provider. Elasticity is often considered a core justification for
the adoption of cloud computing, primarily due to the fact that it is closely associated with the Reduced Investment
and Proportional Costs benefit. Cloud providers with vast IT resources can offer the greatest range of elasticity.
Source : http://whatiscloud.com/
© Copyright 2015 – Keyrus 32
CONCEPTS OF CLOUD
Measured Usage
Ability of a cloud platform to keep track of the usage of its resources, primarily by cloud consumers. Based on
what is measured, the cloud provider can charge a cloud consumer only for the resources actually used and/or for
the timeframe during which access to the resources was granted. In this context, measured usage is closely related
to the on-demand characteristic.
Measured usage is not limited to tracking statistics for billing purposes. It also encompasses the general
monitoring of resources and related usage reporting (for both cloud provider and cloud consumers).
Resiliency
is a form of fail-over that distributes redundant
implementations of resources across physical locations.
Resources can be pre-configured so that if one becomes deficient,
processing is automatically handed over to another redundant
implementation. Within cloud computing, the characteristic of resiliency
can refer to redundant resources within the same cloud (but in different
physical locations) or across multiple clouds.
Cloud consumers can increase both the reliability and
availability of applications by leveraging the resiliency of cloud-
based resources.
© Copyright 2015 – Keyrus 33
CONCEPTS OF CLOUD
Multi-Tenancy
Enables an instance of the program to serve different consumers (tenants) whereby each is isolated from the
other.
Through the use of multitenancy technology, IT resources can be dynamically assigned and reassigned, according to
cloud service consumer demands.
Single-TenancyMulti-Tenancy
IBM Planning Analytics
STANDARD Licensing
is MULTI-TENANT
. Users for DEV + PRD Environment
. Support
. Content Back-Up
. Disaster Recovery
. Database Tier = 64 Gb
IBM Planning Analytics
PREMIUM Option
is SINGLE TENANT
. Private Hardware : Bare Metal
. Users for DEV + PRD Environment
. Support
. Content Back-Up
. Disaster Recovery
. Database Tier = 512 Gb
© Copyright 2015 – Keyrus 34
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 35
FEAR OF CLOUD
1. Someone Else is Looking after Your Data
2. CyberAttacks
3. Insider Threats
4. Government Intrusion
5. Legal Liability
6. Lack of Standardization
7. Lack of Support
8. There’s Always a Risk
= an unpleasant emotion caused by the belief that
someone or something is dangerous, likely to cause pain, or a threat
October 1, 2013
https://www.businessnewsdaily.com/5215-dangers-cloud-computing.html
© Copyright 2015 – Keyrus 36
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 37
MYSTERY OF CLOUD
" MYSTERY "
something that is difficult or impossible to understand or explain
IBM Cloud >>> Data Centers in Evolution
EXPANDING IBM Cloud Global Footprint enables access to infrastructure through nearly 40 Data Centers in 19 Countries,
which are built to meet customer needs for : Local Access, Low Latency & Certified Security
© Copyright 2015 – Keyrus 38
MYSTERY OF CLOUD
" MYSTERY "
something that is difficult or impossible to understand or explain
IBM Cloud >>> Data Centers in Evolution
© Copyright 2015 – Keyrus 39
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 40
FAST Provisioning, No
Concern for Deployment
and Similar Stability as On-
Premise
JOYS OF CLOUD
Stimulation of Collaboration
within Development Team :
>>> Unique UserID’s + Passwords
Quick and Seamless Provisioning via
IBM Planning Analytics Welcome Kit
Standardisation in Set-Up of
Data/Logging Directory
>>> datas
Responsive and Knowledgeable
Support Team
>>> 45mins Response Time
© Copyright 2015 – Keyrus 41
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 42
TROUBLE OF CLOUD 1/3
Failing Interfaces
>>> Dependency on OpsTeam
for Services Re-Start
TM1 Operations Console
IBM Planning Analytics Control Panel
Single IBM Id per Cloud
>>> Use Multiple Email Accounts
© Copyright 2015 – Keyrus 43
TROUBLE OF CLOUD 2/3
Failing Interfaces
>>> Dependency on OpsTeam
for Services Re-Start
Workspace Administration
Confusing Windows Updates
Messages
>>> To Be Ignored : Select « Close »
© Copyright 2015 – Keyrus 44
Dependency on Cloud
OpsTeam, Limitations in
Configuration Freedom
TROUBLE OF CLOUD 3/3
IBM Maintenance Operations
>>> mostly Saturday morning …
IBM Upgrade Operations
>>> New Welcome Kit
>>> Windows 7 vs 10
© Copyright 2015 – Keyrus 45
DEFINITION OF CLOUD
ARCHITECTURE OF CLOUD
CONCEPTS OF CLOUD
FEAR OF CLOUD
MYSTERY OF CLOUD
JOYS OF CLOUD
TROUBLE OF CLOUD
MASTER OF CLOUD
AGENDA
© Copyright 2015 – Keyrus 46
« In Cloud We Believe »
By Keyrus CPM
MASTER OF CLOUD
Gb
Year 2017
onwards …
Single-Tenant
Bare Metal
POC Fast
Speed to
Results
KEYRUS Internal
Development
SandBox
THANK YOU
FOR YOUR ATTENTION
www.keyrus.com

More Related Content

What's hot

Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry
 
First Steps to the Cloud
First Steps to the CloudFirst Steps to the Cloud
First Steps to the CloudCliff Ashcroft
 
Availability in a cloud native world - Guidelines for mere mortals v2.0
Availability in a cloud native world - Guidelines for mere mortals v2.0Availability in a cloud native world - Guidelines for mere mortals v2.0
Availability in a cloud native world - Guidelines for mere mortals v2.0Haytham Elkhoja
 
VMblog - 2018 Containers Predictions from 16 Industry Experts
VMblog - 2018 Containers Predictions from 16 Industry ExpertsVMblog - 2018 Containers Predictions from 16 Industry Experts
VMblog - 2018 Containers Predictions from 16 Industry Expertsvmblog
 
Introducing HiveMQ Cloud
Introducing HiveMQ CloudIntroducing HiveMQ Cloud
Introducing HiveMQ CloudMargarethaErber
 
nullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environmentsnullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environmentsn|u - The Open Security Community
 
What network architects need to know about the evolving software lifecycle (S...
What network architects need to know about the evolving software lifecycle (S...What network architects need to know about the evolving software lifecycle (S...
What network architects need to know about the evolving software lifecycle (S...Marco Coulter
 
Unleash your private cloud! Hybrid hosting done your way.
Unleash your private cloud! Hybrid hosting done your way. Unleash your private cloud! Hybrid hosting done your way.
Unleash your private cloud! Hybrid hosting done your way. Macquarie Telecom
 
What's New in HiveMQ: Inside the upcoming HiveMQ 4.7 release
What's New in HiveMQ: Inside the upcoming HiveMQ 4.7 releaseWhat's New in HiveMQ: Inside the upcoming HiveMQ 4.7 release
What's New in HiveMQ: Inside the upcoming HiveMQ 4.7 releaseGeorg Held
 
Made to measure Cloud
Made to measure CloudMade to measure Cloud
Made to measure Cloudcolinwoods
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity StandardAngelo Corsaro
 
Citrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideCitrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideAlejandro Daricz
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudSandip Karale
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloudZarafa
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architectureAbdul Qadir
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 KeynoteKen Owens
 
Application Centric Microservices Architecture
Application Centric Microservices ArchitectureApplication Centric Microservices Architecture
Application Centric Microservices ArchitectureKen Owens
 

What's hot (20)

Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedEx
 
First Steps to the Cloud
First Steps to the CloudFirst Steps to the Cloud
First Steps to the Cloud
 
Hybrid cloud computing explained
Hybrid cloud computing explainedHybrid cloud computing explained
Hybrid cloud computing explained
 
Availability in a cloud native world - Guidelines for mere mortals v2.0
Availability in a cloud native world - Guidelines for mere mortals v2.0Availability in a cloud native world - Guidelines for mere mortals v2.0
Availability in a cloud native world - Guidelines for mere mortals v2.0
 
VMblog - 2018 Containers Predictions from 16 Industry Experts
VMblog - 2018 Containers Predictions from 16 Industry ExpertsVMblog - 2018 Containers Predictions from 16 Industry Experts
VMblog - 2018 Containers Predictions from 16 Industry Experts
 
Introducing HiveMQ Cloud
Introducing HiveMQ CloudIntroducing HiveMQ Cloud
Introducing HiveMQ Cloud
 
nullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environmentsnullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environments
 
What network architects need to know about the evolving software lifecycle (S...
What network architects need to know about the evolving software lifecycle (S...What network architects need to know about the evolving software lifecycle (S...
What network architects need to know about the evolving software lifecycle (S...
 
Unleash your private cloud! Hybrid hosting done your way.
Unleash your private cloud! Hybrid hosting done your way. Unleash your private cloud! Hybrid hosting done your way.
Unleash your private cloud! Hybrid hosting done your way.
 
What's New in HiveMQ: Inside the upcoming HiveMQ 4.7 release
What's New in HiveMQ: Inside the upcoming HiveMQ 4.7 releaseWhat's New in HiveMQ: Inside the upcoming HiveMQ 4.7 release
What's New in HiveMQ: Inside the upcoming HiveMQ 4.7 release
 
Made to measure Cloud
Made to measure CloudMade to measure Cloud
Made to measure Cloud
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
CloudCamp Chicago May 2014
CloudCamp Chicago May 2014CloudCamp Chicago May 2014
CloudCamp Chicago May 2014
 
Citrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideCitrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guide
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 Keynote
 
Application Centric Microservices Architecture
Application Centric Microservices ArchitectureApplication Centric Microservices Architecture
Application Centric Microservices Architecture
 

Similar to Keyrus customer event_20180515_cloudcases - tupa

Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - KloudlearnKloudLearn
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
Beware the pitfalls when migrating to hybrid cloud with openstack
Beware the pitfalls when migrating to hybrid cloud with openstackBeware the pitfalls when migrating to hybrid cloud with openstack
Beware the pitfalls when migrating to hybrid cloud with openstackShuquan Huang
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Multicloud - Understanding Benefits. Obstacles, and Best Approaches
Multicloud - Understanding Benefits. Obstacles, and Best ApproachesMulticloud - Understanding Benefits. Obstacles, and Best Approaches
Multicloud - Understanding Benefits. Obstacles, and Best ApproachesKenneth Hui
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 

Similar to Keyrus customer event_20180515_cloudcases - tupa (20)

Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Beware the pitfalls when migrating to hybrid cloud with openstack
Beware the pitfalls when migrating to hybrid cloud with openstackBeware the pitfalls when migrating to hybrid cloud with openstack
Beware the pitfalls when migrating to hybrid cloud with openstack
 
shivam gupta(48).pptx
shivam gupta(48).pptxshivam gupta(48).pptx
shivam gupta(48).pptx
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud management
Cloud managementCloud management
Cloud management
 
Multicloud - Understanding Benefits. Obstacles, and Best Approaches
Multicloud - Understanding Benefits. Obstacles, and Best ApproachesMulticloud - Understanding Benefits. Obstacles, and Best Approaches
Multicloud - Understanding Benefits. Obstacles, and Best Approaches
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
176
176176
176
 
D32035052
D32035052D32035052
D32035052
 

Recently uploaded

No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 

Recently uploaded (20)

No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 

Keyrus customer event_20180515_cloudcases - tupa

  • 1.
  • 2. © Copyright 2015 – Keyrus 2 IBM PLANNING ANALYTICS To Cloud or Not To Cloud – Real Life Case Experience Stefan LEONI, Senior Manager CPM TUPA - 28th May 2018
  • 3. © Copyright 2015 – Keyrus 3 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 4. © Copyright 2015 – Keyrus 4 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 5. © Copyright 2015 – Keyrus 5 DEFINITION OF CLOUD CLOUD STORAGE IS A MODEL OF DATA STORAGE IN WHICH . THE DIGITAL DATA IS STORED IN LOGICAL POOLS . THE PHYSICAL STORAGE SPANS MULTIPLE SERVERS (AND OFTEN LOCATIONS) . AND THE PHYSICAL ENVIRONMENT IS TYPICALLY OWNED/MANAGED BY A HOSTING COMPANY Cloud Storage Architecture CLOUD STORAGE PROVIDERS ARE RESPONSIBLE FOR KEEPING THE DATA AVAILABLE AND ACCESSIBLE, AND THE PHYSICAL ENVIRONMENT PROTECTED AND RUNNING. PEOPLE AND ORGANIZATIONS BUY OR LEASE STORAGE CAPACITY FROM THE PROVIDERS TO STORE USER, COMPANY, OR APPLICATION DATA. TM1 Data Directory RAM-based Cubes IBM Data Center(s)
  • 6. © Copyright 2015 – Keyrus 6 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 7. © Copyright 2015 – Keyrus 7 IBM Planning Analytics On-Cloud Cognos Analytics CA11 On-Premise Environment Cloud-Hosted Applications . TM1 Perspectives . TM1 Architect . TM1 Performance Modeler Cloud Services . IBM Planning Analytics WORKSPACE . TM1 Web . TM1 Application . TM1 Operations Console . TM1 SERVER ODBC Driver Secure Gateway Shared Folder IBM Planning Analytics Control Computer Users Mobile Users DATA INTEGRATION Remote Desktop Connection Web Browser Local Application : IBM Planning Analytics for Excel Mobile Application : IBM Cognos Mobile App Secure Gateway Client On-Premise Data Source(s) - Authorization - Analysis - Reporting RDC : Developer Excel : End-User Web : End-User/Admin LEGEND : File Transfer ARCHITECTURE
  • 8. © Copyright 2015 – Keyrus 8 ARCHITECTURE
  • 9. © Copyright 2015 – Keyrus 9 WELCOME KIT REMOTE DESKTOP CONNECTIONS : . macosx Apple . rhel Red Hat Edition Linux . Win Windows
  • 10. © Copyright 2015 – Keyrus 10 WELCOME KIT
  • 11. © Copyright 2015 – Keyrus 11 WELCOME KIT
  • 12. © Copyright 2015 – Keyrus 12 WELCOME KIT
  • 13. © Copyright 2015 – Keyrus 13 WELCOME KIT
  • 14. © Copyright 2015 – Keyrus 14 WELCOME KIT
  • 15. © Copyright 2015 – Keyrus 15 WELCOME KIT
  • 16. © Copyright 2015 – Keyrus 16 WELCOME KIT
  • 17. © Copyright 2015 – Keyrus 17 WELCOME KIT
  • 18. © Copyright 2015 – Keyrus 18 WELCOME KIT
  • 19. © Copyright 2015 – Keyrus 19 WELCOME KIT
  • 20. © Copyright 2015 – Keyrus 20 WELCOME KIT
  • 21. © Copyright 2015 – Keyrus 21 WELCOME KIT Download !!!
  • 22. © Copyright 2015 – Keyrus 22 WELCOME KIT
  • 23. © Copyright 2015 – Keyrus 23 WELCOME KIT
  • 24. © Copyright 2015 – Keyrus 24
  • 25. © Copyright 2015 – Keyrus 25 SECURE GATEWAY – WHAT IS IT? AN ANALOGY Home (New Jersey) Work (NYC) Lincoln & Holland tunnels “Secure Shell” Private Tunnel Gateway ID (private) Come to work!
  • 26. © Copyright 2015 – Keyrus 26 SECURE GATEWAY – ARCHITECTURE, INFRASTRUCTURE, DATA FLOW
  • 27. © Copyright 2015 – Keyrus 27 SECURE GATEWAY – SETUP & CONFIGURATION 1/3 . Log into the “IBM PA Control” Panel (URL via Cloud Welcome Kit) . Click the lock icon (the icon below the cube icon) . Click “+” to Create a New Gateway . Name the Gateway : >>> Let’s Call it “RDBMSGateway” . Select “Enforce Security Token” : meaning we will want the Gateway clients to authenticate themselves with a security token generated by the Gateway service. This way, no unauthorized client can connect to the gateway.
  • 28. © Copyright 2015 – Keyrus 28 SECURE GATEWAY – SETUP & CONFIGURATION 2/3 The information in the grey window is important: It contains: a) The location of the Gateway Client files/package (only for Docker Secure Gateway Client): b) the Gateway ID: c) The security Token:
  • 29. © Copyright 2015 – Keyrus 29 SECURE GATEWAY – SETUP & CONFIGURATION 3/3 . Go to “Planning Analytics Control” Panel . Gateway is connected (it says ‘connected’ and is also in green) : INSTALL/CONFIGURE : Secure Gateway Client >>> connection is established !!!
  • 30. © Copyright 2015 – Keyrus 30 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 31. © Copyright 2015 – Keyrus 31 CONCEPTS OF CLOUD On-Demand Usage a Planning Analytics Cloud Consumer can unilaterally access cloud-based Planning Analytics Components providing the freedom to self-provision these resources. Once configured, usage of the self-provisioned resources can be automated, requiring no further human involvement by the cloud consumer or cloud provider. Ubiquitous Access represents the ability for a cloud service to be widely accessible. Establishing ubiquitous access for a cloud service can require support for a range of devices, transport protocols, interfaces, and security technologies. To enable this level of access generally requires that the cloud service architecture be tailored to the particular needs of different cloud service consumers. Elasticity is the automated ability of a cloud to transparently scale resources, as required in response to runtime conditions or as pre-determined by the cloud consumer or cloud provider. Elasticity is often considered a core justification for the adoption of cloud computing, primarily due to the fact that it is closely associated with the Reduced Investment and Proportional Costs benefit. Cloud providers with vast IT resources can offer the greatest range of elasticity. Source : http://whatiscloud.com/
  • 32. © Copyright 2015 – Keyrus 32 CONCEPTS OF CLOUD Measured Usage Ability of a cloud platform to keep track of the usage of its resources, primarily by cloud consumers. Based on what is measured, the cloud provider can charge a cloud consumer only for the resources actually used and/or for the timeframe during which access to the resources was granted. In this context, measured usage is closely related to the on-demand characteristic. Measured usage is not limited to tracking statistics for billing purposes. It also encompasses the general monitoring of resources and related usage reporting (for both cloud provider and cloud consumers). Resiliency is a form of fail-over that distributes redundant implementations of resources across physical locations. Resources can be pre-configured so that if one becomes deficient, processing is automatically handed over to another redundant implementation. Within cloud computing, the characteristic of resiliency can refer to redundant resources within the same cloud (but in different physical locations) or across multiple clouds. Cloud consumers can increase both the reliability and availability of applications by leveraging the resiliency of cloud- based resources.
  • 33. © Copyright 2015 – Keyrus 33 CONCEPTS OF CLOUD Multi-Tenancy Enables an instance of the program to serve different consumers (tenants) whereby each is isolated from the other. Through the use of multitenancy technology, IT resources can be dynamically assigned and reassigned, according to cloud service consumer demands. Single-TenancyMulti-Tenancy IBM Planning Analytics STANDARD Licensing is MULTI-TENANT . Users for DEV + PRD Environment . Support . Content Back-Up . Disaster Recovery . Database Tier = 64 Gb IBM Planning Analytics PREMIUM Option is SINGLE TENANT . Private Hardware : Bare Metal . Users for DEV + PRD Environment . Support . Content Back-Up . Disaster Recovery . Database Tier = 512 Gb
  • 34. © Copyright 2015 – Keyrus 34 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 35. © Copyright 2015 – Keyrus 35 FEAR OF CLOUD 1. Someone Else is Looking after Your Data 2. CyberAttacks 3. Insider Threats 4. Government Intrusion 5. Legal Liability 6. Lack of Standardization 7. Lack of Support 8. There’s Always a Risk = an unpleasant emotion caused by the belief that someone or something is dangerous, likely to cause pain, or a threat October 1, 2013 https://www.businessnewsdaily.com/5215-dangers-cloud-computing.html
  • 36. © Copyright 2015 – Keyrus 36 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 37. © Copyright 2015 – Keyrus 37 MYSTERY OF CLOUD " MYSTERY " something that is difficult or impossible to understand or explain IBM Cloud >>> Data Centers in Evolution EXPANDING IBM Cloud Global Footprint enables access to infrastructure through nearly 40 Data Centers in 19 Countries, which are built to meet customer needs for : Local Access, Low Latency & Certified Security
  • 38. © Copyright 2015 – Keyrus 38 MYSTERY OF CLOUD " MYSTERY " something that is difficult or impossible to understand or explain IBM Cloud >>> Data Centers in Evolution
  • 39. © Copyright 2015 – Keyrus 39 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 40. © Copyright 2015 – Keyrus 40 FAST Provisioning, No Concern for Deployment and Similar Stability as On- Premise JOYS OF CLOUD Stimulation of Collaboration within Development Team : >>> Unique UserID’s + Passwords Quick and Seamless Provisioning via IBM Planning Analytics Welcome Kit Standardisation in Set-Up of Data/Logging Directory >>> datas Responsive and Knowledgeable Support Team >>> 45mins Response Time
  • 41. © Copyright 2015 – Keyrus 41 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 42. © Copyright 2015 – Keyrus 42 TROUBLE OF CLOUD 1/3 Failing Interfaces >>> Dependency on OpsTeam for Services Re-Start TM1 Operations Console IBM Planning Analytics Control Panel Single IBM Id per Cloud >>> Use Multiple Email Accounts
  • 43. © Copyright 2015 – Keyrus 43 TROUBLE OF CLOUD 2/3 Failing Interfaces >>> Dependency on OpsTeam for Services Re-Start Workspace Administration Confusing Windows Updates Messages >>> To Be Ignored : Select « Close »
  • 44. © Copyright 2015 – Keyrus 44 Dependency on Cloud OpsTeam, Limitations in Configuration Freedom TROUBLE OF CLOUD 3/3 IBM Maintenance Operations >>> mostly Saturday morning … IBM Upgrade Operations >>> New Welcome Kit >>> Windows 7 vs 10
  • 45. © Copyright 2015 – Keyrus 45 DEFINITION OF CLOUD ARCHITECTURE OF CLOUD CONCEPTS OF CLOUD FEAR OF CLOUD MYSTERY OF CLOUD JOYS OF CLOUD TROUBLE OF CLOUD MASTER OF CLOUD AGENDA
  • 46. © Copyright 2015 – Keyrus 46 « In Cloud We Believe » By Keyrus CPM MASTER OF CLOUD Gb Year 2017 onwards … Single-Tenant Bare Metal POC Fast Speed to Results KEYRUS Internal Development SandBox
  • 47. THANK YOU FOR YOUR ATTENTION www.keyrus.com