SlideShare a Scribd company logo
1 of 59
Asmaa Ibrahim
5/6/20141
Part I: Fundamental Cloud Computing
Fundamental Cloud Computing
5/6/20142
 Chapter 1: Understanding Cloud Computing
 Chapter 2: Fundamental Concepts and Models
 Chapter 3: Cloud-EnablingTechnology
 Chapter 4: Fundamental Cloud Security
Understanding Cloud Computing
5/6/20143
 Origins and Influences
 Basic Concepts andTerminology
A Brief History
5/6/20144
“As of now, computer networks are
still in their infancy, but as they
grow up and become
sophisticated, we will probably see
the spread of ‘computer utilities’
…”. Leonard Kleinrock
A Brief History
5/6/20145
What is the next ??
5/6/20146
5/6/20147
Innovation
Technology
8
5/6/20149
 Cloud computing is a new way of delivering
computing resources, not a new technology.
Why Cloud Computing?
5/6/201410
 Business Drivers
 Capacity Planning
 OrganizationalAgility
 Cost Reduction
 Technology Innovations
 Clustering
 Grid Computing
 Virtualization
Capacity planning
5/6/201411
Organizational Agility
5/6/201412
Cost Reduction
5/6/201413
Clustering
5/6/201414
5/6/201415
Grid Computing
5/6/201416
Virtualization
5/6/201417
 Let’s talk about virtualization in details.
Virtualization History
5/6/201418
Virtualization Principles
5/6/201419
Server virtualization separates software
from hardware.
The low-layer virtualization software
abstracts a virtual hardware interface by
means of space segmentation, time
division, and emulation to provide the
upper-layer OSs with an expected
hardware environment.
Virtualization architecture
5/6/201420
Virtualization Implementation
5/6/201421
 VMM virtualizes three types of physical resources: CPU,
memory, and I/O device. CPU virtualization is the most
important.
 We will go through:
 CPU virtualization
 memory virtualization
 I/O device virtualization
1- CPU Virtualization
5/6/201422
 Classical virtualization method
 The modern computer architecture offers at least two levels of privilege
(user mode and kernel mode) to isolate system software from application
programs
 x86 virtualization method
 The x86 architecture offers four levels of privilege known as Ring 0, 1, 2,
and 3.The x86 has the following sensitive instructions:
1. Instructions used to access and modify machine state orVM state
2. Instructions that read or change sensitive registers, such as a clock register or
interrupt registers, or memory locations
3. Instructions that reference the storage protection system, memory, or address
relocation system (such as paging)
4. All I/O instructions
x86 virtualization method
5/6/201423
2- Memory Virtualization
5/6/201424
3- I/O Device Virtualization
5/6/201425
 TheVMM virtualizes I/O devices to reuse limited I/O resources.
It intercepts requests when guest OSs attempt to access I/O
devices and then uses software to emulate real hardware.There are
three types of I/O device virtualization methods: complete
emulation on interface, front-end and back-end emulation, and
direct allocation.
Technology Innovations vs. Enabling
Technologies
5/6/201426
 These are distinguished as cloud-enabling technologies:
 Broadband Networks and InternetArchitecture
 Data CenterTechnology
 (Modern)VirtualizationTechnology
 WebTechnology
 MultitenantTechnology
 ServiceTechnology
Basic Concepts and Terminology
5/6/201427
Cloud
5/6/201428
 A Cloud refers to a distinct IT environment that is designed for
the purpose of remotely provisioning scalable and measured IT
resources.
Figure 1.1
The symbol used to denote the boundary of a cloud
environment.
IT Resource
5/6/201429
 An IT resource is a physical or virtual IT-related artifact that can
be either software based, such as a virtual server or a custom
software program, or hardware-based, such as a physical server or
a network device (Figure 1.2).
Figure 1.2
Examples of common IT resources and their corresponding symbols.
Figure 1.3
A cloud is hosting eight IT resources: three virtual servers, two cloud services, and three
storage devices.
5/6/201430
On-Premise
5/6/201431
 An on-premise IT resource can access and interact with a
cloud-based IT resource.
 An on-premise IT resource can be moved to a cloud, thereby
changing it to a cloud-based IT resource.
 Redundant deployments of an IT resource can exist in both
on-premise and cloud-based environments.
Scaling
5/6/201434
 Scaling, from an IT resource perspective, represents the
ability of the IT resource to handle increased or decreased
usage demands.
 The following are types of scaling:
 Horizontal Scaling – scaling out and scaling in
 Vertical Scaling – scaling up and scaling down
Horizontal Scaling
5/6/201435
Figure 1.4
An IT resource (Virtual ServerA) is scaled out by adding more of the same IT resources
(Virtual Servers B and C).
Vertical Scaling
5/6/201436
Figure 1.5
An IT resource (a virtual server with two CPUs) is scaled up by replacing it with a
more powerful IT resource with increased capacity for data storage (a physical server
with four CPUs).
HS & VS comparison
5/6/201437
Service
5/6/201438
 From an implementation perspective, a service is a software
program that can be remotely invoked via a published
technical interface (or API) referred to as a service
contract.
 When a software program invoked and interacts with a
service, it is labeled as a service consumer.
 Services acting as service consumers can invoke other
services.When two or more services participates to
complete a given task, the services form a service
composition.
 A service can reside on-premise or in a cloud. In the latter
case, I is further qualified as a cloud service (as explained in
the following Cloud Service section).
Cloud Service
5/6/201439
 A cloud service is any IT resource that is made remotely
accessible via a cloud.
 Unlike other IT fields that fall under the service technology
umbrella—such as service- oriented architecture—the term
“service” within the context of cloud computing is especially
broad.
A cloud service that exists as a virtual server is also being accessed from outside of the
cloud’s boundary (right).The cloud service on the right may be accessed by a human user
that has remotely logged on to the virtual server.
5/6/201440
A cloud service with a published technical interface is being accessed by a consumer
outside of the cloud (left).The cloud service on the left is likely being invoked by a
consumer program that was designed to access the cloud service’s published technical
interface.
5/6/201441
Goals and Benefits from Cloud
Computing
5/6/201442
Benefits
5/6/201443
 Reduced Investments and Proportional Costs
 Increased Scalability
 IncreasedAvailability and Reliability
Reduced Investments and Proportional
Costs
5/6/201444
 The most common economic rationale for investing in cloud-
based IT resources is in the reduction or outright elimination of
up-front IT investments, namely hardware and software purchases
and ownership costs.
 A cloud’s Measured Usage characteristic represents a feature-set
that allows measured operational expenditures (directly related to
business performance) to replace anticipated capital expenditures.
This is also referred to as proportional costs.
Reduced Investments and Proportional
Costs
5/6/201445
 The Elimination or minimization of up-front financial
commitments allows enterprises to start small and
accordingly increase IT resource allocation as required.
Moreover, the reduction of up-front capital expenses allows
for the capital to be redirected to the core business
investment.
 IT professionals, and network bandwidth can be obtained at
lower costs, resulting in both
Reduced Investments and Proportional
Costs
5/6/201446
 Common measurable benefits to cloud consumers
include:
 On-demand access to pay-as-you-go computing resources on a
short-term basis (such as processors by the hour), and the
ability to release these computing resources when they are no
longer needed.
 The perception of having unlimited computing resources that
are available on demand, thereby reducing the need to prepare
for provisioning.
 The ability to add or remove IT resources at a fine-grained
level, such as modifying available storage disk space by single
gigabyte increments.
 Abstraction of the infrastructure so applications are not locked into
devices or locations and can be easily moved if needed.
Increased Scalability
5/6/201447
 A simple example of usage demand fluctuations throughout a 24 hour period is
provided in Figure 3.8.
Figure 1.8
An example of an organization’s changing demand for an IT resource over the
course of a day.
Increased Availability and Reliability
5/6/201448
 The availability and reliability of IT resources are directly
associated with tangible business benefits.
 A hallmark of the typical cloud environment is its intrinsic
ability to provide extensive support for increasing the
availability of a cloud-based IT resource to minimize or even
eliminate outages, and for increasing its reliability so as to
minimize the impact of runtime failure conditions.
Increased Availability and Reliability
5/6/201449
Specifically:
 An IT resource with increased availability is accessible for
longer periods of time (for example, 22 hours out of a 24
hour day). Cloud providers generally offer resilient” IT
resources for which they are able to guarantee high levels of
availability.
 An IT resource with increased reliability is able to better
avoid and recover from exception conditions.The modular
architecture of cloud environments provides extensive
failover support that increases reliability.
Risks and Challenges
5/6/201450
Risks and Challenges
5/6/201451
 Increased SecurityVulnerabilities
 Reduced Operational Governance Control
 Limited Portability Between Cloud Providers
 Multi-Regional Compliance and Legal Issue
Increased Security Vulnerabilities
5/6/201452
 The moving of business data to the cloud means that the
responsibility over data security becomes shared with the
cloud provider.The remote usage of IT resources requires an
expansion of trust boundaries by the cloud consumer to
include the external cloud.
5/6/201453
Consider the following examples:
5/6/201454
 An unreliable cloud provider may not maintain the
guarantees it makes in the SLAs that were published for
its cloud services.This can jeopardize the quality of the
cloud consumer solutions that rely on these cloud
services.
 Longer geographic distances between the cloud
consumer and cloud provider can require additional
network hops that introduce fluctuating latency and
potential bandwidth constraints.
Another Scenario
5/6/201455
Figure 1.10
An unreliable network connection compromises the quality of communication between
cloud consumer and cloud provider environments.
5/6/201456
Limited Portability Between Cloud
Providers
5/6/201457
 Due to a lack of established industry standards within the
cloud computing industry, public clouds are commonly
proprietary to various extents. For cloud consumers that
have custom-built solutions with dependencies on these
proprietary environments, it can be challenging to move
from one cloud provider to another.
 Portability is a measure used to determine the impact of
moving cloud consumer IT resources and data between
clouds
Figure 1.11
A cloud consumer’s application has a decreased level of portability when assessing a potential migration from CloudA to Cloud B,
because the cloud provider of Cloud B does not support the same security technologies as CloudA.
5/6/201458
Multi-Regional Compliance and Legal
Issues
5/6/201459
 Third-party cloud providers will frequently establish data centers
in affordable or convenient geographical locations. Cloud
consumers will often not be aware of the physical location of their
IT resources and data when hosted by public clouds.
 For some organizations, this can pose serious legal concerns
pertaining to industry or government regulations that specify data
privacy and storage policies.
 For example, some UK laws require personal data belonging to
UK citizens to be kept within the United Kingdom.
Legal Issues
5/6/201460
 Another potential legal issue pertains to the accessibility and
disclosure of data.
 Countries have laws that require some types of data to be
disclosed to certain government agencies or to the subject of the
data.
 For example, a European cloud consumer’s data that is located in
the U.S. can be more easily accessed by government agencies (due
to the U.S. PatriotAct) when compared to data located in many
European Union countries.
Activity
5/6/201461

More Related Content

What's hot

Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureMonishaNehkal
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computingAsmaa Ibrahim
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 
Fundamental concepts and models
Fundamental concepts and modelsFundamental concepts and models
Fundamental concepts and modelsAsmaa Ibrahim
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using EucalyptusAbhishek Dey
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloudsagaroceanic11
 

What's hot (20)

Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Fundamental concepts and models
Fundamental concepts and modelsFundamental concepts and models
Fundamental concepts and models
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 

Similar to Fundamental Cloud Computing Guide

Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationEMC
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Reviewijtsrd
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of VirtualizationHTS Hosting
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...eSAT Journals
 

Similar to Fundamental Cloud Computing Guide (20)

Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud Computing Improving Organizational Agility
Cloud Computing Improving Organizational AgilityCloud Computing Improving Organizational Agility
Cloud Computing Improving Organizational Agility
 
V04405122126
V04405122126V04405122126
V04405122126
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
ENERGY EFFICIENCY IN CLOUD COMPUTING
ENERGY EFFICIENCY IN CLOUD COMPUTINGENERGY EFFICIENCY IN CLOUD COMPUTING
ENERGY EFFICIENCY IN CLOUD COMPUTING
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...
 

More from Vietnam Open Infrastructure User Group

Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with CephRoom 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with CephVietnam Open Infrastructure User Group
 
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Vietnam Open Infrastructure User Group
 
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...Vietnam Open Infrastructure User Group
 
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...Vietnam Open Infrastructure User Group
 
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...Vietnam Open Infrastructure User Group
 
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...Vietnam Open Infrastructure User Group
 
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Vietnam Open Infrastructure User Group
 
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...Vietnam Open Infrastructure User Group
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Vietnam Open Infrastructure User Group
 
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Vietnam Open Infrastructure User Group
 
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...Vietnam Open Infrastructure User Group
 
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiRoom 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiVietnam Open Infrastructure User Group
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Vietnam Open Infrastructure User Group
 
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...Vietnam Open Infrastructure User Group
 
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Vietnam Open Infrastructure User Group
 
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Vietnam Open Infrastructure User Group
 
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...Vietnam Open Infrastructure User Group
 
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache JamesRoom 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache JamesVietnam Open Infrastructure User Group
 

More from Vietnam Open Infrastructure User Group (20)

Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with CephRoom 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
Room 3 - 5 - Nguyễn Văn Hoàn - 101 Bugs, issues when I work with Ceph
 
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
 
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
 
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
Room 3 - 4 - Lê Quang Hiếu - How to be a cool dad: Leverage DIY Home Automati...
 
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Trần Tuấn Anh - Defending Software Supply Chain Security in Bank...
 
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
Room 3 - 7 - Nguyễn Như Phúc Huy - Vitastor: a fast and simple Ceph-like bloc...
 
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
 
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
Room 2 - 2 - Giang Thiên Phú - Kinh nghiệm tối ưu mongodb với database hơn 10...
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
 
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
 
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combinationRoom 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
Room 2 - 7 - Lã Mạnh Hà - Agile + DevOps = A great combination
 
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practiceRoom 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
Room 2 - 1 - Phạm Quang Minh - A real DevOps culture in practice
 
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
Room 2 - 5 - Seong Soo - NHN Cloud - Upstream contribution mentoring program ...
 
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiRoom 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
 
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
Room 1 - 3 - Lê Anh Tuấn - Build a High Performance Identification at GHTK wi...
 
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
 
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
 
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
 
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache JamesRoom 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
Room 1 - 1 - Benoit TELLIER - On premise email inbound service with Apache James
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Fundamental Cloud Computing Guide

  • 1. Asmaa Ibrahim 5/6/20141 Part I: Fundamental Cloud Computing
  • 2. Fundamental Cloud Computing 5/6/20142  Chapter 1: Understanding Cloud Computing  Chapter 2: Fundamental Concepts and Models  Chapter 3: Cloud-EnablingTechnology  Chapter 4: Fundamental Cloud Security
  • 3. Understanding Cloud Computing 5/6/20143  Origins and Influences  Basic Concepts andTerminology
  • 4. A Brief History 5/6/20144 “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of ‘computer utilities’ …”. Leonard Kleinrock
  • 6. What is the next ?? 5/6/20146
  • 9. 5/6/20149  Cloud computing is a new way of delivering computing resources, not a new technology.
  • 10. Why Cloud Computing? 5/6/201410  Business Drivers  Capacity Planning  OrganizationalAgility  Cost Reduction  Technology Innovations  Clustering  Grid Computing  Virtualization
  • 17. Virtualization 5/6/201417  Let’s talk about virtualization in details.
  • 19. Virtualization Principles 5/6/201419 Server virtualization separates software from hardware. The low-layer virtualization software abstracts a virtual hardware interface by means of space segmentation, time division, and emulation to provide the upper-layer OSs with an expected hardware environment.
  • 21. Virtualization Implementation 5/6/201421  VMM virtualizes three types of physical resources: CPU, memory, and I/O device. CPU virtualization is the most important.  We will go through:  CPU virtualization  memory virtualization  I/O device virtualization
  • 22. 1- CPU Virtualization 5/6/201422  Classical virtualization method  The modern computer architecture offers at least two levels of privilege (user mode and kernel mode) to isolate system software from application programs  x86 virtualization method  The x86 architecture offers four levels of privilege known as Ring 0, 1, 2, and 3.The x86 has the following sensitive instructions: 1. Instructions used to access and modify machine state orVM state 2. Instructions that read or change sensitive registers, such as a clock register or interrupt registers, or memory locations 3. Instructions that reference the storage protection system, memory, or address relocation system (such as paging) 4. All I/O instructions
  • 25. 3- I/O Device Virtualization 5/6/201425  TheVMM virtualizes I/O devices to reuse limited I/O resources. It intercepts requests when guest OSs attempt to access I/O devices and then uses software to emulate real hardware.There are three types of I/O device virtualization methods: complete emulation on interface, front-end and back-end emulation, and direct allocation.
  • 26. Technology Innovations vs. Enabling Technologies 5/6/201426  These are distinguished as cloud-enabling technologies:  Broadband Networks and InternetArchitecture  Data CenterTechnology  (Modern)VirtualizationTechnology  WebTechnology  MultitenantTechnology  ServiceTechnology
  • 27. Basic Concepts and Terminology 5/6/201427
  • 28. Cloud 5/6/201428  A Cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. Figure 1.1 The symbol used to denote the boundary of a cloud environment.
  • 29. IT Resource 5/6/201429  An IT resource is a physical or virtual IT-related artifact that can be either software based, such as a virtual server or a custom software program, or hardware-based, such as a physical server or a network device (Figure 1.2). Figure 1.2 Examples of common IT resources and their corresponding symbols.
  • 30. Figure 1.3 A cloud is hosting eight IT resources: three virtual servers, two cloud services, and three storage devices. 5/6/201430
  • 31. On-Premise 5/6/201431  An on-premise IT resource can access and interact with a cloud-based IT resource.  An on-premise IT resource can be moved to a cloud, thereby changing it to a cloud-based IT resource.  Redundant deployments of an IT resource can exist in both on-premise and cloud-based environments.
  • 32. Scaling 5/6/201434  Scaling, from an IT resource perspective, represents the ability of the IT resource to handle increased or decreased usage demands.  The following are types of scaling:  Horizontal Scaling – scaling out and scaling in  Vertical Scaling – scaling up and scaling down
  • 33. Horizontal Scaling 5/6/201435 Figure 1.4 An IT resource (Virtual ServerA) is scaled out by adding more of the same IT resources (Virtual Servers B and C).
  • 34. Vertical Scaling 5/6/201436 Figure 1.5 An IT resource (a virtual server with two CPUs) is scaled up by replacing it with a more powerful IT resource with increased capacity for data storage (a physical server with four CPUs).
  • 35. HS & VS comparison 5/6/201437
  • 36. Service 5/6/201438  From an implementation perspective, a service is a software program that can be remotely invoked via a published technical interface (or API) referred to as a service contract.  When a software program invoked and interacts with a service, it is labeled as a service consumer.  Services acting as service consumers can invoke other services.When two or more services participates to complete a given task, the services form a service composition.  A service can reside on-premise or in a cloud. In the latter case, I is further qualified as a cloud service (as explained in the following Cloud Service section).
  • 37. Cloud Service 5/6/201439  A cloud service is any IT resource that is made remotely accessible via a cloud.  Unlike other IT fields that fall under the service technology umbrella—such as service- oriented architecture—the term “service” within the context of cloud computing is especially broad.
  • 38. A cloud service that exists as a virtual server is also being accessed from outside of the cloud’s boundary (right).The cloud service on the right may be accessed by a human user that has remotely logged on to the virtual server. 5/6/201440
  • 39. A cloud service with a published technical interface is being accessed by a consumer outside of the cloud (left).The cloud service on the left is likely being invoked by a consumer program that was designed to access the cloud service’s published technical interface. 5/6/201441
  • 40. Goals and Benefits from Cloud Computing 5/6/201442
  • 41. Benefits 5/6/201443  Reduced Investments and Proportional Costs  Increased Scalability  IncreasedAvailability and Reliability
  • 42. Reduced Investments and Proportional Costs 5/6/201444  The most common economic rationale for investing in cloud- based IT resources is in the reduction or outright elimination of up-front IT investments, namely hardware and software purchases and ownership costs.  A cloud’s Measured Usage characteristic represents a feature-set that allows measured operational expenditures (directly related to business performance) to replace anticipated capital expenditures. This is also referred to as proportional costs.
  • 43. Reduced Investments and Proportional Costs 5/6/201445  The Elimination or minimization of up-front financial commitments allows enterprises to start small and accordingly increase IT resource allocation as required. Moreover, the reduction of up-front capital expenses allows for the capital to be redirected to the core business investment.  IT professionals, and network bandwidth can be obtained at lower costs, resulting in both
  • 44. Reduced Investments and Proportional Costs 5/6/201446  Common measurable benefits to cloud consumers include:  On-demand access to pay-as-you-go computing resources on a short-term basis (such as processors by the hour), and the ability to release these computing resources when they are no longer needed.  The perception of having unlimited computing resources that are available on demand, thereby reducing the need to prepare for provisioning.  The ability to add or remove IT resources at a fine-grained level, such as modifying available storage disk space by single gigabyte increments.  Abstraction of the infrastructure so applications are not locked into devices or locations and can be easily moved if needed.
  • 45. Increased Scalability 5/6/201447  A simple example of usage demand fluctuations throughout a 24 hour period is provided in Figure 3.8. Figure 1.8 An example of an organization’s changing demand for an IT resource over the course of a day.
  • 46. Increased Availability and Reliability 5/6/201448  The availability and reliability of IT resources are directly associated with tangible business benefits.  A hallmark of the typical cloud environment is its intrinsic ability to provide extensive support for increasing the availability of a cloud-based IT resource to minimize or even eliminate outages, and for increasing its reliability so as to minimize the impact of runtime failure conditions.
  • 47. Increased Availability and Reliability 5/6/201449 Specifically:  An IT resource with increased availability is accessible for longer periods of time (for example, 22 hours out of a 24 hour day). Cloud providers generally offer resilient” IT resources for which they are able to guarantee high levels of availability.  An IT resource with increased reliability is able to better avoid and recover from exception conditions.The modular architecture of cloud environments provides extensive failover support that increases reliability.
  • 49. Risks and Challenges 5/6/201451  Increased SecurityVulnerabilities  Reduced Operational Governance Control  Limited Portability Between Cloud Providers  Multi-Regional Compliance and Legal Issue
  • 50. Increased Security Vulnerabilities 5/6/201452  The moving of business data to the cloud means that the responsibility over data security becomes shared with the cloud provider.The remote usage of IT resources requires an expansion of trust boundaries by the cloud consumer to include the external cloud.
  • 52. Consider the following examples: 5/6/201454  An unreliable cloud provider may not maintain the guarantees it makes in the SLAs that were published for its cloud services.This can jeopardize the quality of the cloud consumer solutions that rely on these cloud services.  Longer geographic distances between the cloud consumer and cloud provider can require additional network hops that introduce fluctuating latency and potential bandwidth constraints.
  • 54. Figure 1.10 An unreliable network connection compromises the quality of communication between cloud consumer and cloud provider environments. 5/6/201456
  • 55. Limited Portability Between Cloud Providers 5/6/201457  Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly proprietary to various extents. For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be challenging to move from one cloud provider to another.  Portability is a measure used to determine the impact of moving cloud consumer IT resources and data between clouds
  • 56. Figure 1.11 A cloud consumer’s application has a decreased level of portability when assessing a potential migration from CloudA to Cloud B, because the cloud provider of Cloud B does not support the same security technologies as CloudA. 5/6/201458
  • 57. Multi-Regional Compliance and Legal Issues 5/6/201459  Third-party cloud providers will frequently establish data centers in affordable or convenient geographical locations. Cloud consumers will often not be aware of the physical location of their IT resources and data when hosted by public clouds.  For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies.  For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom.
  • 58. Legal Issues 5/6/201460  Another potential legal issue pertains to the accessibility and disclosure of data.  Countries have laws that require some types of data to be disclosed to certain government agencies or to the subject of the data.  For example, a European cloud consumer’s data that is located in the U.S. can be more easily accessed by government agencies (due to the U.S. PatriotAct) when compared to data located in many European Union countries.