SlideShare a Scribd company logo
1 of 21
CLOUD COMPUTING FOR ENTERPRISE

CLOUD COMPUTING
FOR ENTERPRISE

Pravin K Asar
PRAVIN K ASAR

pravinasar.comPage 1
CLOUD COMPUTING FOR ENTERPRISE

Table of Contents
Abstract ......................................................................................................................................................... 4
Introduction .................................................................................................................................................. 5
History of Cloud Computing .......................................................................................................................... 5
Grid Computing ......................................................................................................................................... 6
Virtualization ............................................................................................................................................. 6
Hosting ...................................................................................................................................................... 6
SaaS ........................................................................................................................................................... 6
Utility computing ...................................................................................................................................... 6
Attributes and Taxonomy of Cloud Computing ............................................................................................ 9
Public vs. Private Clouds ........................................................................................................................... 9
Public Cloud ............................................................................................................................................ 10
Private Cloud ........................................................................................................................................... 11
Hybrid Cloud ........................................................................................................................................... 11
Service Categories: .................................................................................................................................. 11
The Promise of Cloud Computing ............................................................................................................... 12
Elastic Scalability ..................................................................................................................................... 13
Agility ...................................................................................................................................................... 13
Reliability and Fault-Tolerance ............................................................................................................... 13
Shared Multi-tenancy ............................................................................................................................. 13
Service-oriented ...................................................................................................................................... 13
Utility-based ............................................................................................................................................ 13
SLA-driven ............................................................................................................................................... 13
APIs.......................................................................................................................................................... 14
Benefits for the Enterprise.......................................................................................................................... 14
Competitive Advantage .......................................................................................................................... 14
Cost Savings ............................................................................................................................................ 14
Risks to Enterprise ...................................................................................................................................... 15
Security, Privacy and Compliance ........................................................................................................... 15
Risk Mitigation: ....................................................................................................................................... 16
PRAVIN K ASAR

pravinasar.comPage 2
CLOUD COMPUTING FOR ENTERPRISE
Security: .................................................................................................................................................. 17
Privacy/Compliance: ............................................................................................................................... 17
Cloud Computing and Changing Marketplace: ........................................................................................... 17
The Future Trends ....................................................................................................................................... 18
Typical Attributes of Applications Suitable for External Clouds ............................................................. 19
Additional Typical Attributes of Applications Suitable for Software as a Service .................................. 19
Conclusion ................................................................................................................................................... 20
References: ................................................................................................................................................. 21

PRAVIN K ASAR

pravinasar.comPage 3
CLOUD COMPUTING FOR ENTERPRISE
Abstract
The enterprise landscape is rapidly changing. Data is ubiquitous. Information is flowing
into an organization’s applications from more sources than ever before. Business expectations are also changing. Corporations today demand speed and flexibility from their
applications. Enterprise want services that allow them to make better business decisions,
create more satisfied customers, and react ever more quickly to evolving market conditions. Current economic circumstances and increased competition are also driving the
demand for a more effective model to deliver applications and services.
This relentless push for a faster, better and more cost-effective technology delivery model
has set the stage for new approaches to application development, deployment and
management. Several technologies such as grid computing, virtualization, and serviceoriented architecture (SOA) have offered partial solutions for enterprises that require
applications with greater scalability, agility and easier management capabilities.
However, these alone have not been enough.
Enter cloud computing, an innovative model for delivering IT infrastructure, applications
and data that shifts the emphasis from static, stand-alone application silos to dynamic,
shared environments, dynamically allocated among various tasks and accessed via a
network.
Today, many forward-thinking enterprises are using cloud environments to take advantage of the increased scalability, agility, automation, and efficiency that this technology can
deliver. Yet, because cloud computing has evolved so quickly, there are still many
questions surrounding it. To understand the promise of cloud computing, decision makers
and IT professionals must examine its development and benefits from an enterprise
perspective.
Beginning with the origins of cloud computing, this paper will help define exactly what
cloud computing is and how the enterprise can benefit from it. In doing so, the paper
outlines a number of “cloud characteristics” which together illustrate the true potential of
cloud computing and provide a framework for assessing current and future cloud
offerings. Finally, the paper draws a distinction between infrastructure-oriented clouds
and platform-oriented clouds and explains how cloud platforms allow end-user applications to unlock the true promise of cloud computing.

PRAVIN K ASAR

pravinasar.comPage 4
CLOUD COMPUTING FOR ENTERPRISE
Introduction
The term cloud computing has quickly grown from a little-known buzzword into one of the
hottest topics in IT today. This surge in interest has led to a great deal of confusion about
what cloud computing is and how to apply it to the enterprise. This is particularly true for
large organizations, which have much to gain from cloud computing if done correctly.
A number of computing researchers and practitioners (Cloud Expo: Twenty-one Experts
Define Cloud Computing, 2009)have attempted to define Clouds in various ways.
Barrie Sosnisky (2011) defines Cloud computing as “an applications and services that run
on a distributed network using virtualized resources and accessed by common Internet
protocols and networking standards. It is distinguished by the notion that resources are
virtual and limitless and that details of the physical systems on which software runs are
abstracted from the user.”
Buyya, Chee and Venugopal (2008) define "Cloud is a type of parallel and distributed
system consisting of a collection of inter-connected and virtualized computers that are
dynamically provisioned and presented as one or more unified computing resources based
on service-level agreements established through negotiation between the service provider
and consumers.”

History of Cloud Computing
The concept of cloud computing can be traced back to ideas such as utility computing
(Buyya, Broberg and Goscinski,2011), which envisioned a future where packaged
information technology services would be metered and delivered to customers much like
electricity, gas and water. Over the past decade, the rise of pervasive network computing
has provided plenty of working examples that approach the utility computing vision.
Cloud computing is the convergence of many independent computing trends. Early
attempts to define cloud computing have tended to do so relative to existing technologies,
such as grid computing, virtualization, hosting, SaaS and utility computing (Cafaro,
Aloisio, 2011). To better understand the cloud and the characteristics that cloud users
want to achieve for their applications, it is helpful to examine these technologies. While
these technologies have contributed to the development of the cloud, they also fall short
of the ultimate promise of cloud computing.

PRAVIN K ASAR

pravinasar.comPage 5
CLOUD COMPUTING FOR ENTERPRISE
Grid Computing
Grid computing has become synonymous with scalability, and most grid environments
are shared resources. However, the complexity of traditional grid computing tools
severely limits their agility. And while they are typically shared, they are usually not
multi-tenant in that multiple applications are not able to simultaneously run on the grid.
Traditional grids are also lacking with regard to their ability to provide reliability and
meet service layer agreements (SLAs).

Virtualization
By decoupling virtual machines from physical machines, server virtualization can
dramatically increase the flexibility and agility of an IT organization. Yet virtualization
alone fails to solve the fundamental scalability and reliability problems for
applications. In addition, virtualization typically lacks the automation required for the
self-service, self-healing functionality of a cloud.

Hosting
Hosting services provide outsourced space on servers in a datacenter and, in fact, many
hosting companies have entered the cloud computing marketplace. However, these
companies typically differentiate their cloud offerings from traditional hosting in that
their hosting solutions are delivered in an on-demand, self-service, and API accessible
manner.

SaaS
Although software-as-a-service offerings are often hosted in cloud environments, SaaS
itself primarily refers to the business model of delivering applications as-a-service.

Utility computing
In the utility computing model, computing infrastructure and applications are
packaged and sold as a service, like electricity. In many respects, cloud computing is
closely tied to the utility computing business model, with cloud computing being a
broader concept that relates to the underlying architecture in which the services are
designed and delivered.
While all of these technologies have helped to enable cloud computing, attempts to view
cloud based solely on these individual solutions misses many of its main points. Table 1
below summarizes the key features and misses of these computing technologies.

PRAVIN K ASAR

pravinasar.comPage 6
CLOUD COMPUTING FOR ENTERPRISE
Table 1 Computing Technology, Key Feature and Misses
Computing Technology
Traditional Grid Computing

Key Feature
Job scheduling across many
machine for computational
applications

Virtualization

Virtual machines decouple
operation system from
hardware.
Computational
infrastructure available for
rent
Application availability
through the internet (cloud)
Packaged computing,
application, and storage sold
as service

Hosting
Software-as-a-Service(SaaS)
Utility computing

What’s missing?
Difficult to administer; Lacks
agility, robustness and broad
applicability of cloud
computing
Virtual machines fail to
fundamentally solve scale
and reliability concerns
Lacks on-demand services
SaaS is an application on the
cloud, not a cloud by itself.
Describes a business model,
not technology approach or
architecture.

Cloud computing is in fact the evolution and convergence of these seeming independent
computing trends (Figure 1), resulting in a new style of computing in which the whole is
greater than the sum of its parts.

Source: Chapter 1: Introduction to Cloud Computing; William Voorsluys, JamesBroberg and Rajkumar Buyya, CloudComputing
Principles and Paradigms, 2011

Figure 1 Convergence of various advances leading to the advent of cloud computing

PRAVIN K ASAR

pravinasar.comPage 7
CLOUD COMPUTING FOR ENTERPRISE
With the commoditization and standardization of hardware and operating systems, the
growing deployment of virtualization, the rise of service oriented architectures (SOAs), and
the Web’s astounding growth and the lessons learned about providing common enterprise
services delivered through hardware, software and network sharing, businesses have
become more easily creative about sharing the IT/IS infrastructure (Figure 2).

Source: Bojanova, 2011; Analysis of Cloud Computing Delivery Architecture Models

Figure 2Evolution of Sharing on the Cloud
Cloud computing makes the long-held dream of utility computing possible with a pay-asyou-go, infinitely scalable, universally available system. With cloud computing, you can
start very small and become big very fast. Software deployment lead times are drastically
reduced. From this point of view cloud computing is revolutionary, even if the technology it
is built on is evolutionary.
Cloud computing is real paradigm shift in a way Information Systems are used by
enterprise. Cloud computing provides various information system usage options targeted
towards a highly efficient way for an organization to deliver and consume IT infrastructure,
applications and services. In its simplest form, cloud computing came from the computing
model famously used by Web giants such as Amazon and Google to deliver their own
services to customers. The cloud computing evolution was fueled by popularization of the
Internet technologies and the growth of some large service companies with the objective of
resource (hardware and software and infrastructure) sharing.

PRAVIN K ASAR

pravinasar.comPage 8
CLOUD COMPUTING FOR ENTERPRISE
Attributes and Taxonomy of Cloud Computing
As we discussed earlier, with cloud computing, the services and data reside in shared
resources in scalable data centers, and those services and data are accessible over the
Internet. The physical cloud resources may reside in a number of locations (external or
internal to enterprise), the details of which are not typically known to the users. Cloud
resources are typically offered as a service on an as-needed basis, and delivered by IPbased connectivity. The cloud itself typically consists of large numbers of commodity-grade
servers, harnessed to deliver highly scalable and reliable on-demand services.
It’s important to understand that cloud computing is an evolving paradigm ultimately
defined by developers and early adopters. While it’s important to have a good working
definition of cloud computing, a more complete understanding of cloud computing requires
an examination of its functional attributes. It is these characteristics that define the true
value of cloud computing for the enterprise.
Some key attributes (Intel, 2009) that distinguish cloud computing from conventional
computing.
The cloud computing offerings are:
Abstracted and offered as a service.
Built on a massively scalable infrastructure.
Easily purchased and billed by consumption.
Shared and multi-tenant.
Based on dynamic, elastic, flexibly configurable resources.
Accessible over the Internet by any device.
Most of the time cloud computing is offered by service providers, although it is possible to
build an internal IT environment with cloud computing characteristics.

Public vs. Private Clouds
One commonly disputed point about cloud computing is the notion of public vs.
private clouds. Some cloud computing practitioners, particularly the cloud service
providers, assert that in order for an IT environment to be a true cloud, it must be
delivered via a third party and accessed via the Internet. Still others believe, as we
do, that the true measure of a cloud is the extent to which it achieves characteristics
such as those outlined above.

PRAVIN K ASAR

pravinasar.comPage 9
CLOUD COMPUTING FOR ENTERPRISE

Source: http://www.esri.com/technology-topics/cloud-gis/public-vs-private.html

Figure 3 Public, Private and Hybrid Cloud
As enterprise leaders look to cloud computing as a way to accelerate growth and
gain a competitive advantage they must choose whether they’d like their cloud
administered by a third party offering ‘public’ cloud services, or to deploy their own
‘private’ cloud that resides within their organization’s firewall. Here’s a brief
explanation of the advantages and disadvantages of each:

Public Cloud
Public clouds appeared first on the horizon and have helped define cloud computing
best practices. As its name implies, a public cloud computing environment is open
for use by the general public, which could include individuals, corporations or other
types of organizations. Amazon EC2 is an example of a public cloud because it is
available for use by the general public. However, due to the shared nature of cloud
environments, security is a serious issue with public clouds. Concerns about
compliance, governance and reliability also plague public cloud service providers.
As an example, Amazon’s S3 service was recently down for eight hours due to
authentication issues.
At the same time, public clouds are successfully employed by many enterprises
today. For example, public clouds are widely used to affordably accelerate
enterprise application development and testing. Likewise, they are often used for
large-scale projects, such as the New York Times archive project which used 100
Amazon EC2 instances and 5.5TB of S3 storage to generate PDFs of 11 million
articles for the paper’s archives, at a small fraction of traditional costs.

PRAVIN K ASAR

pravinasar.comPage 10
CLOUD COMPUTING FOR ENTERPRISE
Private Cloud
In contrast, a private cloud computing-like environment exists within the
boundaries of an organization, typically for its exclusive usage. To make a nontechnical analogy, private cloud computing is like owning your own car, instead of
using public transportation. Public transportation, while extremely efficient and
cost effective, has not completely replaced personal automobile ownership for many
obvious reasons.

Hybrid Cloud
It’s clear that both public and private environments have their advantages and
disadvantages. But both types of cloud computing offer the major benefits of
reduced costs, simplified maintenance and management, along with greatly
extended scalability. At a same time enterprise is concerned about the security of
data. Hence many believe that the sweet spot for cost optimization in an
organization will rely on a delicate balance of public, or community, and private
clouds. However, since this hybrid cloud solution is commonly bound together by
proprietary technology.

Service Categories:
Main categories of service that fall within our broad cloud computing definition are
summarized below.
Software as a service (SaaS)

Software deployed as a hosted service and
accessed over the Internet.

Platform as a service (PaaS)

Platforms that can be used to deploy
applications provided by customers or
partners of the PaaS provider.

Infrastructure as a service (IaaS)

Computing infrastructure, such as servers,
storage, and network, delivered as a cloud
service, typically through virtualization.

Cloud computing architecture (Figure 4) as defined by National Institute of Standards and
Technology (NIST) is good reference particularly for IT professionals.

PRAVIN K ASAR

pravinasar.comPage 11
CLOUD COMPUTING FOR ENTERPRISE

Figure 4 Cloud Computing Reference Architecture
Crandell (2011) attempts to answers few concerns about the implementation of cloud
computing for an enterprise.

The Promise of Cloud Computing

Cloud computing offers a new level of capability, flexibility and manageability for enterprise IT infrastructure and the applications that run on it. The enhanced capabilities
promised by the cloud can be understood as a set of ideal characteristics that cloud users
want to ultimately achieve for their applications. These characteristics include:

PRAVIN K ASAR

pravinasar.comPage 12
CLOUD COMPUTING FOR ENTERPRISE
Elastic Scalability
Cloud environments allow businesses to serve larger audiences; solve bigger, more
challenging problems; access incremental compute resources on-demand; and
reduce the risk of new projects by starting small and growing as the need develops.

Agility
As a shared resource, the cloud improves efficiency by allowing users to have
multiple applications share the cloud environment and by providing flexible,
automated management to distribute the computing resources among the cloud’s
users and their applications.

Reliability and Fault-Tolerance
Cloud environments take advantage of the built-in redundancy of the large numbers
of servers that make them up, enabling high levels of availability and reliability for
applications—providing a better customer experience and eliminating disruption to
business due to infrastructure failure.

Shared Multi-tenancy
By enabling IT resources to be consolidated, multiple cloud users and/or
applications share a common infrastructure, allowing for improved efficiency and
costs to be more effectively managed without sacrificing the security of each user’s
data.

Service-oriented
The cloud is a natural home for service-oriented applications, which need a way
to easily scale as services get incorporated into other applications. This allows
new applications to be brought to market more quickly, based on capabilities
that have already been developed as services.

Utility-based
Users only pay for the cloud resources they use, either by subscription or
transaction-based models.

SLA-driven
Clouds are managed dynamically based on service-level agreements that define
policies like delivery parameters, costs, and other factors, so enterprises can rely
upon a service or application once it has been published. Software and data
PRAVIN K ASAR

pravinasar.comPage 13
CLOUD COMPUTING FOR ENTERPRISE
security controls are controlled

APIs
Clouds virtualizes the resources as a service they must have an application
programming interface (API). The API extends the cloud and its applications to
desired level of customization enterprise may need to meet the business needs. Not
every cloud environment (particularly private cloud) is able to achieve all of these
characteristics simultaneously. In fact, many of these characteristics cannot be
achieved through cloud infrastructure alone but rather must be addressed at the
application level, either by its developers or by a cloud application platform upon
which it runs.

Benefits for the Enterprise
Much of the excitement around cloud computing stems from the strong tangible and
intangible benefits it offers to those companies that adopt it. Enterprises large and small, in
a variety of industries, are implementing cloud computing platforms for their ability to be a
significant source of both competitive advantage and cost savings.

Competitive Advantage
Cloud computing allows organizations to deliver highly-scalable and reliable applications
more quickly and cost effectively. This yields tremendous advantage for enterprises that
depend on or benefit from either large-scale or complex applications, whose load tends to
arrive in short spikes. With cloud-based applications in place, these enterprises are freed to
deliver new products to their customers more rapidly. Because they are able to ‘think big,’
unencumbered by the constraints of scale, they are also able to make better business
decisions by applying sophisticated analyses to the wealth of data available within them.
At the same time, the dramatic reduction in the complexity of the IT environment, the
reduced provisioning times, and the ability to shift the allocation of cloud resources in
response to changing market conditions creates a more flexible IT organization and a more
agile enterprise. And because the enterprise is empowered to align IT infrastructure
investments with project benefits, overall risk is reduced and the enterprise is able to
invest in more strategic initiatives.

Cost Savings
Cloud computing offers public cloud users the ability to forgo capital investment for many
PRAVIN K ASAR

pravinasar.comPage 14
CLOUD COMPUTING FOR ENTERPRISE
IT projects, instead acquiring compute resources on-demand from a 3rd party cloud
provider. Even those companies building their own clouds stand to benefit though, as a
robust cloud computing environment allows enterprises to significantly drive reduced
capital expenditures by enabling mission-critical applications to be deployed on
inexpensive, commodity-grade servers. They further benefit by increasing the efficiency
and utilization of the company’s computing resources. Cloud also helps the enterprise
reduce operational costs by increasing the level of automation in the data center and
reducing the cost to deploy applications.
Cloud computing also offers good old-fashioned cost savings strategy of outsourcing. For
example, public clouds administered by a third party vendor can deliver large-scale
enterprise projects at a fraction of traditional costs. Likewise, enterprises adopting private
clouds have begun to realize reduced capital costs due to their ability to take better
advantage of today’s powerful commodity-grade hardware. At the same time, these
organizations are lowering the total number of servers required due to increased
efficiency. Enterprises also see lower recurring operational costs and administrative
overhead due to the high levels of automation employed in cloud environments.
Cloud computing offers enterprises a new level of scalability, agility and cost-effectiveness
for their applications. But without a cloud platform, an organization’s applications will not
reap the full benefit of cloud computing. Ultimately, the greatest advantages of cloud
computing can only are realized if an organization’s applications are able to take advantage
of the cloud’s inherent capabilities. For example, just because an organization is running its
applications on Amazon’s EC2 does not mean those applications can scale like amazon.com.
In order to take advantage of the full scalability, agility and reliability of the cloud,
applications must be built on a cloud-enabled platform.

Risks to Enterprise
The features that make cloud computing so appealing, combined with the fact that services
are publicly accessible, can also lead to many potential risks.

Security, Privacy and Compliance
Today, security and privacy may represent the biggest risks to moving services to external
clouds. The advantages of cloud computing—flexibility, easy-to-use service abstractions,
and shared infrastructure also introduce the concern that people may use cloud computing
in a way that puts enterprise information and intellectual property at risk.
As regarding the information security of cloud computing, those issues related with the
application and service of cloud computing must be deeply concerned such as the
PRAVIN K ASAR

pravinasar.comPage 15
CLOUD COMPUTING FOR ENTERPRISE
equipment security of the client side, the threats of web site and webpage, the detection
and diagnosis and surveillance of intrusion, the access and security of database on the
cloud side, the detection of system leakage and the monitor of real-time repairing process,
the management of server system, the management of mobile e-commerce processing, and
the integrated analysis of associated security information and issues.
With cloud computing, data is stored and delivered across the Internet. The owner of the
data does not control and typically does not even know the location of the data. There is a
very real possibility that the owner’s data could reside on the same resources as a
competitor’s application and data. Additionally, in a multi-tenant environment, it may be
very difficult for a cloud service provider to provide the level of isolation and associated
guarantees that are possible with an environment dedicated to a single customer.
Enterprises cannot rely solely on contractual controls with cloud service providers. In
many cases, these controls do not provide adequate protection. It would be difficult or even
impossible to use a public cloud for applications that handle controlled technologies, due to
the risk of potential compromises and concerns about compliance. For example, external
data storage provided by a cloud service supplier might be located in a controlled country
to reduce cost.
Standards are lacking for security and for managing service-level agreements (SLAs) that
could be used to help ensure compliance with government regulations and standards
through independent, third-party audits. Enterprise security policies may stipulate, for
example, that all data held externally must be encrypted in transit and at rest. In addition,
IT policies may specify that virtual servers supporting certain applications must not share
the same physical server. In general, cloud providers do not currently provide capabilities
to guarantee compliance with these policies or facilities for auditing compliance. There are
also questions about the extent to which cloud providers would accept legal responsibility,
and the damages that could be assessed, in the event of a proven breach of contract
involving a security issue.
In many countries, the use and storage of personal data is heavily regulated; without
adequate safeguards, this data could be illegally exposed with an external cloud.
Applications implemented within our internal environment are relatively easy to audit, and
we have well-established techniques for doing this. However, applications implemented
outside the enterprise firewall would be much more difficult to audit. As a result, we might
be unable to determine whether applications developed and running outside our firewall
had received up-to-date security patches or were otherwise vulnerable to compromise. An
additional area of concern is the secure integration of business data generated in an
external cloud with existing data stored within enterprise environment.

Risk Mitigation:

PRAVIN K ASAR

pravinasar.comPage 16
CLOUD COMPUTING FOR ENTERPRISE
It is difficult to determine how well a provider is mitigating data location, loss, or security
oriented risks. In fact, some providers have simply gone out of business. Consequently,
requirements for data protection should be strictly governed through the use of
contractual service level agreements.
Legacy Applications: Core business applications are often highly customized, convoluted,
and entangled. As a result, prior to moving them to the cloud a re-engineering effort is often
required to modernize and rationalize an applications portfolio before it is deemed "cloudworthy."

Security:
Commercial cloud providers offer broad access to end users and accordingly roles and
access permissions are less controllable. Legacy security measures must be duplicated
within the cloud such as firewalls and intrusion detection. Virtualization greatly adds to the
complexity of this process and provides new threats in areas such as virtual switches and
hypervisors.

Privacy/Compliance:
Issues related to privacy include jurisdiction of information (where and under what set of
laws), access and controls, the availability of audit trails, and compliance with industry and
legal standards and regulations, should be addressed.
A private cloud enables customers to leverage many of the benefits of cloud computing
within its own data center facilities. This cloud infrastructure model is ideal for clients
subject to stringent privacy restrictions (banks, government, etc.). However, a private
cloud will provide little to no immediate cost savings due to the investments required in
technologies.

Cloud Computing and Changing Marketplace:
No doubt cloud computing can offer compelling advantages for the enterprise as user of the
services. Even software product companies are also benefitting from this evolution.
Software product companies have turned to cloud computing for its ability to help bring
new, more sophisticated applications to market more rapidly, and to scale those
applications more easily—creating true competitive advantage in today’s challenging
economy. Microsoft office365, Google Apps, NetSuite, Zoho productivity suite are some
noteworthy examples. Most of application suite in the market is being not only by
enterprise, but also by small businesses, home and home office users.
PRAVIN K ASAR

pravinasar.comPage 17
CLOUD COMPUTING FOR ENTERPRISE
At the same time, perpetual licensing models are beginning to fall by the wayside as many
services such as network security management, data center hosting or even departmental
billing are now delivered on a pay-per-use basis. Complex capabilities of all types are now
available on demand to enterprises and individuals alike.
Newly formed business models, such as software-as-a-service (SaaS), have allowed
forward-looking software firms to build their companies on delivering these shared
services. Today, examples abound of companies offering utility services falling under the
“cloud” banner.
Amazon’s Elastic Compute Cloud (EC2) offers computational services that enable people to
use CPU cycles without buying more computers. Storage services such as those provided by
Amazon’s Simple Storage Service (S3) or companies like Nirvanix allow organizations to
store data and documents without adding a single on-site server. SaaS companies like
Salesforce.com deliver CRM services, so clients can manage their customer information
without installing specialized software. All of these offerings have been described as cloud
computing. True, they all seek to deliver massively scalable and elastic IT services for a
decreasing cost.
Cloud computing is also changing the way software development is done (in particular
SaaS). Neil McAllister (January 2012) states the development of 10 new programming
languages are aimed at improving the pain of internet based application development.

The Future Trends
Going forward, there is little doubt that various forms of cloud computing will play an
increasingly important role for organizations seeking a competitive advantage. Enterprises
that employ cloud application platforms—in either public or private cloud environments—
will benefit from the increased scalability and agility of their cloud-based applications.
Cloud platforms will also help them to significantly reduce time-to-market, realize
substantial cost-savings and react more quickly to changing market conditions. Because of
these clear benefits to IT departments and to an organization’s business goals, cloud
computing is here to stay. And as it evolves from a buzzword at conferences to the key
topic at corporate board meetings, cloud computing will continue to grow and deliver
dramatic results for enterprises.
Not all applications are suitable for external clouds today. Good candidates are
applications that do not provide a competitive advantage, are not mission-critical, and
are not tightly integrated with other important applications. To minimize security risks,
they should not contain sensitive information. In general, the set of applications deemed
to have low security risk should grow over time as more sophisticated techniques to
secure cloud-based applications are developed. The key decision-making criteria are
summarized below.
PRAVIN K ASAR

pravinasar.comPage 18
CLOUD COMPUTING FOR ENTERPRISE
Typical Attributes of Applications Suitable for External Clouds
Do not deliver competitive advantage
Are not mission-critical
Are not core business applications
Contain less-sensitive data
Are minimally affected by network latency or bandwidth

Additional Typical Attributes of Applications Suitable for Software as a
Service
Are at a natural re-engineering point in their lifecycles
Have minimal customization
Have industry-standard workflow
(Khajeh-Hosseini et al, 2011) discussed thetools that aim to support decision making based
on cost modeling and risk assessment during the migration of IT systems to the cloud.

PRAVIN K ASAR

pravinasar.comPage 19
CLOUD COMPUTING FOR ENTERPRISE
Conclusion
Cloud computing is a game-changing (and may be a disruptive) technology that is set to
change how IT systems are deployed because of its apparently cheap, simple and scalable
nature.Furthermore, cloud computing could potentially eliminate many support- related
issues since there would be no physical infrastructure to maintain. Despite these
advantages, there are important socio-technical issues that need to be considered before
enterprisecharts out the migration strategyof their IT systems to the cloud.
Although the concept of Cloud computing has been around for a while in the industry, in
recent years a number of technologies have been developed to realize the concept and
make Cloud Computing more accessible. Various companies including large companies like
Google, Microsoft, and Amazon, and many startups, are leading the most new exciting
developments in cloud technologies today.
Although most of the IT industry is ready to adopt these exciting new technologies, there
are still many challenges to Cloud Computing reaching its full potential. One of the biggest
challenges today is maintaining privacy and security of the data in the Cloud. A
combination of innovative solutions and changes in regulations will soon address the
security and privacy concerns. Enterprise needs to re-evaluate these criteria over time as
the market matures
Demand for Cloud Computing is growing as it enables on demand information technology
services and products. The explosive growth of Cloud Computing is driven by and
contributes to utility computing, on-demand computing, autonomic computing, and Green
IT.

PRAVIN K ASAR

pravinasar.comPage 20
CLOUD COMPUTING FOR ENTERPRISE
References:
Cloud Expo: Article; “Twenty-one Experts Define Cloud Computing”; January 2009;
http://cloudcomputing.syscon.com/read/612375_p.htm; accessed on May 2, 2012
Barrie Sosnisky; Cloud Computing Bible; Wiley Publishing, Inc.; 2011
Rajkumar Buyya; James Broberg; Andrzej Goscinski; “Cloud Computing: Principles and
Paradigms”; John Wiley & Sons, Inc; 2011
Massimo Cafaro; Giovanni Aloisio; “Grids, Clouds and Virtualization”; Springer; 2011
Buyya, R.; Chee Shin Yeo; Venugopal, S.; "Market-Oriented Cloud Computing: Vision, Hype,
and Reality for Delivering IT Services as Computing Utilities";High Performance Computing
and Communications, 2008. 10th IEEE International Conference, vol., no.; pp.5-13, 25-27
Sept. 2008;
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4637675&isnumber=4
637649; accessed on April 29, 2012
Intel Corporation, “Developing an Enterprise Cloud Computing Strategy”; 2009,
URL: http://www.intel.com/content/www/us/en/cloud-computing/software-as-aservice--saas-/intel-it-developing-cloud-computing-strategy-paper.html; accessed April 30,
2012
Michael Crandell; “Top Ten Cloud Computing & Virtualization Myths: How do you
determine what’s really going to work for your organization?” Virtualization:Article;2011
URL: http://cloudcomputing.sys-con.com/node/1682883; accessed April 29, 2012
Khajeh-Hosseini, A; Sommerville, I; Bogaerts, J; Teregowda, P; "Decision Support Tools for
Cloud Migration in the Enterprise," Cloud Computing (CLOUD), 2011 IEEE International
Conference, vol., no., pp.541-548, 4-9 July 2011
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6008753&isnumber=6
008659; accessed April 20, 2012
Maluf, David A; Shetye, Sandeep D; Chilukuri, Sri; Sturken, Ian; , "Lost in Cloud," Aerospace
Conference, 2012 IEEE , vol., no., pp.1-6, 3-10 March 2012
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6187354&isnumber=6
186985; accessed on April 20, 2012
Liu, F; Tong, J; Mao, J; Bohn, R B; Messina, J V; Badger, M L; Leaf, D M; “NIST Cloud
Computing Reference Architecture”, 2011
URL: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909505; access on
April 20, 2012

PRAVIN K ASAR

pravinasar.comPage 21

More Related Content

What's hot

Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...Majid Hajibaba
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a CloudDivya S
 
Cluster Computers
Cluster ComputersCluster Computers
Cluster Computersshopnil786
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerancegaurav jain
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSimHabibur Rahman
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 

What's hot (20)

Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Cluster Computers
Cluster ComputersCluster Computers
Cluster Computers
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Autonomous Data Warehouse
Autonomous Data WarehouseAutonomous Data Warehouse
Autonomous Data Warehouse
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 

Viewers also liked

Cloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureCloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureijfcstjournal
 
Whitepaper Cloud Egovernance Imaginea
Whitepaper Cloud Egovernance ImagineaWhitepaper Cloud Egovernance Imaginea
Whitepaper Cloud Egovernance ImagineaImaginea
 
Software Defined Networking: Enabling The Mobile Workplace
Software Defined Networking: Enabling The Mobile WorkplaceSoftware Defined Networking: Enabling The Mobile Workplace
Software Defined Networking: Enabling The Mobile WorkplaceOpen Networking Summits
 
ESPRES: Easy Scheduling and Prioritization for SDN
ESPRES: Easy Scheduling and Prioritization for SDNESPRES: Easy Scheduling and Prioritization for SDN
ESPRES: Easy Scheduling and Prioritization for SDNOpen Networking Summits
 
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...Open Networking Summits
 
FUTURE OF E-GOVERNANCE WITH CLOUD COMPUTING
FUTURE OF E-GOVERNANCE WITH CLOUD COMPUTINGFUTURE OF E-GOVERNANCE WITH CLOUD COMPUTING
FUTURE OF E-GOVERNANCE WITH CLOUD COMPUTINGpremdeshmane
 
Introduction to CORD project
Introduction to CORD projectIntroduction to CORD project
Introduction to CORD projectsangyun han
 
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...Open Networking Summits
 
CORD: Central Office Re-architected as a Datacenter
CORD: Central Office Re-architected as a DatacenterCORD: Central Office Re-architected as a Datacenter
CORD: Central Office Re-architected as a DatacenterOpen Networking Summits
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 

Viewers also liked (11)

Cloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureCloud computing technology for egovernment architecture
Cloud computing technology for egovernment architecture
 
Whitepaper Cloud Egovernance Imaginea
Whitepaper Cloud Egovernance ImagineaWhitepaper Cloud Egovernance Imaginea
Whitepaper Cloud Egovernance Imaginea
 
Software Defined Networking: Enabling The Mobile Workplace
Software Defined Networking: Enabling The Mobile WorkplaceSoftware Defined Networking: Enabling The Mobile Workplace
Software Defined Networking: Enabling The Mobile Workplace
 
ESPRES: Easy Scheduling and Prioritization for SDN
ESPRES: Easy Scheduling and Prioritization for SDNESPRES: Easy Scheduling and Prioritization for SDN
ESPRES: Easy Scheduling and Prioritization for SDN
 
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
 
Learnings from Carrier SDN Deployments
Learnings from Carrier SDN DeploymentsLearnings from Carrier SDN Deployments
Learnings from Carrier SDN Deployments
 
FUTURE OF E-GOVERNANCE WITH CLOUD COMPUTING
FUTURE OF E-GOVERNANCE WITH CLOUD COMPUTINGFUTURE OF E-GOVERNANCE WITH CLOUD COMPUTING
FUTURE OF E-GOVERNANCE WITH CLOUD COMPUTING
 
Introduction to CORD project
Introduction to CORD projectIntroduction to CORD project
Introduction to CORD project
 
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
 
CORD: Central Office Re-architected as a Datacenter
CORD: Central Office Re-architected as a DatacenterCORD: Central Office Re-architected as a Datacenter
CORD: Central Office Re-architected as a Datacenter
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 

Similar to Cloud computing for enterprise

Masters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMasters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMohammed Hesham
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)Lustratus REPAMA
 
How will cloud computing transform technology
How will cloud computing transform technologyHow will cloud computing transform technology
How will cloud computing transform technologyTarunabh Verma
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingGoodzuma
 
1 cloudcomputing intro
1 cloudcomputing intro1 cloudcomputing intro
1 cloudcomputing introyogiman17
 
Cisco Cloud Computing White Paper
Cisco Cloud Computing White PaperCisco Cloud Computing White Paper
Cisco Cloud Computing White Paperlamcindoe
 
IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM India Smarter Computing
 
Cloudcomputing sun
Cloudcomputing sunCloudcomputing sun
Cloudcomputing sunNikkk20
 
Infrastructure To Cloud Transformation
Infrastructure To Cloud TransformationInfrastructure To Cloud Transformation
Infrastructure To Cloud TransformationMichael Graber
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideMarianne Harness
 

Similar to Cloud computing for enterprise (20)

Cloud
CloudCloud
Cloud
 
Masters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMasters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleem
 
Aws overview
Aws overviewAws overview
Aws overview
 
Aws overview
Aws overviewAws overview
Aws overview
 
AWS overview
AWS overviewAWS overview
AWS overview
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
 
How will cloud computing transform technology
How will cloud computing transform technologyHow will cloud computing transform technology
How will cloud computing transform technology
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
12023 cloud-computing-wp
12023 cloud-computing-wp12023 cloud-computing-wp
12023 cloud-computing-wp
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
1 cloudcomputing intro
1 cloudcomputing intro1 cloudcomputing intro
1 cloudcomputing intro
 
Cisco Cloud Computing White Paper
Cisco Cloud Computing White PaperCisco Cloud Computing White Paper
Cisco Cloud Computing White Paper
 
IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)
 
IBM Point of View: Security and Cloud Computing
IBM Point of View: Security and Cloud ComputingIBM Point of View: Security and Cloud Computing
IBM Point of View: Security and Cloud Computing
 
Pdf docu
Pdf docuPdf docu
Pdf docu
 
Cloudcomputing sun
Cloudcomputing sunCloudcomputing sun
Cloudcomputing sun
 
Infrastructure To Cloud Transformation
Infrastructure To Cloud TransformationInfrastructure To Cloud Transformation
Infrastructure To Cloud Transformation
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete Guide
 

More from Pravin Asar

Plm data migration_general_considerations
Plm data migration_general_considerationsPlm data migration_general_considerations
Plm data migration_general_considerationsPravin Asar
 
Total Quality Culture
Total Quality CultureTotal Quality Culture
Total Quality CulturePravin Asar
 
Strategic innovation
Strategic innovationStrategic innovation
Strategic innovationPravin Asar
 
Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.Pravin Asar
 
Strategic innovation
Strategic innovationStrategic innovation
Strategic innovationPravin Asar
 
Intellectual property in_federal_contracts
Intellectual property in_federal_contractsIntellectual property in_federal_contracts
Intellectual property in_federal_contractsPravin Asar
 
Economic Analysis: cloud_computing
Economic Analysis: cloud_computingEconomic Analysis: cloud_computing
Economic Analysis: cloud_computingPravin Asar
 
Agile methodologies in_project_management
Agile methodologies in_project_managementAgile methodologies in_project_management
Agile methodologies in_project_managementPravin Asar
 

More from Pravin Asar (8)

Plm data migration_general_considerations
Plm data migration_general_considerationsPlm data migration_general_considerations
Plm data migration_general_considerations
 
Total Quality Culture
Total Quality CultureTotal Quality Culture
Total Quality Culture
 
Strategic innovation
Strategic innovationStrategic innovation
Strategic innovation
 
Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.
 
Strategic innovation
Strategic innovationStrategic innovation
Strategic innovation
 
Intellectual property in_federal_contracts
Intellectual property in_federal_contractsIntellectual property in_federal_contracts
Intellectual property in_federal_contracts
 
Economic Analysis: cloud_computing
Economic Analysis: cloud_computingEconomic Analysis: cloud_computing
Economic Analysis: cloud_computing
 
Agile methodologies in_project_management
Agile methodologies in_project_managementAgile methodologies in_project_management
Agile methodologies in_project_management
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cloud computing for enterprise

  • 1. CLOUD COMPUTING FOR ENTERPRISE CLOUD COMPUTING FOR ENTERPRISE Pravin K Asar PRAVIN K ASAR pravinasar.comPage 1
  • 2. CLOUD COMPUTING FOR ENTERPRISE Table of Contents Abstract ......................................................................................................................................................... 4 Introduction .................................................................................................................................................. 5 History of Cloud Computing .......................................................................................................................... 5 Grid Computing ......................................................................................................................................... 6 Virtualization ............................................................................................................................................. 6 Hosting ...................................................................................................................................................... 6 SaaS ........................................................................................................................................................... 6 Utility computing ...................................................................................................................................... 6 Attributes and Taxonomy of Cloud Computing ............................................................................................ 9 Public vs. Private Clouds ........................................................................................................................... 9 Public Cloud ............................................................................................................................................ 10 Private Cloud ........................................................................................................................................... 11 Hybrid Cloud ........................................................................................................................................... 11 Service Categories: .................................................................................................................................. 11 The Promise of Cloud Computing ............................................................................................................... 12 Elastic Scalability ..................................................................................................................................... 13 Agility ...................................................................................................................................................... 13 Reliability and Fault-Tolerance ............................................................................................................... 13 Shared Multi-tenancy ............................................................................................................................. 13 Service-oriented ...................................................................................................................................... 13 Utility-based ............................................................................................................................................ 13 SLA-driven ............................................................................................................................................... 13 APIs.......................................................................................................................................................... 14 Benefits for the Enterprise.......................................................................................................................... 14 Competitive Advantage .......................................................................................................................... 14 Cost Savings ............................................................................................................................................ 14 Risks to Enterprise ...................................................................................................................................... 15 Security, Privacy and Compliance ........................................................................................................... 15 Risk Mitigation: ....................................................................................................................................... 16 PRAVIN K ASAR pravinasar.comPage 2
  • 3. CLOUD COMPUTING FOR ENTERPRISE Security: .................................................................................................................................................. 17 Privacy/Compliance: ............................................................................................................................... 17 Cloud Computing and Changing Marketplace: ........................................................................................... 17 The Future Trends ....................................................................................................................................... 18 Typical Attributes of Applications Suitable for External Clouds ............................................................. 19 Additional Typical Attributes of Applications Suitable for Software as a Service .................................. 19 Conclusion ................................................................................................................................................... 20 References: ................................................................................................................................................. 21 PRAVIN K ASAR pravinasar.comPage 3
  • 4. CLOUD COMPUTING FOR ENTERPRISE Abstract The enterprise landscape is rapidly changing. Data is ubiquitous. Information is flowing into an organization’s applications from more sources than ever before. Business expectations are also changing. Corporations today demand speed and flexibility from their applications. Enterprise want services that allow them to make better business decisions, create more satisfied customers, and react ever more quickly to evolving market conditions. Current economic circumstances and increased competition are also driving the demand for a more effective model to deliver applications and services. This relentless push for a faster, better and more cost-effective technology delivery model has set the stage for new approaches to application development, deployment and management. Several technologies such as grid computing, virtualization, and serviceoriented architecture (SOA) have offered partial solutions for enterprises that require applications with greater scalability, agility and easier management capabilities. However, these alone have not been enough. Enter cloud computing, an innovative model for delivering IT infrastructure, applications and data that shifts the emphasis from static, stand-alone application silos to dynamic, shared environments, dynamically allocated among various tasks and accessed via a network. Today, many forward-thinking enterprises are using cloud environments to take advantage of the increased scalability, agility, automation, and efficiency that this technology can deliver. Yet, because cloud computing has evolved so quickly, there are still many questions surrounding it. To understand the promise of cloud computing, decision makers and IT professionals must examine its development and benefits from an enterprise perspective. Beginning with the origins of cloud computing, this paper will help define exactly what cloud computing is and how the enterprise can benefit from it. In doing so, the paper outlines a number of “cloud characteristics” which together illustrate the true potential of cloud computing and provide a framework for assessing current and future cloud offerings. Finally, the paper draws a distinction between infrastructure-oriented clouds and platform-oriented clouds and explains how cloud platforms allow end-user applications to unlock the true promise of cloud computing. PRAVIN K ASAR pravinasar.comPage 4
  • 5. CLOUD COMPUTING FOR ENTERPRISE Introduction The term cloud computing has quickly grown from a little-known buzzword into one of the hottest topics in IT today. This surge in interest has led to a great deal of confusion about what cloud computing is and how to apply it to the enterprise. This is particularly true for large organizations, which have much to gain from cloud computing if done correctly. A number of computing researchers and practitioners (Cloud Expo: Twenty-one Experts Define Cloud Computing, 2009)have attempted to define Clouds in various ways. Barrie Sosnisky (2011) defines Cloud computing as “an applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards. It is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted from the user.” Buyya, Chee and Venugopal (2008) define "Cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers.” History of Cloud Computing The concept of cloud computing can be traced back to ideas such as utility computing (Buyya, Broberg and Goscinski,2011), which envisioned a future where packaged information technology services would be metered and delivered to customers much like electricity, gas and water. Over the past decade, the rise of pervasive network computing has provided plenty of working examples that approach the utility computing vision. Cloud computing is the convergence of many independent computing trends. Early attempts to define cloud computing have tended to do so relative to existing technologies, such as grid computing, virtualization, hosting, SaaS and utility computing (Cafaro, Aloisio, 2011). To better understand the cloud and the characteristics that cloud users want to achieve for their applications, it is helpful to examine these technologies. While these technologies have contributed to the development of the cloud, they also fall short of the ultimate promise of cloud computing. PRAVIN K ASAR pravinasar.comPage 5
  • 6. CLOUD COMPUTING FOR ENTERPRISE Grid Computing Grid computing has become synonymous with scalability, and most grid environments are shared resources. However, the complexity of traditional grid computing tools severely limits their agility. And while they are typically shared, they are usually not multi-tenant in that multiple applications are not able to simultaneously run on the grid. Traditional grids are also lacking with regard to their ability to provide reliability and meet service layer agreements (SLAs). Virtualization By decoupling virtual machines from physical machines, server virtualization can dramatically increase the flexibility and agility of an IT organization. Yet virtualization alone fails to solve the fundamental scalability and reliability problems for applications. In addition, virtualization typically lacks the automation required for the self-service, self-healing functionality of a cloud. Hosting Hosting services provide outsourced space on servers in a datacenter and, in fact, many hosting companies have entered the cloud computing marketplace. However, these companies typically differentiate their cloud offerings from traditional hosting in that their hosting solutions are delivered in an on-demand, self-service, and API accessible manner. SaaS Although software-as-a-service offerings are often hosted in cloud environments, SaaS itself primarily refers to the business model of delivering applications as-a-service. Utility computing In the utility computing model, computing infrastructure and applications are packaged and sold as a service, like electricity. In many respects, cloud computing is closely tied to the utility computing business model, with cloud computing being a broader concept that relates to the underlying architecture in which the services are designed and delivered. While all of these technologies have helped to enable cloud computing, attempts to view cloud based solely on these individual solutions misses many of its main points. Table 1 below summarizes the key features and misses of these computing technologies. PRAVIN K ASAR pravinasar.comPage 6
  • 7. CLOUD COMPUTING FOR ENTERPRISE Table 1 Computing Technology, Key Feature and Misses Computing Technology Traditional Grid Computing Key Feature Job scheduling across many machine for computational applications Virtualization Virtual machines decouple operation system from hardware. Computational infrastructure available for rent Application availability through the internet (cloud) Packaged computing, application, and storage sold as service Hosting Software-as-a-Service(SaaS) Utility computing What’s missing? Difficult to administer; Lacks agility, robustness and broad applicability of cloud computing Virtual machines fail to fundamentally solve scale and reliability concerns Lacks on-demand services SaaS is an application on the cloud, not a cloud by itself. Describes a business model, not technology approach or architecture. Cloud computing is in fact the evolution and convergence of these seeming independent computing trends (Figure 1), resulting in a new style of computing in which the whole is greater than the sum of its parts. Source: Chapter 1: Introduction to Cloud Computing; William Voorsluys, JamesBroberg and Rajkumar Buyya, CloudComputing Principles and Paradigms, 2011 Figure 1 Convergence of various advances leading to the advent of cloud computing PRAVIN K ASAR pravinasar.comPage 7
  • 8. CLOUD COMPUTING FOR ENTERPRISE With the commoditization and standardization of hardware and operating systems, the growing deployment of virtualization, the rise of service oriented architectures (SOAs), and the Web’s astounding growth and the lessons learned about providing common enterprise services delivered through hardware, software and network sharing, businesses have become more easily creative about sharing the IT/IS infrastructure (Figure 2). Source: Bojanova, 2011; Analysis of Cloud Computing Delivery Architecture Models Figure 2Evolution of Sharing on the Cloud Cloud computing makes the long-held dream of utility computing possible with a pay-asyou-go, infinitely scalable, universally available system. With cloud computing, you can start very small and become big very fast. Software deployment lead times are drastically reduced. From this point of view cloud computing is revolutionary, even if the technology it is built on is evolutionary. Cloud computing is real paradigm shift in a way Information Systems are used by enterprise. Cloud computing provides various information system usage options targeted towards a highly efficient way for an organization to deliver and consume IT infrastructure, applications and services. In its simplest form, cloud computing came from the computing model famously used by Web giants such as Amazon and Google to deliver their own services to customers. The cloud computing evolution was fueled by popularization of the Internet technologies and the growth of some large service companies with the objective of resource (hardware and software and infrastructure) sharing. PRAVIN K ASAR pravinasar.comPage 8
  • 9. CLOUD COMPUTING FOR ENTERPRISE Attributes and Taxonomy of Cloud Computing As we discussed earlier, with cloud computing, the services and data reside in shared resources in scalable data centers, and those services and data are accessible over the Internet. The physical cloud resources may reside in a number of locations (external or internal to enterprise), the details of which are not typically known to the users. Cloud resources are typically offered as a service on an as-needed basis, and delivered by IPbased connectivity. The cloud itself typically consists of large numbers of commodity-grade servers, harnessed to deliver highly scalable and reliable on-demand services. It’s important to understand that cloud computing is an evolving paradigm ultimately defined by developers and early adopters. While it’s important to have a good working definition of cloud computing, a more complete understanding of cloud computing requires an examination of its functional attributes. It is these characteristics that define the true value of cloud computing for the enterprise. Some key attributes (Intel, 2009) that distinguish cloud computing from conventional computing. The cloud computing offerings are: Abstracted and offered as a service. Built on a massively scalable infrastructure. Easily purchased and billed by consumption. Shared and multi-tenant. Based on dynamic, elastic, flexibly configurable resources. Accessible over the Internet by any device. Most of the time cloud computing is offered by service providers, although it is possible to build an internal IT environment with cloud computing characteristics. Public vs. Private Clouds One commonly disputed point about cloud computing is the notion of public vs. private clouds. Some cloud computing practitioners, particularly the cloud service providers, assert that in order for an IT environment to be a true cloud, it must be delivered via a third party and accessed via the Internet. Still others believe, as we do, that the true measure of a cloud is the extent to which it achieves characteristics such as those outlined above. PRAVIN K ASAR pravinasar.comPage 9
  • 10. CLOUD COMPUTING FOR ENTERPRISE Source: http://www.esri.com/technology-topics/cloud-gis/public-vs-private.html Figure 3 Public, Private and Hybrid Cloud As enterprise leaders look to cloud computing as a way to accelerate growth and gain a competitive advantage they must choose whether they’d like their cloud administered by a third party offering ‘public’ cloud services, or to deploy their own ‘private’ cloud that resides within their organization’s firewall. Here’s a brief explanation of the advantages and disadvantages of each: Public Cloud Public clouds appeared first on the horizon and have helped define cloud computing best practices. As its name implies, a public cloud computing environment is open for use by the general public, which could include individuals, corporations or other types of organizations. Amazon EC2 is an example of a public cloud because it is available for use by the general public. However, due to the shared nature of cloud environments, security is a serious issue with public clouds. Concerns about compliance, governance and reliability also plague public cloud service providers. As an example, Amazon’s S3 service was recently down for eight hours due to authentication issues. At the same time, public clouds are successfully employed by many enterprises today. For example, public clouds are widely used to affordably accelerate enterprise application development and testing. Likewise, they are often used for large-scale projects, such as the New York Times archive project which used 100 Amazon EC2 instances and 5.5TB of S3 storage to generate PDFs of 11 million articles for the paper’s archives, at a small fraction of traditional costs. PRAVIN K ASAR pravinasar.comPage 10
  • 11. CLOUD COMPUTING FOR ENTERPRISE Private Cloud In contrast, a private cloud computing-like environment exists within the boundaries of an organization, typically for its exclusive usage. To make a nontechnical analogy, private cloud computing is like owning your own car, instead of using public transportation. Public transportation, while extremely efficient and cost effective, has not completely replaced personal automobile ownership for many obvious reasons. Hybrid Cloud It’s clear that both public and private environments have their advantages and disadvantages. But both types of cloud computing offer the major benefits of reduced costs, simplified maintenance and management, along with greatly extended scalability. At a same time enterprise is concerned about the security of data. Hence many believe that the sweet spot for cost optimization in an organization will rely on a delicate balance of public, or community, and private clouds. However, since this hybrid cloud solution is commonly bound together by proprietary technology. Service Categories: Main categories of service that fall within our broad cloud computing definition are summarized below. Software as a service (SaaS) Software deployed as a hosted service and accessed over the Internet. Platform as a service (PaaS) Platforms that can be used to deploy applications provided by customers or partners of the PaaS provider. Infrastructure as a service (IaaS) Computing infrastructure, such as servers, storage, and network, delivered as a cloud service, typically through virtualization. Cloud computing architecture (Figure 4) as defined by National Institute of Standards and Technology (NIST) is good reference particularly for IT professionals. PRAVIN K ASAR pravinasar.comPage 11
  • 12. CLOUD COMPUTING FOR ENTERPRISE Figure 4 Cloud Computing Reference Architecture Crandell (2011) attempts to answers few concerns about the implementation of cloud computing for an enterprise. The Promise of Cloud Computing Cloud computing offers a new level of capability, flexibility and manageability for enterprise IT infrastructure and the applications that run on it. The enhanced capabilities promised by the cloud can be understood as a set of ideal characteristics that cloud users want to ultimately achieve for their applications. These characteristics include: PRAVIN K ASAR pravinasar.comPage 12
  • 13. CLOUD COMPUTING FOR ENTERPRISE Elastic Scalability Cloud environments allow businesses to serve larger audiences; solve bigger, more challenging problems; access incremental compute resources on-demand; and reduce the risk of new projects by starting small and growing as the need develops. Agility As a shared resource, the cloud improves efficiency by allowing users to have multiple applications share the cloud environment and by providing flexible, automated management to distribute the computing resources among the cloud’s users and their applications. Reliability and Fault-Tolerance Cloud environments take advantage of the built-in redundancy of the large numbers of servers that make them up, enabling high levels of availability and reliability for applications—providing a better customer experience and eliminating disruption to business due to infrastructure failure. Shared Multi-tenancy By enabling IT resources to be consolidated, multiple cloud users and/or applications share a common infrastructure, allowing for improved efficiency and costs to be more effectively managed without sacrificing the security of each user’s data. Service-oriented The cloud is a natural home for service-oriented applications, which need a way to easily scale as services get incorporated into other applications. This allows new applications to be brought to market more quickly, based on capabilities that have already been developed as services. Utility-based Users only pay for the cloud resources they use, either by subscription or transaction-based models. SLA-driven Clouds are managed dynamically based on service-level agreements that define policies like delivery parameters, costs, and other factors, so enterprises can rely upon a service or application once it has been published. Software and data PRAVIN K ASAR pravinasar.comPage 13
  • 14. CLOUD COMPUTING FOR ENTERPRISE security controls are controlled APIs Clouds virtualizes the resources as a service they must have an application programming interface (API). The API extends the cloud and its applications to desired level of customization enterprise may need to meet the business needs. Not every cloud environment (particularly private cloud) is able to achieve all of these characteristics simultaneously. In fact, many of these characteristics cannot be achieved through cloud infrastructure alone but rather must be addressed at the application level, either by its developers or by a cloud application platform upon which it runs. Benefits for the Enterprise Much of the excitement around cloud computing stems from the strong tangible and intangible benefits it offers to those companies that adopt it. Enterprises large and small, in a variety of industries, are implementing cloud computing platforms for their ability to be a significant source of both competitive advantage and cost savings. Competitive Advantage Cloud computing allows organizations to deliver highly-scalable and reliable applications more quickly and cost effectively. This yields tremendous advantage for enterprises that depend on or benefit from either large-scale or complex applications, whose load tends to arrive in short spikes. With cloud-based applications in place, these enterprises are freed to deliver new products to their customers more rapidly. Because they are able to ‘think big,’ unencumbered by the constraints of scale, they are also able to make better business decisions by applying sophisticated analyses to the wealth of data available within them. At the same time, the dramatic reduction in the complexity of the IT environment, the reduced provisioning times, and the ability to shift the allocation of cloud resources in response to changing market conditions creates a more flexible IT organization and a more agile enterprise. And because the enterprise is empowered to align IT infrastructure investments with project benefits, overall risk is reduced and the enterprise is able to invest in more strategic initiatives. Cost Savings Cloud computing offers public cloud users the ability to forgo capital investment for many PRAVIN K ASAR pravinasar.comPage 14
  • 15. CLOUD COMPUTING FOR ENTERPRISE IT projects, instead acquiring compute resources on-demand from a 3rd party cloud provider. Even those companies building their own clouds stand to benefit though, as a robust cloud computing environment allows enterprises to significantly drive reduced capital expenditures by enabling mission-critical applications to be deployed on inexpensive, commodity-grade servers. They further benefit by increasing the efficiency and utilization of the company’s computing resources. Cloud also helps the enterprise reduce operational costs by increasing the level of automation in the data center and reducing the cost to deploy applications. Cloud computing also offers good old-fashioned cost savings strategy of outsourcing. For example, public clouds administered by a third party vendor can deliver large-scale enterprise projects at a fraction of traditional costs. Likewise, enterprises adopting private clouds have begun to realize reduced capital costs due to their ability to take better advantage of today’s powerful commodity-grade hardware. At the same time, these organizations are lowering the total number of servers required due to increased efficiency. Enterprises also see lower recurring operational costs and administrative overhead due to the high levels of automation employed in cloud environments. Cloud computing offers enterprises a new level of scalability, agility and cost-effectiveness for their applications. But without a cloud platform, an organization’s applications will not reap the full benefit of cloud computing. Ultimately, the greatest advantages of cloud computing can only are realized if an organization’s applications are able to take advantage of the cloud’s inherent capabilities. For example, just because an organization is running its applications on Amazon’s EC2 does not mean those applications can scale like amazon.com. In order to take advantage of the full scalability, agility and reliability of the cloud, applications must be built on a cloud-enabled platform. Risks to Enterprise The features that make cloud computing so appealing, combined with the fact that services are publicly accessible, can also lead to many potential risks. Security, Privacy and Compliance Today, security and privacy may represent the biggest risks to moving services to external clouds. The advantages of cloud computing—flexibility, easy-to-use service abstractions, and shared infrastructure also introduce the concern that people may use cloud computing in a way that puts enterprise information and intellectual property at risk. As regarding the information security of cloud computing, those issues related with the application and service of cloud computing must be deeply concerned such as the PRAVIN K ASAR pravinasar.comPage 15
  • 16. CLOUD COMPUTING FOR ENTERPRISE equipment security of the client side, the threats of web site and webpage, the detection and diagnosis and surveillance of intrusion, the access and security of database on the cloud side, the detection of system leakage and the monitor of real-time repairing process, the management of server system, the management of mobile e-commerce processing, and the integrated analysis of associated security information and issues. With cloud computing, data is stored and delivered across the Internet. The owner of the data does not control and typically does not even know the location of the data. There is a very real possibility that the owner’s data could reside on the same resources as a competitor’s application and data. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Enterprises cannot rely solely on contractual controls with cloud service providers. In many cases, these controls do not provide adequate protection. It would be difficult or even impossible to use a public cloud for applications that handle controlled technologies, due to the risk of potential compromises and concerns about compliance. For example, external data storage provided by a cloud service supplier might be located in a controlled country to reduce cost. Standards are lacking for security and for managing service-level agreements (SLAs) that could be used to help ensure compliance with government regulations and standards through independent, third-party audits. Enterprise security policies may stipulate, for example, that all data held externally must be encrypted in transit and at rest. In addition, IT policies may specify that virtual servers supporting certain applications must not share the same physical server. In general, cloud providers do not currently provide capabilities to guarantee compliance with these policies or facilities for auditing compliance. There are also questions about the extent to which cloud providers would accept legal responsibility, and the damages that could be assessed, in the event of a proven breach of contract involving a security issue. In many countries, the use and storage of personal data is heavily regulated; without adequate safeguards, this data could be illegally exposed with an external cloud. Applications implemented within our internal environment are relatively easy to audit, and we have well-established techniques for doing this. However, applications implemented outside the enterprise firewall would be much more difficult to audit. As a result, we might be unable to determine whether applications developed and running outside our firewall had received up-to-date security patches or were otherwise vulnerable to compromise. An additional area of concern is the secure integration of business data generated in an external cloud with existing data stored within enterprise environment. Risk Mitigation: PRAVIN K ASAR pravinasar.comPage 16
  • 17. CLOUD COMPUTING FOR ENTERPRISE It is difficult to determine how well a provider is mitigating data location, loss, or security oriented risks. In fact, some providers have simply gone out of business. Consequently, requirements for data protection should be strictly governed through the use of contractual service level agreements. Legacy Applications: Core business applications are often highly customized, convoluted, and entangled. As a result, prior to moving them to the cloud a re-engineering effort is often required to modernize and rationalize an applications portfolio before it is deemed "cloudworthy." Security: Commercial cloud providers offer broad access to end users and accordingly roles and access permissions are less controllable. Legacy security measures must be duplicated within the cloud such as firewalls and intrusion detection. Virtualization greatly adds to the complexity of this process and provides new threats in areas such as virtual switches and hypervisors. Privacy/Compliance: Issues related to privacy include jurisdiction of information (where and under what set of laws), access and controls, the availability of audit trails, and compliance with industry and legal standards and regulations, should be addressed. A private cloud enables customers to leverage many of the benefits of cloud computing within its own data center facilities. This cloud infrastructure model is ideal for clients subject to stringent privacy restrictions (banks, government, etc.). However, a private cloud will provide little to no immediate cost savings due to the investments required in technologies. Cloud Computing and Changing Marketplace: No doubt cloud computing can offer compelling advantages for the enterprise as user of the services. Even software product companies are also benefitting from this evolution. Software product companies have turned to cloud computing for its ability to help bring new, more sophisticated applications to market more rapidly, and to scale those applications more easily—creating true competitive advantage in today’s challenging economy. Microsoft office365, Google Apps, NetSuite, Zoho productivity suite are some noteworthy examples. Most of application suite in the market is being not only by enterprise, but also by small businesses, home and home office users. PRAVIN K ASAR pravinasar.comPage 17
  • 18. CLOUD COMPUTING FOR ENTERPRISE At the same time, perpetual licensing models are beginning to fall by the wayside as many services such as network security management, data center hosting or even departmental billing are now delivered on a pay-per-use basis. Complex capabilities of all types are now available on demand to enterprises and individuals alike. Newly formed business models, such as software-as-a-service (SaaS), have allowed forward-looking software firms to build their companies on delivering these shared services. Today, examples abound of companies offering utility services falling under the “cloud” banner. Amazon’s Elastic Compute Cloud (EC2) offers computational services that enable people to use CPU cycles without buying more computers. Storage services such as those provided by Amazon’s Simple Storage Service (S3) or companies like Nirvanix allow organizations to store data and documents without adding a single on-site server. SaaS companies like Salesforce.com deliver CRM services, so clients can manage their customer information without installing specialized software. All of these offerings have been described as cloud computing. True, they all seek to deliver massively scalable and elastic IT services for a decreasing cost. Cloud computing is also changing the way software development is done (in particular SaaS). Neil McAllister (January 2012) states the development of 10 new programming languages are aimed at improving the pain of internet based application development. The Future Trends Going forward, there is little doubt that various forms of cloud computing will play an increasingly important role for organizations seeking a competitive advantage. Enterprises that employ cloud application platforms—in either public or private cloud environments— will benefit from the increased scalability and agility of their cloud-based applications. Cloud platforms will also help them to significantly reduce time-to-market, realize substantial cost-savings and react more quickly to changing market conditions. Because of these clear benefits to IT departments and to an organization’s business goals, cloud computing is here to stay. And as it evolves from a buzzword at conferences to the key topic at corporate board meetings, cloud computing will continue to grow and deliver dramatic results for enterprises. Not all applications are suitable for external clouds today. Good candidates are applications that do not provide a competitive advantage, are not mission-critical, and are not tightly integrated with other important applications. To minimize security risks, they should not contain sensitive information. In general, the set of applications deemed to have low security risk should grow over time as more sophisticated techniques to secure cloud-based applications are developed. The key decision-making criteria are summarized below. PRAVIN K ASAR pravinasar.comPage 18
  • 19. CLOUD COMPUTING FOR ENTERPRISE Typical Attributes of Applications Suitable for External Clouds Do not deliver competitive advantage Are not mission-critical Are not core business applications Contain less-sensitive data Are minimally affected by network latency or bandwidth Additional Typical Attributes of Applications Suitable for Software as a Service Are at a natural re-engineering point in their lifecycles Have minimal customization Have industry-standard workflow (Khajeh-Hosseini et al, 2011) discussed thetools that aim to support decision making based on cost modeling and risk assessment during the migration of IT systems to the cloud. PRAVIN K ASAR pravinasar.comPage 19
  • 20. CLOUD COMPUTING FOR ENTERPRISE Conclusion Cloud computing is a game-changing (and may be a disruptive) technology that is set to change how IT systems are deployed because of its apparently cheap, simple and scalable nature.Furthermore, cloud computing could potentially eliminate many support- related issues since there would be no physical infrastructure to maintain. Despite these advantages, there are important socio-technical issues that need to be considered before enterprisecharts out the migration strategyof their IT systems to the cloud. Although the concept of Cloud computing has been around for a while in the industry, in recent years a number of technologies have been developed to realize the concept and make Cloud Computing more accessible. Various companies including large companies like Google, Microsoft, and Amazon, and many startups, are leading the most new exciting developments in cloud technologies today. Although most of the IT industry is ready to adopt these exciting new technologies, there are still many challenges to Cloud Computing reaching its full potential. One of the biggest challenges today is maintaining privacy and security of the data in the Cloud. A combination of innovative solutions and changes in regulations will soon address the security and privacy concerns. Enterprise needs to re-evaluate these criteria over time as the market matures Demand for Cloud Computing is growing as it enables on demand information technology services and products. The explosive growth of Cloud Computing is driven by and contributes to utility computing, on-demand computing, autonomic computing, and Green IT. PRAVIN K ASAR pravinasar.comPage 20
  • 21. CLOUD COMPUTING FOR ENTERPRISE References: Cloud Expo: Article; “Twenty-one Experts Define Cloud Computing”; January 2009; http://cloudcomputing.syscon.com/read/612375_p.htm; accessed on May 2, 2012 Barrie Sosnisky; Cloud Computing Bible; Wiley Publishing, Inc.; 2011 Rajkumar Buyya; James Broberg; Andrzej Goscinski; “Cloud Computing: Principles and Paradigms”; John Wiley & Sons, Inc; 2011 Massimo Cafaro; Giovanni Aloisio; “Grids, Clouds and Virtualization”; Springer; 2011 Buyya, R.; Chee Shin Yeo; Venugopal, S.; "Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities";High Performance Computing and Communications, 2008. 10th IEEE International Conference, vol., no.; pp.5-13, 25-27 Sept. 2008; URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4637675&isnumber=4 637649; accessed on April 29, 2012 Intel Corporation, “Developing an Enterprise Cloud Computing Strategy”; 2009, URL: http://www.intel.com/content/www/us/en/cloud-computing/software-as-aservice--saas-/intel-it-developing-cloud-computing-strategy-paper.html; accessed April 30, 2012 Michael Crandell; “Top Ten Cloud Computing & Virtualization Myths: How do you determine what’s really going to work for your organization?” Virtualization:Article;2011 URL: http://cloudcomputing.sys-con.com/node/1682883; accessed April 29, 2012 Khajeh-Hosseini, A; Sommerville, I; Bogaerts, J; Teregowda, P; "Decision Support Tools for Cloud Migration in the Enterprise," Cloud Computing (CLOUD), 2011 IEEE International Conference, vol., no., pp.541-548, 4-9 July 2011 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6008753&isnumber=6 008659; accessed April 20, 2012 Maluf, David A; Shetye, Sandeep D; Chilukuri, Sri; Sturken, Ian; , "Lost in Cloud," Aerospace Conference, 2012 IEEE , vol., no., pp.1-6, 3-10 March 2012 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6187354&isnumber=6 186985; accessed on April 20, 2012 Liu, F; Tong, J; Mao, J; Bohn, R B; Messina, J V; Badger, M L; Leaf, D M; “NIST Cloud Computing Reference Architecture”, 2011 URL: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909505; access on April 20, 2012 PRAVIN K ASAR pravinasar.comPage 21