SlideShare une entreprise Scribd logo
1  sur  44
How to Get Cloud Architecture
and Design Right the First Time




     David S. Linthicum
     Blue Mountain Labs
david@bluemountainlabs.com
Abstract



So, what are the proper ways to design, build, and leverage cloud
computing systems? What are the steps to success? What are the
emerging best practices? How does SOA fit in? In this session we’ll
answer these questions, and more, covering the right and wrong ways
to leverage, design, and build cloud-based systems and infrastructure.
Going beyond the hype, this includes advice from those currently in the
trenches who make cloud computing work for the Global 2000 and
government. The audience is anyone who will soon fight to make cloud
computing work for their clients, employers, and/or investors, and need
to knock it out of the park the first time.
Where To Find Out More




 Slides available:

 Bonus Content: How to architect a hybrid cloud computing solution.
Where to find me.

•   @DavidLinthicum
•   david@bluemountainlabs.com
•   www.bluemountainlabs.com
•   www.davidlinthicum.com
•   http://www.linkedin.com/in/davidlinthicum



•   Grab a card after the presentation.
Geek Level for this Presentation




 Your Grandparents that            Systems Programmer and
are Still Using AOL Dialup             Dungeon Master
Why You Should Care
Most Cloud-Based Systems are Lacking Architecture
Thus, many clouds are not meeting expectations.
The results:

•   Inefficient utilization of resources.
•   Resource saturation.
•   Lack of elasticity and scalability.
•   Lack of security and governance.
•   Frequent outages.
•   Bad or no tenant management.
•   Other very bad things.
Common Mistakes

•   Not understanding how to make architectures scale.
•   Not dealing with tenant management issues.
•   Not understanding that security is systemic.
•   Not understanding the proper use of services.
•   Tossing technology at the problem.
•   Listening to the wrong people.
•   Managing-by-magazine.
The Multitenant Thing

• No two multitenant
  architectures are alike.
• Needs to be effective in the
  context of the problem.
• Needs to leverage best
  architecture practices.
• Needs to practice isolation
  and protection.

    “With a multitenant architecture, a software application is
    designed to virtually partition its data and configuration so
    that each client organization works with a customized virtual
    application instance.”
                                        Source: Wikipedia
You have some choices




Source: http://vikashazrati.wordpress.com/2008/06/23/multi-tenancy-explained/
ABCs of Multitenancy




  Amazon Machine Images
                          Source: Steve Bobrowski
Virtualization is Not Always a Requirement
Types of Cloud Architecture Patterns Emerging

•   Migration to a Cloud
    •   Business Systems
    •   Infrastructure
                                     Complexity
• Building on a Cloud (PaaS)
• Building a Hybrid Cloud
• Building a Cloud
    •   IaaS
    •   SaaS
    •   PaaS
General Architecture Patterns to Follow
Enterprise Vulnerabilities Assess your Risks


  1.  Governance
  2. Regulatory Compliance
  3. Security & Identity Management




                                             • RISK TO ORGANIZATION
  4. Business Continuity
                                                                                      2
  5. Process and Services                                                 1

  6. Data Management                                                              4
                                                                      9                    3
  7. System Integration                                                       6
                                                                                      5
  8. Resource Skills & Knowledge                                                               7

  9. Application Readiness                                                        8
                                                                                          10
  10. Network Readiness
                                             COMPLEXITY OF MITIGATING RISK




                  Assess your vulnerabilities and mitigate your risks.
                                                                                                   •
Architecture Roadmap             Where to begin

                                Build a solid foundation:
                                • Determine business drivers
                                • Understand: data, services, business
                                  processes and system integration points
                                • Design a “cloud-friendly” enterprise
                                  architecture roadmap that leverages
                                  Services Oriented Architecture (SOA)
                                • Determine an integration strategy for
                                  internal and external systems
                                • Outline a migration path for legacy systems
                                  to the new architecture




       Leverage SOA to build a sturdy and agile foundation for the Cloud
                                                                                •
“as-is”
“to be”
deploy
General Rules and Guidelines

•   Focus on the primitives.
    •   The best clouds are sets of low level services that can
        be configured.
         • Data services
         • Transaction services
         • Utility services

• Leverage distributed components that are centrally
  controlled.
• Build for tenants, not users.
• Don’t lean too much on virtualization.
• Security and governance are systemic.
Use Case: General Business System
Migration to the Cloud
The General Idea

• Break the system down to it’s component parts,
  understanding each part.
• Rethink the database, it’s typically a mess.
• Rethink the system as sets of services/API, watch the
  granularity.
    •   Data services, transaction services, utility services
• Create a security and governance plan.
• Consider the user interfaces.
• Consider device interfaces.
• Migrate only the components to the cloud that will
  provide the best value.
Good New/Bad News

•   Good News:
    •   Most cloud platforms provide the tenant management
        features for you.
    •   Most cloud platforms manage the resources for you.
    •   The cloud platforms are getting better.
•   Bad News:
    •   Security is still your problem.
    •   Application and service design is still your problem.
    •   Testing can be a hassle.
Reference Architecture


                                                        Monitoring and Management
 Management & Service Governance




                                   Process Management
                                                            Rules Management         Composites/Portals
       Security & Identity




                                         (BPMS)

                                                          Transactional Services




                                                         Data Services/Abstraction



                                                                   Data
Create the Information
                    Model




 Legacy                                           Ontologies
  Legacy                                           Ontologies
Metadata                 Understand Ontologies
 Metadata




                                                    Data
                                                       Data
                                                  Dictionary
External                                           Dictionary
 External                                              &
Metadata                  Understand the Data            &
 Metadata                                         Metadata
 (B2B)                                             Metadata
  (B2B)




                                                    Data
                                                     Data
                                                   Catalog
                                                    Catalog
                            Catalog the Data




                                                  Information
                                                    Information
                                                     Model
                                                       Model
                        Build Information Model
Reference Architecture




                         Data Services/Abstraction



                                   Data
Create a Service Model




 Data                                                  Candidate
  Data                                                  Candidate
Catalog                                                 Services
 Catalog                      Understand Services        Services




                                                         Services
                                                           Services
                                                           And
Information                                                  And
                                                       Information
  Information
   Model
     Model
                             Information to Services     Information




                                                        Service
                                                         Service
                                                        Model
                                                          Model
                               Build Service Model
Reference Architecture




                          Transactional Services




                         Data Services/Abstraction



                                   Data
On Premises




              Cloud Provider




                   December 17, 2010 DRAFT Page 31
On Premises




              Cloud Provider




                   December 17, 2010 DRAFT Page 32
Create a Process Model




 Data                                                 Candidate
  Data                                                 Candidate
Catalog                                               Processes
 Catalog                     Understand Processes      Processes




                                                       Services
                                                        Services
                                                             to
Information                                                    to
  Information                                         Processes
   Model
     Model
                              Services to Processes    Processes




                                                       Process
                                                        Process
                                                        Model
                                                         Model
 Service                      Build Process Model
  Service
 Model
   Model
Reference Architecture




        Process Management
                                Rules Management         Composites/Portals
              (BPMS)

                              Transactional Services




                             Data Services/Abstraction



                                       Data
On Premises    Cloud Provider

              December 17, 2010 DRAFT Page 35
Create a Governance Model




Process                                              Defined
 Process                                              Defined
 Model                                               Policies
  Model                           Define Policies     Policies




                                                      Policy
                                                       Policy
                                                     Designs
Information                                           Designs
  Information
   Model
     Model
                                  Design Policies




                                                     Governance
                                                      Governance
                                                       Model
                                                         Model

 Service                        Implement Policies
  Service
 Model
   Model
Reference Architecture


                                                        Monitoring and Management
 Management & Service Governance




                                   Process Management
                                                            Rules Management         Composites/Portals
       Security & Identity




                                         (BPMS)

                                                          Transactional Services




                                                         Data Services/Abstraction



                                                                   Data
Policies


              Policies




      Runtime
     Governance
                                Monitoring

Repository               Logs

                                  December 17, 2010 DRAFT Page 38
Test SOA using Cloud
                    Architecture




Process                                              Test
 Process                                              Test
 Model                                               Plan
  Model                        Create Test Plan       Plan




                                                   Black Box
                                                    Black Box
                                                    Testing
Information                                           Testing
  Information                                       Results
   Model
     Model
                               Black Box Testing      Results




                                                   White Box
                                                    White Box
                                                    Testing
                                                     Testing
                                                    Results
 Service                      White Box Testing      Results
  Service
 Model
   Model




Governance
 Governance
  Model
    Model
Assigning Candidate Data,
                    Services, and
               Processes for the Clouds




                                                            Process
Candidate                                                     Process
                                                          Assignments
 Candidate
Processes                   Analyze Candidate Processes
                                                           Assignments
 Processes




                                                            Service
                                                              Service
                                                          Assignments
                                                           Assignments
Candidate
 Candidate                   Analyze Candidate Services
 Services
  Services




                                                              Data
                                                               Data
                                                          Assignments
                                                           Assignments

  Data                         Analyze Candidate Data
    Data
Dictionary
 Dictionary
   and
     and
Metadata
  Metadata




Governance
 Governance
  Model
    Model
Select Platforms and Deploy
                Processes, Services, and Data
                        to Platforms.



                                                           Candidate
                                                            Candidate
                                                           Platforms
  Process                      List Candidate Platforms     Platforms
    Process
Assignments
 Assignments




                                                             Test
                                                               Test
                                                            Results
  Service                                                    Results
     Service
Assignments                         Analyze and Test
  Assignments
                                   Candidate Platforms




                                                            Target
                                                              Target
                                                           Platforms
    Data                                                     Platforms
      Data
Assignments
  Assignments                    Select Target Platforms




                                       Deploy to
                                    Target Platforms
Stepping to the Clouds
Q&A
The shift to Cloud

  We are leading the conversation
   with thought leadership and
      cutting edge services.




    #1                    #1                     #1
   best selling         Most read      Most listened to Podcast on
    book on              blog on       Cloud Computing with over
Cloud Computing      Cloud Computing         10,000 listeners

Contenu connexe

Tendances

Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity ManagementWSO2
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataPistoia Alliance
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Vignesh Ganesan I Microsoft MVP
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanCA API Management
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10stavvmc
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Microsoft Österreich
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAIvivekjv
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAndres Canello
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services OlivierMichot
 

Tendances (20)

Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpan
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis Abstract
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
ISE_Pub
ISE_PubISE_Pub
ISE_Pub
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 

En vedette

Windows azure learning poster
Windows azure learning posterWindows azure learning poster
Windows azure learning posterMahmoud Moussa
 
Cloud Design Pattern part1
Cloud Design Pattern part1Cloud Design Pattern part1
Cloud Design Pattern part1Masashi Narumoto
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld
 
Linthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-serviceLinthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-serviceDavid Linthicum
 
Cloud Design Pattern part2
Cloud Design Pattern part2Cloud Design Pattern part2
Cloud Design Pattern part2Masashi Narumoto
 
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesHyTrust
 
人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)Keiichi Hashimoto
 
Servcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design PatternServcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design PatternTakekazu Omi
 
CMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORTCMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORTSandyarathi Das
 
How to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditSecurityMetrics
 
Ten^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsTen^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsShlomo Swidler
 
Microservices and Azure App Services
Microservices and Azure App ServicesMicroservices and Azure App Services
Microservices and Azure App ServicesDamir Dobric
 
Distributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud FoundryDistributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud FoundryDerek Collison
 
Towards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryTowards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryIT Expert Club
 
Simplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationSimplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationYan Cui
 
Domain Driven Design và Event Driven Architecture
Domain Driven Design và Event Driven Architecture Domain Driven Design và Event Driven Architecture
Domain Driven Design và Event Driven Architecture IT Expert Club
 
Cloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectiveCloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectivePooyan Jamshidi
 

En vedette (20)

Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Windows azure learning poster
Windows azure learning posterWindows azure learning poster
Windows azure learning poster
 
Cloud Design Pattern part1
Cloud Design Pattern part1Cloud Design Pattern part1
Cloud Design Pattern part1
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
Linthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-serviceLinthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-service
 
Cloud Design Pattern part2
Cloud Design Pattern part2Cloud Design Pattern part2
Cloud Design Pattern part2
 
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
 
人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)
 
Servcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design PatternServcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design Pattern
 
CMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORTCMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORT
 
How to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS Audit
 
Forecast 2014: Cloud-Aware Applications
Forecast 2014: Cloud-Aware Applications Forecast 2014: Cloud-Aware Applications
Forecast 2014: Cloud-Aware Applications
 
MicroServices on Azure
MicroServices on AzureMicroServices on Azure
MicroServices on Azure
 
Ten^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsTen^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design Patterns
 
Microservices and Azure App Services
Microservices and Azure App ServicesMicroservices and Azure App Services
Microservices and Azure App Services
 
Distributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud FoundryDistributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud Foundry
 
Towards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryTowards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI Story
 
Simplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationSimplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern Automation
 
Domain Driven Design và Event Driven Architecture
Domain Driven Design và Event Driven Architecture Domain Driven Design và Event Driven Architecture
Domain Driven Design và Event Driven Architecture
 
Cloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectiveCloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural Perspective
 

Similaire à Getting Cloud Architecture Right the First Time Ver 2

How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012David Linthicum
 
Redefining cloud computing again linthicum with bonus
Redefining cloud computing again linthicum with bonusRedefining cloud computing again linthicum with bonus
Redefining cloud computing again linthicum with bonusDavid Linthicum
 
New integration approach in a cloud computing world
New integration approach in a cloud computing worldNew integration approach in a cloud computing world
New integration approach in a cloud computing worldDavid Linthicum
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510
Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510
Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510David Linthicum
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 
Capacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldCapacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldDavid Linthicum
 
How to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First TimeHow to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First TimeDavid Linthicum
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
 
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...Igor De Souza
 
Microservices Patterns with GoldenGate
Microservices Patterns with GoldenGateMicroservices Patterns with GoldenGate
Microservices Patterns with GoldenGateJeffrey T. Pollock
 
Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10David Linthicum
 
#dbhouseparty - Should I be building Microservices?
#dbhouseparty - Should I be building Microservices?#dbhouseparty - Should I be building Microservices?
#dbhouseparty - Should I be building Microservices?Tammy Bednar
 
All Grown Up: Maturation of Analytics in the Cloud
All Grown Up: Maturation of Analytics in the CloudAll Grown Up: Maturation of Analytics in the Cloud
All Grown Up: Maturation of Analytics in the CloudInside Analysis
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsGovind Maheswaran
 
Technically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters CollaborationTechnically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters CollaborationInside Analysis
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben KepesIntergen
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureBob Rhubart
 
Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Alan Quayle
 

Similaire à Getting Cloud Architecture Right the First Time Ver 2 (20)

How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012
 
Redefining cloud computing again linthicum with bonus
Redefining cloud computing again linthicum with bonusRedefining cloud computing again linthicum with bonus
Redefining cloud computing again linthicum with bonus
 
New integration approach in a cloud computing world
New integration approach in a cloud computing worldNew integration approach in a cloud computing world
New integration approach in a cloud computing world
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510
Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510
Why Soa Governance Is Critical To Cloud Computing David Linthicum 022510
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
Capacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing WorldCapacity Management in a Cloud Computing World
Capacity Management in a Cloud Computing World
 
How to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First TimeHow to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First Time
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
 
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
 
Microservices Patterns with GoldenGate
Microservices Patterns with GoldenGateMicroservices Patterns with GoldenGate
Microservices Patterns with GoldenGate
 
Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10Cloud Computing And Soa Convergence Linthicum 02 09 10
Cloud Computing And Soa Convergence Linthicum 02 09 10
 
#dbhouseparty - Should I be building Microservices?
#dbhouseparty - Should I be building Microservices?#dbhouseparty - Should I be building Microservices?
#dbhouseparty - Should I be building Microservices?
 
All Grown Up: Maturation of Analytics in the Cloud
All Grown Up: Maturation of Analytics in the CloudAll Grown Up: Maturation of Analytics in the Cloud
All Grown Up: Maturation of Analytics in the Cloud
 
Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Technically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters CollaborationTechnically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters Collaboration
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben Kepes
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1
 

Plus de David Linthicum

Mashing Up DevOps with Cloud Computing
Mashing Up DevOps with Cloud ComputingMashing Up DevOps with Cloud Computing
Mashing Up DevOps with Cloud ComputingDavid Linthicum
 
Accelerating government agility with cloud computing v1
Accelerating government agility with cloud computing v1Accelerating government agility with cloud computing v1
Accelerating government agility with cloud computing v1David Linthicum
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013David Linthicum
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
Calculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicumCalculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicumDavid Linthicum
 
Linthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platformsLinthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platformsDavid Linthicum
 
Linthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingLinthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingDavid Linthicum
 
Why Cloud Computing Projects Fail
Why Cloud Computing Projects Fail Why Cloud Computing Projects Fail
Why Cloud Computing Projects Fail David Linthicum
 
Getting an open systems cloud strategy right the first time linthicm
Getting an open systems cloud strategy right the first time linthicmGetting an open systems cloud strategy right the first time linthicm
Getting an open systems cloud strategy right the first time linthicmDavid Linthicum
 
Hybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesHybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesDavid Linthicum
 
Future of cloud computing linthicum 2
Future of cloud computing linthicum 2Future of cloud computing linthicum 2
Future of cloud computing linthicum 2David Linthicum
 
Future of cloud computing linthicum
Future of cloud computing linthicumFuture of cloud computing linthicum
Future of cloud computing linthicumDavid Linthicum
 
False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011David Linthicum
 
Getting the hybrid cloud right the first time
Getting the hybrid cloud right the first timeGetting the hybrid cloud right the first time
Getting the hybrid cloud right the first timeDavid Linthicum
 
Cloud Computing and DR Keynote DRJ Conf
Cloud Computing and DR Keynote DRJ Conf Cloud Computing and DR Keynote DRJ Conf
Cloud Computing and DR Keynote DRJ Conf David Linthicum
 
Finding the true value of cloud computing
Finding the true value of cloud computingFinding the true value of cloud computing
Finding the true value of cloud computingDavid Linthicum
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumDavid Linthicum
 
Cloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessCloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessDavid Linthicum
 
Defining The Value Of Integration
Defining The Value Of IntegrationDefining The Value Of Integration
Defining The Value Of IntegrationDavid Linthicum
 
Finding The Intersection Of Soa And Cloud Computing
Finding The Intersection Of Soa And Cloud ComputingFinding The Intersection Of Soa And Cloud Computing
Finding The Intersection Of Soa And Cloud ComputingDavid Linthicum
 

Plus de David Linthicum (20)

Mashing Up DevOps with Cloud Computing
Mashing Up DevOps with Cloud ComputingMashing Up DevOps with Cloud Computing
Mashing Up DevOps with Cloud Computing
 
Accelerating government agility with cloud computing v1
Accelerating government agility with cloud computing v1Accelerating government agility with cloud computing v1
Accelerating government agility with cloud computing v1
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Calculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicumCalculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicum
 
Linthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platformsLinthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platforms
 
Linthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingLinthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computing
 
Why Cloud Computing Projects Fail
Why Cloud Computing Projects Fail Why Cloud Computing Projects Fail
Why Cloud Computing Projects Fail
 
Getting an open systems cloud strategy right the first time linthicm
Getting an open systems cloud strategy right the first time linthicmGetting an open systems cloud strategy right the first time linthicm
Getting an open systems cloud strategy right the first time linthicm
 
Hybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesHybrid and Private Cloud Architectures
Hybrid and Private Cloud Architectures
 
Future of cloud computing linthicum 2
Future of cloud computing linthicum 2Future of cloud computing linthicum 2
Future of cloud computing linthicum 2
 
Future of cloud computing linthicum
Future of cloud computing linthicumFuture of cloud computing linthicum
Future of cloud computing linthicum
 
False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011
 
Getting the hybrid cloud right the first time
Getting the hybrid cloud right the first timeGetting the hybrid cloud right the first time
Getting the hybrid cloud right the first time
 
Cloud Computing and DR Keynote DRJ Conf
Cloud Computing and DR Keynote DRJ Conf Cloud Computing and DR Keynote DRJ Conf
Cloud Computing and DR Keynote DRJ Conf
 
Finding the true value of cloud computing
Finding the true value of cloud computingFinding the true value of cloud computing
Finding the true value of cloud computing
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicum
 
Cloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessCloud Computing Impact On Small Business
Cloud Computing Impact On Small Business
 
Defining The Value Of Integration
Defining The Value Of IntegrationDefining The Value Of Integration
Defining The Value Of Integration
 
Finding The Intersection Of Soa And Cloud Computing
Finding The Intersection Of Soa And Cloud ComputingFinding The Intersection Of Soa And Cloud Computing
Finding The Intersection Of Soa And Cloud Computing
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

Getting Cloud Architecture Right the First Time Ver 2

  • 1. How to Get Cloud Architecture and Design Right the First Time David S. Linthicum Blue Mountain Labs david@bluemountainlabs.com
  • 2. Abstract So, what are the proper ways to design, build, and leverage cloud computing systems? What are the steps to success? What are the emerging best practices? How does SOA fit in? In this session we’ll answer these questions, and more, covering the right and wrong ways to leverage, design, and build cloud-based systems and infrastructure. Going beyond the hype, this includes advice from those currently in the trenches who make cloud computing work for the Global 2000 and government. The audience is anyone who will soon fight to make cloud computing work for their clients, employers, and/or investors, and need to knock it out of the park the first time.
  • 3. Where To Find Out More Slides available: Bonus Content: How to architect a hybrid cloud computing solution.
  • 4. Where to find me. • @DavidLinthicum • david@bluemountainlabs.com • www.bluemountainlabs.com • www.davidlinthicum.com • http://www.linkedin.com/in/davidlinthicum • Grab a card after the presentation.
  • 5. Geek Level for this Presentation Your Grandparents that Systems Programmer and are Still Using AOL Dialup Dungeon Master
  • 7. Most Cloud-Based Systems are Lacking Architecture
  • 8. Thus, many clouds are not meeting expectations.
  • 9. The results: • Inefficient utilization of resources. • Resource saturation. • Lack of elasticity and scalability. • Lack of security and governance. • Frequent outages. • Bad or no tenant management. • Other very bad things.
  • 10. Common Mistakes • Not understanding how to make architectures scale. • Not dealing with tenant management issues. • Not understanding that security is systemic. • Not understanding the proper use of services. • Tossing technology at the problem. • Listening to the wrong people. • Managing-by-magazine.
  • 11. The Multitenant Thing • No two multitenant architectures are alike. • Needs to be effective in the context of the problem. • Needs to leverage best architecture practices. • Needs to practice isolation and protection. “With a multitenant architecture, a software application is designed to virtually partition its data and configuration so that each client organization works with a customized virtual application instance.” Source: Wikipedia
  • 12. You have some choices Source: http://vikashazrati.wordpress.com/2008/06/23/multi-tenancy-explained/
  • 13. ABCs of Multitenancy Amazon Machine Images Source: Steve Bobrowski
  • 14. Virtualization is Not Always a Requirement
  • 15. Types of Cloud Architecture Patterns Emerging • Migration to a Cloud • Business Systems • Infrastructure Complexity • Building on a Cloud (PaaS) • Building a Hybrid Cloud • Building a Cloud • IaaS • SaaS • PaaS
  • 17. Enterprise Vulnerabilities Assess your Risks 1. Governance 2. Regulatory Compliance 3. Security & Identity Management • RISK TO ORGANIZATION 4. Business Continuity 2 5. Process and Services 1 6. Data Management 4 9 3 7. System Integration 6 5 8. Resource Skills & Knowledge 7 9. Application Readiness 8 10 10. Network Readiness COMPLEXITY OF MITIGATING RISK Assess your vulnerabilities and mitigate your risks. •
  • 18. Architecture Roadmap Where to begin Build a solid foundation: • Determine business drivers • Understand: data, services, business processes and system integration points • Design a “cloud-friendly” enterprise architecture roadmap that leverages Services Oriented Architecture (SOA) • Determine an integration strategy for internal and external systems • Outline a migration path for legacy systems to the new architecture Leverage SOA to build a sturdy and agile foundation for the Cloud •
  • 22. General Rules and Guidelines • Focus on the primitives. • The best clouds are sets of low level services that can be configured. • Data services • Transaction services • Utility services • Leverage distributed components that are centrally controlled. • Build for tenants, not users. • Don’t lean too much on virtualization. • Security and governance are systemic.
  • 23. Use Case: General Business System Migration to the Cloud
  • 24. The General Idea • Break the system down to it’s component parts, understanding each part. • Rethink the database, it’s typically a mess. • Rethink the system as sets of services/API, watch the granularity. • Data services, transaction services, utility services • Create a security and governance plan. • Consider the user interfaces. • Consider device interfaces. • Migrate only the components to the cloud that will provide the best value.
  • 25. Good New/Bad News • Good News: • Most cloud platforms provide the tenant management features for you. • Most cloud platforms manage the resources for you. • The cloud platforms are getting better. • Bad News: • Security is still your problem. • Application and service design is still your problem. • Testing can be a hassle.
  • 26. Reference Architecture Monitoring and Management Management & Service Governance Process Management Rules Management Composites/Portals Security & Identity (BPMS) Transactional Services Data Services/Abstraction Data
  • 27. Create the Information Model Legacy Ontologies Legacy Ontologies Metadata Understand Ontologies Metadata Data Data Dictionary External Dictionary External & Metadata Understand the Data & Metadata Metadata (B2B) Metadata (B2B) Data Data Catalog Catalog Catalog the Data Information Information Model Model Build Information Model
  • 28. Reference Architecture Data Services/Abstraction Data
  • 29. Create a Service Model Data Candidate Data Candidate Catalog Services Catalog Understand Services Services Services Services And Information And Information Information Model Model Information to Services Information Service Service Model Model Build Service Model
  • 30. Reference Architecture Transactional Services Data Services/Abstraction Data
  • 31. On Premises Cloud Provider December 17, 2010 DRAFT Page 31
  • 32. On Premises Cloud Provider December 17, 2010 DRAFT Page 32
  • 33. Create a Process Model Data Candidate Data Candidate Catalog Processes Catalog Understand Processes Processes Services Services to Information to Information Processes Model Model Services to Processes Processes Process Process Model Model Service Build Process Model Service Model Model
  • 34. Reference Architecture Process Management Rules Management Composites/Portals (BPMS) Transactional Services Data Services/Abstraction Data
  • 35. On Premises Cloud Provider December 17, 2010 DRAFT Page 35
  • 36. Create a Governance Model Process Defined Process Defined Model Policies Model Define Policies Policies Policy Policy Designs Information Designs Information Model Model Design Policies Governance Governance Model Model Service Implement Policies Service Model Model
  • 37. Reference Architecture Monitoring and Management Management & Service Governance Process Management Rules Management Composites/Portals Security & Identity (BPMS) Transactional Services Data Services/Abstraction Data
  • 38. Policies Policies Runtime Governance Monitoring Repository Logs December 17, 2010 DRAFT Page 38
  • 39. Test SOA using Cloud Architecture Process Test Process Test Model Plan Model Create Test Plan Plan Black Box Black Box Testing Information Testing Information Results Model Model Black Box Testing Results White Box White Box Testing Testing Results Service White Box Testing Results Service Model Model Governance Governance Model Model
  • 40. Assigning Candidate Data, Services, and Processes for the Clouds Process Candidate Process Assignments Candidate Processes Analyze Candidate Processes Assignments Processes Service Service Assignments Assignments Candidate Candidate Analyze Candidate Services Services Services Data Data Assignments Assignments Data Analyze Candidate Data Data Dictionary Dictionary and and Metadata Metadata Governance Governance Model Model
  • 41. Select Platforms and Deploy Processes, Services, and Data to Platforms. Candidate Candidate Platforms Process List Candidate Platforms Platforms Process Assignments Assignments Test Test Results Service Results Service Assignments Analyze and Test Assignments Candidate Platforms Target Target Platforms Data Platforms Data Assignments Assignments Select Target Platforms Deploy to Target Platforms
  • 42. Stepping to the Clouds
  • 43. Q&A
  • 44. The shift to Cloud We are leading the conversation with thought leadership and cutting edge services. #1 #1 #1 best selling Most read Most listened to Podcast on book on blog on Cloud Computing with over Cloud Computing Cloud Computing 10,000 listeners

Notes de l'éditeur

  1. Thought leadership: Most read blog … Most listened to Podcast (10,000+ listeners) …