Documente Academic
Documente Profesional
Documente Cultură
Copyright
2010
Copyright
2010
QuickTime and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Copyright
2010
http://adverlab.blogspot.com/2008/08/...
...media-history-through-gartner-hype.html
QuickTime and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Copyright
2010
http://www.lostinthemagicforest.com/blog/wp-content/...
...uploads/2007/10/gartner2007.jpg
QuickTime and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Copyright
2010
http://adverlab.blogspot.com/2008/08/...
...media-history-through-gartner-hype.html
Copyright
2010
http://www.gartner.com/it/page.jsp?id=1124212
On the Rise
Cloudbursting/Overdraft
Tera-architectures
Cloud Storage
Copyright
2010
At the Peak
Elasticity
Cloud/Web Platforms
Cloud Computing
Real-Time Infrastructure
IT Infrastructure Utility
SaaS
Climbing the Slope
Virtualization
Cloud Advertising
Grid Computing
Integration as a Service
http://www.gartner.com/DisplayDocument?id=1078112&ref=g_sitelink
Predecessor Terms
Related Concepts
Copyright
2010
10
11
Copyright
2010
12
Sample
Architectures
QuickTime and a
TIFF (LZW) decompressor
are needed to see this picture.
QuickTime and a
TIFF (LZW) decompressor
are needed to see this picture.
CSA (2009) 'Security Guidance for Critical Areas of Focus in Cloud Computing'
Cloud Security Alliance, April 2009
Youseff L., Butrico M. & Da Silva D. (2008) 'Toward a Unified Ontology of
Cloud Computing' Proc. Grid Computing Environments Workshop, 2008
Copyright
2010
13
QuickTime and a
TIFF (LZW) decompressor
are needed to see this picture.
Copyright
2010
Buyya R., Yeo C.S., Venugopal S., Broberg J. & Brandic I. (2009)
'Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering
computing as the 5th utility' Future Generation Computer Systems 25 (January 2009) 599-616
14
Intermediating
Infrastructure
Copyright
2010
15
Intermediating
Infrastructure
Copyright
2010
A Comprehensive CC Architecture
16
Copyright
2010
Scalability
Collaboration convenience
Copyright convenience
Financial Benefits
Contingent Risks
Low likelihood / Potentially highly significant
Security Risks
Security in the broad
Copyright
2010
18
Copyright
2010
19
Contingent Risks
Copyright
2010
20
Security Risks
Service Security
Data Security
Susceptibility to DDOS
21
Acquisition
Ongoing Usage
Copyright
2010
22
Risk Assessment
Contract Terms
Service Level Agreement (SLA)
Multi-Sourcing
Parallel in-house service
Several compatible suppliers
...
Copyright
2010
23
Copyright
2010
http://wiki.en.it-processmaps.com/index.php/Checklist_SLA_OLA_UC
24
User Requirements
Essential Features
Copyright
2010
Categories of Use-Profile
'mission-critical systems'
Copyright
2010
26
Service Integrity
Data Integrity
2. Compliance Assurance
Service Security
Service Access Controls
Data Transmission Security
Data Storage Security
Data Use (by service-provider)
Data Disclosure (by others)
Jurisdictional Location(s)
of Data Storage
Copyright
2010
3. Declaration, Measurement
Copyright
2010
28
Conclusion
Copyright
2010
29
Copyright
2010
30