At some point in time, organizations of all sizes would find some advantage in implementing Cloud computing. It is inevitable and we may ask ourselves what is actually holding us back in implementing it today. Perhaps fear, lack of resources or the most common issue of convincing the higher management about the underlying benefits. This presentation can be used to address the last issue.
9. Monitor & Manage Services & Resources Cloud Administrator Datacenter Infrastructure Service Catalog, Component Library Service Consumers Component Vendors/ Software Publishers Publish & Update Components, Service Templates IT Cloud Access Services
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20. User services provide facilities for managing all aspects of a user’s Mesh (devices, applications, and data) and enabling sharing of those resources across multiple users. Device services provide facilities for managing the collection of heterogeneous devices within a user’s Mesh, including relationships, status, and security services.
21. Application Management services facilitate the configuration; deployment and versioning of applications which utilize the Live Framework including Web-enabled Mesh Applications. Synchronization services as it ensures the synchronization of data and metadata between applications, devices, and the cloud
22.
23.
24.
25. Access Control Service The Access Control Service provides rules-based claims transformation and identity federation.
28. Its time to decide whether we are the leaders or the followers!
Editor's Notes
Success disaster: What if tomorrow instead of 50 clients, we grow exponentially to 5000 clients?
Choosing to support both an offline and online experience for the end users will add additional cost to the project; however, should another attribute, such as high scalability, be identified, the advantages that the Cloud provides in this area easily could offset the cost of developing an offline experience. (
If desired, the Windows Azure fabric can itself detect an application failure and send an alert. The Windows Azure platform also provides detailed information about the application’s resource consumption, including processor time, incoming and outgoing bandwidth, and storage.
To do this, the Access Control Service’s STS relies on rules defined by the owner of the application that the user is trying to access. For example, suppose the application grants specific access rights to any user who is a manager in her company. While each company might include a claim in its token indicating that a user is a manager, they’ll likely all be different. One company might use the string “Manager”, another the string “Supervisor”, and a third an integer code. To help the application deal with this diversity, its owner 19 could define rules in Access Control that convert all three of these claims to the common string “Decision Maker”. The application’s life is now made simpler, since the work of claims transformation is done for it. Quality programming already done for you and identity management is no hassle now
Define how applications and services are going to be interacting