SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Virtualization and Cloud Computing
From Virtualization to Private Cloud
Infrastructure as a Service
The Latest Talk about Cloud
2
Today cloud computing is a proven delivery model with impressive agility
and efficiency benefits.
The trend is to expand to more flexible models to expand the scope of
innovative, value-added business services.
“Should we do it?” “How should we do it
to get the most value?”
Yesterday Today
3
Based on The NIST Definition of Cloud Computing. National Institute of Standards and Technology Special Publication 800-145 (September 2011).
csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Cloud Computing Models
Virtualization as an Enabler for Cloud
Most enterprises are already virtualizing their IT environment.
 Improves resource utilization
 Lowers total cost of ownership
 Enhances speed and flexibility
Logical next step: private cloud.
 Provides user interface to automated, self-service catalogs of standard services
 Autoscales to user demand
 Delivers even greater agility and efficiency
 Controls sensitive workloads
4
Delivering Cloud Services—Fast
5
Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011).
intel.com/content/www/us/en/it-management/intel-it-best-practices/enterprise-private-cloud-paper.html
Thanks to Intel’s construction of a private
cloud on a highly virtualized foundation, time
to provision infrastructure dropped from 90
days to an average of 45 minutes.
Five Steps: Virtualization
to Private Cloud Services
6
1. Develop a cloud strategy
2. Manage business process change
3. Organize IT around service delivery
4. Put the right technology in place
5. Manage a data-driven cloud
1. Develop a Cloud Strategy
Establish where you want to go.
 Describe the anticipated benefits and return on your investment
 Set short-, mid-, and long-term goals
 Identify workloads and user groups for each project phase
 Describe your cloud architecture and its components
 Identify client devices you will support
 Define monitoring and management approach; define success
7
CLOUD TIP: Intel IT developed a strategy that provided a logical evolution to a hybrid cloud model. Source:
Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011).
2. Manage Business Process Change
Get the business on board and create strong partnerships.
 Communicate benefits and milestones to users
 Develop a plan to manage expectations for each project phase
 Engage business users to define and document new and
existing business processes
 Document workflows to minimize human control points
 Implement new IT processes (for example, capacity
provisioning and chargeback)
8
CLOUD TIP: Strong partnerships encourage cloud adoption and are essential to your success.
3. Organize IT around Service Delivery
Evolve IT’s role to a broker of cloud services.
 Determine how joint business-IT teams will
work together
 Hire or train for cloud-related skills
 Weigh user needs against the delivery options to
reduce organizational risk, improve resource
utilization, and monitor demand
9
CLOUD TIP: By offering private cloud services, you gain experience that you can extend later to brokering
public services in a hybrid cloud model.
4. Put the Right Technology in Place
Implement each phase to build on the previous one.
 Determine technology requirements for short-, medium-,
and long-term goals
 Use reference architectures and out-of-the-box workflow
templates and building blocks to save time and effort
 Implement proof of concepts to build success and
gain momentum
10
CLOUD TIP: Intel® Cloud Builder Solutions include reference architectures, or recipes, on how to deploy
ecosystem solutions built on offerings from leading systems and solutions providers based on Intel
technologies. Visit intelcloudbuilders.com.
5. Manage a Data-Driven Cloud
Monitor health and performance end to end.
 Measure against goals for availability and performance
 Ensure compliance with security and privacy regulations
 Inform decisions to add capacity
 Troubleshoot problems
 Review integrated operational analytics for:
 Facilities
 Network
 Storage
 Compute
 Applications
11
CLOUD TIP: If you choose to offer externally hosted cloud services in the future, you will have already
established a way to measure the overall service availability stipulated in third-party service-level
agreements.
Five Requirements: Infrastructure as a
Service (IaaS) Technology
1. Pervasive virtualization
2. A cloud management platform (CMP)
3. Automated workflows and other system capabilities
4. Orchestrated services end to end
5. Cloud security
12
CLOUD TIP: Although clouds are built with IaaS, PaaS, and SaaS service layers, infrastructure services are
the most typical private cloud services offered today.
1. Pervasive Virtualization
Virtualization provides several key cloud capabilities.
 Resource sharing
 Virtual machine (VM) isolation
 Load balancing
Pervasive virtualization broadens the opportunity for cloud
adoption across the organization.
13
Infrastructure as a service is built on pooled resources for computing, storage, and networking.
From An Enterprise Private Cloud Architecture and Implementation Roadmap. Intel IT (June 2010).
2. Cloud Management Platform
Integrated software that delivers high service quality, security,
and availability for workloads should provide at minimum:
 Direct user access to the system
 Self-service capabilities and interfaces
 A workflow engine
 Automated provisioning
 Metering and chargeback functionality
14
CLOUD TIP: More advanced capabilities might include performance and capacity management,
interoperability between private and public IaaS offerings, connectivity to and management of external
clouds, application life-cycle support, back-end service catalogs, and integration with external enterprise
management systems.
Leading Cloud Management Platforms
 Apache* CloudStack*
 Eucalyptus* cloud platform
 Microsoft* Hyper-V* software and Microsoft System Center
 OpenStack* cloud software
 VMware* vCloud Director*
15
3. Automated Workflows
 Minimize manual processes
 Provide integration across heterogeneous and disparate
systems
 Manage provisioning, scaling, VM configuration, identity
and access controls, network resources, workflow
monitoring, patching, and backup
 Optimize and manage resources faster, deliver
services, manage service life cycles, and respond to
changing conditions
16
CLOUD TIP: Intel IT’s private cloud infrastructure uses a modular, extensible framework to simplify system
integration and provide the prerequisites for fully functional, self-provisioned VMs with compute, storage,
and network resources. This enables Intel IT to introduce additional automation capabilities as business and
technical needs change. Source: Best Practices for Building an Enterprise Private Cloud.
Intel IT Hosting Framework
 Users request and consume services through a self-service portal
 IT manages and measures service consumption on a highly utilized resource
pool of virtualized assets
17
Source: Implementing On-Demand Services Inside the Intel IT Private Cloud. Intel IT (October 2010).
intel.com/content/dam/doc/white-paper/intel-it-private-cloud-on-demand-services-paper.pdf
4. Orchestrated Services End to End
Automated intelligence that dynamically coordinates and manages
across different systems to:
 Connect and automate workflows
 Manage configuration, capacity, metering, and chargeback
 Track and report cloud performance and availability
 Monitor and manage power
 Monitor security threats and adherence to security policies
 Take effective actions and make adjustments
 Predict potential issues and address proactively
18
CLOUD TIP: Intel® Intelligent Power Technology orchestrates power management with Intel Data Center
Manager (Intel DCM) and Intel Node Manager (Intel NM), technology built into Intel Xeon® processor-based
servers. Together they monitor and cap power in real time at server, rack, zone, and data center levels and
manage aggregated power consumption and load migration.
5. Cloud Security
 Challenges: Resource isolation, security event management,
and data protection, including VM isolation, secure
VM migration, virtual network isolation, and security event
and access monitoring
 Visibility into secure data flow and compliance with
business-specific security policies is critical
19
CLOUD TIP: Provide security as a set of on-demand, scalable services. In this approach, policies are tied to
logical attributes that create adaptive trust zones to separate multiple tenants.
Intel Cloud Security Recommendations
Intel recommends prioritizing these physical and virtual controls.
 Protect data – Use pervasive encryption, secure connections, and data loss
prevention policies
 Establish and verify identities – Control access from client devices and systems
you trust, and manage API control points at the network edge
 Establish trusted compute pools – Secure data center platform, infrastructure, and
client devices
 Build higher assurance into compliance – Streamline auditing and increase
visibility into your cloud environment
 Enable secure migration – Protect movement between a private cloud
environment and public cloud providers
20
Intel® and McAfee* Cloud Security Technologies
 Intel® Trusted Execution Technology (Intel TXT)
and McAfee* Data Center Security Suites
 Helps detect server systems booting with unknown BIOS,
firmware, and hypervisors
 Provides hardware-based verification for use in meeting
compliance requirements
 Intel Data Protection Technology with AES-NI and Secure Key
 Enables faster and stronger encryption and decryption of the McAfee Endpoint
Encryption product
 Intel Expressway API Manager (Intel EAM)
 Includes a leading SaaS API sharing portal from Mashery with Intel’s on-premises
service gateway for API management
 Available integrated with several McAfee technologies, including McAfee ePolicy
Orchestrator* (McAfee ePO*) for monitoring security events
21
Next Steps: The Path to Hybrid Cloud
22
The path to building hybrid cloud
service delivery begins with private
cloud IaaS on top of a highly
virtualized data center.
When you’re ready to go further, read about
how platform as a service can expand your
cloud environment into a more flexible and
elastic hybrid model.
Virtualization and Cloud Planning Guide
Everything You Need to Get Started
23
Intel.com/ITCenter
Read the complete Planning Guide: Virtualization and
Cloud Computing at intel.com/cloud.
Legal
24
This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS”
WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY,
NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY
OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all
liability, including liability for infringement of any property rights, relating to use of this
information. No license, express or implied, by estoppel or otherwise, to any intellectual
property rights is granted herein.
Copyright © 2013 Intel Corporation. Intel, the Intel logo, the Look Inside. logo, and Xeon are
trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Virtualization and Cloud Computing Guide to Building Private IaaS

Mais conteúdo relacionado

Destaque

Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloudahmedmehiny
 
Paolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzionePaolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzioneInnovAction Lab
 
Cloud Computing: An Introduction
Cloud Computing: An IntroductionCloud Computing: An Introduction
Cloud Computing: An IntroductionSrinath Perera
 
Roxy Educational Technology Slideshow
Roxy Educational Technology SlideshowRoxy Educational Technology Slideshow
Roxy Educational Technology Slideshowragsdale808
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Technovation VIT STTP December 2013
Technovation VIT STTP December 2013 Technovation VIT STTP December 2013
Technovation VIT STTP December 2013 Seema Shah
 
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale
 
Patterns For Cloud Computing
Patterns For Cloud ComputingPatterns For Cloud Computing
Patterns For Cloud ComputingSimon Guest
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud ComputingSeungyun Lee
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 

Destaque (16)

Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloud
 
Paolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzionePaolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzione
 
Cloud Computing: An Introduction
Cloud Computing: An IntroductionCloud Computing: An Introduction
Cloud Computing: An Introduction
 
Roxy Educational Technology Slideshow
Roxy Educational Technology SlideshowRoxy Educational Technology Slideshow
Roxy Educational Technology Slideshow
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Technovation VIT STTP December 2013
Technovation VIT STTP December 2013 Technovation VIT STTP December 2013
Technovation VIT STTP December 2013
 
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
 
Patterns For Cloud Computing
Patterns For Cloud ComputingPatterns For Cloud Computing
Patterns For Cloud Computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
100+ Beautiful Slides from #CannesLions 2016
100+ Beautiful Slides from #CannesLions 2016100+ Beautiful Slides from #CannesLions 2016
100+ Beautiful Slides from #CannesLions 2016
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 

Mais de Intel IT Center

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- SupercomputingIntel IT Center
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 

Mais de Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Último

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Virtualization and Cloud Computing Guide to Building Private IaaS

  • 1. Virtualization and Cloud Computing From Virtualization to Private Cloud Infrastructure as a Service
  • 2. The Latest Talk about Cloud 2 Today cloud computing is a proven delivery model with impressive agility and efficiency benefits. The trend is to expand to more flexible models to expand the scope of innovative, value-added business services. “Should we do it?” “How should we do it to get the most value?” Yesterday Today
  • 3. 3 Based on The NIST Definition of Cloud Computing. National Institute of Standards and Technology Special Publication 800-145 (September 2011). csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf Cloud Computing Models
  • 4. Virtualization as an Enabler for Cloud Most enterprises are already virtualizing their IT environment.  Improves resource utilization  Lowers total cost of ownership  Enhances speed and flexibility Logical next step: private cloud.  Provides user interface to automated, self-service catalogs of standard services  Autoscales to user demand  Delivers even greater agility and efficiency  Controls sensitive workloads 4
  • 5. Delivering Cloud Services—Fast 5 Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011). intel.com/content/www/us/en/it-management/intel-it-best-practices/enterprise-private-cloud-paper.html Thanks to Intel’s construction of a private cloud on a highly virtualized foundation, time to provision infrastructure dropped from 90 days to an average of 45 minutes.
  • 6. Five Steps: Virtualization to Private Cloud Services 6 1. Develop a cloud strategy 2. Manage business process change 3. Organize IT around service delivery 4. Put the right technology in place 5. Manage a data-driven cloud
  • 7. 1. Develop a Cloud Strategy Establish where you want to go.  Describe the anticipated benefits and return on your investment  Set short-, mid-, and long-term goals  Identify workloads and user groups for each project phase  Describe your cloud architecture and its components  Identify client devices you will support  Define monitoring and management approach; define success 7 CLOUD TIP: Intel IT developed a strategy that provided a logical evolution to a hybrid cloud model. Source: Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011).
  • 8. 2. Manage Business Process Change Get the business on board and create strong partnerships.  Communicate benefits and milestones to users  Develop a plan to manage expectations for each project phase  Engage business users to define and document new and existing business processes  Document workflows to minimize human control points  Implement new IT processes (for example, capacity provisioning and chargeback) 8 CLOUD TIP: Strong partnerships encourage cloud adoption and are essential to your success.
  • 9. 3. Organize IT around Service Delivery Evolve IT’s role to a broker of cloud services.  Determine how joint business-IT teams will work together  Hire or train for cloud-related skills  Weigh user needs against the delivery options to reduce organizational risk, improve resource utilization, and monitor demand 9 CLOUD TIP: By offering private cloud services, you gain experience that you can extend later to brokering public services in a hybrid cloud model.
  • 10. 4. Put the Right Technology in Place Implement each phase to build on the previous one.  Determine technology requirements for short-, medium-, and long-term goals  Use reference architectures and out-of-the-box workflow templates and building blocks to save time and effort  Implement proof of concepts to build success and gain momentum 10 CLOUD TIP: Intel® Cloud Builder Solutions include reference architectures, or recipes, on how to deploy ecosystem solutions built on offerings from leading systems and solutions providers based on Intel technologies. Visit intelcloudbuilders.com.
  • 11. 5. Manage a Data-Driven Cloud Monitor health and performance end to end.  Measure against goals for availability and performance  Ensure compliance with security and privacy regulations  Inform decisions to add capacity  Troubleshoot problems  Review integrated operational analytics for:  Facilities  Network  Storage  Compute  Applications 11 CLOUD TIP: If you choose to offer externally hosted cloud services in the future, you will have already established a way to measure the overall service availability stipulated in third-party service-level agreements.
  • 12. Five Requirements: Infrastructure as a Service (IaaS) Technology 1. Pervasive virtualization 2. A cloud management platform (CMP) 3. Automated workflows and other system capabilities 4. Orchestrated services end to end 5. Cloud security 12 CLOUD TIP: Although clouds are built with IaaS, PaaS, and SaaS service layers, infrastructure services are the most typical private cloud services offered today.
  • 13. 1. Pervasive Virtualization Virtualization provides several key cloud capabilities.  Resource sharing  Virtual machine (VM) isolation  Load balancing Pervasive virtualization broadens the opportunity for cloud adoption across the organization. 13 Infrastructure as a service is built on pooled resources for computing, storage, and networking. From An Enterprise Private Cloud Architecture and Implementation Roadmap. Intel IT (June 2010).
  • 14. 2. Cloud Management Platform Integrated software that delivers high service quality, security, and availability for workloads should provide at minimum:  Direct user access to the system  Self-service capabilities and interfaces  A workflow engine  Automated provisioning  Metering and chargeback functionality 14 CLOUD TIP: More advanced capabilities might include performance and capacity management, interoperability between private and public IaaS offerings, connectivity to and management of external clouds, application life-cycle support, back-end service catalogs, and integration with external enterprise management systems.
  • 15. Leading Cloud Management Platforms  Apache* CloudStack*  Eucalyptus* cloud platform  Microsoft* Hyper-V* software and Microsoft System Center  OpenStack* cloud software  VMware* vCloud Director* 15
  • 16. 3. Automated Workflows  Minimize manual processes  Provide integration across heterogeneous and disparate systems  Manage provisioning, scaling, VM configuration, identity and access controls, network resources, workflow monitoring, patching, and backup  Optimize and manage resources faster, deliver services, manage service life cycles, and respond to changing conditions 16 CLOUD TIP: Intel IT’s private cloud infrastructure uses a modular, extensible framework to simplify system integration and provide the prerequisites for fully functional, self-provisioned VMs with compute, storage, and network resources. This enables Intel IT to introduce additional automation capabilities as business and technical needs change. Source: Best Practices for Building an Enterprise Private Cloud.
  • 17. Intel IT Hosting Framework  Users request and consume services through a self-service portal  IT manages and measures service consumption on a highly utilized resource pool of virtualized assets 17 Source: Implementing On-Demand Services Inside the Intel IT Private Cloud. Intel IT (October 2010). intel.com/content/dam/doc/white-paper/intel-it-private-cloud-on-demand-services-paper.pdf
  • 18. 4. Orchestrated Services End to End Automated intelligence that dynamically coordinates and manages across different systems to:  Connect and automate workflows  Manage configuration, capacity, metering, and chargeback  Track and report cloud performance and availability  Monitor and manage power  Monitor security threats and adherence to security policies  Take effective actions and make adjustments  Predict potential issues and address proactively 18 CLOUD TIP: Intel® Intelligent Power Technology orchestrates power management with Intel Data Center Manager (Intel DCM) and Intel Node Manager (Intel NM), technology built into Intel Xeon® processor-based servers. Together they monitor and cap power in real time at server, rack, zone, and data center levels and manage aggregated power consumption and load migration.
  • 19. 5. Cloud Security  Challenges: Resource isolation, security event management, and data protection, including VM isolation, secure VM migration, virtual network isolation, and security event and access monitoring  Visibility into secure data flow and compliance with business-specific security policies is critical 19 CLOUD TIP: Provide security as a set of on-demand, scalable services. In this approach, policies are tied to logical attributes that create adaptive trust zones to separate multiple tenants.
  • 20. Intel Cloud Security Recommendations Intel recommends prioritizing these physical and virtual controls.  Protect data – Use pervasive encryption, secure connections, and data loss prevention policies  Establish and verify identities – Control access from client devices and systems you trust, and manage API control points at the network edge  Establish trusted compute pools – Secure data center platform, infrastructure, and client devices  Build higher assurance into compliance – Streamline auditing and increase visibility into your cloud environment  Enable secure migration – Protect movement between a private cloud environment and public cloud providers 20
  • 21. Intel® and McAfee* Cloud Security Technologies  Intel® Trusted Execution Technology (Intel TXT) and McAfee* Data Center Security Suites  Helps detect server systems booting with unknown BIOS, firmware, and hypervisors  Provides hardware-based verification for use in meeting compliance requirements  Intel Data Protection Technology with AES-NI and Secure Key  Enables faster and stronger encryption and decryption of the McAfee Endpoint Encryption product  Intel Expressway API Manager (Intel EAM)  Includes a leading SaaS API sharing portal from Mashery with Intel’s on-premises service gateway for API management  Available integrated with several McAfee technologies, including McAfee ePolicy Orchestrator* (McAfee ePO*) for monitoring security events 21
  • 22. Next Steps: The Path to Hybrid Cloud 22 The path to building hybrid cloud service delivery begins with private cloud IaaS on top of a highly virtualized data center. When you’re ready to go further, read about how platform as a service can expand your cloud environment into a more flexible and elastic hybrid model.
  • 23. Virtualization and Cloud Planning Guide Everything You Need to Get Started 23 Intel.com/ITCenter Read the complete Planning Guide: Virtualization and Cloud Computing at intel.com/cloud.
  • 24. Legal 24 This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2013 Intel Corporation. Intel, the Intel logo, the Look Inside. logo, and Xeon are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others.