2. Agenda
• Introduction to Cloud
• What is Cloud?
• What’s not Cloud?
• Service Models: IaaS, PaaS, SaaS, NaaS, BaaS.
• Deployment (Delivery) Models
• Threats
• Cloud World Forum 2013
31 August 2021 2
6. What is Cloud?
If you will try to find the correct definition for “Cloud” and search the web
you will see that mostly Cloud is defined as Computing Model which
connects large number of networks and computers, which is scalable and
elastic and mostly delivered as a service via Network (commonly Internet).
31 August 2021 6
7. What is Cloud?
Here are some definitions from different online sources:
• Wikipedia: Cloud computing is a coll computing concepts that involve a
large number of computers connected through a real-time
communication network (typically the Internet).
• Techtarget: Cloud computing is a general term for anything that involves
delivering hosted services over the Internet.
• Gartner: Gartner defines cloud computing as a style of computing in
which scalable and elastic IT-enabled capabilities are delivered as a
service using Internet technologies.
• Forrester: A standardized IT capability (services, software, or
infrastructure) delivered via Internet technologies in a pay-per-use, self-
service way.
31 August 2021 7
8. What is Cloud?
But the most common and more exactly accepted definition is given by
National Institute of Standards and Technology:
• Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service
provider interaction. - NIST Definition of Cloud Computing
31 August 2021 8
9. What is not Cloud?
There are some technologies which are strongly interrelated with
Cloud Computing, but actually are not Cloud:
• Service-oriented architecture (SOA)
• Grid Computing
• Mainframes
• WEB 2.0
31 August 2021 9
10. What is not Cloud?
• Service-oriented architecture (SOA) – is a Software Architecture which
is structured as collections of modules (known as services). This
services run independently on different hosts and are connected over
network to complete functionality of a large software application.
• Grid Computing – a form of distributed and parallel computing,
whereby a super computer is composed from clustered nodes which
are connected via Network. In more east way, it can be described as
Connected computer which are connected to serve for a common task.
• Mainframes – Powerful computers mainly used by large organizations
for critical applications.
• WEB 2.0 – is a class of service that may be delivered in many different
ways. Cloud computing here is a business model for hosting these
services.
31 August 2021 10
11. Architecture
31 August 2021 11
Frontend + backend + delivery(network) = Cloud Love Architecture
Cloud computing architecture refers to the components and subcomponents
required for cloud computing. These components typically consist of a front
end platform (fat client, thin client, mobile device), back end platforms
(servers, storage), a cloud based delivery, and a network (Internet, Intranet,
Intercloud). And of course the service which is delivered to end User.
Combined, these components make up cloud computing architecture.
13. Service Models: IaaS, PaaS, SaaS,
31 August 2021 13
Cloud computing Providers offer their services according to several classified
Service Models. The classification uses the so-called SPI (SaaS, PaaS, IaaS)
model.
14. Service Model: IaaS
31 August 2021 14
Infrastructure as a Service is a provision model in which an
organization outsources the equipment used to support
operations, including storage, hardware, servers and networking
and virtualization components. The service provider owns the
equipment and is responsible for housing, running and
maintaining it. The Client is responsible for managing Operating
System, Runtime, and Application management. The client
typically pays on a per-use basis. Examples: Amazon EC2,
Windows Azure
15. Service Model: PaaS
31 August 2021 15
Platform as a Service - cloud providers deliver a computing
platform, typically including operating system, programming
language execution environment, database, and web server.
Application developers can develop and run their software
solutions on a cloud platform without the cost and complexity of
buying and managing the underlying hardware and software
layers. Client manages DATA and application. Example: Google
App Engine
16. Service Model: SaaS
31 August 2021 16
Software as a Service is a software distribution model in which
applications are hosted by a vendor or service provider and made
available to customers over a network, typically the Internet.
Client uses directly service. Examples: Google Apps, Microsoft
Office 365.
17. and NaaS
• Network-as-a-service (NaaS) is a business model for delivering network
services virtually over the Internet on a pay-per-use or monthly
subscription basis. In this model whole network configuration (routers
configurations, firewall configurations) could be moved to cloud. Client
is managing just a connection to computer or service. Network is
managed by service provider.
• M2M
• VPN
• BoD
• MVN
31 August 2021 17
18. and NaaS
Naas Service models:
• M2M – M2M network and backend software is moved to Cloud. Client
manages only frontend Applications and business services. Example: Axeda
• VPN – Extends a private network and the resources contained in the network
across public networks like the Internet. It enables a host computer to send
and receive data across shared or public networks as if it were a private
network with all the functionality, policies of the private network. Example:
OpenVPN
• BoD – Bandwidth on Demand (BoD): Technique by which traffic bandwidth in
an IT or Telecom network is assigned based on requirements between
different nodes or users. Under this model link bandwidth is dynamically
adapted to the instantaneous traffic demands of the nodes connected to the
link.
• MVN – Mobile Network Virtualization - Model consisting in a Telecom
infrastructure manufacturer or independent network enabler that builds and
operates a telecom network (wireless, or transport connectivity) and sells its
communication access capabilities to third parties (commonly mobile virtual
network operators MVNO) Example: LycaMobile
31 August 2021 18
19. BaaS/MBaaS
31 August 2021 19
Backend-as-a-Service, also called “Mobile Backend-as-a-Service,” is a
specialized cloud utility that allows customers to connect their web and mobile
applications to cloud-based databases and provide user management, push
notifications, and integration with social networking services. These services are
made available through software development kits (SDKs) and application
programming interfaces (APIs). Example: Appcelerator
20. Deployment (delivery models)
Depending on how Cloud is Deployed (or is how delivered to client),
there are main 2 different models:
• Private
• Public
31 August 2021 20
21. Private Cloud
Private cloud is cloud infrastructure operated solely for a single
organization, whether managed internally or by a third-party. Private
Cloud can be hosted internally or externally.
31 August 2021 21
Pros:
• Security and compliance
standards and regulations
are managed by Customer.
• More customizable than
Public clouds.
• Some services work better
on dedicated environments.
Cons:
• Needs more investment
• Requires more
administration work from
Clients
• Even best administered
datacenters cant provide
the scalability and elasticity
of most Public Clouds.
Example: VMware vCloud Implementation
22. Public Cloud
• Public cloud services are rendered over a network that is open for public
use. Technically there is no difference between public and private cloud
architecture, however, security consideration may be substantially different
for services.
31 August 2021 22
Pros:
• Do not need investment as
much as Private Clouds. Pay-as-
you-go pricing models are
available
• Fast setup, scaling, elasticity
• Do not need much
administration as Private
Ckouds
Cons:
• Customers must handle their
own security issues
• Less customizable than Private
Clouds on the levels of
Hardware, Software(Operating
System and Runtime levels).
• Certain types of software and
services don’t function in
shared or virtualized
environments.
Example: Amazon AWS
23. Deployment (Delivery) Models: Private vs. Public
Private Cloud Public Cloud
Location On-Premise Off-Premise
Connection Over Private Network Over Internet
Scaling Directions Scale out (applications) Scale up (users)
Scaling Limits While defined limits No limits
Privacy Yes No
Customization Yes No
Pricing Capacity Utility
Financial Center Cost Center Revenue/Profit Center
31 August 2021 23
24. Deployment (Delivery) Models: Hybrid
31 August 2021 24
Hybrid cloud is a composition of more clouds. For example one organization
could have deployed Private(Enterprise) Cloud for common tasks which is
also connected to Public Cloud to accomplish needed tasks.
25. Deployment (Delivery) Models: Partner,
Community, Vertical
31 August 2021 25
• Community/ Partner cloud shares infrastructure between several
organizations from a specific community with common concerns (security,
compliance, jurisdiction, etc.), whether managed internally or by a third-
party and hosted internally or externally.
• A vertical cloud, or vertical cloud computing, is the phrase used to describe
the optimization of cloud computing and cloud services for a particular
vertical (e.g., a specific industry) or specific use application. Today, the
vertical health-care cloud is one of the more well-established vertical
clouds. Government, same kind of organizations.
27. Threats
Cloud computing offers many benefits, but is vulnerable to threats. As
cloud computing uses increase, it is likely that more criminals find new
ways to exploit system vulnerabilities.
• Privacy
• Security
• Vendor lock-in
31 August 2021 27
28. Threats
Privacy:
• Privacy advocates have criticized the cloud model for giving hosting
companies' greater ease to control—and thus, to monitor at will—
communication between host company and end user, and access
user data (with or without permission)
31 August 2021 28
29. Threats
Security:
• To mitigate the threat, cloud computing stakeholders should invest
heavily in risk assessment to ensure that the system encrypts to
protect data, establishes trusted foundation to secure the platform
and infrastructure, and builds higher assurance into auditing to
strengthen compliance. Security concerns must be addressed to
maintain trust in cloud computing technology
31 August 2021 29
30. Threats
Vendor Lock-in:
• Because cloud computing is still relatively new, standards are still
being developed. Many cloud platforms and services are proprietary,
meaning that they are built on the specific standards, tools and
protocols developed by a particular vendor for its particular cloud
offering. This can make migrating off a proprietary cloud platform
prohibitively complicated and expensive.
31 August 2021 30
31. Materials used and Further reading
• Wikipedia: Cloud Computing
• DZone’s Definitive Guide to Cloud Providers – free pdf available for every
registered user. – a great comparison list of almost all providers are
available in this PDF
• Cloud Computing Explained by John Rhoton – can be found in Amazon –
much recommended book from a Cloud Guru
31 August 2021 31
32. Cloud World Forum 2013
31 August 2021 32
150 Providers, 220 speakers, 9 theatres
and 6125 attendees
33. Cloud World Forum 2013
31 August 2021 33
An agenda led by leading experts including Jeff Jafffe, CEO, World Wide
Web, Oskar Stal, CTO, Spotify, Jeff Barr, Chief Evangelist, Amazon also
included unique product launches and expert opinions of all pivotal solution
providers in the fields of Cloud, Big Data and Enterprise IT. In fact, more than
150 of them were represented in our 2013 agenda in a variety of sessions,
from keynote presentations to panels and workshops.
34. Cloud World Forum 2013
• Cloud Computing market predicted to be worth $131 billion by the end of
this year.
31 August 2021 34
36. Questions???
31 August 2021 36
about.me/faridz
You can find me at the different Social Networks. My social network profiles are
available from my homepage, link in the slide So you can ask your question here, or
there.
Nowadays almost everyone is talking about cloud. It’s seems to be new trend, just like Web 2.0 several years ago. But really what is it?
An iCloud in my smartphone? Which saves some my documents…, and games… ah and my photos somewhere online, which I don’t see exactly where.
Or is it my Dropbox? Some kind of an online USB stick which always keeps my files safe and are available wherever I have an internet.
Virtualization? A virtualized machine which runs some software or OS.
Mario? Just kidding
Nowadays almost everyone is talking about cloud. It’s seems to be new trend, just like Web 2.0 several years ago. But really what is it?
An iCloud in my smartphone? Which saves some my documents…, and games… ah and my photos somewhere online, which I don’t see exactly where.
Or is it my Dropbox? Some kind of an online USB stick which always keeps my files safe and are available wherever I have an internet.
Virtualization? A virtualized machine which runs some software or OS.
Mario? Just kidding
Nowadays almost everyone is talking about cloud. It’s seems to be new trend, just like Web 2.0 several years ago. But really what is it?
An iCloud in my smartphone? Which saves some my documents…, and games… ah and my photos somewhere online, which I don’t see exactly where.
Or is it my Dropbox? Some kind of an online USB stick which always keeps my files safe and are available wherever I have an internet.
Virtualization? A virtualized machine which runs some software or OS.
Mario? Just kidding
Before going further and finding the answer for our question “What’s Cloud?”, if you will google or open some documentation and try to find definition to “Cloud” you will see that mostly Cloud is defined as Computing Model which connects large number of networks and computers, which is scalable and elastic and mostly delivered as a service via Network (commonly Internet).
Examples:
Wikipedia: Cloud computing is a coll computing concepts that involve a large number of computers connected through a real-time communication network (typically the Internet).
Techtarget: Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
Gartner: Gartner defines cloud computing as a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.
Forrester: A standardized IT capability (services, software, or infrastructure) delivered via Internet technologies in a pay-per-use, self-service way.
But the most common and more exactly accepted definition is given by National Institute of Standards and Technology.
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. - NIST Definition of Cloud Computing
Before going further and finding the answer for our question “What’s Cloud?”, if you will google or open some documentation and try to find definition to “Cloud” you will see that mostly Cloud is defined as Computing Model which connects large number of networks and computers, which is scalable and elastic and mostly delivered as a service via Network (commonly Internet).
Examples:
Wikipedia: Cloud computing is a coll computing concepts that involve a large number of computers connected through a real-time communication network (typically the Internet).
Techtarget: Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
Gartner: Gartner defines cloud computing as a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.
Forrester: A standardized IT capability (services, software, or infrastructure) delivered via Internet technologies in a pay-per-use, self-service way.
But the most common and more exactly accepted definition is given by National Institute of Standards and Technology.
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. - NIST Definition of Cloud Computing
Before going further and finding the answer for our question “What’s Cloud?”, if you will google or open some documentation and try to find definition to “Cloud” you will see that mostly Cloud is defined as Computing Model which connects large number of networks and computers, which is scalable and elastic and mostly delivered as a service via Network (commonly Internet).
Examples:
Wikipedia: Cloud computing is a coll computing concepts that involve a large number of computers connected through a real-time communication network (typically the Internet).
Techtarget: Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
Gartner: Gartner defines cloud computing as a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.
Forrester: A standardized IT capability (services, software, or infrastructure) delivered via Internet technologies in a pay-per-use, self-service way.
But the most common and more exactly accepted definition is given by National Institute of Standards and Technology.
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. - NIST Definition of Cloud Computing
There are some technologies which are strongly interrelated with Cloud Computing, but actually are not Cloud:
Service-oriented architecture (SOA) – is a Software Architecture which is structured as collections of modules (known as services). This services run independently on different hosts and are connected over network to complete functionality of a large software application.
Grid Computing – a form of distributed and parallel computing, whereby a super computer is composed from clustered nodes which are connected via Network. In more east way, it can be described as Connected computer which are connected to serve for a common task.
Mainframes – Powerful computers mainly used by large organizations for critical applications.
WEB 2.0 – is a class of service that may be delivered in many different ways. Cloud computing here is a business model for hosting these services.
There are some technologies which are strongly interrelated with Cloud Computing, but actually are not Cloud:
Service-oriented architecture (SOA) – is a Software Architecture which is structured as collections of modules (known as services). This services run independently on different hosts and are connected over network to complete functionality of a large software application.
Grid Computing – a form of distributed and parallel computing, whereby a super computer is composed from clustered nodes which are connected via Network. In more east way, it can be described as Connected computer which are connected to serve for a common task.
Mainframes – Powerful computers mainly used by large organizations for critical applications.
WEB 2.0 – is a class of service that may be delivered in many different ways. Cloud computing here is a business model for hosting these services.
Cloud computing architecture refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform (fat client, thin client, mobile device), back end platforms (servers, storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). And of course the service which is delivered to end User. Combined, these components make up cloud computing architecture.
Cloud computing architecture refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform (fat client, thin client, mobile device), back end platforms (servers, storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). And of course the service which is delivered to end User. Combined, these components make up cloud computing architecture.
Cloud computing Providers offer their services according to several classified Service Models. The classification uses the so-called SPI (SaaS, PaaS, IaaS) model.
IaaS - Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking and virtualization components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The Client is responsible for managing Operating System, Runtime, and Application management. The client typically pays on a per-use basis. Examples: Amazon EC2, Windows Azure
PaaS - Platform as a Service - cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. Client manages DATA and application. Example: Google App Engine
SaaS - Software as a Service is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. Client uses directly service. Examples: Google Apps, Microsoft Office 365.
Cloud computing Providers offer their services according to several classified Service Models. The classification uses the so-called SPI (SaaS, PaaS, IaaS) model.
IaaS - Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking and virtualization components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The Client is responsible for managing Operating System, Runtime, and Application management. The client typically pays on a per-use basis. Examples: Amazon EC2, Windows Azure
PaaS - Platform as a Service - cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. Client manages DATA and application. Example: Google App Engine
SaaS - Software as a Service is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. Client uses directly service. Examples: Google Apps, Microsoft Office 365.
Cloud computing Providers offer their services according to several classified Service Models. The classification uses the so-called SPI (SaaS, PaaS, IaaS) model.
IaaS - Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking and virtualization components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The Client is responsible for managing Operating System, Runtime, and Application management. The client typically pays on a per-use basis. Examples: Amazon EC2, Windows Azure
PaaS - Platform as a Service - cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. Client manages DATA and application. Example: Google App Engine
SaaS - Software as a Service is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. Client uses directly service. Examples: Google Apps, Microsoft Office 365.
Cloud computing Providers offer their services according to several classified Service Models. The classification uses the so-called SPI (SaaS, PaaS, IaaS) model.
IaaS - Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking and virtualization components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The Client is responsible for managing Operating System, Runtime, and Application management. The client typically pays on a per-use basis. Examples: Amazon EC2, Windows Azure
PaaS - Platform as a Service - cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. Client manages DATA and application. Example: Google App Engine
SaaS - Software as a Service is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. Client uses directly service. Examples: Google Apps, Microsoft Office 365.
NaaS – Network as a Service - where the capability provided to the cloud service user is to use network/transport connectivity services and/or inter-cloud network connectivity services. In this model whole network configuration (routers configurations, firewall configurations) could be moved to cloud. Client is managing just a connection to computer or service. Network is managed by service provider. There several Naas Service models:
M2M – M2M network and backend software is moved to Cloud. Client manages only frontend Applications and business services. Example: Axeda
VPN – Extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, policies of the private network. Example: OpenVPN
BoD – Bandwidth on Demand (BoD): Technique by which traffic bandwidth in an IT or Telecom network is assigned based on requirements between different nodes or users. Under this model link bandwidth is dynamically adapted to the instantaneous traffic demands of the nodes connected to the link.
MVN – Mobile Network Virtualization - Model consisting in a Telecom infrastructure manufacturer or independent network enabler that builds and operates a telecom network (wireless, or transport connectivity) and sells its communication access capabilities to third parties (commonly mobile virtual network operators MVNO) Example: LycaMobile
NaaS – Network as a Service - where the capability provided to the cloud service user is to use network/transport connectivity services and/or inter-cloud network connectivity services. In this model whole network configuration (routers configurations, firewall configurations) could be moved to cloud. Client is managing just a connection to computer or service. Network is managed by service provider. There several Naas Service models:
M2M – M2M network and backend software is moved to Cloud. Client manages only frontend Applications and business services. Example: Axeda
VPN – Extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, policies of the private network. Example: OpenVPN
BoD – Bandwidth on Demand (BoD): Technique by which traffic bandwidth in an IT or Telecom network is assigned based on requirements between different nodes or users. Under this model link bandwidth is dynamically adapted to the instantaneous traffic demands of the nodes connected to the link.
MVN – Mobile Network Virtualization - Model consisting in a Telecom infrastructure manufacturer or independent network enabler that builds and operates a telecom network (wireless, or transport connectivity) and sells its communication access capabilities to third parties (commonly mobile virtual network operators MVNO) Example: LycaMobile
BaaS/MBaaS - Backend-as-a-Service, also called “Mobile Backend-as-a-Service,” is a specialized cloud utility that allows customers to connect their web and mobile applications to cloud-based databases and provide user management, push notifications, and integration with social networking services. These services are made available through software development kits (SDKs) and application programming interfaces (APIs). Example: Appcelerator
Depending on how Cloud is Deployed (or is how delivered to client), there are main 2 different models:
Private Cloud:
Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party. Private Cloud can be hosted internally or externally.
Pros:
Security and compliance standards and regulations are managed by Customer.
More customizable than Public clouds.
Some services work better on dedicated environments.
Cons:
Needs more investment
Requires more administration work from Clients
Even best administered datacenters cant provide the scalability and elasticity of most Public Clouds.
Example: VMware vCloud Implementation
Public Cloud:
Public cloud services are rendered over a network that is open for public use. Technically there is no difference between public and private cloud architecture, however, security consideration may be substantially different for services.
Pros:
Do not need investment as much as Private Clouds. Pay-as-you-go pricing models are available
Fast setup, scaling, elasticity
Do not need much administration as Private Ckouds
Cons:
Customers must handle their own security issues
Less customizable than Private Clouds on the levels of Hardware, Software(Operating System and Runtime levels).
Certain types of software and services don’t function in shared or virtualized environments.
See the table for more eye candy difference between Private and Public Clouds.
Example: Amazon AWS
Hybrid cloud is a composition of more clouds. For example one organization could have deployed Private(Enterprise) Cloud for common tasks which is also connected to Public Cloud to accomplish needed tasks.
Community/ Partner cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally.
A vertical cloud, or vertical cloud computing, is the phrase used to describe the optimization of cloud computing and cloud services for a particular vertical (e.g., a specific industry) or specific use application. Today, the vertical health-care cloud is one of the more well-established vertical clouds. Government, same kind of organizations.
Community/ Partner cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally.
A vertical cloud, or vertical cloud computing, is the phrase used to describe the optimization of cloud computing and cloud services for a particular vertical (e.g., a specific industry) or specific use application. Today, the vertical health-care cloud is one of the more well-established vertical clouds. Government, same kind of organizations.
Cloud computing offers many benefits, but is vulnerable to threats. As cloud computing uses increase, it is likely that more criminals find new ways to exploit system vulnerabilities.
Privacy:
Privacy advocates have criticized the cloud model for giving hosting companies' greater ease to control—and thus, to monitor at will—communication between host company and end user, and access user data (with or without permission)
Security:
To mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data, establishes trusted foundation to secure the platform and infrastructure, and builds higher assurance into auditing to strengthen compliance. Security concerns must be addressed to maintain trust in cloud computing technology.
Vendor Lock-in:
Because cloud computing is still relatively new, standards are still being developed. Many cloud platforms and services are proprietary, meaning that they are built on the specific standards, tools and protocols developed by a particular vendor for its particular cloud offering. This can make migrating off a proprietary cloud platform prohibitively complicated and expensive.
Three types of vendor lock-in can occur with cloud computing:
Platform lock-in: cloud services tend to be built on one of several possible virtualization platforms, for example VMWare or Xen. Migrating from a cloud provider using one platform to a cloud provider using a different platform could be very complicated.
Data lock-in: since the cloud is still new, standards of ownership, i.e. who actually owns the data once it lives on a cloud platform, are not yet developed, which could make it complicated if cloud computing users ever decide to move data off of a cloud vendor's platform.
Tools lock-in: if tools built to manage a cloud environment are not compatible with different kinds of both virtual and physical infrastructure, those tools will only be able to manage data or apps that live in the vendor's particular cloud environment.
Cloud computing offers many benefits, but is vulnerable to threats. As cloud computing uses increase, it is likely that more criminals find new ways to exploit system vulnerabilities.
Privacy:
Privacy advocates have criticized the cloud model for giving hosting companies' greater ease to control—and thus, to monitor at will—communication between host company and end user, and access user data (with or without permission)
Security:
To mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data, establishes trusted foundation to secure the platform and infrastructure, and builds higher assurance into auditing to strengthen compliance. Security concerns must be addressed to maintain trust in cloud computing technology.
Vendor Lock-in:
Because cloud computing is still relatively new, standards are still being developed. Many cloud platforms and services are proprietary, meaning that they are built on the specific standards, tools and protocols developed by a particular vendor for its particular cloud offering. This can make migrating off a proprietary cloud platform prohibitively complicated and expensive.
Three types of vendor lock-in can occur with cloud computing:
Platform lock-in: cloud services tend to be built on one of several possible virtualization platforms, for example VMWare or Xen. Migrating from a cloud provider using one platform to a cloud provider using a different platform could be very complicated.
Data lock-in: since the cloud is still new, standards of ownership, i.e. who actually owns the data once it lives on a cloud platform, are not yet developed, which could make it complicated if cloud computing users ever decide to move data off of a cloud vendor's platform.
Tools lock-in: if tools built to manage a cloud environment are not compatible with different kinds of both virtual and physical infrastructure, those tools will only be able to manage data or apps that live in the vendor's particular cloud environment.
Cloud computing offers many benefits, but is vulnerable to threats. As cloud computing uses increase, it is likely that more criminals find new ways to exploit system vulnerabilities.
Privacy:
Privacy advocates have criticized the cloud model for giving hosting companies' greater ease to control—and thus, to monitor at will—communication between host company and end user, and access user data (with or without permission)
Security:
To mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data, establishes trusted foundation to secure the platform and infrastructure, and builds higher assurance into auditing to strengthen compliance. Security concerns must be addressed to maintain trust in cloud computing technology.
Vendor Lock-in:
Because cloud computing is still relatively new, standards are still being developed. Many cloud platforms and services are proprietary, meaning that they are built on the specific standards, tools and protocols developed by a particular vendor for its particular cloud offering. This can make migrating off a proprietary cloud platform prohibitively complicated and expensive.
Three types of vendor lock-in can occur with cloud computing:
Platform lock-in: cloud services tend to be built on one of several possible virtualization platforms, for example VMWare or Xen. Migrating from a cloud provider using one platform to a cloud provider using a different platform could be very complicated.
Data lock-in: since the cloud is still new, standards of ownership, i.e. who actually owns the data once it lives on a cloud platform, are not yet developed, which could make it complicated if cloud computing users ever decide to move data off of a cloud vendor's platform.
Tools lock-in: if tools built to manage a cloud environment are not compatible with different kinds of both virtual and physical infrastructure, those tools will only be able to manage data or apps that live in the vendor's particular cloud environment.
Cloud computing offers many benefits, but is vulnerable to threats. As cloud computing uses increase, it is likely that more criminals find new ways to exploit system vulnerabilities.
Privacy:
Privacy advocates have criticized the cloud model for giving hosting companies' greater ease to control—and thus, to monitor at will—communication between host company and end user, and access user data (with or without permission)
Security:
To mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data, establishes trusted foundation to secure the platform and infrastructure, and builds higher assurance into auditing to strengthen compliance. Security concerns must be addressed to maintain trust in cloud computing technology.
Vendor Lock-in:
Because cloud computing is still relatively new, standards are still being developed. Many cloud platforms and services are proprietary, meaning that they are built on the specific standards, tools and protocols developed by a particular vendor for its particular cloud offering. This can make migrating off a proprietary cloud platform prohibitively complicated and expensive.
Three types of vendor lock-in can occur with cloud computing:
Platform lock-in: cloud services tend to be built on one of several possible virtualization platforms, for example VMWare or Xen. Migrating from a cloud provider using one platform to a cloud provider using a different platform could be very complicated.
Data lock-in: since the cloud is still new, standards of ownership, i.e. who actually owns the data once it lives on a cloud platform, are not yet developed, which could make it complicated if cloud computing users ever decide to move data off of a cloud vendor's platform.
Tools lock-in: if tools built to manage a cloud environment are not compatible with different kinds of both virtual and physical infrastructure, those tools will only be able to manage data or apps that live in the vendor's particular cloud environment.
Wikipedia: Cloud Computing
DZone’s Definitive Guide to Cloud Providers – free pdf available for every registered user. – a great comparison list of almost all providers are available in this PDF
Cloud Computing Explained by John Rhoton – can be found in Amazon – much recommended book from Cloud Guru
The 5th Annual Cloud World forum was held on 26-27th June at London National Olympia Hall. 150 Providers, 220 speakers, 9 theatres and 6125 attendees were the statistics for the Event. Exhibitors List is available at http://cloudwf.com/2013-exhibitors/.
An agenda led by leading experts including Jeff Jafffe, CEO, World Wide Web, Oskar Stal, CTO, Spotify, Jeff Barr, Chief Evangelist, Amazon also included unique product launches and expert opinions of all pivotal solution providers in the fields of Cloud, Big Data and Enterprise IT. In fact, more than 150 of them were represented in our 2013 agenda in a variety of sessions, from keynote presentations to panels and workshops.
Among attendees were Nasa, BMW, IKEA, adidas, PayPal and many others. That’s not surprise, because Cloud Computing market predicted to be worth $131 billion by the end of this year.
Telecoms Conference & Exhibition: Telecoms Tech World brings together leading telco firms, service providers, equipment manufacturers and OTT players to debate and discuss the new opportunities and challenges facing the telecoms industry. Expert workshops over the two days will provide high level insight into areas including OTT/VAS strategies, M2M strategies, dealing with the capacity crunch and the new opportunities in identity, billings and payments. With speed networking, a dedicated networking tool, exclusive party and a bustling exhibition with 1500+ attendees, the event creates the perfect opportunity to make valuable connections and forge pioneering relationships for the future.
The conference will once again address all of the latest issues around modernization of Service Delivery Platforms, providing a consistent API experience, API management, profitable cloud services, the ongoing evolution of the ‘platform’ along with RCS, WebRTC and the role of SDP in delivering M2M services.
Developer Conference & Exhibition: Now in its 4th year, Apps World has grown to be the leading global multi-platform event in the app industry. This year’s Earls Court 2 event is set to be the biggest yet with over 250 exhibitors and over 8000+ attendees including developers, mobile marketers, mobile operators, device manufacturers, platform owners and industry professionals registered for two days of high level insight and discussion. With 12 targeted workshop tracks, speed meeting, one-to-one meetings, parties, and awards the event will be tackling a spectrum of issues across the app ecosystem.
You can find me at the different Social Networks. My social network profiles are available from my homepage, link in the slide So you can ask your question here, or there.