SlideShare a Scribd company logo
1 of 9
Download to read offline
A BRIEF OVERVIEW OF
                       CLOUD COMPUTING
                                                      Mike Klein
                                                       President
                                                Online Tech, Inc.

www.onlinetech.com      Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Cloud Computing Growth




Source: Tier1 Research




www.onlinetech.com       Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Forbes – April 2012
IGD Study – Jan 2012
• 34% of IT Budgets are Allocated to Cloud Computing
• 75% are Private Cloud Deployments
• Expect Cloud Spending to Increase 16% in Next Year
• Private Cloud Apps:
      – IT Infrastructure, Security, Financials & Supply Chain Mgmt
• Shared Cloud Apps:
      – E-mail, Collaboration, Data Storage, CRM & HR Mgmt




 www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Cloud Computing Spectrum

    Public                                             Managed                         Private
    Cloud                                               Cloud                          Cloud




www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL     734.213.2020
Public Cloud: Compute as Utility
• Amazon Leading Change
• Designed for Commodity Pricing
• No Redundancy or Failover
     – If host crashes, data is lost
• Programmers needed
• Spot Pricing Market
• Not HIPAA or PCI compliant



www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Private Cloud: Mission Critical
• 67% Enterprises Prefer Private Cloud
         – Yankee Group

•      Single Tenant Dedicated Cloud
•      Security & Compliance Are Key Drivers
•      Enterprise-Level Architecture
•      Redundant & Automatic Failover
•      PCI, HIPAA, SOX Compliance




    www.onlinetech.com    Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Managed Cloud: Multi-Tenant Cloud

•      Mission Critical, Multi-Tenant Cloud
•      “Slice” of a Secure Private Cloud
•      Enterprise-Level Architecture
•      Key Drivers: Security & Compliance
•      PCI, HIPAA, SOX Compliance

• Cost Effective Enterprise-Level Computing




    www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Which Cloud is Right?

       Public                                             Managed                                  Private
       Cloud                                               Cloud                                   Cloud



• Test & Dev Systems                             • Mission Critical Apps                  • Large Enterprises
• Short Life Cycle                               • Enterprise Security                    • Mission Critical Apps
• Noncritical Apps                               • PCI/HIPAA/SOX                          • Complete Arch Control
• Compute Intensive                              • SaaS applications                      • Highest Security Req’t
• Highly Elastic Apps                                                                     • PCI/HIPAA/SOX
                                                                                          • More Cost Effective for
                                                                                          Large Deployments




   www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL               734.213.2020
THANK YOU FOR JOINING US!
                                       www.onlinetech.com




www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020

More Related Content

Viewers also liked

Viewers also liked (11)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Foundation of computing history final
Foundation of computing history finalFoundation of computing history final
Foundation of computing history final
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
BULUT BİLİŞİM (CLOUD COMPUTING) TEKNOLOJİSİNİN UZAKTAN ALGILAMA ve COĞRAFİ Bİ...
BULUT BİLİŞİM (CLOUD COMPUTING) TEKNOLOJİSİNİN UZAKTAN ALGILAMA ve COĞRAFİ Bİ...BULUT BİLİŞİM (CLOUD COMPUTING) TEKNOLOJİSİNİN UZAKTAN ALGILAMA ve COĞRAFİ Bİ...
BULUT BİLİŞİM (CLOUD COMPUTING) TEKNOLOJİSİNİN UZAKTAN ALGILAMA ve COĞRAFİ Bİ...
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
Virtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On DemandVirtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On Demand
 
The history of cloud computing
The history of cloud computingThe history of cloud computing
The history of cloud computing
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

More from Online Tech

Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
Online Tech
 
Cloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery FrameworkCloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery Framework
Online Tech
 
HIPAA Compliance in the Cloud
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the Cloud
Online Tech
 

More from Online Tech (7)

New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Cloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery FrameworkCloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery Framework
 
HIPAA Compliance in the Cloud
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the Cloud
 
Disaster Recovery in the Cloud -- A Failover Testing Case Study
Disaster Recovery in the Cloud -- A Failover Testing Case StudyDisaster Recovery in the Cloud -- A Failover Testing Case Study
Disaster Recovery in the Cloud -- A Failover Testing Case Study
 
Navigating the World of Cloud Computing
Navigating the World of Cloud ComputingNavigating the World of Cloud Computing
Navigating the World of Cloud Computing
 
Colocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized BusinessesColocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized Businesses
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 

Online Tech - A Brief Overview of Cloud Computing

  • 1. A BRIEF OVERVIEW OF CLOUD COMPUTING Mike Klein President Online Tech, Inc. www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 2. Cloud Computing Growth Source: Tier1 Research www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 3. Forbes – April 2012 IGD Study – Jan 2012 • 34% of IT Budgets are Allocated to Cloud Computing • 75% are Private Cloud Deployments • Expect Cloud Spending to Increase 16% in Next Year • Private Cloud Apps: – IT Infrastructure, Security, Financials & Supply Chain Mgmt • Shared Cloud Apps: – E-mail, Collaboration, Data Storage, CRM & HR Mgmt www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 4. Cloud Computing Spectrum Public Managed Private Cloud Cloud Cloud www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 5. Public Cloud: Compute as Utility • Amazon Leading Change • Designed for Commodity Pricing • No Redundancy or Failover – If host crashes, data is lost • Programmers needed • Spot Pricing Market • Not HIPAA or PCI compliant www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 6. Private Cloud: Mission Critical • 67% Enterprises Prefer Private Cloud – Yankee Group • Single Tenant Dedicated Cloud • Security & Compliance Are Key Drivers • Enterprise-Level Architecture • Redundant & Automatic Failover • PCI, HIPAA, SOX Compliance www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 7. Managed Cloud: Multi-Tenant Cloud • Mission Critical, Multi-Tenant Cloud • “Slice” of a Secure Private Cloud • Enterprise-Level Architecture • Key Drivers: Security & Compliance • PCI, HIPAA, SOX Compliance • Cost Effective Enterprise-Level Computing www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 8. Which Cloud is Right? Public Managed Private Cloud Cloud Cloud • Test & Dev Systems • Mission Critical Apps • Large Enterprises • Short Life Cycle • Enterprise Security • Mission Critical Apps • Noncritical Apps • PCI/HIPAA/SOX • Complete Arch Control • Compute Intensive • SaaS applications • Highest Security Req’t • Highly Elastic Apps • PCI/HIPAA/SOX • More Cost Effective for Large Deployments www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 9. THANK YOU FOR JOINING US! www.onlinetech.com www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020