Paul Knific & Eric Knific Epic Technology Solutions LLC.

bloatdecorumSoftware and s/w Development

Oct 30, 2013 (3 years and 7 months ago)

68 views

Paul
Knific

& Eric
Knific

Epic Technology Solutions LLC.

www.ETShost.com


http://www.youtube.com/watch?v=6PNuQHUiV3Q


Business Definition:


The term "cloud", as used in the context of cloud
computing, is defined as a system connected and
virtualized by computers that are designed to
provide as one or more unified computing
resources dependent upon service
-
level
agreements between providers and consumers
(
Buyya
, 2009).



www.epictechnologysolutions.com

Image Copyright
Benajmin

P.
Griner
, Philip J. Butler Under CC0 License

www.epictechnologysolutions.com


Grid Computing or distributed Computing


Virtualization
-
Virtual machine running on a
grid


Virtualization is an enabler for cloud
computing

www.epictechnologysolutions.com


Low barrier to use


Pick up and go


Fifth utility


Low cost to entry


Reliable


www.epictechnologysolutions.com



Split up servers into many virtual servers.


Security Management


Modularity/Application boundaries


Rapid development/deployment


Scalable (purchased resources on demand)


Cost savings (energy, equipment usage, staff)



www.epictechnologysolutions.com


Software as a Service (
SaaS
)



Salesforce.com


Platform as a Service (
PaaS
)


Private Cloud/App Development Environment


Infrastructure as a Service (
IaaS
)


Cloud Storage Cluster


www.epictechnologysolutions.com


Public Cloud (SAAS)

Google Apps, Microsoft 365,
Salesforce


Third Party Managed


Multi Tenant


Private Cloud (PAAS)

Custom in house applications, Thin clients


Single Tenant


More Secure*


Customizable


Hybrid Cloud


Mix of private/public


www.epictechnologysolutions.com

www.epictechnologysolutions.com

Public Clouds

Private Clouds


Pay

Per Use Model


D敤ecat敤

Ha牤ra牥


Shared Hardware


Mo牥 S散u牥*


Self Managed


P物癡t攠乥瑷o牫s


SLA



Depends on application.

www.epictechnologysolutions.com

Public Cloud

Private Cloud


Short Lifecycle Application


Com灬iance P剉, HIPPA, an搠
SOX


Development Applications


En瑥牰物s攠Sof瑷a牥


乯n C物tic慬


Singl攠呥Tant


W敢e2.0 A灰p


乥敤N P物癡瑥 乥瑷o牫



剥sou牣攠Int敮si癥


Google Apps Premier Edition/ MS Exchange
and Office alternative


$50/ user


Email


Google Docs



24/7 support


Leverage Cost Savings and Accessibility

www.epictechnologysolutions.com


Salesforce.com


Forecasting, Data Management, CRM


Customizable for businesses


MORE..



Amazon EC2


PaaS

Based


As low as Pennies per minute


Virtual Appliances/Rapid Provisioning

www.epictechnologysolutions.com


SLA Google Apps Premier Edition, Amazon
EC2, and SalesForce.com


www.epictechnologysolutions.com


Liability falls on the provider to secure the
network infrastructure with most public
clouds


Liability falls on your administrator to
secure the network on most private clouds.


Client security is an issue.

www.epictechnologysolutions.com


Google's terms of service say that Google is
not responsible for security or data integrity
(Blumenthal, 2010). If a criminal does break
in and wipes out a companies data stored in
the Google cloud Google is not at fault.
Recent Chinese attacks on Gmail exacerbate
security concerns for cloud computing
(Blumenthal, 2010).

www.epictechnologysolutions.com


Last mile issues


Broadband Stimulus AARA


Increased network demand


Latency


U
ptime


Push to wireless technology


SLA concerns

www.epictechnologysolutions.com


Applications


Security


Resiliency


Corporate philosophy


Support


Managed services required


SLA?

www.epictechnologysolutions.com

www.epictechnologysolutions.com

www.epictechnologysolutions.com

Citrix

Xenserver

QEMU
-
KVM

Hyper
-
V (Azure*)

XenSource


Free and Enterprise

Versions


FOSS


Available on any
Win摯ws ㈰〸刲
Server


FOSS


Unified

Console


Common

API


MMC⁃onsole


Common API


Hardware

Virtualization


䡡r摷are

Virtualization


䡡r摷are

Virtualization


So晴ware
Virtualization


Easy Desktop
Virtualization


Plethora

o映呯ols


Easy

Install an搠
Usage


Plethora

o映呯ols


Citrix

Support and
Application Integration


API

an搠Custom
A灰pication Frien摬y


Integrates

with most
灲ovi摥d win摯ws
tools


API and Custom
Application Friendly


剥搠䡡t 䉡sed

(Linux)
Custom OS


All

Linux &⁕nix


Win摯ws

Pro灲ietary


All Linux &⁕nix

-
Strict

䡡r摷are
剥煵irements

-
䡡r摥r

to A摭inister

-
䡩t

an搠Miss
Per景rmance an搠
Su灰prt Outsi摥 o映
Windows

-
Performance

Concerns

www.epictechnologysolutions.com


Read on: These works helped contribute to the ideas expressed in this presentation.


Adamov
, A.,
Erguvan
, M. (2009, October 14
-
16) The Truth About Cloud Computing as New Paradigm in IT.
Application of Information and Communication Technologies
, 2009. 1
-
3. Retrieved June 3, 2010, from
http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=&arnumber=5372585&queryText%3Dtruth+about+cloud
+computing%26openedRefinem ents%3D*%26searchField%3DSearch+All


Armbrust
, M. (2009). Above the Clouds: A Berkeley View of Cloud Computing.
UC Berkeley Reliable Adaptive
Distributed Systems Laboratory
, 1
-
23. Retrieved May 20, 2009, from
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS
-
2009
-
28.pdf


Bennet
, S;
Bhuller
, M.; Covington, R.(2009)
Architectural Strategies for Cloud Computing,

Oracle White Paper in
Enterprise. Retrieved June 8, 2010, from
http://www.oracle.com/technology/architect/entarch/pdf/architectural_strategies_for_cloud_computing.pdf


Blumenthal, M.S. (2010 March 29) Hide and Seek in the Cloud
IEEE Security & Privacy
, 57
-
58


Buyya
, R. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing
as the 5th utility.
Future Generation Computer Systems
, 25, 599
-
616. Retrieved May 21, 2009, from
http://www.sciencedirect.com/science?_ob=MImg&_imagekey=B6V06
-
4V47C7R
-
1
-
13&_cdi=5638&_user=1317309&_pii=S0167739X08001957&_orig=search&_coverDate=06%2F30%2F2009&_sk
=999749993&view=c&wchp=dGLzVtb
-
zSkWA&md5=0ee75d0449c7ef00342ad6a43ef4eb5f&ie=/sdarticle.pdf


Carr, N. (2008).
The Big Switch
. London: W. W. Norton & Company, Inc.


Dube
, P.; Zhen, L.;
Sahu
, S.; Silber, J.; "Last mile problem in overlay design,"
Global Telecommunications
Conference, 2005.


2, 628. Retrieved June 02, 2010.


Fan, M; Kumar, S;
Whinston
, A(2009) Short
-
term and long
-
term competition between providers of shrink
-
wrap
software and software as a service,
European Journal of Operational Research
. 2009, 196, 661
-
671. Retrieved
on June 5, 2010, from http://www.sciencedirect.com/science/article/B6VCT
-
4SCDB1B
-
1/2/961043722d3166704a3384871421ef56

www.epictechnologysolutions.com


Google (2010 a). Retrieved June 8, 2010, from
http://www.google.com/apps/intl/en/business/


Google (2010 b). Retrieved June 8, 2010, from
http://www.google.com/apps/intl/en/business/messaging_value.html Google 2010


Google (2010 c). Retrieved June 8, 2010, from
http://www.google.com/apps/intl/en/business/infrastructure_security.html


Hawthorne, N. (2009). Finding Security in the Cloud.
Computer Fraud &Security
, 10, 19
-
20. Retrieved May 28, 2010, from
http://www.sciencedirect.com.huaryu.kl.oakland.edu/science?_ob=ArticleURL&_udi=B6VNT
-
4XMCXV1
-
D&_user=1317309&_coverDate=10%2F31%2F2009&_alid=1352121463&_rdoc=4&_fmt=high&_orig=search&_cdi=6187&_docanchor=&v
iew=c&_ct=1125&_acct=C000052319&_version=1&_urlVersion=0&_userid=1317309&md5=a79b147b2797854b0e66232087618ca7


Kim, W. (2009). Cloud computing: "today and tomorrow".
Journal of Object Technology
, vol. 8, no. 1, 65
-
72. Retrieved February, 2009,
from
http://www.jot.fm/issues/issue_2009_01/column4/


Jamal, M.;
Quadeer
, A.;
Mahmood
, W.;
Waheed
, A; Ding, J.(2009). Virtual Machine Scalability on
MultiCore

Processors Based Servers for
Cloud Computing Workloads.
IEEE International Conference,
80
-
95.


Maggiani
, R. (2009) Cloud Computing is Changing How We Communicate.
IPCC 2009. IEEE International Professional Communication
Conference
, 1
-
4, Retrieved June 4, 2010.


Miyamoto, T; Hayashi, M.; Tanaka, H.(2009). Customizing Network Functions for High Performance Cloud
Computing
,Network

Computing
and Application
. 2009, 130
-
133. Retrieved June2, 2010, from
http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=&arnumber=5190363&queryText%3D%28Authors%3Amiyamoto%29%26searchWith
in%3Dcustomizing+network %26openedRefinements%3D*%26matchBoolean%3Dtrue%26searchField%3DSearch+All


Salesforce.com (2010 a). Retrieved June 12, 2010, from:
https://trust.salesforce.com/trust/security/


Simonite
, T (2010) Computing with Secrets, but
KEeping

them Safe. Retrieved June 17, 2010 from
http://www.technologyreview.com/computing/25537/


Zhu, J. (2009).
Ibm

cloud computing powering a smarter planet.
Lecture notes In Computer Science, 5931
, 621
-
625. Retrieved May 23,
2009, from
http://www.springerlink.com.huaryu.kl.oakland.edu/content/y00t752rg5449575/fulltext.pdf


Strickland, Jonathan.


"How Grid Computing Works"


25 April 2008.


HowStuffWorks.com.
<http://communication.howstuffworks.com/grid
-
computing.htm>

24 June 2011.


www.epictechnologysolutions.com