SlideShare une entreprise Scribd logo
1  sur  19
24/01/2013 1John Rhoton – 2013
Cloud Computing 2013
Status and Trends
John Rhoton
Cloud Weekend, Giza, Egypt
11-12 May 2013
24/01/2013 2John Rhoton – 2013
Agenda
• Status
• Current adoption areas
• Deployment challenges
• Hybrid cloud evolution
• Trends
24/01/2013 3John Rhoton – 2013
Cloud Essence
• NIST Definition generally accepted
• Common theme: “resource pooling”
• Attributes
– Virtualization, Multi-tenancy, Automation, Self-service,
Internet Delivery, Elasticity, On-demand provisioning,
Utility Pricing, Service Orientation, Outsourcing…
• Benefits
– Cost Reduction
– Increased Revenue (Agility)
– Faster Growth (Focus)
24/01/2013 4John Rhoton – 2013
Adoption Highlights
• SaaS
– Collaboration (Google Apps, Office365)
– CRM (Salesforce)
– HCM (Workday)
• PaaS
– Custom Applications
• IaaS
– Web Sites
– Development & Test
– Disaster Recovery
24/01/2013 5John Rhoton – 2013
Niche Successes
• Security as a Service
– SPAM/Malware protection
– Policy Enforcement
• Availability
– Archiving and Backup
• Service Management
– Service Desk
• Development Support
– Testing
– Code Management
24/01/2013 6John Rhoton – 2013
Emerging Opportunities
• Enterprise Resource Planning
• Vertical Applications
• Line-of-Business Applications
Require Flexibility, Control, Security
24/01/2013 7John Rhoton – 2013
Challenges
• Business/Financial
– Capex/Opex, Cash flow, ROI
• Risk & Security
– Compliance, Governance, Privacy
• Technical
– Technologies, Integration, Automation
• Process
– Culture, Procedure, Project Management
24/01/2013 8John Rhoton – 2013
Startups
• Ideal Candidates
– Small
• No internal economy of scale
– No legacy
• Less integration effort
– Unpredictable growth
• Flexibility required
24/01/2013 9John Rhoton – 2013
Enterprise
• More Challenging Business case
– Large
– Significant legacy
– More predictable future
• Opportunities
– Short term: Dev/test, Collaboration, Security,
New outbound services
– Long term: Private-> Hybrid -> Public
24/01/2013 10John Rhoton – 2013
Private Cloud Optimization
• Resource Efficiencies
– Virtualization
• Operational Efficiencies
– Automation, Chargeback
• Sourcing Efficiencies
– Service Orientation, Modularization, Granular
Security
Virtualization is only the beginning
24/01/2013 11John Rhoton – 2013
Private Cloud Flexibility
Customers
Business Units
Cloud
Provider
IT
Cloud
Provider
Customers
Look for revenue potential
24/01/2013 12John Rhoton – 2013
Hybrid Cloud Convergence
Silo Integrated Dynamic
Leverage the benefits of each cloud
24/01/2013 13John Rhoton – 2013
Business Continuity
• Cold Site
• Warm Site
• Hot Site
• Double-Active
Multi-dimensional redundancy is critical
24/01/2013 14John Rhoton – 2013
Cloudbursting
• Network Connectivity
• Compute Failover
– Replicated Infrastructure
• Storage Accessibility
– Latency
– Security
Data locality is pivotal
24/01/2013 15John Rhoton – 2013
Stack Convergence
Proprietary
Hardware
Proprietary
Software
Open
Source
Consortium
Driven
Balance ease with flexibility
24/01/2013 16John Rhoton – 2013
Cloud Trends
IaaS
PaaS
SaaS
Flexibility
Efficiency
Legacy Applications and Infrastructure
New Commodity Applications
New Custom and Internal Applications
Aim for the top of the stack
24/01/2013 17John Rhoton – 2013
Complementary Trends
Mobile
Social
Analytics
Cloud
Leverage cloud to enable other trends
24/01/2013 18John Rhoton – 2013
Summary
• Cloud adoption is replacing hype
• Private cloud is the starting point
• Public cloud is the final destination
• Multiple stages of hybrid cloud in between
• The cloud stacks are converging
• Services maximize efficiency up the stack
• Cloud is linked to mobility, social and big data
24/01/2013 19John Rhoton – 2013
Contact Details
Follow me: @johnrhoton
Connect: linkedin/in/rhoton
Read the books:
amazon.com/author/rhoton
Download the presentation:
slideshare.net/rhoton

Contenu connexe

Tendances

Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
Emily2014
 

Tendances (20)

Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 

Similaire à Cloud Computing 2013: Status and Trends

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
ikanow
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
Timothy Krupinski
 
The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency Imperative
Distil Networks
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Guido Schmutz
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
Rex Wang
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 

Similaire à Cloud Computing 2013: Status and Trends (20)

How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Data anywhere anytime
Data anywhere anytimeData anywhere anytime
Data anywhere anytime
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
 
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
Cloud Computing Introduction. Engineering seventh Semester
Cloud Computing Introduction. Engineering seventh SemesterCloud Computing Introduction. Engineering seventh Semester
Cloud Computing Introduction. Engineering seventh Semester
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency Imperative
 
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal YaronA deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Connections Cloud Talk
Connections Cloud TalkConnections Cloud Talk
Connections Cloud Talk
 
Intro to Search
Intro to SearchIntro to Search
Intro to Search
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 

Plus de John Rhoton

Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
John Rhoton
 

Plus de John Rhoton (16)

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Cloud Computing 2013: Status and Trends

  • 1. 24/01/2013 1John Rhoton – 2013 Cloud Computing 2013 Status and Trends John Rhoton Cloud Weekend, Giza, Egypt 11-12 May 2013
  • 2. 24/01/2013 2John Rhoton – 2013 Agenda • Status • Current adoption areas • Deployment challenges • Hybrid cloud evolution • Trends
  • 3. 24/01/2013 3John Rhoton – 2013 Cloud Essence • NIST Definition generally accepted • Common theme: “resource pooling” • Attributes – Virtualization, Multi-tenancy, Automation, Self-service, Internet Delivery, Elasticity, On-demand provisioning, Utility Pricing, Service Orientation, Outsourcing… • Benefits – Cost Reduction – Increased Revenue (Agility) – Faster Growth (Focus)
  • 4. 24/01/2013 4John Rhoton – 2013 Adoption Highlights • SaaS – Collaboration (Google Apps, Office365) – CRM (Salesforce) – HCM (Workday) • PaaS – Custom Applications • IaaS – Web Sites – Development & Test – Disaster Recovery
  • 5. 24/01/2013 5John Rhoton – 2013 Niche Successes • Security as a Service – SPAM/Malware protection – Policy Enforcement • Availability – Archiving and Backup • Service Management – Service Desk • Development Support – Testing – Code Management
  • 6. 24/01/2013 6John Rhoton – 2013 Emerging Opportunities • Enterprise Resource Planning • Vertical Applications • Line-of-Business Applications Require Flexibility, Control, Security
  • 7. 24/01/2013 7John Rhoton – 2013 Challenges • Business/Financial – Capex/Opex, Cash flow, ROI • Risk & Security – Compliance, Governance, Privacy • Technical – Technologies, Integration, Automation • Process – Culture, Procedure, Project Management
  • 8. 24/01/2013 8John Rhoton – 2013 Startups • Ideal Candidates – Small • No internal economy of scale – No legacy • Less integration effort – Unpredictable growth • Flexibility required
  • 9. 24/01/2013 9John Rhoton – 2013 Enterprise • More Challenging Business case – Large – Significant legacy – More predictable future • Opportunities – Short term: Dev/test, Collaboration, Security, New outbound services – Long term: Private-> Hybrid -> Public
  • 10. 24/01/2013 10John Rhoton – 2013 Private Cloud Optimization • Resource Efficiencies – Virtualization • Operational Efficiencies – Automation, Chargeback • Sourcing Efficiencies – Service Orientation, Modularization, Granular Security Virtualization is only the beginning
  • 11. 24/01/2013 11John Rhoton – 2013 Private Cloud Flexibility Customers Business Units Cloud Provider IT Cloud Provider Customers Look for revenue potential
  • 12. 24/01/2013 12John Rhoton – 2013 Hybrid Cloud Convergence Silo Integrated Dynamic Leverage the benefits of each cloud
  • 13. 24/01/2013 13John Rhoton – 2013 Business Continuity • Cold Site • Warm Site • Hot Site • Double-Active Multi-dimensional redundancy is critical
  • 14. 24/01/2013 14John Rhoton – 2013 Cloudbursting • Network Connectivity • Compute Failover – Replicated Infrastructure • Storage Accessibility – Latency – Security Data locality is pivotal
  • 15. 24/01/2013 15John Rhoton – 2013 Stack Convergence Proprietary Hardware Proprietary Software Open Source Consortium Driven Balance ease with flexibility
  • 16. 24/01/2013 16John Rhoton – 2013 Cloud Trends IaaS PaaS SaaS Flexibility Efficiency Legacy Applications and Infrastructure New Commodity Applications New Custom and Internal Applications Aim for the top of the stack
  • 17. 24/01/2013 17John Rhoton – 2013 Complementary Trends Mobile Social Analytics Cloud Leverage cloud to enable other trends
  • 18. 24/01/2013 18John Rhoton – 2013 Summary • Cloud adoption is replacing hype • Private cloud is the starting point • Public cloud is the final destination • Multiple stages of hybrid cloud in between • The cloud stacks are converging • Services maximize efficiency up the stack • Cloud is linked to mobility, social and big data
  • 19. 24/01/2013 19John Rhoton – 2013 Contact Details Follow me: @johnrhoton Connect: linkedin/in/rhoton Read the books: amazon.com/author/rhoton Download the presentation: slideshare.net/rhoton

Notes de l'éditeur

  1. SiloIntegrated (SFDC, AD, Email)Dynamic (cloudbursting)
  2. IaaS: Improved efficiencies, legacy applicationsPaaS: New custom and internal applicationsSaaS: Commodity applications
  3. Mobile: increases need for Internet storage and runtimeSocial: Internet accessibilityBigData/Analytics: dynamic workloadAlso: mobile enables social, mobile provides location data, social provides metadata to analytics