SlideShare uma empresa Scribd logo
1 de 28
What’s the weather tomorrow?




         Learon Dalby
           Sanborn
                               1
Thin Line
• What are you trying to accomplish?
  – What is your end game?




                                       2
Points of Failure
• Uptime
    – Redundancy
       • Power              National Institute of
       • Network          Standards & Technology
•   Scalability             http://www.nist.gov/itl/cloud/index.cfm


•   Disk Storage
•   Functionality
•   Security
•   Geographic Distribution
    of Centers
                                                                  3
A project
•   Data Storage
•   Data Management
•   Data Distribution
•   Web Mapping
•   Application Support
•   Platform
                          http://agioar.wordpress.com/2011/08/10/geostor-assessment/




                                                                              4
Options
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Data as a Service (DaaS)




                                       5
Options
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Data as a Service (DaaS)




     The short is you are paying $ to have someone else
   support your IT and that’s ok so long as you understand.


                                                              6
Hosting




          7
Virtualization
    Single box




                 App 1
                 App 2
                 App 3
                 App 4




                     8
Virtualization
         Utilization of single box


             12.00%

    14.00%

                                     App 1
                                     App 2
32.00%                               App 3
                         82.00%      App 4




                                         9
A few parts of a cloud


                  Bandwidth
                VM                     VM
     Bandwidth                 Staff
             Security
                                       Security
                            Power
      Power        Staff               Staff         VM
VM    Bandwidth            Security             Bandwidth
           VM                                  Power
                Staff
       Security Bandwidth Security
               Power   VM                       VM
         VM
                              Staff



                                                            10
Geographic Distribution of Centers
          VM                                  VM
 VM              VM                                  VM
          Multiple                   VM       Multiple
          Bandwidth    VM                     Bandwidth    VM
VM        Staff
                                    VM        Staff
          Security                            Security
          Power       VM                      Power       VM
     VM      VM                          VM      VM




                                                               11
Geographic Distribution of Centers
          VM                                  VM
 VM              VM                                  VM
          Multiple                   VM       Multiple
          Bandwidth    VM                     Bandwidth    VM
VM        Staff
                                    VM        Staff
          Security                            Security
          Power       VM                      Power       VM
     VM      VM                          VM      VM




                                                               12
Robustness
          VM                                       VM
 VM              VM                                       VM
          Multiple                        VM       Multiple
          Bandwidth    VM                          Bandwidth    VM
VM        Staff
                                         VM        Staff
          Security                                 Security
          Power       VM                           Power       VM
     VM      VM                               VM      VM




          VM                                       VM
 VM              VM                                       VM
          Multiple                        VM       Multiple
          Bandwidth    VM                          Bandwidth    VM
VM        Staff
                                         VM        Staff
          Security                                 Security
          Power       VM                           Power       VM
     VM      VM                               VM      VM

                                                                    13
Robustness
          VM                                                      VM
 VM              VM                                                      VM
          Multiple                                       VM       Multiple
          Bandwidth    VM                                         Bandwidth    VM
VM        Staff
                                                        VM        Staff
          Security                                                Security
          Power       VM                                          Power       VM
     VM      VM                                              VM      VM


                                      VM
                             VM              VM
                                      Multiple
                                      Bandwidth    VM
                            VM        Staff
                                      Security
                                      Power       VM
                                 VM      VM

          VM                                                      VM
 VM              VM                                                      VM
          Multiple                                       VM       Multiple
          Bandwidth    VM                                         Bandwidth    VM
VM        Staff
                                                        VM        Staff
          Security                                                Security
          Power       VM                                          Power       VM
     VM      VM                                              VM      VM

                                                                                   14
Common Host




              15
Common Host




              16
• Esri
• Google
• The RITRE Corporation


   Presented in the this session – obviously doing stuff




                                                           17
Disclaimer

• The following are in alphabetical order

• They do not represent a comprehensive list

• The list is only intended to give you a sense of a few who
  are using cloud services




                                                               18
arc2earth.com   19
github.com   20
geoiQ.com   21
Mapbox.com   22
opengeo.com   23
openshift.redhat.com   24
stamen.com   25
WeoGeo.com   26
Conclusion
• Know what you want to accomplish

• Understand the capabilities of various
  providers

• This will take work on your part




                                           27
Learon Dalby
    @learondalby
 (M): (501) 920-2446
 (O): (501) 771-5111
ldalby@sanborn.com
  www.sanborn.com      28

Mais conteúdo relacionado

Mais procurados

Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2Damir Bersinic
 
9sept2009 concept electronics
9sept2009 concept electronics9sept2009 concept electronics
9sept2009 concept electronicsAgora Group
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayAmazon Web Services
 
virtualization tutorial at ACM bangalore Compute 2009
virtualization tutorial at ACM bangalore Compute 2009virtualization tutorial at ACM bangalore Compute 2009
virtualization tutorial at ACM bangalore Compute 2009ACMBangalore
 
virtualization and cloud
virtualization and cloudvirtualization and cloud
virtualization and cloudsankarimsc
 
20090911 virtualizationandcloud
20090911 virtualizationandcloud20090911 virtualizationandcloud
20090911 virtualizationandcloudSupratik Ghatak
 
IBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM India Smarter Computing
 
Webinar: eFolder Expert Series: Three Myths of Cloud Recovery Revealed
Webinar: eFolder Expert Series:Three Myths of Cloud Recovery RevealedWebinar: eFolder Expert Series:Three Myths of Cloud Recovery Revealed
Webinar: eFolder Expert Series: Three Myths of Cloud Recovery RevealedDropbox
 
Wireless to the Nth Degree
Wireless to the Nth DegreeWireless to the Nth Degree
Wireless to the Nth DegreeInnoTech
 
Overview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMOverview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMctc TrainCanada
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencingInterop
 
LinuxCon NA 2012: Virtualization in the cloud featuring xen
LinuxCon NA 2012: Virtualization in the cloud featuring xenLinuxCon NA 2012: Virtualization in the cloud featuring xen
LinuxCon NA 2012: Virtualization in the cloud featuring xenThe Linux Foundation
 
Network Virtualization in Windows Server 2012
Network Virtualization in Windows Server 2012Network Virtualization in Windows Server 2012
Network Virtualization in Windows Server 2012Lai Yoong Seng
 
Track A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, WindriverTrack A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, Windriverchiportal
 
Le cloud microsoft - Présentation "fourre-tout" - Base
Le cloud microsoft - Présentation "fourre-tout" - BaseLe cloud microsoft - Présentation "fourre-tout" - Base
Le cloud microsoft - Présentation "fourre-tout" - BaseNicolas Georgeault
 
Intelligent Storage
Intelligent StorageIntelligent Storage
Intelligent StorageGen-i
 

Mais procurados (20)

Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
 
9sept2009 concept electronics
9sept2009 concept electronics9sept2009 concept electronics
9sept2009 concept electronics
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation Day
 
virtualization tutorial at ACM bangalore Compute 2009
virtualization tutorial at ACM bangalore Compute 2009virtualization tutorial at ACM bangalore Compute 2009
virtualization tutorial at ACM bangalore Compute 2009
 
virtualization and cloud
virtualization and cloudvirtualization and cloud
virtualization and cloud
 
20090911 virtualizationandcloud
20090911 virtualizationandcloud20090911 virtualizationandcloud
20090911 virtualizationandcloud
 
IBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and Configuration
 
Webinar: eFolder Expert Series: Three Myths of Cloud Recovery Revealed
Webinar: eFolder Expert Series:Three Myths of Cloud Recovery RevealedWebinar: eFolder Expert Series:Three Myths of Cloud Recovery Revealed
Webinar: eFolder Expert Series: Three Myths of Cloud Recovery Revealed
 
Wireless to the Nth Degree
Wireless to the Nth DegreeWireless to the Nth Degree
Wireless to the Nth Degree
 
Overview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMOverview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBM
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencing
 
IBM PowerVM Best Practices
IBM PowerVM Best PracticesIBM PowerVM Best Practices
IBM PowerVM Best Practices
 
LinuxCon NA 2012: Virtualization in the cloud featuring xen
LinuxCon NA 2012: Virtualization in the cloud featuring xenLinuxCon NA 2012: Virtualization in the cloud featuring xen
LinuxCon NA 2012: Virtualization in the cloud featuring xen
 
Network Virtualization in Windows Server 2012
Network Virtualization in Windows Server 2012Network Virtualization in Windows Server 2012
Network Virtualization in Windows Server 2012
 
Track A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, WindriverTrack A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, Windriver
 
Shalini xs10
Shalini xs10Shalini xs10
Shalini xs10
 
Le cloud microsoft - Présentation "fourre-tout" - Base
Le cloud microsoft - Présentation "fourre-tout" - BaseLe cloud microsoft - Présentation "fourre-tout" - Base
Le cloud microsoft - Présentation "fourre-tout" - Base
 
PHP in the Cloud
PHP in the CloudPHP in the Cloud
PHP in the Cloud
 
Intelligent Storage
Intelligent StorageIntelligent Storage
Intelligent Storage
 
Building Scalable and Robust Solutions with Service Bus in Cloud and Server
Building Scalable and Robust Solutions with Service Bus in Cloud and ServerBuilding Scalable and Robust Solutions with Service Bus in Cloud and Server
Building Scalable and Robust Solutions with Service Bus in Cloud and Server
 

Destaque

Rocket City Keynote
Rocket City KeynoteRocket City Keynote
Rocket City KeynoteLearon Dalby
 
2010 MAGIC Keynote
2010 MAGIC Keynote2010 MAGIC Keynote
2010 MAGIC KeynoteLearon Dalby
 
201302 wlia-keynote
201302 wlia-keynote201302 wlia-keynote
201302 wlia-keynoteLearon Dalby
 
April 30 & May 1, 2010 Storms
April 30 & May 1, 2010 StormsApril 30 & May 1, 2010 Storms
April 30 & May 1, 2010 StormsLearon Dalby
 
Near Real Time Network Monitoring
Near Real Time Network MonitoringNear Real Time Network Monitoring
Near Real Time Network MonitoringLearon Dalby
 

Destaque (7)

Rocket City Keynote
Rocket City KeynoteRocket City Keynote
Rocket City Keynote
 
2010 MAGIC Keynote
2010 MAGIC Keynote2010 MAGIC Keynote
2010 MAGIC Keynote
 
201302 wlia-keynote
201302 wlia-keynote201302 wlia-keynote
201302 wlia-keynote
 
April 30 & May 1, 2010 Storms
April 30 & May 1, 2010 StormsApril 30 & May 1, 2010 Storms
April 30 & May 1, 2010 Storms
 
Near Real Time Network Monitoring
Near Real Time Network MonitoringNear Real Time Network Monitoring
Near Real Time Network Monitoring
 
201303 tu gis
201303 tu gis201303 tu gis
201303 tu gis
 
Dog Fooding
Dog FoodingDog Fooding
Dog Fooding
 

Semelhante a Whats the weather tomorrow

Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper Networks
 
Openstack Nova and Quantum
Openstack Nova and QuantumOpenstack Nova and Quantum
Openstack Nova and QuantumDavid Lapsley
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual routerTakeshi Nakajima
 
12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group MeetupMidokura
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2vivekbhat
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2vivekbhat
 
Vyatta cloud expo-sjc_2012-share
Vyatta cloud expo-sjc_2012-shareVyatta cloud expo-sjc_2012-share
Vyatta cloud expo-sjc_2012-shareScott Sneddon
 
Virtual Security in Cloud Networks
Virtual Security in Cloud NetworksVirtual Security in Cloud Networks
Virtual Security in Cloud NetworksMarcelo Grebois
 
Virtual Data Centers with OpenStack Quantum
Virtual Data Centers with OpenStack QuantumVirtual Data Centers with OpenStack Quantum
Virtual Data Centers with OpenStack Quantumlaurabeckcahoon
 
Virtual data centers with OpenStack Quantum
Virtual data centers with OpenStack QuantumVirtual data centers with OpenStack Quantum
Virtual data centers with OpenStack QuantumLew Tucker
 
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenDesktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenUNIT4 IT Solutions
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
Vsphere4 100325065654-phpapp01
Vsphere4 100325065654-phpapp01Vsphere4 100325065654-phpapp01
Vsphere4 100325065654-phpapp01Suresh Kumar
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec
 
Presentation from physical to virtual to cloud emc
Presentation   from physical to virtual to cloud emcPresentation   from physical to virtual to cloud emc
Presentation from physical to virtual to cloud emcxKinAnx
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualizationrsnarayanan
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 

Semelhante a Whats the weather tomorrow (20)

Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
 
Openstack Nova and Quantum
Openstack Nova and QuantumOpenstack Nova and Quantum
Openstack Nova and Quantum
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
 
12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Vyatta cloud expo-sjc_2012-share
Vyatta cloud expo-sjc_2012-shareVyatta cloud expo-sjc_2012-share
Vyatta cloud expo-sjc_2012-share
 
Virtual Security in Cloud Networks
Virtual Security in Cloud NetworksVirtual Security in Cloud Networks
Virtual Security in Cloud Networks
 
Virtual Data Centers with OpenStack Quantum
Virtual Data Centers with OpenStack QuantumVirtual Data Centers with OpenStack Quantum
Virtual Data Centers with OpenStack Quantum
 
Virtual data centers with OpenStack Quantum
Virtual data centers with OpenStack QuantumVirtual data centers with OpenStack Quantum
Virtual data centers with OpenStack Quantum
 
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenDesktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Vsphere4 100325065654-phpapp01
Vsphere4 100325065654-phpapp01Vsphere4 100325065654-phpapp01
Vsphere4 100325065654-phpapp01
 
vSphere 4
vSphere 4vSphere 4
vSphere 4
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
 
Presentation from physical to virtual to cloud emc
Presentation   from physical to virtual to cloud emcPresentation   from physical to virtual to cloud emc
Presentation from physical to virtual to cloud emc
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 

Mais de Learon Dalby

201309 GECOWEST Keynote
201309 GECOWEST Keynote 201309 GECOWEST Keynote
201309 GECOWEST Keynote Learon Dalby
 
20130225 nsgi cmidyear
20130225 nsgi cmidyear20130225 nsgi cmidyear
20130225 nsgi cmidyearLearon Dalby
 
Open Source- Viable
Open Source- ViableOpen Source- Viable
Open Source- ViableLearon Dalby
 
2011 NYS GeoSpatial Summit Reception
2011 NYS GeoSpatial Summit Reception2011 NYS GeoSpatial Summit Reception
2011 NYS GeoSpatial Summit ReceptionLearon Dalby
 
Putting a State Budget on a Map
Putting a State Budget on a MapPutting a State Budget on a Map
Putting a State Budget on a MapLearon Dalby
 
Arkansas Road Centerline File Press Release
Arkansas Road Centerline File Press ReleaseArkansas Road Centerline File Press Release
Arkansas Road Centerline File Press ReleaseLearon Dalby
 
June 2010 Joint AR IT Committee
June 2010 Joint AR IT CommitteeJune 2010 Joint AR IT Committee
June 2010 Joint AR IT CommitteeLearon Dalby
 
Is government ready to embrace what social media
Is government ready to embrace what social mediaIs government ready to embrace what social media
Is government ready to embrace what social mediaLearon Dalby
 
NSGIC Intro to a Different Kind of Conference
NSGIC Intro to a Different Kind of ConferenceNSGIC Intro to a Different Kind of Conference
NSGIC Intro to a Different Kind of ConferenceLearon Dalby
 
Social Media For Business Intelligence
Social Media For Business IntelligenceSocial Media For Business Intelligence
Social Media For Business IntelligenceLearon Dalby
 
NSGIC 2010 Advocacy Agenda
NSGIC 2010 Advocacy AgendaNSGIC 2010 Advocacy Agenda
NSGIC 2010 Advocacy AgendaLearon Dalby
 
How to Sign Up for Various Communication Tools
How to Sign Up for Various Communication ToolsHow to Sign Up for Various Communication Tools
How to Sign Up for Various Communication ToolsLearon Dalby
 
Spatial Data Infrastructure
Spatial Data InfrastructureSpatial Data Infrastructure
Spatial Data InfrastructureLearon Dalby
 

Mais de Learon Dalby (17)

201309 GECOWEST Keynote
201309 GECOWEST Keynote 201309 GECOWEST Keynote
201309 GECOWEST Keynote
 
20130225 nsgi cmidyear
20130225 nsgi cmidyear20130225 nsgi cmidyear
20130225 nsgi cmidyear
 
20111104 URISIA
20111104 URISIA20111104 URISIA
20111104 URISIA
 
Open Source- Viable
Open Source- ViableOpen Source- Viable
Open Source- Viable
 
2011 NYS GeoSpatial Summit Reception
2011 NYS GeoSpatial Summit Reception2011 NYS GeoSpatial Summit Reception
2011 NYS GeoSpatial Summit Reception
 
Putting a State Budget on a Map
Putting a State Budget on a MapPutting a State Budget on a Map
Putting a State Budget on a Map
 
Arkansas Road Centerline File Press Release
Arkansas Road Centerline File Press ReleaseArkansas Road Centerline File Press Release
Arkansas Road Centerline File Press Release
 
Open the Data
Open the DataOpen the Data
Open the Data
 
June 2010 Joint AR IT Committee
June 2010 Joint AR IT CommitteeJune 2010 Joint AR IT Committee
June 2010 Joint AR IT Committee
 
2009 Ice Storm
2009 Ice Storm2009 Ice Storm
2009 Ice Storm
 
Is government ready to embrace what social media
Is government ready to embrace what social mediaIs government ready to embrace what social media
Is government ready to embrace what social media
 
NSGIC Intro to a Different Kind of Conference
NSGIC Intro to a Different Kind of ConferenceNSGIC Intro to a Different Kind of Conference
NSGIC Intro to a Different Kind of Conference
 
Social Media For Business Intelligence
Social Media For Business IntelligenceSocial Media For Business Intelligence
Social Media For Business Intelligence
 
Safe Twitter Demo
Safe Twitter DemoSafe Twitter Demo
Safe Twitter Demo
 
NSGIC 2010 Advocacy Agenda
NSGIC 2010 Advocacy AgendaNSGIC 2010 Advocacy Agenda
NSGIC 2010 Advocacy Agenda
 
How to Sign Up for Various Communication Tools
How to Sign Up for Various Communication ToolsHow to Sign Up for Various Communication Tools
How to Sign Up for Various Communication Tools
 
Spatial Data Infrastructure
Spatial Data InfrastructureSpatial Data Infrastructure
Spatial Data Infrastructure
 

Último

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Whats the weather tomorrow

  • 1. What’s the weather tomorrow? Learon Dalby Sanborn 1
  • 2. Thin Line • What are you trying to accomplish? – What is your end game? 2
  • 3. Points of Failure • Uptime – Redundancy • Power National Institute of • Network Standards & Technology • Scalability http://www.nist.gov/itl/cloud/index.cfm • Disk Storage • Functionality • Security • Geographic Distribution of Centers 3
  • 4. A project • Data Storage • Data Management • Data Distribution • Web Mapping • Application Support • Platform http://agioar.wordpress.com/2011/08/10/geostor-assessment/ 4
  • 5. Options • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Data as a Service (DaaS) 5
  • 6. Options • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Data as a Service (DaaS) The short is you are paying $ to have someone else support your IT and that’s ok so long as you understand. 6
  • 8. Virtualization Single box App 1 App 2 App 3 App 4 8
  • 9. Virtualization Utilization of single box 12.00% 14.00% App 1 App 2 32.00% App 3 82.00% App 4 9
  • 10. A few parts of a cloud Bandwidth VM VM Bandwidth Staff Security Security Power Power Staff Staff VM VM Bandwidth Security Bandwidth VM Power Staff Security Bandwidth Security Power VM VM VM Staff 10
  • 11. Geographic Distribution of Centers VM VM VM VM VM Multiple VM Multiple Bandwidth VM Bandwidth VM VM Staff VM Staff Security Security Power VM Power VM VM VM VM VM 11
  • 12. Geographic Distribution of Centers VM VM VM VM VM Multiple VM Multiple Bandwidth VM Bandwidth VM VM Staff VM Staff Security Security Power VM Power VM VM VM VM VM 12
  • 13. Robustness VM VM VM VM VM Multiple VM Multiple Bandwidth VM Bandwidth VM VM Staff VM Staff Security Security Power VM Power VM VM VM VM VM VM VM VM VM VM Multiple VM Multiple Bandwidth VM Bandwidth VM VM Staff VM Staff Security Security Power VM Power VM VM VM VM VM 13
  • 14. Robustness VM VM VM VM VM Multiple VM Multiple Bandwidth VM Bandwidth VM VM Staff VM Staff Security Security Power VM Power VM VM VM VM VM VM VM VM Multiple Bandwidth VM VM Staff Security Power VM VM VM VM VM VM VM VM Multiple VM Multiple Bandwidth VM Bandwidth VM VM Staff VM Staff Security Security Power VM Power VM VM VM VM VM 14
  • 17. • Esri • Google • The RITRE Corporation Presented in the this session – obviously doing stuff 17
  • 18. Disclaimer • The following are in alphabetical order • They do not represent a comprehensive list • The list is only intended to give you a sense of a few who are using cloud services 18
  • 21. geoiQ.com 21
  • 27. Conclusion • Know what you want to accomplish • Understand the capabilities of various providers • This will take work on your part 27
  • 28. Learon Dalby @learondalby (M): (501) 920-2446 (O): (501) 771-5111 ldalby@sanborn.com www.sanborn.com 28