Cs 300 Help

i have a texst due on the 11th half of it is done here are the articles the test is on, attached is the test

 

1.  http://www.cs.ucdavis.edu/~rogaway/classes/188/materials/postman.pdf

2.  http://www.theatlantic.com/business/archive/2012/07/the-social-century-100-years-of-talking-watching-reading-and-writing-in-america/260372/

3.  http://www.nytimes.com/2005/04/03/magazine/03DOMINANCE.html?_r=0

4.  http://www.nybooks.com/articles/archives/2011/aug/18/how-google-dominates-us/

5.  http://www.technologyreview.com/featuredstory/428150/what-facebook-knows/

6.  The decision lens by helen knight ( cannot find a link)

7.  http://www.technologyreview.com/news/427156/beyond-credit-cards-qa-with-dan-schulman-of-american-express/

8.  http://online.wsj.com/news/articles/SB10000872396390443517104577575454164490344

9.  http://www.americanscientist.org/issues/pub/automation-on-the-job

10.  http://www.fastcompany.com/1826869/lost-steve-jobs-tapes

11.  http://www.irma-international.org/viewtitle/12910/

12.  http://www.newyorker.com/magazine/2010/10/04/small-change-3

13.  https://wiki.uiowa.edu/download/attachments/49481240/Virtual_society.pdf

14.  http://www.apa.org/monitor/2012/02/friends.aspx

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Linear Development In Learning Approaches.

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

 

 

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

Arthur M. Langer

 

 

CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-7575-5 (Paperback) International Standard Book Number-13: 978-1-138-23858-9 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com

and the CRC Press Web site at http://www.crcpress.com

 

 

v

Contents

Foreword xi Acknowledgments xiii Author xv IntroductIon xvii

chApter 1 the “rAvell” corporAtIon 1 Introduction 1 A New Approach 3

The Blueprint for Integration 5 Enlisting Support 6 Assessing Progress 7

Resistance in the Ranks 8 Line Management to the Rescue 8 IT Begins to Reflect 9 Defining an Identity for Information Technology 10 Implementing the Integration: A Move toward Trust and Reflection 12 Key Lessons 14

Defining Reflection and Learning for an Organization 14 Working toward a Clear Goal 15 Commitment to Quality 15 Teaching Staff “Not to Know” 16 Transformation of Culture 16

Alignment with Administrative Departments 17 Conclusion 19

 

 

vi Contents

chApter 2 the It dIlemmA 21 Introduction 21 Recent Background 23 IT in the Organizational Context 24 IT and Organizational Structure 24 The Role of IT in Business Strategy 25 Ways of Evaluating IT 27 Executive Knowledge and Management of IT 28 IT: A View from the Top 29

Section 1: Chief Executive Perception of the Role of IT 32 Section 2: Management and Strategic Issues 34 Section 3: Measuring IT Performance and Activities 35 General Results 36

Defining the IT Dilemma 36 Recent Developments in Operational Excellence 38

chApter 3 technology As A vArIAble And responsIve orgAnIzAtIonAl dynAmIsm 41 Introduction 41 Technological Dynamism 41 Responsive Organizational Dynamism 42

Strategic Integration 43 Summary 48

Cultural Assimilation 48 IT Organization Communications with “ Others” 49 Movement of Traditional IT Staff 49 Summary 51

Technology Business Cycle 52 Feasibility 53 Measurement 53 Planning 54 Implementation 55 Evolution 57 Drivers and Supporters 58

Santander versus Citibank 60 Information Technology Roles and Responsibilities 60 Replacement or Outsource 61

chApter 4 orgAnIzAtIonAl leArnIng theorIes And technology 63 Introduction 63 Learning Organizations 72 Communities of Practice 75 Learning Preferences and Experiential Learning 83 Social Discourse and the Use of Language 89

Identity 91 Skills 92

 

 

viiContents

Emotion 92 Linear Development in Learning Approaches 96

chApter 5 mAnAgIng orgAnIzAtIonAl leArnIng And technology 109 The Role of Line Management 109

Line Managers 111 First-Line Managers 111 Supervisor 111

Management Vectors 112 Knowledge Management 116 Ch ange Management 120 Change Management for IT Organizations 123 Social Networks and Information Technology 134

chApter 6 orgAnIzAtIonAl trAnsFormAtIon And the bAlAnced scorecArd 139 Introduction 139 Methods of Ongoing Evaluation 146 Balanced Scorecards and Discourse 156 Knowledge Creation, Culture, and Strategy 158

chApter 7 vIrtuAl teAms And outsourcIng 163 Introduction 163 Status of Virtual Teams 165 Management Considerations 166 Dealing with Multiple Locations 166

Externalization 169 Internalization 171 Combination 171 Socialization 172 Externalization Dynamism 172 Internalization Dynamism 173 Combination Dynamism 173 Socialization Dynamism 173

Dealing with Multiple Locations and Outsourcing 177 Revisiting Social Discourse 178 Identity 179 Skills 180 Emotion 181

chApter 8 synergIstIc unIon oF It And orgAnIzAtIonAl leArnIng 187 Introduction 187 Siemens AG 187

Aftermath 202 ICAP 203

 

 

viii Contents

Five Years Later 224 HTC 225

IT History at HTC 226 Interactions of the CEO 227 The Process 228 Transformation from the Transition 229 Five Years Later 231

Summary 233

chApter 9 FormIng A cyber securIty culture 239 Introduction 239 History 239 Talking to the Board 241 Establishing a Security Culture 241 Understanding What It Means to be Compromised 242 Cyber Security Dynamism and Responsive Organizational Dynamism 242 Cyber Strategic Integration 243 Cyber Cultural Assimilation 245 Summary 246 Organizational Learning and Application Development 246 Cyber Security Risk 247 Risk Responsibility 248 Driver /Supporter Implications 250

chApter 10 dIgItAl trAnsFormAtIon And chAnges In consumer behAvIor 251 Introduction 251 Requirements without Users and without Input 254 Concepts of the S-Curve and Digital Transformation Analysis and Design 258 Organizational Learning and the S-Curve 260 Communities of Practice 261 The IT Leader in the Digital Transformation Era 262 How Technology Disrupts Firms and Industries 264

Dynamism and Digital Disruption 264 Critical Components of “ Digital” Organization 265 Assimilating Digital Technology Operationally and Culturally 267 Conclusion 268

chApter 11 IntegrAtIng generAtIon y employees to AccelerAte competItIve AdvAntAge 269 Introduction 269 The Employment Challenge in the Digital Era 270 Gen Y Population Attributes 272 Advantages of Employing Millennials to Support Digital Transformation 272 Integration of Gen Y with Baby Boomers and Gen X 273

 

 

ixContents

Designing the Digital Enterprise 274 Assimilating Gen Y Talent from Underserved and Socially Excluded Populations 276 Langer Workforce Maturity Arc 277

Theoretical Constructs of the LWMA 278 The LWMA and Action Research 281

Implications for New Pathways for Digital Talent 282 Demographic Shifts in Talent Resources 282 Economic Sustainability 283 Integration and Trust 283

Global Implications for Sources of Talent 284 Conclusion 284

chApter 12 towArd best prActIces 287 Introduction 287 Chief IT Executive 288 Definitions of Maturity Stages and Dimension Variables in the Chief IT Executive Best Practices Arc 297

Maturity Stages 297 Performance Dimensions 298

Chief Executive Officer 299 CIO Direct Reporting to the CEO 305 Outsourcing 306 Centralization versus Decentralization of IT 306 CIO Needs Advanced Degrees 307 Need for Standards 307 Risk Management 307

The CEO Best Practices Technology Arc 313 Definitions of Maturity Stages and Dimension Variables in the CEO Technology Best Practices Arc 314

Maturity Stages 314 Performance Dimensions 315

Middle Management 316 The Middle Management Best Practices Technology Arc 323

Definitions of Maturity Stages and Dimension Variables in the Middle Manager Best Practices Arc 325

Maturity Stages 325 Performance Dimensions 326

Summary 327 Ethics and Maturity 333

chApter 13 conclusIons 339 Introduction 339

glossAry 357 reFerences 363 Index 373

 

 

xi

Foreword

Digital technologies are transforming the global economy. Increasingly, firms and other organizations are assessing their opportunities, develop- ing and delivering products and services, and interacting with custom- ers and other stakeholders digitally. Established companies recognize that digital technologies can help them operate their businesses with greater speed and lower costs and, in many cases, offer their custom- ers opportunities to co-design and co-produce products and services. Many start-up companies use digital technologies to develop new prod- ucts and business models that disrupt the present way of doing busi- ness, taking customers away from firms that cannot change and adapt. In recent years, digital technology and new business models have dis- rupted one industry after another, and these developments are rapidly transforming how people communicate, learn, and work.

Against this backdrop, the third edition of Arthur Langer’ s Information Technology and Organizational Learning is most welcome. For decades, Langer has been studying how firms adapt to new or changing conditions by increasing their ability to incorporate and use advanced information technologies. Most organizations do not adopt new technology easily or readily. Organizational inertia and embed- ded legacy systems are powerful forces working against the adoption of new technology, even when the advantages of improved technology are recognized. Investing in new technology is costly, and it requires

 

 

xii Foreword

aligning technology with business strategies and transforming cor- porate cultures so that organization members use the technology to become more productive.

Information Technology and Organizational Learning addresses these important issues— and much more. There are four features of the new edition that I would like to draw attention to that, I believe, make this a valuable book. First, Langer adopts a behavioral perspective rather than a technical perspective. Instead of simply offering norma- tive advice about technology adoption, he shows how sound learn- ing theory and principles can be used to incorporate technology into the organization. His discussion ranges across the dynamic learning organization, knowledge management, change management, com- munities of practice, and virtual teams. Second, he shows how an organization can move beyond technology alignment to true technol- ogy integration. Part of this process involves redefining the traditional support role of the IT department to a leadership role in which IT helps to drive business strategy through a technology-based learn- ing organization. Third, the book contains case studies that make the material come alive. The book begins with a comprehensive real-life case that sets the stage for the issues to be resolved, and smaller case illustrations are sprinkled throughout the chapters, to make concepts and techniques easily understandable. Lastly, Langer has a wealth of experience that he brings to his book. He spent more than 25 years as an IT consultant and is the founder of the Center for Technology Management at Columbia University, where he directs certificate and executive programs on various aspects of technology innovation and management. He has organized a vast professional network of tech- nology executives whose companies serve as learning laboratories for his students and research. When you read the book, the knowledge and insight gained from these experiences is readily apparent.

If you are an IT professional, Information Technology and Organi­ zational Learning should be required reading. However, anyone who is part of a firm or agency that wants to capitalize on the opportunities provided by digital technology will benefit from reading the book.

Charles C. Snow Professor Emeritus, Penn State University

Co­Editor, Journal of Organization Design

 

 

xiii

Acknowledgments

Many colleagues and clients have provided significant support during the development of the third edition of Information Technology and Organizational Learning.

I owe much to my colleagues at Teachers College, namely, Professor Victoria Marsick and Lyle Yorks, who guided me on many of the the- ories on organizational learning, and Professor Lee Knefelkamp, for her ongoing mentorship on adult learning and developmental theo- ries. Professor David Thomas from the Harvard Business School also provided valuable direction on the complex issues surrounding diver- sity, and its importance in workforce development.

I appreciate the corporate executives who agreed to participate in the studies that allowed me to apply learning theories to actual organizational practices. Stephen McDermott from ICAP provided invaluable input on how chief executive officers (CEOs) can success- fully learn to manage emerging technologies. Dana Deasy, now global chief information officer (CIO) of JP Morgan Chase, contributed enormous information on how corporate CIOs can integrate tech- nology into business strategy. Lynn O’ Connor Vos, CEO of Grey Healthcare, also showed me how technology can produce direct mon- etary returns, especially when the CEO is actively involved.

And, of course, thank you to my wonderful students at Columbia University. They continue to be at the core of my inspiration and love for writing, teaching, and scholarly research.

 

 

xv

Author

Arthur M. Langer, EdD, is professor of professional practice of management and the director of the Center for Technology Management at Columbia University. He is the academic direc- tor of the Executive Masters of Science program in Technology Management, vice chair of faculty and executive advisor to the dean at the School of Professional Studies and is on the faculty of the Department of Organization and Leadership at the Graduate School of Education (Teachers College). He has also served as a member of the Columbia University Faculty Senate. Dr. Langer is the author of Guide to Software Development: Designing & Managing the Life Cycle. 2nd Edition (2016), Strategic IT: Best Practices for Managers and Executives (2013 with Lyle Yorks), Information Technology and Organizational Learning (2011), Analysis and Design of Information Systems (2007), Applied Ecommerce (2002), and The Art of Analysis (1997), and has numerous published articles and papers, relating to digital transformation, service learning for underserved popula- tions, IT organizational integration, mentoring, and staff develop- ment. Dr. Langer consults with corporations and universities on information technology, cyber security, staff development, man- agement transformation, and curriculum development around the Globe. Dr. Langer is also the chairman and founder of Workforce Opportunity Services (www.wforce.org), a non-profit social venture

 

 

xvi Author

that provides scholarships and careers to underserved populations around the world.

Dr. Langer earned a BA in computer science, an MBA in accounting/finance, and a Doctorate of Education from Columbia University.

 

 

xvii

Introduction

Background

Information technology (IT) has become a more significant part of workplace operations, and as a result, information systems person- nel are key to the success of corporate enterprises, especially with the recent effects of the digital revolution on every aspect of business and social life (Bradley & Nolan, 1998; Langer, 1997, 2011; Lipman- Blumen, 1996). This digital revolution is defined as a form of “ dis- ruption.” Indeed, the big question facing many enterprises today is, How can executives anticipate the unexpected threats brought on by technological advances that could devastate their business? This book focuses on the vital role that information and digital technology orga- nizations need to play in the course of organizational development and learning, and on the growing need to integrate technology fully into the processes of workplace organizational learning. Technology personnel have long been criticized for their inability to function as part of the business, and they are often seen as a group outside the corporate norm (Schein, 1992). This is a problem of cultural assimila- tion, and it represents one of the two major fronts that organizations now face in their efforts to gain a grip on the new, growing power of technology, and to be competitive in a global world. The other major

 

 

xviii IntroduCtIon

front concerns the strategic integration of new digital technologies into business line management.

Because technology continues to change at such a rapid pace, the ability of organizations to operate within a new paradigm of dynamic change emphasizes the need to employ action learning as a way to build competitive learning organizations in the twenty-first century. Information Technology and Organizational Learning integrates some of the fundamental issues bearing on IT today with concepts from organizational learning theory, providing comprehensive guidance, based on real-life business experiences and concrete research.

This book also focuses on another aspect of what IT can mean to an organization. IT represents a broadening dimension of business life that affects everything we do inside an organization. This new reality is shaped by the increasing and irreversible dissemination of technology. To maximize the usefulness of its encroaching presence in everyday business affairs, organizations will require an optimal understanding of how to integrate technology into everything they do. To this end, this book seeks to break new ground on how to approach and concep- tualize this salient issue— that is, that the optimization of information and digital technologies is best pursued with a synchronous imple- mentation of organizational learning concepts. Furthermore, these concepts cannot be implemented without utilizing theories of strategic learning. Therefore, this book takes the position that technology liter- acy requires individual and group strategic learning if it is to transform a business into a technology-based learning organization. Technology­ based organizations are defined as those that have implemented a means of successfully integrating technology into their process of organiza- tional learning. Such organizations recognize and experience the real- ity of technology as part of their everyday business function. It is what many organizations are calling “ being digital.”

This book will also examine some of the many existing organi- zational learning theories, and the historical problems that have occurred with companies that have used them, or that have failed to use them. Thus, the introduction of technology into organizations actually provides an opportunity to reassess and reapply many of the past concepts, theories, and practices that have been used to support the importance of organizational learning. It is important, however, not to confuse this message with a reason for promoting organizational

 

 

xixIntroduCtIon

learning, but rather, to understand the seamless nature of the relation- ship between IT and organizational learning. Each needs the other to succeed. Indeed, technology has only served to expose problems that have existed in organizations for decades, e.g., the inability to drive down responsibilities to the operational levels of the organization, and to be more agile with their consumers.

This book is designed to help businesses and individual manag- ers understand and cope with the many issues involved in developing organizational learning programs, and in integrating an important component: their IT and digital organizations. It aims to provide a combination of research case studies, together with existing theories on organizational learning in the workplace. The goal is also to pro- vide researchers and corporate practitioners with a book that allows them to incorporate a growing IT infrastructure with their exist- ing workforce culture. Professional organizations need to integrate IT into their organizational processes to compete effectively in the technology-driven business climate of today. This book responds to the complex and various dilemmas faced by many human resource managers and corporate executives regarding how to actually deal with many marginalized technology personnel who somehow always operate outside the normal flow of the core business.

While the history of IT, as a marginalized organization, is rela- tively short, in comparison to that of other professions, the problems of IT have been consistent since its insertion into business organiza- tions in the early 1960s. Indeed, while technology has changed, the position and valuation of IT have continued to challenge how execu- tives manage it, account for it, and, most important, ultimately value its contributions to the organization. Technology personnel continue to be criticized for their inability to function as part of the business, and they are often seen as outside the business norm. IT employees are frequently stereotyped as “ techies,” and are segregated in such a way that they become isolated from the organization. This book pro- vides a method for integrating IT, and redefining its role in organiza- tions, especially as a partner in formulating and implementing key business strategies that are crucial for the survival of many companies in the new digital age. Rather than provide a long and extensive list of common issues, I have decided it best to uncover the challenges of IT integration and performance through the case study approach.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Question

1.Start Excel. Download and open the workbook named go16_xl_ch04_grader_4g_hw.xlsx, and then save it in your Excel Chapter 4 folder as Lastname_Firstname_4G_Loan_Staff_Form.

 

2.Display the second worksheet named Warehouse Payment Table. In cell B8, enter a PMT function using cell B4 divided by 12 as the rate, cell B3 as the number of payment periods, and cell B2 as the present value of the loan. Display the result as a positive number.

 

3.Create a two-variable data table in the range B8:H16. Set cell B3 as the row input cell, and cell B4 as the column input cell. From the Cell Styles gallery, apply the Currency cell style to the range C9:H16. Select the payment option closest to but less than $10,000 per month for a 120-month loan—cell D16—and format the option with the Note cell style. Save your workbook.

 

4.Display the fourth worksheet named Job Information, select the range A4:C11, and then sort the range by Job Code in ascending order. Create a range named Job_Code using the data in cells A5:A11.

 

5.Display the Staffing Plan worksheet, and then select the range A9:A18. Display the Data Validation dialog box, and validate from a List using the Source =Job_Code.

 

6.Click cell A9, click the list arrow, and then click M-MG. Click cell B9 to make it the active cell, and then insert a VLOOKUP function that will look up the Description of the Job Code in cell A9 using the information in the Job Information worksheet as the table array. After selecting the table array, be sure to press F4 to make it an absolute cell reference. The Description to be looked up is in column 2 of the table array.

 

7.With cell B9 as the active cell, copy the VLOOKUP formula down through cell B18. In cell C9, type 1 as the # of Positions and in cell D9, type Management as the Type.

 

8.In cell E9, insert the VLOOKUP function to look up the Salary of the Job Code in cell A9 by using the information in the Job Information sheet as the table array; the Salary is in column 3 of the table array. Copy the VLOOKUP formula in cell E9 down through cell E18.

 

9.Beginning in cell A10, add these staff positions:
Item # of Positions Type
C-CASH 3 Cashier
C-CSA 1 Customer Service
M-AMG 3 Management

 

10.Delete any unused rows between the last item and the Total row. Sum the Budget Amount column and apply the Total cell style. Save your workbook.

 

11.Display the Bracelet Revenue worksheet. Click cell I5, and then on the Formulas tab, click Trace Precedents. On the ribbon, in the Formula Auditing group, click Error Checking, and then click Edit in Formula Bar. Edit the formula so that the formula is using the Growth Assumption for Beaded Bracelets, not for Crystal Bracelets.

 

12.In the Error Checking dialog box, click Resume. In cell M6, notice the formula is trying to divide by cell L10, which is empty. Click Edit in Formula Bar, change 10 to 9 Ensure that the reference to L9 is an absolute reference, and then in the Error Checking dialog box, click Resume.

 

13.In cell F7, examine the error information, and then click Copy Formula from Above. Examine the error in cell J8, and then click Copy Formula from Left. Click OK. Use Format Painter to copy the format in cell M5 to cell M6. Save your workbook.

 

14.In the sheet tab row, right-click any sheet tab, and then click Select All Sheets. Display the Page Setup dialog box, click the Margins tab, and then under Center on page, click Horizontally. Click the Header/Footer tab, click Custom Footer, and then in the Left section, insert the File Name. Click OK two times. Ungroup the sheets, and then for these three worksheets—Warehouse Payment Table, Staffing Plan, and Bracelet Revenue—set the Orientation to Landscape. Select the Bracelet Revenue sheet, and on the Page Layout tab, set the Scale to 90%. Add the tag New York revenue to the properties.

 

15.Ensure that the worksheets are correctly named and placed in the following order in the workbook: Warehouse Purchase, Warehouse Payment Table, Staffing Plan, Job Information, Revenue. Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

1.Using Expected Value, Is It Economically Better To Make Or Buy The Component? Strategically Thinking, Why Might Management Opt For Other Than The Most Economical Choice?

1) APA format

1.Using Expected Value, Is It Economically Better To Make Or Buy The Component? Strategically Thinking, Why Might Management Opt For Other Than The Most Economical Choice?

2)add references at end

Teloxy Engineering has received a one-time contract to design and build 10,000 units of a new product. During the proposal process, management felt that the new product could be designed and manufactured at a low cost. One of the ingredients necessary to build the product was a small component that could be purchased for $60 in the marketplace, including quantity dis- counts. Accordingly, management budgeted $650,000 for the purchasing and handling of 10,000 components plus scrap.

During the design stage, your engineering team informs you that the final design will require a somewhat higher-grade component that sells for $72 with quantity discounts. The new price is substantially higher than you had budgeted for. This will create a cost overrun.

You meet with your manufacturing team to see if they can manufacture the component at a cheaper price than buying it from the outside. Your manufacturing team informs you that they can produce a maximum of 10,000 units, just enough to fulfill your contract. The setup cost will be $100,000 and the raw material cost is $40 per component. Since Teloxy has never manu- factured this product before, manufacturing expects the following defects:

Percent defective 0 10 20 30 40 Probability of 10 20 30 25 15

occurrence
All defective parts must be removed and repaired at a cost of $120 per part.

  1. Using expected value, is it economically better to make or buy the component?
  2. Strategically thinking, why might management opt for other than the most economical choice?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Powerpoint Assignment – Follow Exactly The Instructions

perform the below instructions to the po2c1women_lastfirst  powerpoint file the other two files will be needed to complete the assignment

Outline and Modifications

Based on the storyboard you created after researching women in STEM on the Internet, you type the outline of your presentation. As you create the outline, you also modify the outline structure.

  • a.Open Outline view.
  • b.Type Name 3 women in STEM as the title for Slide 2.
  • c.Type each of the following as Level 1 bullets for Slide 2: My biology teacherMy computer applications teacherMy math teacher.
  • d.Type Think on a bigger scale as the title for Slide 3. Enter each of the following as Level 1 bullets for Slide 3: National names?, and International names?
  • e.Add this speaker note to Slide 3: These may be hard questions to answer quickly because there are relatively few women in these fields.
  • f.Type Here are some names to get you started as the title for Slide 4.
  • g.Type each of the following as Level 1 bullets for Slide 4: Sally RideChrista McAuliffe.
  • h.Add this speaker note to Slide 4: For different reasons, both of these women were important in the development of the aerospace industry.

Imported Outline

You have an outline on women in STEM that was created in Microsoft Word and also a slide show on that topic. You reuse this content to build your slide show.

  • a.Position the insertion point at the end of the outline after Slide 4.
  • b.Use the Slides from Outline option to insert the p02c1Stem outline.
  • c.Delete Slide 5 and any blank slides.
  • d.Demote the last two bullets on the new Slide 5.
  • e.Click the first bullet on Slide 6. Cut and paste the text after the name and date from the bullet point to the Notes pane. Replace She with Hypatia. Repeat for the remaining two bullets.
  • f.Delete all text after physics for the first bullet of Slide 7. Replace the comma with a period.
  • g.Position the insertion point at the end of the outline.
  • h.Reuse Slides 2 and 3, using the same order, from p02c1Work to add two slides to the end of the presentation.
  • i.Modify the outline structure by reversing slides 8 and 9.

Design

The content of some of the imported slides does not fit well and the font colors are not uniform across all of the slides. You want to adjust the layout and font color to create a well-designed presentation. Then you decide to view a slide show to verify your changes.

  • a.Switch to Normal view. Change the layout of Slide 9 to Blank.
  • b.Check Slides 5–7 to ensure the title placeholder font is Arial Black (Heading) with the color set to Black, Text 2. Check the subtitle font to Arial Body with the color set to Grey 80%, Text 1.
  • c.Use the spelling checker and proofread the presentation.
  • d.View a slide show from the beginning.
  • e.Move Slide 5 to just before Slide 8.

Sections

To facilitate organization of the presentation and moving between the slides, you create sections.

  • a.Add a section before Slide 2 and rename it Quiz.
  • b.Add a section before Slide 5 and rename it History.
  • c.Add a section before Slide 7 and rename it Reasoning.
  • d.Print the outline as directed by your instructor.
  • e.Save and close the file. Based on your instructor’s directions, submit p02c1Women_LastFirst.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

OWASP WEBGOAT

INCS 775 Data Center Security

Summer 2018

 

Lab 1 – OWASP WebGoat

OWASP WebGoat is a deliberately insecure application that allows developers and security

researchers to test vulnerabilities commonly found in Java-based applications that use common

and popular open source components. In this assignment we will be using tools on Kali Linux to

allow exploitation of such vulnerabilities.

1. Download, install, and run the OWASP Broken Web Apps VMware machine.

2. Use a browser on Kali Linux machine to access the WebGoat interface. Login as

userid=guest, password=guest.

3. Make use of the WebScarab proxy to alter HTTP requests as required by the WebGoat

lessons.

4. Try the different Lessons, review provided solutions.

Prepare a report summarizing your activities.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab Assessment Questions & Answers 1. Which Tool, Wireshark Or NetWitness, Provides Information About The Wireless Antenna Strength During A Captured…

Lab Assessment Questions & Answers
1. Which tool, Wireshark or NetWitness, provides information about the wireless antenna strength during a captured transmission?
2. Which tool displays the MAC address and IP address information and allows them to be correlated for a given capture transmission?
3. What is the manufacturer specific ID for the GemTek radio transmitter/receiver?
4. The receiver and/or transmitter address is hard-coded in hardware and cannot be changed: It can always be counted on to correctly identify the device transmitting. True or false?
5. What was the actual web host name to which www.polito.it resolved?
2 | Lab #2 Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com  Student Lab Manual
6. How can one determine that the website www.polito.it is in Italy?
7. What is the IP address for www.polito.it?
8. What destination organization is the owner of record of www.polito.it?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Part 1 Of Set 1 And Set 2

Set 1 :

Textbook :

Principles of Incident Response and Disaster Recovery (2014). Cengage Learning. ISBN: 978-1111138059. Michael E. Whitman, Herbert J. Mattord, Andrew Green.

**NEED 300 WORDS EACH , SHOULD HAVE QUESTION INCLUDED , NEED 3 REFERENCES EACH**

• Module 1 Graded Assignment

From Chapter 1, page 37, Exercise 1.1

• Module 2 Graded Assignment

From Chapter 2, page 81, Exercise 2.2

• Module 3 Graded Assignment

From Chapter 3, page 123, Exercise 3.1, 3.2

• Module 4 Graded Assignment

From Chapter 4, page 156, Exercise 4.1, 4.2, 4.3, 4.4

Set 2 :

***WILL CONFIRM THE TEXTBOOK IN 12 HOURS , DO NOT START SET 2 UNTIL I CONFIRM THE TEXT BOOK***

**NEED 300 WORDS EACH , SHOULD HAVE QUESTION INCLUDED , NEED 3 REFERENCES EACH**

Week 1:

From Chapter 1, page 37, Real World Exercise 1.1

Week 2:

From Chapter 2, page 81, Real World Exercise 2.2

Week 3:

From Chapter 3, page 123, Real World Exercise 3.1 and 3.2

Week 4:

From Chapter 4, page 156, Real World Exercise 4.1, 4.2, 4.3, and 4.4

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel 2019 In Practice – Ch 3 Independent Project 3-4

Q2&Q3

Classic Gardens and Landscapes (CGL)
Revenue for Quarters 2 and 3
Revenue Categories April May June July August September Total
Lawn Maintenance $7,660.13 $7,741.13 $7,886.48 $7,650.23 $7,683.30 $8,094.38 $46,715.63
Tree & Shrubbery $11,819.93 $11,909.48 $12,043.13 $11,803.28 $11,879.78 $12,226.28 $71,681.85
Patio and Furniture $15,192.23 $13,070.48 $12,957.30 $13,039.88 $15,318.23 $16,876.13 $86,454.23
Fountains and Irrigation $4,478.18 $4,708.13 $4,475.25 $5,153.63 $5,514.53 $7,919.55 $32,249.25
Design Consulting $579.38 $585.23 $631.13 $563.18 $584.78 $698.40 $3,642.08
Total Revenue $39,729.83 $38,014.43 $37,993.28 $38,210.18 $40,980.60 $45,814.73 $240,743.03

 

() Print Info

Student Name: Gullickson, Finn

Student ID: D41122036

Username: D41122036 Excel 2019 In Practice – Ch 3 Independent Project 3-4 COURSE NAME BIS155 SEP20 Master | Data Analysis with Spreadsheets with Lab – 11964

Start Date: 09/05/2011:59 PMUS/Mountain Due Date: 09/13/2011:59 PMUS/Mountain End Date: 10/25/2011:59 PMUS/Mountain

Independent Project 3-4 For this project, you create a column chart to illustrate April–September revenue for Classic Gardens and Landscapes. You also build a pie chart sheet to graph the proportion that each category contributes to total revenue. [Student Learning Outcomes 3.1, 3.2, 3.3, 3.4, 3.5, 3.6]

File Needed: ClassicGardens-03.xlsx (Available from the Start File link.) Completed Project File Name: [your name]-ClassicGardens-03.xlsx

Skills Covered in This Project Create a chart object. Size and position a chart object. Edit and format chart elements. Edit the source data for a chart. Build a pie chart sheet. Use texture as fill. Add and format data labels in a chart.

This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

1. Open the ClassicGardens-03.xlsx start file. If the workbook opens in Protected View, click the Enable Editing button so you can modify it. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.

NOTE: If group titles are not visible on your Ribbon in Excel for Mac, click the Excel menu and select Preferences to open the Excel Preferences dialog box. Click the View button and check the Group Titles check box under In Ribbon, Show. Close the Excel Preferences dialog box.

2. Create a Clustered Column chart object for cells A4:G9.

3. Move the chart object so that its top-left corner is at cell A12. Size the bottom of the chart to reach cell H30.

4. Edit the chart title to display CGL Major Sales Revenue and press return. On the second line, type Second and Third Quarters.

SIMnet – Excel 2019 In Practice – Ch 3 Independent Project 3-4 https://devry.simnetonline.com/sp/embed/#pr/5573828

1 of 3 10/23/20, 12:00 PM

 

 

Figure 3-71 Resize the chart by dragging the resize pointer

5. Apply chart Style 14 to the chart.

6. Format the first line and the second line of the chart title to a font size of 20 pt.

7. Apply a 1 pt Black, Text 1 (second column) outline to the chart area.

8. Verify that the chart is still selected. In the highlighted range in the worksheet, drag the resize pointer to remove the Design Consulting data series from the chart (Figure 3-71).

9. Create a 3-D Pie chart sheet for cells A4:A9 and cells H4:H9. Move the chart to its own sheet named Revenue Breakdown. Hint: Use the Move Chart button [Chart Design tab, Location group].

10. Edit the chart title to display Revenue by Category. Change the font size to 32.

11. Select the legend and change the font size to 12.

12. Apply the Woven mat texture fill (first row, fourth column) to the Patio and Furniture slice.

13. Select the pie shape and add data labels to display in the center of each slice.

a. Display the Format Data Labels task pane, choose the Accounting format [Label Options button, Number group], and set 0 decimal places.

b. Change the data label font size to 14 pt and apply bold [Home tab, Font group].

14. Deselect the chart.

15. Save and close the workbook (Figure 3-72).

Figure 3-72 Excel 3-4 completed worksheet and chart

16. Upload and save your project file.

17. Submit project for grading.

SIMnet – Excel 2019 In Practice – Ch 3 Independent Project 3-4 https://devry.simnetonline.com/sp/embed/#pr/5573828

2 of 3 10/23/20, 12:00 PM

 

 

SIMnet – Excel 2019 In Practice – Ch 3 Independent Project 3-4 https://devry.simnetonline.com/sp/embed/#pr/5573828

3 of 3 10/23/20, 12:00 PM

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Cloud Computing

About This eBook

ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site. Many titles include programming code or configuration examples. To

optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.

 

 

Cloud Computing Concepts, Technology & Architecture

Thomas Erl, Zaigham Mahmood, and Ricardo Puttini

Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid

Cape Town • Sydney • Tokyo • Singapore • Mexico City

 

 

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.

The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.

The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:

U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com

For sales outside the United States, please contact:

International Sales international@pearsoned.com

Visit us on the Web: informit.com/ph

The Library of Congress Cataloging-in-Publication data is on file.

Copyright © 2013 Arcitura Education Inc.

All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to (201) 236-3290.

ISBN-13: 978-0-13-338752-0 ISBN-10: 0-13-338752-6

Text printed in the United States on recycled paper at Courier in Westford,

 

 

Massachusetts.

First printing: May 2013

Editor-in-Chief Mark L. Taub

Managing Editor Kristy Hart

Senior Project Editor Betsy Gratner

Copy Editor and Development Editor Maria Lee

Senior Indexer Cheryl Lenser

Proofreaders Maria Lee Williams Woods Publishing

Publishing Coordinator Kim Boedigheimer

Research Assistant Briana Lee

Cover Designer Thomas Erl

Compositor Bumpy Design

Photos Thomas Erl Dominika Sládkovičová

Graphics KK Lui Briana Lee

 

 

Readers can download high-resolution, full-color versions of all this book’s figures at

www.informit.com/title/9780133387520

and

www.servicetechbooks.com/cloud.

 

 

Praise for this Book

“Cloud computing, more than most disciplines in IT, suffers from too much talk and not enough practice. Thomas Erl has written a timely book that condenses the theory and buttresses it with real-world examples that demystify this important technology. An important guidebook for your journey into the cloud.”

—Scott Morrison, Chief Technology Officer, Layer 7 Technologies

“An excellent, extremely well-written, lucid book that provides a comprehensive picture of cloud computing, covering multiple dimensions of the subject. The case studies presented in the book provide a real-world, practical perspective on leveraging cloud computing in an organization. The book covers a wide range of topics, from technology aspects to the business value provided by cloud computing. This is the best, most comprehensive book on the subject—a must-read for any cloud computing practitioner or anyone who wants to get an in-depth picture of cloud computing concepts and practical implementation.”

—Suzanne D’Souza, SOA/BPM Practice Lead, KBACE Technologies

“This book offers a thorough and detailed description of cloud computing concepts, architectures, and technologies. It serves as a great reference for both newcomers and experts and is a must-read for any IT professional interested in cloud computing.”

—Andre Tost, Senior Technical Staff Member, IBM Software Group

“This is a great book on the topic of cloud computing. It is impressive how the content spans from taxonomy, technology, and architectural concepts to important business considerations for cloud adoption. It really does provide a holistic view to this technology paradigm.”

—Kapil Bakshi, Architecture and Strategy, Cisco Systems Inc.

“I have read every book written by Thomas Erl and Cloud Computing is another excellent publication and demonstration of Thomas Erl’s rare ability to take the most complex topics and provide critical core concepts and technical information in a logical and understandable way.”

 

 

—Melanie A. Allison, Principal, Healthcare Technology Practice, Integrated Consulting Services

“Companies looking to migrate applications or infrastructure to the cloud are often misled by buzzwords and industry hype. This work cuts through the hype and provides a detailed look, from investigation to contract to implementation to termination, at what it takes for an organization to engage with cloud service providers. This book really lays out the benefits and struggles with getting a company to an IaaS, PaaS, or SaaS solution.”

—Kevin Davis, Ph.D., Solutions Architect

“Thomas, in his own distinct and erudite style, provides a comprehensive and a definitive book on cloud computing. Just like his previous masterpiece, Service-Oriented Architecture: Concepts, Technology, and Design, this book is sure to engage CxOs, cloud architects, and the developer community involved in delivering software assets on the cloud. Thomas and his authoring team have taken great pains in providing great clarity and detail in documenting cloud architectures, cloud delivery models, cloud governance, and economics of cloud, without forgetting to explain the core of cloud computing that revolves around Internet architecture and virtualization. As a reviewer for this outstanding book, I must admit I have learned quite a lot while reviewing the material. A ‘must have’ book that should adorn everybody’s desk!”

—Vijay Srinivasan, Chief Architect – Technology, Cognizant Technology Solutions

“This book provides comprehensive and descriptive vendor-neutral coverage of cloud computing technology, from both technical and business aspects. It provides a deep-down analysis of cloud architectures and mechanisms that capture the real-world moving parts of cloud platforms. Business aspects are elaborated on to give readers a broader perspective on choosing and defining basic cloud computing business models. Thomas Erl’s Cloud Computing: Concepts, Technology & Architecture is an excellent source of knowledge of fundamental and in- depth coverage of cloud computing.”

—Masykur Marhendra Sukmanegara, Communication Media & Technology, Consulting Workforce Accenture

 

 

“The richness and depth of the topics discussed are incredibly impressive. The depth and breadth of the subject matter are such that a reader could become an expert in a short amount of time.”

—Jamie Ryan, Solutions Architect, Layer 7 Technologies

“Demystification, rationalization, and structuring of implementation approaches have always been strong parts in each and every one of Thomas Erl’s books. This book is no exception. It provides the definitive, essential coverage of cloud computing and, most importantly, presents this content in a very comprehensive manner. Best of all, this book follows the conventions of the previous service technology series titles, making it read like a natural extension of the library. I strongly believe that this will be another bestseller from one of the top-selling IT authors of the past decade.”

—Sergey Popov, Senior Enterprise Architect SOA/Security, Liberty Global International

“A must-read for anyone involved in cloud design and decision making! This insightful book provides in-depth, objective, vendor-neutral coverage of cloud computing concepts, architecture models, and technologies. It will prove very valuable to anyone who needs to gain a solid understanding of how cloud environments work and how to design and migrate solutions to clouds.”

—Gijs in ’t Veld, Chief Architect, Motion10

“A reference book covering a wide range of aspects related to cloud providers and cloud consumers. If you would like to provide or consume a cloud service and need to know how, this is your book. The book has a clear structure to facilitate a good understanding of the various concepts of cloud.”

—Roger Stoffers, Solution Architect

“Cloud computing has been around for a few years, yet there is still a lot of confusion around the term and what it can bring to developers and deployers alike. This book is a great way of finding out what’s behind the cloud, and not in an abstract or high-level manner: It dives into all of the details that you’d need to know in order to plan for developing applications on cloud and what to look for when using applications or

 

 

services hosted on a cloud. There are very few books that manage to capture this level of detail about the evolving cloud paradigm as this one does. It’s a must for architects and developers alike.”

—Dr. Mark Little, Vice President, Red Hat

“This book provides a comprehensive exploration of the concepts and mechanics behind clouds. It’s written for anyone interested in delving into the details of how cloud environments function, how they are architected, and how they can impact business. This is the book for any organization seriously considering adopting cloud computing. It will pave the way to establishing your cloud computing roadmap.”

—Damian Maschek, SOA Architect, Deutsche Bahn

“One of the best books on cloud computing I have ever read. It is complete yet vendor technology neutral and successfully explains the major concepts in a well-structured and disciplined way. It goes through all the definitions and provides many hints for organizations or professionals who are approaching and/or assessing cloud solutions. This book gives a complete list of topics playing fundamental roles in the cloud computing discipline. It goes through a full list of definitions very clearly stated. Diagrams are simple to understand and self-contained. Readers with different skill sets, expertise, and backgrounds will be able to understand the concepts seamlessly.”

—Antonio Bruno, Infrastructure and Estate Manager, UBS AG

“Cloud Computing: Concepts, Technology & Architecture is a comprehensive book that focuses on what cloud computing is really all about…. This book will become the foundation on which many organizations will build successful cloud adoption projects. It is a must- read reference for both IT infrastructure and application architects interested in cloud computing or involved in cloud adoption projects. It contains extremely useful and comprehensive information for those who need to build cloud-based architectures or need to explain it to customers thinking about adopting cloud computing technology in their organization.”

—Johan Kumps, SOA Architect, RealDolmen

“This book defines the basic terminology and patterns for the topic—a

 

 

useful reference for the cloud practitioner. Concepts from multitenancy to hypervisor are presented in a succinct and clear manner. The underlying case studies provide wonderful real-worldness.”

—Dr. Thomas Rischbeck, Principal Architect, ipt

“The book provides a good foundation to cloud services and issues in cloud service design. Chapters highlight key issues that need to be considered in learning how to think in cloud technology terms; this is highly important in today’s business and technology environments where cloud computing plays a central role in connecting user services with virtualized resources and applications.”

—Mark Skilton, Director, Office of Strategy and Technology, Global Infrastructure Services, Capgemini

“The book is well organized and covers basic concepts, technologies, and business models about cloud computing. It defines and explains a comprehensive list of terminologies and glossaries about cloud computing so cloud computing experts can speak and communicate with the same set of standardized language. The book is easy to understand and consistent with early published books from Thomas Erl…. It is a must-read for both beginners and experienced professionals.”

—Jian “Jeff” Zhong, Chief Technology Officer (Acting) and Chief Architect for SOA and Cloud Computing, Futrend Technology Inc.

“Students of the related specialties can fulfill their educational process with very easily understood materials that are broadly illustrated and clearly described. Professors of different disciplines, from business analysis to IT implementation—even legal and financial monitoring— can use the book as an on-table lecturing manual. IT specialists of all ranks and fields of application will find the book as a practical and useful support for sketching solutions unbound to any particular vendor or brand.”

—Alexander Gromoff, Director of Science & Education, Center of Information Control Technologies, Chairman of BPM Chair in Business Informatics Department, National Research University

“Higher School of Economics”

“Cloud Computing: Concepts, Technology & Architecture is a

 

 

comprehensive compendium of all the relevant information about the transformative cloud technology. Erl’s latest title concisely and clearly illustrates the origins and positioning of the cloud paradigm as the next- generation computing model. All the chapters are carefully written and arranged in an easy-to-understand manner. This book will be immeasurably beneficial for business and IT professionals. It is set to shake up and help organize the world of cloud computing.”

—Pethuru Raj, Ph.D., Enterprise Architecture Consultant, Wipro

“A cloud computing book that will stand out and survive the test of time, even in one of the fastest evolving areas of technology. This book does a great job breaking down the high level of complexity of cloud computing into easy-to-understand pieces. It goes beyond the basic, often repeated, explanations. It examines the fundamental concepts and the components, as well as the mechanisms and architectures that make up cloud computing environments. The approach gradually builds the reader’s understanding from the ground up. “In a rapidly evolving area like cloud computing, it’s easy to focus on details and miss the big picture. The focus on concepts and architectural models instead of vendor-specific details allows readers to quickly gain essential knowledge of complex topics. The concepts come together in the last part of the book, which should be required reading for any decision maker evaluating when and how to start a transition to cloud computing. Its thorough, comprehensive coverage of fundamentals and advanced topics makes the book a valuable resource to keep on your desk or your eBook reader, regardless if you’re new to the topic or you already have cloud experience.

“I highly recommend the book to those looking to implement or evaluate cloud environments, or simply looking to educate themselves in a field that will shape IT over the next decade.”

—Christoph Schittko, Principal Technology Strategist & Cloud Solution Director, Microsoft

“Cloud Computing: Concepts, Technology & Architecture is an excellent resource for IT professionals and managers who want to learn and understand cloud computing, and who need to select or build cloud systems and solutions. It lays the foundation for cloud concepts, models,

 

 

technologies, and mechanisms. As the book is vendor-neutral, it will remain valid for many years. We will recommend this book to Oracle customers, partners, and users for their journey toward cloud computing. This book has the potential to become the basis for a cloud computing manifesto, comparable to what was accomplished with the SOA manifesto.” —Jürgen Kress, Fusion Middleware Partner Adoption, Oracle EMEA

 

 

To my family and friends —Thomas Erl

To Zoya, Hanya, and Ozair with love —Zaigham Mahmood

To Silvia, Luiza, Isadora, and Lucas —Ricardo Puttini

 

 

Contents at a Glance

Foreword

Chapter 1: Introduction

Chapter 2: Case Study Background

Part I: Fundamental Cloud Computing

Chapter 3: Understanding Cloud Computing

Chapter 4: Fundamental Concepts and Models

Chapter 5: Cloud-Enabling Technology

Chapter 6: Fundamental Cloud Security

Part II: Cloud Computing Mechanisms

Chapter 7: Cloud Infrastructure Mechanisms

Chapter 8: Specialized Cloud Mechanisms

Chapter 9: Cloud Management Mechanisms

Chapter 10: Cloud Security Mechanisms

Part III: Cloud Computing Architecture

Chapter 11: Fundamental Cloud Architectures

Chapter 12: Advanced Cloud Architectures

Chapter 13: Specialized Cloud Architectures

Part IV: Working with Clouds

Chapter 14: Cloud Delivery Model Considerations

Chapter 15: Cost Metrics and Pricing Models

Chapter 16: Service Quality Metrics and SLAs

 

 

Part V: Appendices

Appendix A: Case Study Conclusions

Appendix B: Industry Standards Organizations

Appendix C: Mapping Mechanisms to Characteristics

Appendix D: Data Center Facilities (TIA-942)

Appendix E: Emerging Technologies

Appendix F: Cloud Provisioning Contracts

Appendix G: Cloud Business Case Template

About the Authors

About the Foreword Contributor

About the Contributors

Index

 

 

Contents

Foreword

Acknowledgments

Chapter 1: Introduction 1.1 Objectives of This Book 1.2 What This Book Does Not Cover 1.3 Who This Book Is For 1.4 How This Book Is Organized

Part I: Fundamental Cloud Computing Chapter 3: Understanding Cloud Computing Chapter 4: Fundamental Concepts and Models Chapter 5: Cloud-Enabling Technology Chapter 6: Fundamental Cloud Security

Part II: Cloud Computing Mechanisms Chapter 7: Cloud Infrastructure Mechanisms Chapter 8: Specialized Cloud Mechanisms Chapter 9: Cloud Management Mechanisms Chapter 10: Cloud Security Mechanisms

Part III: Cloud Computing Architecture Chapter 11: Fundamental Cloud Architectures Chapter 12: Advanced Cloud Architectures Chapter 13: Specialized Cloud Architectures

Part IV: Working with Clouds Chapter 14: Cloud Delivery Model Considerations Chapter 15: Cost Metrics and Pricing Models Chapter 16: Service Quality Metrics and SLAs

Part V: Appendices Appendix A: Case Study Conclusions Appendix B: Industry Standards Organizations

 

 

Appendix C: Mapping Mechanisms to Characteristics Appendix D: Data Center Facilities (TIA-942) Appendix E: Emerging Technologies Appendix F: Cloud Provisioning Contracts Appendix G: Cloud Business Case Template

1.5 Conventions Symbols and Figures Summary of Key Points

1.6 Additional Information Updates, Errata, and Resources (www.servicetechbooks.com) Referenced Specifications (www.servicetechspecs.com) The Service Technology Magazine (www.servicetechmag.com) International Service Technology Symposium (www.servicetechsymposium.com) What Is Cloud? (www.whatiscloud.com) What Is REST? (www.whatisrest.com) Cloud Computing Design Patterns (www.cloudpatterns.org) Service-Orientation (www.serviceorientation.com) CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com) SOASchool.com® SOA Certified (SOACP) Professional (www.soaschool.com) Notification Service

Chapter 2: Case Study Background 2.1 Case Study #1: ATN

Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy

2.2 Case Study #2: DTGOV Technical Infrastructure and Environment Business Goals and New Strategy

 

 

Roadmap and Implementation Strategy 2.3 Case Study #3: Innovartus Technologies Inc.

Technical Infrastructure and Environment Business Goals and Strategy Roadmap and Implementation Strategy

Part I: Fundamental Cloud Computing

Chapter 3: Understanding Cloud Computing 3.1 Origins and Influences

A Brief History Definitions Business Drivers Capacity Planning Cost Reduction Organizational Agility

Technology Innovations Clustering Grid Computing Virtualization Technology Innovations vs. Enabling Technologies

3.2 Basic Concepts and Terminology Cloud IT Resource On-Premise Cloud Consumers and Cloud Providers Scaling Horizontal Scaling Vertical Scaling

Cloud Service Cloud Service Consumer

3.3 Goals and Benefits

 

 

Reduced Investments and Proportional Costs Increased Scalability Increased Availability and Reliability

3.4 Risks and Challenges Increased Security Vulnerabilities Reduced Operational Governance Control Limited Portability Between Cloud Providers Multi-Regional Compliance and Legal Issues

Chapter 4: Fundamental Concepts and Models 4.1 Roles and Boundaries

Cloud Provider Cloud Consumer Cloud Service Owner Cloud Resource Administrator Additional Roles Organizational Boundary Trust Boundary

4.2 Cloud Characteristics On-Demand Usage Ubiquitous Access Multitenancy (and Resource Pooling) Elasticity Measured Usage Resiliency

4.3 Cloud Delivery Models Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) Software-as-a-Service (SaaS) Comparing Cloud Delivery Models Combining Cloud Delivery Models IaaS + PaaS

 

 

IaaS + PaaS + SaaS 4.4 Cloud Deployment Models

Public Clouds Community Clouds Private Clouds Hybrid Clouds Other Cloud Deployment Models

Chapter 5: Cloud-Enabling Technology 5.1 Broadband Networks and Internet Architecture

Internet Service Providers (ISPs) Connectionless Packet Switching (Datagram Networks) Router-Based Interconnectivity Physical Network Transport Layer Protocol Application Layer Protocol

Technical and Business Considerations Connectivity Issues Network Bandwidth and Latency Issues Cloud Carrier and Cloud Provider Selection

5.2 Data Center Technology Virtualization Standardization and Modularity Automation Remote Operation and Management High Availability Security-Aware Design, Operation, and Management Facilities Computing Hardware Storage Hardware Network Hardware Carrier and External Networks Interconnection

 

 

Web-Tier Load Balancing and Acceleration LAN Fabric SAN Fabric NAS Gateways

Other Considerations 5.3 Virtualization Technology

Hardware Independence Server Consolidation Resource Replication Operating System-Based Virtualization Hardware-Based Virtualization Virtualization Management Other Considerations

5.4 Web Technology Basic Web Technology Web Applications

5.5 Multitenant Technology 5.6 Service Technology

Web Services REST Services Service Agents Service Middleware

5.7 Case Study Example

Chapter 6: Fundamental Cloud Security 6.1 Basic Terms and Concepts

Confidentiality Integrity Authenticity Availability Threat Vulnerability

 

 

Risk Security Controls Security Mechanisms Security Policies

6.2 Threat Agents Anonymous Attacker Malicious Service Agent Trusted Attacker Malicious Insider

6.3 Cloud Security Threats Traffic Eavesdropping Malicious Intermediary Denial of Service Insufficient Authorization Virtualization Attack Overlapping Trust Boundaries

6.4 Additional Considerations Flawed Implementations Security Policy Disparity Contracts Risk Management

6.5 Case Study Example

Part II: Cloud Computing Mechanisms

Chapter 7: Cloud Infrastructure Mechanisms 7.1 Logical Network Perimeter

Case Study Example 7.2 Virtual Server

Case Study Example 7.3 Cloud Storage Device

Cloud Storage Levels

 

 

Network Storage Interfaces Object Storage Interfaces Database Storage Interfaces Relational Data Storage Non-Relational Data Storage

Case Study Example 7.4 Cloud Usage Monitor

Monitoring Agent Resource Agent Polling Agent Case Study Example

7.5 Resource Replication Case Study Example

7.6 Ready-Made Environment Case Study Example

Chapter 8: Specialized Cloud Mechanisms 8.1 Automated Scaling Listener

Case Study Example 8.2 Load Balancer

Case Study Example 8.3 SLA Monitor

Case Study Example SLA Monitor Polling Agent SLA Monitoring Agent

8.4 Pay-Per-Use Monitor Case Study Example

8.5 Audit Monitor Case Study Example

8.6 Failover System Active-Active Active-Passive

 

 

Case Study Example 8.7 Hypervisor

Case Study Example 8.8 Resource Cluster

Case Study Example 8.9 Multi-Device Broker

Case Study Example 8.10 State Management Database

Case Study Example

Chapter 9: Cloud Management Mechanisms 9.1 Remote Administration System

Case Study Example 9.2 Resource Management System

Case Study Example 9.3 SLA Management System

Case Study Example 9.4 Billing Management System

Case Study Example

Chapter 10: Cloud Security Mechanisms 10.1 Encryption

Symmetric Encryption Asymmetric Encryption Case Study Example

10.2 Hashing Case Study Example

10.3 Digital Signature Case Study Example

10.4 Public Key Infrastructure (PKI) Case Study Example

10.5 Identity and Access Management (IAM)

 

 

Case Study Example 10.6 Single Sign-On (SSO)

Case Study Example 10.7 Cloud-Based Security Groups

Case Study Example 10.8 Hardened Virtual Server Images

Case Study Example

Part III: Cloud Computing Architecture

Chapter 11: Fundamental Cloud Architectures 11.1 Workload Distribution Architecture 11.2 Resource Pooling Architecture 11.3 Dynamic Scalability Architecture 11.4 Elastic Resource Capacity Architecture 11.5 Service Load Balancing Architecture 11.6 Cloud Bursting Architecture 11.7 Elastic Disk Provisioning Architecture 11.8 Redundant Storage Architecture 11.9 Case Study Example

Chapter 12: Advanced Cloud Architectures 12.1 Hypervisor Clustering Architecture 12.2 Load Balanced Virtual Server Instances Architecture 12.3 Non-Disruptive Service Relocation Architecture 12.4 Zero Downtime Architecture 12.5 Cloud Balancing Architecture 12.6 Resource Reservation Architecture 12.7 Dynamic Failure Detection and Recovery Architecture 12.8 Bare-Metal Provisioning Architecture 12.9 Rapid Provisioning Architecture 12.10 Storage Workload Management Architecture

 

 

12.11 Case Study Example

Chapter 13: Specialized Cloud Architectures 13.1 Direct I/O Access Architecture 13.2 Direct LUN Access Architecture 13.3 Dynamic Data Normalization Architecture 13.4 Elastic Network Capacity Architecture 13.5 Cross-Storage Device Vertical Tiering Architecture 13.6 Intra-Storage Device Vertical Data Tiering Architecture 13.7 Load Balanced Virtual Switches Architecture 13.8 Multipath Resource Access Architecture 13.9 Persistent Virtual Network Configuration Architecture 13.10 Redundant Physical Connection for Virtual Servers Architecture 13.11 Storage Maintenance Window Architecture

Part IV: Working with Clouds

Chapter 14: Cloud Delivery Model Considerations 14.1 Cloud Delivery Models: The Cloud Provider Perspective

Building IaaS Environments Data Centers Scalability and Reliability Monitoring Security

Equipping PaaS Environments Scalability and Reliability Monitoring Security

Optimizing SaaS Environments Security

14.2 Cloud Delivery Models: The Cloud Consumer Perspective Working with IaaS Environments IT Resource Provisioning Considerations

 

 

Working with PaaS Environments IT Resource Provisioning Considerations

Working with SaaS Services 14.3 Case Study Example

Chapter 15: Cost Metrics and Pricing Models 15.1 Business Cost Metrics

Up-Front and On-Going Costs Additional Costs Case Study Example Product Catalog Browser On-Premise Up-Front Costs On-Premise On-Going Costs Cloud-Based Up-Front Costs Cloud-Based On-Going Costs

Client Database On-Premise Up-Front Costs On-Premise On-Going Costs Cloud-Based Up-Front Costs Cloud-Based On-Going Costs

15.2 Cloud Usage Cost Metrics Network Usage Inbound Network Usage Metric Outbound Network Usage Metric Intra-Cloud WAN Usage Metric

Server Usage On-Demand Virtual Machine Instance Allocation Metric Reserved Virtual Machine Instance Allocation Metric

Cloud Storage Device Usage On-Demand Storage Space Allocation Metric I/O Data Transferred Metric

Cloud Service Usage

 

 

Application Subscription Duration Metric Number of Nominated Users Metric Number of Transactions Users Metric

15.3 Cost Management Considerations Pricing Models Additional Considerations Case Study Example Virtual Server On-Demand Instance Allocation Virtual Server Reserved Instance Allocation Cloud Storage Device WAN Traffic

Chapter 16: Service Quality Metrics and SLAs 16.1 Service Quality Metrics

Service Availability Metrics Availability Rate Metric Outage Duration Metric

Service Reliability Metrics Mean-Time Between Failures (MTBF) Metric Reliability Rate Metric

Service Performance Metrics Network Capacity Metric Storage Device Capacity Metric Server Capacity Metric Web Application Capacity Metric Instance Starting Time Metric Response Time Metric Completion Time Metric

Service Scalability Metrics Storage Scalability (Horizontal) Metric Server Scalability (Horizontal) Metric Server Scalability (Vertical) Metric

 

 

Service Resiliency Metrics Mean-Time to Switchover (MTSO) Metric Mean-Time System Recovery (MTSR) Metric

16.2 Case Study Example 16.3 SLA Guidelines 16.4 Case Study Example

Scope and Applicability Service Quality Guarantees Definitions Usage of Financial Credits SLA Exclusions

Part V: Appendices

Appendix A: Case Study Conclusions

A.1 ATN A.2 DTGOV A.3 Innovartus

Appendix B: Industry Standards Organizations

B.1 National Institute of Standards and Technology (NIST) B.2 Cloud Security Alliance (CSA) B.3 Distributed Management Task Force (DMTF) B.4 Storage Networking Industry Association (SNIA) B.5 Organization for the Advancement of Structured Information Standards (OASIS) B.6 The Open Group B.7 Open Cloud Consortium (OCC) B.8 European Telecommunications Standards Institute (ETSI) B.9 Telecommunications Industry Association (TIA) B.10 Liberty Alliance B.11 Open Grid Forum (OGF)

 

 

Appendix C: Mapping Mechanisms to Characteristics

Appendix D: Data Center Facilities (TIA-942)

D.1 Primary Rooms Electrical Room Mechanical Room Storage and Staging Offices, Operations Center, and Support Telecommunications Entrance Computer Room

D.2 Environmental Controls External Electrical Power Provider Interconnection Power Distribution Uninterruptible Power Source (UPS) Power Engine-Generator

D.3 Infrastructure Redundancy Summary

Appendix E: Emerging Technologies

E.1 Autonomic Computing E.2 Grid Computing

Service Grids

Appendix F: Cloud Provisioning Contracts

F.1 Cloud Provisioning Contract Structure Terms of Service Service Usage Policy Security and Privacy Policy Warranties and Liabilities Rights and Responsibilities Termination and Renewal

Specifications and SLAs Pricing and Billing Other Issues

 

 

Legal and Compliance Issues Auditability and Accountability Changes in the Contract Terms and Conditions

F.2 Cloud Provider Selection Guidelines Cloud Provider Viability

Appendix G: Cloud Business Case Template

G.1 Business Case Identification G.2 Business Needs G.3 Target Cloud Environment G.4 Technical Issues G.5 Economic Factors

About the Authors Thomas Erl Zaigham Mahmood Ricardo Puttini

About the Foreword Contributor Pamela J. Wise-Martinez, MSc

About the Contributors Gustavo Azzolin, BSc, MSc Amin Naserpour Vinícius Pacheco, MSc Matthias Ziegler

Index

 

 

Foreword by Pamela J. Wise-Martinez

The idea of cloud computing isn’t new, or overly complicated from a technology resources and internetworking perspective. What’s new is the growth and maturity of cloud computing methods, and strategies that enable the goals of business agility. Looking back, the phrase “utility computing” didn’t captivate or create the stir in the information industry as the term “cloud computing” has in recent years. Nevertheless, appreciation of readily available resources has arrived and the utilitarian or servicing features are what are at the heart of outsourcing the access of information technology resources and services. In this light, cloud computing represents a flexible, cost-effective, and proven delivery platform for business and consumer information services over the Internet. Cloud computing has become an industry game changer as businesses and information technology leaders realize the potential in combining and sharing computing resources as opposed to building and maintaining them. There’s seemingly no shortage of views regarding the benefits of cloud computing nor is there a shortage of vendors willing to offer services in either open source or promising commercial solutions. Beyond the hype, there are many aspects of the cloud that have earned new consideration due to their increased service capability and potential efficiencies. The ability to demonstrate transforming results in cloud computing to resolve traditional business problems using information technology management best practices now exists. In the case of economic impacts, the principle of pay-as-you-go and computer agnostic services are concepts ready for prime time. We can measure performance as well as calculate the economic and environmental effects of cloud computing today. The architectural change from client-server to service orientation led to an evolution of composable and reusable code; though the practice had been around for many years, it is now the de facto approach used to lower cost and identify best practices and patterns for increasing business agility. This has advanced the computer software industry’s design methods, components, and engineering. Comparatively, the wide acceptance and adoption of cloud computing is revolutionizing information and technology resource management. We now have the ability to outsource hardware and software capabilities on a large-scale to fulfill end-to-end business automation requirements. Marks and Lozano understood this emergence and the need for better software design: “…we now have the ability to collect, transport, process, store, and access data nearly

 

 

anywhere in nearly arbitrary volume.” The limitations depend largely on how “cloudy” or cloud-aware the service/component is, and hence the need for better software architecture. (Eric A. Marks and Roberto Lozano [Executive Guide to Cloud Computing]). The reusable evolution through service architecture reinforces a focus on business objectives as opposed to the number of computing platforms to support. As a viable resource management alternative, cloud computing is fundamentally changing the way we think about computing solutions in retail, education, and public sectors. The use of cloud computing architecture and standards are driving unique ways in which computing solutions are delivered, as well as platform diversity to meet bottom-line business objectives. Thomas Erl’s body of work on service technology guided the technology industry through eloquent illustrations and literature over the past decade. Thomas’ brilliant efforts on principles, concepts, patterns, and expressions gave the information technology community an evolved software architecture approach that now forms a foundation for cloud computing goals to be successfully fulfilled in practice. This is a key assertion, as cloud computing is no longer a far-reaching concept of the future, but rather a dominant information technology service option and resource delivery presence. Thomas’ Cloud Computing: Concepts, Technology & Architecture takes the industry beyond the definitions of cloud computing and juxtaposes virtualization, grid, and sustainment strategies as contrasted in day to day operations. Thomas and his team of authors take the reader from beginning to end with the essential elements of cloud computing, its history, innovation, and demand. Through case studies and architectural models they articulate service requirements, infrastructure, security, and outsourcing of salient computing resources. Thomas again enlightens the industry with poignant analysis and reliable architecture-driven practices and principles. No matter the level of interest or experience, the reader will find clear value in this in-depth, vendor-neutral study of cloud computing. Pamela J. Wise-Martinez, Inventor and Chief Architect Department of Energy, National Nuclear Security Administration (Disclaimer: The views expressed are the personal views of the author and are not intended to reflect either the views of the U.S. Government, the U.S. Department of Energy, or the National Nuclear Security Administration.)

 

 

Acknowledgments

In alphabetical order by last name: • Ahmed Aamer, AlFaisaliah Group • Randy Adkins, Modus21 • Melanie Allison, Integrated Consulting Services • Gabriela Inacio Alves, University of Brasilia • Marcelo Ancelmo, IBM Rational Software Services • Kapil Bakshi, Cisco Systems • Toufic Boubez, Metafor Software • Antonio Bruno, UBS AG • Dr. Paul Buhler, Modus21 • Pethuru Raj Cheliah, Wipro • Kevin Davis, Ph.D. • Suzanne D’Souza, KBACE Technologies • Alexander Gromoff, Center of Information Control Technologies • Chris Haddad, WSO2 • Richard Hill, University of Derby • Michaela Iorga, Ph.D. • Johan Kumps, RealDolmen • Gijs in ’t Veld, Motion10 • Masykur Marhendra, Consulting Workforce Accenture • Damian Maschek, Deutshe Bahn • Claynor Mazzarolo, IBTI • Steve Millidge, C2B2 • Jorge Minguez, Thales Deutschland • Scott Morrison, Layer 7 • Amin Naserpour, HP • Vicente Navarro, European Space Agency • Laura Olson, IBM WebSphere • Tony Pallas, Intel

 

 

• Cesare Pautasso, University of Lugano • Sergey Popov, Liberty Global International • Olivier Poupeney, Dreamface Interactive • Alex Rankov, EMC • Dan Rosanova, West Monroe Partners • Jaime Ryan, Layer 7 • Filippos Santas, Credit Suisse • Christoph Schittko, Microsoft • Guido Schmutz, Trivadis • Mark Skilton, Capgemini • Gary Smith, CloudComputingArchitect.com • Vijay Srinivasan, Cognizant • Daniel Starcevich, Raytheon • Roger Stoffers, HP • Andre Toffanello, IBTI • Andre Tost, IBM Software Group • Bernd Trops, talend • Clemens Utschig, Boehringer Ingelheim Pharma • Ignaz Wanders, Archimiddle • Philip Wik, Redflex • Jorge Williams, Rackspace • Dr. Johannes Maria Zaha • Jeff Zhong, Futrend Technologies

Special thanks to the CloudSchool.com research and development team that produced the CCP course modules upon which this book is based.

 

 

Chapter 1. Introduction

1.1 Objectives of This Book 1.2 What This Book Does Not Cover 1.3 Who This Book Is For 1.4 How This Book Is Organized 1.5 Conventions 1.6 Additional Information

The past couple of decades saw the business-centric concept of outsourcing services and the technology-centric notion of utility computing evolve along relatively parallel streams. When they finally met to form a technology landscape with a compelling business case and seismic impacts on the IT industry as a whole, it became evident that what resultantly was termed and branded as “cloud computing” was more than just another IT trend. It had become an opportunity to further align and advance the goals of the business with the capabilities of technology.

 

 

Those who understand this opportunity can seize it to leverage proven and mature components of cloud platforms to not only fulfill existing strategic business goals, but to even inspire businesses to set new objectives and directions based on the extent to which cloud-driven innovation can further help optimize business operations. The first step to succeeding is education. Cloud computing adoption is not trivial. The cloud computing marketplace is unregulated. And, not all products and technologies branded with “cloud” are, in fact, sufficiently mature to realize or even supportive of realizing actual cloud computing benefits. To add to the confusion, there are different definitions and interpretations of cloud-based models and frameworks floating around IT literature and the IT media space, which leads to different IT professionals acquiring different types of cloud computing expertise. And then, of course, there is the fact that cloud computing is, at its essence, a form of service provisioning. As with any type of service we intend to hire or outsource (IT-related or otherwise), it is commonly understood that we will be confronted with a marketplace comprised of service providers of varying quality and reliability. Some may offer attractive rates and terms, but may have unproven business histories or highly proprietary environments. Others may have a solid business background, but may demand higher rates and less flexible terms. Others yet, may simply be insincere or temporary business ventures that unexpectedly disappear or are acquired within a short period of time. Back to the importance of getting educated. There is no greater danger to a business than approaching cloud computing adoption with ignorance. The magnitude of a failed adoption effort not only correspondingly impacts IT departments, but can actually regress a business to a point where it finds itself steps behind from where it was prior to the adoption—and, perhaps, even more steps behind competitors that have been successful at achieving their goals in the meantime. Cloud computing has much to offer but its roadmap is riddled with pitfalls, ambiguities, and mistruths. The best way to navigate this landscape is to chart each part of the journey by making educated decisions about how and to what extent your project should proceed. The scope of an adoption is equally important to its approach, and both of these aspects need to be determined by business requirements. Not by a product vendor, not by a cloud vendor, and not by self-proclaimed cloud experts. Your organization’s business goals must be fulfilled in a concrete and measurable manner with each completed phase of the adoption. This validates your scope, your approach, and the overall direction of

 

 

the project. In other words, it keeps your project aligned. Gaining a vendor-neutral understanding of cloud computing from an industry perspective empowers you with the clarity necessary to determine what is factually cloud-related and what is not, as well as what is relevant to your business requirements and what is not. With this information you can establish criteria that will allow you to filter out the parts of the cloud computing product and service provider marketplaces to focus on what has the most potential to help you and your business to succeed. We developed this book to assist you with this goal. —Thomas Erl

1.1. Objectives of This Book This book is the result of more than two years of research and analysis of the commercial cloud computing industry, cloud computing vendor platforms, and further innovation and contributions made by cloud computing industry standards organizations and practitioners. The purpose of this book is to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, and technology mechanisms and architectures. The resulting chapters establish concrete, academic coverage of fundamental aspects of cloud computing concepts and technologies. The range of topics covered is documented using vendor-neutral terms and descriptions, carefully defined to ensure full alignment with the cloud computing industry as a whole.

1.2. What This Book Does Not Cover Due to the vendor-neutral basis of this book, it does not contain any significant coverage of cloud computing vendor products, services, or technologies. This book is complementary to other titles that provide product-specific coverage and to vendor product literature itself. If you are new to the commercial cloud computing landscape, you are encouraged to use this book as a starting point before proceeding to books and courses that are proprietary to vendor product lines.

1.3. Who This Book Is For This book is aimed at the following target audience:

• IT practitioners and professionals who require vendor-neutral coverage of cloud computing technologies, concepts, mechanisms, and models

 

 

• IT managers and decision makers who seek clarity regarding the business and technological implications of cloud computing • professors and students and educational institutions that require well- researched and well-defined academic coverage of fundamental cloud computing topics • business managers who need to assess the potential economic gains and viability of adopting cloud computing resources • technology architects and developers who want to understand the different moving parts that comprise contemporary cloud platforms

1.4. How This Book Is Organized The book begins with Chapters 1 and 2 providing introductory content and background information for the case studies. All subsequent chapters are organized into the following parts:

• Part I: Fundamental Cloud Computing • Part II: Cloud Computing Mechanisms • Part III: Cloud Computing Architecture • Part IV: Working with Clouds • Part V: Appendices

Part I: Fundamental Cloud Computing The four chapters in this part cover introductory topics in preparation for all subsequent chapters. Note that Chapters 3 and 4 do not contain case study content. Chapter 3: Understanding Cloud Computing

Following a brief history of cloud computing and a discussion of business drivers and technology innovations, basic terminology and concepts are introduced, along with descriptions of common benefits and challenges of cloud computing adoption. Chapter 4: Fundamental Concepts and Models

Cloud delivery and cloud deployment models are discussed in detail, following sections that establish common cloud characteristics and roles and boundaries. Chapter 5: Cloud-Enabling Technology

Contemporary technologies that realize modern-day cloud computing platforms and innovations are discussed, including data centers, virtualization, and Web-

 

 

based technologies. Chapter 6: Fundamental Cloud Security

Security topics and concepts relevant and distinct to cloud computing are introduced, including descriptions of common cloud security threats and attacks.

Part II: Cloud Computing Mechanisms Technology mechanisms represent well-defined IT artifacts that are established within an IT industry and commonly distinct to a certain computing model or platform. The technology-centric nature of cloud computing requires the establishment of a formal level of mechanisms to be able to explore how solutions can be assembled via different combinations of mechanism implementations. This part formally documents 20 technology mechanisms that are used within cloud environments to enable generic and specialized forms of functionality. Each mechanism description is accompanied by a case study example that demonstrates its usage. The utilization of the mechanisms is further explored throughout the technology architectures covered in Part III. Chapter 7: Cloud Infrastructure Mechanisms

Technology mechanisms foundational to cloud platforms are covered, including Logical Network Perimeter, Virtual Server, Cloud Storage Device, Cloud Usage Monitor, Resource Replication, and Ready-Made Environment. Chapter 8: Specialized Cloud Mechanisms

A range of specialized technology mechanisms is described, including Automated Scaling Listener, Load Balancer, SLA Monitor, Pay-Per-Use Monitor, Audit Monitor, Failover System, Hypervisor, Resource Cluster, Multi- Device Broker, and State Management Database. Chapter 9: Cloud Management Mechanisms

Mechanisms that enable the hands-on administration and management of cloud- based IT resources are explained, including Remote Administration System, Resource Management System, SLA Management System, and Billing Management System. Chapter 10: Cloud Security Mechanisms

Security mechanisms that can be used to counter and prevent the threats described in Chapter 6 are covered, including Encryption, Hashing, Digital Signatures, Public Key Infrastructures (PKI), Identity and Access Management

 

 

(IAM) Systems, Single Sign-On (SSO), Cloud-Based Security Groups, and Hardened Virtual Server Images.

Part III: Cloud Computing Architecture Technology architecture within the realm of cloud computing introduces requirements and considerations that manifest themselves in broadly scoped architectural layers and numerous distinct architectural models. This set of chapters builds upon the coverage of cloud computing mechanisms from Part II by formally documenting 29 cloud-based technology architectures and scenarios in which different combinations of the mechanisms are documented in relation to fundamental, advanced, and specialized cloud architectures. Chapter 11: Fundamental Cloud Architectures

Fundamental cloud architectural models establish baseline functions and capabilities. The architectures covered in this chapter are Workload Distribution, Resource Pooling, Dynamic Scalability, Elastic Resource Capacity, Service Load Balancing, Cloud Bursting, Elastic Disk Provisioning, and Redundant Storage. Chapter 12: Advanced Cloud Architectures

Advanced cloud architectural models establish sophisticated and complex environments, several of which directly build upon fundamental models. The architectures covered in this chapter are Hypervisor Clustering, Load Balanced Virtual Server Instances, Non-Disruptive Service Relocation, Zero Downtime, Cloud Balancing, Resource Reservation, Dynamic Failure Detection and Recovery, Bare-Metal Provisioning, Rapid Provisioning, and Storage Workload Management. Chapter 13: Specialized Cloud Architectures

Specialized cloud architectural models address distinct functional areas. The architectures covered in this chapter are Direct I/O Access, Direct LUN Access, Dynamic Data Normalization, Elastic Network Capacity, Cross-Storage Device Vertical Tiering, Intra-Storage Device Vertical Data Tiering, Load-Balanced Virtual Switches, Multipath Resource Access, Persistent Virtual Network Configuration, Redundant Physical Connection for Virtual Servers, and Storage Maintenance Window. Note that this chapter does not contain a case study example.

Part IV: Working with Clouds Cloud computing technologies and environments can be adopted to varying

 

 

extents. An organization can migrate select IT resources to a cloud, while keeping all other IT resources on-premise—or it can form significant dependencies on a cloud platform by migrating larger amounts of IT resources or even using the cloud environment to create them. For any organization, it is important to assess a potential adoption from a practical and business-centric perspective in order to pinpoint the most common factors that pertain to financial investments, business impact, and various legal considerations. This set of chapters explores these and other topics related to the real-world considerations of working with cloud-based environments. Chapter 14: Cloud Delivery Model Considerations

Cloud environments need to be built and evolved by cloud providers in response to cloud consumer requirements. Cloud consumers can use clouds to create or migrate IT resources to, subsequent to their assuming administrative responsibilities. This chapter provides a technical understanding of cloud delivery models from both the provider and consumer perspectives, each of which offers revealing insights into the inner workings and architectural layers of cloud environments. Chapter 15: Cost Metrics and Pricing Models

Cost metrics for network, server, storage, and software usage are described, along with various formulas for calculating integration and ownership costs related to cloud environments. The chapter concludes with a discussion of cost management topics as they relate to common business terms used by cloud provider vendors. Chapter 16: Service Quality Metrics and SLAs

Service level agreements establish the guarantees and usage terms for cloud services and are often determined by the business terms agreed upon by cloud consumers and cloud providers. This chapter provides detailed insight into how cloud provider guarantees are expressed and structured via SLAs, along with metrics and formulas for calculating common SLA values, such as availability, reliability, performance, scalability, and resiliency.

Part V: Appendices Appendix A: Case Study Conclusions

The individual storylines of the case studies are concluded and the results of each organization’s cloud computing adoption efforts are summarized. Appendix B: Industry Standards Organizations

 

 

This appendix describes industry standards organizations and efforts in support of the cloud computing industry. Appendix C: Mapping Mechanisms to Characteristics

A table is provided, mapping cloud characteristics to the cloud computing mechanisms that can help realize the characteristics. Appendix D: Data Center Facilities (TIA-942)

A brief overview and breakdown of common data center facilities in reference to the TIA-942 Telecommunications Infrastructure Standard for Data Centers. Appendix E: Emerging Technologies

Autonomic computing and grid technology are briefly discussed as two primary technologies anticipated to influence cloud computing. Appendix F: Cloud Provisioning Contracts

The actual agreements signed between cloud provider vendors and cloud consumer organizations are distinct legal contracts that encompass a range of specific terms and considerations. This appendix highlights the typical parts of a cloud provisioning contract, and provides further guidelines. Appendix G: Cloud Business Case Template

This appendix provides a checklist of items that can be used as a starting point for assembling a business case for the adoption of cloud computing.

1.5. Conventions Symbols and Figures This book contains a series of diagrams that are referred to as figures. The primary symbols used throughout the figures are individually described in the symbol legend located on the inside of the book cover. Full-color, high- resolution versions of all figures in this book can be viewed and downloaded at www.servicetechbooks.com and www.informit.com/title/9780133387520.

Summary of Key Points For quick reference purposes, each of the sections within Chapters 3 through 6 in Part I, “Fundamental Cloud Computing,” concludes with a Summary of Key Points sub-section that concisely highlights the primary statements made within the section, in bullet list format.

1.6. Additional Information

 

 

These sections provide supplementary information and resources for the Prentice Hall Service Technology Series from Thomas Erl.

Updates, Errata, and Resources (www.servicetechbooks.com) Information about other series titles and various supporting resources can be found at the official book series Web site: www.servicetechbooks.com. You are encouraged to visit this site regularly to check for content changes and corrections.

Referenced Specifications (www.servicetechspecs.com) This site provides a central portal to the original specification documents created and maintained by primary standards organizations, with a section dedicated exclusively to cloud computing industry standards.

The Service Technology Magazine (www.servicetechmag.com) The Service Technology Magazine is a monthly publication provided by Arcitura Education Inc. and Prentice Hall and is officially associated with the Prentice Hall Service Technology Series from Thomas Erl. The Service Technology Magazine is dedicated to publishing specialized articles, case studies, and papers by industry experts and professionals.

International Service Technology Symposium (www.servicetechsymposium.com) This site is dedicated to the International Service Technology Symposium conference series. These events are held throughout the world and frequently feature authors from the Prentice Hall Service Technology Series from Thomas Erl.

What Is Cloud? (www.whatiscloud.com) A quick reference site comprised of excerpts from this book to provide coverage of fundamental cloud computing topics.

What Is REST? (www.whatisrest.com) This Web site provides a concise overview of REST architecture and constraints. REST services are referenced in Chapter 5 of this book as one of the possible implementation mediums for cloud services.

Cloud Computing Design Patterns (www.cloudpatterns.org) The cloud computing design patterns master catalog is published on this site. The mechanisms described in this book are referenced as implementation

 

 

options for various design patterns that represent established practices and technology feature-sets.

Service-Orientation (www.serviceorientation.com) This site provide papers, book excerpts, and various content dedicated to describing and defining the service-orientation paradigm, associated principles, and the service-oriented technology architectural model.

CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com) The official site for the Cloud Certified Professional (CCP) curriculum dedicated to specialized areas of cloud computing, including technology, architecture, governance, security, capacity, virtualization, and storage.

SOASchool.com® SOA Certified (SOACP) Professional (www.soaschool.com) The official site for the SOA Certified Professional (SOACP) curriculum dedicated to specialized areas of service-oriented architecture and service- orientation, including analysis, architecture, governance, security, development, and quality assurance.

Notification Service To be automatically notified of new book releases in this series, new supplementary content for this title, or key changes to the aforementioned resource sites, use the notification form at www.servicetechbooks.com or send a blank e-mail to notify@arcitura.com.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!