SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Cloud Computing
             Status, Trends and Challenges

                       John Rhoton
                    Beamap Petit Déjeuner
                       24 January 2013

                                              rhoton@gmail.com
24/01/2013               John Rhoton – 2013               1
Agenda
 •    Status
 •    Hybrid Cloud
 •    Adoption Barriers
 •    Trends




24/01/2013            John Rhoton – 2013   2
Cloud Essence
 •  Simple definition: “resource pooling”
 •  Attributes
      –  Virtualization, Multi-tenancy, Automation, Self-service,
         Internet Delivery, Elasticity, On-demand provisioning,
         Utility Pricing, Service Orientation, Outsourcing…
 •  Benefits
      –  Cost Reduction
      –  Increased Revenue (Agility)
      –  Faster Growth (Focus)

24/01/2013                   John Rhoton – 2013                     3
Emotional vs Factual
 •  Fear, Uncertainty and Doubt
 •  Increased Effort
      –  Evaluation
      –  Negotiation
      –  Integration
      –  Implementation
 •  Reduce CAPEX benefits
             Plan early, think objectively
24/01/2013                John Rhoton – 2013   4
Status
 •  Startups start with cloud
      –  Small, no legacy, unpredictable growth
 •  Enterprise
      –  Short term: Dev/test, Collaboration, Security,
         New outbound services
      –  Long term: Private-> Hybrid -> Public



24/01/2013                 John Rhoton – 2013             5
Private Cloud Optimization
 •  Resource Efficiencies
      –  Virtualization
 •  Operational Efficiencies
      –  Automation, Chargeback
 •  Sourcing Efficiencies
      –  Service Orientation, Modularization, Granular
         Security


24/01/2013                John Rhoton – 2013             6
Private Cloud Flexibility
                         Cloud
                        Provider

                                           Customers



 Business Units             IT



                                           Customers
                         Cloud
                        Provider




24/01/2013            John Rhoton – 2013               7
Hybrid Cloud Convergence




             Silo   Integrated              Dynamic




24/01/2013             John Rhoton – 2013             8
Barriers
 •    Data leakage
 •    Data loss
 •    Vendor lock-in
 •    Service loss
 •    Compliance



24/01/2013              John Rhoton – 2013   9
Risk Treatment

     High
     Probability
                                               Eliminate
                        Resilience




                                         Business
                                        Continuity
     Low Probability



                        Low Impact          High Impact

24/01/2013                      John Rhoton – 2013         10
Risk Mitigation Options
         Data Leakage                          Provider Assessment

             Data Loss                         Contract Negotiation

         Service Loss                              Encryption

     Service Impairment                         Additional Backup

              Lock-In                            Standardization

    Damaged Reputation                            Multi-sourcing



24/01/2013                John Rhoton – 2013                          11
Shifting Trust
                            Employees	
                          Contractors	
  
•  Personal observation
                                                                          Segmenta(on	
  
•  Personal experience
•  Insight                                                                Access	
  controls	
  
                      Partners	
                                 Suppliers	
  


                                         Auditors	
  
•  Public verification
•  Contracts                             Public	
  Scru:ny	
                  Encryp(on	
  
•  Compensation                                                               Access	
  controls	
  
                                     Experts	
  
                                     Legal	
  Counsel	
  

                       Adapt Corporate Culture
   24/01/2013                           John Rhoton – 2013                                         12
Threat Vectors
                                                             1
                 Host                         Host
                           3
                Guest              Guest             Guest
                                                 6

                Guest              Guest             Guest       2


                               4             5




             Increase Monitoring Scope and Depth
24/01/2013                     John Rhoton – 2013                    13
Compliance
             Global Internet versus National Laws




                  Enforce Logical Barriers
24/01/2013                 John Rhoton – 2013       14
Identity Federation
 Identity challenges
 •  Password
    proliferation
 •  Weak
    authentication
 •  Support costs
 •  User
    productivity
     Implement Identity Standards (SAML, SCIM)
24/01/2013             John Rhoton – 2013        15
Confidentiality
 •  Data Governance
      –  Data loss prevention


 •  Compartmentalization

 •  Encryption


      Classify data, Select and Combine Options
24/01/2013                 John Rhoton – 2013     16
Redundancy
 •  Dimensions
      –  Physical
      –  Geographical
      –  Technological
      –  Organizational
 •  Horizontal Scalability
 •  ACID     (Atomic Consistent Isolated Durable)


    => BASE          (Basic Availability, Soft-state, Eventual consistency)


                              Architect for scale
24/01/2013                                    John Rhoton – 2013              17
Business Continuity
 •    Cold Site
 •    Warm Site
 •    Hot Site
 •    Double-Active




        Multi-dimensional redundancy is critical
24/01/2013              John Rhoton – 2013         18
Lock-in vs. Cloud Stacks




      Proprietary        Proprietary                    Open    Consortium
       Hardware           Software                     Source     Driven


                    Balance ease with flexibility
24/01/2013                        John Rhoton – 2013                         19
Summary
 •    Private cloud is the starting point
 •    Public cloud is the final destination
 •    Multiple stages of hybrid cloud in between
 •    Security challenges real but addressable
 •    Redundancy is critical for availability



24/01/2013             John Rhoton – 2013          20
Contact Details
   Feel free to reach out to me at:                           Contact Beamap:
            rhoton@gmail.com                                     Patrick Joubert
             +43 699 18662050                                   Directeur Associé
              linkedin/in/rhoton                           patrick.joubert@beamap.fr
                                                                +33 6 64 16 75 20




          or look me up at:
        amazon.com/author/rhoton
             slideshare.net/rhoton
                                                              www.beamap.fr




24/01/2013                            John Rhoton – 2013                               21

Más contenido relacionado

Destacado

Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
TISEE
 

Destacado (12)

Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens Nimis
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Cloud Computing - Challenges & Opportunities
Cloud Computing - Challenges & OpportunitiesCloud Computing - Challenges & Opportunities
Cloud Computing - Challenges & Opportunities
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
The history of cloud computing
The history of cloud computingThe history of cloud computing
The history of cloud computing
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar a Cloud Computing Challenges - Beamap

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
inevitablecloud
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
Walter Liu
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
Emily2014
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
itnewsafrica
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Resilient Systems
 
Designing Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural MetamorphisisDesigning Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural Metamorphisis
Michelle Caldwell, PSM, SSGB
 

Similar a Cloud Computing Challenges - Beamap (17)

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
 
Digital trends rhoton-20111205
Digital trends rhoton-20111205Digital trends rhoton-20111205
Digital trends rhoton-20111205
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 Update
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
Data anywhere anytime
Data anywhere anytimeData anywhere anytime
Data anywhere anytime
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
 
Social media in a broker dealer environment - BDI 3/19/13 Social & Mobile Fi...
Social media in a broker dealer environment  - BDI 3/19/13 Social & Mobile Fi...Social media in a broker dealer environment  - BDI 3/19/13 Social & Mobile Fi...
Social media in a broker dealer environment - BDI 3/19/13 Social & Mobile Fi...
 
Forecast odcau7 100_ak2
Forecast odcau7 100_ak2Forecast odcau7 100_ak2
Forecast odcau7 100_ak2
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Designing Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural MetamorphisisDesigning Change - Triggering Cultural Metamorphisis
Designing Change - Triggering Cultural Metamorphisis
 
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
Business Data Processing Dilemma: Finding the Balance Between In-House and Ou...
 

Más de John Rhoton

Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
John Rhoton
 

Más de John Rhoton (16)

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Último

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Cloud Computing Challenges - Beamap

  • 1. Cloud Computing Status, Trends and Challenges John Rhoton Beamap Petit Déjeuner 24 January 2013 rhoton@gmail.com 24/01/2013 John Rhoton – 2013 1
  • 2. Agenda •  Status •  Hybrid Cloud •  Adoption Barriers •  Trends 24/01/2013 John Rhoton – 2013 2
  • 3. Cloud Essence •  Simple definition: “resource pooling” •  Attributes –  Virtualization, Multi-tenancy, Automation, Self-service, Internet Delivery, Elasticity, On-demand provisioning, Utility Pricing, Service Orientation, Outsourcing… •  Benefits –  Cost Reduction –  Increased Revenue (Agility) –  Faster Growth (Focus) 24/01/2013 John Rhoton – 2013 3
  • 4. Emotional vs Factual •  Fear, Uncertainty and Doubt •  Increased Effort –  Evaluation –  Negotiation –  Integration –  Implementation •  Reduce CAPEX benefits Plan early, think objectively 24/01/2013 John Rhoton – 2013 4
  • 5. Status •  Startups start with cloud –  Small, no legacy, unpredictable growth •  Enterprise –  Short term: Dev/test, Collaboration, Security, New outbound services –  Long term: Private-> Hybrid -> Public 24/01/2013 John Rhoton – 2013 5
  • 6. Private Cloud Optimization •  Resource Efficiencies –  Virtualization •  Operational Efficiencies –  Automation, Chargeback •  Sourcing Efficiencies –  Service Orientation, Modularization, Granular Security 24/01/2013 John Rhoton – 2013 6
  • 7. Private Cloud Flexibility Cloud Provider Customers Business Units IT Customers Cloud Provider 24/01/2013 John Rhoton – 2013 7
  • 8. Hybrid Cloud Convergence Silo Integrated Dynamic 24/01/2013 John Rhoton – 2013 8
  • 9. Barriers •  Data leakage •  Data loss •  Vendor lock-in •  Service loss •  Compliance 24/01/2013 John Rhoton – 2013 9
  • 10. Risk Treatment High Probability Eliminate Resilience Business Continuity Low Probability Low Impact High Impact 24/01/2013 John Rhoton – 2013 10
  • 11. Risk Mitigation Options Data Leakage Provider Assessment Data Loss Contract Negotiation Service Loss Encryption Service Impairment Additional Backup Lock-In Standardization Damaged Reputation Multi-sourcing 24/01/2013 John Rhoton – 2013 11
  • 12. Shifting Trust Employees   Contractors   •  Personal observation Segmenta(on   •  Personal experience •  Insight Access  controls   Partners   Suppliers   Auditors   •  Public verification •  Contracts Public  Scru:ny   Encryp(on   •  Compensation Access  controls   Experts   Legal  Counsel   Adapt Corporate Culture 24/01/2013 John Rhoton – 2013 12
  • 13. Threat Vectors 1 Host Host 3 Guest Guest Guest 6 Guest Guest Guest 2 4 5 Increase Monitoring Scope and Depth 24/01/2013 John Rhoton – 2013 13
  • 14. Compliance Global Internet versus National Laws Enforce Logical Barriers 24/01/2013 John Rhoton – 2013 14
  • 15. Identity Federation Identity challenges •  Password proliferation •  Weak authentication •  Support costs •  User productivity Implement Identity Standards (SAML, SCIM) 24/01/2013 John Rhoton – 2013 15
  • 16. Confidentiality •  Data Governance –  Data loss prevention •  Compartmentalization •  Encryption Classify data, Select and Combine Options 24/01/2013 John Rhoton – 2013 16
  • 17. Redundancy •  Dimensions –  Physical –  Geographical –  Technological –  Organizational •  Horizontal Scalability •  ACID (Atomic Consistent Isolated Durable) => BASE (Basic Availability, Soft-state, Eventual consistency) Architect for scale 24/01/2013 John Rhoton – 2013 17
  • 18. Business Continuity •  Cold Site •  Warm Site •  Hot Site •  Double-Active Multi-dimensional redundancy is critical 24/01/2013 John Rhoton – 2013 18
  • 19. Lock-in vs. Cloud Stacks Proprietary Proprietary Open Consortium Hardware Software Source Driven Balance ease with flexibility 24/01/2013 John Rhoton – 2013 19
  • 20. Summary •  Private cloud is the starting point •  Public cloud is the final destination •  Multiple stages of hybrid cloud in between •  Security challenges real but addressable •  Redundancy is critical for availability 24/01/2013 John Rhoton – 2013 20
  • 21. Contact Details Feel free to reach out to me at: Contact Beamap: rhoton@gmail.com Patrick Joubert +43 699 18662050 Directeur Associé linkedin/in/rhoton patrick.joubert@beamap.fr +33 6 64 16 75 20 or look me up at: amazon.com/author/rhoton slideshare.net/rhoton www.beamap.fr 24/01/2013 John Rhoton – 2013 21