SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Virtualization and Cloud Computing
From Virtualization to Private Cloud
Infrastructure as a Service
The Latest Talk about Cloud
2
Today cloud computing is a proven delivery model with impressive agility
and efficiency benefits.
The trend is to expand to more flexible models to expand the scope of
innovative, value-added business services.
“Should we do it?” “How should we do it
to get the most value?”
Yesterday Today
3
Based on The NIST Definition of Cloud Computing. National Institute of Standards and Technology Special Publication 800-145 (September 2011).
csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Cloud Computing Models
Virtualization as an Enabler for Cloud
Most enterprises are already virtualizing their IT environment.
 Improves resource utilization
 Lowers total cost of ownership
 Enhances speed and flexibility
Logical next step: private cloud.
 Provides user interface to automated, self-service catalogs of standard services
 Autoscales to user demand
 Delivers even greater agility and efficiency
 Controls sensitive workloads
4
Delivering Cloud Services—Fast
5
Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011).
intel.com/content/www/us/en/it-management/intel-it-best-practices/enterprise-private-cloud-paper.html
Thanks to Intel’s construction of a private
cloud on a highly virtualized foundation, time
to provision infrastructure dropped from 90
days to an average of 45 minutes.
Five Steps: Virtualization
to Private Cloud Services
6
1. Develop a cloud strategy
2. Manage business process change
3. Organize IT around service delivery
4. Put the right technology in place
5. Manage a data-driven cloud
1. Develop a Cloud Strategy
Establish where you want to go.
 Describe the anticipated benefits and return on your investment
 Set short-, mid-, and long-term goals
 Identify workloads and user groups for each project phase
 Describe your cloud architecture and its components
 Identify client devices you will support
 Define monitoring and management approach; define success
7
CLOUD TIP: Intel IT developed a strategy that provided a logical evolution to a hybrid cloud model. Source:
Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011).
2. Manage Business Process Change
Get the business on board and create strong partnerships.
 Communicate benefits and milestones to users
 Develop a plan to manage expectations for each project phase
 Engage business users to define and document new and
existing business processes
 Document workflows to minimize human control points
 Implement new IT processes (for example, capacity
provisioning and chargeback)
8
CLOUD TIP: Strong partnerships encourage cloud adoption and are essential to your success.
3. Organize IT around Service Delivery
Evolve IT’s role to a broker of cloud services.
 Determine how joint business-IT teams will
work together
 Hire or train for cloud-related skills
 Weigh user needs against the delivery options to
reduce organizational risk, improve resource
utilization, and monitor demand
9
CLOUD TIP: By offering private cloud services, you gain experience that you can extend later to brokering
public services in a hybrid cloud model.
4. Put the Right Technology in Place
Implement each phase to build on the previous one.
 Determine technology requirements for short-, medium-,
and long-term goals
 Use reference architectures and out-of-the-box workflow
templates and building blocks to save time and effort
 Implement proof of concepts to build success and
gain momentum
10
CLOUD TIP: Intel® Cloud Builder Solutions include reference architectures, or recipes, on how to deploy
ecosystem solutions built on offerings from leading systems and solutions providers based on Intel
technologies. Visit intelcloudbuilders.com.
5. Manage a Data-Driven Cloud
Monitor health and performance end to end.
 Measure against goals for availability and performance
 Ensure compliance with security and privacy regulations
 Inform decisions to add capacity
 Troubleshoot problems
 Review integrated operational analytics for:
 Facilities
 Network
 Storage
 Compute
 Applications
11
CLOUD TIP: If you choose to offer externally hosted cloud services in the future, you will have already
established a way to measure the overall service availability stipulated in third-party service-level
agreements.
Five Requirements: Infrastructure as a
Service (IaaS) Technology
1. Pervasive virtualization
2. A cloud management platform (CMP)
3. Automated workflows and other system capabilities
4. Orchestrated services end to end
5. Cloud security
12
CLOUD TIP: Although clouds are built with IaaS, PaaS, and SaaS service layers, infrastructure services are
the most typical private cloud services offered today.
1. Pervasive Virtualization
Virtualization provides several key cloud capabilities.
 Resource sharing
 Virtual machine (VM) isolation
 Load balancing
Pervasive virtualization broadens the opportunity for cloud
adoption across the organization.
13
Infrastructure as a service is built on pooled resources for computing, storage, and networking.
From An Enterprise Private Cloud Architecture and Implementation Roadmap. Intel IT (June 2010).
2. Cloud Management Platform
Integrated software that delivers high service quality, security,
and availability for workloads should provide at minimum:
 Direct user access to the system
 Self-service capabilities and interfaces
 A workflow engine
 Automated provisioning
 Metering and chargeback functionality
14
CLOUD TIP: More advanced capabilities might include performance and capacity management,
interoperability between private and public IaaS offerings, connectivity to and management of external
clouds, application life-cycle support, back-end service catalogs, and integration with external enterprise
management systems.
Leading Cloud Management Platforms
 Apache* CloudStack*
 Eucalyptus* cloud platform
 Microsoft* Hyper-V* software and Microsoft System Center
 OpenStack* cloud software
 VMware* vCloud Director*
15
3. Automated Workflows
 Minimize manual processes
 Provide integration across heterogeneous and disparate
systems
 Manage provisioning, scaling, VM configuration, identity
and access controls, network resources, workflow
monitoring, patching, and backup
 Optimize and manage resources faster, deliver
services, manage service life cycles, and respond to
changing conditions
16
CLOUD TIP: Intel IT’s private cloud infrastructure uses a modular, extensible framework to simplify system
integration and provide the prerequisites for fully functional, self-provisioned VMs with compute, storage,
and network resources. This enables Intel IT to introduce additional automation capabilities as business and
technical needs change. Source: Best Practices for Building an Enterprise Private Cloud.
Intel IT Hosting Framework
 Users request and consume services through a self-service portal
 IT manages and measures service consumption on a highly utilized resource
pool of virtualized assets
17
Source: Implementing On-Demand Services Inside the Intel IT Private Cloud. Intel IT (October 2010).
intel.com/content/dam/doc/white-paper/intel-it-private-cloud-on-demand-services-paper.pdf
4. Orchestrated Services End to End
Automated intelligence that dynamically coordinates and manages
across different systems to:
 Connect and automate workflows
 Manage configuration, capacity, metering, and chargeback
 Track and report cloud performance and availability
 Monitor and manage power
 Monitor security threats and adherence to security policies
 Take effective actions and make adjustments
 Predict potential issues and address proactively
18
CLOUD TIP: Intel® Intelligent Power Technology orchestrates power management with Intel Data Center
Manager (Intel DCM) and Intel Node Manager (Intel NM), technology built into Intel Xeon® processor-based
servers. Together they monitor and cap power in real time at server, rack, zone, and data center levels and
manage aggregated power consumption and load migration.
5. Cloud Security
 Challenges: Resource isolation, security event management,
and data protection, including VM isolation, secure
VM migration, virtual network isolation, and security event
and access monitoring
 Visibility into secure data flow and compliance with
business-specific security policies is critical
19
CLOUD TIP: Provide security as a set of on-demand, scalable services. In this approach, policies are tied to
logical attributes that create adaptive trust zones to separate multiple tenants.
Intel Cloud Security Recommendations
Intel recommends prioritizing these physical and virtual controls.
 Protect data – Use pervasive encryption, secure connections, and data loss
prevention policies
 Establish and verify identities – Control access from client devices and systems
you trust, and manage API control points at the network edge
 Establish trusted compute pools – Secure data center platform, infrastructure, and
client devices
 Build higher assurance into compliance – Streamline auditing and increase
visibility into your cloud environment
 Enable secure migration – Protect movement between a private cloud
environment and public cloud providers
20
Intel® and McAfee* Cloud Security Technologies
 Intel® Trusted Execution Technology (Intel TXT)
and McAfee* Data Center Security Suites
 Helps detect server systems booting with unknown BIOS,
firmware, and hypervisors
 Provides hardware-based verification for use in meeting
compliance requirements
 Intel Data Protection Technology with AES-NI and Secure Key
 Enables faster and stronger encryption and decryption of the McAfee Endpoint
Encryption product
 Intel Expressway API Manager (Intel EAM)
 Includes a leading SaaS API sharing portal from Mashery with Intel’s on-premises
service gateway for API management
 Available integrated with several McAfee technologies, including McAfee ePolicy
Orchestrator* (McAfee ePO*) for monitoring security events
21
Next Steps: The Path to Hybrid Cloud
22
The path to building hybrid cloud
service delivery begins with private
cloud IaaS on top of a highly
virtualized data center.
When you’re ready to go further, read about
how platform as a service can expand your
cloud environment into a more flexible and
elastic hybrid model.
Virtualization and Cloud Planning Guide
Everything You Need to Get Started
23
Intel.com/ITCenter
Read the complete Planning Guide: Virtualization and
Cloud Computing at intel.com/cloud.
Legal
24
This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS”
WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY,
NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY
OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all
liability, including liability for infringement of any property rights, relating to use of this
information. No license, express or implied, by estoppel or otherwise, to any intellectual
property rights is granted herein.
Copyright © 2013 Intel Corporation. Intel, the Intel logo, the Look Inside. logo, and Xeon are
trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Virtualization and Cloud Computing Guide to Building Private IaaS

Mais conteúdo relacionado

Destaque

Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloudahmedmehiny
 
Paolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzionePaolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzioneInnovAction Lab
 
Cloud Computing: An Introduction
Cloud Computing: An IntroductionCloud Computing: An Introduction
Cloud Computing: An IntroductionSrinath Perera
 
Roxy Educational Technology Slideshow
Roxy Educational Technology SlideshowRoxy Educational Technology Slideshow
Roxy Educational Technology Slideshowragsdale808
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Technovation VIT STTP December 2013
Technovation VIT STTP December 2013 Technovation VIT STTP December 2013
Technovation VIT STTP December 2013 Seema Shah
 
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale
 
Patterns For Cloud Computing
Patterns For Cloud ComputingPatterns For Cloud Computing
Patterns For Cloud ComputingSimon Guest
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud ComputingSeungyun Lee
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 

Destaque (16)

Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloud
 
Paolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzionePaolo Merialdo, Cloud Computing and Virtualization: una introduzione
Paolo Merialdo, Cloud Computing and Virtualization: una introduzione
 
Cloud Computing: An Introduction
Cloud Computing: An IntroductionCloud Computing: An Introduction
Cloud Computing: An Introduction
 
Roxy Educational Technology Slideshow
Roxy Educational Technology SlideshowRoxy Educational Technology Slideshow
Roxy Educational Technology Slideshow
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Technovation VIT STTP December 2013
Technovation VIT STTP December 2013 Technovation VIT STTP December 2013
Technovation VIT STTP December 2013
 
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
 
Patterns For Cloud Computing
Patterns For Cloud ComputingPatterns For Cloud Computing
Patterns For Cloud Computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
100+ Beautiful Slides from #CannesLions 2016
100+ Beautiful Slides from #CannesLions 2016100+ Beautiful Slides from #CannesLions 2016
100+ Beautiful Slides from #CannesLions 2016
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 

Mais de Intel IT Center

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- SupercomputingIntel IT Center
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 

Mais de Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Último

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Virtualization and Cloud Computing Guide to Building Private IaaS

  • 1. Virtualization and Cloud Computing From Virtualization to Private Cloud Infrastructure as a Service
  • 2. The Latest Talk about Cloud 2 Today cloud computing is a proven delivery model with impressive agility and efficiency benefits. The trend is to expand to more flexible models to expand the scope of innovative, value-added business services. “Should we do it?” “How should we do it to get the most value?” Yesterday Today
  • 3. 3 Based on The NIST Definition of Cloud Computing. National Institute of Standards and Technology Special Publication 800-145 (September 2011). csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf Cloud Computing Models
  • 4. Virtualization as an Enabler for Cloud Most enterprises are already virtualizing their IT environment.  Improves resource utilization  Lowers total cost of ownership  Enhances speed and flexibility Logical next step: private cloud.  Provides user interface to automated, self-service catalogs of standard services  Autoscales to user demand  Delivers even greater agility and efficiency  Controls sensitive workloads 4
  • 5. Delivering Cloud Services—Fast 5 Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011). intel.com/content/www/us/en/it-management/intel-it-best-practices/enterprise-private-cloud-paper.html Thanks to Intel’s construction of a private cloud on a highly virtualized foundation, time to provision infrastructure dropped from 90 days to an average of 45 minutes.
  • 6. Five Steps: Virtualization to Private Cloud Services 6 1. Develop a cloud strategy 2. Manage business process change 3. Organize IT around service delivery 4. Put the right technology in place 5. Manage a data-driven cloud
  • 7. 1. Develop a Cloud Strategy Establish where you want to go.  Describe the anticipated benefits and return on your investment  Set short-, mid-, and long-term goals  Identify workloads and user groups for each project phase  Describe your cloud architecture and its components  Identify client devices you will support  Define monitoring and management approach; define success 7 CLOUD TIP: Intel IT developed a strategy that provided a logical evolution to a hybrid cloud model. Source: Best Practices for Building an Enterprise Private Cloud. Intel IT (December 2011).
  • 8. 2. Manage Business Process Change Get the business on board and create strong partnerships.  Communicate benefits and milestones to users  Develop a plan to manage expectations for each project phase  Engage business users to define and document new and existing business processes  Document workflows to minimize human control points  Implement new IT processes (for example, capacity provisioning and chargeback) 8 CLOUD TIP: Strong partnerships encourage cloud adoption and are essential to your success.
  • 9. 3. Organize IT around Service Delivery Evolve IT’s role to a broker of cloud services.  Determine how joint business-IT teams will work together  Hire or train for cloud-related skills  Weigh user needs against the delivery options to reduce organizational risk, improve resource utilization, and monitor demand 9 CLOUD TIP: By offering private cloud services, you gain experience that you can extend later to brokering public services in a hybrid cloud model.
  • 10. 4. Put the Right Technology in Place Implement each phase to build on the previous one.  Determine technology requirements for short-, medium-, and long-term goals  Use reference architectures and out-of-the-box workflow templates and building blocks to save time and effort  Implement proof of concepts to build success and gain momentum 10 CLOUD TIP: Intel® Cloud Builder Solutions include reference architectures, or recipes, on how to deploy ecosystem solutions built on offerings from leading systems and solutions providers based on Intel technologies. Visit intelcloudbuilders.com.
  • 11. 5. Manage a Data-Driven Cloud Monitor health and performance end to end.  Measure against goals for availability and performance  Ensure compliance with security and privacy regulations  Inform decisions to add capacity  Troubleshoot problems  Review integrated operational analytics for:  Facilities  Network  Storage  Compute  Applications 11 CLOUD TIP: If you choose to offer externally hosted cloud services in the future, you will have already established a way to measure the overall service availability stipulated in third-party service-level agreements.
  • 12. Five Requirements: Infrastructure as a Service (IaaS) Technology 1. Pervasive virtualization 2. A cloud management platform (CMP) 3. Automated workflows and other system capabilities 4. Orchestrated services end to end 5. Cloud security 12 CLOUD TIP: Although clouds are built with IaaS, PaaS, and SaaS service layers, infrastructure services are the most typical private cloud services offered today.
  • 13. 1. Pervasive Virtualization Virtualization provides several key cloud capabilities.  Resource sharing  Virtual machine (VM) isolation  Load balancing Pervasive virtualization broadens the opportunity for cloud adoption across the organization. 13 Infrastructure as a service is built on pooled resources for computing, storage, and networking. From An Enterprise Private Cloud Architecture and Implementation Roadmap. Intel IT (June 2010).
  • 14. 2. Cloud Management Platform Integrated software that delivers high service quality, security, and availability for workloads should provide at minimum:  Direct user access to the system  Self-service capabilities and interfaces  A workflow engine  Automated provisioning  Metering and chargeback functionality 14 CLOUD TIP: More advanced capabilities might include performance and capacity management, interoperability between private and public IaaS offerings, connectivity to and management of external clouds, application life-cycle support, back-end service catalogs, and integration with external enterprise management systems.
  • 15. Leading Cloud Management Platforms  Apache* CloudStack*  Eucalyptus* cloud platform  Microsoft* Hyper-V* software and Microsoft System Center  OpenStack* cloud software  VMware* vCloud Director* 15
  • 16. 3. Automated Workflows  Minimize manual processes  Provide integration across heterogeneous and disparate systems  Manage provisioning, scaling, VM configuration, identity and access controls, network resources, workflow monitoring, patching, and backup  Optimize and manage resources faster, deliver services, manage service life cycles, and respond to changing conditions 16 CLOUD TIP: Intel IT’s private cloud infrastructure uses a modular, extensible framework to simplify system integration and provide the prerequisites for fully functional, self-provisioned VMs with compute, storage, and network resources. This enables Intel IT to introduce additional automation capabilities as business and technical needs change. Source: Best Practices for Building an Enterprise Private Cloud.
  • 17. Intel IT Hosting Framework  Users request and consume services through a self-service portal  IT manages and measures service consumption on a highly utilized resource pool of virtualized assets 17 Source: Implementing On-Demand Services Inside the Intel IT Private Cloud. Intel IT (October 2010). intel.com/content/dam/doc/white-paper/intel-it-private-cloud-on-demand-services-paper.pdf
  • 18. 4. Orchestrated Services End to End Automated intelligence that dynamically coordinates and manages across different systems to:  Connect and automate workflows  Manage configuration, capacity, metering, and chargeback  Track and report cloud performance and availability  Monitor and manage power  Monitor security threats and adherence to security policies  Take effective actions and make adjustments  Predict potential issues and address proactively 18 CLOUD TIP: Intel® Intelligent Power Technology orchestrates power management with Intel Data Center Manager (Intel DCM) and Intel Node Manager (Intel NM), technology built into Intel Xeon® processor-based servers. Together they monitor and cap power in real time at server, rack, zone, and data center levels and manage aggregated power consumption and load migration.
  • 19. 5. Cloud Security  Challenges: Resource isolation, security event management, and data protection, including VM isolation, secure VM migration, virtual network isolation, and security event and access monitoring  Visibility into secure data flow and compliance with business-specific security policies is critical 19 CLOUD TIP: Provide security as a set of on-demand, scalable services. In this approach, policies are tied to logical attributes that create adaptive trust zones to separate multiple tenants.
  • 20. Intel Cloud Security Recommendations Intel recommends prioritizing these physical and virtual controls.  Protect data – Use pervasive encryption, secure connections, and data loss prevention policies  Establish and verify identities – Control access from client devices and systems you trust, and manage API control points at the network edge  Establish trusted compute pools – Secure data center platform, infrastructure, and client devices  Build higher assurance into compliance – Streamline auditing and increase visibility into your cloud environment  Enable secure migration – Protect movement between a private cloud environment and public cloud providers 20
  • 21. Intel® and McAfee* Cloud Security Technologies  Intel® Trusted Execution Technology (Intel TXT) and McAfee* Data Center Security Suites  Helps detect server systems booting with unknown BIOS, firmware, and hypervisors  Provides hardware-based verification for use in meeting compliance requirements  Intel Data Protection Technology with AES-NI and Secure Key  Enables faster and stronger encryption and decryption of the McAfee Endpoint Encryption product  Intel Expressway API Manager (Intel EAM)  Includes a leading SaaS API sharing portal from Mashery with Intel’s on-premises service gateway for API management  Available integrated with several McAfee technologies, including McAfee ePolicy Orchestrator* (McAfee ePO*) for monitoring security events 21
  • 22. Next Steps: The Path to Hybrid Cloud 22 The path to building hybrid cloud service delivery begins with private cloud IaaS on top of a highly virtualized data center. When you’re ready to go further, read about how platform as a service can expand your cloud environment into a more flexible and elastic hybrid model.
  • 23. Virtualization and Cloud Planning Guide Everything You Need to Get Started 23 Intel.com/ITCenter Read the complete Planning Guide: Virtualization and Cloud Computing at intel.com/cloud.
  • 24. Legal 24 This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2013 Intel Corporation. Intel, the Intel logo, the Look Inside. logo, and Xeon are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others.