Select the case from chapter 8 and complete the written exercise. Case 8-3 Hyper-V (Jamsa page 115) Review case 8-3 and complete the exercise. Provide a minimum of 2 references to s
Research Paper Requirements:
- Paper length: 2 pages
- APA
Part 1: Hypervisors (1 page)
Select the case from chapter 8 and complete the written exercise.
Case 8-3 Hyper-V (Jamsa page 115)
Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.
Part 2: Cloud Security (1 page)
Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support.
World Headquarters
Jones & Bartlett Learning
5 Wall Street
Burlington, MA 01803
978-443-5000
www.jblearning.com
Jones & Bartlett Learning books and products are avail- able through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832- 0034, fax 978-443-8000, or visit our website, www.jblearning.com.
Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corpora- tions, professional associations, and other qualified orga- nizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to [email protected]
Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company
All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. Microsoft, HealthVault, Windows Live, Bing, Hotmail, MSN, and SkyDrive are either registered trade- marks or trademarks of Microsoft Corporation in the United States and/or other countries. Additional photo- graphic and illustration credits appear on page 321 which constitutes a continuation of the copyright page.
This publication is designed to provide accurate and au- thoritative information in regard to the subject matter covered. It is sold with the understanding that the pub- lisher is not engaged in rendering legal, accounting, or
other professional service. If legal advice or other expert assistance is required, the service of a competent profes- sional person should be sought.
Cloud Computing is an independent publication and has not been authorized, sponsored, or otherwise approved by the owners of the trademarks or service marks refer- enced in this product.
Production Credits
Chief Executive Officer: Ty Field
President: James Homer
SVP, Editor-in-Chief: Michael Johnson
SVP, Chief Technology Officer: Dean Fossella
SVP, Chief Marketing Officer: Alison M. Pendergast
SVP, Curriculum Solutions: Christopher Will
VP, Design and Production: Anne Spencer
Editorial Management: High Stakes Writing, LLC, Editor and Publisher: Lawrence J. Goodrich
Copy Editor, HSW: Ruth Walker
Reprints and Special Projects Manager: Susan Schultz
Production Editor: Keith Henry
Senior Marketing Manager: Andrea DeFronzo
VP, Business Development: Todd Giorza
Marketing Manager: Lindsay White
VP, Manufacturing and Inventory Control: Therese Connell
Manufacturing and Inventory Control Supervisor: Amy Bacus
Composition: Cenveo Publisher Services
Cover Design: Kristin E. Parker
Rights & Photo Research Manager: Katherine Crighton
Rights & Photo Research Assistant: Lian Bruno
Cover Image: © majeczka/ShutterStock, Inc.
Chapter Opener Image: © Risto Viita/ShutterStock, Inc.
Printing and Binding: Edwards Brothers Malloy
Cover Printing: Edwards Brothers Malloy
Library of Congress CataloginginPublication Data
Jamsa, Kris A.
Cloud computing / Kris Jamsa.—1st ed.
p. cm.
Includes index.
ISBN 978-1-4496-4739-1
1. Cloud computing. I. Title.
QA76.585.J36 2012
004.6782—dc23
2011051300
6048
Printed in the United States of America
16 15 14 13 12 10 9 8 7 6 5 4 3 2 1
To Ashton,
May all your clouds have a silver lining.
Brief Contents
Preface
Chapter 1 Introducing Cloud Computing
Chapter 2 Software as a Service (SaaS)
Chapter 3 Platform as a Service (PaaS)
Chapter 4 Infrastructure as a Service (IaaS)
Chapter 5 Identity as a Service (IDaaS)
Chapter 6 Data Storage in the Cloud
Chapter 7 Collaboration in the Cloud
Chapter 8 Virtualization
Chapter 9 Securing the Cloud
Chapter 10 Disaster Recovery and Business Con tinuity and the Cloud
Chapter 11 ServiceOriented Architecture
Chapter 12 Managing the Cloud
Chapter 13 Migrating to the Cloud
Chapter 14 Mobile Cloud Computing
Chapter 15 Governing the Cloud
Chapter 16 Evaluating the Cloud’s Business Im pact and Economics
Chapter 17 Designing CloudBased Solutions
Chapter 18 Coding CloudBased Applications
Chapter 19 Application Scalability
Chapter 20 The Future of the Cloud
Glossary of Key Terms
Index
Credits
Contents
Preface
Chapter 1 Introducing Cloud Computing
Web 2.0 and the Cloud
Distinguishing Cloud Types
Cloud Deployment Models
Cloud Service Models
Exploring Uses of the Cloud
Introducing Scalability
Introducing Virtualization
Collecting Processing Power Through Grid Computing
Chapter Summary
Key Terms
Chapter Review
Chapter 2 Software as a Service (SaaS)
Getting Started with SaaS
Understanding the Multitenant Nature of SaaS Solutions
Understanding OpenSaaS Solutions
Understanding Mashups
Understanding ServiceOriented Architecture (SOA)
Chapter Summary
Key Terms
Chapter Review
Chapter 3 Platform as a Service (PaaS)
IT Evolution Leading to the Cloud
Benefits of PaaS Solutions
Disadvantages of PaaS Solutions
Chapter Summary
Key Terms
Chapter Review
Chapter 4 Infrastructure as a Service (IaaS)
Understanding IaaS
Improving Performance Through Load Balancing
Taking a Closer Look at Load Balancing
System and Storage Redundancy
Utilizing CloudBased NAS Devices
Advantages of IaaS Solutions
Server Types Within an IaaS Solution
Chapter Summary
Key Terms
Chapter Review
Chapter 5 Identity as a Service (IDaaS)
Understanding Single SignOn (SSO)
Understanding How SSO Works
Understanding Federated Identity Management
Understanding Account Provisioning
Understanding OpenID
Mobile ID Management
Chapter Summary
Key Terms
Chapter Review
Chapter 6 Data Storage in the Cloud
Examining the Evolution of Network Storage
Understanding CloudBased Data Storage
Advantages and Disadvantages of CloudBased Data Storage
Getting Past the Fear of CloudBased Data
CloudBased Backup Systems
Understanding File Systems
IndustrySpecific CloudBased Data Storage
CloudBased Database Solutions
CloudBased Block Storage
Chapter Summary
Key Terms
Chapter Review
Chapter 7 Collaboration in the Cloud
Collaborating in the Clouds
Questions to Ask About Collaborative Tools
WebBased Collaboration Began with Web Mail
Instant Messaging Isn’t What It Used to Be
CloudBased Phone and Fax Systems
Revisiting File Sharing
Editing Shared Files Within the Cloud
Collaborating via Web Logs (Blogs)
Collaborative Meetings in the Cloud
Virtual Presentations and Lectures
Using Social Media for Collaboration
Using CloudBased Calendar Management
Using Streaming Video Content to Collaborate
CloudBased TV Content
Chapter Summary
Key Terms
Chapter Review
Chapter 8 Virtualization
Understanding Virtualization
The History of Virtualization
Leveraging Blade Servers
Server Virtualization
Desktop Virtualization
Desktop Solutions on Demand
Virtual Networks
Data Storage Virtualization
Not All Applications Are Well Suited for Virtualization
Why Virtualize?
Chapter Summary
Key Terms
Chapter Review
Chapter 9 Securing the Cloud
General Security Advantages of CloudBased Solutions
Introducing Business Continuity and Disaster Recovery
Understanding Data Storage Wiping
Understanding Distributed DenialofService (DDoS) Attacks
Packet Sniffing
ManintheMiddle Attack
Monitoring Device Screens
Malicious Employees
Hypervisor Attack
GuestHopping Attack
SQLInjection Attack
Physical Security
Chapter Summary
Key Terms
Chapter Review
Chapter 10 Disaster Recovery and Business Continuity and the Cloud
Understanding the Threats
Threat: Disk Failure
Threat: Power Failure or Disruption
Threat: Computer Viruses
Threat: Fire
Threat: Floods
Threat: Disgruntled Employees
Threat: Lost Equipment
Threat: Desktop Failure
Threat: Server Failure
Threat: Network Failure
Threat: Database System Failure
Threat: Phone System Failure
Understanding ServiceLevel Agreements
Measuring Business Impact: The Essence of Risk Mitigation
Disaster Recovery Plan Template
Chapter Summary
Key Terms
Chapter Review
Chapter 11 ServiceOriented Architecture
Understanding ServiceOriented Architecture
Web Services Are Not Web Pages
Many Companies Provide Web Services
Discovering Web Services
Understanding Web Service Performance
Web Service and Reuse
Scaling Web Services
Web Services and Loose Coupling
Treating a Web Service as a Black Box
Web Service Interoperability
Web Service Description Language
Governing Web Services
Chapter Summary
Key Terms
Chapter Review
Chapter 12 Managing the Cloud
Know Your ServiceLevel Agreement
Ensure and Audit System Backups
Know Your System’s Data Flow
Beware of Vendor LockIn
SourceCode Escrow
Determine Technical Support and Help Desk Procedures
Determine Training Procedures
Know the Provider’s Security Policies and Procedures
Define the Data Privacy Requirements
Know Specifics About the Economics of the Cloud and Return on Investment
Monitor Capacity Planning and Scaling Capabilities
Monitor AuditLog Use
Solution Testing and Validation
Chapter Summary
Key Terms
Chapter Review
Chapter 13 Migrating to the Cloud
Define the System Goals and Requirements
Protect Your Existing Data
Use an Experienced Cloud Consultant
Know Your Application’s Current Characteristics
Remember Vendor LockIn
Define Your Training Requirements
Establish a Realistic Deployment Schedule
Review the Budget Factors
Identify IT Governance Issues
Understanding Cloud Bursting
Chapter Summary
Key Terms
Chapter Review
Chapter 14 Mobile Cloud Computing
The Evolution of Mobile Computing
Understanding the G in 3G and 4G
The Mobile Cloud Ecosystem
Introducing the Mobile Players
Pages, Apps, and Widgets
Revisiting the Role of HTML
Mobile Development Considerations
Chapter Summary
Key Terms
Chapter Review
Chapter 15 Governing the Cloud
Understanding Corporate Governance
Understanding Business Strategy
Measure What Is Important
Inspect What You Expect
Understanding Internal Controls
Extending Governance to Information Technology
Cloud Computing Governance
Chapter Summary
Key Terms
Chapter Review
Chapter 16 Evaluating the Cloud’s Business Im pact and Economics
Business Economics
Total Cost of Ownership
Economies of Scale
Capital Expenditures
Operational Expenses
Return on Investment
Profit Margins
Moore’s Law and the Cloud
Understanding RightSizing
Defining a Large Data Center
Other Economic Key Performance Indicators
Marketing the Cloud
Chapter Summary
Key Terms
Chapter Review
Chapter 17 Designing CloudBased Solutions
Revisit the System Requirements
When to Select a Development Environment
Design Is a GiveandTake Process
Designing for Accessibility
Designing for Audit
Designing for Availability
Designing for Backup
Designing for Existing and Future Capacity
Designing for Configuration Management
Designing for Deployment
Designing for Disaster Recovery
Designing for the Environment (Green Computing)
Designing for Interoperability
Designing for Maintainability
Designing for Performance
Designing for Price
Designing for Privacy
Designing for Portability
Designing for Recovery
Designing for Reliability
Designing for Response Time
Designing for Robustness
Designing for Security
Designing for Testability
Designing for Usability
Chapter Summary
Key Terms
Chapter Review
Chapter 18 Coding CloudBased Applications
Creating a Mashup Using Yahoo! Pipes
Creating a Simple Yahoo! Pipe
Using Google App Engine
Creating a Hello, World! Application with Google App Engine
Downloading the Google App Engine Software Develop ment Kit
Deploying a Simple Google App Engine Example
Creating a More Advanced Google App Engine Application
Creating a Windows Azure “Hello, World!” Application
Chapter Summary
Key Terms
Chapter Review
Chapter 19 Application Scalability
Reviewing the LoadBalancing Process
Designing for Scalability
Scaling Up, Scaling Out, or Both
Minimize Objects on Key Pages
Selecting Measurement Points
Analyze Your Database Operations
Evaluate Your System’s Data Logging Requirements
Revisit Your ServiceLevel Agreement
Capacity Planning Versus Scalability
Scalability and Diminishing Returns
Performance Tuning
Complication Is the Enemy of Scalability
Chapter Summary
Key Terms
Chapter Review
Chapter 20 The Future of the Cloud
How the Cloud Will Change Operating Systems
LocationAware Applications
Intelligent Fabrics, Paints, and More
The Future of Cloud TV
Future of CloudBased Smart Devices
Cloud and Mobile
How HTML5 Will Drive Mobile Applications
Faster Time to Market for Software Applications
HomeBased Cloud Computing
Chapter Summary
Key Terms
Chapter Review
Glossary of Key Terms
Index
Credits
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.