SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Facebook Meets the Virtualized Enterprise

 Roger Curry, Cameron Kiddle, Nayden Markatchev, Rob Simmonds, Tingxi Tan, Martin Arlitt
 and Bruce Walker
 HP Laboratories
 HPL-2008-72

 Keyword(s):
 social networking, Web 2.0, cloud computing

 Abstract:
 “Web 2.0” and “cloud computing” are revolutionizing the way IT infrastructure is accessed and
 managed. Web 2.0 technologies such as blogs, wikis and social networking platforms provide
 Internet users with easier mechanisms to produce Web content and to interact with each other.
 Cloud computing technologies are aimed at running applications as services over the Internet on
 a scalable infrastructure. They enable businesses that do not have the capital or technical
 expertise to support their own infrastructure to get access to computing on demand. They could
 also be used by large businesses to more efficiently manage their own infrastructure as an
 “internal cloud”.

 In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in
 an enterprise setting to provide employees with a comprehensive and transparent environment
 for utilizing applications. To demonstrate the effectiveness of this approach we have developed
 an environment that uses Facebook (a social networking platform) to provide access to the Fire
 Dynamics Simulator (a legacy application). The application is supported using Virtual
 Appliances that are hosted in an internal cloud computing infrastructure that adapts dynamically
 to user demands. Initial feedback suggests this approach provides a much better user experience
 than the traditional standalone use of the application. It also simplifies the management and
 increases the effective utilization of the underlying IT resources.




External Posting Date: July 6, 2008 [Fulltext] Approved for External Publication

Internal Posting Date: July 6, 2008 [Fulltext]

To be published in the 12th IEEE International EDOC Conference, Munchen, Germany, September 15-19, 2008

© Copyright 2008 the 12th IEEE International EDOC Conference
Facebook Meets the Virtualized Enterprise

            Roger Curry, Cameron Kiddle, Nayden Markatchev, Rob Simmonds and Tingxi Tan
                               Grid Research Centre, University of Calgary
                        {curry,kiddlec,nayden,simmonds,txtan}@cpsc.ucalgary.ca

                                           Martin Arlitt and Bruce Walker
                                                         HP Labs
                                         {martin.arlitt,bruce.walker}@hp.com


                         Abstract                                and increase online social connectivity. The popularity of
                                                                 social networking sites such as Facebook [6] is a clear indi-
   “Web 2.0” and “cloud computing” are revolutionizing
                                                                 cation of the perceived value of these technologies.
the way IT infrastructure is accessed and managed. Web
                                                                     We believe that an improved user experience would also
2.0 technologies such as blogs, wikis and social networking
                                                                 be beneficial in an enterprise setting, as it would make tasks
platforms provide Internet users with easier mechanisms to
                                                                 more enjoyable and less time consuming to complete. It
produce Web content and to interact with each other. Cloud
                                                                 would likely also appeal to the new generation of enterprise
computing technologies are aimed at running applications
                                                                 employees, who are intimately familiar with the Web 2.0
as services over the Internet on a scalable infrastructure.
                                                                 experience.
They enable businesses that do not have the capital or tech-
                                                                     However, such technologies have not been widely
nical expertise to support their own infrastructure to get ac-
                                                                 adopted in enterprises due to concerns over security, pro-
cess to computing on demand. They could also be used by
                                                                 ductivity and suitability in the workplace. In fact, many
large businesses to more efficiently manage their own in-
                                                                 businesses block employees from using social networking
frastructure as an “internal cloud”.
                                                                 sites at the workplace [24].
   In this paper we explore the advantages of using Web 2.0
and cloud computing technologies in an enterprise setting            The purpose of this paper is to (1) examine the lessons
to provide employees with a comprehensive and transpar-          we have learned from the Web 2.0 era, (2) articulate the
ent environment for utilizing applications. To demonstrate       needs of enterprises and (3) recommend an IT model that
the effectiveness of this approach we have developed an          merges the two in an acceptable manner. We have imple-
environment that uses Facebook (a social networking plat-        mented a demonstrator to illustrate the potential benefits to
form) to provide access to the Fire Dynamics Simulator (a        enterprises of the approach we are recommending.
legacy application). The application is supported using Vir-         The remainder of the paper is organized as follows. Sec-
tual Appliances that are hosted in an internal cloud com-        tion 2 describes lessons we have learned from the Web 2.0
puting infrastructure that adapts dynamically to user de-        era and Section 3 examines the IT requirements of enter-
mands. Initial feedback suggests this approach provides a        prises. Our proposed IT model, which leverages the benefits
much better user experience than the traditional standalone      of Web 2.0 while addressing the needs of enterprises, is pre-
use of the application. It also simplifies the management         sented in Section 4. Section 5 introduces our demonstrator,
and increases the effective utilization of the underlying IT     which highlights the utility of our approach. We conclude
resources.                                                       our paper in Section 6, with a summary of our work and
                                                                 future directions.


1. Introduction                                                  2. Lessons Learned from Web 2.0

   The “Web 2.0” era has brought us technologies such               In the past few years, the “Web 2.0” wave has provided
as blogs, wikis and social networking platforms. These           new, simple ways for users to create and share content or
technologies provide users more feature rich environments,       applications, and communicate with one another. These ca-
make it easier for users to generate and share Web content,      pabilities have been enabled by tools such as blogs, wikis,
and social networking platforms. Our particular interest is
in online social networking. Sites such as Facebook [6] and
MySpace [18] have become extremely popular with Inter-
net users, in part because of the simplified interfaces they
provide to desired capabilities. Simple yet powerful inter-
faces are extremely valuable as they make the power of IT
accessible to almost everyone, with little or no training re-
quired.
    The “Web 2.0” wave has also brought users “choice” of
applications. Among social networking sites, Facebook was
the first to release an application development platform in
May 2007. The Facebook Platform provides an API that al-
lows third party applications to be integrated into Facebook.
Users are easily able to access and share a large variety of
applications. By September of 2007 there were over 3,500
                                                                       Figure 1. Daily active users vs. rank of Face-
applications and as of April 2008 this number has increased
                                                                       book applications
to over 22,000. Consumers like choice of applications as
it enables them to personalize their experience, without re-
quiring application providers to do extra work.                     the company and do not want that information shared with
    As an indication of the perceived value of an application       the world.
development platform, many other social networking sites                At the opposite end of the spectrum, employees want an
have followed suit. Friendster [7], MySpace and hi5 [10]            easily accessible and complete set of tools that enables them
have recently launched their application development plat-          to more effectively do their jobs. Members of generation
forms and orkut [9] is in the process of rolling its out. The       Y are the new enterprise employees. They grew up with
Friendster, MySpace, hi5 and orkut platforms are or even-           the Internet and are quite familiar with social networking
tually plan to use the OpenSocial API [8] being developed           technologies. Use of these technologies in enterprise would
by Google. This is in contrast to the proprietary platform          therefore be very appealing to this new workforce.
being used by Facebook. Applications developed using                    In the middle is the corporate IT organization, which
the OpenSocial API will be able to have more rapid and              must try to support this conflicting set of requirements. A
widespread deployment on all of the sites that support the          common approach today is to make the IT infrastructure (in-
API.                                                                cluding applications) very static and controlled. This helps
    A major problem facing application developers for so-           reduce cost (the easiest goal to measure), but can limit flex-
cial networking platforms is that it is very difficult to pre-       ibility and restrict the tools available to users. Much of
dict the popularity and lifespan of applications. Figure 1          IT infrastructure is underutilized much of the time. Meth-
shows that most applications on Facebook are very unpopu-           ods to consolidate and make more efficient use of resources
lar; of the 15,036 applications that we had data for on April       are always being sought. Enabling business continuity re-
21, 2008, 13,838 (92%) had less than one thousand active            quires the maintenance of legacy applications which are
users, compared to the top 3 applications that had over one         typically not easily adapted to newer and more efficient IT
million active users. We expect a similar trend to exist for        management approaches. While many new technologies
applications in an enterprise. A flexible IT infrastructure to       are emerging, enterprises are more conservative than con-
support applications in a cost effective and scalable manner        sumers. They need slower migration paths in the adoption
is needed.                                                          of new technologies.
                                                                        Enterprises also have many concerns when it comes to
3. Requirements and Concerns of Enterprises                         adopting general consumer social networking platforms.
                                                                    Adoption of such platforms has been limited in enterprise
   We consider the requirements of enterprises from three           due to the lack of a professional feel, security concerns, and
different perspectives; CXOs (i.e., company executives),            access to applications that so far, are typically more of a
employees and IT organizations. CXOs have a variety of              distraction than benefit to the workplace. The lifecycle of
business goals that directly affect the way their IT infras-        applications is more dynamic and less predictable than en-
tructure is managed. These goals could include things such          terprises are used to dealing with. Furthermore, applica-
as “reduce costs”, “increase business flexibility” and/or            tions can be developed and shared by anybody so concerns
“provide business continuity”. CXOs are concerned about             over who continues to support and update applications be-
security and risk. They regard data as a significant asset of        comes an issue. Enterprises have typically had a great deal


                                                                2
of control over the application environment provided to em-         We realize that it may not be possible or appropriate to have
ployees.                                                            all applications accessible from the social networking plat-
    There are many social networking tools that have been           form initially. The goal would be to first migrate simple,
developed with enterprise users in mind. However, most              non-critical applications to this environment. Over time,
focus on networking, collaborating and/or sharing informa-          additional and more critical applications could be added.
tion and not on providing a platform for accessing applica-             On the IT management side, we propose that applica-
tions. Some of these tools include Huddle [11], Microsoft           tions be hosted with the aid of cloud computing technolo-
Office Sharepoint Server [17], VisiblePath [26], and solu-           gies. These technologies are aimed at scalable hosting of
tions from SelectMinds [23] and LeverageSoftware [14].              services in the Internet “cloud” transparent to the knowl-
Another enterprise centric social networking tool called            edge of the user. Example cloud computing offerings in-
LinkedIn [15] has recently released the Intelligent Applica-        clude Amazon Web Services (AWS) [1] and Sun Microsys-
tions Platform [16] that uses the OpenSocial API. LinkedIn          tems’s Network.com [25]. Both enable computing power to
still seems focused on networking and job searching but the         be purchased on an on-demand basis, with the ability to eas-
new platform could lead it in new directions. There have            ily scale services up or down as needed. This enables appli-
also been some efforts to make some of the general purpose          cations to be supported without the need to have an existing
social networking tools more appropriate for enterprise.            infrastructure and helps address the application popularity
Huddle has a Facebook application called Workspaces [12]            problem.
and WorkLight has a Facebook application called Work-                   The grand vision of cloud computing is that all appli-
Book [27], both aimed at enabling more secure use of Face-          cations will be supported remotely, and accessed on de-
book in an enterprise setting.                                      mand from the Internet. However, for the foreseeable fu-
    We argue that it is important to identify methods that          ture, many enterprises will be reluctant to relinquish that
make useful applications and services more accessible to            degree of control over their business. Instead, we propose
employees (to improve productivity), enable more rapid de-          that an “internal cloud” model be followed, allowing enter-
ployment and dynamic configuration of these services (to             prises to retain control, but at the same time place them on
increase flexibility), while allowing IT organizations to re-        the path that would facilitate simple migration to selected
tain or increase control over the infrastructure they manage        Internet-based cloud services.
(to maintain cost accountability). Solving these issues could           The internal cloud would be maintained as a static and
reshape how computing is done within enterprises.                   homogeneous set of physical resources. Applications would
                                                                    be packaged in Virtual Appliances that could be dynami-
4. IT Model                                                         cally launched to scale appropriately to the demands of pop-
                                                                    ular and not so popular applications. A Virtual Appliance
   In this section we first explain in more detail our pro-          is the combination of a virtual machine, custom operating
posed IT model for accessing and hosting applications for           system and application into a single image.
enterprises. We then discuss the benefits that this approach             Virtual machine technologies are employed in cloud
will have for enterprise employees, IT organizations and            computing solutions such as AWS. They make it possible
CXOs. Finally, we discuss some related efforts to our pro-          for a single physical machine to be transformed into mul-
posed approach.                                                     tiple virtual machines which can each be customized with
                                                                    their own specialized and streamlined operating system and
4.1. Proposed Approach                                              application software. The use of virtual machine technolo-
                                                                    gies provides many advantages. They allow for more ef-
    Figure 2 shows a diagram of our proposed IT model. It           ficient use of resources aiding in resource consolidation.
is based on the use of a number of existing technologies,           They also allow heterogeneous services to be supported in
the combination of which provides the potential for a revo-         a single physical environment. Furthermore, checkpoint-
lutionary improvement in enterprise IT.                             ing and migration capabilities allow movement of virtual
    On the user side we propose the use of a Facebook-like          resources among the physical nodes of a data centre en-
social networking platform that is more tailored to enter-          abling the accommodation of new service requests, system
prise use. Employees would be able to search, access and            maintenance without disrupting services and balancing of
use applications, share documents and other important in-           workload among data centre nodes.
formation, and maintain/establish contact with other em-                Social networking platforms like Facebook allow any-
ployees. Although some enterprises use portals that support         body to develop and share applications. This is in con-
some of these functionalities, the social networking aspects        trast to the current IT model where the IT organization is
are largely lacking, as well as the simplified interface to          very restrictive in the applications that are made available
(legacy) applications, the self/group help capabilities, etc.       to employees and who they are developed by. With the


                                                                3
Users

                 Social Networking
                    Platform

                  Applications                   A1                   A2                                  An



                   Virtual          A1            A1     A2            A1             A2            A4     A7            An
                  Appliances       OS C          OS C   OS B          OS C           OS B          OS D   OS C          OS A

                    Physical         hypervisor           hypervisor                   hypervisor           hypervisor
                     Nodes                OS A                 OS A                         OS A                 OS A

                                                  Figure 2. Proposed IT model

open model like Facebook a big concern for IT organiza-                      from others.
tions would be how and by whom applications continue to                         Second, exploiting social networking features will en-
be supported and upgraded. We propose a model some-                          able employees to leverage knowledge/expertise already in
where in between these two that balances the need for in-                    the enterprise, in as simple a way as possible. They will
creased choice by users and control by the IT organization.                  be able to more easily find and collaborate with other em-
   Ideally, developers of applications would provide pre-                    ployees that have similar expertise, are working on simi-
packaged Virtual Appliances with the applications and re-                    lar problems, or that have the expertise they need to aid in
lated components, as well as the interface for accessing the                 the completion of a task. They will be able to more eas-
application via the social networking platform. This may                     ily share documents, presentations, events and other infor-
not be possible initially, or for legacy applications that no                mation. This will provide employees with extra sources of
longer have development support. The IT organization or a                    knowledge and allow them to build on what others have
third party could be responsible for creating and maintain-                  done. It will help them to be better aware of what is go-
ing Virtual Appliances for these applications. With minimal                  ing on in the company and help improve their productivity.
effort these applications could be made accessible via the
social networking platform as is (i.e., using existing user                  4.3. Benefits for IT Organization
interfaces) by running a desktop sharing program such as
VNC [22] in the Virtual Appliance. Users could be pro-                           IT organizations will also greatly benefit from adoption
vided access to the VNC session and also provided with                       of the approach proposed in this paper. First, the approach
additional features to enable easier use of the application.                 aids in more efficient use of resources which could help to
                                                                             significantly reduce infrastructure costs. Instead of estab-
4.2. Benefits for Employees                                                   lishing the required infrastructure for each application sep-
                                                                             arately, which can result in many underutilized resources,
   Management of applications and IT infrastructure as pro-                  all applications can share the same infrastructure. The en-
posed in this paper could provide many benefits to employ-                    vironment is dynamic and flexible; it can quickly scale and
ees. First, the use of a social networking platform will en-                 adapt applications based on demand. Applications that are
able simpler use of applications. Employees will be pro-                     in high demand can be allocated a large number of resources
vided with a simple and intuitive interface for accessing ap-                and applications that are not popular can consume little or
plications, including legacy applications. All applications                  no resources.
will be accessible with a similar “look and feel” in a sin-                      Second, the approach allows IT to maintain control of
gle integrated environment. The technical details of where                   the infrastructure while avoiding the need to manage oper-
the application is running and how it is accessed will be                    ating systems. Instead, IT would be responsible for main-
transparent to the employee. Not only should it reduce the                   taining the underlying physical infrastructure and hypervi-
time and effort for an employee to learn how to use an ap-                   sors on which the Virtual Appliances will run. This will
plication, but it may enable employees to be comfortable                     be a relatively static, homogeneous environment, with dy-
in utilizing a much larger number of applications than they                  namics and heterogeneity pushed up into the virtualized en-
traditionally do. Employees will also be able to share expe-                 vironment. Virtual Appliances could automatically register
riences they have had with applications, rate them and learn                 with a management service, enabling IT to ensure the appli-


                                                                       4
ances are updated (i.e., patched) appropriately. This would         Considering the small domain that is being targeted, pop-
differ substantially from patching of operating systems han-        ularity of nanoHUB has really taken off with over 60,000
dled by IT today, as the developers of the applications, not        users from over 180 countries and over 270,000 simulations
IT, would be responsible for ensuring the patches worked            run in the past 12 months.
before deploying them to the IT infrastructure. This could
dramatically reduce support costs for IT. Testing would also        5. Fire Dynamics Simulator Demonstrator
be simplified, as the developers only need to test on the spe-
cific appliance platform that they use.
                                                                       To demonstrate the effectiveness of our proposed ap-
                                                                    proach we developed a comprehensive environment for the
4.4. Benefits for CXOs                                               Fire Dynamics Simulator (FDS) [20], a “legacy” applica-
                                                                    tion developed by NIST. Our environment makes use of so-
   Due to the numerous anticipated benefits to employees             cial networking technologies to provide a user interface and
and the IT organization, we expect that CXOs would also             an internal cloud computing infrastructure to host the appli-
see many benefits. With simplified access to a wider vari-            cation. The demonstrator runs on an HP BladeSystem C-
ety of applications productivity of employees could be in-          class environment. A video of the demonstrator is available
creased (not decreased, as is commonly feared). The more            at http://grid.ucalgary.ca/projects/DataCentre/.
efficient manner in which IT infrastructure is being man-
aged will allow costs to be reduced, business flexibility in-        5.1. Demonstrator Infrastructure
creased and business continuity supported all at the same
time. As the infrastructure is kept in control by the IT or-            Figure 3 shows the infrastructure used to support the
ganization, security and protection of valuable data is main-       demonstrator. One of our aims in developing the infrastruc-
tained.                                                             ture was to make use of as many existing tools as possible
                                                                    to simplify the development. The physical infrastructure
4.5. Related Efforts                                                 is homogeneous as is the platform for hosting the Virtual
                                                                    Appliances. We developed a Utility Provider Orchestrator
    In the general consumer and academic areas, there are           (UPO) to orchestrate the provisioning of virtual resources.
several related efforts that combine a social networking            It enables dynamic scaling of services based on the current
platform with cloud computing infrastructures. As far as            level of demand. The UPO makes use of PBS/Torque [4]
we know, there are no similar efforts being undertaken for          to manage the physical resources, Xen to virtualize the re-
enterprise.                                                         sources and Moab [3] to schedule the virtual resources. The
    Amazon has recently teamed up with Facebook to help             UPO, Moab and Torque all run on a Virtual Appliance (VA)
developers build scalable applications that can be run us-          as indicated in the diagram.
ing Amazon Web Services [2]. Joyent recently partnered                  There are three services supported by the infrastructure;
with Dell to provide a scalable on-demand infrastructure to         a Web interface for FDS, a service for running FDS simu-
launch Facebook and OpenSocial (only for hi5 currently)             lations and a service for running interactive Smokeview vi-
applications that can scale to millions of users [13]. Both         sualizations. Smokeview, also from NIST, is a companion
of these efforts apply to the general consumer area and are         tool to FDS for visualizing results. The Web interface is in-
examples where an external cloud computing infrastructure           tegrated into Facebook using the Facebook API. It interacts
is employed to support applications.                                with the FDS simulation and Smokeview visualization ser-
    Perhaps the most closely related work to what we are            vices. The FDS simulation service uses Condor to run sim-
suggesting is nanoHUB [19], a social networking platform            ulation jobs and the Smokeview visualization service uses
aimed at the nanoscience academic community. Users are              VNC to enable interactivity through a Web browser. Each
able to share publications, presentations, teaching materials       simulation node of the Condor pool and each visualization
and get access to large variety of nanoscience applications.        node is a Virtual Appliance with the necessary software in-
However, it currently lacks many of the social networking           stalled. Virtual Appliances are started from a clone of a
features common with Facebook and MySpace, and is tar-              pristine image (SimClone or VizClone), which is exported
geted at a specific domain. A prominent feature is the abil-         as an iSCSI target. OpenSolaris ZFS [21] is used to provide
ity to access and run a wide range of applications right from       clones of images. The appliances could be maintained by
your Web browser, transparent to the underlying computing           a third party. IT may require a list of software components
infrastructure that is used. nanoHUB makes use of local vir-        so that they can automatically determine which VAs need
tualized resources, TeraGrid, Open Science Grid, and any            updating or replacing.
other resources that it can get a hold of. VNC is used to               We developed Service Provider Agents (SPAs) for the
provide access to application GUIs and visualization tools.         FDS simulation service (SimSPA) and Smokeview service


                                                                5
Facebook (API)

                              FDS Simulation Service                 FDS Web Interface               Interactive Smokeview Service
                           CondorCM Sim     Sim      Sim                                                           Viz       Viz
                                                                             mySQL                       VizSPA
                            SimSPA Clone    Clone    Clone                                                         Clone     Clone
                                                                             Apache



                                                     UPO
                                            PBS     Moab           PBS                    PBS                      PBS
                                           MOM      Torque        MOM                    MOM                      MOM
                                                             VA          VA      VA             VA       VA                VA     VA
                   DHCP                    Dom0 VA                Dom0                   Dom0                     Dom0
                MAC addresses
                 iSCSI server                hypervisor             hypervisor              hypervisor              hypervisor
                Physical Node               Physical Node          Physical Node          Physical Node            Physical Node
         Private Network
                                                                                                                           Public Network



                                             Figure 3. FDS demonstrator infrastructure

(VizSPA) to communicate with the UPO and request or re-                      prise could provide improved user experiences for legacy
lease Virtual Appliances based on demand. If user demand                     applications, without modifying the legacy application in
for FDS or Smokeview increases, the corresponding SPA                        any way (which would require source code that likely isn’t
determines if additional resources are needed. If they are,                  available). This section continues by describing some of
the SPA contacts the UPO to request the allocation of an-                    these features.
other Virtual Appliance (i.e., the environment scales hori-
zontally). Similarly, if user demand subsides, the SPA may                   Personalization
scale down its environment, by handing resources back to
the UPO. All of this happens transparently to the user.                      Facebook provides users with a personalized environment
   For the demonstrator, the SimSPA requests a new Sim-                      and access to a list of user preferred applications. This list,
Clone Virtual Appliance for each new simulation request                      seen in the top left corner of Figure 4, enables quick access
that is made, up to a maximum allowed by policy. A Sim-                      to applications commonly used by the user. The FDS ap-
Clone is returned to the UPO once a simulation is done and                   plication (labeled “Fire Simulation”) is one of these appli-
there are no outstanding simulation requests. The VizSPA                     cations. Access to this application is restricted to a private
always attempts to maintain one “hot” VizClone Virtual Ap-                   group on Facebook that this user is a member of. Users are
pliance beyond that required by active visualizations (as                    also able to search for other available applications.
long as the number of VizClones does not exceed the maxi-
mum allowed by policy) to accommodate new visualization                      Social Networking
requests rapidly. IT maintains control of the policy for this
environment and can revise the policy if they notice an in-                  Users are provided with several mechanisms to share infor-
creased demand for a particular service. Moab has a well                     mation and interact with other FDS users. In addition to
established policy engine that can be used to enforce these                  the ability for a user to view their own simulations, a user
and other policy requirements.                                               can also view simulations created by all FDS users. This is
   More detail on the infrastructure we developed to sup-                    possible using the “My Simulations” and “All Simulations”
port the demonstrator can be found in [5].                                   options respectively in the view shown in Figure 4. The
                                                                             current view is showing the list of all simulations created
                                                                             by all users. The ability to access all simulations allows
5.2. Demonstrator Features                                                   users to share their results with others, discuss these results
                                                                             and provide other feedback that could be very beneficial for
   Figure 4 shows one view of the FDS Web interface in                       all involved. Even though all simulations can be viewed
Facebook. The interface provides many features that enable                   by all users for this demonstrator, additional functionality
the user to do almost anything they need pertaining to the                   could easily be added to allow a user to select if they want
FDS application. As such, it serves as a “one-stop shop” en-                 to share a simulation and to which users or groups of users
vironment for the users. Some of the features are built into                 they want to share it with.
Facebook while others were added as part of the FDS Web                          At the bottom of Figure 4 is a general discussion board
interface. This also serves as an example of how an enter-                   for FDS that all users with access to the application can


                                                                         6
Figure 4. FDS Facebook interface

post comments to. The Facebook API made it easy to add              ulation. Here, the user is allowed to name the simulation,
discussion boards. The general discussion board enables             provide a description of the simulation and upload the in-
users to make general comments or questions about FDS               put file for the simulation. Once this is done, the user can
and receive feedback from other users.                              submit the simulation. The simulation is run on the internal
   In addition to a general FDS discussion board, there is          cloud computing infrastructure, transparent to the knowl-
a discussion board for every simulation, as shown in the            edge of the user.
bottom of Figure 6. Users can use the discussion board to               To enable quick browsing of simulations in the “My Sim-
discuss and make observations about results. All of these           ulations” and “All Simulations” views as shown in Figure 4,
mechanisms build on the notion of collective intelligence           details of the simulation are hidden. The details can be ac-
which is a key principle of Web 2.0.                                cessed by clicking on the name of the simulation. Details
                                                                    of the simulation named “SAMPLE 4” can be seen in Fig-
                                                                    ure 6. This view provides additional meta-data about the
Fully Functional Application Interface
                                                                    simulation such as the time the simulation was submitted.
One objective of our demonstrator is to show how a simple,          Although the demonstrator uses a limited list of meta-data
yet full-featured, social-network capable Web interface to          it would be easy to add additional meta-data to this view.
a (legacy) application would enable a user to be more pro-              Additional functions that can be carried out for the sim-
ductive. In this section we describe several screenshots that       ulation can also be selected in the detailed simulation view.
help illustrate these capabilities.                                 These include the ability to edit the simulation input file,
   From the view shown in Figure 4, that allows a user to           re-submit a simulation, remove a simulation, and download
access their simulation or all simulations, they can also se-       the simulation results.
lect to create a new simulation. Figure 5 shows the FDS                 Another key functionality available from the simulation
Web interface view that allows a user to create a new sim-          detail view in Figure 6 is visualization of the results using


                                                                7
Figure 5. Creating a new simulation

Smokeview. An example visualization can be seen in Fig-              our demonstrator clearly illustrates that most useful func-
ure 7. The visualization is interactive allowing the user to         tionalities could be provided through a single, simple inter-
rotate the view and select whether to visualize the spread of        face. Leveraging some functionalities (e.g., social network-
fire, smoke or other options. In Figure 7, the user is visual-        ing functionalities) across applications may further improve
izing the spread of fire. Technical details of how and where          the overall enterprise user experience, as well as reduce de-
the visualization is run are hidden from the user. Smoke-            velopment and training costs.
view is actually being run remotely on a Virtual Appliance
and is made accessible from the Web interface using VNC.             6. Conclusions and Future Work
This feature in particular demonstrates the value of integrat-
ing all functionality pertaining to an application into a sin-          In this paper we explored the use of a Web 2.0 social
gle Web interface. Users can more quickly and easily switch          networking platform in an enterprise setting, to provide em-
between running simulations and analyzing the results.               ployees with an integrated, comprehensive and feature rich
                                                                     environment for accessing applications, sharing documents,
5.3. Demonstrator Summary                                            results and other objects, and connecting with each other.
                                                                     In combination with an internal cloud computing based in-
    Our demonstrator shows how enterprises and their users           frastructure for supporting the applications we feel that this
could clearly benefit from a more modern IT environment               could provide significant benefits to an enterprise. IT or-
that couples together the best aspects of Web 2.0 with a             ganizations are able to make more efficient use of their re-
more flexible IT infrastructure. In particular, user produc-          sources and provide employees with greater choice while
tivity could be improved and IT infrastructure could be uti-         maintaining control. Employees are provided with simple
lized more effectively. Although our demonstrator included           and intuitive access to applications and can leverage knowl-
much of the functionality needed by FDS users, there are             edge within the enterprise more easily using technologies
certainly other functionalities that they might find helpful          that many are already familiar with.
(e.g., cloning an experiment, cancelling a submitted or run-            To illustrate the effectiveness of our proposed approach,
ning simulation, etc.). Similarly, other applications may            we presented a demonstrator that we developed for a legacy
require additional functionality. However, we believe that           application. Facebook was used as the social networking


                                                                 8
Figure 6. Simulation details

platform to create a comprehensive environment for the Fire              explore the benefits of this approach. On the infrastructure
Dynamics Simulation application. It enables users to easily              side, we are investigating how checkpointing and migration
access the application, upload and edit input files, submit               functionalities of virtual machine technologies can be used
and resubmit simulations, download results, visualize re-                to better meet the needs of competing services and make
sults, share and discuss results, etc., all in a single integrated       more efficient use of resources.
environment. Simulations and visualizations were run on
Virtual Appliances in a dynamic infrastructure that could                References
scale to meet the simulation and visualization demands. In
addition to showing an improved user experience and more                 [1] Amazon.         Amazon Web Services (AWS) Website.
efficient use of resources, it also shows how easily legacy                   http://aws.amazon.com/. Accessed April, 2008.
applications can be integrated into such environments.                   [2] Amazon. Building Facebook Applications on AWS Web-
                                                                             site. http://aws.amazon.com/partners/facebook. Accessed
   While our demonstrator has shown the feasibility of our                   April 2008.
proposed approach, many gaps in existing technologies still              [3] Cluster Resources, Inc. Moab Cluster Suite Website.
need to be addressed to make it a reality. New or revised                    http://www.clusterresources.com/pages/products/moab-
social networking platforms that are more tailored to the                    cluster-suite.php. Accessed September, 2007.
needs of enterprises need to be developed. These tools need              [4] Cluster Resources, Inc. Torque Resource Manager Website.
                                                                             http://www.clusterresources.com/pages/products/torque-
to provide greater security and control for IT organizations.
                                                                             resource-manager.php. Accessed April, 2008.
Tools enabling support for virtualization and cloud comput-              [5] R. Curry, C. Kiddle, N. Markatchev, R. Simmonds, T. Tan,
ing infrastructures are starting to enter the market. How-                   M. Arlitt, and B. Walker. An automated resource provision-
ever, the behaviors of these environments need to be stud-                   ing framework for data centres. To appear in Proceedings
ied in more detail to better determine the functionalities re-               of the 15th HP Software University Association (HP-SUA)
quired to manage these environments efficiently.                              Workshop, 2008.
                                                                         [6] Facebook Website. http://www.facebook.com/. Accessed
   In the future, we plan to more closely analyze applica-                   April, 2008.
tion usage patterns on existing social networking platforms              [7] Friendster Website. http://www.friendster.com/. Accessed
to better understand the application lifecycle and the utility               April, 2008.
                                                                         [8] Google. OpenSocial Website.
of the approach discussed in this paper. We are also work-
                                                                             http://code.google.com/apis/opensocial/. Accessed April,
ing on applying this approach to other academic and indus-                   2008.
try based projects to explore how heterogeneous services                 [9] Google. orkut Website. http://www.orkut.com/. Accessed
can be supported in the same environment and to further                      April, 2008.


                                                                     9
Figure 7. Smokeview visualization

[10] hi5 Website. http://hi5.com/. Accessed April, 2008.                [20] National Institute of Standards and Technology
[11] Huddle Website. http://www.huddle.net/. Accessed April                  (NIST).       Fire Dynamics Simulator (FDS) Website.
     2008.                                                                   http://www.fire.nist.gov/fds/. Accessed February 2008.
[12] Huddle. Workspaces Facebook Application Website.                   [21] OpenSolaris. ZFS Website.
     www.facebook.com/applications/Workspaces/20383310695.                   http://opensolaris.org/os/community/zfs/. Accessed April,
     Accessed April 2008.                                                    2008.
[13] Joyent Website. http://www.joyent.com/. Accessed April             [22] RealVNC Website. http://www.realvnc.com/. Accessed
     2008.                                                                   April, 2008.
                                                                        [23] SelectMinds Website. http://www.selectminds.com/. Ac-
[14] LeverageSoftware Website.
                                                                             cessed April, 2008.
     http://www.leveragesoftware.com/. Accessed April, 2008.            [24] Sophos. 50% of employees blocked from accessing Face-
[15] LinkedIn Website. http://www.linkedin.com/. Accessed                    book at work, Sophos survey reveals. Sophos Press Office.
     April, 2008.                                                            http://www.sophos.com/pressoffice/news/articles/2007/08/block-
[16] LinkedIn. LinkedIn Introduces Intelligent Applications                  facebook.html, August 21, 2007.
     Platform. LinkedIn Press Releases.                                 [25] Sun Microsystems. Network.com Website.
     http://www.linkedin.com/static?key=press releases 121007 2,             http://network.com/. Accessed April, 2008.
     December 10, 2007.                                                 [26] VisiblePath Website. http://www.visiblepath.com/. Accessed
[17] Microsoft.     Microsoft Office Sharepoint Server Web-                   April, 2008.
     site. http://www.microsoft.com/sharepoint/. Accessed April,        [27] WorkLight. WorkBook Website.
     2008.                                                                   http://myworklight.com/workbook/. Accessed April 2008.
[18] MySpace Website. http://www.myspace.com/. Accessed
     April, 2008.
[19] nanoHUB Portal. http://www.nanohub.org/. Accessed
     March, 2008.


                                                                   10

Weitere ähnliche Inhalte

Was ist angesagt?

Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0Shady A. Alefrangy
 
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services IndustryTerm Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industryvyas_harsh86
 
IDC Report : Web Security
IDC Report : Web SecurityIDC Report : Web Security
IDC Report : Web SecurityKim Jensen
 
Project report (web 3.0)
Project report (web 3.0)Project report (web 3.0)
Project report (web 3.0)Abhishek Roy
 
Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)PCG Solution
 
IRJET- Virtual Community Using Cloud Technology “Unitalk”
IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”
IRJET- Virtual Community Using Cloud Technology “Unitalk”IRJET Journal
 
Introduction to Enterprise 2.0
Introduction to Enterprise 2.0Introduction to Enterprise 2.0
Introduction to Enterprise 2.0David Saitta
 
Web 20 For Technical Communicators
Web 20 For Technical CommunicatorsWeb 20 For Technical Communicators
Web 20 For Technical CommunicatorsBogo Vatovec
 
Office 2010 cloud computing farhad_javidi
Office 2010 cloud computing farhad_javidiOffice 2010 cloud computing farhad_javidi
Office 2010 cloud computing farhad_javidijavidi
 
WEB 2.0 For Interns(Surya)
WEB 2.0 For Interns(Surya)WEB 2.0 For Interns(Surya)
WEB 2.0 For Interns(Surya)guest71e24d
 
HR summit - Social Media: ignore or embrace
HR summit - Social Media: ignore or embraceHR summit - Social Media: ignore or embrace
HR summit - Social Media: ignore or embraceRick Mans
 
Web 2.0 - principles and implications
Web 2.0 - principles and implicationsWeb 2.0 - principles and implications
Web 2.0 - principles and implicationsMartin Weller
 
Northwest eLearning Community Conference Keynote (10-07)
Northwest eLearning Community Conference Keynote (10-07)Northwest eLearning Community Conference Keynote (10-07)
Northwest eLearning Community Conference Keynote (10-07)Cable Green
 
Northwest Elearning Community Conference Keynote
Northwest Elearning Community Conference Keynote Northwest Elearning Community Conference Keynote
Northwest Elearning Community Conference Keynote webstu
 
Tics Article 6 Ideas
Tics Article 6 IdeasTics Article 6 Ideas
Tics Article 6 IdeasXimenaBonilla
 
HR 2 0, Talent Management 2.0 by Talentys
HR 2 0, Talent Management 2.0 by TalentysHR 2 0, Talent Management 2.0 by Talentys
HR 2 0, Talent Management 2.0 by TalentysDavid Guillocheau
 
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010Dion Hinchcliffe
 

Was ist angesagt? (19)

Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0
 
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services IndustryTerm Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
 
IDC Report : Web Security
IDC Report : Web SecurityIDC Report : Web Security
IDC Report : Web Security
 
Project report (web 3.0)
Project report (web 3.0)Project report (web 3.0)
Project report (web 3.0)
 
Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)
 
IRJET- Virtual Community Using Cloud Technology “Unitalk”
IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”
IRJET- Virtual Community Using Cloud Technology “Unitalk”
 
Web 2 ingles
Web 2 inglesWeb 2 ingles
Web 2 ingles
 
Introduction to Enterprise 2.0
Introduction to Enterprise 2.0Introduction to Enterprise 2.0
Introduction to Enterprise 2.0
 
Web 20 For Technical Communicators
Web 20 For Technical CommunicatorsWeb 20 For Technical Communicators
Web 20 For Technical Communicators
 
webiOS
webiOSwebiOS
webiOS
 
Office 2010 cloud computing farhad_javidi
Office 2010 cloud computing farhad_javidiOffice 2010 cloud computing farhad_javidi
Office 2010 cloud computing farhad_javidi
 
WEB 2.0 For Interns(Surya)
WEB 2.0 For Interns(Surya)WEB 2.0 For Interns(Surya)
WEB 2.0 For Interns(Surya)
 
HR summit - Social Media: ignore or embrace
HR summit - Social Media: ignore or embraceHR summit - Social Media: ignore or embrace
HR summit - Social Media: ignore or embrace
 
Web 2.0 - principles and implications
Web 2.0 - principles and implicationsWeb 2.0 - principles and implications
Web 2.0 - principles and implications
 
Northwest eLearning Community Conference Keynote (10-07)
Northwest eLearning Community Conference Keynote (10-07)Northwest eLearning Community Conference Keynote (10-07)
Northwest eLearning Community Conference Keynote (10-07)
 
Northwest Elearning Community Conference Keynote
Northwest Elearning Community Conference Keynote Northwest Elearning Community Conference Keynote
Northwest Elearning Community Conference Keynote
 
Tics Article 6 Ideas
Tics Article 6 IdeasTics Article 6 Ideas
Tics Article 6 Ideas
 
HR 2 0, Talent Management 2.0 by Talentys
HR 2 0, Talent Management 2.0 by TalentysHR 2 0, Talent Management 2.0 by Talentys
HR 2 0, Talent Management 2.0 by Talentys
 
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
 

Andere mochten auch

Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise ApplicationsPre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applicationswhite paper
 
Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...
Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...
Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...white paper
 
Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007 Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007 white paper
 
Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006white paper
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threatswhite paper
 
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2white paper
 
Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing white paper
 
Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Javawhite paper
 

Andere mochten auch (8)

Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise ApplicationsPre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
 
Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...
Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...
Cloud Computing With Amazon Web Services, Part 1: Introduction - When It's Sm...
 
Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007 Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007
 
Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
 
Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing
 
Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 

Ähnlich wie Facebook Meets the Virtualized Enterprise

Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trendsSsendiSamuel
 
6 Ways To Make Web 2.0 Work
6 Ways To Make Web 2.0 Work6 Ways To Make Web 2.0 Work
6 Ways To Make Web 2.0 WorkKaren Livecchia
 
Six ways to make Web 2.0 work
Six ways to make Web 2.0 workSix ways to make Web 2.0 work
Six ways to make Web 2.0 workTechnomatix
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities ManagementOmer Dawelbeit
 
Cloud Computing With SAS
Cloud Computing With SASCloud Computing With SAS
Cloud Computing With SASwhite paper
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
The Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicatThe Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicatronnag9bkla
 
Cloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 MayCloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 MayGovCloud Network
 
Immersion Program Presentation Web2
Immersion Program Presentation   Web2Immersion Program Presentation   Web2
Immersion Program Presentation Web2Rick Reo
 
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...IAEME Publication
 
Supercharging the Cloud for an Agile Enterprise
Supercharging the Cloud  for an Agile EnterpriseSupercharging the Cloud  for an Agile Enterprise
Supercharging the Cloud for an Agile EnterprisePatrick Bouillaud
 
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTAN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTcsandit
 
Php Leads Web2 0
Php Leads Web2 0Php Leads Web2 0
Php Leads Web2 0guestf34485
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingMike Tase
 
Cloud Computing 2.0
Cloud Computing 2.0Cloud Computing 2.0
Cloud Computing 2.0Ahmed Banafa
 
A Review Paper On Cloud Computing
A Review Paper On Cloud ComputingA Review Paper On Cloud Computing
A Review Paper On Cloud ComputingGina Rizzo
 
Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17MJD Management Group
 

Ähnlich wie Facebook Meets the Virtualized Enterprise (20)

Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trends
 
Web 2.0 for Business
Web 2.0 for BusinessWeb 2.0 for Business
Web 2.0 for Business
 
6 Ways To Make Web 2.0 Work
6 Ways To Make Web 2.0 Work6 Ways To Make Web 2.0 Work
6 Ways To Make Web 2.0 Work
 
Six ways to make Web 2.0 work
Six ways to make Web 2.0 workSix ways to make Web 2.0 work
Six ways to make Web 2.0 work
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities Management
 
Cloud Computing With SAS
Cloud Computing With SASCloud Computing With SAS
Cloud Computing With SAS
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
The Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicatThe Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicat
 
Cloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 MayCloud Computing Nedc Wp 28 May
Cloud Computing Nedc Wp 28 May
 
Immersion Program Presentation Web2
Immersion Program Presentation   Web2Immersion Program Presentation   Web2
Immersion Program Presentation Web2
 
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
 
Web 2.0 By Nyros Developer
Web 2.0 By Nyros DeveloperWeb 2.0 By Nyros Developer
Web 2.0 By Nyros Developer
 
Supercharging the Cloud for an Agile Enterprise
Supercharging the Cloud  for an Agile EnterpriseSupercharging the Cloud  for an Agile Enterprise
Supercharging the Cloud for an Agile Enterprise
 
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTAN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
 
Web 2 0
Web 2 0Web 2 0
Web 2 0
 
Php Leads Web2 0
Php Leads Web2 0Php Leads Web2 0
Php Leads Web2 0
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
Cloud Computing 2.0
Cloud Computing 2.0Cloud Computing 2.0
Cloud Computing 2.0
 
A Review Paper On Cloud Computing
A Review Paper On Cloud ComputingA Review Paper On Cloud Computing
A Review Paper On Cloud Computing
 
Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17
 

Mehr von white paper

Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overviewwhite paper
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guidewhite paper
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machinewhite paper
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Changewhite paper
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paperwhite paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applicationswhite paper
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIwhite paper
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...white paper
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platformwhite paper
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overviewwhite paper
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systemswhite paper
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarkswhite paper
 
The Effect of Culture on Usability
The Effect of Culture on UsabilityThe Effect of Culture on Usability
The Effect of Culture on Usabilitywhite paper
 

Mehr von white paper (20)

Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overview
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guide
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machine
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Change
 
Java Web Start
Java Web StartJava Web Start
Java Web Start
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging API
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overview
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systems
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarks
 
The Effect of Culture on Usability
The Effect of Culture on UsabilityThe Effect of Culture on Usability
The Effect of Culture on Usability
 

Kürzlich hochgeladen

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 

Kürzlich hochgeladen (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 

Facebook Meets the Virtualized Enterprise

  • 1. Facebook Meets the Virtualized Enterprise Roger Curry, Cameron Kiddle, Nayden Markatchev, Rob Simmonds, Tingxi Tan, Martin Arlitt and Bruce Walker HP Laboratories HPL-2008-72 Keyword(s): social networking, Web 2.0, cloud computing Abstract: “Web 2.0” and “cloud computing” are revolutionizing the way IT infrastructure is accessed and managed. Web 2.0 technologies such as blogs, wikis and social networking platforms provide Internet users with easier mechanisms to produce Web content and to interact with each other. Cloud computing technologies are aimed at running applications as services over the Internet on a scalable infrastructure. They enable businesses that do not have the capital or technical expertise to support their own infrastructure to get access to computing on demand. They could also be used by large businesses to more efficiently manage their own infrastructure as an “internal cloud”. In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in an enterprise setting to provide employees with a comprehensive and transparent environment for utilizing applications. To demonstrate the effectiveness of this approach we have developed an environment that uses Facebook (a social networking platform) to provide access to the Fire Dynamics Simulator (a legacy application). The application is supported using Virtual Appliances that are hosted in an internal cloud computing infrastructure that adapts dynamically to user demands. Initial feedback suggests this approach provides a much better user experience than the traditional standalone use of the application. It also simplifies the management and increases the effective utilization of the underlying IT resources. External Posting Date: July 6, 2008 [Fulltext] Approved for External Publication Internal Posting Date: July 6, 2008 [Fulltext] To be published in the 12th IEEE International EDOC Conference, Munchen, Germany, September 15-19, 2008 © Copyright 2008 the 12th IEEE International EDOC Conference
  • 2. Facebook Meets the Virtualized Enterprise Roger Curry, Cameron Kiddle, Nayden Markatchev, Rob Simmonds and Tingxi Tan Grid Research Centre, University of Calgary {curry,kiddlec,nayden,simmonds,txtan}@cpsc.ucalgary.ca Martin Arlitt and Bruce Walker HP Labs {martin.arlitt,bruce.walker}@hp.com Abstract and increase online social connectivity. The popularity of social networking sites such as Facebook [6] is a clear indi- “Web 2.0” and “cloud computing” are revolutionizing cation of the perceived value of these technologies. the way IT infrastructure is accessed and managed. Web We believe that an improved user experience would also 2.0 technologies such as blogs, wikis and social networking be beneficial in an enterprise setting, as it would make tasks platforms provide Internet users with easier mechanisms to more enjoyable and less time consuming to complete. It produce Web content and to interact with each other. Cloud would likely also appeal to the new generation of enterprise computing technologies are aimed at running applications employees, who are intimately familiar with the Web 2.0 as services over the Internet on a scalable infrastructure. experience. They enable businesses that do not have the capital or tech- However, such technologies have not been widely nical expertise to support their own infrastructure to get ac- adopted in enterprises due to concerns over security, pro- cess to computing on demand. They could also be used by ductivity and suitability in the workplace. In fact, many large businesses to more efficiently manage their own in- businesses block employees from using social networking frastructure as an “internal cloud”. sites at the workplace [24]. In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in an enterprise setting The purpose of this paper is to (1) examine the lessons to provide employees with a comprehensive and transpar- we have learned from the Web 2.0 era, (2) articulate the ent environment for utilizing applications. To demonstrate needs of enterprises and (3) recommend an IT model that the effectiveness of this approach we have developed an merges the two in an acceptable manner. We have imple- environment that uses Facebook (a social networking plat- mented a demonstrator to illustrate the potential benefits to form) to provide access to the Fire Dynamics Simulator (a enterprises of the approach we are recommending. legacy application). The application is supported using Vir- The remainder of the paper is organized as follows. Sec- tual Appliances that are hosted in an internal cloud com- tion 2 describes lessons we have learned from the Web 2.0 puting infrastructure that adapts dynamically to user de- era and Section 3 examines the IT requirements of enter- mands. Initial feedback suggests this approach provides a prises. Our proposed IT model, which leverages the benefits much better user experience than the traditional standalone of Web 2.0 while addressing the needs of enterprises, is pre- use of the application. It also simplifies the management sented in Section 4. Section 5 introduces our demonstrator, and increases the effective utilization of the underlying IT which highlights the utility of our approach. We conclude resources. our paper in Section 6, with a summary of our work and future directions. 1. Introduction 2. Lessons Learned from Web 2.0 The “Web 2.0” era has brought us technologies such In the past few years, the “Web 2.0” wave has provided as blogs, wikis and social networking platforms. These new, simple ways for users to create and share content or technologies provide users more feature rich environments, applications, and communicate with one another. These ca- make it easier for users to generate and share Web content, pabilities have been enabled by tools such as blogs, wikis,
  • 3. and social networking platforms. Our particular interest is in online social networking. Sites such as Facebook [6] and MySpace [18] have become extremely popular with Inter- net users, in part because of the simplified interfaces they provide to desired capabilities. Simple yet powerful inter- faces are extremely valuable as they make the power of IT accessible to almost everyone, with little or no training re- quired. The “Web 2.0” wave has also brought users “choice” of applications. Among social networking sites, Facebook was the first to release an application development platform in May 2007. The Facebook Platform provides an API that al- lows third party applications to be integrated into Facebook. Users are easily able to access and share a large variety of applications. By September of 2007 there were over 3,500 Figure 1. Daily active users vs. rank of Face- applications and as of April 2008 this number has increased book applications to over 22,000. Consumers like choice of applications as it enables them to personalize their experience, without re- quiring application providers to do extra work. the company and do not want that information shared with As an indication of the perceived value of an application the world. development platform, many other social networking sites At the opposite end of the spectrum, employees want an have followed suit. Friendster [7], MySpace and hi5 [10] easily accessible and complete set of tools that enables them have recently launched their application development plat- to more effectively do their jobs. Members of generation forms and orkut [9] is in the process of rolling its out. The Y are the new enterprise employees. They grew up with Friendster, MySpace, hi5 and orkut platforms are or even- the Internet and are quite familiar with social networking tually plan to use the OpenSocial API [8] being developed technologies. Use of these technologies in enterprise would by Google. This is in contrast to the proprietary platform therefore be very appealing to this new workforce. being used by Facebook. Applications developed using In the middle is the corporate IT organization, which the OpenSocial API will be able to have more rapid and must try to support this conflicting set of requirements. A widespread deployment on all of the sites that support the common approach today is to make the IT infrastructure (in- API. cluding applications) very static and controlled. This helps A major problem facing application developers for so- reduce cost (the easiest goal to measure), but can limit flex- cial networking platforms is that it is very difficult to pre- ibility and restrict the tools available to users. Much of dict the popularity and lifespan of applications. Figure 1 IT infrastructure is underutilized much of the time. Meth- shows that most applications on Facebook are very unpopu- ods to consolidate and make more efficient use of resources lar; of the 15,036 applications that we had data for on April are always being sought. Enabling business continuity re- 21, 2008, 13,838 (92%) had less than one thousand active quires the maintenance of legacy applications which are users, compared to the top 3 applications that had over one typically not easily adapted to newer and more efficient IT million active users. We expect a similar trend to exist for management approaches. While many new technologies applications in an enterprise. A flexible IT infrastructure to are emerging, enterprises are more conservative than con- support applications in a cost effective and scalable manner sumers. They need slower migration paths in the adoption is needed. of new technologies. Enterprises also have many concerns when it comes to 3. Requirements and Concerns of Enterprises adopting general consumer social networking platforms. Adoption of such platforms has been limited in enterprise We consider the requirements of enterprises from three due to the lack of a professional feel, security concerns, and different perspectives; CXOs (i.e., company executives), access to applications that so far, are typically more of a employees and IT organizations. CXOs have a variety of distraction than benefit to the workplace. The lifecycle of business goals that directly affect the way their IT infras- applications is more dynamic and less predictable than en- tructure is managed. These goals could include things such terprises are used to dealing with. Furthermore, applica- as “reduce costs”, “increase business flexibility” and/or tions can be developed and shared by anybody so concerns “provide business continuity”. CXOs are concerned about over who continues to support and update applications be- security and risk. They regard data as a significant asset of comes an issue. Enterprises have typically had a great deal 2
  • 4. of control over the application environment provided to em- We realize that it may not be possible or appropriate to have ployees. all applications accessible from the social networking plat- There are many social networking tools that have been form initially. The goal would be to first migrate simple, developed with enterprise users in mind. However, most non-critical applications to this environment. Over time, focus on networking, collaborating and/or sharing informa- additional and more critical applications could be added. tion and not on providing a platform for accessing applica- On the IT management side, we propose that applica- tions. Some of these tools include Huddle [11], Microsoft tions be hosted with the aid of cloud computing technolo- Office Sharepoint Server [17], VisiblePath [26], and solu- gies. These technologies are aimed at scalable hosting of tions from SelectMinds [23] and LeverageSoftware [14]. services in the Internet “cloud” transparent to the knowl- Another enterprise centric social networking tool called edge of the user. Example cloud computing offerings in- LinkedIn [15] has recently released the Intelligent Applica- clude Amazon Web Services (AWS) [1] and Sun Microsys- tions Platform [16] that uses the OpenSocial API. LinkedIn tems’s Network.com [25]. Both enable computing power to still seems focused on networking and job searching but the be purchased on an on-demand basis, with the ability to eas- new platform could lead it in new directions. There have ily scale services up or down as needed. This enables appli- also been some efforts to make some of the general purpose cations to be supported without the need to have an existing social networking tools more appropriate for enterprise. infrastructure and helps address the application popularity Huddle has a Facebook application called Workspaces [12] problem. and WorkLight has a Facebook application called Work- The grand vision of cloud computing is that all appli- Book [27], both aimed at enabling more secure use of Face- cations will be supported remotely, and accessed on de- book in an enterprise setting. mand from the Internet. However, for the foreseeable fu- We argue that it is important to identify methods that ture, many enterprises will be reluctant to relinquish that make useful applications and services more accessible to degree of control over their business. Instead, we propose employees (to improve productivity), enable more rapid de- that an “internal cloud” model be followed, allowing enter- ployment and dynamic configuration of these services (to prises to retain control, but at the same time place them on increase flexibility), while allowing IT organizations to re- the path that would facilitate simple migration to selected tain or increase control over the infrastructure they manage Internet-based cloud services. (to maintain cost accountability). Solving these issues could The internal cloud would be maintained as a static and reshape how computing is done within enterprises. homogeneous set of physical resources. Applications would be packaged in Virtual Appliances that could be dynami- 4. IT Model cally launched to scale appropriately to the demands of pop- ular and not so popular applications. A Virtual Appliance In this section we first explain in more detail our pro- is the combination of a virtual machine, custom operating posed IT model for accessing and hosting applications for system and application into a single image. enterprises. We then discuss the benefits that this approach Virtual machine technologies are employed in cloud will have for enterprise employees, IT organizations and computing solutions such as AWS. They make it possible CXOs. Finally, we discuss some related efforts to our pro- for a single physical machine to be transformed into mul- posed approach. tiple virtual machines which can each be customized with their own specialized and streamlined operating system and 4.1. Proposed Approach application software. The use of virtual machine technolo- gies provides many advantages. They allow for more ef- Figure 2 shows a diagram of our proposed IT model. It ficient use of resources aiding in resource consolidation. is based on the use of a number of existing technologies, They also allow heterogeneous services to be supported in the combination of which provides the potential for a revo- a single physical environment. Furthermore, checkpoint- lutionary improvement in enterprise IT. ing and migration capabilities allow movement of virtual On the user side we propose the use of a Facebook-like resources among the physical nodes of a data centre en- social networking platform that is more tailored to enter- abling the accommodation of new service requests, system prise use. Employees would be able to search, access and maintenance without disrupting services and balancing of use applications, share documents and other important in- workload among data centre nodes. formation, and maintain/establish contact with other em- Social networking platforms like Facebook allow any- ployees. Although some enterprises use portals that support body to develop and share applications. This is in con- some of these functionalities, the social networking aspects trast to the current IT model where the IT organization is are largely lacking, as well as the simplified interface to very restrictive in the applications that are made available (legacy) applications, the self/group help capabilities, etc. to employees and who they are developed by. With the 3
  • 5. Users Social Networking Platform Applications A1 A2 An Virtual A1 A1 A2 A1 A2 A4 A7 An Appliances OS C OS C OS B OS C OS B OS D OS C OS A Physical hypervisor hypervisor hypervisor hypervisor Nodes OS A OS A OS A OS A Figure 2. Proposed IT model open model like Facebook a big concern for IT organiza- from others. tions would be how and by whom applications continue to Second, exploiting social networking features will en- be supported and upgraded. We propose a model some- able employees to leverage knowledge/expertise already in where in between these two that balances the need for in- the enterprise, in as simple a way as possible. They will creased choice by users and control by the IT organization. be able to more easily find and collaborate with other em- Ideally, developers of applications would provide pre- ployees that have similar expertise, are working on simi- packaged Virtual Appliances with the applications and re- lar problems, or that have the expertise they need to aid in lated components, as well as the interface for accessing the the completion of a task. They will be able to more eas- application via the social networking platform. This may ily share documents, presentations, events and other infor- not be possible initially, or for legacy applications that no mation. This will provide employees with extra sources of longer have development support. The IT organization or a knowledge and allow them to build on what others have third party could be responsible for creating and maintain- done. It will help them to be better aware of what is go- ing Virtual Appliances for these applications. With minimal ing on in the company and help improve their productivity. effort these applications could be made accessible via the social networking platform as is (i.e., using existing user 4.3. Benefits for IT Organization interfaces) by running a desktop sharing program such as VNC [22] in the Virtual Appliance. Users could be pro- IT organizations will also greatly benefit from adoption vided access to the VNC session and also provided with of the approach proposed in this paper. First, the approach additional features to enable easier use of the application. aids in more efficient use of resources which could help to significantly reduce infrastructure costs. Instead of estab- 4.2. Benefits for Employees lishing the required infrastructure for each application sep- arately, which can result in many underutilized resources, Management of applications and IT infrastructure as pro- all applications can share the same infrastructure. The en- posed in this paper could provide many benefits to employ- vironment is dynamic and flexible; it can quickly scale and ees. First, the use of a social networking platform will en- adapt applications based on demand. Applications that are able simpler use of applications. Employees will be pro- in high demand can be allocated a large number of resources vided with a simple and intuitive interface for accessing ap- and applications that are not popular can consume little or plications, including legacy applications. All applications no resources. will be accessible with a similar “look and feel” in a sin- Second, the approach allows IT to maintain control of gle integrated environment. The technical details of where the infrastructure while avoiding the need to manage oper- the application is running and how it is accessed will be ating systems. Instead, IT would be responsible for main- transparent to the employee. Not only should it reduce the taining the underlying physical infrastructure and hypervi- time and effort for an employee to learn how to use an ap- sors on which the Virtual Appliances will run. This will plication, but it may enable employees to be comfortable be a relatively static, homogeneous environment, with dy- in utilizing a much larger number of applications than they namics and heterogeneity pushed up into the virtualized en- traditionally do. Employees will also be able to share expe- vironment. Virtual Appliances could automatically register riences they have had with applications, rate them and learn with a management service, enabling IT to ensure the appli- 4
  • 6. ances are updated (i.e., patched) appropriately. This would Considering the small domain that is being targeted, pop- differ substantially from patching of operating systems han- ularity of nanoHUB has really taken off with over 60,000 dled by IT today, as the developers of the applications, not users from over 180 countries and over 270,000 simulations IT, would be responsible for ensuring the patches worked run in the past 12 months. before deploying them to the IT infrastructure. This could dramatically reduce support costs for IT. Testing would also 5. Fire Dynamics Simulator Demonstrator be simplified, as the developers only need to test on the spe- cific appliance platform that they use. To demonstrate the effectiveness of our proposed ap- proach we developed a comprehensive environment for the 4.4. Benefits for CXOs Fire Dynamics Simulator (FDS) [20], a “legacy” applica- tion developed by NIST. Our environment makes use of so- Due to the numerous anticipated benefits to employees cial networking technologies to provide a user interface and and the IT organization, we expect that CXOs would also an internal cloud computing infrastructure to host the appli- see many benefits. With simplified access to a wider vari- cation. The demonstrator runs on an HP BladeSystem C- ety of applications productivity of employees could be in- class environment. A video of the demonstrator is available creased (not decreased, as is commonly feared). The more at http://grid.ucalgary.ca/projects/DataCentre/. efficient manner in which IT infrastructure is being man- aged will allow costs to be reduced, business flexibility in- 5.1. Demonstrator Infrastructure creased and business continuity supported all at the same time. As the infrastructure is kept in control by the IT or- Figure 3 shows the infrastructure used to support the ganization, security and protection of valuable data is main- demonstrator. One of our aims in developing the infrastruc- tained. ture was to make use of as many existing tools as possible to simplify the development. The physical infrastructure 4.5. Related Efforts is homogeneous as is the platform for hosting the Virtual Appliances. We developed a Utility Provider Orchestrator In the general consumer and academic areas, there are (UPO) to orchestrate the provisioning of virtual resources. several related efforts that combine a social networking It enables dynamic scaling of services based on the current platform with cloud computing infrastructures. As far as level of demand. The UPO makes use of PBS/Torque [4] we know, there are no similar efforts being undertaken for to manage the physical resources, Xen to virtualize the re- enterprise. sources and Moab [3] to schedule the virtual resources. The Amazon has recently teamed up with Facebook to help UPO, Moab and Torque all run on a Virtual Appliance (VA) developers build scalable applications that can be run us- as indicated in the diagram. ing Amazon Web Services [2]. Joyent recently partnered There are three services supported by the infrastructure; with Dell to provide a scalable on-demand infrastructure to a Web interface for FDS, a service for running FDS simu- launch Facebook and OpenSocial (only for hi5 currently) lations and a service for running interactive Smokeview vi- applications that can scale to millions of users [13]. Both sualizations. Smokeview, also from NIST, is a companion of these efforts apply to the general consumer area and are tool to FDS for visualizing results. The Web interface is in- examples where an external cloud computing infrastructure tegrated into Facebook using the Facebook API. It interacts is employed to support applications. with the FDS simulation and Smokeview visualization ser- Perhaps the most closely related work to what we are vices. The FDS simulation service uses Condor to run sim- suggesting is nanoHUB [19], a social networking platform ulation jobs and the Smokeview visualization service uses aimed at the nanoscience academic community. Users are VNC to enable interactivity through a Web browser. Each able to share publications, presentations, teaching materials simulation node of the Condor pool and each visualization and get access to large variety of nanoscience applications. node is a Virtual Appliance with the necessary software in- However, it currently lacks many of the social networking stalled. Virtual Appliances are started from a clone of a features common with Facebook and MySpace, and is tar- pristine image (SimClone or VizClone), which is exported geted at a specific domain. A prominent feature is the abil- as an iSCSI target. OpenSolaris ZFS [21] is used to provide ity to access and run a wide range of applications right from clones of images. The appliances could be maintained by your Web browser, transparent to the underlying computing a third party. IT may require a list of software components infrastructure that is used. nanoHUB makes use of local vir- so that they can automatically determine which VAs need tualized resources, TeraGrid, Open Science Grid, and any updating or replacing. other resources that it can get a hold of. VNC is used to We developed Service Provider Agents (SPAs) for the provide access to application GUIs and visualization tools. FDS simulation service (SimSPA) and Smokeview service 5
  • 7. Facebook (API) FDS Simulation Service FDS Web Interface Interactive Smokeview Service CondorCM Sim Sim Sim Viz Viz mySQL VizSPA SimSPA Clone Clone Clone Clone Clone Apache UPO PBS Moab PBS PBS PBS MOM Torque MOM MOM MOM VA VA VA VA VA VA VA DHCP Dom0 VA Dom0 Dom0 Dom0 MAC addresses iSCSI server hypervisor hypervisor hypervisor hypervisor Physical Node Physical Node Physical Node Physical Node Physical Node Private Network Public Network Figure 3. FDS demonstrator infrastructure (VizSPA) to communicate with the UPO and request or re- prise could provide improved user experiences for legacy lease Virtual Appliances based on demand. If user demand applications, without modifying the legacy application in for FDS or Smokeview increases, the corresponding SPA any way (which would require source code that likely isn’t determines if additional resources are needed. If they are, available). This section continues by describing some of the SPA contacts the UPO to request the allocation of an- these features. other Virtual Appliance (i.e., the environment scales hori- zontally). Similarly, if user demand subsides, the SPA may Personalization scale down its environment, by handing resources back to the UPO. All of this happens transparently to the user. Facebook provides users with a personalized environment For the demonstrator, the SimSPA requests a new Sim- and access to a list of user preferred applications. This list, Clone Virtual Appliance for each new simulation request seen in the top left corner of Figure 4, enables quick access that is made, up to a maximum allowed by policy. A Sim- to applications commonly used by the user. The FDS ap- Clone is returned to the UPO once a simulation is done and plication (labeled “Fire Simulation”) is one of these appli- there are no outstanding simulation requests. The VizSPA cations. Access to this application is restricted to a private always attempts to maintain one “hot” VizClone Virtual Ap- group on Facebook that this user is a member of. Users are pliance beyond that required by active visualizations (as also able to search for other available applications. long as the number of VizClones does not exceed the maxi- mum allowed by policy) to accommodate new visualization Social Networking requests rapidly. IT maintains control of the policy for this environment and can revise the policy if they notice an in- Users are provided with several mechanisms to share infor- creased demand for a particular service. Moab has a well mation and interact with other FDS users. In addition to established policy engine that can be used to enforce these the ability for a user to view their own simulations, a user and other policy requirements. can also view simulations created by all FDS users. This is More detail on the infrastructure we developed to sup- possible using the “My Simulations” and “All Simulations” port the demonstrator can be found in [5]. options respectively in the view shown in Figure 4. The current view is showing the list of all simulations created by all users. The ability to access all simulations allows 5.2. Demonstrator Features users to share their results with others, discuss these results and provide other feedback that could be very beneficial for Figure 4 shows one view of the FDS Web interface in all involved. Even though all simulations can be viewed Facebook. The interface provides many features that enable by all users for this demonstrator, additional functionality the user to do almost anything they need pertaining to the could easily be added to allow a user to select if they want FDS application. As such, it serves as a “one-stop shop” en- to share a simulation and to which users or groups of users vironment for the users. Some of the features are built into they want to share it with. Facebook while others were added as part of the FDS Web At the bottom of Figure 4 is a general discussion board interface. This also serves as an example of how an enter- for FDS that all users with access to the application can 6
  • 8. Figure 4. FDS Facebook interface post comments to. The Facebook API made it easy to add ulation. Here, the user is allowed to name the simulation, discussion boards. The general discussion board enables provide a description of the simulation and upload the in- users to make general comments or questions about FDS put file for the simulation. Once this is done, the user can and receive feedback from other users. submit the simulation. The simulation is run on the internal In addition to a general FDS discussion board, there is cloud computing infrastructure, transparent to the knowl- a discussion board for every simulation, as shown in the edge of the user. bottom of Figure 6. Users can use the discussion board to To enable quick browsing of simulations in the “My Sim- discuss and make observations about results. All of these ulations” and “All Simulations” views as shown in Figure 4, mechanisms build on the notion of collective intelligence details of the simulation are hidden. The details can be ac- which is a key principle of Web 2.0. cessed by clicking on the name of the simulation. Details of the simulation named “SAMPLE 4” can be seen in Fig- ure 6. This view provides additional meta-data about the Fully Functional Application Interface simulation such as the time the simulation was submitted. One objective of our demonstrator is to show how a simple, Although the demonstrator uses a limited list of meta-data yet full-featured, social-network capable Web interface to it would be easy to add additional meta-data to this view. a (legacy) application would enable a user to be more pro- Additional functions that can be carried out for the sim- ductive. In this section we describe several screenshots that ulation can also be selected in the detailed simulation view. help illustrate these capabilities. These include the ability to edit the simulation input file, From the view shown in Figure 4, that allows a user to re-submit a simulation, remove a simulation, and download access their simulation or all simulations, they can also se- the simulation results. lect to create a new simulation. Figure 5 shows the FDS Another key functionality available from the simulation Web interface view that allows a user to create a new sim- detail view in Figure 6 is visualization of the results using 7
  • 9. Figure 5. Creating a new simulation Smokeview. An example visualization can be seen in Fig- our demonstrator clearly illustrates that most useful func- ure 7. The visualization is interactive allowing the user to tionalities could be provided through a single, simple inter- rotate the view and select whether to visualize the spread of face. Leveraging some functionalities (e.g., social network- fire, smoke or other options. In Figure 7, the user is visual- ing functionalities) across applications may further improve izing the spread of fire. Technical details of how and where the overall enterprise user experience, as well as reduce de- the visualization is run are hidden from the user. Smoke- velopment and training costs. view is actually being run remotely on a Virtual Appliance and is made accessible from the Web interface using VNC. 6. Conclusions and Future Work This feature in particular demonstrates the value of integrat- ing all functionality pertaining to an application into a sin- In this paper we explored the use of a Web 2.0 social gle Web interface. Users can more quickly and easily switch networking platform in an enterprise setting, to provide em- between running simulations and analyzing the results. ployees with an integrated, comprehensive and feature rich environment for accessing applications, sharing documents, 5.3. Demonstrator Summary results and other objects, and connecting with each other. In combination with an internal cloud computing based in- Our demonstrator shows how enterprises and their users frastructure for supporting the applications we feel that this could clearly benefit from a more modern IT environment could provide significant benefits to an enterprise. IT or- that couples together the best aspects of Web 2.0 with a ganizations are able to make more efficient use of their re- more flexible IT infrastructure. In particular, user produc- sources and provide employees with greater choice while tivity could be improved and IT infrastructure could be uti- maintaining control. Employees are provided with simple lized more effectively. Although our demonstrator included and intuitive access to applications and can leverage knowl- much of the functionality needed by FDS users, there are edge within the enterprise more easily using technologies certainly other functionalities that they might find helpful that many are already familiar with. (e.g., cloning an experiment, cancelling a submitted or run- To illustrate the effectiveness of our proposed approach, ning simulation, etc.). Similarly, other applications may we presented a demonstrator that we developed for a legacy require additional functionality. However, we believe that application. Facebook was used as the social networking 8
  • 10. Figure 6. Simulation details platform to create a comprehensive environment for the Fire explore the benefits of this approach. On the infrastructure Dynamics Simulation application. It enables users to easily side, we are investigating how checkpointing and migration access the application, upload and edit input files, submit functionalities of virtual machine technologies can be used and resubmit simulations, download results, visualize re- to better meet the needs of competing services and make sults, share and discuss results, etc., all in a single integrated more efficient use of resources. environment. Simulations and visualizations were run on Virtual Appliances in a dynamic infrastructure that could References scale to meet the simulation and visualization demands. In addition to showing an improved user experience and more [1] Amazon. Amazon Web Services (AWS) Website. efficient use of resources, it also shows how easily legacy http://aws.amazon.com/. Accessed April, 2008. applications can be integrated into such environments. [2] Amazon. Building Facebook Applications on AWS Web- site. http://aws.amazon.com/partners/facebook. Accessed While our demonstrator has shown the feasibility of our April 2008. proposed approach, many gaps in existing technologies still [3] Cluster Resources, Inc. Moab Cluster Suite Website. need to be addressed to make it a reality. New or revised http://www.clusterresources.com/pages/products/moab- social networking platforms that are more tailored to the cluster-suite.php. Accessed September, 2007. needs of enterprises need to be developed. These tools need [4] Cluster Resources, Inc. Torque Resource Manager Website. http://www.clusterresources.com/pages/products/torque- to provide greater security and control for IT organizations. resource-manager.php. Accessed April, 2008. Tools enabling support for virtualization and cloud comput- [5] R. Curry, C. Kiddle, N. Markatchev, R. Simmonds, T. Tan, ing infrastructures are starting to enter the market. How- M. Arlitt, and B. Walker. An automated resource provision- ever, the behaviors of these environments need to be stud- ing framework for data centres. To appear in Proceedings ied in more detail to better determine the functionalities re- of the 15th HP Software University Association (HP-SUA) quired to manage these environments efficiently. Workshop, 2008. [6] Facebook Website. http://www.facebook.com/. Accessed In the future, we plan to more closely analyze applica- April, 2008. tion usage patterns on existing social networking platforms [7] Friendster Website. http://www.friendster.com/. Accessed to better understand the application lifecycle and the utility April, 2008. [8] Google. OpenSocial Website. of the approach discussed in this paper. We are also work- http://code.google.com/apis/opensocial/. Accessed April, ing on applying this approach to other academic and indus- 2008. try based projects to explore how heterogeneous services [9] Google. orkut Website. http://www.orkut.com/. Accessed can be supported in the same environment and to further April, 2008. 9
  • 11. Figure 7. Smokeview visualization [10] hi5 Website. http://hi5.com/. Accessed April, 2008. [20] National Institute of Standards and Technology [11] Huddle Website. http://www.huddle.net/. Accessed April (NIST). Fire Dynamics Simulator (FDS) Website. 2008. http://www.fire.nist.gov/fds/. Accessed February 2008. [12] Huddle. Workspaces Facebook Application Website. [21] OpenSolaris. ZFS Website. www.facebook.com/applications/Workspaces/20383310695. http://opensolaris.org/os/community/zfs/. Accessed April, Accessed April 2008. 2008. [13] Joyent Website. http://www.joyent.com/. Accessed April [22] RealVNC Website. http://www.realvnc.com/. Accessed 2008. April, 2008. [23] SelectMinds Website. http://www.selectminds.com/. Ac- [14] LeverageSoftware Website. cessed April, 2008. http://www.leveragesoftware.com/. Accessed April, 2008. [24] Sophos. 50% of employees blocked from accessing Face- [15] LinkedIn Website. http://www.linkedin.com/. Accessed book at work, Sophos survey reveals. Sophos Press Office. April, 2008. http://www.sophos.com/pressoffice/news/articles/2007/08/block- [16] LinkedIn. LinkedIn Introduces Intelligent Applications facebook.html, August 21, 2007. Platform. LinkedIn Press Releases. [25] Sun Microsystems. Network.com Website. http://www.linkedin.com/static?key=press releases 121007 2, http://network.com/. Accessed April, 2008. December 10, 2007. [26] VisiblePath Website. http://www.visiblepath.com/. Accessed [17] Microsoft. Microsoft Office Sharepoint Server Web- April, 2008. site. http://www.microsoft.com/sharepoint/. Accessed April, [27] WorkLight. WorkBook Website. 2008. http://myworklight.com/workbook/. Accessed April 2008. [18] MySpace Website. http://www.myspace.com/. Accessed April, 2008. [19] nanoHUB Portal. http://www.nanohub.org/. Accessed March, 2008. 10