SlideShare a Scribd company logo
(MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
“Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> 	supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367.  [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
(MC²)² Framework
Processdescribedby (MC²)² ,[object Object]
Useinformationresourcesto find alternatives, criteria, andrequirements
Choose an appropriate multi-criteriadecision-makingmethod
Configuremethodby e.g. definingweights, dependenciesofcriteria
ApplyMethod,[object Object]
Summary:  New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data.  Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees.  Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
C1. Security & Reliability C1.1. Data safety level of the infrastructure  C1.2. Reliability of the infrastructure  C1.3. Data security level in the infrastructure  C1.4. Security level of data transmissions from and to the infrastructure  C2. Benefits C2.1. Number of resources available  C2.2. Green IT: power consumption during usage  C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage  C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection  C3.6. Research costs for hardware  Example – criteria
R1. Trustworthiness of the provider  R2. Green IT: minimum power consumption per hour per server  Example - requirements
Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
Example – configure multi-criteriadecision-makingmethod
Example – evaluationmethod
Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
Example – evaluationmethod
Example - results ANP results: Indices formulas: Indices results:

More Related Content

What's hot

REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
IJNSA Journal
 
Aa31163168
Aa31163168Aa31163168
Aa31163168
IJERA Editor
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016
Jorge Cardoso
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET Journal
 
sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
Kelly Moscrop
 
Grid computing 12
Grid computing 12Grid computing 12
Grid computing 12
Dhamu Harker
 
I1803035762
I1803035762I1803035762
I1803035762
IOSR Journals
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
 
Big Data For Flight Delay Report
Big Data For Flight Delay ReportBig Data For Flight Delay Report
Big Data For Flight Delay Report
JSPM's JSCOE , Pune Maharashtra.
 

What's hot (9)

REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Aa31163168
Aa31163168Aa31163168
Aa31163168
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
 
sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
 
Grid computing 12
Grid computing 12Grid computing 12
Grid computing 12
 
I1803035762
I1803035762I1803035762
I1803035762
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
 
Big Data For Flight Delay Report
Big Data For Flight Delay ReportBig Data For Flight Delay Report
Big Data For Flight Delay Report
 

Similar to (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
ARC Advisory Group
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
IJNSA Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
SimulationX
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
IRJET Journal
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
IJNSA Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
Anil Sharma
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard science
Martin Geddes
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 

Similar to (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing (20)

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard science
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 

(MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

  • 1. (MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
  • 2. “Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367. [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
  • 4.
  • 6. Choose an appropriate multi-criteriadecision-makingmethod
  • 8.
  • 9. Summary: New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data. Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees. Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
  • 10. A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
  • 11. C1. Security & Reliability C1.1. Data safety level of the infrastructure C1.2. Reliability of the infrastructure C1.3. Data security level in the infrastructure C1.4. Security level of data transmissions from and to the infrastructure C2. Benefits C2.1. Number of resources available C2.2. Green IT: power consumption during usage C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection C3.6. Research costs for hardware Example – criteria
  • 12. R1. Trustworthiness of the provider R2. Green IT: minimum power consumption per hour per server Example - requirements
  • 13. Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
  • 14. Example – configure multi-criteriadecision-makingmethod
  • 16. Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
  • 18. Example - results ANP results: Indices formulas: Indices results:
  • 19. A3. IaaS > A1. in-house But, bybenefitsonly: A1 > A3 ! Bycosts: A3 < A1 (smallermeansbetter) Example – results – ctd. IaaS
  • 20. (MC²)² canbeimprovedandextended in manyaspects: More IT supportwithintheframework List ofsuitableinformationsystemsthatcansupportthedefinitionof alternatives, criteria, andrequirements Prototype of a systemthatoffers (MC²)² decisionmakingandintegrationwithinformationresources Inclusionofsensitivityanalysisandgroupdecisionaspects Support withthechoiceof MCDM methods … Future work
  • 23.
  • 24. Apply MCDM method on theappropriate alternatives usingdefinedcriteria (+ weights, dependencies)
  • 25.
  • 26. To find alternatives, criteria, requirements, and MCDM method Expert searchandsurveycreationsystems Internal knowledgeordatabaseswith Experiencesfromearlierevaluations Guidelinedocumentsofdepartments Collaborationsystems Data miningtools Literature … Toexternalizeyourexperiencesmadeduringtheuseoftheframework Useofinformationresources…
  • 27. Qualitative vs. Quantitative (non-measurable vs. measurable) Scalesofmeasurement Rules toconsider Completeness and Exhaustiveness Mutually exclusive items only Restrict to criteria of highest degree of importance Examples: Criteria
  • 28. Constraintsfor alternatives A minimumormaximumvalue Examples: Requirements
  • 29. Manymethodsavailable* Outranking: ELECTRE, PROMETHEE TOPSIS, AHP/ANP Bayesian Analysis MAUT, SMART … Chooseoneandconsider Not everymethodresults in a value Not everymethodfitsyourneedsto model criteriadependencies Not everymethodsupports qualitative (non-measurable) criteria well Multi-criteriadecision-makingmethod * Yoon and Hwang (1995), ‘Multi Attribute Decision Making: An Introduction‘, Sage University Paper series on Quantitative Applications in theSocialSciences. Keun Tae Cho (2003), ‘Multicriteria Decision Methods: An Attempt To Evaluate and Unify’, Mathematicaland Computer Modelling. Fülöp (2004), ‘Introduction to Decision Making Methods’, Paper developed for the BDEI-3 Workshop, The Evergreen State College.