SlideShare ist ein Scribd-Unternehmen logo
1 von 31
PRIVATE, HYBRID AND
                                                   PUBLIC CLOUDS
                                                   Cloud Bursting & the Hybridization of
                                                   Private and Public Data Services
                                                   Dan Hushon
                                                   EMC Distinguished Engineer
                                                   CTO Service Provider Program




© Copyright 2011 EMC Corporation. All rights reserved.                                     1
Dimensions of Cloud
                                                   Adoption




© Copyright 2011 EMC Corporation. All rights reserved.                   2
2010-2013 Public Cloud Market Opportunity Forecast


               $50B
                                            $43.9B
                   40
                                              46%
                   30                                                                                           $26.4B
                           $22.2B                                                                                          IaaS
                   20                         14%                                                                   36%
                             43%                                                $16.2B
                                                                                 18%                                       PaaS
                                                                                                     $10.5B
                   10
                               10%
                                                                  $8.6B
                                              40%                                                     26%           62%
                             47%                                                 79%
                                                                   90%                                72%                  S aaS
                     0
                             2010            2013                 2010          2013                 2010           2013
                                      IDC                          The 451 Group                         Gartner

 ‘10 – ‘13 CAGR                       26%                                 24%                                 36%

                            Source: Gartner, June 2010; IDC, June 2010; The 451 Group, August 2010




  By 2014, some 43% of IT will be delivered by Cloud Providers*
                      *Microsoft cloud adoption study 2011




© Copyright 2011 EMC Corporation. All rights reserved.                                                                             3
Journey To The Cloud:
    Agility of IT
  Enterprise IT                                                   Private Cloud   Hybrid Cloud
                                        LegacyRe-Platformed
                                        X86 &
                                         Existing Applications
                                         Apps Apps
                                        Legacy
                                         Tier 2          x86
                                                         Tier 1




                                                Applications

                                                                                    Service
                                                                                    Provider
                                                Infrastructure




© Copyright 2011 EMC Corporation. All rights reserved.                                           4
Optimize Between Private & SP Cloud
  Enterprise IT                                                 Private Cloud           Hybrid Cloud
                                        Legacy                   X86 & Re-Platformed    X86 & Re-Platformed
                                         Apps                           Apps                   Apps
                                                                  Tier 2
                                                                   Tier 2     Tier 1
                                                                               Tier 1    Tier 2      Tier 1




                                                Applications

                                                                                           Service
                                                                                           Provider
                                               Infrastructure




© Copyright 2011 EMC Corporation. All rights reserved.                                                        5
Hybrid Cloud = Private Cloud + SP Cloud
  Enterprise IT                                                  Private Cloud                 Hybrid Cloud



                                                                                       Cloud OS
                                                                                   Information
                                                                                  Security

                                                                                 Application
                                                Applications                     Federation
                                                                                  Hybrid
                                                                                  Cloud
                                                                                 Data
                                                Infrastructure                   Federation




© Copyright 2011 EMC Corporation. All rights reserved.                                                        6
Hybrid Clouds Require Hybridizing Technologies


                         Management                          Managing Across Pools



                                                     Trust   Visibility & Control



                                   Federation Mobility Of Apps & Data



© Copyright 2011 EMC Corporation. All rights reserved.                               7
We Have Entered The Information Era
Creating Value From Information Is The New Economy




© Copyright 2011 EMC Corporation. All rights reserved.   8
Big Data Will Scale To Exabytes
                              WILL BE MEASURED IN                  WILL BE MEASURED IN                WILL BE MEASURED IN

                               TERABYTES                            PETABYTES                           EXABYTES
LARGE                             1TB = 1,000GB                        1PB = 1,000TB                      1EB = 1,000PB
  VOLUME OF INFORMATION




SMALL
                                   1990’s                               2000’s                           2010’s
                          (RDMBS, DATA WAREHOUSE, ETC.)    (CONTENT & DIGITAL ASSET MANAGEMENT)   (NO-SQL, KEY/VALUE, ETC.)




  © Copyright 2011 EMC Corporation. All rights reserved.                                                                      9
Reasoning That…
                                                   •  Increasingly Information is produced
                                                      outside the Enterprise
                                                   •  Combined with information across a
                                                      set of partners
                                                   •  Consumed by ever more participants



© Copyright 2011 EMC Corporation. All rights reserved.                                       10
Realize Collaborations, NOT Exchanges
•  Exchanges have emerged as secure point-2-point
   pipes between participants
         –  Some would say “dumb pipes”
•  Trusted Collaborations are Different…
                                                         Iterate
                                +                                  +               +




                                                                                       INFORMATION
INFORMATION                                   PROCESS              COLLABORATION
                                                                                       GOVERNANCE


© Copyright 2011 EMC Corporation. All rights reserved.                                               11
Data’s Dis(re)Location
•  Increasingly valuable data is produced in the cloud
•  Backhaul Bandwidth isn’t keeping pace with
   Backbone
•  Enterprises cannot defy physics nor economics
•  So, this data will to stay in the cloud
•  Economics improve to the point that we don’t throw
   anything away
•  New value is derived from Big Data sets in the
   cloud, and the ecosystems that it produces


© Copyright 2011 EMC Corporation. All rights reserved.   12
Intelligence from “Internet Information”
                  Information Driven                     Software As A Service
                  Enterprise                               Analytics As A Service



                                                                                     Internet



            Healthcare Intelligence
                                                    Big Data
            Small Targeted Information Delivery
            Specific Clinical or Operational Purposes
            $$$ in aggregate value                       Healthcare Information
                                                                     Large Internet Data Sets
                                                                     Diverse Information Portfolios
                                                                     ¢ in individual value




© Copyright 2011 EMC Corporation. All rights reserved.                                                13
Big Data Analytics Models
•  Attribution
         –  Credit for contribution in a complex process
•  Recommendation
         –  Similarity/likeness, to propensity to recommendation
•  Predictive Forecasting
         –  Improved decision making based upon multi-variant, risk and
            sensitivity driven analysis
•  Insight
         –  Statistical models to understand “unusual” behaviors
•  Benchmarking
         –  Comparing one entities performance against a population


© Copyright 2011 EMC Corporation. All rights reserved.                    14
“If it’s created in the cloud, keep it in
                   the cloud”




© Copyright 2011 EMC Corporation. All rights reserved.   15
Data Producers
•  The # of Data Producers is increasing exponentially
   worldwide
         –  Phones, tablets, vending machines, cameras, video security,
            trucks, tractors…
•  Connected Mobile devices are increasing in the fidelity
   of their telemetry
•  Social / Crowd-sourcing enables a fidelity unrivalled by
   any one companies “sensors”
•  Managing this data – placement, security, license,
   schema (@scale) becomes the information
   infrastructure challenge


© Copyright 2011 EMC Corporation. All rights reserved.                    16
Content Ingest Networks
                                                         •  Reversal of Data Migration
                                                         •  Exploit Bandwidth in Cloud
                                                            for associative reasoning
                                                         •  Provide a trusted scale-out
                                                            analytics environment for
                                                            information collaboration
                                                         •  Backhaul intelligence not
                                                            information
                                                         •  Extend monetization of
                                                            captured data productization
                                                            through associative markets

© Copyright 2011 EMC Corporation. All rights reserved.                                     17
Disruptions in Information Marketplace
•  Migration from in->out (CDN) to out->in (CIN) strategies
         –  Peer orientation and smart distribution improve accessibility
•  Indexing to Search
         –  Instead of pre-classified and indexed sets, emergence of
            multi-modal searchable strategies
•  Enterprise Protocols to Internet Protocols
         –  RESTful approaches, asynchronous delivery & subscribe-able
            models
         –  XA transactions -> eventual consistency models
•  Information Structures not a priori assumed.
         –  Hadoop [Map Reduce] + SQL (not either/or)


© Copyright 2011 EMC Corporation. All rights reserved.                      18
Information Pipelines
•  Putting information in the right place the first time
•  Pre-processing:
         –  Quality assurance operations
         –  Securitization including de-identification and tokenization
         –  Linkage processing – establishing associations for
            improved exploitation
         –  Canonicalization into common models
•  Thru Inlined Operators:
         –  GET: Classification, Meta-Data Extraction
         –  PUT: Search Indices, De-Duplication, Link & Token,
            Encryption, Placement advise


© Copyright 2011 EMC Corporation. All rights reserved.                    19
Improving Cloud
                                                   Economics & Trust
                                                   •  Trusted Multi-Tenancy




© Copyright 2011 EMC Corporation. All rights reserved.                        20
Cloud Changes Customer Expectations
•  Improved Control of and Visibility into the Environment
         –  Self-service using web-based controls
         –  Improved visibility of both function and expense
•  Isolation from other tenants; must ensure
         –  Privacy
         –  Non-interference
                   •  to ensure their SLO’s are met, regardless of other tenant workloads

•  Security
         –  Identity
                   •  Single sign-on federated from Enterprise to SP
         –  Ability to control access to shared resources
•  Improved performance to expense ratio (shared capital)
         –  Reliability
         –  Operational agility (contract/expand)



© Copyright 2011 EMC Corporation. All rights reserved.                                      21
Manifesting Trust in MT Environments
                                                                 User has suitable tools
                                                                 to control access, spend,
                                                                 performance & protection

                                                                             Provider has suitable controls
                                                                             to protect itself from a tenant
                                                                             as well as one tenant from another
Hybrid: Controls have common
semantics from one environment                                        Provider has suitable controls
to another                                                            create tenant provision-able bundles


     Visibility enabled across
     logical and physical boundaries
     when service spans locations

            Policy based controls have
            measurable and demonstrable                                     Visibility boundaries are respected
            effects.                                                        up/down hierarchy and across tenancies

               Service Level achievements / breaches                 Tenant can introspect metered resources
               are evident and shed light on responsible party       to understand / verify utilization charges



  © Copyright 2011 EMC Corporation. All rights reserved.                                                             22
Architecting for Trusted Multi-Tenancy
Complex Problem Domain


                                                    Administration           Access
                                                    (Control Path)         (Data Path)




                                                                 Assurance
                                                         (Visibility & Compliance)




© Copyright 2011 EMC Corporation. All rights reserved.                                   23
Tenets of Trusted Multi-Tenancy (TMT)
•  Make all customer-visible units of resource logical not physical
         –  Known MT properties/capabilities on any layer directly exposed to
            customers
•  Put those logical objects into containers [nested] with recursive
   delegated administration capabilities @ the container layer
         –  Separates the implementation of a resource from its contract
         –  Provides a common point of mediation and aggregation
         –  Hierarchical (Layered) relationships must be supported on both the data
            path and the control path
•  Implement out-of-band monitoring of management activity that
   verifies actual state of system remains in compliance
   throughout any management / state changes
         –  Out-of-band monitoring must be done at the container boundary for the
            container to support multi-tenancy
         –  Multi-tenant correlation (actual vs. expected) becomes critical to GRC




© Copyright 2011 EMC Corporation. All rights reserved.                                24
Solutions must address critical SP design principles
                          Foundational SP Design Factors and Delivery Principles
                                                                                       Multi-Tenancy Capabilities
 1                               2                        3                        4                     5                    6
  Security /                         Data                   Secure                     Service                                     Tenant
                                                                                                         SP Controls              Controls
 Compliance                       Protection               Separation                  Quality

 –  Security                     –  Business              Physical and/or          –  Tunable,           Manages              Manages
    information &                   continuity            logical separation          differentiated     –  Tenant            –  Security and
    event                        –  Disaster recovery     across tenants              Service Level                              compliance
                                                                                                         –  SLAs
    management                   –  Integrated backup      –  Data at rest            Agreements                              –  Database and file
                                                                                      (SLAs)             –  Security and
 –  Identity & access                 §  Source-based     –  Data access                                   Compliance           relocation
    management                                                                     –  SLA assurance                           –  Application image
                                          duplication      –  Address spaces                             Reports
 –  Configuration &                                        –  Authentication and   –  Storage, compute                           management
                                      §  Target-based                                                   –  Compliance
    change                                                                            and network                             –  Help/Support
                                          deduplication       name service                               –  Portal iews and
    management                                                                        provisioning and
                                 –  Replication               domains                                       monitoring        Reports
 –  Encryption and                                                                    pooling
                                    (synchronous or        –  Computing                                                       –  Portal views and
    Data Loss                                                                      –  QoS guarantees     Integrates
                                    asynchronous)                                                                                monitoring
    Prevention (DLP)                                                               –  Separation         –  Billing systems
                                 –  Data redundancy       Physical and/or                                                     –  Service audits and
      §  Data at rest, in                                                            assurance          –  OSS/BSS
                                    (e.g. RAID,           logical separation                                                     monitoring
          flight and in             snapshots,                                                           –  Provisioning
          use                                             between Provider                                                    –  Resource
                                    clones)               and Tenant                                        systems
 –  Enterprise key                                                                                                               utilization
                                                                                                         –  Self-service &
    management                                                                                              support systems   –  Billing
 –  Governance, risk                                                                                                          Self-Services
    and compliance                                                                                                            –  Provisioning
                                                                                                                              –  Tenant access
                                                                                                                              –  Permissions




© Copyright 2011 EMC Corporation. All rights reserved.                                                                                                25
TMT Products are not Enough
•  Customers are assembling products into TMT
   systems
         –  Need to take a systems view to decrease risk to
            customers and increase value/differentiation for EMC
•  Trusted Cloud Solutions are needed
         –  Need aggregations of products that are, themselves,
            compliant with TMT requirements
                   •  Aggregate control plane
                   •  Aggregate visibility




© Copyright 2011 EMC Corporation. All rights reserved.             26
Trust But Verify
An Analytics Opportunity: Metrics to Information
                                                                           GRC
                                                                        (e.g. Service
                                                                      Assurance & Risk
                                                                                                        Tenant-specific GRC
                                                                       Management)



                                                         Management    Resource




                                                                                         Management
                                                                      Management
              OSS                                                                                              BSS
                                                           Service




                                                                                           Billing
   (e.g. Provisioning,                                                                                    (e.g. Contracts,
   Trouble Ticketing &                                                 Analytics                              Billing &
       Resolution)                                                                                        Reconcilliation)




                                                                        Metrics &
          Tenant-aware Analytics                                                                      Tenant-tagged Metrics
                                                                         Events


© Copyright 2011 EMC Corporation. All rights reserved.                                                                        27
Cloud Trust Authority
 A set of cloud-based services for secure and compliant cloud computing
          Enterprises                                                                                              Cloud Service Providers
                                                             Report on compliance status
                                                            across multiple cloud providers
                                                             against a common benchmark


                                                           TrustVisibility&&Compliance
                                                               Security
                                                                 = Visibility + Control
                                                                             Reporting


                                                         Identities   Infrastructure Information



     Manage access to cloud                               Manage the security of the cloud IT                 Manage sensitive information:
  resources: Authentication, SSO/                           stack: hardening, integrity and                     Classification, Encryption,
     Federation, Provisioning,                             geolocation of workloads, threat                   Tokenization, Geolocation, etc.
         Entitlements, etc.                                          defense, etc.


                Value to the Enterprise                                                              Value to the Cloud Providers
 1.  Eliminate point to point integrations with Cloud                                         1.  Accelerate adoption by removing security and
     Providers                                                                                    compliance objections
 2.  Greater visibility and control over cloud services                                       2.  Eliminate point to point tenant integrations
 3.  Centrally manage security and compliance across                                          3.  Reduce on-going security and compliance
     clouds                                                                                       burden per tenant




© Copyright 2011 EMC Corporation. All rights reserved.                                                                                           28
What does all this mean?
•  Improved Intelligence with cost/performance
         –  Inside:Out &
         –  Outside:In
•  Cloud Locations provide opportunities:
         –  Better / Deeper analytics to solve for true causality
         –  Increased insight and targeting/relevance/prediction
•  Need to focus on collaborations, not exchanges
         –  Policy driven support for information trust models, not just
            participant trust
•  Systemic thinking about Trusted Multi-Tenancy across
   the delivery landscape


© Copyright 2011 EMC Corporation. All rights reserved.                     29
THANK YOU



© Copyright 2011 EMC Corporation. All rights reserved.   30
© Copyright 2011 EMC Corporation. All rights reserved.   31

Weitere ähnliche Inhalte

Was ist angesagt?

Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)guestceb1dfc
 
Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile InternetKlaas Wierenga
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21shenwai
 
Martin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynoteMartin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynoteMartin Geddes
 
Rcom investor ppt_may_2012
Rcom investor ppt_may_2012Rcom investor ppt_may_2012
Rcom investor ppt_may_2012Asif Khan
 
Green growth and network quality in a high-growth market - Martin Backstrom -...
Green growth and network quality in a high-growth market - Martin Backstrom -...Green growth and network quality in a high-growth market - Martin Backstrom -...
Green growth and network quality in a high-growth market - Martin Backstrom -...Ericsson France
 
IT Future 2012 - Presentation Fujitsu par David Concordel
IT Future 2012 - Presentation Fujitsu par  David ConcordelIT Future 2012 - Presentation Fujitsu par  David Concordel
IT Future 2012 - Presentation Fujitsu par David ConcordelFujitsu France
 
DB2 Storage Engine for MySQL and Open Source Applications Session
DB2 Storage Engine for MySQL and Open Source Applications SessionDB2 Storage Engine for MySQL and Open Source Applications Session
DB2 Storage Engine for MySQL and Open Source Applications SessionZendCon
 
Introduction to Compound Photonics
Introduction to Compound PhotonicsIntroduction to Compound Photonics
Introduction to Compound Photonicscompoundphotonics
 
Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011
Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011 Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011
Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011 #Jão Pablo
 
Mikael Bäck: The Continued Evolution of Mobile Broadband
Mikael Bäck: The Continued Evolution of Mobile BroadbandMikael Bäck: The Continued Evolution of Mobile Broadband
Mikael Bäck: The Continued Evolution of Mobile BroadbandMobileMonday Estonia
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Андрей Лукин
 
Sujal and scott fina lb
Sujal and scott fina lbSujal and scott fina lb
Sujal and scott fina lbTina Jiang
 
The New Network for the Data Center
The New Network for the Data CenterThe New Network for the Data Center
The New Network for the Data CenterJuniper Networks
 

Was ist angesagt? (19)

LTE WS 2012 S Niri
LTE WS 2012 S NiriLTE WS 2012 S Niri
LTE WS 2012 S Niri
 
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)
 
Infographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRAInfographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRA
 
Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile Internet
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21
 
20111130 ssn english
20111130 ssn english20111130 ssn english
20111130 ssn english
 
Martin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynoteMartin Geddes - Hypervoice keynote
Martin Geddes - Hypervoice keynote
 
Rcom investor ppt_may_2012
Rcom investor ppt_may_2012Rcom investor ppt_may_2012
Rcom investor ppt_may_2012
 
Green growth and network quality in a high-growth market - Martin Backstrom -...
Green growth and network quality in a high-growth market - Martin Backstrom -...Green growth and network quality in a high-growth market - Martin Backstrom -...
Green growth and network quality in a high-growth market - Martin Backstrom -...
 
Intel ppt
Intel pptIntel ppt
Intel ppt
 
3 g
3 g3 g
3 g
 
IT Future 2012 - Presentation Fujitsu par David Concordel
IT Future 2012 - Presentation Fujitsu par  David ConcordelIT Future 2012 - Presentation Fujitsu par  David Concordel
IT Future 2012 - Presentation Fujitsu par David Concordel
 
DB2 Storage Engine for MySQL and Open Source Applications Session
DB2 Storage Engine for MySQL and Open Source Applications SessionDB2 Storage Engine for MySQL and Open Source Applications Session
DB2 Storage Engine for MySQL and Open Source Applications Session
 
Introduction to Compound Photonics
Introduction to Compound PhotonicsIntroduction to Compound Photonics
Introduction to Compound Photonics
 
Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011
Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011 Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011
Buente - Curso TV Digital Terrestre Buenos Aires - Marzo 2011
 
Mikael Bäck: The Continued Evolution of Mobile Broadband
Mikael Bäck: The Continued Evolution of Mobile BroadbandMikael Bäck: The Continued Evolution of Mobile Broadband
Mikael Bäck: The Continued Evolution of Mobile Broadband
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
 
Sujal and scott fina lb
Sujal and scott fina lbSujal and scott fina lb
Sujal and scott fina lb
 
The New Network for the Data Center
The New Network for the Data CenterThe New Network for the Data Center
The New Network for the Data Center
 

Andere mochten auch

Insaat kursu-silivri
Insaat kursu-silivriInsaat kursu-silivri
Insaat kursu-silivrisersld54
 
Converged infrastructure-wp
Converged infrastructure-wpConverged infrastructure-wp
Converged infrastructure-wpEMC
 
โรคอ้วน กลุ่มเทรนเนอร์ ม.1/10
โรคอ้วน กลุ่มเทรนเนอร์  ม.1/10 โรคอ้วน กลุ่มเทรนเนอร์  ม.1/10
โรคอ้วน กลุ่มเทรนเนอร์ ม.1/10 ppluem
 
Global cloud services market (service type, cloud type, end user and geograph...
Global cloud services market (service type, cloud type, end user and geograph...Global cloud services market (service type, cloud type, end user and geograph...
Global cloud services market (service type, cloud type, end user and geograph...Allied Market Research
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud ComputingCentriLogic
 
Different cloud types explained
Different cloud types explainedDifferent cloud types explained
Different cloud types explainedDavid Martin
 
Data communication Networking- Study Networking Equipment
Data communication Networking- Study Networking EquipmentData communication Networking- Study Networking Equipment
Data communication Networking- Study Networking EquipmentShivam Prakash Chaurasia
 
All about Clod computing
All about Clod computingAll about Clod computing
All about Clod computingakanksha9597
 
IoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech TalksIoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech TalksCumulations Technologies
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnjeanphi
 

Andere mochten auch (20)

Insaat kursu-silivri
Insaat kursu-silivriInsaat kursu-silivri
Insaat kursu-silivri
 
Staffing Awards 2015
Staffing Awards 2015Staffing Awards 2015
Staffing Awards 2015
 
Converged infrastructure-wp
Converged infrastructure-wpConverged infrastructure-wp
Converged infrastructure-wp
 
โรคอ้วน กลุ่มเทรนเนอร์ ม.1/10
โรคอ้วน กลุ่มเทรนเนอร์  ม.1/10 โรคอ้วน กลุ่มเทรนเนอร์  ม.1/10
โรคอ้วน กลุ่มเทรนเนอร์ ม.1/10
 
Global cloud services market (service type, cloud type, end user and geograph...
Global cloud services market (service type, cloud type, end user and geograph...Global cloud services market (service type, cloud type, end user and geograph...
Global cloud services market (service type, cloud type, end user and geograph...
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud Computing
 
The Right Type of Cloud Messaging
The Right Type of Cloud MessagingThe Right Type of Cloud Messaging
The Right Type of Cloud Messaging
 
Different cloud types explained
Different cloud types explainedDifferent cloud types explained
Different cloud types explained
 
Clouds
Clouds Clouds
Clouds
 
Data communication Networking- Study Networking Equipment
Data communication Networking- Study Networking EquipmentData communication Networking- Study Networking Equipment
Data communication Networking- Study Networking Equipment
 
Práctica 17
Práctica 17Práctica 17
Práctica 17
 
Rc erika borrero
Rc erika borreroRc erika borrero
Rc erika borrero
 
Lotus towers
Lotus towersLotus towers
Lotus towers
 
Goth
GothGoth
Goth
 
Charm lace
Charm laceCharm lace
Charm lace
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
All about Clod computing
All about Clod computingAll about Clod computing
All about Clod computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
IoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech TalksIoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech Talks
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Ähnlich wie PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)

Scalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseScalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseBjorn Andersson
 
OpenStack on Intel
OpenStack on IntelOpenStack on Intel
OpenStack on IntelOpen Stack
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Top Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersTop Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersJuniper Networks
 
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Scott Bils
 
CBS Cloud presentation november 2012
CBS Cloud presentation november 2012CBS Cloud presentation november 2012
CBS Cloud presentation november 2012Henrik Hasselbalch
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Cisco pat adamiak navigating with a world of many clouds
Cisco pat adamiak   navigating with a world of many cloudsCisco pat adamiak   navigating with a world of many clouds
Cisco pat adamiak navigating with a world of many cloudsKhazret Sapenov
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITValencell, Inc.
 
Cloud services zimbabwe
Cloud services   zimbabweCloud services   zimbabwe
Cloud services zimbabweTechZim
 
Cloud Architectures for Alpha Dogs!
Cloud Architectures for Alpha Dogs!Cloud Architectures for Alpha Dogs!
Cloud Architectures for Alpha Dogs!Vikas Gupta
 
VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"Magnus Backman
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingMartin Hingley
 
Managing highly virtualized environments - Presented by Softchoice and VMware
Managing highly virtualized environments - Presented by Softchoice and VMwareManaging highly virtualized environments - Presented by Softchoice and VMware
Managing highly virtualized environments - Presented by Softchoice and VMwareSoftchoice Corporation
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at CiscoCisco Canada
 
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...TechZim
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingFonality
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...NextVision Media
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum India
 

Ähnlich wie PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011) (20)

Scalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseScalability and Availability - Without Compromise
Scalability and Availability - Without Compromise
 
OpenStack on Intel
OpenStack on IntelOpenStack on Intel
OpenStack on Intel
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Top Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersTop Ten Imperatives for Service Providers
Top Ten Imperatives for Service Providers
 
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
Enterprise Cloud Stakeholders Speak: Adoption Patterns, Barriers & Post-Adopt...
 
CBS Cloud presentation november 2012
CBS Cloud presentation november 2012CBS Cloud presentation november 2012
CBS Cloud presentation november 2012
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Cisco pat adamiak navigating with a world of many clouds
Cisco pat adamiak   navigating with a world of many cloudsCisco pat adamiak   navigating with a world of many clouds
Cisco pat adamiak navigating with a world of many clouds
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your IT
 
Cloud services zimbabwe
Cloud services   zimbabweCloud services   zimbabwe
Cloud services zimbabwe
 
Cloud Architectures for Alpha Dogs!
Cloud Architectures for Alpha Dogs!Cloud Architectures for Alpha Dogs!
Cloud Architectures for Alpha Dogs!
 
VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud Computing
 
Managing highly virtualized environments - Presented by Softchoice and VMware
Managing highly virtualized environments - Presented by Softchoice and VMwareManaging highly virtualized environments - Presented by Softchoice and VMware
Managing highly virtualized environments - Presented by Softchoice and VMware
 
102 1315-1345
102 1315-1345102 1315-1345
102 1315-1345
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at Cisco
 
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track Introductions
 

Mehr von EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)

  • 1. PRIVATE, HYBRID AND PUBLIC CLOUDS Cloud Bursting & the Hybridization of Private and Public Data Services Dan Hushon EMC Distinguished Engineer CTO Service Provider Program © Copyright 2011 EMC Corporation. All rights reserved. 1
  • 2. Dimensions of Cloud Adoption © Copyright 2011 EMC Corporation. All rights reserved. 2
  • 3. 2010-2013 Public Cloud Market Opportunity Forecast $50B $43.9B 40 46% 30 $26.4B $22.2B IaaS 20 14% 36% 43% $16.2B 18% PaaS $10.5B 10 10% $8.6B 40% 26% 62% 47% 79% 90% 72% S aaS 0 2010 2013 2010 2013 2010 2013 IDC The 451 Group Gartner ‘10 – ‘13 CAGR 26% 24% 36% Source: Gartner, June 2010; IDC, June 2010; The 451 Group, August 2010 By 2014, some 43% of IT will be delivered by Cloud Providers* *Microsoft cloud adoption study 2011 © Copyright 2011 EMC Corporation. All rights reserved. 3
  • 4. Journey To The Cloud: Agility of IT Enterprise IT Private Cloud Hybrid Cloud LegacyRe-Platformed X86 & Existing Applications Apps Apps Legacy Tier 2 x86 Tier 1 Applications Service Provider Infrastructure © Copyright 2011 EMC Corporation. All rights reserved. 4
  • 5. Optimize Between Private & SP Cloud Enterprise IT Private Cloud Hybrid Cloud Legacy X86 & Re-Platformed X86 & Re-Platformed Apps Apps Apps Tier 2 Tier 2 Tier 1 Tier 1 Tier 2 Tier 1 Applications Service Provider Infrastructure © Copyright 2011 EMC Corporation. All rights reserved. 5
  • 6. Hybrid Cloud = Private Cloud + SP Cloud Enterprise IT Private Cloud Hybrid Cloud Cloud OS Information Security Application Applications Federation Hybrid Cloud Data Infrastructure Federation © Copyright 2011 EMC Corporation. All rights reserved. 6
  • 7. Hybrid Clouds Require Hybridizing Technologies Management Managing Across Pools Trust Visibility & Control Federation Mobility Of Apps & Data © Copyright 2011 EMC Corporation. All rights reserved. 7
  • 8. We Have Entered The Information Era Creating Value From Information Is The New Economy © Copyright 2011 EMC Corporation. All rights reserved. 8
  • 9. Big Data Will Scale To Exabytes WILL BE MEASURED IN WILL BE MEASURED IN WILL BE MEASURED IN TERABYTES PETABYTES EXABYTES LARGE 1TB = 1,000GB 1PB = 1,000TB 1EB = 1,000PB VOLUME OF INFORMATION SMALL 1990’s 2000’s 2010’s (RDMBS, DATA WAREHOUSE, ETC.) (CONTENT & DIGITAL ASSET MANAGEMENT) (NO-SQL, KEY/VALUE, ETC.) © Copyright 2011 EMC Corporation. All rights reserved. 9
  • 10. Reasoning That… •  Increasingly Information is produced outside the Enterprise •  Combined with information across a set of partners •  Consumed by ever more participants © Copyright 2011 EMC Corporation. All rights reserved. 10
  • 11. Realize Collaborations, NOT Exchanges •  Exchanges have emerged as secure point-2-point pipes between participants –  Some would say “dumb pipes” •  Trusted Collaborations are Different… Iterate + + + INFORMATION INFORMATION PROCESS COLLABORATION GOVERNANCE © Copyright 2011 EMC Corporation. All rights reserved. 11
  • 12. Data’s Dis(re)Location •  Increasingly valuable data is produced in the cloud •  Backhaul Bandwidth isn’t keeping pace with Backbone •  Enterprises cannot defy physics nor economics •  So, this data will to stay in the cloud •  Economics improve to the point that we don’t throw anything away •  New value is derived from Big Data sets in the cloud, and the ecosystems that it produces © Copyright 2011 EMC Corporation. All rights reserved. 12
  • 13. Intelligence from “Internet Information” Information Driven Software As A Service Enterprise Analytics As A Service Internet Healthcare Intelligence Big Data Small Targeted Information Delivery Specific Clinical or Operational Purposes $$$ in aggregate value Healthcare Information Large Internet Data Sets Diverse Information Portfolios ¢ in individual value © Copyright 2011 EMC Corporation. All rights reserved. 13
  • 14. Big Data Analytics Models •  Attribution –  Credit for contribution in a complex process •  Recommendation –  Similarity/likeness, to propensity to recommendation •  Predictive Forecasting –  Improved decision making based upon multi-variant, risk and sensitivity driven analysis •  Insight –  Statistical models to understand “unusual” behaviors •  Benchmarking –  Comparing one entities performance against a population © Copyright 2011 EMC Corporation. All rights reserved. 14
  • 15. “If it’s created in the cloud, keep it in the cloud” © Copyright 2011 EMC Corporation. All rights reserved. 15
  • 16. Data Producers •  The # of Data Producers is increasing exponentially worldwide –  Phones, tablets, vending machines, cameras, video security, trucks, tractors… •  Connected Mobile devices are increasing in the fidelity of their telemetry •  Social / Crowd-sourcing enables a fidelity unrivalled by any one companies “sensors” •  Managing this data – placement, security, license, schema (@scale) becomes the information infrastructure challenge © Copyright 2011 EMC Corporation. All rights reserved. 16
  • 17. Content Ingest Networks •  Reversal of Data Migration •  Exploit Bandwidth in Cloud for associative reasoning •  Provide a trusted scale-out analytics environment for information collaboration •  Backhaul intelligence not information •  Extend monetization of captured data productization through associative markets © Copyright 2011 EMC Corporation. All rights reserved. 17
  • 18. Disruptions in Information Marketplace •  Migration from in->out (CDN) to out->in (CIN) strategies –  Peer orientation and smart distribution improve accessibility •  Indexing to Search –  Instead of pre-classified and indexed sets, emergence of multi-modal searchable strategies •  Enterprise Protocols to Internet Protocols –  RESTful approaches, asynchronous delivery & subscribe-able models –  XA transactions -> eventual consistency models •  Information Structures not a priori assumed. –  Hadoop [Map Reduce] + SQL (not either/or) © Copyright 2011 EMC Corporation. All rights reserved. 18
  • 19. Information Pipelines •  Putting information in the right place the first time •  Pre-processing: –  Quality assurance operations –  Securitization including de-identification and tokenization –  Linkage processing – establishing associations for improved exploitation –  Canonicalization into common models •  Thru Inlined Operators: –  GET: Classification, Meta-Data Extraction –  PUT: Search Indices, De-Duplication, Link & Token, Encryption, Placement advise © Copyright 2011 EMC Corporation. All rights reserved. 19
  • 20. Improving Cloud Economics & Trust •  Trusted Multi-Tenancy © Copyright 2011 EMC Corporation. All rights reserved. 20
  • 21. Cloud Changes Customer Expectations •  Improved Control of and Visibility into the Environment –  Self-service using web-based controls –  Improved visibility of both function and expense •  Isolation from other tenants; must ensure –  Privacy –  Non-interference •  to ensure their SLO’s are met, regardless of other tenant workloads •  Security –  Identity •  Single sign-on federated from Enterprise to SP –  Ability to control access to shared resources •  Improved performance to expense ratio (shared capital) –  Reliability –  Operational agility (contract/expand) © Copyright 2011 EMC Corporation. All rights reserved. 21
  • 22. Manifesting Trust in MT Environments User has suitable tools to control access, spend, performance & protection Provider has suitable controls to protect itself from a tenant as well as one tenant from another Hybrid: Controls have common semantics from one environment Provider has suitable controls to another create tenant provision-able bundles Visibility enabled across logical and physical boundaries when service spans locations Policy based controls have measurable and demonstrable Visibility boundaries are respected effects. up/down hierarchy and across tenancies Service Level achievements / breaches Tenant can introspect metered resources are evident and shed light on responsible party to understand / verify utilization charges © Copyright 2011 EMC Corporation. All rights reserved. 22
  • 23. Architecting for Trusted Multi-Tenancy Complex Problem Domain Administration Access (Control Path) (Data Path) Assurance (Visibility & Compliance) © Copyright 2011 EMC Corporation. All rights reserved. 23
  • 24. Tenets of Trusted Multi-Tenancy (TMT) •  Make all customer-visible units of resource logical not physical –  Known MT properties/capabilities on any layer directly exposed to customers •  Put those logical objects into containers [nested] with recursive delegated administration capabilities @ the container layer –  Separates the implementation of a resource from its contract –  Provides a common point of mediation and aggregation –  Hierarchical (Layered) relationships must be supported on both the data path and the control path •  Implement out-of-band monitoring of management activity that verifies actual state of system remains in compliance throughout any management / state changes –  Out-of-band monitoring must be done at the container boundary for the container to support multi-tenancy –  Multi-tenant correlation (actual vs. expected) becomes critical to GRC © Copyright 2011 EMC Corporation. All rights reserved. 24
  • 25. Solutions must address critical SP design principles Foundational SP Design Factors and Delivery Principles Multi-Tenancy Capabilities 1 2 3 4 5 6 Security / Data Secure Service Tenant SP Controls Controls Compliance Protection Separation Quality –  Security –  Business Physical and/or –  Tunable, Manages Manages information & continuity logical separation differentiated –  Tenant –  Security and event –  Disaster recovery across tenants Service Level compliance –  SLAs management –  Integrated backup –  Data at rest Agreements –  Database and file (SLAs) –  Security and –  Identity & access §  Source-based –  Data access Compliance relocation management –  SLA assurance –  Application image duplication –  Address spaces Reports –  Configuration & –  Authentication and –  Storage, compute management §  Target-based –  Compliance change and network –  Help/Support deduplication name service –  Portal iews and management provisioning and –  Replication domains monitoring Reports –  Encryption and pooling (synchronous or –  Computing –  Portal views and Data Loss –  QoS guarantees Integrates asynchronous) monitoring Prevention (DLP) –  Separation –  Billing systems –  Data redundancy Physical and/or –  Service audits and §  Data at rest, in assurance –  OSS/BSS (e.g. RAID, logical separation monitoring flight and in snapshots, –  Provisioning use between Provider –  Resource clones) and Tenant systems –  Enterprise key utilization –  Self-service & management support systems –  Billing –  Governance, risk Self-Services and compliance –  Provisioning –  Tenant access –  Permissions © Copyright 2011 EMC Corporation. All rights reserved. 25
  • 26. TMT Products are not Enough •  Customers are assembling products into TMT systems –  Need to take a systems view to decrease risk to customers and increase value/differentiation for EMC •  Trusted Cloud Solutions are needed –  Need aggregations of products that are, themselves, compliant with TMT requirements •  Aggregate control plane •  Aggregate visibility © Copyright 2011 EMC Corporation. All rights reserved. 26
  • 27. Trust But Verify An Analytics Opportunity: Metrics to Information GRC (e.g. Service Assurance & Risk Tenant-specific GRC Management) Management Resource Management Management OSS BSS Service Billing (e.g. Provisioning, (e.g. Contracts, Trouble Ticketing & Analytics Billing & Resolution) Reconcilliation) Metrics & Tenant-aware Analytics Tenant-tagged Metrics Events © Copyright 2011 EMC Corporation. All rights reserved. 27
  • 28. Cloud Trust Authority A set of cloud-based services for secure and compliant cloud computing Enterprises Cloud Service Providers Report on compliance status across multiple cloud providers against a common benchmark TrustVisibility&&Compliance Security = Visibility + Control Reporting Identities Infrastructure Information Manage access to cloud Manage the security of the cloud IT Manage sensitive information: resources: Authentication, SSO/ stack: hardening, integrity and Classification, Encryption, Federation, Provisioning, geolocation of workloads, threat Tokenization, Geolocation, etc. Entitlements, etc. defense, etc. Value to the Enterprise Value to the Cloud Providers 1.  Eliminate point to point integrations with Cloud 1.  Accelerate adoption by removing security and Providers compliance objections 2.  Greater visibility and control over cloud services 2.  Eliminate point to point tenant integrations 3.  Centrally manage security and compliance across 3.  Reduce on-going security and compliance clouds burden per tenant © Copyright 2011 EMC Corporation. All rights reserved. 28
  • 29. What does all this mean? •  Improved Intelligence with cost/performance –  Inside:Out & –  Outside:In •  Cloud Locations provide opportunities: –  Better / Deeper analytics to solve for true causality –  Increased insight and targeting/relevance/prediction •  Need to focus on collaborations, not exchanges –  Policy driven support for information trust models, not just participant trust •  Systemic thinking about Trusted Multi-Tenancy across the delivery landscape © Copyright 2011 EMC Corporation. All rights reserved. 29
  • 30. THANK YOU © Copyright 2011 EMC Corporation. All rights reserved. 30
  • 31. © Copyright 2011 EMC Corporation. All rights reserved. 31