For consumers of cloud services, their responsibility is to conduct a research and analysis of supplier performance while proposing a service level agreement (SLA) with well-defined content indicators, selecting and confirming appropriate and reasonable predetermined goals, and ensuring effective implementation of all measures, as well as awareness of "entry into the cloud" itself is not an effective disaster recovery strategy. Simply put, confirm and validate.
For new technology, often there will be some chilling scenes, when we again for the management of efforts, we all think that management is a dispensable problem. It is hoped that, in the process of being put into use and successful, the next step can be developed and supplemented at the same time.
But from a company's point of view, the actual results of this model are often counterproductive and may even lead to danger. However, because cloud service providers are equipped with a large operating system, the cost advantages of choosing a cloud computing model can be ignored by anyone. For the company, this means that the cost of a single customer can be further reduced compared to a self-contained device. And because of complexity and the drop in real cost of day-to-day work, all companies with information technology needs agree that Cloud is a good choice.
As a result, cloud patterns should not be overlooked for companies, while effective management of cloud characteristics is a must. Now, the focus of the company's work has become a comprehensive analysis of management needs to ensure that it can be achieved through the cloud service model, which is a key issue to consider when making strategic planning.
Use of management tools
Many cloud services can provide management tools that have limited functionality. However, their flaw is that compatibility with existing systems is imperfect. The reason may be that the time spent on independent development focuses on the actual needs of consumers and small and medium enterprises, or that the tools are in the process of being developed because the service has just been released.
The Chromebook model introduced by Google is a typical example. It uses the browser to completely hide the operating system in the background, to further achieve the use of Google Application Services commercial service version to provide competitive pure cloud services target. As a stand-alone system, it can achieve easy and rapid deployment, with the support of Google's two-tier certification system, you can also obtain enterprise-class security protection. Of course, such a pattern also leads to very limited compatibility with other systems.
By using LDAP, the system can provide support for the Active Directory, but due to the lack of other parts of the hardware centralized management options, the system cannot provide full support for the entire group. At least for now, that's the way it is, and when Google upgrades the system, it's a problem that no one can predict until the answer emerges. Therefore, the only effective way for the company to confirm that the service meets the actual demand is to make the relevant evaluation according to the actual functional list.
Consolidation of private clouds
Microsoft's Concero is another example of how cloud management is at high speed and that there are incompleteness. Microsoft's business model relies more on companies buying and maintaining its own systems than Google, so it focuses on the integration of private cloud (a cloud system built internally to run applications) and the public cloud. For this model, Microsoft launched a specific product is azure.
From a cost-saving point of view, the real effect of a private cloud may be relatively poor. But it has the advantage of being able to provide a way for businesses to test and develop their own cloud applications easily and securely, in keeping with the same scalability as the public cloud.
As a management tool for a hybrid system composed of private clouds and public clouds, Concero can be used in monitoring and control work. It can establish self-service portals that allow users to consolidate and match applications and services in a managed environment. It will be part of the System Center, but it is still an unavailable option at the moment, and it is unlikely to be the right choice for a purely managerial perspective, and the reason for this is simply that the tools are still in the development phase. The task of ensuring security, high performance, and User Service reliability still falls on the local system. This is a huge difference from the ultimate goal that the cloud model needs to achieve.
Evaluate the recommendations made by vendors
In this case, the company evaluates the cloud management provided by the supplier in the same way that all other technologies are used, that is, to evaluate and analyze the vendor's recommendations based on the actual situation, and to clear the exaggerated propaganda part of the content. However, there is a commitment to resolution in the cloud due to the very close relationship between technology and related areas that are difficult to manage, such as performance, security, and reliability.
For consumers, responsibility is to confirm and verify: research and analyze the performance of suppliers, propose a service level agreement (SLA) with well-defined content, select and identify appropriate and reasonable predetermined goals, ensure effective implementation of various measures, and realize that "entry into the cloud" is not an effective disaster recovery strategy.
Large cloud vendors also have downtime problems, and a four-day outage in the Amazon EC2 in April has been hit hard by many well-known third party services, just as problems with internal systems have occurred. Therefore, the choice here should be to switch to another cloud service provider (in this case, or it should be said that migrating to the Amazon EC2 service is not affected by another area, which means enough stability, for the enterprise, choose to deploy this technology, can make recovery faster.
As far as cloud management is concerned, the core tasks have not changed any more than other types of information systems management, and remain: configuration, control, protection, and enablement. Only by understanding the nature of the task, find out where the problem lies, to realize that the supplier's answer is correct.
"Responsible editor: Xin Wei TEL: (010) 68476606"