SlideShare une entreprise Scribd logo
1  sur  105
1

CLOUD TECHNOLOGY
BRIEF 2013 Q1
2

What is Cloud?
3

Cloud in Marketer’s Eyes
• It’s in the Internet – I can access it everywhere

• It’s easy to use – I don’t have to understand it

• It’s new – Everyone will love it

• It’s somehow better than non-cloud – Pay for cloud if you

have money
4

Cloud for Programmers
• Cloud is automated – I don’t need System Engineer

anymore
• Cloud is fast – Nothing is faster than the cloud

• Cloud is reliable – It’s high availability in itself without

changing my code
• Cloud is cheaper than any other solution – Buying server

only if you have more money
5

Cloud for System Engineer
• Cloud is automated – I don’t have to do hard work

anymore

• Cloud is reliable – Now I can sleep along the night

• Cloud is not fast – Speed comes with cost

• Cloud is not flexible – I cannot configure or tune them
6

Cloud for Manager A
• Cloud is cheap – I don’t have to hire System Engineer or

buy any hardware

• Cloud is flexible – I can buy anything in just minutes

• Cloud is reliable – They told me like this

• Business can be competitive with cloud
7

Cloud for Manager B
• Cloud is expensive – I pay the same price every year

• Cloud is service – I pay money and get nothing

• Cloud is unreliable – What if the cloud company bankrupt

• Why should I hire you if cloud is so good?
8

So what is Cloud?
• Cloud has different meaning depended on the role of

each person.
• Gartner defines cloud computing as a style of computing

in which scalable and elastic IT-enabled capabilities are
delivered as a service using Internet technologies.
9

BEHIND THE CLOUD
10

General Components of the Cloud
• Physical Server
• Physical or Virtual Storage
• Virtual Switch
• Physical Network Switch
• Hypervisor Software

• Cloud Management Software
11

General Components of the Cloud
Cloud Management
Software

Physical Network Switch

VMs

Virtual
Switch

Virtual
Storage

VMs

Virtual
Switch

Virtual
Storage

Hypervisor Software

Hypervisor Software

Physical Server

Physical Server
Physical Storage
12

Behind the Cloud: Case 1
– Just a service on the internet

My Web, My
Service

Internet

Same Cost,
Double Price,
More Marketing
13

Behind the Cloud: Case 2
– Service on the Cloud Hosting

My Web, My
Service
14

Behind the Cloud: Case 3
– Public Cloud Data Center (Service Provider)
15

Behind the Cloud: Case 3
– Public Cloud Data Center (Service Provider)
16

Behind the Cloud: Case 3
– Public Cloud Data Center (Service Provider)
17

Behind the Cloud: Case 4
– Private Cloud Data Center (Enterprise)
18

Cloud Data Center – Basic Design
19

Cloud Data Center – Basic Design
20

Cloud Data Center – Traditional Hardware
(Service Provider)
Front-end Nodes
Good CPU, Some RAM

High Performance
Nodes
Many CPUs, Many RAM

Management Nodes
Good CPUs, RAM

Storage Nodes
Basic CPU, RAM, Many
Disks
21

Cloud Data Center – Traditional Hardware
(Enterprise)
Cloud Controller
Hypervisor
Servers

SAN Storages
22

Cloud Data Center – Next-Generation
Hardware with Basic Design
Front-end Nodes
Good CPU, Some RAM

High Performance
Nodes
Many CPUs, Many RAM

Storage Nodes
Basic CPU, RAM, Many
Disks

Management Nodes
Good CPUs, RAM

2-8X Space Saving! 4-8X Cable Saving!
23

Cloud Data Center – Next-Generation
Hardware with Google-like Design
24

Cloud Data Center – Next-Generation
Hardware with Google-like Design
25

CLOUD FEATURES
26

(Some of) Cloud Features
Automation / Management

High Availability / Reliability

Performance / Scalability
Security
27

Automation / Management
• Configuration

Automation
• Add/remove new

instances
• Component
configuration
• Cluster configuration
• Billing
28

High Availability / Reliability
• HA at Hypervisor Layer
• HA at Application Layer
29

HA at Hypervisor Layer
30

HA at Application Layer
31

Performance / Scalability
• Load Balancer
• Scaling Automation
32

Load Balancer
33

Scaling Automation
34

Security
• In-cloud Security
• Firewall, IDS/IPS, Vulnerability Management
• Automated Security Audit
35

Cloud Feature Summary
• All features are options for any cloud system.
• Some cloud might have automation but have no reliability or
performance.
• Some cloud might have automation, reliability and performance but
have no security.

• Cloud with all those features are super expensive!
36

CLOUD SECURITY
37

Why Cloud Security?
38

Security Holes
•
•
•
•
•

Attack between hosts
Attack hypervisor
Management hijack
Rogue VMs
Rogue network
connections
• Etc.

Performance Issues
• Limited firewall
throughput
• Limited IPS throughput
• Only layer 3 visibility
• Expensive to scale
39

In-cloud Security
•
•
•
•
•

Layer 1 – 4 security
VM-aware security
Firewall, IPS, NAC
Netflow
Vulnerability
management

High Performance
• Scale-out with Hypervisors

Automated!!!
• Security policies follow
VMs
• Real-time compliance
40

Best Practice of Cloud Security (Example
from Catbird)
Zoning to support multiple
Host 1

Host 2

Host N

COI 1

COI 1

COI 1

VM

VM

security policies per COI

VM
VM

VM

VM
VM

VM

VM Introspection and VM
to VM controls
VM

Multi-function network
security: NAC, IDP, IVM …
COI 2

COI 2

COI 2

VM

VM

VM
VM

VM
VM

VM
VM

VM

Enforce least privilege,
implement incident response

Protect hypervisor and
infrastructure management, drive
compliance workflows
Data Center

Operations

Security

Management
41

Best Practice of Cloud Security (Example
from Catbird)
COI 1
VM
VM
VM

COI 2
VM
VM
VM

Secure user
access

COI 1

COI 1

VM
VM
VM

Secure admin
proxies

VM
VM
VM

COI 2

COI 2

VM
VM
VM

O&M admin
access

VM
VM
VM

ISMS admin
access

Protected by
tenant or COI

Data Center

Operations
Storage Layer

Security

Management
42

Best Practice of Cloud Security (Example
from Catbird)
Datacenter 1

Hybrid Cloud

Security

Physical

Analytics
Auth
Audit
CCC

Large regional bank:





2 data centers
B2B and customer portals in cloud
VMs may flow between data
centers
Security policy follows VMs

Datacenter 2
BCP/HA

Virtual
43

HYBRID CLOUD
44

Hybrid Redundant / Disaster Recovery
(DR) Cloud: Public Cloud + Private Cloud
45

Hybrid Redundant / Disaster Recovery
(DR) Cloud: Public Cloud + Private Cloud
46

Hybrid Function Cloud: Public Cloud +
Private Cloud
Finance System

CRM
47

Performance Scalable Cloud: Physical
Data Center + Cloud Data Center

10,000 concurrent users

100,000 concurrent users
48

Cloud Hubs and Cloud Intergrator

Finance

CRM

Cloud Hub /
Cloud Integrator

Project
Manage
ment
49

THE CONCEPT OF
SOFTWARE DEFINED …
50

Software Defined Anything
• System in the Past
• Install software on the server for service you need. Configure them
one by one with deep knowledge.
• System in the Present
• Install the complete appliance for each service. Configure on the
automated UI.
• System in the Future
• Install cloud appliance image or virtual appliance image on existing
cloud or virtualization infrastructure. Configure on the automated
UI.
• This applies to any service on the network.
51

Software Defined Networking
• Switches are virtualized to the cloud so there will be less required

hardware switches in the cloud infrastructure. Example of this concept
are Nicira and Vyetta.
Community
Of Interest

COI 1

COI N

VM

VM
VM

VM
VM

VM

COI 2

COI …

VM

VM
VM

VM

VM

Virtual
switch

Hypervisor

VM
52

Software Defined Security
• Catbird provides firewall, IDS/IPS, Network Access Control,

Vulnerability Management and Real-time Audit to the Cloud.

Catbird Control
Center
Virtual Machine

Catbird Update
Service
•Signatures
•Defect checks

Catbird Virtual
Machine Appliances

Control
Center Web
Portal
53

Software Defined Data Center
• Nutanix is a hardware with embedded hypervisor and cloud storage.

You can have hypervisors, servers, storages, switches and
security in only one hardware with automation, high availability,
performance and security.
54

Software Defined ???
• WAN Optimizer?
• Load Balancer?
• VPN?
55

Summary
• Many old solutions will be ported to virtualization and

cloud.
56

VIRTUAL DESKTOP
INFRASTRUCTURE
57

What is VDI
• Virtual Desktop Infrastructure = VDI
• Virtual desktop infrastructure (VDI) is the practice of

hosting a desktop operating system within a virtual
machine (VM) running on a hosted, centralized or remote
server.
• From Wikipedia

• VDI = Desktop Virtualization!
58

Example 1 - Citrix XenDesktop
59

Example 2 - VMware View
60

Application Virtualization
• Virtual application delivery lets IT manage a single instance of each

application in an application hub in the datacenter. Applications are
then delivered via application streaming to Windows PCs for offline
use or run on high-powered servers in the datacenter for online use
on any device or operating system.
• From Citrix XenApp
61

Benefits of VDI Technology
• Cut the operation cost!
• Centralized management for desktop/application
• Dramatically reduce man-hours for maintenance, upgrade, install

applications
• Increase client security
• Daily patch management, upgrade anti-virus, centralized traffic for threat

prevention and monitoring, easy security policy enforcement
• Easy to audit

• Mobility to workforce!
• There is an option for remote to VDI from anywhere
• Flexible endpoint hardware!
• Mobile = Notebook / Netbook / Tablet
• Save cost = Old PC / Thin client / Linux
• High performance = New PC
62

Myths to VDI Technology
• VDI is cheaper than buying PCs / notebooks
• VDI has large cost on servers, storages, networking, VDI licenses
and Windows 7 licenses.
• VDI reduces operation cost, risk and increases flexibility on
deploying any new technology to end users.
• Thin client is the real one who saves the cost in short term! (Save
hardware and license cost)
• Thin client is as same as VDI
• Thin client is just a part of VDI that lacks of security, flexibility and
management features.
63

1. Thin Client Approach
VM Servers
Direct RDP

Client PC
/Thin Client
Virtual Desktops

SAN Storages
64

2. Secured Gateway Approach
VM Servers

Mobile Devices
RDP over HTTPS

Client PC
/Smart
Thin Client

RDP

Broker
with
Local User DB
Virtual Desktops

SAN Storages
65

3. Managed Approach
VM Servers

Mobile Devices
RDP over HTTPS

Client PC
/Smart
Thin Client

RDP

Broker
Virtual Desktops
Joined AD

MS AD

CIFS NAS
for AD

SAN Storages
66

4. Fully Managed Approach
Virtual Deskop
Manager
Mobile Devices RDP/ICA/PCoIP
over HTTPS

VM Servers

RDP
Broker

Client PC
/Smart
Thin Client

Thin/Fat and
Stateful/Stateless
Virtual Desktops
Joined AD
MS AD

CIFS NAS
for AD

SAN Storages
67

5. Fully Managed with Virtual Application
Approach
Virtual Deskop
Manager
Mobile Devices RDP/ICA/PCoIP
over HTTPS

VM Servers

RDP
Broker

Client PC
/Smart
Thin Client

Thin/Fat and
Stateful/Stateless
Virtual Desktops
Joined AD

SAN Storages

MS AD

Virtual Application Application Farm
Manager
CIFS NAS
for AD
68

6. Fully Managed with Remote Access
Approach
Virtual Deskop
Manager
Mobile Devices RDP/ICA/PCoIP
over HTTPS

VM Servers

RDP
Broker

Client PC
/Smart
Thin Client

Thin/Fat and
Stateful/Stateless
Virtual Desktops
Joined AD
SSL-VPN

SAN Storages

MS AD

RDP/ICA/PCoIP
over HTTPS
Virtual Application
Manager
Client PC Mobile Devices
/Smart
Thin Client

CIFS NAS
for AD

Application Farm
69

7. Fully Managed with VDI Security
Approach
Virtual Deskop
Manager
Mobile Devices RDP/ICA/PCoIP
over HTTPS

VM Servers

RDP
Broker

Client PC
/Smart
Thin Client

VDI Security
Thin/Fat and
Stateful/Stateless
Virtual Desktops
Joined AD

SSL-VPN

SAN Storages

MS AD

RDP/ICA/PCoIP
over HTTPS
Virtual Application
Manager
Client PC
/Smart
Thin Client

Mobile Devices

CIFS NAS
for AD

Application Farm
70

8. Fully Managed with Cloud Servers
Approach
Virtual Deskop
Manager
Mobile Devices RDP/ICA/PCoIP
over HTTPS

RDP
Broker

Client PC
/Smart
Thin Client

VDI Security
Thin/Fat and
Stateful/Stateless
Virtual Desktops
Joined AD

SSL-VPN

MS AD

RDP/ICA/PCoIP
over HTTPS

Client PC
/Smart
Thin Client

VM on Cloud Servers

Mobile Devices

CIFS NAS
for AD
71

DARK SIDE OF THE
CLOUD
72

Who Owns the Data?
• After hosting your business data on the cloud …
• How can you be so sure no one can see your data?
• After stop using the cloud …
• How can you be so sure your data is deleted?
• Data Deletion Certificate might be the answer to this

problem. Maybe.
73

What About Downtime?
• From cloud vendor’s marketing team, cloud has little

downtime.
• In reality, cloud has downtime.
• Data center issue
• Network issue
• Security issue
• Performance issue
• Human issue
• Right now, businesses that use cloud are recommended

to prepare for downtime in the cloud.
74

My Cloud’s Performance?
• Performance of the cloud depends on
• CPU (GHz + Core)
• Memory
• Disk Access (R/W IOPS + R/W Throughput)
• Network (Latency + Bandwidth)
• Other issues
• What if …
• Your CPU is shared
• Your disk access is shared
• Your network is shared
• And other cloud users use the cloud at the maximum performance

• Some software companies migrate from dedicate servers to cloud

services and then come back to build their own clouds / clusters. It’s
hard to guarantee the performance of cloud service.
75

Where is Security of My Cloud?
• Before cloud era, we have to tackle with the attack from

service-side and physical side
• Service-side: We protect our servers from attacks and vulnerabilities of

the services we use.
• Physical-side: We host our servers on the reliable and secure data
center. That’s all.
• Right now, we have to protect more
• Hypervisor-side: If someone attacks the hypervisor successful, the
cloud will be shut down. And we, the user of the cloud, cannot do
anything to protect it.
• Management-side: If someone can hack the management software,
then our servers will be in the hacker’s hands while we cannot help
protect them.
• Virtual Network-side: How can we know that our data and traffic aren’t
being sniffed? And we don’t have any permission to check it.
76

Upgrade? Migrate?
• What if we use PaaS to develop our products and one

day we want to change the cloud provider?
• Recode?

• What if we want to modify our own server image so we

can have the expected level of security and performance?
• Talk to cloud provider?

• Changing cloud provider takes many effort to do so. And

how do we know that the cloud provider we use will not be
bankrupted soon?
77

Cumulative Cost?
• Cloud = Pay every months for every years. Get nothing if

stop using cloud.
• Physical = Pay once and continue maintenance. The

hardware is still a company’s asset.
• In some case, for large size server, 2x 8 Core CPU with

128 – 768 GB Memory and large storage, the capital
expense is almost the same as using a cloud for 6 months
to 1 year.
78

What You Get?
• How can you know what kind of hardware do you get?
• CPU: Different model of CPUs can have different performance
even the GHz and No. of Cores are the same.
• RAM: How much frequency? Non-ECC RAM, ECC RAM or ECC
Registered RAM? UDIMM vs. RDIMM vd. LRDIMM?
• HDD: 5.4K RPM vs. 7K RPM vs. 10K RPM vs. 15K RPM?
Hardware RAID with Cache or Software RAID? No RAID vs. RAID
0 vs. RAID 1 vs. RAID 5 vs. RAID 10 vs. RAID 50 vs. RAID 60?
SAS vs. NL SAS vs. SATA? SAS vs. SAS2? SATA2 vs. SATA3?
• SSD: Different brand of SSDs have different Read/Write
performance and problems.
• Network: Jumbo Frame? TCP offload?
• Hypervisor: Different hypervisor have different performance and
security.
79

Build Your Own Cloud?
• Who provide the maintenance?
• Cloud is very easy to be managed. Anyone can manage cloud via
web or GUI.
• But when any problem occur, you have to use a team of skillful
system engineer to solve the problem as soon as possible because
the problem will effect many users on the cloud.
• Any problem occur on the cloud is harder to solve than on

the physical or old school design.
80

Summary
• You should understand all those risks of using cloud

before making your decision. And the risks are increased
everyday. Always update yourself.
81

EXAMPLE OF CLOUD
TECHNOLOGY
82

Nutanix
83

Nutanix

• Cost
• Complexity
• Performance
Bottleneck
SAN
84

Nutanix

Switch

Bottleneck
SAN

• Convergence of

compute and storage
• Google-like distributed
scalable infrastructure
• Enterprise-class data
management
85

Nutanix
86

Nutanix
Google-class Scalability
Grow-As-You-Go

• Distributed metadata

layer
• MapReduce
• No single point of
bottleneck
87

Nutanix
High Performance Data Tiering
Performance

Transparent Data Movement

Nutanix

• Performance of SSDs
SS
D

• Capacity (and cost) of

HDD

HD
D
Capacity
88

Nutanix
Primary Deduplication
Distributed Deduplication Engine

• SSDs for fast index lookups
• “True Deduplication”
• Detects byte shifts in files
• Inline or offline use
• Cluster-wide
Distributed Deduplication Engine
89

Nutanix
Configurable VM Behavior
SLA-driven Management

• IO prioritization
• Data

management
policies
• Dedup
• Fault tolerance
• Compression
• Encryption
• Tiering
90

Nutanix
Writeable Snapshots
NetApp-like. But More Scalable.
Gold Image/Production
Copy

Virtual Machines

• Rapid provisioning

• Converged

backups
• Shared cache
91

Nutanix
Converged Architecture Building Blocks
Grow As You Go!

VCE’s vBlock 300

Cisco/NetApp Dell’s vStart 50
“Baby” Cloud
FlexPod

Their Building Blocks

Our Building
Block
92

StorSimple
93

StorSimple
94

OnApp
95

OnApp

Deploy

Manage

Scale / Load Balance

Users

Billing

High Availability
96

Joyent

Solaris + KVM + Node.js +
NoSQL + etc.
97

Joyent
98

OpenStack
99

OpenStack
100

Box
101

ShoreTel Sky
102

ShoreTel Sky
103

Meraki
104

Meraki
105

Q&A

Contenu connexe

Tendances

VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”MarketingArrowECS_CZ
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Interoute
 
VMworld 2013: The Software Defined Datacenter Meets End User Computing
VMworld 2013: The Software Defined Datacenter Meets End User Computing VMworld 2013: The Software Defined Datacenter Meets End User Computing
VMworld 2013: The Software Defined Datacenter Meets End User Computing VMworld
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...Majid Hajibaba
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
RightScale: Single Pane of Glass at Computerworld 2013
RightScale:  Single Pane of Glass at Computerworld 2013RightScale:  Single Pane of Glass at Computerworld 2013
RightScale: Single Pane of Glass at Computerworld 2013RightScale
 
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and FutureOpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and FutureMichael Fork
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesOpenStack_Online
 
VMworld 2013: Real-world Deployment Scenarios for VMware NSX
VMworld 2013: Real-world Deployment Scenarios for VMware NSX VMworld 2013: Real-world Deployment Scenarios for VMware NSX
VMworld 2013: Real-world Deployment Scenarios for VMware NSX VMworld
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformBMC Software
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop RevolutionYankee Group
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04Avinaba Basu
 
IBM Private Modular Cloud
IBM Private Modular CloudIBM Private Modular Cloud
IBM Private Modular CloudHerb Hernandez
 
IBM SmartCloud Orchestration
IBM SmartCloud OrchestrationIBM SmartCloud Orchestration
IBM SmartCloud OrchestrationIBM Danmark
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015Eduserv
 

Tendances (20)

vm provisioning
vm provisioningvm provisioning
vm provisioning
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
 
VMworld 2013: The Software Defined Datacenter Meets End User Computing
VMworld 2013: The Software Defined Datacenter Meets End User Computing VMworld 2013: The Software Defined Datacenter Meets End User Computing
VMworld 2013: The Software Defined Datacenter Meets End User Computing
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
RightScale: Single Pane of Glass at Computerworld 2013
RightScale:  Single Pane of Glass at Computerworld 2013RightScale:  Single Pane of Glass at Computerworld 2013
RightScale: Single Pane of Glass at Computerworld 2013
 
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and FutureOpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
OpenStack Atlanta Summit - IBM, SoftLayer, and OpenStack: Present and Future
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack Services
 
VMworld 2013: Real-world Deployment Scenarios for VMware NSX
VMworld 2013: Real-world Deployment Scenarios for VMware NSX VMworld 2013: Real-world Deployment Scenarios for VMware NSX
VMworld 2013: Real-world Deployment Scenarios for VMware NSX
 
Cloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management PlatformCloud as a Service: A Powerful New Cloud Management Platform
Cloud as a Service: A Powerful New Cloud Management Platform
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 
Unit 2
Unit 2Unit 2
Unit 2
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
IBM Private Modular Cloud
IBM Private Modular CloudIBM Private Modular Cloud
IBM Private Modular Cloud
 
IBM SmartCloud Orchestration
IBM SmartCloud OrchestrationIBM SmartCloud Orchestration
IBM SmartCloud Orchestration
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015
 

En vedette

How to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for BeginnersHow to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for BeginnersAruj Thirawat
 
Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014Aruj Thirawat
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Aruj Thirawat
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsAruj Thirawat
 
Servers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - ThailandServers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - ThailandAruj Thirawat
 
Thailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet ThailandThailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet ThailandAruj Thirawat
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventAruj Thirawat
 
Occox by Demtech - le M2M en action
Occox by Demtech - le M2M en actionOccox by Demtech - le M2M en action
Occox by Demtech - le M2M en actionPascale Demartini
 
Saiba como fechar negócios vindos do casasapo
Saiba como fechar negócios vindos do casasapoSaiba como fechar negócios vindos do casasapo
Saiba como fechar negócios vindos do casasapoeGO Real Estate
 
Infografia 02 - Por qué debo hacer Parkour con Wayka Parkour
Infografia 02 - Por qué debo hacer Parkour con Wayka ParkourInfografia 02 - Por qué debo hacer Parkour con Wayka Parkour
Infografia 02 - Por qué debo hacer Parkour con Wayka ParkourWayka Parkour
 
Herramientas para comercio digital internacional
Herramientas para comercio digital internacionalHerramientas para comercio digital internacional
Herramientas para comercio digital internacionalJuande Marín
 
Dossier Franquicia Rock&Ribs
Dossier Franquicia Rock&RibsDossier Franquicia Rock&Ribs
Dossier Franquicia Rock&RibsComessGroup
 
May 5, 2014 Colorado Coach Connection
May 5, 2014 Colorado Coach ConnectionMay 5, 2014 Colorado Coach Connection
May 5, 2014 Colorado Coach ConnectionICF Colorado
 
Petrill wilkerson
Petrill wilkersonPetrill wilkerson
Petrill wilkersonSpyank
 
Plan Estratégico Estudiantes Siglo XXl
Plan Estratégico Estudiantes Siglo XXlPlan Estratégico Estudiantes Siglo XXl
Plan Estratégico Estudiantes Siglo XXlestudiantessiglo21
 
Finca espectacular en venta
Finca espectacular en ventaFinca espectacular en venta
Finca espectacular en ventaAbsolutgest s.l
 

En vedette (20)

How to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for BeginnersHow to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for Beginners
 
Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of Things
 
Servers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - ThailandServers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - Thailand
 
Thailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet ThailandThailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet Thailand
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
DeltaV Virtualization
DeltaV VirtualizationDeltaV Virtualization
DeltaV Virtualization
 
Occox by Demtech - le M2M en action
Occox by Demtech - le M2M en actionOccox by Demtech - le M2M en action
Occox by Demtech - le M2M en action
 
Saiba como fechar negócios vindos do casasapo
Saiba como fechar negócios vindos do casasapoSaiba como fechar negócios vindos do casasapo
Saiba como fechar negócios vindos do casasapo
 
Infografia 02 - Por qué debo hacer Parkour con Wayka Parkour
Infografia 02 - Por qué debo hacer Parkour con Wayka ParkourInfografia 02 - Por qué debo hacer Parkour con Wayka Parkour
Infografia 02 - Por qué debo hacer Parkour con Wayka Parkour
 
FAQ Ferien Touristik aug11
FAQ Ferien Touristik aug11FAQ Ferien Touristik aug11
FAQ Ferien Touristik aug11
 
Herramientas para comercio digital internacional
Herramientas para comercio digital internacionalHerramientas para comercio digital internacional
Herramientas para comercio digital internacional
 
Dossier Franquicia Rock&Ribs
Dossier Franquicia Rock&RibsDossier Franquicia Rock&Ribs
Dossier Franquicia Rock&Ribs
 
May 5, 2014 Colorado Coach Connection
May 5, 2014 Colorado Coach ConnectionMay 5, 2014 Colorado Coach Connection
May 5, 2014 Colorado Coach Connection
 
Petrill wilkerson
Petrill wilkersonPetrill wilkerson
Petrill wilkerson
 
Microeconomia
MicroeconomiaMicroeconomia
Microeconomia
 
Las+teorí..
Las+teorí..Las+teorí..
Las+teorí..
 
Plan Estratégico Estudiantes Siglo XXl
Plan Estratégico Estudiantes Siglo XXlPlan Estratégico Estudiantes Siglo XXl
Plan Estratégico Estudiantes Siglo XXl
 
Finca espectacular en venta
Finca espectacular en ventaFinca espectacular en venta
Finca espectacular en venta
 

Similaire à Cloud Technology Brief 2013 Q1 - Thailand

A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing FundamentalDony Riyanto
 
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld
 
Cloud computing computer
Cloud computing computerCloud computing computer
Cloud computing computerSanath Surawar
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionPT Datacomm Diangraha
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud servicesSomnath Sen
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
Hybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptxHybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptxzhunli4
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms Vibhawa Nirmal
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing Pratik Patil
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
 
Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform Ruslan Synytsky
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir Patrick Bouillaud
 
Enterprise Cloud Platform - Keynote
Enterprise Cloud Platform - KeynoteEnterprise Cloud Platform - Keynote
Enterprise Cloud Platform - KeynoteNEXTtour
 

Similaire à Cloud Technology Brief 2013 Q1 - Thailand (20)

A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing Fundamental
 
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing computer
Cloud computing computerCloud computing computer
Cloud computing computer
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Hybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptxHybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptx
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
 
Enterprise Cloud Platform - Keynote
Enterprise Cloud Platform - KeynoteEnterprise Cloud Platform - Keynote
Enterprise Cloud Platform - Keynote
 
cloud computing
cloud computingcloud computing
cloud computing
 
cloud computng
cloud computng cloud computng
cloud computng
 

Plus de Aruj Thirawat

Global Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-SepGlobal Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-SepAruj Thirawat
 
STelligence Savvius Thai Datasheet
STelligence Savvius Thai DatasheetSTelligence Savvius Thai Datasheet
STelligence Savvius Thai DatasheetAruj Thirawat
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsAruj Thirawat
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureAruj Thirawat
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Radware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not RealityRadware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not RealityAruj Thirawat
 
Vidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration PartnerVidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration PartnerAruj Thirawat
 
ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015Aruj Thirawat
 
Netapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology InfographicNetapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology InfographicAruj Thirawat
 
Solarwinds - understand and optimize
Solarwinds - understand and optimizeSolarwinds - understand and optimize
Solarwinds - understand and optimizeAruj Thirawat
 

Plus de Aruj Thirawat (10)

Global Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-SepGlobal Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-Sep
 
STelligence Savvius Thai Datasheet
STelligence Savvius Thai DatasheetSTelligence Savvius Thai Datasheet
STelligence Savvius Thai Datasheet
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Radware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not RealityRadware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not Reality
 
Vidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration PartnerVidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration Partner
 
ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015
 
Netapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology InfographicNetapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology Infographic
 
Solarwinds - understand and optimize
Solarwinds - understand and optimizeSolarwinds - understand and optimize
Solarwinds - understand and optimize
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Cloud Technology Brief 2013 Q1 - Thailand

  • 3. 3 Cloud in Marketer’s Eyes • It’s in the Internet – I can access it everywhere • It’s easy to use – I don’t have to understand it • It’s new – Everyone will love it • It’s somehow better than non-cloud – Pay for cloud if you have money
  • 4. 4 Cloud for Programmers • Cloud is automated – I don’t need System Engineer anymore • Cloud is fast – Nothing is faster than the cloud • Cloud is reliable – It’s high availability in itself without changing my code • Cloud is cheaper than any other solution – Buying server only if you have more money
  • 5. 5 Cloud for System Engineer • Cloud is automated – I don’t have to do hard work anymore • Cloud is reliable – Now I can sleep along the night • Cloud is not fast – Speed comes with cost • Cloud is not flexible – I cannot configure or tune them
  • 6. 6 Cloud for Manager A • Cloud is cheap – I don’t have to hire System Engineer or buy any hardware • Cloud is flexible – I can buy anything in just minutes • Cloud is reliable – They told me like this • Business can be competitive with cloud
  • 7. 7 Cloud for Manager B • Cloud is expensive – I pay the same price every year • Cloud is service – I pay money and get nothing • Cloud is unreliable – What if the cloud company bankrupt • Why should I hire you if cloud is so good?
  • 8. 8 So what is Cloud? • Cloud has different meaning depended on the role of each person. • Gartner defines cloud computing as a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.
  • 10. 10 General Components of the Cloud • Physical Server • Physical or Virtual Storage • Virtual Switch • Physical Network Switch • Hypervisor Software • Cloud Management Software
  • 11. 11 General Components of the Cloud Cloud Management Software Physical Network Switch VMs Virtual Switch Virtual Storage VMs Virtual Switch Virtual Storage Hypervisor Software Hypervisor Software Physical Server Physical Server Physical Storage
  • 12. 12 Behind the Cloud: Case 1 – Just a service on the internet My Web, My Service Internet Same Cost, Double Price, More Marketing
  • 13. 13 Behind the Cloud: Case 2 – Service on the Cloud Hosting My Web, My Service
  • 14. 14 Behind the Cloud: Case 3 – Public Cloud Data Center (Service Provider)
  • 15. 15 Behind the Cloud: Case 3 – Public Cloud Data Center (Service Provider)
  • 16. 16 Behind the Cloud: Case 3 – Public Cloud Data Center (Service Provider)
  • 17. 17 Behind the Cloud: Case 4 – Private Cloud Data Center (Enterprise)
  • 18. 18 Cloud Data Center – Basic Design
  • 19. 19 Cloud Data Center – Basic Design
  • 20. 20 Cloud Data Center – Traditional Hardware (Service Provider) Front-end Nodes Good CPU, Some RAM High Performance Nodes Many CPUs, Many RAM Management Nodes Good CPUs, RAM Storage Nodes Basic CPU, RAM, Many Disks
  • 21. 21 Cloud Data Center – Traditional Hardware (Enterprise) Cloud Controller Hypervisor Servers SAN Storages
  • 22. 22 Cloud Data Center – Next-Generation Hardware with Basic Design Front-end Nodes Good CPU, Some RAM High Performance Nodes Many CPUs, Many RAM Storage Nodes Basic CPU, RAM, Many Disks Management Nodes Good CPUs, RAM 2-8X Space Saving! 4-8X Cable Saving!
  • 23. 23 Cloud Data Center – Next-Generation Hardware with Google-like Design
  • 24. 24 Cloud Data Center – Next-Generation Hardware with Google-like Design
  • 26. 26 (Some of) Cloud Features Automation / Management High Availability / Reliability Performance / Scalability Security
  • 27. 27 Automation / Management • Configuration Automation • Add/remove new instances • Component configuration • Cluster configuration • Billing
  • 28. 28 High Availability / Reliability • HA at Hypervisor Layer • HA at Application Layer
  • 31. 31 Performance / Scalability • Load Balancer • Scaling Automation
  • 34. 34 Security • In-cloud Security • Firewall, IDS/IPS, Vulnerability Management • Automated Security Audit
  • 35. 35 Cloud Feature Summary • All features are options for any cloud system. • Some cloud might have automation but have no reliability or performance. • Some cloud might have automation, reliability and performance but have no security. • Cloud with all those features are super expensive!
  • 38. 38 Security Holes • • • • • Attack between hosts Attack hypervisor Management hijack Rogue VMs Rogue network connections • Etc. Performance Issues • Limited firewall throughput • Limited IPS throughput • Only layer 3 visibility • Expensive to scale
  • 39. 39 In-cloud Security • • • • • Layer 1 – 4 security VM-aware security Firewall, IPS, NAC Netflow Vulnerability management High Performance • Scale-out with Hypervisors Automated!!! • Security policies follow VMs • Real-time compliance
  • 40. 40 Best Practice of Cloud Security (Example from Catbird) Zoning to support multiple Host 1 Host 2 Host N COI 1 COI 1 COI 1 VM VM security policies per COI VM VM VM VM VM VM VM Introspection and VM to VM controls VM Multi-function network security: NAC, IDP, IVM … COI 2 COI 2 COI 2 VM VM VM VM VM VM VM VM VM Enforce least privilege, implement incident response Protect hypervisor and infrastructure management, drive compliance workflows Data Center Operations Security Management
  • 41. 41 Best Practice of Cloud Security (Example from Catbird) COI 1 VM VM VM COI 2 VM VM VM Secure user access COI 1 COI 1 VM VM VM Secure admin proxies VM VM VM COI 2 COI 2 VM VM VM O&M admin access VM VM VM ISMS admin access Protected by tenant or COI Data Center Operations Storage Layer Security Management
  • 42. 42 Best Practice of Cloud Security (Example from Catbird) Datacenter 1 Hybrid Cloud Security Physical Analytics Auth Audit CCC Large regional bank:     2 data centers B2B and customer portals in cloud VMs may flow between data centers Security policy follows VMs Datacenter 2 BCP/HA Virtual
  • 44. 44 Hybrid Redundant / Disaster Recovery (DR) Cloud: Public Cloud + Private Cloud
  • 45. 45 Hybrid Redundant / Disaster Recovery (DR) Cloud: Public Cloud + Private Cloud
  • 46. 46 Hybrid Function Cloud: Public Cloud + Private Cloud Finance System CRM
  • 47. 47 Performance Scalable Cloud: Physical Data Center + Cloud Data Center 10,000 concurrent users 100,000 concurrent users
  • 48. 48 Cloud Hubs and Cloud Intergrator Finance CRM Cloud Hub / Cloud Integrator Project Manage ment
  • 50. 50 Software Defined Anything • System in the Past • Install software on the server for service you need. Configure them one by one with deep knowledge. • System in the Present • Install the complete appliance for each service. Configure on the automated UI. • System in the Future • Install cloud appliance image or virtual appliance image on existing cloud or virtualization infrastructure. Configure on the automated UI. • This applies to any service on the network.
  • 51. 51 Software Defined Networking • Switches are virtualized to the cloud so there will be less required hardware switches in the cloud infrastructure. Example of this concept are Nicira and Vyetta. Community Of Interest COI 1 COI N VM VM VM VM VM VM COI 2 COI … VM VM VM VM VM Virtual switch Hypervisor VM
  • 52. 52 Software Defined Security • Catbird provides firewall, IDS/IPS, Network Access Control, Vulnerability Management and Real-time Audit to the Cloud. Catbird Control Center Virtual Machine Catbird Update Service •Signatures •Defect checks Catbird Virtual Machine Appliances Control Center Web Portal
  • 53. 53 Software Defined Data Center • Nutanix is a hardware with embedded hypervisor and cloud storage. You can have hypervisors, servers, storages, switches and security in only one hardware with automation, high availability, performance and security.
  • 54. 54 Software Defined ??? • WAN Optimizer? • Load Balancer? • VPN?
  • 55. 55 Summary • Many old solutions will be ported to virtualization and cloud.
  • 57. 57 What is VDI • Virtual Desktop Infrastructure = VDI • Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a hosted, centralized or remote server. • From Wikipedia • VDI = Desktop Virtualization!
  • 58. 58 Example 1 - Citrix XenDesktop
  • 59. 59 Example 2 - VMware View
  • 60. 60 Application Virtualization • Virtual application delivery lets IT manage a single instance of each application in an application hub in the datacenter. Applications are then delivered via application streaming to Windows PCs for offline use or run on high-powered servers in the datacenter for online use on any device or operating system. • From Citrix XenApp
  • 61. 61 Benefits of VDI Technology • Cut the operation cost! • Centralized management for desktop/application • Dramatically reduce man-hours for maintenance, upgrade, install applications • Increase client security • Daily patch management, upgrade anti-virus, centralized traffic for threat prevention and monitoring, easy security policy enforcement • Easy to audit • Mobility to workforce! • There is an option for remote to VDI from anywhere • Flexible endpoint hardware! • Mobile = Notebook / Netbook / Tablet • Save cost = Old PC / Thin client / Linux • High performance = New PC
  • 62. 62 Myths to VDI Technology • VDI is cheaper than buying PCs / notebooks • VDI has large cost on servers, storages, networking, VDI licenses and Windows 7 licenses. • VDI reduces operation cost, risk and increases flexibility on deploying any new technology to end users. • Thin client is the real one who saves the cost in short term! (Save hardware and license cost) • Thin client is as same as VDI • Thin client is just a part of VDI that lacks of security, flexibility and management features.
  • 63. 63 1. Thin Client Approach VM Servers Direct RDP Client PC /Thin Client Virtual Desktops SAN Storages
  • 64. 64 2. Secured Gateway Approach VM Servers Mobile Devices RDP over HTTPS Client PC /Smart Thin Client RDP Broker with Local User DB Virtual Desktops SAN Storages
  • 65. 65 3. Managed Approach VM Servers Mobile Devices RDP over HTTPS Client PC /Smart Thin Client RDP Broker Virtual Desktops Joined AD MS AD CIFS NAS for AD SAN Storages
  • 66. 66 4. Fully Managed Approach Virtual Deskop Manager Mobile Devices RDP/ICA/PCoIP over HTTPS VM Servers RDP Broker Client PC /Smart Thin Client Thin/Fat and Stateful/Stateless Virtual Desktops Joined AD MS AD CIFS NAS for AD SAN Storages
  • 67. 67 5. Fully Managed with Virtual Application Approach Virtual Deskop Manager Mobile Devices RDP/ICA/PCoIP over HTTPS VM Servers RDP Broker Client PC /Smart Thin Client Thin/Fat and Stateful/Stateless Virtual Desktops Joined AD SAN Storages MS AD Virtual Application Application Farm Manager CIFS NAS for AD
  • 68. 68 6. Fully Managed with Remote Access Approach Virtual Deskop Manager Mobile Devices RDP/ICA/PCoIP over HTTPS VM Servers RDP Broker Client PC /Smart Thin Client Thin/Fat and Stateful/Stateless Virtual Desktops Joined AD SSL-VPN SAN Storages MS AD RDP/ICA/PCoIP over HTTPS Virtual Application Manager Client PC Mobile Devices /Smart Thin Client CIFS NAS for AD Application Farm
  • 69. 69 7. Fully Managed with VDI Security Approach Virtual Deskop Manager Mobile Devices RDP/ICA/PCoIP over HTTPS VM Servers RDP Broker Client PC /Smart Thin Client VDI Security Thin/Fat and Stateful/Stateless Virtual Desktops Joined AD SSL-VPN SAN Storages MS AD RDP/ICA/PCoIP over HTTPS Virtual Application Manager Client PC /Smart Thin Client Mobile Devices CIFS NAS for AD Application Farm
  • 70. 70 8. Fully Managed with Cloud Servers Approach Virtual Deskop Manager Mobile Devices RDP/ICA/PCoIP over HTTPS RDP Broker Client PC /Smart Thin Client VDI Security Thin/Fat and Stateful/Stateless Virtual Desktops Joined AD SSL-VPN MS AD RDP/ICA/PCoIP over HTTPS Client PC /Smart Thin Client VM on Cloud Servers Mobile Devices CIFS NAS for AD
  • 71. 71 DARK SIDE OF THE CLOUD
  • 72. 72 Who Owns the Data? • After hosting your business data on the cloud … • How can you be so sure no one can see your data? • After stop using the cloud … • How can you be so sure your data is deleted? • Data Deletion Certificate might be the answer to this problem. Maybe.
  • 73. 73 What About Downtime? • From cloud vendor’s marketing team, cloud has little downtime. • In reality, cloud has downtime. • Data center issue • Network issue • Security issue • Performance issue • Human issue • Right now, businesses that use cloud are recommended to prepare for downtime in the cloud.
  • 74. 74 My Cloud’s Performance? • Performance of the cloud depends on • CPU (GHz + Core) • Memory • Disk Access (R/W IOPS + R/W Throughput) • Network (Latency + Bandwidth) • Other issues • What if … • Your CPU is shared • Your disk access is shared • Your network is shared • And other cloud users use the cloud at the maximum performance • Some software companies migrate from dedicate servers to cloud services and then come back to build their own clouds / clusters. It’s hard to guarantee the performance of cloud service.
  • 75. 75 Where is Security of My Cloud? • Before cloud era, we have to tackle with the attack from service-side and physical side • Service-side: We protect our servers from attacks and vulnerabilities of the services we use. • Physical-side: We host our servers on the reliable and secure data center. That’s all. • Right now, we have to protect more • Hypervisor-side: If someone attacks the hypervisor successful, the cloud will be shut down. And we, the user of the cloud, cannot do anything to protect it. • Management-side: If someone can hack the management software, then our servers will be in the hacker’s hands while we cannot help protect them. • Virtual Network-side: How can we know that our data and traffic aren’t being sniffed? And we don’t have any permission to check it.
  • 76. 76 Upgrade? Migrate? • What if we use PaaS to develop our products and one day we want to change the cloud provider? • Recode? • What if we want to modify our own server image so we can have the expected level of security and performance? • Talk to cloud provider? • Changing cloud provider takes many effort to do so. And how do we know that the cloud provider we use will not be bankrupted soon?
  • 77. 77 Cumulative Cost? • Cloud = Pay every months for every years. Get nothing if stop using cloud. • Physical = Pay once and continue maintenance. The hardware is still a company’s asset. • In some case, for large size server, 2x 8 Core CPU with 128 – 768 GB Memory and large storage, the capital expense is almost the same as using a cloud for 6 months to 1 year.
  • 78. 78 What You Get? • How can you know what kind of hardware do you get? • CPU: Different model of CPUs can have different performance even the GHz and No. of Cores are the same. • RAM: How much frequency? Non-ECC RAM, ECC RAM or ECC Registered RAM? UDIMM vs. RDIMM vd. LRDIMM? • HDD: 5.4K RPM vs. 7K RPM vs. 10K RPM vs. 15K RPM? Hardware RAID with Cache or Software RAID? No RAID vs. RAID 0 vs. RAID 1 vs. RAID 5 vs. RAID 10 vs. RAID 50 vs. RAID 60? SAS vs. NL SAS vs. SATA? SAS vs. SAS2? SATA2 vs. SATA3? • SSD: Different brand of SSDs have different Read/Write performance and problems. • Network: Jumbo Frame? TCP offload? • Hypervisor: Different hypervisor have different performance and security.
  • 79. 79 Build Your Own Cloud? • Who provide the maintenance? • Cloud is very easy to be managed. Anyone can manage cloud via web or GUI. • But when any problem occur, you have to use a team of skillful system engineer to solve the problem as soon as possible because the problem will effect many users on the cloud. • Any problem occur on the cloud is harder to solve than on the physical or old school design.
  • 80. 80 Summary • You should understand all those risks of using cloud before making your decision. And the risks are increased everyday. Always update yourself.
  • 83. 83 Nutanix • Cost • Complexity • Performance Bottleneck SAN
  • 84. 84 Nutanix Switch Bottleneck SAN • Convergence of compute and storage • Google-like distributed scalable infrastructure • Enterprise-class data management
  • 86. 86 Nutanix Google-class Scalability Grow-As-You-Go • Distributed metadata layer • MapReduce • No single point of bottleneck
  • 87. 87 Nutanix High Performance Data Tiering Performance Transparent Data Movement Nutanix • Performance of SSDs SS D • Capacity (and cost) of HDD HD D Capacity
  • 88. 88 Nutanix Primary Deduplication Distributed Deduplication Engine • SSDs for fast index lookups • “True Deduplication” • Detects byte shifts in files • Inline or offline use • Cluster-wide Distributed Deduplication Engine
  • 89. 89 Nutanix Configurable VM Behavior SLA-driven Management • IO prioritization • Data management policies • Dedup • Fault tolerance • Compression • Encryption • Tiering
  • 90. 90 Nutanix Writeable Snapshots NetApp-like. But More Scalable. Gold Image/Production Copy Virtual Machines • Rapid provisioning • Converged backups • Shared cache
  • 91. 91 Nutanix Converged Architecture Building Blocks Grow As You Go! VCE’s vBlock 300 Cisco/NetApp Dell’s vStart 50 “Baby” Cloud FlexPod Their Building Blocks Our Building Block
  • 95. 95 OnApp Deploy Manage Scale / Load Balance Users Billing High Availability
  • 96. 96 Joyent Solaris + KVM + Node.js + NoSQL + etc.