SlideShare uma empresa Scribd logo
1 de 30
Interested in learning more cloud?

  Learn about the cloud sessions offered at the upcoming Fall 2012 Data
  Center World Conference at:

  www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.
Turbulence in the Cloud




Richard L. Sawyer
Strategist, HP Critical Facilities Services
AFCOM Spring 2012
 Demand drives the market
 What is the cloud?
 Impact of the cloud
 Storm clouds on the horizon
 What is the risk, really?
 How do you manage the cloud?
 Storm cloud checklist
Service demand drives cloud formation
2+ Trillion Users!
• On-line, real time services
• Self-service
• Automated response
• Automated payment
• Automated qualification
• Digital direct marketing (is
your insurance due to
renew?)
• Digital mass marketing (who
needs and actor?)
• Digital claims processing
Instantaneous Consumption:
10 Billion iPhone Application
downloads WW from Apple alone

Nielsen:
98% of iPhone owners use data
services

88% use iPhone for internet
 A pool of highly scalable, abstracted
  infrastructure, capable of hosting end-customer
  applications, that is billed by consumption.
 Implications:
    ◦   “Pool”                         = shared things
    ◦   “Abstracted infrastructure”    = virtualization
    ◦   “Highly scalable”              = load sensitive
    ◦   “Hosting”               = servicing
    ◦   “Billed”                       = metered service
Data
        USER        Network        Center


• DedicatedData Center, owned, leased, rented
• Business specific applications on silo systems
• Data and user closely linked
• Data Center anywhere
• User anywhere
• Shared platforms
• Virtual servers
• Rented service
• User/data link weak
Hybrid delivery mix and cloud

                                                Public




                                                               HYBRID DELIVERY
                                                               • Fully automated self-
                                                                 service delivery
                                                               • Orchestrated, managed &
                                                Private          secured hybrid service
                                                                 delivery
 TRADITIONAL IT                 PRIVATE AND                    • Brokered services based
 •Minimal automation            PUBLIC CLOUD                     on business requirements
 •Traditional methods of        •Partial automation
 service delivery – internal,
11HP Confidential
                                •New disparate public    and
 outsourcing, hosting           private cloud services
Flavors:
Internal

Hosted

Private

Public

Hybrid
   Data center as a utility
    ◦ PODs
    ◦ Modular construction
    ◦ Redundancy as needed
   Utilization (cost) driven metrics
    ◦ Server images: from 1 to 8+
    ◦ Metered usage
   Access is dependent
    ◦ Network and Internet availability
    ◦ Security and operational stability
   More data centers!
Christian Belady, MS Global Foundation Services, Mar
2011 “How big is the data center market?”
 Fraud
 Identity theft
 Financial immobility
 Lack of access (911, heath, safety services)
 Whacking: WAP networking invasions
 Hacking: Incursion for information
 Cracking: Incursion for malice (destruction,
  financial gain, denial of service, etc.)
 Government monitoring and control
 BYOD!
•Federal Budget for Internet
              Security: $13.3 Billion by
              2015

              •9.1% growth Y-O-Y

              •445% increase in reported
              attacks between 2006 -
GAO-10-834T   2010
                    Sources: GAO, Security Week
Item       Activity                                         No   Ye
                                                                 s
People     Right employees, right knowledge, right roles
Policies   Policies and procedures for service continuity
Process Models for secure transfer of data between users
        and providers
Product Defense-in-Depth technology to manage and
        mitigate risk
Proof   Validation methods, metrics and KPI’s to track
        security controls



                What is your capability maturity level?
 Everything depends on network connectivity.
 The data, whether business or personal, resides

  elsewhere.
 The ability to process with sufficient capacity,

  reliability and availability depends, ultimately, on
  the reliability of the data center.
   Three (3) types:     Strategy to Mitigate
    ◦ Loss of            risk:
                         1)Diversify access
      connectivity (no
                             -Modality
      data)
                             -Routing
    ◦ Bad connectivity   1)Monitor
      (bad data)             -Qualitative
    ◦ Redirection            -Quantitative
      (stolen data)          -Access/Output
                         1)Operate without
                         network
 Your data is your business
 Your data is your life
 You are your data
 Where is your data?
    ◦   Access controlled
    ◦   Resident copies (stored, electronically or paper)
    ◦   Dedicated data center
    ◦   Backup servers
    ◦   Multi-site storage
    ◦   Encrypted
 Unreliable data center = unreliable Cloud
 Reliable data centers have common engineering

  characteristics:
    ◦ Redundant capacity
    ◦ Concurrent maintainability
    ◦ Fault tolerance
   Scaling down reliability
    ◦   PODs, Hybrid, Modular data centers
    ◦   The “7-11” Solution
    ◦   “Laptop, Smartphone, HD” to Go
    ◦   “Data Centers on a Chip”
   The Cloud is a Service
    ◦ Get your Service Level Agreements right
    ◦ Train your suppliers, train your users
   The Cloud is the Data Center
    ◦ Locate, design, build and operate for reliability
    ◦ Leverage reliability methodology no matter what the
      scale
   Low tech business continuity options
    ◦ Don’t assume high tech is going to be the go-to solution
    ◦ Build your crash cart
RANSFORM legacy       MANAGE AN
frastructure,         SECURE acro
pplications, people   legacy applica
nd process            and cloud ass
on-premises                      CO
ervices                          of
                                 se
                                 se
 Are space, power and cooling sufficiently available?
 Are there differentiated reliability levels?
 Are personnel screened and trained?
 Are vendors and other clients managed effectively?
 What is the connectivity capacity and topography?
 What is the availability history of the site?
 Are SLA’s negotiable and meaningful?
 Do I trust my data to their management?
 Do I have more than two ways to communicate?
 How long can I operate with no internet?

 Can I recover data after the internet is restored?

 Is my recovery management dependent on the

  network?
 Are my human resources going to be available

  and productive?
 Am I sure my plan is going to work?
   Data demand is driving the cloud
   The data center is the cloud
   There will be a significant increase in data centers,
    worldwide to meet demand.
   The major risk is loss of access to data to run the
    business and service clients.
   Network, data and physical security need to be
    managed to mitigate real risks.
   Ask the right questions before committing.
   Have a valid, tested recovery plan.
Credits:

                 •Ian Jagger, HP Marketing
                 •US Government, office of GAO
                 •Security Weekly
                 •Christian Belady, MS Gobal Foundation
                 Services
                 •Gail Dutton, Contributor, Data Center
                 Management
                 •David Geer, Freelance writer



Richard L. Sawyer, Strategist, HP Critical Facility Services
rsawyer@hp.com
Interested in learning more cloud?

  Learn about the cloud sessions offered at the upcoming Fall 2012 Data
  Center World Conference at:

  www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.

Mais conteúdo relacionado

Mais procurados

Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 finalInternap
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreJonathan Habicht
 
Dimension Data Cloud Demo
Dimension Data Cloud DemoDimension Data Cloud Demo
Dimension Data Cloud DemoKeao Caindec
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013DataTactics
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionHossam Zein
 
Cloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications ArchitectureCloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications ArchitecturevCom Solutions
 
Dimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingDimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingRifaHaryadi
 
Shubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi Jain
 
Embedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationEmbedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationInside Analysis
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
I mpr client overview jan 14 2013
I mpr client overview   jan 14 2013I mpr client overview   jan 14 2013
I mpr client overview jan 14 2013Ilissa Miller
 
GDMS Presentation CFA Laos
GDMS Presentation CFA LaosGDMS Presentation CFA Laos
GDMS Presentation CFA LaosMathieu71
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Wilfried Grommen
 

Mais procurados (20)

Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 final
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
Hybride Cloud Strategy
Hybride Cloud StrategyHybride Cloud Strategy
Hybride Cloud Strategy
 
Dimension Data Cloud Demo
Dimension Data Cloud DemoDimension Data Cloud Demo
Dimension Data Cloud Demo
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
Cloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications ArchitectureCloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications Architecture
 
Migrating to cloud
Migrating to cloudMigrating to cloud
Migrating to cloud
 
Dimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingDimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution Offering
 
Shubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi_Resume_Updated
Shubhi_Resume_Updated
 
Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Embedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationEmbedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of Innovation
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
I mpr client overview jan 14 2013
I mpr client overview   jan 14 2013I mpr client overview   jan 14 2013
I mpr client overview jan 14 2013
 
GDMS Presentation CFA Laos
GDMS Presentation CFA LaosGDMS Presentation CFA Laos
GDMS Presentation CFA Laos
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 

Semelhante a Cloudy with a chance of downtime

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Hybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid CloudHybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid CloudVistara
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloudeophiladelphia
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8Nerve2012
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudDataStax
 
Smarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsSmarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsKeao Caindec
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - finalsvanelderen
 

Semelhante a Cloudy with a chance of downtime (20)

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Hybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid CloudHybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid Cloud
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
 
Smarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsSmarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile Apps
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & IntelSecure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & Intel
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 

Mais de AFCOM

Maximizing the life of existing equipment
Maximizing the life of existing equipmentMaximizing the life of existing equipment
Maximizing the life of existing equipmentAFCOM
 
Lowering operating costs through cooling system design
Lowering operating costs through cooling system designLowering operating costs through cooling system design
Lowering operating costs through cooling system designAFCOM
 
Disaster recovery the new imperative
Disaster recovery the new imperativeDisaster recovery the new imperative
Disaster recovery the new imperativeAFCOM
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAFCOM
 
Benchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterBenchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterAFCOM
 
Understanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersUnderstanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersAFCOM
 
Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace AFCOM
 
Data Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunData Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunAFCOM
 
Taming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILTaming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILAFCOM
 
How to Design a Scalable Private Cloud
How to Design a Scalable Private CloudHow to Design a Scalable Private Cloud
How to Design a Scalable Private CloudAFCOM
 
Best Practices To Mitigate Risks When Retiring IT Assets
Best Practices To Mitigate Risks When Retiring IT AssetsBest Practices To Mitigate Risks When Retiring IT Assets
Best Practices To Mitigate Risks When Retiring IT AssetsAFCOM
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsAFCOM
 

Mais de AFCOM (12)

Maximizing the life of existing equipment
Maximizing the life of existing equipmentMaximizing the life of existing equipment
Maximizing the life of existing equipment
 
Lowering operating costs through cooling system design
Lowering operating costs through cooling system designLowering operating costs through cooling system design
Lowering operating costs through cooling system design
 
Disaster recovery the new imperative
Disaster recovery the new imperativeDisaster recovery the new imperative
Disaster recovery the new imperative
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf code
 
Benchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterBenchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data Center
 
Understanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersUnderstanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data Centers
 
Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace
 
Data Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunData Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet Braun
 
Taming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILTaming the DCIM Wave with ITIL
Taming the DCIM Wave with ITIL
 
How to Design a Scalable Private Cloud
How to Design a Scalable Private CloudHow to Design a Scalable Private Cloud
How to Design a Scalable Private Cloud
 
Best Practices To Mitigate Risks When Retiring IT Assets
Best Practices To Mitigate Risks When Retiring IT AssetsBest Practices To Mitigate Risks When Retiring IT Assets
Best Practices To Mitigate Risks When Retiring IT Assets
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Cloudy with a chance of downtime

  • 1. Interested in learning more cloud? Learn about the cloud sessions offered at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.
  • 2. Turbulence in the Cloud Richard L. Sawyer Strategist, HP Critical Facilities Services AFCOM Spring 2012
  • 3.  Demand drives the market  What is the cloud?  Impact of the cloud  Storm clouds on the horizon  What is the risk, really?  How do you manage the cloud?  Storm cloud checklist
  • 4. Service demand drives cloud formation
  • 6. • On-line, real time services • Self-service • Automated response • Automated payment • Automated qualification • Digital direct marketing (is your insurance due to renew?) • Digital mass marketing (who needs and actor?) • Digital claims processing
  • 7. Instantaneous Consumption: 10 Billion iPhone Application downloads WW from Apple alone Nielsen: 98% of iPhone owners use data services 88% use iPhone for internet
  • 8.  A pool of highly scalable, abstracted infrastructure, capable of hosting end-customer applications, that is billed by consumption.  Implications: ◦ “Pool” = shared things ◦ “Abstracted infrastructure” = virtualization ◦ “Highly scalable” = load sensitive ◦ “Hosting” = servicing ◦ “Billed” = metered service
  • 9. Data USER Network Center • DedicatedData Center, owned, leased, rented • Business specific applications on silo systems • Data and user closely linked
  • 10. • Data Center anywhere • User anywhere • Shared platforms • Virtual servers • Rented service • User/data link weak
  • 11. Hybrid delivery mix and cloud Public HYBRID DELIVERY • Fully automated self- service delivery • Orchestrated, managed & Private secured hybrid service delivery TRADITIONAL IT PRIVATE AND • Brokered services based •Minimal automation PUBLIC CLOUD on business requirements •Traditional methods of •Partial automation service delivery – internal, 11HP Confidential •New disparate public and outsourcing, hosting private cloud services
  • 13. Data center as a utility ◦ PODs ◦ Modular construction ◦ Redundancy as needed  Utilization (cost) driven metrics ◦ Server images: from 1 to 8+ ◦ Metered usage  Access is dependent ◦ Network and Internet availability ◦ Security and operational stability  More data centers!
  • 14. Christian Belady, MS Global Foundation Services, Mar 2011 “How big is the data center market?”
  • 15.  Fraud  Identity theft  Financial immobility  Lack of access (911, heath, safety services)  Whacking: WAP networking invasions  Hacking: Incursion for information  Cracking: Incursion for malice (destruction, financial gain, denial of service, etc.)  Government monitoring and control  BYOD!
  • 16. •Federal Budget for Internet Security: $13.3 Billion by 2015 •9.1% growth Y-O-Y •445% increase in reported attacks between 2006 - GAO-10-834T 2010 Sources: GAO, Security Week
  • 17.
  • 18. Item Activity No Ye s People Right employees, right knowledge, right roles Policies Policies and procedures for service continuity Process Models for secure transfer of data between users and providers Product Defense-in-Depth technology to manage and mitigate risk Proof Validation methods, metrics and KPI’s to track security controls What is your capability maturity level?
  • 19.  Everything depends on network connectivity.  The data, whether business or personal, resides elsewhere.  The ability to process with sufficient capacity, reliability and availability depends, ultimately, on the reliability of the data center.
  • 20. Three (3) types: Strategy to Mitigate ◦ Loss of risk: 1)Diversify access connectivity (no -Modality data) -Routing ◦ Bad connectivity 1)Monitor (bad data) -Qualitative ◦ Redirection -Quantitative (stolen data) -Access/Output 1)Operate without network
  • 21.  Your data is your business  Your data is your life  You are your data  Where is your data? ◦ Access controlled ◦ Resident copies (stored, electronically or paper) ◦ Dedicated data center ◦ Backup servers ◦ Multi-site storage ◦ Encrypted
  • 22.  Unreliable data center = unreliable Cloud  Reliable data centers have common engineering characteristics: ◦ Redundant capacity ◦ Concurrent maintainability ◦ Fault tolerance  Scaling down reliability ◦ PODs, Hybrid, Modular data centers ◦ The “7-11” Solution ◦ “Laptop, Smartphone, HD” to Go ◦ “Data Centers on a Chip”
  • 23. The Cloud is a Service ◦ Get your Service Level Agreements right ◦ Train your suppliers, train your users  The Cloud is the Data Center ◦ Locate, design, build and operate for reliability ◦ Leverage reliability methodology no matter what the scale  Low tech business continuity options ◦ Don’t assume high tech is going to be the go-to solution ◦ Build your crash cart
  • 24. RANSFORM legacy MANAGE AN frastructure, SECURE acro pplications, people legacy applica nd process and cloud ass on-premises CO ervices of se se
  • 25.  Are space, power and cooling sufficiently available?  Are there differentiated reliability levels?  Are personnel screened and trained?  Are vendors and other clients managed effectively?  What is the connectivity capacity and topography?  What is the availability history of the site?  Are SLA’s negotiable and meaningful?  Do I trust my data to their management?
  • 26.  Do I have more than two ways to communicate?  How long can I operate with no internet?  Can I recover data after the internet is restored?  Is my recovery management dependent on the network?  Are my human resources going to be available and productive?  Am I sure my plan is going to work?
  • 27.
  • 28. Data demand is driving the cloud  The data center is the cloud  There will be a significant increase in data centers, worldwide to meet demand.  The major risk is loss of access to data to run the business and service clients.  Network, data and physical security need to be managed to mitigate real risks.  Ask the right questions before committing.  Have a valid, tested recovery plan.
  • 29. Credits: •Ian Jagger, HP Marketing •US Government, office of GAO •Security Weekly •Christian Belady, MS Gobal Foundation Services •Gail Dutton, Contributor, Data Center Management •David Geer, Freelance writer Richard L. Sawyer, Strategist, HP Critical Facility Services rsawyer@hp.com
  • 30. Interested in learning more cloud? Learn about the cloud sessions offered at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.