Monday, April 25, 2011
Weak current College】 【public cloud vs private cloud patterns and differences.
<br> If you have already started to touch on cloud computing surface under nature, you may find that you need to know all sorts of "cloud", and your future life will not be just a cloud. In the "cloud" riding on .disputes, whether they exist between links, and how what is the difference between the one who is better in our enterprises play a greater advantage, has become a focus of discussion. <br> <br> Public and private clouds compared: whatever your deployment .based on cloud computing's unified communications (UC) applications or any other application, the method is the same. <br> <br> Now every business in considering the potential benefits of cloud computing, which is about one fifth of the company is implementing a .large-scale cloud computing projects. However the consolidated statistics are common on cloud computing. Enterprises in ways quite different, so they take technical routes vary, this means that the planning of public or private cloud computing will be full of challenges. <br> .<br> Planning based on cloud computing's unified communications (UC) applications and planning based on cloud computing, similar to any application - there are a few reasons. First, and most obvious, UC is an application, it will usually apply to UC .in public cloud or private cloud applications enterprise standards policy. Second, you should consider factors determine is used by the public cloud managed unified communications or private clouds, and the general application of the factors to be the same. You will save a lot of work .to maintain consistency. <br> <br> Cloud computing in three modes <br> <br> How to close to the cloud computing is different, partly because cloud computing and software as a service (SaaS). Most of the company previously provided .SaaS version of the software, and now they are portrayed as cloud computing service, in fact, SaaS is cloud computing in three different modes of one - a application software, middleware, operating systems and hardware as a service model. <br> < .br> The other two models have real differences. Platform as a service (PaaS) to provide users with remote hardware configuration, OS and middleware tool. Users are required to provide in the managed platform application software that runs on. Infrastructure-as-a .-service (IaaS) only provide users with basic hardware platform and operating system software, the rest of the user's own. <br> <br> These characteristics as a cloud computing as a service for enterprise; popular terminology called public cloud. Despite the .large sector enterprises are using some form of public cloud or are going to use, it is clear that most companies do not plan to use the "cloud" application processing critical tasks. The enterprise plan renewal meets cloud computing specification's own data centre to create private .cloud. <br> <br> Virtualization and cloud computing the difference <br> <br> On the technical level, cloud computing is an extension of the concept of virtualization, most enterprises have at least in some data centers in the application. In .a typical data center, when a server is assigned to a specific application, server utilization is low, the total server capacity, and cost of waste can be as high as 45%, which is what virtualization and cloud computing causes. Application due to the .growing demand, server capacity is too great, virtualization and cloud computing are to create a resource pool to solve the problem. <br> <br> Virtualization and cloud computing the difference between the two modes is to use the main office. Virtualization application on .each system and each data center level, cloud computing applications in multiple data centers. Many data center virtualization deployment can extend across multiple data centers and even wider range of server, however, it can provide LAN-like data center network communication link. In fact ., where the data center is connected to a high-speed device, by extending virtualization specification to create a cloud resource pools, the result is the best plan and virtualization deployment. <br> <br> For public and private clouds to prepare <br .> <br> If you plan to use private clouds, first of all should be concerned about how to enable a wide range of data center resources and general resource pool, and then is what the user is connected to the optional data center to access the .specified resource. If it is public cloud, so resources of connectivity is not affected by corporate control, so the only problem would be how to identify and connect to the correct cloud resources. <br> <br> User access to applications typically use a .fixed IP address and port number, or URL or URI (universal resource identifier universalresourceidentifier). Specifies the application to an actual resource and its identifier mapping will need to adjust to the specified resource. Use DNS or similar to address decoding of UDDI standard-based .standard technology. Amazon is similar to the NAT address, dynamic IP address system, if the application associated with the host changes, Amazon to reassign new addresses, and presented to users is always unchanged. <br> <br> Dynamic location may be sufficient .to provide cloud-the connection between client and server, but the specific transmission routes may change, hence the connection performance and security will be different. Public and private cloud applications in such circumstances, but public clouds variability will be greater, because the resource pool .to have greater variability of network performance so will be even greater. Some cloud provider will enable resource pool "regionalization" to reduce the application of the specified resources away from the user's risk, but this feature needs to be taken into account and verify each enterprise .application directory and the user is located. <br> <br> Public and private cloud security <br> <br> And standard data center application, the public and private clouds, applications, the same in the use of the Internet virtual private network .or client application connection technology may be inherent security problems. You must always take into account the resource location change and resourcesAllocation procedure in the hacking possibilities. In addition, public cloud application lacks the enterprise data center have physical security, and storage in the cloud of .sensitive data is especially important. <br> <br> Public cloud plan last consideration is the inter-process communication (IPC). As service-oriented architecture for application in the increase of components, transfer between components. If the application is assigned to .both the public and private clouds-one or completely run on public cloud above, supporting IPC transmission resources between connectivity is not affected by corporate control, and the connection properties on the application of the overall performance will have a significant impact. <br> < .br> Remember that cloud computing is essentially play resource efficiency and utilization of advantage, large enterprise data centers may be obtained from the public cloud scale applications for savings and economic benefits. In view of the growth in the cost of public cloud, if you design .and connectivity has been optimized with private clouds may be cheaper than public cloud. Make use of any decision of the public cloud, should carefully prior to use, and cost audits; for many users, using private cloud may still be best. <br> .<br> About unified communications (UC) and cloud computing, remember that unified communications (UC) applications may vary according to the different unified communications (UC) manufacturers / products have considerable differences is important, therefore, the relevant resources will also be different .. Many companies may think that unified communications (UC) is the primary resource, this may not be inclined to implement private cloud. If you are not active for your critical applications implement private cloud, you probably ought to unified communications (UC) consider using .public cloud. <br> <br> Old schema do not need to rebuild the security embedded virtualization <br> <br> Cloud times will be the next big trend in the cloud coming of age, is not it means that the security market as .a whole of innovation from a single security product transition to and cloud-related a series of security products, schema, or does it mean that the whole class before all the security products are again cloud environment framework of new information system? <br> < .br> Arthur? section Wilo: a very good news is you don't need in security products to schema design solutions in the cloud, the virtual environment has embedded these security technologies. But these security product technology and our RSA is currently available to customers .of these security products are the same. <br> <br> Can give you a few examples, we can see we have just as you described, in the current enterprise existing security frameworks, like GRC policy framework there in the middle of the Security .node in control and other SIEM technologies, is equally applicable to the cloud environment, which is the virtual environment of security schema. <br> <br> And the underlying background of SIEM we have already achieved and VMware virtualization technology virtual product integration, have .been embedded in the car, at the SecurityID also has completed the integration, we plan on doing integration is our access control products. There are also some of our other products on the Security node, and we will continue to increase, such as ERP we .already have plans, it is a very good investment protection for present uses RSA this product customers, later to virtual environments, they are using technology and current security technology is the same, but these security technologies are embedded in here. <br> <br .> At the same time I also want to talk about, I want to make an analogy, for instance, your House, your House is covered when you forget to refrigeration, heating and ventilation system, built after the you suddenly realized that these things are .forgotten, and you want to add in, this time after having added systems, for example in the area of refrigeration, heating may cause uneven distribution. So we believe that in fact at present virtualization environment or cloud computing provides us with a very good chance .we can start these schema was born when security mechanism embedded in it, instead of the existing security mechanisms. <br> <br> In fact, existing security mechanisms are added after, that is the Web-based ERP system, whether it is Microsoft .or Sun to provide operating systems and networking devices, in these early days of the birth, and no we are facing a variety of sophisticated network attacks forms of generation, so for these systems are adding these security mechanisms are back, but not as we do .in virtual environments can have the opportunity to truly secure mechanism embedded in. <br> <br>.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment