© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Symantec 2010 Windows 7 Migration Global Results.
A Flexible Cloud-Computing Platform Focus on solving business problems
AP STUDY SESSION 2.
1
Select from the most commonly used minutes below.
Chapter 3 Demand and Behavior in Markets. Copyright © 2001 Addison Wesley LongmanSlide 3- 2 Figure 3.1 Optimal Consumption Bundle.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
David Burdett May 11, 2004 Package Binding for WS CDL.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Create an Application Title 1A - Adult Chapter 3.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt FactorsFactors.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
EU market situation for eggs and poultry Management Committee 20 October 2011.
Bright Futures Guidelines Priorities and Screening Tables
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Adding Up In Chunks.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
Subtraction: Adding UP
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Analyzing Genes and Genomes
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Converting a Fraction to %
Clock will move after 1 minute
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Copyright Tim Morris/St Stephen's School
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
Presentation transcript:

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 About Public Cloud Commercial Public Cloud service Introduction Selected Labs: Lab: Free Cloud Storage Lab: Microsoft AZURE Service Lab: HP Cloud

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 A service provides the resources: Applications Storage Compute Development platforms Etc. Must be available to the public on the internet Makes it easy for the public to access better web browsing to meet their needs. Are operated and managed at datacenters Belonging to service providers and shared by multiple customers

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Easy to use Inexpensive to set up Low cost Hardware, application and bandwidth are managed by the providers Capable to be climbed up over and to meet the needs No wasted resources what you use, you pay for that Better ROI and faster time to market

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Less visibility and control Security Reliability Data in the cloud

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 IaaS (Infrastructure as a Service) Shared infrastructure such as servers, storage and network are delivered as a service over the internet Amazon Web Services, Rackspace Cloud, etc. PaaS (Platform as a Service) Application development framework offered as a service to developers for quick deployment of their code Google App Engine, Heroku, Cloud Foundry, etc. SaaS (Software as a Service) Application software offered as a service using a multitenant model which can be consumed using web browsers. Gmail, Salesforce, etc.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 43% of the respondents using a cloud service reported that they have experienced a data security lapse/issue in the last 12 months. 55% expressed concerns that shared storage is vulnerable without encryption. 49% of them said a guaranteed SLA will help them adopt public clouds. 93% of the respondents indicated that their organization is using at least one cloud service when they were presented with a list of cloud providers. However, 7% of these same respondents had previously indicated in the survey that their company had no plans to deploy cloud services showing that this 7% did not realize that their company had already deployed cloud computing. 85% of those using a public cloud in production said they are encrypting the data stored in the cloud and keep a local copy synched to the cloud.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Eliminates CAPEX(Capital Expenditure) and offers reduced OPEX(Operating Expenditure) the maintenance and labor costs associated with managing the infrastructure is offloaded to a third-party provider. Ensures cost efficiency because of the pay-per-use models. Service providers charge by the hour and this comes in handy when a companys resource needs are for a temporary project or to meet a sudden spike in usage. Offers self-service provisioning, leading to lower costs and better agility Human intervention in resource provisioning is minimized.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Provides massive scalability and an ability to re- size compute resources. Gives programmatic access to compute resources through API Helping applications scale automatically without any human intervention. Supplies robust infrastructure with better support staff, offering cost and talent advantages in an increasingly shrinking pool of expertise.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Multi-tenancy risks unauthorized access of data by other tenants using the same hardware resource contention Control and visibility Businesses have limited control and visibility because the vendor is responsible for completely managing the infrastructure Security responsibility Data and encryption Data retention When the data is moved or deleted by a service provider or customer, there may be remaining data remnants Compliance requirements Different countries have different regulatory requirements on data privacy.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 A video production company can use public clouds for video rendering and pay for only the time they used the resources. A business can tap into public clouds when they expect unpredictable demand during a marketing promotion. A pharmaceutical company can run their drug design processes on public cloud, thereby, accelerating the time to market. ……… More and more workloads can be moved to the public clouds.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Sufficient internet access bandwidth? Business to Cloud Service Provider bandwidth Customer to Cloud Service Provider bandwidth Will transform to other platform?

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 VM-level security Multi-layered defense Data and encryption Patch management Identity and access Regulator compliance

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Dropbox (2GB) Dropbox (6GB) CHT CloudBox (2GB) CHT CloudBox Google Drive (5GB) Google Drive MS SkyDrive (7GB) MS SkyDrive

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Require: Microsoft Account Phone Certification Credit Card

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Requirement: Credit Card

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43