Cloud Computing Session 3 – Iaas and Paas Dr. Jean-Claude

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Computing Session 3 – Iaas and Paas Dr. Jean-Claude Cloud Computing Session 3 – IaaS and PaaS Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences 1 Agenda 1 Session Overview 2 Infrastructure as a Service (Continued) 3 Platform as a Service (PaaS) 4 Summary and Conclusion 2 Session Agenda ▪ Session Overview ▪ Infrastructure as a Service (Continued) ▪ Platform as a Service (PaaS) ▪ Summary & Conclusion 3 What is the class about? ▪ Course description and syllabus: » http://www.nyu.edu/classes/jcf/CSCI-GA.3033-010/ » http://www.cs.nyu.edu/courses/spring20/CSCI-GA.3033-010/ ▪ Session 3 Reference material: » Web sites for various IaaS providers as noted in presentation » Web sites for various PaaS vendors as noted in presentation 4 Icons / Metaphors Information Common Realization Knowledge/Competency Pattern Governance Alignment Solution Approach 5 Agenda 1 Session Overview 2 Infrastructure as a Service (Continued) 3 Platform as a Service (PaaS) 4 Summary and Conclusion 6 IaaS & Amazon IaaS Cloud ▪ IaaS Cloud and Amazon EC2 » Amazon EC2 Programming » Deconstructing Provisioning (Create a Machine) in a IaaS Cloud ▪ Understanding and Leveraging On-Demand Infrastructure » How to Preserve State Using Amazon EBS • Persistence Storage for Data (EBS for now) • Persisting software/config changes by creating own AMI » Virtualization • Key enabler for on-demand resource availability ▪ Supporting Elasticity » Elasticity Basics » How Elasticity is Supported in Amazon » Project Ideas ▪ Object-Based Cloud Storage ▪ Large File Systems Concepts 7 Cloud History (1/2) ▪ 1950s ▪ Scientist Herb Grosch (author of Grosch's law) postulates that the entire world would eventually operate on dumb terminals powered by about 15 large data centers ▪ 1960s ▪ John McCarthy emits the opinion that "computation may someday be organized as a public utility“ ▪ 1966 ▪ In his book “The Challenge of the Computer Utility, Douglas Parkhill thoroughly explores all the modern- day characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), and the comparison to the electricity industry and the use of public, private, government, and community forms ▪ 1990s ▪ Telecommunications companies who previously offered primarily dedicated point-to-point data circuits, begin offering virtual private network (VPN) services with comparable quality of service but at a much lower cost ▪ By switching traffic to balance utilization as they see fit, they are able to utilize their overall network bandwidth more effectively ▪ The cloud symbol is used to denote the demarcation point between that which is the responsibility of the provider and that which is the responsibility of the user ▪ Cloud computing extends this boundary to cover servers as well as the network infrastructure ▪ 2006 ▪ Amazon launches Amazon Web Service (AWS) on a utility computing basis ▪ Effort triggered by the finding that he new cloud architecture results in significant internal efficiency improvements allowing small, fast-moving teams to add new features faster and more easily 8 Cloud History (2/2) ▪ 2008 ▪ Eucalyptus becomes the first open-source, AWS API-compatible platform for deploying private clouds ▪ OpenNebula (part of RESERVOIR European Commission-funded project) becomes the first open-source software for deploying private and hybrid clouds, and for the federation of clouds ▪ Real Time Cloud Environment created in the framework of the IRMOS European Commission- funded project as a result of efforts focused on providing quality of service guarantees, as required by real-time interactive applications, to cloud-based infrastructures ▪ Gartner sees an opportunity for cloud computing "to shape the relationship among consumers of IT services, those who use IT services and those who sell them"[16] and observes that "organizations are switching from company-owned hardware and software assets to per-use service-based models" so that the "projected shift to computing... will result in dramatic growth in IT products in some areas and significant reductions in other areas.“ ▪ 2012 - (CLUSE 2012), Bangalore, April 2012 ▪ Dr. Biju John and Dr. Souheil Khaddaj incorporated the semantic term into the cloud "Cloud computing is a universal collection of data which extends over the internet in the form of resources (such as information hardware, various platforms, services etc.) and forms individual units within the virtualization environment. Held together by infrastructure providers, service providers and the consumer, then it is semantically accessed by various users." 9 IaaS Cloud Service Model ▪ IaaS is a facility given to business enterprises that offers users the leverage of extra storage space in servers and data centers ▪ IaaS Cloud Providers Resources ▪ Physical Computers ▪ Virtual Machines ▪ Raw (Block) Storage ▪ Firewalls ▪ Load Balancers ▪ Networks ▪ Local area networks including IP addresses ▪ Internet wide area connectivity ▪ Configurable dedicated virtual private networks in carrier clouds ▪ Resources Characteristics ▪ On demand from large pools installed in providers data centers ▪ Billed on a “utility computing” basis, that is, cost reflects the amount of resources allocated and consumed ▪ Usage Mode ▪ Cloud users install OS images and application software on the cloud machines ▪ Cloud users are responsible for patching/maintaining OS/app software 10 Cloud Computing Characteristics (1/3) ▪ Agility improves with users' ability to re-provision technological infrastructure resources ▪ Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. Cloud computing systems typically use REST-based APIs ▪ Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure ▪ This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks ▪ Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house) ▪ The e-FISCAL project's state of the art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house 11 Cloud Computing Characteristics (2/3) ▪ Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone) ▪ As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere ▪ Virtualization technology allows servers and storage devices to be shared and utilization be increased ▪ Applications can be easily migrated from one physical server to another ▪ Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for: ▪ Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) ▪ Peak-load capacity increases (users need not engineer for highest possible load- levels) ▪ Utilization and efficiency improvements for systems that are often only 10–20% utilized ▪ Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery 12 Cloud Computing Characteristics (3/3) ▪ Scalability and Elasticity via dynamic ("on-demand") provisioning of resources on a fine- grained, self-service basis near real-time, without users having to engineer for peak loads ▪ Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface ▪ Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels ▪ Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford ▪ However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible ▪ Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security ▪ Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places 13 IaaS Vendor Solutions (1/4) ▪ e.g., Amazon EC2, HP, Microsoft, Savvis, Terremark, Right Scale, Rackspace cloud, IBM, Oracle, Verizon Private Cloud Public Cloud 14 IaaS Vendor Solutions – Public/VPC/Private “Accessible” IaaS (2/4) ▪ Amazon CloudFormation and Underlying Services (EC2) (Public/VPC IaaS/PaaS/SaaS) ▪ http://aws.amazon.com/ ▪ One year free usage tier ▪ GreenQloud ComputeQloud (VPC IaaS/PaaS) ▪ http://greenqloud.com/ ▪ 7-day trial ▪ Cloud computing services company operating out of Iceland, offering truly green cloud computing services powered by emission-free energy sources ▪ Services
Recommended publications
  • Certified Ubuntu on Joyent Cloud
    Certied Ubuntu on Joyent Cloud Ubuntu is the most popular Linux OS in the cloud. Every Joyent and Canonical share a focus and passion for open day, users choose Ubuntu for its performance, reliability and source technology. Joyent has been supporting key open robust ecosystem of tools and applications. As Joyent source projects such as SmartOS and Node.js for years and customers deploy their mission-critical and essential Canonical is the company driving the evolution and support of applications to the Joyent Cloud the importance of having a Ubuntu. By combining the uniquely powerful Joyent Cloud certied version of Ubuntu that is consistent and fully service with the best of breed Linux as a certied option backed by Canonical in their data center, private cloud or Joyent customers can enjoy the best possible user public cloud is essential. Joyent customers get the experience available in cloud. assurance that the Ubuntu they trust to run their business is highly optimized,fully secure and eligible for support and Accelerate your applications today! upgrade services from Canonical. à www.joyent.com à www.ubuntu.com/cloud/ecosystem Certied Ubuntu Value Enhancements for Joyent Users Ubuntu Cloud images, tuned and tested for the Joyent environment Stock Kernel • All kernel patches, drivers, tools and packages By using Stock Kernel for each release we have gained a faster boot • Timely image updates including critical bug xes and security time, increased overall performance, and a wider application usage updates such as supporting Docker out of the box. • Eligible for support from Canonical through Ubuntu Advantage Cloud-Init Cloud Image Quality Assurance Cloud-Init is the multi CSP system that handles early initialization of a • Joyent specic testing atop the Ubuntu Server testing cloud instance.
    [Show full text]
  • WEIYANG (STEPHEN) YUAN [email protected] | Chicago | 608-504-0649 | Stephenyuan.Urspace.Io Education University of Wisconsin-Madison B.S
    WEIYANG (STEPHEN) YUAN [email protected] | Chicago | 608-504-0649 | stephenyuan.urspace.io Education University of Wisconsin-Madison B.S. in Computer Engineering May 2020 ● GPA: 3.83/4.0 ​ ● Related Coursework: Operating Systems • A​ rtificial Intelligence • Computer Networks and Communication • Databases • Information Security • Big Data Systems • Android Mobile Development Skills ● Programming Languages: Java • Golang • C++ • Scala • MATLAB • SQL • Julia • C • Python ​ ● Technologies: Git, Linux, Java Spring, Amazon Web Services (AWS), MongoDB, Postgres, React, Node.js, Docker, Jenkins, ​ Play Framework, Hadoop, Spark, Wireshark, Visual Studio Experience Enfusion, Chicago Java Software Developer July 2020 - Current ● Develop the portfolio management software system used by over 500 clients that supports a variety of financial calculation and valuation over 20 financial derivatives as well as back office general ledger and cash flow with more than 10,000 daily positions on average ● Take responsibility in the whole development lifecycle from designing (10%), implementing (40%), running regression & unit testing (40%) to supporting internal and production issues (10%) ● Apply experience of Object-Oriented design patterns and best practices to creating a robust and reliable infrastructure for the system with knowledge of Java SE, Hibernate, JMS, JVM and MySQL and deliver constant results in weekly production ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ release ● Automate development and testing frameworks by writing python and shell scripts to improve overall
    [Show full text]
  • BEST PRACTICE GUIDE for CLOUD and AS-A-SERVICE PROCUREMENTS Executive Summary 1 Introduction
    BEST PRACTICE GUIDE FOR CLOUD AND AS-A-SERVICE PROCUREMENTS Executive Summary 1 Introduction Specific Models and Understanding Cloud Procurement Service Models Data EXECUTIVE SUMMARY Breach Notification Personnel Security While private companies rapidly move systems and Vendors share blame, too. Lots of cloud providers are new to Encryption applications to the cloud, public agencies still struggle to adopt public sector business, having grown up selling to consumers Audits Operations hosted services that could save money and provide better value. and private firms. These companies don’t always understand Hybrid Cloud Environments legitimate demands that make government contracting Preparation for Migrating Yet states and localities have much to gain from the different from selling to other markets. Failure to accommodate Workloads to the Cloud technology industry’s “as-a-service” revolution. Many unique government requirements can be a deal-breaker for jurisdictions face huge legacy system replacement challenges. agencies charged with protecting the public’s interests. Conclusion They’re also under pressure to provide new classes of digital services. The cloud can offer a better path toward All too often, government and industry aren’t on the same page Workgroup Members modernization — there’s no hardware to buy, you’re always when it comes to cloud services. They may not even speak the and Contributors on the latest version of the software and system capacity same language. can be adjusted almost instantly based on your needs. Appendix 1 Bridging the Gap Model Terms and Conditions Templates So why is government lagging behind? The fact is that These pressures led us to release the first version of this guide Software-as-a-Service governments often struggle to buy cloud-based services because two years ago.
    [Show full text]
  • Installing, Configuring, and Running the Open Edx Platform: Eucalyptus
    Installing, Configuring, and Running the Open edX Platform: Eucalyptus Release Release September 30, 2016 Contents 1 General Information 3 1.1 Read Me.................................................3 1.2 Other edX Resources...........................................3 1.3 edX Browser Support..........................................9 1.4 Change Log...............................................9 2 Open edX Platform Releases 11 2.1 Open edX Eucalyptus Release...................................... 11 2.2 Open edX Dogwood Release....................................... 13 2.3 Open edX Cypress Release....................................... 17 2.4 Open edX Birch Release......................................... 19 3 Installing and Starting the Open edX Platform 23 3.1 Open edX Platform Installation Options................................. 23 3.2 Installation Prerequisites......................................... 26 3.3 Getting Help............................................... 26 3.4 Installing and Starting Devstack..................................... 27 3.5 Installing and Starting Fullstack..................................... 31 3.6 Installing and Starting Analytics Devstack............................... 33 4 Configuring the Open edX Platform 39 4.1 Guidelines for Updating the Open edX Platform............................ 39 4.2 Configuring Open edX Sites....................................... 39 4.3 Changing the Appearance of Open edX Sites.............................. 41 4.4 Adding Custom Fields to the Registration Page............................
    [Show full text]
  • IBM Cloud Unit 2016 IBM Cloud Unit Leadership Organization
    IBM Cloud Technical Academy IBM Cloud Unit 2016 IBM Cloud Unit Leadership Organization SVP IBM Cloud Robert LeBlanc GM Cloud Platform GM Cloud GM Cloud Managed GM Cloud GM Cloud Object Integration Services Video Storage Offering Bill Karpovich Mike Valente Braxton Jarratt Line Execs Line Execs Marie Wieck John Morris GM Strategy, GM Client Technical VP Development VP Service Delivery Business Dev Engagement Don Rippert Steve Robinson Harish Grama Janice Fischer J. Comfort (GM & CTO) J. Considine (Innovation Lab) Function Function Leadership Leadership VP Marketing GM WW Sales & VP Finance VP Human Quincy Allen Channels Resources Steve Cowley Steve Lasher Sam Ladah S. Carter (GM EcoD) GM Design VP Enterprise Mobile GM Digital Phil Gilbert Phil Buckellew Kevin Eagan Missions Missions Enterprise IBM Confidential IBM Hybrid Cloud Guiding Principles Choice with! Hybrid ! DevOps! Cognitive Powerful, Consistency! Integration! Productivity! Solutions! Accessible Data and Analytics! The right Unlock existing Automation, tooling Applications and Connect and extract workload in the IT investments and composable systems that insight from all types right place and Intellectual services to increase have the ability to of data Property speed learn Three entry points 1. Create! 2. Connect! 3. Optimize! new cloud apps! existing apps and data! any app! 2016 IBM Cloud Offerings aligned to the Enterprise’s hybrid cloud needs IBM Cloud Platform IBM Cloud Integration IBM Cloud Managed Offerings Offerings Services Offerings Mission: Build true cloud platform
    [Show full text]
  • The Cloud‐Based Demand‐Driven Supply Chain
    The Cloud-Based Demand-Driven Supply Chain Wiley & SAS Business Series The Wiley & SAS Business Series presents books that help senior-level managers with their critical management decisions. Titles in the Wiley & SAS Business Series include: The Analytic Hospitality Executive by Kelly A. McGuire Analytics: The Agile Way by Phil Simon Analytics in a Big Data World: The Essential Guide to Data Science and Its Applications by Bart Baesens A Practical Guide to Analytics for Governments: Using Big Data for Good by Marie Lowman Bank Fraud: Using Technology to Combat Losses by Revathi Subramanian Big Data Analytics: Turning Big Data into Big Money by Frank Ohlhorst Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics by Evan Stubbs Business Analytics for Customer Intelligence by Gert Laursen Business Intelligence Applied: Implementing an Effective Information and Communications Technology Infrastructure by Michael Gendron Business Intelligence and the Cloud: Strategic Implementation Guide by Michael S. Gendron Business Transformation: A Roadmap for Maximizing Organizational Insights by Aiman Zeid Connecting Organizational Silos: Taking Knowledge Flow Management to the Next Level with Social Media by Frank Leistner Data-Driven Healthcare: How Analytics and BI Are Transforming the Industry by Laura Madsen Delivering Business Analytics: Practical Guidelines for Best Practice by Evan Stubbs ii Demand-Driven Forecasting: A Structured Approach to Forecasting, Second Edition by Charles Chase Demand-Driven Inventory
    [Show full text]
  • Elliptic Curve Cryptography in Cloud Computing Security
    Elliptic curve cryptography in cloud computing security Manu Gopinathan ([email protected]) Øyvind Nygard ([email protected]) Kjetil Aune([email protected]) December 1st, 2015 1 Abstract Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on their own computer and without the need for extensive compatibility configurations. Many such cloud applications provide services that are meant to handle sensitive user data and thus the protection of this data in terms of access and integrity is of major concern. Space- and time complexity of encryption algorithms can prove to be imperative when it comes to system performance. In this paper we will briefly present how elliptic curve cryptography (EEC) works, and then describe the advantages of it and how it can be used as an encryption solution to security related issues in cloud computing. 2 Introduction In this section we will briefly describe the notion of cloud computing to aid us in the discussion of ECC in cloud computing later. According to the National Institute of Standards and Technology (NIST), essential characteristics for a service based on the cloud computing model are [1]: 1. On-demand self-service: The consumer can provision service capabilities, such as server time and network storage, without actively interacting with the service provider. 2.
    [Show full text]
  • HP Datacenter Care - Datacenter Care for Cloud Datasheet Addendum HP Technology Services - Contractual Services
    Technical data HP Datacenter Care - Datacenter Care for Cloud datasheet addendum HP Technology Services - Contractual Services HP Datacenter Care for Cloud (DC4C) is a version of HP Datacenter Care developed to address the needs of complex private cloud and hybrid cloud environments built on the HP CloudSystem infrastructure and HP cloud management software. A primary feature of DC4C is its linkage to, and collaboration with, your HP Software Premier Support. Optional features and services can be added to DC4C to accommodate public cloud service providers, pay-per-use pricing, multivendor management, and more. Core features and options include the following: – Coordinates the sale, invoicing, and delivery of HP Datacenter Care and HP Software Premier Support for a simplified and unified experience across cloud infrastructure and cloud management software when purchased at the same time and under the same support coverage period – Joins together the Datacenter Care and Premier Support account teams and augments the deliverables they provide – Coordinates activities provided by Matrix Master technical experts when included in your DC4C Statement of Work – Can combine with Datacenter Care Flexible Capacity and Primary Service Provider capabilities – Offers a Hybrid Cloud Support (HCS) option to accommodate cloud service providers The features of HP Datacenter Care and Premier Support are fully described in their respective data sheets. This Datacenter Care for Cloud data sheet addendum highlights features or requirements that are different when the customer purchases these two services as a Datacenter Care for Cloud configuration, and highlights additional features or options that are of special interest in cloud environments. A mutually agreed-upon and executed Statement of Work will detail these additional features based upon your needs when you purchase Datacenter Care for Cloud along with your purchase of HP Software Premier Support.
    [Show full text]
  • Q& a – Wavemaker Demo/Training Webinar – March 15, 2016
    Q& A – WaveMaker Demo/Training Webinar – March 15, 2016 Q: Is there a workflow engine ie BPMN v2 A: WaveMaker has strong integrations with APIs, web services and SDKs. You can integrate with rules engine platforms like JBPM and Drools using their Java SDKs (jars) or through their ReST APIs. You need to do this only if the workflow requires very complex workflows. Otherwise, the native capabilities of the WaveMaker should be enough to take care of your app requirements. Q: on oracle db's there are schemas, which should be considered...what is important to consider regarding to that (schema)? do I have to import the tables over each schema or is there a way how to import the whole tables (over all schemas)...? A: WaveMaker allows you to import tables from multiple schemas. See the image below. This is the second step of importing an Oracle DB. [Steps: Import > Database > Select Oracle > ….] Q: Can we provide read only access to a user group? A: For instance if you are dealing with an editable grid, which has an add/save button, all you to do is to hide the button for users with a specific role. If you are dealing with a specific widget then you can use the conditional read-only option as shown below. Here you need to write a one-line javascript as shown below, where the users with the role “rolename” will be presented a read-only birthdate. Q: Can we integrate the application for SSO ? A: You can configure SSO easily through the following approach.
    [Show full text]
  • 8. IBM Z and Hybrid Cloud
    The Centers for Medicare and Medicaid Services The role of the IBM Z® in Hybrid Cloud Architecture Paul Giangarra – IBM Distinguished Engineer December 2020 © IBM Corporation 2020 The Centers for Medicare and Medicaid Services The Role of IBM Z in Hybrid Cloud Architecture White Paper, December 2020 1. Foreword ............................................................................................................................................... 3 2. Executive Summary .............................................................................................................................. 4 3. Introduction ........................................................................................................................................... 7 4. IBM Z and NIST’s Five Essential Elements of Cloud Computing ..................................................... 10 5. IBM Z as a Cloud Computing Platform: Core Elements .................................................................... 12 5.1. The IBM Z for Cloud starts with Hardware .............................................................................. 13 5.2. Cross IBM Z Foundation Enables Enterprise Cloud Computing .............................................. 14 5.3. Capacity Provisioning and Capacity on Demand for Usage Metering and Chargeback (Infrastructure-as-a-Service) ................................................................................................................... 17 5.4. Multi-Tenancy and Security (Infrastructure-as-a-Service) .......................................................
    [Show full text]
  • Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE College India
    Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE college India. India. Abstract: In this paper we reviewed the technical and service aspects of different Cloud providers and presents the comparisons of these selected service offerings in cloud computing. By this User can have good understanding regarding services provided to avoid bottlenecks are also obstacles that could limit the growth. This comparison of cloud service providers, to serve as a starting point for user looking to take throw service and for Selecting the better one for there need into cloud environment . Keywords: Cloud Computing, Service Vendors, Cloud Services. I. Introduction As the use of computers in our day-to-day life has increased, the computing resources that we need also grown up. It was costly to buy a mainframe and computer‘s, it became important to find the alternative ways to get the greatest return on the investment, allowing multiple users to share among both the physical access to the computer from multiple terminals and to share the CPU time, eliminating periods of inactivity, which became known in the industry as time- sharing[1]. The origin of the term cloud computing is vague, but it appears to derive from the way of drawings of stylized clouds to denote networks in diagrams of computing and communications systems.Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application‘s to a ‗cloud‘ of computers.
    [Show full text]
  • Deliverable No. 5.3 Techniques to Build the Cloud Infrastructure Available to the Community
    Deliverable No. 5.3 Techniques to build the cloud infrastructure available to the community Grant Agreement No.: 600841 Deliverable No.: D5.3 Deliverable Name: Techniques to build the cloud infrastructure available to the community Contractual Submission Date: 31/03/2015 Actual Submission Date: 31/03/2015 Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Grant Agreement no. 600841 D5.3 – Techniques to build the cloud infrastructure available to the community COVER AND CONTROL PAGE OF DOCUMENT Project Acronym: CHIC Project Full Name: Computational Horizons In Cancer (CHIC): Developing Meta- and Hyper-Multiscale Models and Repositories for In Silico Oncology Deliverable No.: D5.3 Document name: Techniques to build the cloud infrastructure available to the community Nature (R, P, D, O)1 R Dissemination Level (PU, PP, PU RE, CO)2 Version: 1.0 Actual Submission Date: 31/03/2015 Editor: Manolis Tsiknakis Institution: FORTH E-Mail: [email protected] ABSTRACT: This deliverable reports on the technologies, techniques and configuration needed to install, configure, maintain and run a private cloud infrastructure for productive usage. KEYWORD LIST: Cloud infrastructure, OpenStack, Eucalyptus, CloudStack, VMware vSphere, virtualization, computation, storage, security, architecture. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement no 600841. The author is solely responsible for its content, it does not represent the opinion of the European Community and the Community is not responsible for any use that might be made of data appearing therein.
    [Show full text]