15. But…
You do not have
a lot of options to
customize
your unit
16. triple pane windows
green materials
high capacity electricity
high speed Internet
However, builders provide you with
very high quality infrastructure
17. No need to worry about maintenance cost
No need to Hire landscapers,
electricians, plumbers
18. Pay as You Go …
rent
Just pay your
and utilities
29. “Biggest Paradigm Shift in 20 years”
“Just On”
“Game Changers”
“Tremendous Cost Cutting”
“Pay As You Go”
.. a computing paradigm shift where computing is moved away
from personal computers or an individual application server to
a "cloud" of computers ..
moving computing and data away from the desktop and the portable PC and
simply displaying the results of computing that takes place in a centralized
location and is then transmitted via the internet on the user's
screen
30. The cloud is a smart, complex, powerful computing system in the
sky that people can just plug into ..
31. They have the infrastructure
You pay for what you use
32. Cloud computing comes into focus only when you think about what IT always needs: a way to
increase capacity or add capabilities on the fly without investing in new
infrastructure, training new personnel, or licensing new software. Cloud computing
encompasses any subscription-based or pay-per-use service that, in real time over the
Internet, extends IT’s existing capabilities.
40. 0
On-premise infrastructure
1
Coherent and resilient
∞
Scalability
Acquisition cost environment – not a Interoperability
Adoption cost brittle “software stack” Customizability
Support cost robust multi-tenancy
41. Deployment Models
Public Cloud Private Cloud Hybrid Cloud
Public clouds arerun by third parties , and applications from different
customers are likely to be mixed together on the cloud’s servers, storage systems, and
networks. Public clouds are most often hosted away from customer premises, and they
provide a way to reduce customer risk and cost by providing a flexible, even temporary
extension to enterprise infrastructure.
42. Deployment Models
Public Cloud Private Cloud Hybrid Cloud
Private clouds are built for the exclusive use of one client ,
providing the utmost control over data, security, and quality of service. The company
owns the infrastructure and has control over how applications are deployed on it.
Private clouds may be deployed in an enterprise data centre, and they also may be
deployed at a co-location facility.
43. Deployment Models
Public Cloud Private Cloud Hybrid Cloud
Hybrid clouds combine both public and private cloud models. They can help to provide
on-demand, externally provisioned scale. The ability to
augment a private cloud with the resources of a public cloud can be used to maintain
service levels in the face of rapid workload fluctuations. A hybrid cloud also can be
used to handle planned workload spikes.
45. Software
as a Service
Platform
as a Service
Infrastructure
as a Service
46. Software as a Service - SaaS
Software as a service features a complete application offered as
a service on demand. A single instance of the software runs on the cloud and
services multiple end users or client organizations.
47. Platform as a Service - PaaS
Platform as a service encapsulates a layer of software and
provides it as a service that can be used to build higher-level services.
48. Infrastructure as a Service - IaaS
Infrastructure as a service delivers basic storage and compute
capabilities as standardized services over the network. Servers, storage
systems, switches, routers, and other systems are pooled and made available to
handle workloads that range from application components to high-
performance computing applications.
49. Multi-Tenant Architecture
Corporate 1 Corporate 2 Corporate 3 Corporate 4
Shared infrastructure
Other apps
App 2
App 1 App Server
App 3
App Server Database App Server
Database OS Database
OS Server OS
Server Storage Server
Storage Network Storage
Network Network
59. Cloud Providers use
Isolation techniques
Data Isolation
Virtualization
Computing Isolation
A vulnerability in one tenant has little impact on other tenants
61. However, it is normal to store
highly value-able data in
two or more different cloud providers
Data
replicated Service replicated
Cloud Provider 1 Cloud Provider 2
63. Data in Transit
data
Internet
Cloud Provider
It can be secured using encryption technology, e.g. SSL
It is used especially for sensitive data
64. Data at Rest
Biggest prize for attackers!
Cloud Provider
More and more cloud providers are developing native
data encryption
Even if it is stolen, it will be useless for attackers
72. Vs.
LANGUAGE support
.NET (C# and Visual Basic),
Java and Python
C++, PHP, Ruby, Python, Java.
APPLICATION types
Cron Jobs or
via Java/Python based Web Roles and Worker Roles
application schedulers
MIGRATION ease
directly deploying into the automate the deployment
Webserver from a bat file
73. Vs.
INTEGRATION with other apps
Google Apps SharePoint, SQL server,
(Accounts, Docs, Gmail, IM, etc.) Outlook,
CUSTOMIZED solutions
No Yes
SCALABILITY issues
app automatically scales need to change the config to
add new web or worker role
instances
76. Automation for Cloud Computing
Cloud computing is creating challenges for IT organizations that have a
fair amount of manual tasks and processes that are carried out by IT
administrators. Cloud providers are looking to maximize the utilization
of the cloud resources being provided to cloud customers, in the face of
increasingly complex and dynamic workloads.
77. Virtualization
Technology is available to virtualize the primary computing resources –
servers, storage and networks, and these technologies are enjoying
increasing adoption by end users. Extensive research is underway to
enable effective management of deployments based on virtual
technologies
78. Application Development
For the cloud to truly become the new IT paradigm, it will not be
enough to simply move the existing applications into the cloud
environment. Inevitably, some new applications will need to be
developed, or existing applications will need to be re-developed to fit
the cloud, rather than the traditional data centre.
79. Security Issues
What are the security issues and solutions involved that can protect
corporate data in the cloud and address attacks from outside, such as
from Viruses and Trojans, or Denial of Service attacks? What
mechanisms can be used to address these issues in virtualized and
hosted cloud environments?
80. Moving Workloads to the Cloud
Many IT organizations are looking to utilize cloud-based services to
satisfy some fraction of their computing requirements. However, there
are a fair amount of challenges to transparently move workloads to the
cloud. Among other dependencies, there are significant challenges in
the area of network and storage which need to be met through
automation
83. References
A great amount of concept and content for this presentation has been taken from
two amazing presentations by Andy Harjanto available on SlideShare
* I’m Cloud Confused - Link
* Cloud Trust - Link
InfoWorld – Cloud Computing - Link
UNISYS Cloud 20/20 Paper Presentation Contest Details - Link
Google App Engine vs. Windows Azure – taranfx.com - Link
Wikipedia
Google