Professional Documents
Culture Documents
New Methodology
New Methodology
New Methodology
3
http://www.itweb.co.za/index.php?option=com_content&view=article&id=34534%3Asmes-
wary-of-public-cloud&Itemid=2452
that, “The large multinationals tend to use cloud applications and
services more freely than SMEs that are increasingly moving
towards the private or hybrid cloud.”
4
http://www-935.ibm.com/services/us/index.wss/offerfamily/bcrs/a1026934
• It also supports the functions which can support us for changing
business and industry specific regulations.
Below are some IBM Information Protection Services which are described in brief:
The ways to secure and protected the enterprise data are De-Identifying and
encryption the critical data. The InfoSphere Guardium and InfoSphere Optim are
the products which will deliver the powerful database monitoring capabilities
along with data encryption techniques and data transformation to protect the
confidential user’s data5.
Tivoli:
It will provide the efficient and compliant access to the right resources for
the right person at the right time. This security solution can help us address
complete requirements, reduce operational costs, develop operational efficiencies,
and enhance security posture. There are many versions and sub software’s which
comes under the category of Tivoli each of them have individual functionality to
provide security over public cloud6 and some of the functionalities are described
below.
5
http://www-01.ibm.com/software/data/optim/protect-data-privacy/
6
http://www-01.ibm.com/software/tivoli/products/identity-access-assurance/
• Centralized authentication and authorization for web and other
applications.
• They also reports on user activities across the enterprise and also they
monitor and investigate automatically.
Open source is one way to go if we are looking to start with our own private
cloud at low cost which will utilize the existing hardware (some cases) and also
adding open source software to our environment for building private cloud.
However many problems can arise while using open source like what happen if we
wish to grow the cloud in size or in scalability which may be less and the other
problem is, which may arise around the management tools available for these open
source applications and is again something that the major vendors offer.
Microsoft Hyper-V:
7
http://www.microsoft.com/hyper-v-server/en/us/default.aspx
If we have licensed Microsoft operating system then using Hyper-V does not
add much cost and Hyper-V also provides good management interfaces and we can
grow as we required.
Eucalyptus systems:
8
http://www.eucalyptus.com/about/story
9
http://www.eucalyptus.com/about/story
10
http://en.wikipedia.org/wiki/Eucalyptus_%28computing%29
Eucalyptus Software Architecture:
Eucalyptus Components:
Cloud Controller (CLC): CLC is responsible for managing and exposing the
bottom virtualized resources (storage, machines and servers).
Storage Controller (SC): SC provides storage (block level network storage) which
can be attached by VMs dynamically.
Node Controller (NC): NC controls the VM activities including the inspection,
execution and termination of VM instances11.
11
http://en.wikipedia.org/wiki/Eucalyptus_%28computing%29