SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Ubuntu Cloud
Canonical's strategy for an Open Cloud
Infosecurity.nl 2010
Nick Barcet <nick.barcet@canonical.com>
Cloud Solutions Lead
Cloud?
3
Cloud computing stack
etc..LenovoDellIBMHP
etc..HyperVVMWareKVMXen
Amazon, GoGrid, 3Tera, Eucalyptus, etc...
GoogleApps, Java, Azure, etc...
Salesforce.com, GoogleDocs, Office, etc...
Storage
Hardware
Virtualization
Infrastructure
Platform
Application
Network
4
Our current cloud offering
etc..LenovoDellIBMHP
KVM
Ubuntu Enterprise Cloud Infrastructure
Storage
Hardware
Virtualization
Infrastructure
Platform
Application
Network
Ubuntu's Strategy in the Cloud
6
Strategy
• IaaS
– Focus on infrastructure layer
• Bring the Ubuntu experience
– Make it as easy as possible for Enterprises to try out cloud computing
• Standards
– Support current dominant de-facto cloud standards
• Open and Lock-In Free
– Ensure the cloud is based on open-source and lock-in free
7
Product Overview
Guest OS Guest OS
Infrastructure Host OS
Management Tools
Public Cloud Private Clouds
Infrastructure Host OS
8
Product Overview
Ubuntu AMI Ubuntu AMI
Ubuntu Enterprise Cloud
Landscape
Public Cloud Private Clouds
9
Ubuntu AMI – The #1 Public Cloud OS
•
– Images available since 2007
– Believed to be the most widely deployed OS
•
– Images available since 2008
– Confirmed as most widely deployed OS
10
UEC Adoption – The 1st
OSS Cloud Stack
• Ubuntu Enterprise Cloud
– 200 installs a day
• Market Engagement with FSI sector
– Bursty compute needs
– Multiple PoC engagements
– Developers rather Operations influential
11
Five Characteristics:
- On Demand Service
- Ubiquitous Network Access
- Location Independent Resource Polling
- Rapid Elasticity
- Measured Service
Delivery Models
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
Deployment Models
- Private Cloud
- Public Cloud
- Hybrid Cloud
Ubuntu Enterprise Cloud
12
Speed of Innovation
• Cloud reduces development friction and costs and so speeds innovation
– Benefits of Cloud not just from scale
• Cloud adoption is being driven by developers
– Ubuntu is the default non-Windows development platform
– Web 2.0 companies using Ubuntu and early adopters of cloud technology
• Opportunity
– Access to latest technologies needed for competitive advantage rather than
cost saving
UEC use cases
14
UEC use cases
• Testing/Development
• Education/Training
• Web Services deployment and scaling
• Quickly create and tear-down IT environments
• Hybrid clouds
– Capacity scaling
– Disaster recovery
– Back up
15
Developer Shop
• Developing software that sits on top of complex
infrastructures
• Developers need to test code against the entire
infrastructure
• It is inconceivable to give each developer a separate
infrastructure for testing, limiting edge effects
• With UEC, a developer can spin their own infrastructure to
test their code
16
Cloud developer sizing
• L = average number of instances/developper (single cores)
• X = Number of developers
Current cost
• L = 20
• X = 100
→ L x X = 2000 cores
Projected cost with UEC
• M = 40% (average concurrent usage)
• V = 20% (virtualization overhead)
→ Y = ( (V x L) x X x M) + L) = 980 cores, 50% potential savings
Ensure we can
handle peak
and provide
margin
Average
cumulated use
duration
Increase
largest
number of
core by
overhead
Future trends
18
Future Trends – Ubuntu Roadmap
Easy Hyperscale Focus on integrating tools, software and
technologies which make it easy for DevOps to
deploy workloads rapidly and without fuss.
The 1st
Cloud LAMP
Stack - BigData
Use of Hadoop, Cassandra, Memcached is
driving IaaS adoption in the Enterprise
Thank you!
http://www.ubuntu.com/cloud
http://cloud.ubuntu.com ← blog aggregator
http://help.ubuntu.com/community/UEC ← tuto & doc
Twitter @ubuntucloud
@nijaba ← me

Más contenido relacionado

La actualidad más candente

Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...LeMeniz Infotech
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSKCSAIsrael
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticorgiladpn
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudSandip Karale
 
Industry Trends and Perspectives: Enabling efficient and effective informatio...
Industry Trends and Perspectives: Enabling efficient and effective informatio...Industry Trends and Perspectives: Enabling efficient and effective informatio...
Industry Trends and Perspectives: Enabling efficient and effective informatio...Melanie Thorne
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?Tom Mumford
 

La actualidad más candente (19)

Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
Top Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart InfrastructureTop Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart Infrastructure
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Security In The Cloud Timed
Security In The Cloud TimedSecurity In The Cloud Timed
Security In The Cloud Timed
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
Industry Trends and Perspectives: Enabling efficient and effective informatio...
Industry Trends and Perspectives: Enabling efficient and effective informatio...Industry Trends and Perspectives: Enabling efficient and effective informatio...
Industry Trends and Perspectives: Enabling efficient and effective informatio...
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?
 

Destacado

happier.com: a personal trainer for your happiness
happier.com: a personal trainer for your happinesshappier.com: a personal trainer for your happiness
happier.com: a personal trainer for your happinessAndrew Rosenthal
 
2 kings 10 11 so jehu killed everyone in jezreel power point church sermon
2 kings 10 11 so jehu killed everyone in jezreel power point church sermon2 kings 10 11 so jehu killed everyone in jezreel power point church sermon
2 kings 10 11 so jehu killed everyone in jezreel power point church sermonPowerPoint_Sermons
 
Berdych Cleo Australia
Berdych Cleo AustraliaBerdych Cleo Australia
Berdych Cleo Australianevito77
 
Side Wheel Attachment
Side Wheel AttachmentSide Wheel Attachment
Side Wheel AttachmentNavin Batra
 
Seven tips for writing customer case studies that sell
Seven tips for writing customer case studies that sellSeven tips for writing customer case studies that sell
Seven tips for writing customer case studies that sellDavidDodd
 
Denim Club Newsletter 01 January, 2014
Denim Club Newsletter 01 January, 2014Denim Club Newsletter 01 January, 2014
Denim Club Newsletter 01 January, 2014denimclub
 

Destacado (7)

happier.com: a personal trainer for your happiness
happier.com: a personal trainer for your happinesshappier.com: a personal trainer for your happiness
happier.com: a personal trainer for your happiness
 
2 kings 10 11 so jehu killed everyone in jezreel power point church sermon
2 kings 10 11 so jehu killed everyone in jezreel power point church sermon2 kings 10 11 so jehu killed everyone in jezreel power point church sermon
2 kings 10 11 so jehu killed everyone in jezreel power point church sermon
 
Berdych Cleo Australia
Berdych Cleo AustraliaBerdych Cleo Australia
Berdych Cleo Australia
 
Side Wheel Attachment
Side Wheel AttachmentSide Wheel Attachment
Side Wheel Attachment
 
Seven tips for writing customer case studies that sell
Seven tips for writing customer case studies that sellSeven tips for writing customer case studies that sell
Seven tips for writing customer case studies that sell
 
Denim Club Newsletter 01 January, 2014
Denim Club Newsletter 01 January, 2014Denim Club Newsletter 01 January, 2014
Denim Club Newsletter 01 January, 2014
 
GloSho'14: E4 Advanced Transportation Center - Michael Boehm
GloSho'14: E4 Advanced Transportation Center - Michael Boehm GloSho'14: E4 Advanced Transportation Center - Michael Boehm
GloSho'14: E4 Advanced Transportation Center - Michael Boehm
 

Similar a Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event, 3 november 2010, Jaarbeurs Utrecht

Canonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview PresentationCanonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview PresentationThe World Bank
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingMark Hinkle
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudThe UberCloud
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudWolfgang Gentzsch
 
Demystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDemystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDr Ganesh Iyer
 
Kubernetes solutions
Kubernetes solutionsKubernetes solutions
Kubernetes solutionsEric Cattoir
 
Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...
Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...
Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...Ian Lumb
 
IBM Cloud Manager with OpenStack Overview
IBM Cloud Manager with OpenStack OverviewIBM Cloud Manager with OpenStack Overview
IBM Cloud Manager with OpenStack OverviewPatrick Bouillaud
 
Ubuntu Cloud at Florida Linux Show
Ubuntu Cloud at Florida Linux ShowUbuntu Cloud at Florida Linux Show
Ubuntu Cloud at Florida Linux Showzoopster
 
Dockercon eu tour 2015 - Devoxx Casablanca
Dockercon eu tour 2015 - Devoxx CasablancaDockercon eu tour 2015 - Devoxx Casablanca
Dockercon eu tour 2015 - Devoxx CasablancaMichel Courtine
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overviewkarthik s
 
OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014
OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014
OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014OpenNebula Project
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015Henry Huang
 
Ansible Tower | Docker | Cisco ACI
Ansible Tower | Docker | Cisco ACIAnsible Tower | Docker | Cisco ACI
Ansible Tower | Docker | Cisco ACIJoel W. King
 
Docker for any type of workload and any IT Infrastructure
Docker for any type of workload and any IT InfrastructureDocker for any type of workload and any IT Infrastructure
Docker for any type of workload and any IT InfrastructureDocker, Inc.
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)Tsz Wing Chu
 
Clould Computing and its application in Libraries
Clould Computing and its application in LibrariesClould Computing and its application in Libraries
Clould Computing and its application in LibrariesAmit Shaw
 

Similar a Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event, 3 november 2010, Jaarbeurs Utrecht (20)

Cloud iaa s-labs- ubuntu canonical- fossa2010
Cloud iaa s-labs- ubuntu canonical- fossa2010Cloud iaa s-labs- ubuntu canonical- fossa2010
Cloud iaa s-labs- ubuntu canonical- fossa2010
 
Canonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview PresentationCanonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview Presentation
 
Coud discovery chap 9
Coud discovery chap 9Coud discovery chap 9
Coud discovery chap 9
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud Computing
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the Cloud
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the Cloud
 
Demystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDemystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data Scientists
 
Kubernetes solutions
Kubernetes solutionsKubernetes solutions
Kubernetes solutions
 
Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...
Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...
Univa Unicloud - High Volume Workloads: How Smart Companies are Harnessing th...
 
IBM Cloud Manager with OpenStack Overview
IBM Cloud Manager with OpenStack OverviewIBM Cloud Manager with OpenStack Overview
IBM Cloud Manager with OpenStack Overview
 
Ubuntu Cloud at Florida Linux Show
Ubuntu Cloud at Florida Linux ShowUbuntu Cloud at Florida Linux Show
Ubuntu Cloud at Florida Linux Show
 
Dockercon eu tour 2015 - Devoxx Casablanca
Dockercon eu tour 2015 - Devoxx CasablancaDockercon eu tour 2015 - Devoxx Casablanca
Dockercon eu tour 2015 - Devoxx Casablanca
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014
OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014
OpenNebula - Open-source Enterprise Cloud Simplified - CeBIT March 2014
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015
 
Ansible Tower | Docker | Cisco ACI
Ansible Tower | Docker | Cisco ACIAnsible Tower | Docker | Cisco ACI
Ansible Tower | Docker | Cisco ACI
 
Docker for any type of workload and any IT Infrastructure
Docker for any type of workload and any IT InfrastructureDocker for any type of workload and any IT Infrastructure
Docker for any type of workload and any IT Infrastructure
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
LinuxTag 2013
LinuxTag 2013LinuxTag 2013
LinuxTag 2013
 
Clould Computing and its application in Libraries
Clould Computing and its application in LibrariesClould Computing and its application in Libraries
Clould Computing and its application in Libraries
 

Más de Infosecurity2010

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud - Infosecurity2010
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Infosecurity2010
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtStefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtInfosecurity2010
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtKoen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtHelmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtInfosecurity2010
 

Más de Infosecurity2010 (11)

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtStefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtKoen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtHelmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event, 3 november 2010, Jaarbeurs Utrecht

  • 1. Ubuntu Cloud Canonical's strategy for an Open Cloud Infosecurity.nl 2010 Nick Barcet <nick.barcet@canonical.com> Cloud Solutions Lead
  • 3. 3 Cloud computing stack etc..LenovoDellIBMHP etc..HyperVVMWareKVMXen Amazon, GoGrid, 3Tera, Eucalyptus, etc... GoogleApps, Java, Azure, etc... Salesforce.com, GoogleDocs, Office, etc... Storage Hardware Virtualization Infrastructure Platform Application Network
  • 4. 4 Our current cloud offering etc..LenovoDellIBMHP KVM Ubuntu Enterprise Cloud Infrastructure Storage Hardware Virtualization Infrastructure Platform Application Network
  • 6. 6 Strategy • IaaS – Focus on infrastructure layer • Bring the Ubuntu experience – Make it as easy as possible for Enterprises to try out cloud computing • Standards – Support current dominant de-facto cloud standards • Open and Lock-In Free – Ensure the cloud is based on open-source and lock-in free
  • 7. 7 Product Overview Guest OS Guest OS Infrastructure Host OS Management Tools Public Cloud Private Clouds Infrastructure Host OS
  • 8. 8 Product Overview Ubuntu AMI Ubuntu AMI Ubuntu Enterprise Cloud Landscape Public Cloud Private Clouds
  • 9. 9 Ubuntu AMI – The #1 Public Cloud OS • – Images available since 2007 – Believed to be the most widely deployed OS • – Images available since 2008 – Confirmed as most widely deployed OS
  • 10. 10 UEC Adoption – The 1st OSS Cloud Stack • Ubuntu Enterprise Cloud – 200 installs a day • Market Engagement with FSI sector – Bursty compute needs – Multiple PoC engagements – Developers rather Operations influential
  • 11. 11 Five Characteristics: - On Demand Service - Ubiquitous Network Access - Location Independent Resource Polling - Rapid Elasticity - Measured Service Delivery Models - Software as a Service (SaaS) - Platform as a Service (PaaS) - Infrastructure as a Service (IaaS) Deployment Models - Private Cloud - Public Cloud - Hybrid Cloud Ubuntu Enterprise Cloud
  • 12. 12 Speed of Innovation • Cloud reduces development friction and costs and so speeds innovation – Benefits of Cloud not just from scale • Cloud adoption is being driven by developers – Ubuntu is the default non-Windows development platform – Web 2.0 companies using Ubuntu and early adopters of cloud technology • Opportunity – Access to latest technologies needed for competitive advantage rather than cost saving
  • 14. 14 UEC use cases • Testing/Development • Education/Training • Web Services deployment and scaling • Quickly create and tear-down IT environments • Hybrid clouds – Capacity scaling – Disaster recovery – Back up
  • 15. 15 Developer Shop • Developing software that sits on top of complex infrastructures • Developers need to test code against the entire infrastructure • It is inconceivable to give each developer a separate infrastructure for testing, limiting edge effects • With UEC, a developer can spin their own infrastructure to test their code
  • 16. 16 Cloud developer sizing • L = average number of instances/developper (single cores) • X = Number of developers Current cost • L = 20 • X = 100 → L x X = 2000 cores Projected cost with UEC • M = 40% (average concurrent usage) • V = 20% (virtualization overhead) → Y = ( (V x L) x X x M) + L) = 980 cores, 50% potential savings Ensure we can handle peak and provide margin Average cumulated use duration Increase largest number of core by overhead
  • 18. 18 Future Trends – Ubuntu Roadmap Easy Hyperscale Focus on integrating tools, software and technologies which make it easy for DevOps to deploy workloads rapidly and without fuss. The 1st Cloud LAMP Stack - BigData Use of Hadoop, Cassandra, Memcached is driving IaaS adoption in the Enterprise
  • 19. Thank you! http://www.ubuntu.com/cloud http://cloud.ubuntu.com ← blog aggregator http://help.ubuntu.com/community/UEC ← tuto & doc Twitter @ubuntucloud @nijaba ← me