on cloud computing the dominance and governance on the computing landscape l.
Skip this Video
Loading SlideShow in 5 Seconds..
On Cloud Computing: The Dominance and Governance on The Computing Landscape PowerPoint Presentation
Download Presentation
On Cloud Computing: The Dominance and Governance on The Computing Landscape

Loading in 2 Seconds...

play fullscreen
1 / 87

On Cloud Computing: The Dominance and Governance on The Computing Landscape - PowerPoint PPT Presentation

  • Uploaded on

On Cloud Computing: The Dominance and Governance on The Computing Landscape. By Shang-Sheng Jeng March 22 2010. Baseline Consideration:. A New Dimension: Cyberspace A New Identity: Cybog A New Relationship and Asset. Baseline Consideration:. Information  Intelligence  Instruction

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

On Cloud Computing: The Dominance and Governance on The Computing Landscape

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
on cloud computing the dominance and governance on the computing landscape

On Cloud Computing: The Dominance and Governance on The Computing Landscape

By Shang-Sheng Jeng

March 22 2010

baseline consideration
Baseline Consideration:
  • A New Dimension: Cyberspace
  • A New Identity: Cybog
  • A New Relationship and Asset
baseline consideration3
Baseline Consideration:
  • Information  Intelligence  Instruction
  • This is a Competitive World
  • From Profitability to Survivability
  • Computing Paradigm Shift
  • The Next Thirty Years of World
the first priority object to destroy for tanks is not the enemy but the anti tank weapons

“The first priority object to destroy for tanks is not the enemy but the anti-tank weapons.”

“The will to survival”

presentation objectives
Presentation Objectives:
  • Offensive:
    • To Manipulate the “Cloud Computing” Landscape
      • Opportunity & Capability
    • To Balance the “Cloud Computing” Competition
      • IBM (Oracle+Sun), Google (MS+Yahoo)
    • To Dominate the Government Cloud in Taiwan and China
    • To Lead the Reform of “Software Industry”
presentation objectives6
Presentation Objectives:
  • Defensive:
    • Make Taiwan’s Computer Industry survive in Computing Paradigm Shift
    • Take the financial and technological benefit for Taiwan’s Cloud Computing Users (Institutional or Personal)
    • Minimize the lost of Taiwan’s software industry
    • Find a Way to Keep Taiwan’s Software Industry Survive
  • 1. Origins
  • 2. Players
  • 3. Trends
  • 4. Response
1 origins
1. Origins
  • 1.1 Industry Restructuring
  • 1.2 Technology Maturity
  • 1.3 Issue, Innovation and Competition
1 1 industry restructuring old vertical
1.1 Industry Restructuring (old, vertical)
  • Network CISCO
  • Server Sun Micro, HP
  • DB Oracle
  • Services IBM
  • Business SAP
1 1 industry restructuring now integration
1.1 Industry Restructuring (now, integration)
  • Market Overlapping
  • Market Saturation
  • Requirement Dynamics and Technology Complexity pushed Outsourcing (for users) and M&A (for suppliers)
1 2 technology maturity
1.2 Technology Maturity
  • Producer
    • Processing
    • Communication
    • Storage
  • Consumer
    • Web based Services
  • Architecture
    • Clustering, Grid, Data Center
1 3 issue innovation and competition
1.3 Issue, Innovation, and Competition
  • Open Source Movement
  • Software as a Service  Hardware, Infrastructure, Platform, as a Service
  • Web 2.0 Push
  • Concept of Utility Computing (Nicholas Carr, “IT doesn’t Matter”, “Big Switch”)
1 3 issue innovation and competition13
1.3 Issue, Innovation, and Competition
  • Data as Asset Biz Model
  • Prosumer (producer as consumer and vice versa) Biz Model
  • SOA & Event-driven Computing (C4KISR, SOA-R, Cloud Computing)
  • Functional Cloud Integrated Service (example: Chiang’s memorial pages)
web 2 0 push
Web 2.0 Push
  • The Characteristics of Web 2.0
  • Virtual Disk Xdriver, iDisk
  • Note BuzzWord
  • Blogger WordPress
  • FeedReader Rojo, Bloglines
  • Photo Flickr, Photobucket
  • Video YouTube, Joost
web 2 0 push15
Web 2.0 Push
  • eMail gmail. Hotmail
  • iPhone skype
  • Social network MySpace, Facebook
  • Virtual ID Second Life, World of Warcraft
2 player
2. Player
  • 2.1 Type 1 Service: Serve to Government and Large Institutions
  • 2.2 Type 2 Service: Serve to Mass Individual User, and Small Business
  • 2.3 Type 3 Service: Serve for Special Purpose
2 1 type 1 player oriented
2.1 Type 1 Player Oriented
  • IBM* (Key Player)
  • Oracle
  • EMC
  • HP
  • SAP
  • Outsourcing Service: Applications Outsourcing, Business Process Outsourcing, IT Outsourcing and Hosting
  • Service Science
  • Mainframe Computer and Services Integrated Datacenter (GIE)
ibm blue cloud
IBM Blue Cloud
  • Almaden Research Center:
    • Xen, PowerVM, Linux, Hadoop File System (Open Source)
    • Tivoli, DB2, WebSphere, x86 Blade (Cash Cow)
services sciences
Services Sciences
  • Customer Insights
  • Social Analytics
  • Services Software Engineering
  • Systems Management and Service Management
  • Social Simulation
service science
Service Science
  • Service Science, Management, and Engineering
  • IBM System Journal, Volume 47, Number 1, 2008
ibm penetration
IBM Penetration
  • IBM Software Available Pay-As-You-Go on EC2
  • Monday, February 23, 2009
  • Oracle Business OnLine
  • Siebel
  • Sun Micro: Java, Virtual On-demand Data Center, Blackbox
  • VMware, Pi, Smarts, Berkeley Data Systems, Mozy
2 2 type 2 player oriented
2.2 Type 2 Player Oriented
  • Amazon
  • Google* (Key Player)
  • Salesforce
  • Microsoft
  • Yahoo
  • Redundant Resources
  • Services as a control tool
  • Amazon Web Services (AWS): Simple Storage Service (S3), Elastic Compute Cloud (EC2), Simple Queuing Service, SimpleDB
  • Enterprise Cloud and Consumer Cloud
  • Google App Engine
  • Google File System, Map/Reduce, Chubby, BigTable。
  • Software as a Service, Platform as a Service
  • AppExchange: Customer Relationship Management (CRM), Enterprise Content Management (ECM)
  • First excess 100M company of only cloud type services
  • Dynamics CRM Online, Exchange Online, Office Communications Online
  • Windows Live, Office Live, Xbox Live
  • Hadoop Core (Open Source): a subproject of Apache
2 3 type 3 player oriented
2.3 Type 3 Player Oriented
  • Trend Micro
  • Panda Cloud Antivirus
  • PRC
trend micro
Trend Micro
  • Security Cloud
  • Smart Protection Network, In-the-Cloud service
panda cloud antivirus
Panda Cloud Antivirus
  • Light, Secure, Ease
  • CloudAntivirus.exe (19,014,048 byte, May 10 2009) it need to uninstall Norton 360.
3 trends
3. Trends
  • 3.1 What is Cloud Computing
  • 3.2 For Type 1 Oriented Cloud Computing
  • 3.3 For Type 2 Oriented Cloud Computing
  • 3.4 For Type 3 Oriented Cloud Computing
  • 3.5 McKinsey’s Recent Findings (April 2009)
  • 3.6 Forrester’s Opinions (April 13 2009)
  • 3.7 US Government IT Spending
  • 3.8 The US Cyber Challenge
3 1 what is cloud computing
3.1 What is Cloud Computing
  • Defined by
    • Reliable, Adaptable, Distributed Systems Lab, UC Berkeley (RAID, RISC) (sponsor: Sun, Google, Microsoft)
    • NIST
    • Open Cloud Manifesto
what is cloud computing a berkeley view of cloud computing feb 2009
What is Cloud Computing? A Berkeley View of Cloud Computing (Feb 2009)
  • Old idea: Software as a Service (SaaS)
    • Def: delivering applications over the Internet
  • Recently: “[Hardware, Infrastrucuture, Platform] as a service”
    • Poorly defined so we avoid all “X as a service”
what is cloud computing berkeley
What is Cloud Computing? (Berkeley)
  • Utility Computing: pay-as-you-go computing
    • Illusion of infinite resources
    • No up-front cost
    • Fine-grained billing (e.g. hourly)
spectrum of clouds berkeley
Spectrum of Clouds (Berkeley)


Less management


More management






  • Instruction Set VM (Amazon EC2, 3Tera)
  • Bytecode VM (Microsoft Azure)
  • Framework VM
    • Google AppEngine, Force.com
a working definition of cloud computing nist
A Working Definition of Cloud Computing (NIST)
  • Cloud computing is a pay-per-use model for enabling convenient, on-demand network access to a shared pool of configurable and reliable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal consumer management effort or service provider interaction.
a working definition of cloud computing nist41
A Working Definition of Cloud Computing (NIST)
  • The cloud model is comprised of five key characteristics, three delivery models, and four deployment models.
5 key cloud characteristics
5 Key Cloud Characteristics
  • On-demand self-service
  • Ubiquitous network access
  • Resource pooling
  • Rapid elasticity
  • Pay per use
3 cloud delivery models
3 Cloud Delivery Models
  • Cloud Software as a Service (SaaS)
    • –Use provider’s applications over a network
  • Cloud Platform as a Service (PaaS)
    • Deploy customer-created applications to a cloud
  • Cloud Infrastructure as a Service (IaaS)
    • Rent processing, storage, network capacity, and other fundamental computing resources
3 cloud delivery models44
3 Cloud Delivery Models
  • To be considered “cloud” they must be deployed on top of cloud infrastructure that enables the key characteristics
4 cloud deployment models
4 Cloud Deployment Models
  • Private cloud
    • enterprise owned or leased
  • Community cloud
    • shared infrastructure for specific community
  • Public cloud
    • Sold to the public, mega-scale infrastructure
  • Hybrid cloud
    • composition of two or more clouds
4 cloud deployment models46
4 Cloud Deployment Models
  • Two types: internal and external (my opinion)
common cloud characteristics nist
Common Cloud Characteristics (NIST)
  • Cloud computing often leverages:
    • Massive scale
    • Virtualization
    • Free software
    • Autonomic computing
    • Multi-tenancy
    • Geographically distributed systems
    • Advanced security technologies
what is cloud computing the open cloud manifesto
What is Cloud ComputingThe Open Cloud Manifesto
  • The key characteristics of the cloud are the ability to scale and provision computing power dynamically in a cost efficient way and the ability of the consumer (end user, organization or IT staff) to make the most of that power without having to manage the underlying complexity of the technology. The cloud architecture itself can be private (hosted within an organization’s firewall) or public (hosted on the Internet).
the goals of an open cloud
The Goals of an Open Cloud
  • Choice
  • Flexibility
  • Speed and Agility
  • Skills
choice anti lock in
Choice (anti-lock-in)
  • As an organization chooses a provider or architecture or usage model, an open cloud will make it easy for them to use a different provider or architecture as the business 5 environment changes. If the organization needs to change providers because of new partnerships, acquisition, customer requests or government regulations, they can do so easily. If the organization deploys a private cloud, they can choose between providers as they extend their capacity and/or functional capabilities. Resources that would have been spent on a difficult migration can instead be spent on innovation.
flexibility inter communication and operation
Flexibility (inter communication and operation)
  • No matter which cloud provider and architecture an organization uses, an open cloud makes it easy for them to work with other groups, even if those other groups choose different providers and architectures. An open cloud will make it easy for organizations to interoperate between different cloud providers.
speed and agility open interface
Speed and Agility (open interface)
  • One of the value propositions of cloud computing is the ability to scale hardware and software as needed. Using open interfaces allows organizations to build new solutions that integrate public clouds, private clouds and current IT systems. As the conditions of the organization change, an open cloud lets the organization respond with speed and agility.
skills open development paradigm
Skills (open development paradigm)
  • A side effect of an open cloud is the availability of skilled professionals. If there are many proprietary programming models, a given IT professional is unlikely to know more than a few of them. In an open cloud, there is a small set of new technologies to learn (especially when existing technologies are utilized), greatly enhancing the chances that the organization can find someone with the necessary skills.
open cloud supporter
Open Cloud Supporter
  • Akami, AMD, AT&T, Cisco, CSC, The Eclipse Foundation, EMC, IBM, Juniper Networks, Novell, Red Hat, SAP, Siemens AG, Software AG, Sun Microsystems, VMWare
  • No: Microsoft, Oracle, Amazon, Yahoo, Google, HP,… Why? (May 08 2009)
3 2 for type 1 oriented cloud computing
3.2 For Type 1 Oriented Cloud Computing
  • Redefine the Function and Structure of Institutional Data Center
  • International interoperability Push of Institutional or Governmental Workflow (mil)
  • The Shrinking of (all kinds of) IT Consulting Company
for type 1 oriented cloud computing
For Type 1 Oriented Cloud Computing
  • The New Issue of Survivability and Profitability of Traditional Software Industry
  • Security as the most important Key Issue of Cloud Computing Penetration
3 3 for type 2 oriented cloud computing
3.3 For Type 2 Oriented Cloud Computing
  • When “the free lunch end”? What’s the impact? How we should face it?
  • What’s the real Value of Data (personal and personal generated)?
  • The Technology of Data Mining, Information Fusion and (dealing with intelligence and instruction)…as a new Disruptive Technology
for type 2 oriented cloud computing
For Type 2 Oriented Cloud Computing
  • The Rise of Mass Communication to Mass Control, Cloud computing as a Data-Information-Intelligence-Instruction Chain Experimental Battlefield
  • Mass Individual Ignorance of Data-Information-Intelligence chain will be a Business Competition and National Security Issue
3 4 for type 3 oriented cloud computing
3.4 For Type 3 Oriented Cloud Computing
  • Security Cloud
  • Internal Cloud
security cloud
Security Cloud
  • National or Government Security Cloud
  • Enterprise Security Cloud
  • End Users Security Cloud
internal cloud
Internal Cloud
  • Backup Cloud
  • Testing and Development Cloud
  • Heterogeneous Working Environment Cloud
  • Load Balance Cloud
  • Security Cloud
3 6 forrester s opinions deliver cloud benefits inside your walls
3.6 Forrester’s Opinions: Deliver Cloud Benefits Inside Your Walls
  • While the excitement about cloud computing centers on Amazon Elastic Compute Cloud (EC2) and other public infrastructure-as-a-service products, many enterprise infrastructure and operations professionals are taking this concept in-house and building their own internal clouds.
deliver cloud benefits inside your walls
Deliver Cloud Benefits Inside Your Walls
  • These pools of virtual machines can be built upon either virtual server or high-performance computing (HPC) grid foundations and can be operated according to the specific security and process requirements of the business. But to deliver the fundamentally better economic value of cloud architectures within your walls,
deliver cloud benefits inside your walls66
Deliver Cloud Benefits Inside Your Walls
  • these clouds require a dynamic platform (or automated workload management) and developer self-service interfaces. There’s a growing list of vendors eager to help you deploy an internal cloud, but be sure you understand that these solutions are more building blocks than complete solutions and must be customized to your specific needs.
3 7 us government it spending july 10 2009
3.7 US Government IT Spending July 10, 2009
  • Comprehensive INPUT report identifies key developments shaping federal IT investment.
  • Using the fiscal year 2010 budget request released by the Office of Management and Budget (OMB), the report predicts significant growth in cloud computing, green technologies, healthcare IT, and cyber security.
us government it spending
US Government IT Spending
  • INPUT projects that federal government demand for IT products and services will grow at a compounded annual rate of 3.5 percent over the next five years, reaching $90 billion in total market value by 2014, up from $76 billion in 2009.
us government it spending69
US Government IT Spending
  • The Obama Administration's broad initiatives will drive technology adoption in the healthcare, energy and green building markets. Increased adoption of cloud computing, Service Oriented Architecture (SOA), and cyber security projects will also shape the federal IT market.
cloud computing
Cloud Computing
  • The cloud computing market is expected to grow nearly 30 percent over the next five years, to over $1 billion, transforming the federal IT infrastructure. Exploration of cloud-based projects is a top administration priority because of expected cost savings and increased efficiencies.
cloud computing71
Cloud Computing
  • The National Institute of Standards & Technology (NIST) helped create the momentum for cloud initiatives on a federal level by crafting security standards and definitions for cloud projects. SOA implementations by the Air Force, Navy, Army and other government agencies are helping to drive the adoption of cloud computing.
cyber security
Cyber Security
  • The federal government will increase information security spending from $8.2 billion in 2009 to $12.2 billion by 2014 at a compound annual growth rate (CAGR) of 8.3%.
cyber security73
Cyber Security
  • Even still, according to INPUT research and analysis, less than 1 out of 10 dollars in federal government IT budgets goes to securing systems and data, and new initiatives such as the DoD's cyber command and other ongoing government wide cyber initiatives.
3 8 the us cyber challenge july 24 2009
3.8 The US Cyber Challenge July 24, 2009
  • The U.S. Cyber Challenge, a triathlon of competitions designed to inspire students to learn the technical skills needed to defend--and, in some cases, attack--computer networks.
  • DC3 Digital Forensics Challenge
    • DoD Cyber Crime Center
    • An Air Force Association national high school cyber defense competition
the us cyber challenge
The US Cyber Challenge
  • CyberPatriot Defense Competition
    • Cyber Patriot
    • A Department of Defense Cyber Crime Center competition focusing on cyber investigation and forensics
  • Netwars Capture-the-Flag Competition
    • SANS Institute Netwars Capture-the-Flag
    • A SANS Institute challenge testing mastery of vulnerabilities
4 response
4. Response
  • Data Center for Government of IBM in Taiwan
  • “Data as Value” Technology Development
  • Individual User Experience of Google
  • Business User Experience of Amazon or Salesforce
  • A Team to study “Hadoop Core” and Related Application (open source)
4 response77
4. Response
  • Government Sponsored Personal Financial Cloud Computing
  • Government Sponsored Personal Health Cloud Computing
  • Government Sponsored Public Services Cloud Computing
  • Government Sponsored Disaster On-demand Cloud Computing
4 response alternatives
4. Response (alternatives)
  • SETI@home as an anti or collaborate or complementary to Cloud Computing
  • On Demand Vs. Prefetch based Computing
  • Intelligence based Cloud Computing
  • Instruction based Cloud Computing
  • Open Cloud Computing Legal Enforcement
4 response alternatives79
4. Response (alternatives)
  • Opportunity for Hardware Manufactures
  • Opportunity for Green Considerations
  • Opportunity for Environmental Extreme Conditions
  • Compiler Technology: Multi-core Programming, Architecture Security,…
  • Cloud Openness Certification
action plan
Action Plan
  • Research Group
    • Cloud (cluster, grid) Vs. Supercomputer
    • SOA, Cloud Computing, Cyber Command
    • Data and Transactions as Asset (Data and Transactions generated Value): philosophy, architecture, science, engineering and pragmatics
    • Privacy in Cloud Computing
action plan81
Action Plan
  • Research Group
    • Security of Cloud Computing and Cloud Computing Security
    • Openness Cloud Computing for Software Industry of Taiwan
action plan82
Action Plan
  • Watching Group
    • US Push Impact (transparency and interoperability in mil and gov)
    • Department of National Development & Government Cloud
    • Open Cloud Computing: Organization, Technology, Standards, Legal Actions
action plan83
Action Plan
  • Action Group
    • Cloud News and Blog Publish
    • Internal Cloud Pilot
    • Open Cloud Computing Organization Construction
    • Experimental User Experience Study
    • Contact with Key Player
appendix 1
Appendix 1
  • In “IT Doesn’t Matter” Carr’s suggestions:
    • Spend Less
    • Follow, Don’t Lead
    • Innovate When Risks Are Low
    • Focus More on Vulnerabilities than Opportunities
appendix 2
Appendix 2
  • SOA and Cloud Computing
  • Who care “Cloud Computing”?
  • Who create the term “Cloud Computing” and Why?
  • How “Cloud Computing” impact the “Computer Industry”?
  • How “Cloud Computing” impact the jobs of Computer Industry?
  • What is the security issues about “Cloud Computing”?
  • How “Cloud Computing” create new service type and biz model?