The Evolution of Cloud Computing

Total Page:16

File Type:pdf, Size:1020Kb

The Evolution of Cloud Computing Read the complete book: www.bcs.org/books/cloud Read the complete book: www.bcs.org/books/cloud THE EVOLUTION OF CLOUD COMPUTING Read the complete book: www.bcs.org/books/cloud BCS, THE CHARTERED INSTITUTE FOR IT BCS, The Chartered Institute for IT, is committed to making IT good for society. We use the power of our network to bring about positive, tangible change. We champion the global IT profession and the interests of individuals engaged in that profession, for the benefit of all. Exchanging IT expertise and knowledge The Institute fosters links between experts from industry, academia and business to promote new thinking, education and knowledge sharing. Supporting practitioners Through continuing professional development and a series of respected IT qualifica- tions, the Institute seeks to promote professional practice tuned to the demands of business. It provides practical support and information services to its members and volunteer communities around the world. Setting standards and frameworks The Institute collaborates with government, industry and relevant bodies to establish good working practices, codes of conduct, skills frameworks and common standards. It also offers a range of consultancy services to employers to help them adopt best practice. Become a member Over 70,000 people including students, teachers, professionals and practitioners enjoy the benefits of BCS membership. These include access to an international community, invitations to a roster of local and national events, career development tools and a quar- terly thought-leadership magazine. Visit www.bcs.org/membership to find out more. Further Information BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, United Kingdom. T +44 (0) 1793 417 424 F +44 (0) 1793 417 444 www.bcs.org/contact http://shop.bcs.org/ Read the complete book: www.bcs.org/books/cloud THE EVOLUTION OF CLOUD COMPUTING How to plan for change Clive Longbottom Read the complete book: www.bcs.org/books/cloud © BCS Learning & Development Ltd 2017 All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted by the Copyright Designs and Patents Act 1988, no part of this publication may be repro- duced, stored or transmitted in any form or by any means, except with the prior permission in writing of the publisher, or in the case of reprographic reproduction, in accordance with the terms of the licences issued by the Copyright Licensing Agency. Enquiries for permission to reproduce material outside those terms should be directed to the publisher. All trade marks, registered names etc. acknowledged in this publication are the property of their respective owners. BCS and the BCS logo are the registered trade marks of the British Computer Society, charity number 292786 (BCS). Published by BCS Learning & Development Ltd, a wholly owned subsidiary of BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, UK. www.bcs.org Paperback ISBN: 978-1-78017-358-0 PDF ISBN: 978-1-78017-359-7 ePUB ISBN: 978-1-78017-360-3 Kindle ISBN: 978-1-78017-361-0 British Cataloguing in Publication Data. A CIP catalogue record for this book is available at the British Library. Disclaimer: The views expressed in this book are those of the authors and do not necessarily reflect the views of the Institute or BCS Learning & Development Ltd except where explicitly stated as such. Although every care has been taken by the authors and BCS Learning & Development Ltd in the preparation of the publication, no warranty is given by the authors or BCS Learning & Development Ltd as publisher as to the accuracy or com- pleteness of the information contained within it and neither the authors nor BCS Learning & Development Ltd shall be responsible or liable for any loss or damage whatsoever arising by virtue of such information or any instructions or advice contained within this publication or by any of the aforementioned. Publisher’s acknowledgements Reviewers: Andy Wilton and Matthew McGrory Publisher: Ian Borthwick Commissioning Editor: Rebecca Youé Production Manager: Florence Leroy Project Manager: Anke Ueberberg Copy-editor: Hazel Bird Proofreader: David Palser Indexer: Jonathan Burd Cover design: Alex Wright Cover image: Friedrich Böhringer Typeset by Lapiz Digital Services, Chennai, India. iv Read the complete book: www.bcs.org/books/cloud CONTENTS List of figures ix About the Author x Foreword xi Acknowledgements xii Abbreviations xiii Glossary xvii Preface xxiii PART 1 LOOKING BACK: CLOUD COMPUTING IN CONTEXT 1 1. BACKGROUND 3 Looking backward to look forward 3 The price war 4 The rise of the PC 5 Changing to a distributed model 6 Web computing to the fore 7 The rise of the age of chaos 8 Virtualisation, service-oriented architecture and grid computing 8 The role of standards 10 Summary 11 PART 2 THE CLOUD NOW: CLOUD AT ITS SIMPLEST, AS IT SHOULD BE IMPLEMENTED 13 2. THE CLOUD 15 Back to the future 15 Summary 21 3. WHY CLOUD? 23 Resource utilisation 23 Cost 26 Meeting future needs 28 Workload portability 29 High availability 31 Summary 31 4. BASIC CLOUD PLATFORMS 32 Popular cloud platforms 32 The architecture of a cloud 36 v Read the complete book: www.bcs.org/books/cloud CONTENTS Open compute project 39 Summary 40 5. ALTERNATIVE CLOUD PLATFORMS 41 Private and public cloud offerings 41 Container platforms 45 The current chaos of cloud 47 Summary 52 6. ALTERNATIVE CLOUD MODELS 54 Cloud broker 54 Cloud aggregator 55 Summary 56 7. MAIN TYPES OF SaaS CLOUD SERVICES 58 SaaS cloud services 58 File share and sync 59 Shadow IT 61 Summary 64 8. WHERE SHOULD A CLOUD PLATFORM RESIDE? 65 Private clouds 65 Where should private clouds be based? 65 Hybrid clouds 66 The organisational value chain 68 The use of colocation facilities 69 Data centre and cloud tiering 70 Summary 73 9. PAYING FOR CLOUD SERVICES 74 The battle between cost levels and their predictability, and business flexibility 74 Basic cost models 75 Increasing cost model complexity 76 Cost tiering 77 Summary 80 PART 3 THE VERY NEAR FUTURE: CLOUD AT A MORE COMPLEX LEVEL, AS YOU SHOULD BE IMPLEMENTING IT 81 10. BUILDING THE RIGHT CLOUD 83 Mixing clouds 83 Planning for workload migrations 84 It’s all about the process 85 Summary 88 11. ISSUES WITH CLOUD COMPUTING 89 System availability 89 Data security 91 Performance 92 vi Read the complete book: www.bcs.org/books/cloud CONTENTS The need for standards and APIs 94 ‘Noisy neighbours’ 95 The business issues of highly dynamic cloud-based systems 97 Software and usage licensing issues 99 The mirage of self-service 101 The cessation of service by a provider 102 Maintaining governance in a hybrid cloud 105 Summary 106 12. CLOUD AND THE ‘CDs’ 107 Why use CD? 107 DevOps flows 108 Summary 109 13. CREATING THE BUSINESS CASE FOR THE CLOUD 111 Total value proposition 111 Summary 118 14. SCALE OUT, SCALE UP AND SCALE THROUGH 119 Building the right cloud platform 119 The cloud and ‘software defined’ 121 The power of idempotency 122 Converged and hyperconverged systems 123 Summary 125 15. CLOUD AND DATA 127 Data sovereignty 127 Data flows 128 Database issues 129 Distance and latency 130 High availability 130 Summary 131 16. CLOUD SECURITY 133 The myth of data security in private data centres 133 Assume that security is breached 135 Data classification 136 The badly protected walled garden 138 The importance of multi-factor single sign-on 140 Edge security 142 Physical security 143 Summary 144 17. VIRTUALISATION, SHARABLE RESOURCES AND ELASTICITY 145 The lure of virtualisation 145 The move to cloud 146 Scaling for massive use: G-Cloud 148 Summary 149 vii Read the complete book: www.bcs.org/books/cloud CONTENTS 18. THE CHANGE IN APPLICATIONS 151 The death of the monolith 151 The need for technical contracts 152 Summary 155 19. APPLICATIONS, VIRTUAL MACHINES AND CONTAINERS 156 The differences between virtual machines and containers 156 The future for containers 160 Summary 161 20. FULL AUDIT IS REQUIRED 162 The importance of a full audit 162 Summary 166 21. MONITORING, MEASURING AND MANAGING THE CLOUD 167 Modern levels of standardisation and abstraction 167 Choosing an over-arching system to manage chaos 168 Automate for effectiveness and efficiency 169 Summary 169 PART 4 THE FUTURE OF CLOUD: CLOUD AS YOU SHOULD BE PLANNING FOR IT IN THE FURTHER-OUT FUTURE 171 22. THE ULTIMATE FUTURE 173 The evolution of the cloud 173 Summary 174 23. IN CONCLUSION 175 Index 176 viii Read the complete book: www.bcs.org/books/cloud LIST OF FIGURES Figure 2.1 The sliding scale of ownership in different IT platform models 17 Figure 2.2 BS ISO/IEC 17788:2014 cloud service categories and cloud capability types 20 Figure 3.1 Variable workload model 24 Figure 4.1 Main AWS functional architecture 37 Figure 4.2 Main Microsoft Azure functional architecture 37 Figure 4.3 Main Google Cloud Platform functional architecture 38 Figure 4.4 Basic OpenStack functional architecture 39 Figure 6.1 Cloud broker 55 Figure 6.2 Cloud aggregator 56 Figure 8.1 Disconnected hybrid platform 67 Figure 8.2 Integrated hybrid platform 67 Figure 8.3 Simple value chain 68 Figure 9.1 Tiered costing 77 Figure 10.1 Bridging the capability gap 85 Figure 10.2 The process pyramid 87 Figure 11.1 The impact of data latency in different architectures 93 Figure 12.1 Conceptual flow chart of the DevOps process 109 Figure 13.1 Total value proposition: scope, resources and time 112 Figure 13.2 Total value proposition:
Recommended publications
  • Google Cloud Issue Summary Multiple Products - 2020-08-19 All Dates/Times Relative to US/Pacific
    Google Cloud Issue Summary Multiple Products - 2020-08-19 All dates/times relative to US/Pacific Starting on August 19, 2020, from 20:55 to 03:30, multiple G Suite and Google Cloud Platform products experienced errors, unavailability, and delivery delays. Most of these issues involved creating, uploading, copying, or delivering content. The total incident duration was 6 hours and 35 minutes, though the impact period differed between products, and impact was mitigated earlier for most users and services. We understand that this issue has impacted our valued customers and users, and we apologize to those who were affected. DETAILED DESCRIPTION OF IMPACT Starting on August 19, 2020, from 20:55 to 03:30, Google Cloud services exhibited the following issues: ● Gmail: The Gmail service was unavailable for some users, and email delivery was delayed. About ​ 0.73% of Gmail users (both consumer and G Suite) active within the preceding seven days experienced 3 or more availability errors during the outage period. G Suite customers accounted for 27% of affected Gmail users. Additionally, some users experienced errors when adding attachments to messages. Impact on Gmail was mitigated by 03:30, and all messages delayed by this incident have been delivered. ● Drive: Some Google Drive users experienced errors and elevated latency. Approximately 1.5% of Drive ​ users (both consumer and G Suite) active within the preceding 24 hours experienced 3 or more errors during the outage period. ● Docs and Editors: Some Google Docs users experienced issues with image creation actions (for ​ example, uploading an image, copying a document with an image, or using a template with images).
    [Show full text]
  • Rclone Mount Using Systemd
    Rclone Mount using Systemd This guide is for advanced users only and it serves as a guide for you to use rclone. The systemd files here are the recommended settings for our slots and will subject to change whenever there are new configurations that are appropriate for the slots. Furthermore, Ultra.cc is not responsible for any data loss or application errors due to this setup should you proceed and will not provide official support for it due to the large volume of variables and different configurations possible with rclone. You may visit the community discord server for help. Please make yourself aware of the Ultra.cc Fair Usage Policy. It is very important not to mount your Cloud storage to any of the premade folders, this creates massive instability for both you and everyone else on your server. Always follow the documentation and create a new folder for mounting. It is your responsibility to ensure usage is within acceptable limits. Ignorance is not an excuse. Please do not mount to any of the default directories such as: files media bin .apps .config www /homexx/username/ or any pre-created directory found on your Ultra.cc Slot Rclone's Mount allows you to mount any of your cloud storage accounts as part of your slot's file system using FUSE. In this guide, we will teach you how to run a rclone mount using systemd. Take note that this guide is setup using Google Drive as the cloud storage provider used. Should you use any other cloud storage providers, you may need consult rclone documentation for the appropriate flags for your setup.
    [Show full text]
  • TIBCO Jasperreports® Server Administrator Guide
    TIBCO JasperReports® Server Administrator Guide Software Release 7.8 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • Apigee X Migration Offering
    Apigee X Migration Offering Overview Today, enterprises on their digital transformation journeys are striving for “Digital Excellence” to meet new digital demands. To achieve this, they are looking to accelerate their journeys to the cloud and revamp their API strategies. Businesses are looking to build APIs that can operate anywhere to provide new and seamless cus- tomer experiences quickly and securely. In February 2021, Google announced the launch of the new version of the cloud API management platform Apigee called Apigee X. It will provide enterprises with a high performing, reliable, and global digital transformation platform that drives success with digital excellence. Apigee X inte- grates deeply with Google Cloud Platform offerings to provide improved performance, scalability, controls and AI powered automation & security that clients need to provide un-parallel customer experiences. Partnerships Fresh Gravity is an official partner of Google Cloud and has deep experience in implementing GCP products like Apigee/Hybrid, Anthos, GKE, Cloud Run, Cloud CDN, Appsheet, BigQuery, Cloud Armor and others. Apigee X Value Proposition Apigee X provides several benefits to clients for them to consider migrating from their existing Apigee Edge platform, whether on-premise or on the cloud, to better manage their APIs. Enhanced customer experience through global reach, better performance, scalability and predictability • Global reach for multi-region setup, distributed caching, scaling, and peak traffic support • Managed autoscaling for runtime instance ingress as well as environments independently based on API traffic • AI-powered automation and ML capabilities help to autonomously identify anomalies, predict traffic for peak seasons, and ensure APIs adhere to compliance requirements.
    [Show full text]
  • Google Cloud Identity Services
    INTRODUCING Google Cloud Identity Services One account. All of Google Enter your email Next Enterprise identity made easy A robust and secure identity model is the foundation for enterprise success. Google Cloud’s identity services bring user lifecycle management, directory services, account security, single sign-on, mobile device management and more in a simple integrated solution. Introduction Millions of businesses and schools rely on Google Cloud’s identity services every day when they sign in to products like Google Drive and Google Cloud Platform (GCP). They offer core identity services that make it simple, secure and reliable for users to log in and for administrators to manage usage across the organization. These core features fall into six main areas, where we focus. • User Lifecyle Management • Single sign-on (SSO) • Directory • Reporting & Analytics • Account Security • Endpoint Management User Lifecyle Management Endpoint Directory Management Google Identity Account Security Reporting & Analytics SSO “Google provides business-critical solutions like serving as the central secure access point for cloud apps, while also providing infrastructure for these services like the identity directory.” -Justin Slaten, Manager, Enterprise Technology & Client Systems at Netflix User Lifecycle Management Directory Users are the core of any identity platform, and Google Cloud identity services make it easy the ability to manage access when they join, move to manage users and groups. Everything from within, or leave an organization is important to setting permissions to resetting passwords is administrators. Google Cloud identity services in one location so administrators can quickly make user lifecycle management easy with complete common tasks. Individual Google the unified Google Admin console and APIs.
    [Show full text]
  • Data Warehouse Offload to Google Bigquery
    DATA WAREHOUSE OFFLOAD TO GOOGLE BIGQUERY In a world where big data presents both a major opportunity and a considerable challenge, a rigid, highly governed traditional enterprise data warehouse isn’t KEY BENEFITS OF MOVING always the best choice for processing large workloads, or for applications like TO GOOGLE BIGQUERY analytics. Google BigQuery is a lightning-fast cloud-based analytics database that lets you keep up with the growing data volumes you need to derive meaningful • Reduces costs and business value, while controlling costs and optimizing performance. shifts your investment from CAPEX to OPEX Pythian’s Data Warehouse Offload to Google BigQuery service moves your workload from an existing legacy data warehouse to a Google BigQuery data • Scales easily and on demand warehouse using our proven methodology and Google experts–starting with a fixed-cost Proof of Concept stage that will quickly demonstrate success. • Enables self-service analytics and advanced analytics GETTING STARTED The Pythian Data Warehouse Offload to Google BigQuery service follows a proven methodology and delivers a Proof of Concept (POC) that demonstrates viability and value within three to four weeks. The POC phase will follow this workflow: 1. Assess existing data warehouse environment to identify tables and up to two reports that will be offloaded in this phase 2. Provision GCP infrastructure including Cloud storage, Bastion hosts, BigQuery, and Networking 3. Implement full repeatable extract/load process for selected tables 4. Implement selected reports on BigQuery 5. Produce report PYTHIAN DELIVERS By the end of the first stage of our engagement, you can expect to have: • Working prototype on BigQuery • Up to two reports • Demonstrated analysis capabilities using one fact with five associated dimensions www.pythian.com • Report that includes: an assessment of your current setup and support you need to plan and maintain your full (including a cost analysis for BigQuery), performance/ Google BigQuery data warehouse and enterprise analytics usability analysis of POC vs.
    [Show full text]
  • CIO Guide to Application Modernization
    CIO Guide to Application Modernization May 2020 2 What You Need To Know The global pandemic has put unexpected pressures on businesses of all sorts — in ways no one was projecting at the beginning of the year. As a result, CIOs face a series of urgent challenges: • How can they raise system visibility and system control over operations that are more dispersed and changing than ever? • How can they cut costs, yet create a more agile and responsive IT system? • How can they do more with older data, even as they understand better the data from a market that is changing every week? • How can they help people work faster, with a minimum of change management, or set the stage for growth, while preserving capital? In many cases the answer is a step-by-step deployment of cloud computing technology, tailored to meet the most pressing needs first. Working with a comprehensive cloud provider, it is possible to create cloud systems that respect and preserve core assets, while enabling rapid modernization, in particular for the cost-aware agility and resilience of modern application architecture. Why You Should Keep Reading This guide offers a series of approaches to application modernization, from identifying needs and developing an action-oriented roadmap, to methods of identifying and effecting meaningful change in the most critical parts of your IT operations. We have also included at the end a list of key solutions that Google Cloud and our technology partners have to give your organization fast results. 3 Introduction Even before the current crisis, IT organizations saw pressure to be more agile and innovative.
    [Show full text]
  • Expedite Base/MVS 4.6 Programming Guide
    GXS EDI Services Expedite Base/MVS Programming Guide Version 4 Release 6 GC34-2204-05 Sixth Edition (November 2005) This edition applies to Expedite Base/MVS, Version 4 Release 6, and replaces GC34-2204-04. © Copyright GXS, Inc. 1994, 2005. All rights reserved. Government Users Restricted Rights - Use, duplication, or disclosure restricted. Contents . To the reader . xi Who should read this book . xi Terminology conventions . xi Type conventions . xii How this book is organized . xii Sample files . xiv Summary of changes . xiv Related books . xiv Chapter 1. Introducing Expedite Base/MVS . 1 Information Exchange . 1 Understanding the Expedite Base/MVS operating environment . 2 Hardware requirements . 2 Software requirements . 2 Connecting to Information Exchange . 2 Starting an Information Exchange session . 3 Ending an Information Exchange session . 3 Giving commands to Expedite Base/MVS . 3 Getting responses from Expedite Base/MVS . 3 Understanding command syntax . 4 Identifying Expedite Base/MVS error messages . 5 Identifying Information Exchange error messages . 5 Identifying Expedite Base/MVS completion codes . 5 Sending and receiving data . 5 Send and Receive file number limits . 6 Free-format messages . 7 Acknowledgments . 7 Restart and recovery considerations . 7 Providing security . 8 Selecting the Extended Security Option . 8 Working with libraries . 9 © Copyright GXS, Inc. 1994, 2005 iii Expedite Base/MVS Programming Guide Chapter 2. Setting up files, including the JCL . 11 How Expedite Base/MVS uses its primary files . 11 Expedite Base/MVS files . 12 File limitations . 12 Descriptions of required files . 13 Profile command file (INPRO) . 13 Profile response file (OUTPRO) . 14 Message command file (INMSG) . 15 Message response file (OUTMSG) .
    [Show full text]
  • Telco Edge Cloud: Edge Service Description and Commercial Principles Whitepaper October 2020
    Telco Edge Cloud: Edge Service Description and Commercial Principles Whitepaper October 2020 About the GSMA About the Telco Edge Cloud Group The GSMA represents the interests of The Telco Edge Cloud (TEC) group brings mobile operators worldwide, uniting more together over 20 operators, covering all than 750 operators with over 350 regions, who are working to promote a companies in the broader mobile collaborative deployment of cloud capabilities ecosystem, including handset at the edge of their networks. TEC is aiming to and device makers, software companies, align Multi-Access Edge Computing (MEC) equipment providers and internet business models, charging principles and companies, as well as organisations in commercial deployment considerations. adjacent industry sectors. The GSMA also produces the industry-leading MWC events TEC is working in partnership with the GSMA held annually in Barcelona, Los Angeles Operator Platform Group, which aims to create and Shanghai, as well as the Mobile 360 the architecture and technical requirements to Series of regional conferences. guide other Standard Developing Organisations (SDOs) in the development of For more information, please visit the specifications. GSMA corporate website at www.gsma.com. Follow the GSMA on Twitter: @GSMA. Executive Summary The Telco Edge Cloud taskforce was launched in the GSMA in March 2020 by 19 operators with the intention to design and develop a global edge computing service based on the federation of the edge infrastructures and platforms of a set of operators and edge service providers. Following its principle of being open and inclusive, the taskforce has grown to 25 members at the time of edition of this whitepaper and has set the basis for the global service launch.
    [Show full text]
  • Trusting Your Data with Google Cloud Platform
    Trusting your data with Google Cloud Platform At Google Cloud we’ve set a high bar for what it means to host, serve, and protect customer data. Security and data protection are fundamental to how we design and build our products. We start from the fundamental premise that Google Cloud Platform (GCP) customers own their data and control how it is used. The data a customer stores and manages on GCP systems is only used to provide that customer with GCP services and to make GCP services work better for them, and for no other purpose. Not advertising, not for anything else. Period. We have robust internal controls and auditing to protect against insider access to customer data. This includes providing our customers with near real-time logs of Google administrator access on GCP; GCP is the only major cloud to provide this level of access transparency. In addition to continuous security monitoring, all customer data stored in GCP is encrypted at rest and in transit by default. Customers can also choose to manage their own encryption keys using GCP’s Cloud Key Management Service, a feature commonly referred to as “customer-managed encryption keys (CMEK).” We also enable our customers to monitor their own account activity. We provide reports and logs that make it easy for a customer’s administrator to examine potential security risks, track access, analyze administrator activity, and much more. Administrators in your organization can also leverage Cloud Data Loss Prevention (DLP) capabilities to protect sensitive information. DLP adds a layer of protection to identify, redact, and prevent sensitive or private information from leaking outside of an organization.
    [Show full text]
  • Proquest Dissertations
    REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • Information Technology Creates New Opportunities for Network Service Providers
    White Paper “In the Cloud” Information Technology Creates New Opportunities for Network Service Providers Authors Seanan Murphy and Wagdy Samir Service Provider Practice Cisco Internet Business Solutions Group August 2008 Cisco Internet Business Solutions Group (IBSG) Cisco IBSG © 2008 Cisco Systems, Inc. All rights reserved. White Paper “In the Cloud” Information Technology Creates New Opportunities for Network Service Providers Introduction For the past several years, incumbent telecommunications service providers (SPs1) have faced a decline in core legacy revenues, such as fixed-line voice and legacy packet data services in the enterprise and small- and medium-sized business (SMB) markets, which has forced them to move into adjacent markets primarily through acquisitions. Data and voice mobile services and unmanaged fixed data services fueled revenue growth for integrated SPs, but have left a gap in earnings before interest, taxes, depreciation, and amortization (EBITDA). As a result, SPs have been retooling themselves to move “up the stack” into adjacent market spaces in the information technology value chain such as data center, unified communications, security, other IT-centric services, and advisory services. Many large, incumbent SPs entered these “up-the-stack” markets to a greater or lesser degree through acquisitions and alliances with IT providers. Managed network services are a part of this services market and a must-win battle for the incumbent service provider. Meanwhile, as SPs move into these adjacencies, “in the cloud” service providers— such as software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and hosted service-oriented architecture (HSOA) providers—are targeting transaction costs associated with IT services contracts and offering powerful, scaling economies.
    [Show full text]