SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Cloud Computing
             Status, Trends and Challenges

                       John Rhoton
                    Beamap Petit Déjeuner
                       24 January 2013

                                              rhoton@gmail.com
24/01/2013               John Rhoton – 2013               1
Agenda
 •    Status
 •    Hybrid Cloud
 •    Adoption Barriers
 •    Trends




24/01/2013            John Rhoton – 2013   2
Cloud Essence
 •  Simple definition: “resource pooling”
 •  Attributes
      –  Virtualization, Multi-tenancy, Automation, Self-service,
         Internet Delivery, Elasticity, On-demand provisioning,
         Utility Pricing, Service Orientation, Outsourcing…
 •  Benefits
      –  Cost Reduction
      –  Increased Revenue (Agility)
      –  Faster Growth (Focus)

24/01/2013                   John Rhoton – 2013                     3
Emotional vs Factual
 •  Fear, Uncertainty and Doubt
 •  Increased Effort
      –  Evaluation
      –  Negotiation
      –  Integration
      –  Implementation
 •  Reduce CAPEX benefits
             Plan early, think objectively
24/01/2013                John Rhoton – 2013   4
Status
 •  Startups start with cloud
      –  Small, no legacy, unpredictable growth
 •  Enterprise
      –  Short term: Dev/test, Collaboration, Security,
         New outbound services
      –  Long term: Private-> Hybrid -> Public



24/01/2013                 John Rhoton – 2013             5
Private Cloud Optimization
 •  Resource Efficiencies
      –  Virtualization
 •  Operational Efficiencies
      –  Automation, Chargeback
 •  Sourcing Efficiencies
      –  Service Orientation, Modularization, Granular
         Security


24/01/2013                John Rhoton – 2013             6
Private Cloud Flexibility
                         Cloud
                        Provider

                                           Customers



 Business Units             IT



                                           Customers
                         Cloud
                        Provider




24/01/2013            John Rhoton – 2013               7
Hybrid Cloud Convergence




             Silo   Integrated              Dynamic




24/01/2013             John Rhoton – 2013             8
Barriers
 •    Data leakage
 •    Data loss
 •    Vendor lock-in
 •    Service loss
 •    Compliance



24/01/2013              John Rhoton – 2013   9
Risk Treatment

     High
     Probability
                                               Eliminate
                        Resilience




                                         Business
                                        Continuity
     Low Probability



                        Low Impact          High Impact

24/01/2013                      John Rhoton – 2013         10
Risk Mitigation Options
         Data Leakage                          Provider Assessment

             Data Loss                         Contract Negotiation

         Service Loss                              Encryption

     Service Impairment                         Additional Backup

              Lock-In                            Standardization

    Damaged Reputation                            Multi-sourcing



24/01/2013                John Rhoton – 2013                          11
Shifting Trust
                            Employees	
                          Contractors	
  
•  Personal observation
                                                                          Segmenta(on	
  
•  Personal experience
•  Insight                                                                Access	
  controls	
  
                      Partners	
                                 Suppliers	
  


                                         Auditors	
  
•  Public verification
•  Contracts                             Public	
  Scru:ny	
                  Encryp(on	
  
•  Compensation                                                               Access	
  controls	
  
                                     Experts	
  
                                     Legal	
  Counsel	
  

                       Adapt Corporate Culture
   24/01/2013                           John Rhoton – 2013                                         12
Threat Vectors
                                                             1
                 Host                         Host
                           3
                Guest              Guest             Guest
                                                 6

                Guest              Guest             Guest       2


                               4             5




             Increase Monitoring Scope and Depth
24/01/2013                     John Rhoton – 2013                    13
Compliance
             Global Internet versus National Laws




                  Enforce Logical Barriers
24/01/2013                 John Rhoton – 2013       14
Identity Federation
 Identity challenges
 •  Password
    proliferation
 •  Weak
    authentication
 •  Support costs
 •  User
    productivity
     Implement Identity Standards (SAML, SCIM)
24/01/2013             John Rhoton – 2013        15
Confidentiality
 •  Data Governance
      –  Data loss prevention


 •  Compartmentalization

 •  Encryption


      Classify data, Select and Combine Options
24/01/2013                 John Rhoton – 2013     16
Redundancy
 •  Dimensions
      –  Physical
      –  Geographical
      –  Technological
      –  Organizational
 •  Horizontal Scalability
 •  ACID     (Atomic Consistent Isolated Durable)


    => BASE          (Basic Availability, Soft-state, Eventual consistency)


                              Architect for scale
24/01/2013                                    John Rhoton – 2013              17
Business Continuity
 •    Cold Site
 •    Warm Site
 •    Hot Site
 •    Double-Active




        Multi-dimensional redundancy is critical
24/01/2013              John Rhoton – 2013         18
Lock-in vs. Cloud Stacks




      Proprietary        Proprietary                    Open    Consortium
       Hardware           Software                     Source     Driven


                    Balance ease with flexibility
24/01/2013                        John Rhoton – 2013                         19
Summary
 •    Private cloud is the starting point
 •    Public cloud is the final destination
 •    Multiple stages of hybrid cloud in between
 •    Security challenges real but addressable
 •    Redundancy is critical for availability



24/01/2013             John Rhoton – 2013          20
Contact Details
   Feel free to reach out to me at:                           Contact Beamap:
            rhoton@gmail.com                                     Patrick Joubert
             +43 699 18662050                                   Directeur Associé
              linkedin/in/rhoton                           patrick.joubert@beamap.fr
                                                                +33 6 64 16 75 20




          or look me up at:
        amazon.com/author/rhoton
             slideshare.net/rhoton
                                                              www.beamap.fr




24/01/2013                            John Rhoton – 2013                               21

Weitere ähnliche Inhalte

Andere mochten auch

Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens NimisJensNimis
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingACMBangalore
 
Cloud Computing - Challenges & Opportunities
Cloud Computing - Challenges & OpportunitiesCloud Computing - Challenges & Opportunities
Cloud Computing - Challenges & OpportunitiesOwen Cutajar
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud ComputingNephoScale
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computingOneserve
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Andere mochten auch (12)

Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens Nimis
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Cloud Computing - Challenges & Opportunities
Cloud Computing - Challenges & OpportunitiesCloud Computing - Challenges & Opportunities
Cloud Computing - Challenges & Opportunities
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
The history of cloud computing
The history of cloud computingThe history of cloud computing
The history of cloud computing
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Ähnlich wie Cloud Computing Challenges - Beamap

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotoninevitablecloud
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointWalter Liu
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Emily2014
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Alan McSweeney
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing itnewsafrica
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsResilient Systems
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateJTLeekley
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentationsDefence and Security Accelerator
 
Data anywhere anytime
Data anywhere anytimeData anywhere anytime
Data anywhere anytimepatmisasi
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessmentsCary Sholer
 
Social media in a broker dealer environment - BDI 3/19/13 Social & Mobile Fi...
Social media in a broker dealer environment  - BDI 3/19/13 Social & Mobile Fi...Social media in a broker dealer environment  - BDI 3/19/13 Social & Mobile Fi...
Social media in a broker dealer environment - BDI 3/19/13 Social & Mobile Fi...Business Development Institute
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Designing Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural MetamorphisisDesigning Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural MetamorphisisMichelle Caldwell, PSM, SSGB
 
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...Andrew Leo
 

Ähnlich wie Cloud Computing Challenges - Beamap (17)

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
 
Digital trends rhoton-20111205
Digital trends rhoton-20111205Digital trends rhoton-20111205
Digital trends rhoton-20111205
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 Update
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
Data anywhere anytime
Data anywhere anytimeData anywhere anytime
Data anywhere anytime
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
 
Social media in a broker dealer environment - BDI 3/19/13 Social & Mobile Fi...
Social media in a broker dealer environment  - BDI 3/19/13 Social & Mobile Fi...Social media in a broker dealer environment  - BDI 3/19/13 Social & Mobile Fi...
Social media in a broker dealer environment - BDI 3/19/13 Social & Mobile Fi...
 
Forecast odcau7 100_ak2
Forecast odcau7 100_ak2Forecast odcau7 100_ak2
Forecast odcau7 100_ak2
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Designing Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural MetamorphisisDesigning Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural Metamorphisis
 
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
 

Mehr von John Rhoton

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Mehr von John Rhoton (16)

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Cloud Computing Challenges - Beamap

  • 1. Cloud Computing Status, Trends and Challenges John Rhoton Beamap Petit Déjeuner 24 January 2013 rhoton@gmail.com 24/01/2013 John Rhoton – 2013 1
  • 2. Agenda •  Status •  Hybrid Cloud •  Adoption Barriers •  Trends 24/01/2013 John Rhoton – 2013 2
  • 3. Cloud Essence •  Simple definition: “resource pooling” •  Attributes –  Virtualization, Multi-tenancy, Automation, Self-service, Internet Delivery, Elasticity, On-demand provisioning, Utility Pricing, Service Orientation, Outsourcing… •  Benefits –  Cost Reduction –  Increased Revenue (Agility) –  Faster Growth (Focus) 24/01/2013 John Rhoton – 2013 3
  • 4. Emotional vs Factual •  Fear, Uncertainty and Doubt •  Increased Effort –  Evaluation –  Negotiation –  Integration –  Implementation •  Reduce CAPEX benefits Plan early, think objectively 24/01/2013 John Rhoton – 2013 4
  • 5. Status •  Startups start with cloud –  Small, no legacy, unpredictable growth •  Enterprise –  Short term: Dev/test, Collaboration, Security, New outbound services –  Long term: Private-> Hybrid -> Public 24/01/2013 John Rhoton – 2013 5
  • 6. Private Cloud Optimization •  Resource Efficiencies –  Virtualization •  Operational Efficiencies –  Automation, Chargeback •  Sourcing Efficiencies –  Service Orientation, Modularization, Granular Security 24/01/2013 John Rhoton – 2013 6
  • 7. Private Cloud Flexibility Cloud Provider Customers Business Units IT Customers Cloud Provider 24/01/2013 John Rhoton – 2013 7
  • 8. Hybrid Cloud Convergence Silo Integrated Dynamic 24/01/2013 John Rhoton – 2013 8
  • 9. Barriers •  Data leakage •  Data loss •  Vendor lock-in •  Service loss •  Compliance 24/01/2013 John Rhoton – 2013 9
  • 10. Risk Treatment High Probability Eliminate Resilience Business Continuity Low Probability Low Impact High Impact 24/01/2013 John Rhoton – 2013 10
  • 11. Risk Mitigation Options Data Leakage Provider Assessment Data Loss Contract Negotiation Service Loss Encryption Service Impairment Additional Backup Lock-In Standardization Damaged Reputation Multi-sourcing 24/01/2013 John Rhoton – 2013 11
  • 12. Shifting Trust Employees   Contractors   •  Personal observation Segmenta(on   •  Personal experience •  Insight Access  controls   Partners   Suppliers   Auditors   •  Public verification •  Contracts Public  Scru:ny   Encryp(on   •  Compensation Access  controls   Experts   Legal  Counsel   Adapt Corporate Culture 24/01/2013 John Rhoton – 2013 12
  • 13. Threat Vectors 1 Host Host 3 Guest Guest Guest 6 Guest Guest Guest 2 4 5 Increase Monitoring Scope and Depth 24/01/2013 John Rhoton – 2013 13
  • 14. Compliance Global Internet versus National Laws Enforce Logical Barriers 24/01/2013 John Rhoton – 2013 14
  • 15. Identity Federation Identity challenges •  Password proliferation •  Weak authentication •  Support costs •  User productivity Implement Identity Standards (SAML, SCIM) 24/01/2013 John Rhoton – 2013 15
  • 16. Confidentiality •  Data Governance –  Data loss prevention •  Compartmentalization •  Encryption Classify data, Select and Combine Options 24/01/2013 John Rhoton – 2013 16
  • 17. Redundancy •  Dimensions –  Physical –  Geographical –  Technological –  Organizational •  Horizontal Scalability •  ACID (Atomic Consistent Isolated Durable) => BASE (Basic Availability, Soft-state, Eventual consistency) Architect for scale 24/01/2013 John Rhoton – 2013 17
  • 18. Business Continuity •  Cold Site •  Warm Site •  Hot Site •  Double-Active Multi-dimensional redundancy is critical 24/01/2013 John Rhoton – 2013 18
  • 19. Lock-in vs. Cloud Stacks Proprietary Proprietary Open Consortium Hardware Software Source Driven Balance ease with flexibility 24/01/2013 John Rhoton – 2013 19
  • 20. Summary •  Private cloud is the starting point •  Public cloud is the final destination •  Multiple stages of hybrid cloud in between •  Security challenges real but addressable •  Redundancy is critical for availability 24/01/2013 John Rhoton – 2013 20
  • 21. Contact Details Feel free to reach out to me at: Contact Beamap: rhoton@gmail.com Patrick Joubert +43 699 18662050 Directeur Associé linkedin/in/rhoton patrick.joubert@beamap.fr +33 6 64 16 75 20 or look me up at: amazon.com/author/rhoton slideshare.net/rhoton www.beamap.fr 24/01/2013 John Rhoton – 2013 21