Figure 2 shows these layers.
Figure 2. Cloud computing layers embedded in the "as a service" components
Cloud formations
There are three types of cloud formations: Private (on premise), public, and hybrid.
- Public clouds are available to the general public or a large industry group and are owned and provisioned by an organization selling cloud services. A public cloud is what is thought of as the cloud in the usual sense; that is, resources dynamically provisioned
Over the Internet using Web applications from an off-site third-party provider that supplies shared resources and bills on a utility computing basis.
- Private clouds exist within your company's firewall and are managed by your organization. they are cloud services you create and control within your enterprise. private clouds offer limits of the same benefits as the public clouds-the major distinction
Being that your organization is in charge of setting up and maintaining the cloud.
- Hybrid clouds are a combination of the public and the private cloud using services that are in both the public and private space. management responsibilities are divided between the public cloud provider and the business itself. using a hybrid cloud, organizations
Can determine the objectives and requirements of the services to be created and obtain them based on the most suitable alternative.
It roles in the cloud
Let us consider the probability that management and administration will require greater automation, requiring a change in the tasks of personnel responsible for scripting due to the growth in code production. you see, it may be different lidating, with a need
For less hardware and software implementation, but it is also creating new formations.
The shift in it is toward the knowledge worker. In the new paradigm, the technical human assets will have greater responsibilities for enhancing and upgrading general business processes.
The developer
The growing use of mobile devices, the popularity of social networking, and other aspects of the evolution of specified cial it processes and systems, will guarantee work for the developer community; however, some of the traditional roles of development personnel
Will be shifted away from the enterprise's developers due to the systemic and systematic processes of the cloud configuration model.
A recent survey by IBM,New developerworks survey shows dominance of cloud computing and mobile application development(See
Resources) demonstrated that the demand for mobile technology will grow exponentially. This development, along with the rapid acceptance of cloud computing within ss the globe, will necessitate a radical increase of developers with an understanding
Area. To meet the growing needs of mobile connectivity, more developers will be required who understand how cloud computing works.
Cloud computing provides an almost unlimited capacity, scalability concerns. Cloud computing allows developers access to software and hardware assets that most small and mid-limit parameter ISES cocould not afford. Developers, using Internet-driven
Cloud computing and the assets that are a consequence of this configuration, will have access to resources that most cocould have only dreamed of in the recent past.
The Administrator
Administrators are the guardians and legislators of an IT system. they are responsible for the control of user access to the network. this means sitting on top of the creation of user passwords and the formulation of rules and procedures for such fundamental
Functionality as general access to the system assets. the advent of cloud computing will necessitate adjustments to this process since the Administrator in such an environment is no longer merely concerned about internal matters, but also the external relationship
Of his enterprise and the cloud computing concern, as well as the actions of other tenants in a public cloud.
This alters the role of the firewall constructs put in place by the administration and the nature of the general security procedures of the enterprise. it does not negate the need for the guardian of the system. with cloud computing comes even greater responsibility,
Not less. Under cloud computing, the Administrator must not only ensure data and systems internal to the Organization, they must also monitor and manage the cloud to ensure the safety of their system and data everywhere.
The effecect
The function of the architecture is the valid modeling of the given system's functionality in the real it world. the basic responsibility of the specified ECT is development of the specified tural framework of the Agency's cloud computing model. the architecture
Of cloud computing is essential comprised of the specified action of the three layer constructs, IAAs, paas, and SaaS, in such a way that the participating enterprise deploying the cloud computing approach meets its stated goals and objectives. the specified action
The functionality of the layers is developed so the demo-makers and the foot soldiers can use the specific action to plan, execute, and evaluate the efficacy of the IT system's procedures and processes.
The role of the role ect in the Age of cloud computing is to conceive and model a functional interaction of the cloud's layers. the specified ect must use the specified action as a means to ensure that it is playing its proper role in the attainment of organizational
Objectives.
To cloud or not to cloud: Risk Assessment
The main concerns voiced by those moving to the cloud are security and privacy. the companies supplying cloud computing services know this and understand that without reliable security, their businesses will collapse. so security and privacy are high priorities
For all cloud computing entities.
Governance: How will industry standards be monitored?
Governance is the primary responsibility of the owner of a private cloud and the shared responsibility of the service provider and service consumer in the public cloud. however, given elements such as transnational terrorism, denial of service, viruses,
Worms and the like-which do or cocould have aspects beyond the control of either the private cloud owner or public cloud service provider and service consumer-there is a need for some kind of broader collaboration, particle on the global, regional, and
National levels. Of course, this collaboration has to be instituted in a manner that will not dilute or otherwise harm the control of the owner of the process or subscribers in the case of the public cloud.
Bandwidth requirements
If you are going to adopt the cloud framework, bandwidth and the potential bandwidth bottleneck must be evaluated in your strategy. In the cio.com article:
The skinny straw: cloud computing's bottleneck and how to address it, The following statement is made:
Virtualization alization implementers found that the key bottleneck to virtual machine density is memory capacity; now there's a whole new slew of servers coming out with much larger memory footprints, removing memory as a system failure. cloud computing negates
That bottleneck by removing the issue of machine density from the equation-sorting that out becomes the responsibility of the cloud provider, freeing the cloud user from worrying about it.
For cloud computing, bandwidth to and from the cloud provider is a bottleneck.
So what is the best current solution for the bandwidth issue? In today's market the best answer is the blade server. A blade server is a server that has been optimized to minimize the use of physical space and energy. one of the huge advantages of the blade
Server for cloud computing use is bandwidth speed improvement. for example, the IBM bladecenter is designed to accelerate the high-performance computing workloads both quickly and efficiently. just as the memory issue had to be overcome to every tively alleviate
The bottleneck of virtual high machine density, the bottleneck of cloud computing bandwidth must also be overcome, so look to the capabilities of your provider to determine if the bandwidth bottleneck will be a major performance issue.
Financial impact
Because a sizable proportion of the cost in IT Operations comes from administrative and management functions, the implicit automation of some of these functions will per se cut costs in a cloud computing environment. automation can reduce the error factor
And the cost of the redundancy of manual repetition significantly.
There are other contributors to financial problems such as the cost of maintaining physical facilities, electrical power usage, cooling systems, and of course administration and management factors. as you can see, bandwidth is not alone, by any means.
Mitigate the risk
Consider these possible risks:
- Adverse impact of mishandling of data.
- Unwarranted service charges.
- Financial or legal problems of vendor.
- Vendor operational problems or shutdowns.
- Data Recovery and confidentiality problems.
- General security concerns.
- Systems attacks by external forces.
With the use of systems in the cloud, there is the ever present risk of data security, connectivity, and malicous actions interfering with the computing processes. however, with a carefully thought out plan and methodology of selecting the service provider,
And an astute perspective on general risk management, most companies can safely leverage this technology.
In conclusion
In this revolutionary new era, cloud computing can provide organizations with the means and methods needed to ensure financial stability and high quality service. of course, there must be global cooperation if the cloud computing process is to attain optimal
Security and general operational standards. With the advent of cloud computing it is imperative for us all to be ready for the revolution.