We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
IRJET- Implementation of Cloud Energy Saving System using Virtual Machine...IRJET Journal
This document proposes a cloud energy saving system using virtual machine dynamic resource allocation on the OpenNebula platform. It aims to address the problems of high energy consumption and wasted idle resources in cloud computing. The system uses two methods: 1) autoscaling, which reallocates load between nodes based on process requirements to reduce response time and maximize throughput, and 2) live migration of VMs between hosts to power down idle machines. Two experiments are conducted to evaluate autoscaling performance and energy savings when adding and removing VMs on OpenNebula. The goal is to significantly reduce power consumption and wasted resources compared to traditional methods.
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
An overview and survey of simulation modelsAnjandeep Rai
This document summarizes and compares several cloud simulation tools. It begins by defining cloud computing and explaining the benefits of using simulation tools instead of real cloud resources. Several cloud simulation tools are then described in detail, including CloudSim, GDCSim, CloudAnalyst, Network Cloud, and MDCSim. Their architectures and capabilities are explained. The document concludes by comparing three major tools - MDCSim, CloudSim, and GreenCloud - based on parameters like availability, application models, and simulation time. No single tool is considered best as each has advantages depending on user requirements.
The document is a song about a woman who does not see her own beauty and struggles with insecurities, but her partner sees her beauty and it surprises him every time he looks at her. The woman wishes she could see herself the way her partner sees her, as it would free her from insecurities and help her feel stronger and bolder.
Презентация учебника "Инженерия как странствие", прошедшая 19-22 ноября 2013 г. в Екатеринбурге.
Учебник с первоначальным названием "Онтология инженерного знания" написан по заказу Высшей инженерной школы УрФУ.
Мы поставили перед собой цель кратко описать инженерную онтологию, и, может быть, создать условия для возникновения взаимопонимания между позициями:
- инженера,
- ученого,
- менеджера,
- управленца-администратора.
Коллектив авторов: С.Переслегин, Е.Переслегина, В.Никитин, Ю.Чудновский, А.Парибок, Н.Луковникова, И.Тариков, Д.Васильков.
Сайт проекта: http://sociosoft.ru/project-engineering
The document outlines a 4-week schedule to create branding materials for an organization. Week 1 focuses on a logo, week 2 on merchandise, week 3 on a membership leaflet, and week 4 on a campaign poster. Having some tasks take less than a week allows for contingency time to complete any tasks that run over schedule. Resources needed include Adobe Photoshop, pens, paper, and pencils.
This document summarizes a typical day at a primary school, including welcoming their mascot Baithin, doing math work, visiting with baby Aoibheann, having assembly with songs and poems, eating lunch, playing outside or reading if wet, baking Irish bread, doing art projects and computer work, and finishing the day with homework.
IRJET- Implementation of Cloud Energy Saving System using Virtual Machine...IRJET Journal
This document proposes a cloud energy saving system using virtual machine dynamic resource allocation on the OpenNebula platform. It aims to address the problems of high energy consumption and wasted idle resources in cloud computing. The system uses two methods: 1) autoscaling, which reallocates load between nodes based on process requirements to reduce response time and maximize throughput, and 2) live migration of VMs between hosts to power down idle machines. Two experiments are conducted to evaluate autoscaling performance and energy savings when adding and removing VMs on OpenNebula. The goal is to significantly reduce power consumption and wasted resources compared to traditional methods.
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
An overview and survey of simulation modelsAnjandeep Rai
This document summarizes and compares several cloud simulation tools. It begins by defining cloud computing and explaining the benefits of using simulation tools instead of real cloud resources. Several cloud simulation tools are then described in detail, including CloudSim, GDCSim, CloudAnalyst, Network Cloud, and MDCSim. Their architectures and capabilities are explained. The document concludes by comparing three major tools - MDCSim, CloudSim, and GreenCloud - based on parameters like availability, application models, and simulation time. No single tool is considered best as each has advantages depending on user requirements.
The document is a song about a woman who does not see her own beauty and struggles with insecurities, but her partner sees her beauty and it surprises him every time he looks at her. The woman wishes she could see herself the way her partner sees her, as it would free her from insecurities and help her feel stronger and bolder.
Презентация учебника "Инженерия как странствие", прошедшая 19-22 ноября 2013 г. в Екатеринбурге.
Учебник с первоначальным названием "Онтология инженерного знания" написан по заказу Высшей инженерной школы УрФУ.
Мы поставили перед собой цель кратко описать инженерную онтологию, и, может быть, создать условия для возникновения взаимопонимания между позициями:
- инженера,
- ученого,
- менеджера,
- управленца-администратора.
Коллектив авторов: С.Переслегин, Е.Переслегина, В.Никитин, Ю.Чудновский, А.Парибок, Н.Луковникова, И.Тариков, Д.Васильков.
Сайт проекта: http://sociosoft.ru/project-engineering
The document outlines a 4-week schedule to create branding materials for an organization. Week 1 focuses on a logo, week 2 on merchandise, week 3 on a membership leaflet, and week 4 on a campaign poster. Having some tasks take less than a week allows for contingency time to complete any tasks that run over schedule. Resources needed include Adobe Photoshop, pens, paper, and pencils.
This document summarizes a typical day at a primary school, including welcoming their mascot Baithin, doing math work, visiting with baby Aoibheann, having assembly with songs and poems, eating lunch, playing outside or reading if wet, baking Irish bread, doing art projects and computer work, and finishing the day with homework.
The document discusses the importance of social and cultural awareness for journalists. It notes that journalists often write about groups they may not be familiar with, so it is important they do not create biased representations. The National Union of Journalists has prepared ethical guidelines for journalists covering topics like terrorism, race, disability, and others. Journalists must consider how their writing may influence readers' perceptions of different groups.
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
The document describes a Pentagonal Investment Scheme involving 5 sectors: 1) gold and Swiss franc as safe haven investments, 2) a selection of 32 indexes in the pharmaceutical industry focusing on research and development, generics, and biotech, 3) wheat, corn and soybeans, 4) water, and 5) oil and gas. It also includes quotes about knowledge and information from famous individuals and provides contact information for the analysis of the pharmaceutical industry investment.
ECCE Webinar: The Value of Energy-Efficiency in the Housing SectorECCE_UM
Europe has a large public housing sector, about 15-20 percent of the housing stock, where very little is known about the financial outcomes of energy-efficiency investments in the building sector. In this slidedeck, Andrea Chegut and Rogier Holtermans present the financial outcomes of energy-efficiency investments in the public housing sector.
The European Commission has big goals to reduce total energy consumption. To achieve that goal, regulatory nudges and financial investments are striving towards increasing the energy-efficiency of the housing sector. As part of that goal, the Building Energy Efficiency for Massive Market Uptake (BEEM-Up) Program, an EU 7thFramework Program project, delivers some first results on the engineering feasibility and financial performance of existing building retrofits that reduce primary energy demand in buildings by 75 percent.
Academically this is also very interesting as to date, studies using measurement tools like Energy Performance Certificates document a positive impact from high energy-efficiency in buildings on their transaction or rental value in residential and commercial real estate markets. However, most of these studies focus on the private housing or commercial real estate markets. This webinar, shares the financial performance and feasibility of energy-efficiency for the public housing sector.
Ben Klock is a renowned German techno DJ and producer who is known for his long sets at Berghain club in Berlin, where he helped develop the raw and underground techno sound. He discusses his career path from his early experiences with acid house to developing his reputation for marathon sets at Berghain. The interviews provide insight into Klock's musical influences, career highlights, and role in shaping the Berlin techno scene.
This document lists the top SEO blogs and their URLs, including Search Engine Land, Search Engine Journal, Moz, and Search Engine Roundtable. It also provides contact information for Ricky Singh of AIRR Media and a reference link for blog metrics related to SEO.
Сергей Переслегин.
Презентация с занятия 22 марта 2015 г.
Школа аналитики: Метабъекты и социальная гидродинамика.
Анонс мероприятия: http://www.sociosoft.ru/news/OV_22_mart
The document provides an overview of changes to US patent law under the America Invents Act (AIA) including changing from a "first to invent" system to a "first inventor to file" system. It summarizes the key provisions of 35 USC 102(a)(1) including that a claimed invention is not eligible for a patent if it was patented, described in a printed publication, in public use, on sale or otherwise available to the public before the effective filing date. The effective filing date may be the actual filing date or the filing date of an earlier application that the application depends on.
This document outlines the development of the Burns Sci-Tech Gardens from 2011 to 2013, starting with the creation of a butterfly garden and its expansion over the years. It then details the addition of a 4th grade vegetable garden in 2012, classroom lessons on hydroponics, a greenhouse being built, and field trips taken by students to learn about planting and gardening.
The radio script promotes both Despicable Me and Coca Cola by featuring happy minion characters discovering and celebrating Coca Cola. The minions find a stage with Coca Cola and rush over joyfully. They each grab a bottle of Coca Cola and start dancing to carnival music. The script announces that Coca Cola will give away large minion toys inside mini minion packs to 10 lucky people. It ends with the sound of bottles clinking in a "cheers!" toast.
This document appears to be about a business model canvas for a startup. It likely contains sections on key partners, key activities, key resources, value propositions, customer relationships, channels, customer segments, revenue streams and costs that are common on a business model canvas. The business model canvas is a strategy tool used to develop new or document existing business models.
This document outlines the scheduled communication and milestones for developing a Windows Phone application over 9 weeks. It identifies technical challenges such as toast messages disappearing after 30 minutes and issues with the Facebook messaging API. The milestones include designing the API in week 1, creating the front and back ends in weeks 2-3, releasing an MVP beta in week 5, adding bonus features and stabilization in weeks 6-7, submitting to the store in week 8, and doing a presentation in week 9.
Cloud Programming Simplified: A Berkeley View on Serverless Computingmustafa sarac
This technical report from UC Berkeley researchers discusses the emergence and future of serverless computing. It defines serverless computing and contrasts it with traditional server-based cloud computing. Serverless computing automates resource provisioning and management, allowing developers to focus on writing code without worrying about infrastructure. The report outlines several challenges that must be addressed for serverless computing to reach its full potential, such as improving storage capabilities and enabling fine-grained coordination between functions. It predicts that serverless computing will continue growing to become the dominant model for cloud development.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
The document discusses several concepts related to cloud computing including:
- The evolving definition of cloud computing with 3 service models and 4 deployment models and 5 essential characteristics
- Diffusion of innovation theory and how new technologies are adopted over time through innovators, early adopters, early majority, late majority, and laggards
- The concept of ubiquity and how innovations progress from niche to mainstream as they become more established, standardized, and commoditized over time
The document discusses the evolving concept of cloud computing, comparing it to historical notions of computer utilities. It describes cloud computing as having 3 service models (SaaS, PaaS, IaaS) and 4 deployment models (private, public, hybrid, community clouds) with 5 essential characteristics including on-demand access and elastic scaling. However, the exact definition of cloud computing remains unclear as the technology continues to change.
The document discusses the evolution of cloud computing from its early conceptualization to its current form. It explores how cloud computing has progressed from an undefined concept to widespread ubiquity due to increasing demand and continuous improvements by suppliers. Key factors that have driven this transition include the commoditization of infrastructure, the delivery of software and platforms as standardized services, and a shift towards viewing these resources as utilities rather than custom-built products.
A Brief Introduction to Cloud ComputingIRJET Journal
This document provides an introduction to cloud computing. It discusses that cloud computing allows for sharing and accessing computer resources like storage, applications, and networking over the internet. There are three main cloud computing models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides basic computing infrastructure like servers and storage. PaaS provides platforms for developing and running applications. SaaS provides ready-to-use software applications to users. The document outlines key benefits of cloud computing like cost efficiency, flexibility, and scalability.
The document is a thesis proposal for a cloud-based microservice architecture for the Skolrutiner system. It begins with an introduction that outlines the motivation and contributions of the thesis. It then provides background on cloud computing and microservices. The current system design is discussed along with its drawbacks. A new proposed cloud-based microservice architecture is then presented and evaluated, with the goal of addressing issues with the current centralized system. The thesis concludes by summarizing the contributions and discussing potential future work.
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
The document discusses the importance of social and cultural awareness for journalists. It notes that journalists often write about groups they may not be familiar with, so it is important they do not create biased representations. The National Union of Journalists has prepared ethical guidelines for journalists covering topics like terrorism, race, disability, and others. Journalists must consider how their writing may influence readers' perceptions of different groups.
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
The document describes a Pentagonal Investment Scheme involving 5 sectors: 1) gold and Swiss franc as safe haven investments, 2) a selection of 32 indexes in the pharmaceutical industry focusing on research and development, generics, and biotech, 3) wheat, corn and soybeans, 4) water, and 5) oil and gas. It also includes quotes about knowledge and information from famous individuals and provides contact information for the analysis of the pharmaceutical industry investment.
ECCE Webinar: The Value of Energy-Efficiency in the Housing SectorECCE_UM
Europe has a large public housing sector, about 15-20 percent of the housing stock, where very little is known about the financial outcomes of energy-efficiency investments in the building sector. In this slidedeck, Andrea Chegut and Rogier Holtermans present the financial outcomes of energy-efficiency investments in the public housing sector.
The European Commission has big goals to reduce total energy consumption. To achieve that goal, regulatory nudges and financial investments are striving towards increasing the energy-efficiency of the housing sector. As part of that goal, the Building Energy Efficiency for Massive Market Uptake (BEEM-Up) Program, an EU 7thFramework Program project, delivers some first results on the engineering feasibility and financial performance of existing building retrofits that reduce primary energy demand in buildings by 75 percent.
Academically this is also very interesting as to date, studies using measurement tools like Energy Performance Certificates document a positive impact from high energy-efficiency in buildings on their transaction or rental value in residential and commercial real estate markets. However, most of these studies focus on the private housing or commercial real estate markets. This webinar, shares the financial performance and feasibility of energy-efficiency for the public housing sector.
Ben Klock is a renowned German techno DJ and producer who is known for his long sets at Berghain club in Berlin, where he helped develop the raw and underground techno sound. He discusses his career path from his early experiences with acid house to developing his reputation for marathon sets at Berghain. The interviews provide insight into Klock's musical influences, career highlights, and role in shaping the Berlin techno scene.
This document lists the top SEO blogs and their URLs, including Search Engine Land, Search Engine Journal, Moz, and Search Engine Roundtable. It also provides contact information for Ricky Singh of AIRR Media and a reference link for blog metrics related to SEO.
Сергей Переслегин.
Презентация с занятия 22 марта 2015 г.
Школа аналитики: Метабъекты и социальная гидродинамика.
Анонс мероприятия: http://www.sociosoft.ru/news/OV_22_mart
The document provides an overview of changes to US patent law under the America Invents Act (AIA) including changing from a "first to invent" system to a "first inventor to file" system. It summarizes the key provisions of 35 USC 102(a)(1) including that a claimed invention is not eligible for a patent if it was patented, described in a printed publication, in public use, on sale or otherwise available to the public before the effective filing date. The effective filing date may be the actual filing date or the filing date of an earlier application that the application depends on.
This document outlines the development of the Burns Sci-Tech Gardens from 2011 to 2013, starting with the creation of a butterfly garden and its expansion over the years. It then details the addition of a 4th grade vegetable garden in 2012, classroom lessons on hydroponics, a greenhouse being built, and field trips taken by students to learn about planting and gardening.
The radio script promotes both Despicable Me and Coca Cola by featuring happy minion characters discovering and celebrating Coca Cola. The minions find a stage with Coca Cola and rush over joyfully. They each grab a bottle of Coca Cola and start dancing to carnival music. The script announces that Coca Cola will give away large minion toys inside mini minion packs to 10 lucky people. It ends with the sound of bottles clinking in a "cheers!" toast.
This document appears to be about a business model canvas for a startup. It likely contains sections on key partners, key activities, key resources, value propositions, customer relationships, channels, customer segments, revenue streams and costs that are common on a business model canvas. The business model canvas is a strategy tool used to develop new or document existing business models.
This document outlines the scheduled communication and milestones for developing a Windows Phone application over 9 weeks. It identifies technical challenges such as toast messages disappearing after 30 minutes and issues with the Facebook messaging API. The milestones include designing the API in week 1, creating the front and back ends in weeks 2-3, releasing an MVP beta in week 5, adding bonus features and stabilization in weeks 6-7, submitting to the store in week 8, and doing a presentation in week 9.
Cloud Programming Simplified: A Berkeley View on Serverless Computingmustafa sarac
This technical report from UC Berkeley researchers discusses the emergence and future of serverless computing. It defines serverless computing and contrasts it with traditional server-based cloud computing. Serverless computing automates resource provisioning and management, allowing developers to focus on writing code without worrying about infrastructure. The report outlines several challenges that must be addressed for serverless computing to reach its full potential, such as improving storage capabilities and enabling fine-grained coordination between functions. It predicts that serverless computing will continue growing to become the dominant model for cloud development.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
The document discusses several concepts related to cloud computing including:
- The evolving definition of cloud computing with 3 service models and 4 deployment models and 5 essential characteristics
- Diffusion of innovation theory and how new technologies are adopted over time through innovators, early adopters, early majority, late majority, and laggards
- The concept of ubiquity and how innovations progress from niche to mainstream as they become more established, standardized, and commoditized over time
The document discusses the evolving concept of cloud computing, comparing it to historical notions of computer utilities. It describes cloud computing as having 3 service models (SaaS, PaaS, IaaS) and 4 deployment models (private, public, hybrid, community clouds) with 5 essential characteristics including on-demand access and elastic scaling. However, the exact definition of cloud computing remains unclear as the technology continues to change.
The document discusses the evolution of cloud computing from its early conceptualization to its current form. It explores how cloud computing has progressed from an undefined concept to widespread ubiquity due to increasing demand and continuous improvements by suppliers. Key factors that have driven this transition include the commoditization of infrastructure, the delivery of software and platforms as standardized services, and a shift towards viewing these resources as utilities rather than custom-built products.
A Brief Introduction to Cloud ComputingIRJET Journal
This document provides an introduction to cloud computing. It discusses that cloud computing allows for sharing and accessing computer resources like storage, applications, and networking over the internet. There are three main cloud computing models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides basic computing infrastructure like servers and storage. PaaS provides platforms for developing and running applications. SaaS provides ready-to-use software applications to users. The document outlines key benefits of cloud computing like cost efficiency, flexibility, and scalability.
The document is a thesis proposal for a cloud-based microservice architecture for the Skolrutiner system. It begins with an introduction that outlines the motivation and contributions of the thesis. It then provides background on cloud computing and microservices. The current system design is discussed along with its drawbacks. A new proposed cloud-based microservice architecture is then presented and evaluated, with the goal of addressing issues with the current centralized system. The thesis concludes by summarizing the contributions and discussing potential future work.
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
This document is a thesis on lock-in issues with Platform as a Service (PaaS) cloud computing. Chapter 1 provides background on cloud computing, defining it as on-demand access to shared computing resources over a network. It describes the benefits of cloud computing like reduced costs and ability to quickly scale resources. It outlines the three service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Chapter 2 will discuss the problem of vendor lock-in that exists in cloud computing, particularly in PaaS, and the issues it causes for users.
Do you want to be a Cloud Architect ? Are you stuck in a Sysadmin / DBA job ,and want to transition into the Cloud? Are you interested , but do not know how/where to start ? Then, you are in the right place . This is Part 1 of a 3-Part series , where I share the secret sauce how best to get started on the journey to become a Cloud Architect , and enhance your career.
The document discusses the promises and myths of new distributed computing platforms like Docker and Weave. It identifies 8 myths of how these new platforms position themselves, such as the idea that applications can be independent of the operating system or that platforms are better at designing apps than developers. The reality is that by "turning back the clock 30 years" to older distributed computing approaches, many of the skills and tools developers already use can apply when building apps on new platforms like Docker and Weave.
This seminar report discusses cloud computing. It provides an acknowledgment, abstract, table of contents and introduction section. The report will cover the 5 characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It will also discuss the 4 deployment models and 3 service models of cloud computing.
Cloud computing refers to flexible, on-demand access to shared computing resources via the internet. Resources such as memory, storage, and processing power can be allocated as needed without direct involvement of IT staff. This allows organizations to scale their infrastructure up or down easily based on current needs. The term "cloud" originated as a symbol used to represent the public internet in network diagrams. Moving applications and services to cloud providers over the internet is now commonly referred to as migrating to the "cloud".
Fully Automated Load Balancing, Compute resource of the cluster load gets automatically balanced. Hosts will be grouped with respect to the location of the datacenter and affinity rule will enabled onthe VM’s to run in the neededdatacenters.
Getting the most out of your cloud deploymentJose Lopez
Organizations are under ever increasing pressure to reduce IT costs. One of the cost reduction methods is to move applications into the cloud. Cloud-based computing provides organizations with cost savings over time, instead of the upfront costs associated with traditional datacenter equipment. By moving from a capital expenditure (CAPEX) model to an operational expenditure (OPEX) model, organizations are able to reduce costs associated with hardware and cooling in datacenters. There are other benefits like increased productivity based on reduced administrative burden, a result of the self-service nature of cloud computing, and the ability to almost instantly provision to meet service requirements.
When moving an application into the cloud, there are design considerations that must be taken into account. Cloud computing architecture is quite different compared to traditional physical or virtual environments. For example Amazon Web Services (AWS) persistent storage is disassociated from the Amazon Machine Image (AMI), and virtual machine instances are simply disposable.
This document discusses cloud computing and OpenStack, an open source cloud computing platform. It provides definitions of cloud computing and describes how OpenStack uses virtualization to effectively share resources among users. The document also outlines different types of cloud computing users and services models, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It discusses the benefits of cloud computing for end users, such as reduced costs from outsourcing hardware maintenance and access to applications from anywhere.
Similar to #VirtualDesignMaster 3 Challenge 2 - Abdullah Abdullah (20)
#VirtualDesignMaster 3 Challenge 3 - Steven Viljoenvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 – James Brownvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 - Dennis Georgevdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 - Abdullah Abdullahvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 2 - Steven Viljoenvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 – James Brownvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 - Dennis Georgevdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 1 - Abdullah Abdullahvdmchallenge
We are now settled on Mars, and ready to build a more permanent infrastructure. Keep in mind that power, cooling, and space are extremely expensive resources on Mars.
#VirtualDesignMaster 3 Challenge 1 - Dennis Georgevdmchallenge
Millionaire philanthropists Richard M. and Elon B., have teamed up to work towards humanity’s survival after the outbreak of the virus, that lead to the zombie apocalypse and evacuation of what was left of the human species from earth.
The objective of this design is to supportfirst of its kind humancoloniesin Marsuntila more permanent infrastructurewill be built. Alsobuild amessaging and collaboration infrastructure on top of it for developinga warning systemto give a more human touch to residents in Mars.
#VirtualDesignMaster 3 Challenge 1 – James Brownvdmchallenge
We are now settled on Mars, and ready to build a more permanentinfrastructure. Keep in mind that power, cooling, and space are extremelyexpensive resources on Mars. In order to save space, we have decidednot to use a traditional FiberChannel infrastructure, meaning there will beno dedicated FiberChannel Switches.
Project : We are now settled on Mars, but need more permanent infrastructure Focus Area : VMware vSphere infrastructure, Compute, Storage, Network, Disaster Recovery
#VirtualDesignMaster 3 Challenge 1 - Steven Viljoenvdmchallenge
We are now settled on Mars, and ready to build a more permanent infrastructure. Keep in mind that power, cooling, and space are extremely expensive resources on Mars. In order to save space, we have decided not to use a traditional Fibre Channel infrastructure, meaning there will be no dedicated Fibre Channel Switches. We do however have plenty of 10G Ethernet switches, with some 40G Ethernet switches.
This season, on Virtual Design Master, we’ve been dealing with the aftermath of a second round of the zombie outbreak. We’ve designed the systems to build spaceships, which are evacuating what’s left of the human race from the earth. We’ve built the infrastructure to support our new civilization on the moon. We’ve also tried to prepare what’s left of the earth in case there is another round of the outbreak, by fortifying islands across the world by deploying infrastructure remotely.
This season, on Virtual Design Master, we’ve been dealing with the aftermath of a second round of the zombie outbreak. We’ve designed the systems to build spaceships, which are evacuating what’s left of the human race from the earth. We’ve built the infrastructure to support our new civilization on the moon. We’ve also tried to prepare what’s left of the earth in case there is another round of the outbreak, by fortifying islands across the world by deploying infrastructure remotely.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
#VirtualDesignMaster 3 Challenge 2 - Abdullah Abdullah
1. z
Prepared by: Abdullah Abdullah
Lebanon, Beirut
Twitter: @do0dzZZ
Blog: http://notes.doodzzz.net
E-mail: abdullah@lowerlayer.net
Documenting: Virtual Design Master – Challenge 2
Presented to: Messrs. Virtual Design Master Judges
Ref: AA-vDM-03-02
2. [Synopsis]
We’ve examined how we can rebuild infrastructure from scratch, but now let’s
think outside the box, and inside the clouds. Before the zombie apocalypse began,
many organizations were beginning to leverage public cloud infrastructures for a
number of reasons. Some were using it for burst capacity, others for dev and test.
Some startups even used public cloud for everything! Our billionaire
philanthropist from Season 1 is a huge fan of public cloud, and was one of the
early adopters. HIs task for you now is to design an environment to meet our
needs using any existing public cloud infrastructure to run it on top of. Be sure to
let him know why you picked this particular public cloud infrastructure, as if he’s
going to re-create it on Mars, he wants to make sure he’s making the best choice.
Now for the fun part. We talked about a number of business critical applications
in the first challenge. You must deploy one web application (think the time
tracking application for the botanists in the greenhouses) and one business critical
enterprise application (think life support systems) inside the public cloud
infrastructure. As part of your design, you must state what the application
requirements you are using are. Remember to think about things like
performance, capacity, latency, and high availability. In this case, complexity can
be your enemy, but the details can be your friend. Besides your overall design,
you will also be judged on the application requirements you develop.
4. 5.4. Backup Design Decision .............................................................................................................21
5.5. Replication Design Decision.......................................................................................................21
5.5.1. Test Failover ........................................................................................................................... 21
5.5.2. Upon Disaster ......................................................................................................................... 21
6. Final Words......................................................................................................................................... 23
7. Appendices ......................................................................................................................................... 23
5. 1. Executive Summary
1.1. Project Overview
So for us to put out workload on a public cloud infrastructure we need to build one first, this project is
all about delivering a solution that can accommodate the core IT services any business needs (even
those based in Mars).
So on earth this was called a Public Cloud but on Mars I think we’re ought to name it the Public
Interstellar Cloud Services [PICS] (we have high hopes of delivering IT services to alien life form as well ;-
)).
1.2. Intended audience
The document is to be used by the party responsible for implementing this solution following this design
guide (you might need to get a spaceship because selling Interstellar Cloud Services will require moving
between planets and galaxies).
1.3. Project Insights
Delivering a Public Interstellar Cloud Services using a Public Cloud Infrastructure technology from one of
the elite vendors whom used to provide such services back on Earth.
1.3.1. Project Requirement
- R001: Accommodate burst capacity consumption model.
- R002: Accommodate dev/test consumption model.
- R003: Accommodate general usage consumption model.
- R004: Provision a public cloud instance for the current workload.
- R005: Web Application Design.
- R006: Business Critical Enterprise Application Design.
1.3.2. Project Constrains
- C001: Power and cooling.
- C002: Network latency.
- C003: High workloads might not be suitable for a Public Interstellar Cloud Infrastructure.
- C004: Disaster Recovery in case of a planetary failure.
1.3.3. Project Assumptions
- A001: There might be local infrastructures that want to integrate with the public cloud,
- A002: Network resources availability (Network addresses, DNS, LDAP, NTP, SSL and VPN).
- A003: All software packages and licenses were brought from earth.
- A004: The administration team is most knowledgeable with VMware technologies.
6. - A005: The SLAs that were made on earth are not binding on Mars, new SLAs will be written.
- A006: Money is not a caliber for comparison, the caliber is meeting the requirement.
2. Public Interstellar Cloud Services Platform Choice
Although we are fond of most of the cloud service providers back on earth, ultimately on Mars we’re
forced to choose a single platform to build ours PICS on, hereunder is the platform’s main
characteristics:
Reference Tag Characteristic Description Key Metrics
CR001 Availability
Indicates the effect of a choice on the ability of a
technology and the related infrastructure to achieve
highly available operation and to sustain operation
during system failures.
Percentage uptime
CR002 Performance
Reflects whether the option has a positive or
negative impact on the overall infrastructure
performance.
System response time
System throughput
CR003 Scalability
Depicts the effect the option has on the ability of the
solution to be augmented to achieve higher
sustained performance within the infrastructure.
Utilization
Cost/performance ratio
CR004 Security
Reflects whether the option has a positive or
negative impact on overall infrastructure security.
Can also indicate whether a quality has an impact on
the ability of a business to demonstrate or achieve
compliance with certain regulatory policies.
Unauthorized access
prevention
Data integrity and
confidentiality
Forensic capabilities in
case of a compromise
CR005 Manageability
Relates the effect of a choice on overall
infrastructure manageability.
Servers per
administrator
Clients per IT staff
Time to deploy
CR006 Recoverability
Indicates the effect of a choice on the ability to
recover from a catastrophic event.
Recovery time objective
(RTO)
Recovery point objective
(RPO)
After evaluating other platforms it has become clear to us that VMware’s vCloud Air platform has the
requirements fulfilled, hereunder is a list of what VMware vCloud Air Service Offerings:
7. Service Offering
Compute
Availability Services
Storage
Network Services
Security and Compliance
Data Services
Developer Services
Mobile Services
Business Applications
Management
The up above service offerings are more than adequate to meet our requirement and criteria, as such
the design decision is vCloud Air.
3. PICS Design Summary
3.1. PICS Physical Design
Since we have established 3 datacenters on Mars, we will be utilizing these datacenters to be our point
of service, taking that into consideration we have performed an overhauling to these datacenter and the
hardware design is now as follows:
3.1.1. Power
Solar Panels -> the Sun is a reliable, robust, and plentiful energy source. Using solar panels is the best
choice for our PICS since it takes away the requirement to develop a complex power source, thereby
saving time and money while avoiding the risks and concerns of the use of a nuclear power source.
3.1.2. Cooling
Ice Thermal Storage -> Mars is a planet that has a great portion of its geographical space filled with ice in
addition to ice clouds formation. Cooling with ice thermal storage can be the most cost-effective,
reliable system approach to cooling the datacenters and provides steady source of low temperature
fluids for process cooling applications.
8. 3.1.3. pCompute
We will be utilizing rack mounted servers in all datacenters, the vendor not yet known because we might
be building our own servers to fit exactly our needs.
Eventually the nodes will be divided into two categories:
3.1.3.1. Management: these will be handling the vCloud Air VMs building blocks.
3.1.3.2. Servicing: these will be handling the vCloud Air user clouds.
3.1.4. pNetworking
3.1.4.1. LAN: 40Gbs switches will serve the core and 10Gbs will serve the hosts.
3.1.4.2. WAN: Since Mars now has its own satellite network, we will be utilizing the Mars Satellite
Internet for data transfer, a common misconception is that latency has an effect on transfer rate.
This is not true. A one Megabyte file will transfer just as quick over a 1000 Kbps (Kilobits per
second) satellite connection as it does over a 1000 Kbps terrestrial connection. The only
difference is that the satellite connection takes a half second to begin the file transfer, which is
insignificant. Thus reducing the complexity of establishing network service locations to
accommodate service delivery and access.
3.1.5. pStorage
Because we’re utilizing VMware technologies we get the added value of implementing our hosts with
VSAN configured, thus removing the need of having a farm of dedicated SANs and fabrics and eventually
reducing the complexity.
3.2. PICS Logical Design
3.2.1. Cloud Offerings
vCloud Air is an Infrastructure as a Service (IaaS) offering with the following class of service alternatives:
• Dedicated Cloud – Class of service provides a single-tenant, private cloud with dedicated
computing servers and Layer 2 network isolation for workload traffic. It also provides dedicated
storage volumes and a dedicated cloud management instance. Infrastructure capacity can be
allocated to a single virtual data center or multiple data centers.
9. 100%
Dedicated
100%
Dedicated
CPU
RAM
CPU Reserved
100%
Memory Reserved
owner
vDC1
Owner
100%
xGhz
xGB
Resources
Control
Resources
Control
CPU Reserved
100%
Memory Reserved
owner
vDCn
100%
Resources
Control
yGhz
yGB
DEDICATED: vSphere + vCloud Director + vCloud Networking and Security
PICS Dedicated Cloud
• Virtual Private Cloud – Class of service provides a multi-tenant virtual private cloud with
logically- isolated resources on a shared physical infrastructure, configured as a single virtual
data center with networking resources.
owner
RAM
51
%
CPU Reserved
CPU
50%
50%
100%
Memory Reserved
Owner
VPC1
20GB
51
%
CPU Reserved
10Ghz
50%
50%
100%
Memory Reserved
SHARED: vSphere + vCloud Director + vCloud Networking and Security
vPCn
PICS Virtual Private Cloud
• vCloud Air Disaster Recovery – Class of service provides a reserved multi-tenant virtual private
cloud, configured as a disaster recovery virtual data center for replication, failover, and recovery
of remote virtual machines. Similar to Virtual Private Cloud, this class of service leverages
logically isolated resources on a shared physical infrastructure.
Component Dedicated Cloud Virtual Private Cloud
• Access Portal • Shared • Shared
• pNetwork infrastructure • Shared • Shared
• pStorage infrastructure • Shared • Shared
• pCompute infrastructure • Dedicated • Shared
• Workloads VLANs • Dedicated • Shared
10. Both of the up above offerings are suitable for:
• Burst capacity environment.
• General usage environment.
• Development and testing environment.
3.2.2. Service Objects
Each class of service includes the capability to access the following objects and manage them to align
with different consumption and administration models.
1. Virtual data centers in all classes of service will be set up with an internal virtual data center
network and edge gateway with an optional NAT-routed network.
2. Virtual machines are first-class objects in vCloud Air interactions. They can be created and managed
individually. VMware vSphere vApps will be visible along with their virtual machine associations on
the vCloud Air console, but can be created or managed only through VMware vCloud Director.
3. Networks can be managed through the vCloud Air console for edge gateway configuration and
common use cases such as NAT mappings, firewall rules, and virtual machine-to-network
assignment. Advanced configuration and management such as VPN setup, load balancing, and
network creation can be performed through the vCloud Director interface, which is accessible
through the vCloud Air Console.
3.2.3. High Availability
vCloud Air is delivered using infrastructure that is architected for High Availability, leveraging vSphere
vMotion, Distributed Resource Scheduler (DRS), and vSphere HA to migrate live workloads and/or
automatically restart VMs in the event of unexpected issues. The Edge Gateways are also highly
• LUNs (datastores) • Dedicated • Shared
• vCenter / database • Dedicated • Shared
• vCloud Director cell / database • Dedicated • Shared
• VMware vShield™ Manager • Dedicated • Shared
• VXLAN vWires • Dedicated • Dedicated
• Edge gateways • Dedicated • Dedicated
• Private catalogue • Dedicated • Dedicated
11. available in an active-standby pair to ensure that networks are protected and available after an event.
3.2.4. Resource Allocations
At a high level, a Virtual Private Cloud and a virtual data center on a Dedicated Cloud are essentially the
same object type, but they differ considerably in how computational resources are allocated.
In a Dedicated Cloud model, every virtual data center is configured as a reservation pool and
administrators can change resource reservations per virtual machine.
A limit equal to the reservation is set on a resource pool level, which gives the tenant a guaranteed pool
of resources. There are no limits or reservations set on a per virtual machine level, which gives the
virtual data center administrator flexibility. However, this flexibility could lead to severe over-
commitment. As such, it is recommended to limit the amount of virtual machines to avoid a degraded
user experience.
In a Virtual Private Cloud model, every Virtual Private Cloud is configured as an allocation pool with 50
percent memory reserved and 50 percent CPU reserved. No resource controls are permitted.
This means that the Virtual Private Cloud can never be over-committed, and the number of virtual
machines strictly depends on the quantity of GB assigned until the purchased GB is reached.
Regardless of their nature, all virtual data centers appear as badges in the vCloud Air portal.
3.2.5. Provisioning (Blueprints and Catalogs)
Blueprints: for vCloud Air are configured in VMware vRealize Automation as “vApp (vCloud Director)”.
This means they can be configured as a single instance of multiple virtual machines.
Catalogs: After the blueprint has been published, it can be made available to each business group. It is
important to distinguish where this blueprint is going to be published so that the users will know what
kind of service they are requesting.
12. 3.2.6. User Access (Management and Monitoring)
Users will be entitled to a self-service portal that the users can utilize to create their workloads and
associate each workload with the plan required
vCloud Air utilizes and leverages vCloud Director, which eventually leverages a term VMware likes to call
it the “a cloud of clouds”, users will be able to manage their virtual machines/vApps via vCloud Director.
13. Users will have access to basic metrics over the virtual machines running in PICS
If more metrics is required, it is recommended to configure a monitoring system on-premises as PICS
VMs can be access via SSL-VPN and collect metrics from the public cloud for purpose of aggregation and
reporting (i.e. VMware vRealize Hyperic Server would be on-premises and relative Hyperic Agents
deployed inside the virtual machines on the public cloud in order to collect metrics, in addition we can
utilize VMware vRealize Operations Manager to aggregate them, eventually creating super metrics and a
comprehensive dashboard).
3.2.7. Security
The end-to-end security of the vCloud Air is a mutual effort between PICS and the PICS users.
3.2.7.1. PICS will be providing:
• Physical security –PICS will protect the data-centers housing the vCloud Air from physical
security breaches.
• Information security – PICS will protect the information systems used to deliver the vCloud Air
for which it has sole administrative level control.
• Network security – PICS will protect the networks containing its information systems up to the
point where you have some control, permission, or access to modify your networks.
• Security Monitoring – PICS will monitor for security events involving the underlying
infrastructure servers, storage, networks, and information systems used in the delivery of the
vCloud Air over which it has sole administrative level control. This responsibility stops at any
point where you have some control, permission, or access to modify an aspect of the service
offering.
• Patching and vulnerability management – PICS will maintain the systems it uses to deliver the
service offering, including the application of patches it deems critical for the target systems.
VMware will perform routine vulnerability scans to surface critical risk areas for the systems it
uses to deliver the service offering. Critical vulnerabilities will be addressed in a timely manner.
14. 3.2.7.2. PICS users will be responsible for:
• Information security – PICS users will be responsible for ensuring adequate protection of the
information systems, data, content, or applications that you deploy and/or access on the vCloud
Air. This includes, but is not limited to, any level of patching, security fixes, data encryption,
access controls, roles and permissions granted to your internal, external, or third-party users,
and so on.
• Network security – PICS users will be responsible for the security of the networks over which
you have administrative level control. This includes, but is not limited to, maintaining effective
firewall rules, exposing only communication ports that are necessary to conduct business,
locking down promiscuous access, and so on.
• Security monitoring – PICS users will be responsible for the detection, classification, and
remediation of all security events that are isolated with your vCloud Air account, associated with
virtual machines, operating systems, applications, data, or content, surfaced through
vulnerability scanning tools, or required for a compliance or certification program in which you
are required to participate and which are not serviced under another PICS security program.
3.2.8. Backup and Restore
• VMware vCloud Air offers a per virtual machine backup service with the following features:
• Fixed 24-hour RPO
• Full vApp metadata coherency
• Virtual machine Image-level
Restore Granularity Objective
(RGO)
• Custom retention periods
from 1 to 365 days
• Industry-standard AES-256
image-level encryption
15. PICS users can enable backup service using the vCloud Air dashboard and selecting the specific
virtual machine properties.
Capability Dedicated Cloud Virtual Private Cloud
Data protection capacity units 6 TB front-end protected
storage
2 TB front-end protected
storage
Unlimited backups Yes Yes
Unlimited restores Yes Yes
Backup operations (concurrent) 16 16
Restore operations (concurrent) 16 16
Production support 24 hours/day
7 days/week
365 days/year
24 hours/day
7 days/week
365 days/year
Subscription Term 1 month
12 month
24 month
36 month
1 month
3 month
12 month
24 month
36 month
16. To restore a virtual machine from backup, PICS users Operations Team will contact the PICS Technical
Support, and they will perform the restore within 4 hours.
4. Web Application Workload
For this kind of workload we have decided to go with a Virtual Private Cloud, because our WebApp is
exposed to the public thus we might need to increase the resources allocated for our infrastructure in
times of peaks and spikes then decrease those resources.
4.1. Capacity Design Decision
Based on previous benchmarks and monitoring of the workloads we have deduced the hereunder
requirement for the VPC:
Type Virtual Private Cloud
CPU GHz
(% reserved)
10 GHz burst to 20 GHz
(50% reserved)
Memory GB
(% reserved)
30 GB
(50% reserved)
SSD Storage 0.5 TB
Standard Storage 2.5 TB
Network
Bandwidth
10 Mbps
50 Mbps (burst)
Public IP
addresses
2
17. Within the VPC here is the allocation for the Virtual Machines:
Our web application is a 3 tiered model and it can be visualized in the hereunder diagram:
Web Application VPC
Web Servers Application Servers Database Servers
Within the VPC the virtual machines have the following allocations:
Virtual Machine Name
CPU
(GHz)
Memory
(GB)
Standard
Storage (TB)
SSD
Storage
Public IP
Addresses
Time Tracking Web Server 1 VM 1 GHz 1 GB 0.25 TB None
1 (load balanced)
Time Tracking Web Server 2 VM 1 GHz 1 GB 0.25 TB None
Time Tracking Web Application 1 2 GHz 2 GB 0.25 TB None None
Time Tracking Web Application 2 2 GHz 2 GB 0.25 TB None None
Time Tracking Database VM 1 2 GHz 4 GB 0.5 TB 0.15 TB None
Time Tracking Database VM2 2 GHz 4 GB 0.5 TB 0.15 TB None
4.2.Network Allocation Design Decision
Network Name Network Address Edge Gateways Networks
Time Tracking Web Servers 192.168.110.0/24 WebApp-EdgeGW Web-default-Routed
Time Tracking Application Servers 192.168.111.0/24 WebApp-EdgeGW App-services-Routed
Time Tacking Database Servers 192.168.112.0/24 WebApp-EdgeGW DB-Services-Routed
18. Web Application VPC
DMZ Network
192.168.110.0/24
EDGE GATEWAY
Application Network
192.168.111.0/24
Database Network
192.168.112.0/24
SRC:AnyDest:Web Port:80 Allow SRC:App1Dest:DB Port:1433 Allow
SRC:DB Dest:Web Port:Any Deny
SRC:Web Dest:App Port:7123 Allow
4.3.Backup Design Decision
Design Option Justification Implication
Data Protection Enabled Virtual machines will be protected Upon VM failure, it will be restored from backup.
5. Business Critical Enterprise Application Workload
For this kind of workload we have decided to go with a Dedicated Cloud because this is a business
critical application we do not want anyone to share the resources with it.
5.1. Capacity Design Decision
Based on previous benchmarks and monitoring of the workloads we have deduced the hereunder
requirement for the Dedicated Cloud:
Type Dedicated Cloud
CPU GHz (% reserved) 50 GHz (100% reserved)
Memory GB (% reserved) 120 GB (100% reserved)
SSD Storage 6 TB
Standard Storage 12 TB
Network Bandwidth 50 Mbps (1Gbps Mbps (burst))
19. Public IP addresses 1
We are also going to utilize the capability of having multiple Virtual Data Centers across and since this is
a life support system it is very much important to segregate and split the authorization of the tenants,
we are well aware that this is a collaborative human work but it is better to be safe than sorry.
Each virtual datacentre will host a workload, as explained in the hereunder table:
Virtual Datacenter 1 (vDC1) – Management Web Servers
Virtual Machine Name CPU (GHz) Memory (GB) Standard Storage (TB) SSD Storage
Public IP
Addresses
Life Support System
Management Web Server 1
3 GHz 8 GB 0.5 TB 0.25 TB None
Life Support System
Management Web Server 2
3 GHz 8 GB 0.5 TB 0.25 TB None
Virtual Datacenter 2 (vDC2) – Electricity Application Servers
Virtual Machine Name CPU (GHz) Memory (GB) Standard Storage (TB) SSD Storage
Public IP
Addresses
Life Support System
Electricity Application
Server 1
5 GHz 10 GB 0.75 TB 0.25 TB None
Life Support System
Electricity Application
Server 2
5 GHz 10 GB 0.75 TB 0.25 TB None
Virtual Datacenter 3 (vDC3) – Water Flow Application Servers
Virtual Machine Name CPU (GHz)
Memory
(GB)
Standard Storage
(TB)
SSD Storage
Public IP
Addresses
Life Support System Water
Flow Application Server 1
5 GHz 10 GB 0.75 TB 0.25 TB None
Life Support System Water
Flow Application Server 2
5 GHz 10 GB 0.75 TB 0.25 TB None
20. Virtual Datacenter 4 (vDC4) – Air Flow Application Servers
Virtual Machine Name CPU (GHz) Memory (GB) Standard Storage (TB) SSD Storage
Public IP
Addresses
Life Support System Air
Flow Application Server 1
5 GHz 10 GB 0.75 TB 0.25 TB None
Life Support System Air
Flow Application Server 2
5 GHz 10 GB 0.75 TB 0.25 TB None
Virtual Datacenter 5 (vDC5) – Database Servers
Virtual Machine Name CPU (GHz) Memory (GB) Standard Storage (TB) SSD Storage
Public IP
Addresses
Life Support System
Database Server 1
4 GHz 16 GB Clustered 0.5 TB 1 TB None
1.5TB
Life Support System
Database Server 2
4 GHz 16 GB 0.5 TB 1 TB None
5.2. Network Allocation Design Decision
vDC Network Address Edge Gateways Networks
Virtual Datacenter 1 (vDC1) – Management
Web Servers
192.168.120.0/24 vDC1-MWS-EG vDC1-MWS-Routed
Virtual Datacenter 2 (vDC2) – Electricity
Application Servers
192.168.121.0/24 vDC2-EAS-EG vDC2-EAS-Routed
Virtual Datacenter 3 (vDC3) – Water Flow
Application Servers
192.168.122.0/24 vDC3-WFA-EG vDC3-WFA-Routed
Virtual Datacenter 4 (vDC4) – Air Flow
Application Servers
192.168.123.0/24 vDC4-AFA-EG vDC4-AFA-Routed
Virtual Datacenter 5 (vDC5) – Database
Servers
192.168.124.0/24 vDC5-DB-EG vDC5-DB-Routed
21. Life Support System Business Critical Application Dedicated Cloud
vDC5 Network
192.168.124.0/24
EDGE GATEWAY
Life Support System Database Servers
Virtual Datacenter 5 (vDC5) – Database Servers
vDC4 Network
192.168.123.0/24
EDGE GATEWAY
Life Support System Air Flow Application Servers
Virtual Datacenter 4 (vDC4) – Air Flow Application Servers
Virtual Datacenter 3 (vDC3) – Water Flow Application Servers
vDC3 Network
192.168.122.0/24
EDGE GATEWAY
Life Support System Water Flow Application Servers
Virtual Datacenter 2 (vDC2) – Electricity Application Servers
vDC2 Network
192.168.121.0/24
EDGE GATEWAY
Life Support System Electricity Application Servers
Virtual Datacenter 1 (vDC1) – Management Web Servers
vDC1 Network
192.168.120.0/24
EDGE GATEWAY
Life Support System Management Web Srver
22. 5.3. Security Design Decision
These critical systems will require several teams for management and thus each team will have access to
their own vDC separately. This is we improve the security and the risk of unpredicted changes, in
addition to data leakage.
5.4. Backup Design Decision
Design Option Justification Implication
Data Protection Enabled Production virtual
machines will be protected
Upon VM failure, it will be restored from
backup.
5.5. Replication Design Decision
Of course having such a critical system implies that the system’s uptime must be a 99.99999->aleph, we
will be doing a best effort here to achieve those nines by adding a hot disaster site to our environment.
Since vCloud Air has the service of disaster recovery, we will be utilizing another dedicated cloud to host
a replica of our infrastructure.
We could have just gotten a VPC (Virtual Private Cloud) which is the shared platform, but this is a life
support system people and we don’t want a fight over processing power which might for some reason
decrease the percentage of air flow for example, thus a dedicate cloud for replication it is.
5.5.1. Test Failover
Because we want to make sure our DR is always there when we need it, tests must be performed to
insure that when its needed it will be as we expect it to be.
Invoking a test includes contacting the PICS Global Support Service and the test failover will be enabled
for 7 days which is plenty of time to test things and get them sorted.
5.5.2. Upon Disaster
In case of disaster, before you panic please make sure to invoke the failover process and we at PICS will
make sure that your resources are brought online, note this does not include control over the
applications which means that you have to take control of that once the virtual machines are accessible.
After the disaster has passed and things are back to normal, a failback is invoked so that to return the
original datacentre.
23. Life Support System Business Critical Application Dedicated Cloud – Primary
vDC5 Network
192.168.124.0/24
EDGE GATEWAY
Life Support System Database Servers
Virtual Datacenter 5 (vDC5) – Database Servers
vDC4 Network
192.168.123.0/24
EDGE GATEWAY
Life Support System Air Flow Application Servers
Virtual Datacenter 4 (vDC4) – Air Flow Application Servers
Virtual Datacenter 3 (vDC3) – Water Flow Application Servers
vDC3 Network
192.168.122.0/24
EDGE GATEWAY
Life Support System Water Flow Application Servers
Virtual Datacenter 2 (vDC2) – Electricity Application Servers
vDC2 Network
192.168.121.0/24
EDGE GATEWAY
Life Support System Electricity Application Servers
Virtual Datacenter 1 (vDC1) – Management Web Servers
vDC1 Network
192.168.120.0/24
EDGE GATEWAY
Life Support System Management Web Srver
Life Support System Business Critical Application Dedicated Cloud – Disaster Reocvery
vDC5 Network
192.168.124.0/24
EDGE GATEWAY
Life Support System Database Servers
Virtual Datacenter 5 (vDC5) – Database Servers
vDC4 Network
192.168.123.0/24
EDGE GATEWAY
Life Support System Air Flow Application Servers
Virtual Datacenter 4 (vDC4) – Air Flow Application Servers
Virtual Datacenter 3 (vDC3) – Water Flow Application Servers
vDC3 Network
192.168.122.0/24
EDGE GATEWAY
Life Support System Water Flow Application Servers
Virtual Datacenter 2 (vDC2) – Electricity Application Servers
vDC2 Network
192.168.121.0/24
EDGE GATEWAY
Life Support System Electricity Application Servers
Virtual Datacenter 1 (vDC1) – Management Web Servers
vDC1 Network
192.168.120.0/24
EDGE GATEWAY
Life Support System Management Web Srver
VDC
Replication
24. 6. Final Words
It is not hidden that even upon leaving our mother planet earth the cloud seems to have moved along
with us and it is the best IT solution if we are ought to focus on other important things than maintaining
an on premises IT infrastructure.
Thank you for taking the time to go through this design and we hope that PICS will be your choice when
it comes to building a public cloud on Mars.
7. Appendices
Appendix A – References
- http://www.slideshare.net/vmware/vmw-ppt10things-you-can-do10-things-you-can-do-on-
vmware-vcloud-air-that-you-cant-do-on-awsec2
- http://pages.cs.wisc.edu/~akella/CS838/F12/notes/Cloud_Providers_Comparison.pdf
- http://vcloud.vmware.com/uk/using-vcloud-air/tutorials/navigating-user-interface-
relationship-and-catalogs
- http://www.slideshare.net/jpanneke/colt-enterprise-vcloud
- http://www.nlvmug.com/wp-content/uploads/2015/03/VMware-vCloud-Air-Bouwsteen-voor-
de-Hybrid-Cloud.pdf
- http://vcloud.vmware.com/uk/explore-vcloud-air/experience-vcloud-air
- http://pubs.vmware.com/vra-62/index.jsp#com.vmware.vra.iaas.vcd.doc/GUID-03BA305E-
1AA0-437E-BB62-CF88115CBC81.html
- https://www.youtube.com/watch?v=3ZMx23ZC8BM
- http://www.rightscale.com/blog/enterprise-cloud-strategies/identifying-workloads-cloud
- http://prof.ict.ac.cn/bpoe_4_asplos/wp-content/uploads/2013/11/Characterizing-Workload-
of-Web-Applications-on-Virtualized-Servers.pdf
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.111.6978&rep=rep1&type=pdf
- http://www.mars-one.com/technology/life-support-unit
- https://www.nasa.gov/sites/default/files/104840main_eclss.pdf
- http://www.vmware.com/files/pdf/vcloud-air/vcloud-air-Tech-FAQ.pdf