Configuration and Orchestration Techniques for Federated Cloud Resources

Total Page:16

File Type:pdf, Size:1020Kb

Configuration and Orchestration Techniques for Federated Cloud Resources Configuration and Orchestration Techniques for Federated Cloud Resources Denis Weerasiri A thesis in fulfilment of the requirements for the degree of Discovery and Adaptation of DoctorProcess of Philosophy Views THE UNIVERSITY OF NEW SOUTH WALES SYDNEY AUSTRALIA · School of Computer Science and Engineering A dissertation submitted in fulfillment Faculty of Engineering of the requirements for the degree of Doctor of Philosophy Supervisor: Prof. Boualem Benatallah in Computer Science and Engineering February 2016 Hamid Reza Motahari Nezhad Supervisor: Prof. Boualem Benatallah 12 February 2008 PLEASE TYPE THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dissertation Sheet Surname or Family name: WEERASIRI First name: WICKRAMA ARACHCHILLAGE DENIS Other name/s: DHANANJAYA Abbreviation for degree as given in the University calendar: PhD School: School of Computer Science and Engineering Faculty: Faculty of Engineering Title: Configuration and Orchestration Techniques for Federated Cloud Resources Abstract 350 words maximum: (PLEASE TYPE) Cloud resources are central to the operation of modern software-driven organizations. Due to the exponential growth of the number and diversity of cloud resources, organizations are inspired to build and deploy services, processes and applications by intermixing a set of best-of-breed cloud resources. It is estimated that nearly half of all large enterprises will have such intermixed (or we call federated) cloud resource deployments by the end of 2017. Federated cloud resources, a special category of composite resources, which draws component resources from one or more public clouds and one or more private clouds. In this dissertation, we investigate the problems of configuration and orchestration of federated cloud resources. Addressing this problem is challenging, as component resources of federated cloud resources are distributed across multiple heterogeneous, autonomous and evolving cloud providers. Moreover, cloud-based applications may possess dynamic resource requirements during different phases of their life-cycle. Consequently, designing interoperable, portable and effective cloud resource configuration and orchestration techniques that cope with both heterogeneous and dynamic environments remains a deeply challenging problem. To address these challenges, we first propose a taxonomy framework for cloud resource consumers to improve the awareness of the fundamental building blocks within the domain of cloud resource orchestration. Our taxonomy framework allows consumers to efficiently explore, understand, compare, contrast and thereby be able to wisely and rationally evaluate cloud resource orchestration techniques based on consumers' requirements. We then present model-driven and process-driven techniques to describe, reuse and orchestrate elementary and federated cloud resource configurations. In conjunction with, we also propose a pluggable architecture to translate these high-level models into resource descriptions and management rules which can be interpreted by external configuration and orchestration tools such as Juju and Docker. We next propose a rule-based configuration and orchestration knowledge recommender service which empowers incremental acquisition, curation, and recommendation of knowledge based on users' contexts. Finally we introduce a language for effective comprehension and visualization of cloud resource orchestration concerns. This language allows to visually represent, monitor and control cloud resource configurations. All aforementioned proposals have been implemented tools and experimentally validated based on real-world user scenarios and user studies. Declaration relating to disposition of project thesis/dissertation I hereby grant to the University of New South Wales or its agents the right to archive and to make available my thesis or dissertation in whole or in part in the University libraries in all forms of media, now or here after known, subject to the provisions of the Copyright Act 1968. I retain all property rights, such as patent rights. I also retain the right to use in future works (such as articles or books) all or part of this thesis or dissertation. I also authorise University Microfilms to use the 350 word abstract of my thesis in Dissertation Abstracts International (this is applicable to doctoral theses only). '2.."' 1.b --o 2.. ~a ............ ......... .. .... ...... .. .1 . ...... · · ······ · ······~Signature ·-··· ~ - --~ ·- ···· Date The University recognises that there may be exceptional circumstances requiring restrictions on copying or conditions on use. Requests for restriction for a period of up to 2 years must be made in writing. Requests for a longer period of restriction may be considered in exceptional circumstances and require the approval of the Dean of Graduate Research. FOR OFFICE USE ONLY Date of completion of requirements for Award: THIS SHEET IS TO BE GLUED TO THE INSIDE FRONT COVER OF THE THESIS ORIGINALITY STATEMENT I hereby declare that this submission is my own work and to the best of my knowl­ edge it contains no materials previously published or written by another person, or substantial proportions of material which have been accepted for the award of any other degree or diploma at UNSW or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the research by others, with whom I have worked at UNSW or elsewhere, is explicitly acknowledged in the thesis. I also declare that the intellectual content of t his thesis is the product of my own work, except to the extent that assistance from others in the projects design and conception or in style, presentation and linguistic expression is acknowledged. S i gner~... ,. ' 2 '0 l 0 2 - 0 Date ....... ......8, .·..-.. ........ ~ ii COPYRIGHT STATEMENT . I hereby grant the University of New South Wales or its agents the right to archive and to make available my thesis or dissertation in whole or part in the University libraries in all forms of media, now or here after knovvn, subject to the provisions of the Copyright Act 1968. I retain all proprietary rights, such as patent rights. I also retain t he right to use in future works (such as articles or books) all or part of this thesis or dissertation. I also authorise University Microfilms to use the 350 word abstract of my thesis in Dissertation Abstract International (this is applicable to doctoral theses only) . I have either used no substantial portions of copyright material in my thesis or I have obtained permission to use copyright ma­ terial; where permission has not been granted I have applied/ will apply for a partial restriction of the digital copy of my thesis or dissertation. Sign ed ~ ..... , Date ..::Lo........................ / .b ~ D L - o .4 AUTHENTICITY STATEMENT I certify that the Library deposit digital copy is a direct equivalent of the final officially approved version of my thesis. No emendation of content has occurred and if there are any minor variations in formatting, they are the result of the conversion to digital format. Signed ..~ . ..2_o /i - 0). - 0Cj Date ...........'? ........ ..... .. iii ACKNOWLEDGEMENTS If I have seen further it is by standing on the shoulders of Giants - Sir Isaac Newton First and foremost, I would like to express my sincere appreciation and deep gratitude to my supervisor, Scientia Professor Boualem Benatallah, for his excep- tional support, encouragement and guidance during the last three years and five months. Boualem taught me how to do high-quality research and helped me think creatively. His truly incredible academic excellence and beautiful mind have made him as a constant oasis of ideas and passions in science, which has inspired and en- riched my growth as a student, a researcher and a scientist. Moreover, I thank him for providing me with the opportunity to work with a talented team of researchers. I gratefully dedicate this dissertation to my father Alfred, my mother Chandra, my wife Nipuni and other members of my family, for their love, patience, and un- derstanding. They allowed me to spend most of the time on this thesis. They are my source of strength and without their countless support this dissertation would have never been started. I gratefully thank my co-authors, Dr. Moshe Chai Barukh and Dr. Amin Be- heshti for their enjoyable collaborations. I would like to thank Dr. Moshe especially for his help in reviewing and editing our publications. My sincere thanks go to everyone in the Service-Oriented Computing (SOC) group at UNSW, especially Professor Fethi Rabhi (my co-supervisor), Srikumar Venugopal, Mortada Al-Banna, John Sun, George Ajam, Mohammed Allahbaksh and Helen Paik for their friendship, support and helpful comments. In addition, I would like to thank the Ph.D. review panels and the anonymous reviewers who provided suggestions and helpful feedback on my publications. Working at the School of Computer Science and Engineering at the University of New South Wales (UNSW) has been a great pleasure and a wonderful privilege. I iv acknowledge Smart Services CRC, University of New South Wales, and the Faculty of Engineering at UNSW for providing scholarships to pursue doctoral studies. In addition, I would like to thank administrative and technical staff members of the school of computer science and engineering at UNSW who have been kind enough to advise and help in their respective roles. Denis Weerasiri Sydney, Australia February 2016 v To my family for their love, patience, and understanding vi ABSTRACT
Recommended publications
  • Security in Cloud Computing a Security Assessment of Cloud Computing Providers for an Online Receipt Storage
    Security in Cloud Computing A Security Assessment of Cloud Computing Providers for an Online Receipt Storage Mats Andreassen Kåre Marius Blakstad Master of Science in Computer Science Submission date: June 2010 Supervisor: Lillian Røstad, IDI Norwegian University of Science and Technology Department of Computer and Information Science Problem Description We will survey some current cloud computing vendors and compare them to find patterns in how their feature sets are evolving. The start-up firm dSafe intends to exploit the promises of cloud computing in order to launch their business idea with only marginal hardware and licensing costs. We must define the criteria for how dSafe's application can be sufficiently secure in the cloud as well as how dSafe can get there. Assignment given: 14. January 2010 Supervisor: Lillian Røstad, IDI Abstract Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are assessed with regards to a security assessment framework provided by the Cloud Security Alliance and the application of this on the case study. Finally, the study is concluded with a set of general recommendations and the recommendation of a cloud vendor. This is based on a number of security as- pects related to the case study’s existence in the cloud.
    [Show full text]
  • Open Cloud Computing with the Simple Cloud API and Apache Libcloud Doug Tidwell Cloud Computing Evangelist, IBM [email protected]
    Open Cloud Computing with the Simple Cloud API and Apache libcloud Doug Tidwell Cloud Computing Evangelist, IBM [email protected] Session 7665 Agenda • Portability and interoperability • A few words about APIs • The Simple Cloud API • Storage • Queues • Documents • Controlling VMs with Apache libcloud • Resources / Next steps The problem Vendor lock-in • If there’s a new technology, any talented programmer will want to use it. • Maybe the shiny new thing is appropriate for what we’re doing. • Maybe not. • We’re probably going to use it anyway. • The challenge is to walk the line between using the newest, coolest thing and avoiding vendor lock-in. Portability and Interoperability • In writing flexible code for the cloud, there are two key concepts: • Portability is the ability to run components or systems written for one cloud provider in another cloud provider’s environment. • Interoperability is the ability to write one piece of code that works with multiple cloud providers, regardless of the differences between them. How standards work • For a standards effort to work, three things have to happen: • The standard has to solve a common problem in an elegant way. • The standard has to be implemented consistently by vendors. • Users have to insist that the products they use implement the standard. How standards work • All three things have to happen. • If the standard doesn't solve a common problem, or if it solves it in an awkward way, the standard fails. • If the standard isn't implemented by anyone, the standard fails. • If customers buy and use products even though they don't implement the standard, the standard fails.
    [Show full text]
  • Software As a Service
    Software as a Service Haojie Hang Ogheneovo Dibie Executive Summary • In this presentation, we go through the Software as a Service Methodology, examine its benefits and drawbacks and talk about two state-of-art SaaS systems– Amazon Web Service and Google App Engine • We also look into Service Oriented Architecture powering SaaS applications and its impact on modern web 2.0 applications • Finally, we examine hybrids of traditional and SaaS applications Overview • What is Software as a Service (SaaS) • Background o Brief history o Concept o Big picture o Related terms • Computing Today o SasS is everywhere o The SaaS Market • Benefits of SaaS • Drawbacks of SaaS o Robustness o Privacy o Security o Reliability • Service Oriented Architectures (SOA) o Guiding principles of SOA • Case studies o Amazon Web Services (AWS) o Google App Engine • Influence of SOA on Web 2.0 development o Zend Framework • Hybrids of Traditional and SaaS applications o Dropbox o Microsoft Office • Summary • References What is SaaS? • Definition: Software as a Service (SaaS), a.k.a. on- demand software, is a software delivery model in which software and its associated data are hosted centrally and accessed using a thin-client, usually a web browser over the internet. – Wikipedia • Simply put, SaaS is a method for delivering software that provides remote access to software as a web- based service. The software service can be purchased with a monthly fee and pay as you go. What is SaaS? • Where does the term SaaS come from? o The SAAS acronym allegedly first appeared
    [Show full text]
  • Based Services Using XRI-Based Apis for Enabling New E-Business
    International Journal of E-Business Development May. 2013, Vol. 3 Iss. 2, PP. 64-74 An Approach for the Composition of Generic Cloud- Based Services Using XRI-Based APIs for Enabling New E-Business Antonio Celesti1, Francesco Tusa2, Massimo Villari3, Antonio Puliafito4 DICIEAMA, Università degli Studi di Messina Contrada Di Dio, S. Agata 98166, Messina, Italia [email protected]; [email protected]; [email protected]; [email protected] Abstract-Nowadays, cloud computing offers more and more business opportunities, and thanks to the concept of virtualization, different types of cost-effective Cloud-based services have been rising. Virtualization of computing, storage, and networking resources, and their interconnection is at the heart of cloud computing, hence enabling new E-Business scenarios. In such a context, APIs for enabling Cloud-based services are strongly required, nevertheless, methods, mechanisms and tools for exploiting virtualized resources and their utilization for developing anything as a service (*aaS) are still ad-hoc and/or proprietary in nature. In this paper, we discuss how to use an adaptive standard protocol, i.e., XRI, for enabling cloud service providers to arrange their own Cloud- based services, building them on top of the IaaS provided by other service providers. Keywords- Cloud Computing; Cloud Management; Federation; Service Composition; E-Business I. INTRODUCTION Today, cloud computing represents a tempting business opportunity for ICT operators of increasing their revenues [1,2]. The cloud ecosystem begins to be clearer and the role played by cloud service providers appears more defined than the past. Moreover, the number of new public, private, and hybrid clouds rising all over the world is continually growing [3].
    [Show full text]
  • Designing Private and Hybrid Clouds
    Designing Private and Hybrid Clouds Architectural Best Practices Brian Adler Professional Services Architect RightScale, Inc. 1 Abstract The continued expansion of cloud adoption across a broad spectrum of industries and use cases has helped to solidify the establishment of Infrastructure-as-a- Service (IaaS) as a viable, cost-effective, and scalable IT delivery model. As the adoption of public cloud resources has proven effective across a diverse set of use cases, organizations have begun looking inward to find ways to more effectively and efficiently use their existing compute, storage, and networking resources in a similar model. Need breeds options in any industry, and cloud computing is no exception. This desire for internal resource utilization has given rise to numerous private and hybrid cloud technologies that provide tools for on-demand provisioning of compute, storage, and networking resources above and beyond what was available previously in both classic and virtualized datacenters. RightScale, in particular its Professional Services group, has extensive experience helping customers in a variety of industries build private and hybrid clouds and then helping them manage those private and public resources. This white paper describes the considerations that you should make when embarking on the task of creating a private cloud from internal resource pools. It also explains the challenges that you will face at different branches of the decision tree. Additionally, this white paper explores the use cases for the allocation and utilization of these internal resources, focusing in particular on the technological considerations that need to be addressed in the implementation of these use cases. And lastly, it provides a reference architecture for private and hybrid clouds that is the framework for the customized architectures used by many RightScale customers.
    [Show full text]
  • Tools for Cloud Infrastructure: Build & Release
    Tools for Cloud Infrastructure: Build & Release With source code management tools like Git, we can easily version the code and retrieve the same bits we saved in the past. This saves a lot of time and helps developers automate most of the non-coding activities, like creating automated builds, running tests, etc. Extending the same analogy to infrastructure would allow us to create a reproducible deployment environment, which is referred to as Infrastructure as a Code. Infrastructure as a Code helps us create a near production-like environment for development, staging, etc. With some tooling around them, we can also the create same environments on different cloud providers. By combining Infrastructure as a Code with versioned software, we are guaranteed to have a re-producible build and release environment every time. In this chapter we will take a look into two such tools: Terraform and BOSH. Introduction to Terraform Terraform is a tool that allows us to define the infrastructure as code. This helps us deploy the same infrastructure on VMs, bare metal or cloud. It helps us treat the infrastructure as software. The configuration files can be written in HCL (HashiCorp Configuration Language). Terraform Providers Physical machines, VMs, network switches, containers, etc. are treated as resources, which are exposed by providers. A provider is responsible for understanding API interactions and exposing resources, which makes Terraform agnostic to the underlying platforms. A custom provider can be created through plugins. Terraform has providers in different stacks: IaaS: AWS, DigitalOcean, GCE, OpenStack, etc. PaaS: Heroku, CloudFoundry, etc. SaaS: Atlas, DNSimple, etc. Features According to the Terraform website, it has following "key features: Infrastructure as Code: Infrastructure is described using a high-level configuration syntax.
    [Show full text]
  • Seminar on Cloud Computing
    Seminar on Cloud computing Name :- pravin vishwakarma. Div:- Fy.B.Sc(IT) . Roll call:- 05 . Contents (INDEX) • Introduction • What is a cloud computing • What makes to cloud burst • Uses cloud computing • How do the cloud computing work • Utilities of cloud computing • How do cloud change its architecture • Legal computing • Security • Open sources of cloud system • Conclusion Introduction Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). What is a cloud computing “Cloud” is the aggregation of Servers, Low end computers and storage hosting the program and data Accessed via Internet anywhere from world User Centric – Easier for group members to collaborate Task Centric – User’s need is more important than features of application What makes to cloud burst Since the IBM PC was introduced Processor speed has risen 30 per cent per year Memory capacity grown by 50 per cent per year Mass storage mushroomed 80 per cent per year Desktop systems are burdened with too much state File system technology has not addressed new needs Governance of critical data falls short of rising demands Enterprise Level Benefits Achieved From Cloud Computing A Paper Presentation Topic Why Cloud- As basic Business Scenarios • Fast Application Deployment • Hassle Free Maintenance • Better Resources Utilization • Platform Independent, Security, Scalability Cloud Architecture Cloud Computing Services Cloud Computing Cycle Cloud Computing Growth Rate Uses cloud computing Helps to use applications without installations. Access the personal files at any computer with internet access.
    [Show full text]
  • 14. Comparison of Cloud Management Platforms
    14. Comparison of cloud management platforms Kimmo Ahokas Aalto University School of Science [email protected] Abstract tion cloud computing is divided into three different service models, namely Software as a Service (SaaS), Platform as a Cloud computing allows fast and efficient resource provi- Service (PaaS) and Infrastructure as a Service (IaaS). In this sioning within data centers. In large companies this can paper we are only interested in IaaS service model, which lead to significant savings, thus creating market for complete is defined as "The capability provided to the consumer is cloud platforms. In addition to commercial products, sev- to provision processing, storage, networks, and other fun- eral open source cloud platforms exist. This paper compares damental computing resources where the consumer is able four cloud management platforms and identifies the factors to deploy and run arbitrary software, which can include op- affecting future success of each of the platforms. We also es- erating systems and applications. The consumer does not timate the future development of the cloud platform market. manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed KEYWORDS: cloud platform, IaaS, CloudStack, Open- applications; and possibly limited control of select network- Stack, OpenNebula, Eucalyptus, VMware ing components (e.g., host firewalls)." [10] Cloud management platform is a software system that 1 Introduction controls the allocation of physical resources on the data cen- ter. In the IaaS model users can launch virtual machines us- Cloud computing has rapidly changed the way in which re- ing the management console, which causes the platform to sources in data centers can be provisioned.
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • Paas Solutions Evaluation
    PaaS solutions evaluation August 2014 Author: Sofia Danko Supervisors: Giacomo Tenaglia Artur Wiecek CERN openlab Summer Student Report 2014 CERN openlab Summer Student Report 2014 Project Specification OpenShift Origin is an open source software developed mainly by Red Hat to provide a multi- language PaaS. It is meant to allow developers to build and deploy their applications in a uniform way, reducing the configuration and management effort required on the administration side. The aim of the project is to investigate how to deploy OpenShift Origin at CERN, and to which extent it could be integrated with CERN "Middleware on Demand" service. The student will be exposed to modern cloud computing concepts such as PaaS, and will work closely with the IT middleware experts in order to evaluate how to address service needs with a focus on deployment in production. Some of the tools that are going to be heavily used are Puppet and Openstack to integrate with the IT infrastructure. CERN openlab Summer Student Report 2014 Abstract The report is a brief summary of Platform as a Service (PaaS) solutions evaluation including investigation the current situation at CERN and Services on Demand provision, homemade solutions, external market analysis and some information about PaaS deployment process. This first part of the report is devoted to the current status of the process of deployment OpenShift Origin at existing infrastructure at CERN, as well as specification of the common issues and restrictions that were found during this process using different machines for test. Furthermore, the following open source software solutions have been proposed for the investigation of possible PaaS provision at CERN: OpenShift Online; Cloud Foundry; Deis; Paasmaster; Cloudify; Stackato; WSO2 Stratos.
    [Show full text]
  • Cloud-Computing-Business-Review
    CLOUD COMPUTING 1 Cloud Computing Cloud Computing Question 1 Amazon Web Services (AWS) has provided several significant advantages to Ericsson. First of all, Ericsson has been able to manage its business due to the global infrastructure management services that are provided by AWS. This global infrastructure has enabled Ericsson to save the costs in various aspects of their business and thus, gain huge amount of profit (AWS, 2014). Moreover, due to the services of AWS, Ericsson is now able to develop and launch latest software and applications at any time according to the requirements of the market. AWS has allowed Ericsson to increase and decrease their production according to the variation in demand. In addition, due to the remote access services provided by AWS, consumers of Ericsson can access the cloud based services irrespective of their location. Ericsson has also benefitted from AWS due to the cheap and scalable infrastructure platforms. The data centers of these infrastructures are located in all parts of the world (AWS, 2014). Likewise, the CLOUD COMPUTING 2 Rightscale cloud management platform provided by AWS helped Ericsson substantially to dominate the market of cloud services. Question 2 Amazon Elastic Compute Cloud which is more commonly known as EC2 is equipped with various distinguishing features. The most noteworthy feature is a complete environment consisting of memory, processor and software that is already configured. The scalability feature of EC2 can be availed instantly by simply paying for the service before using it. Thus, a lot of time is saved that can be otherwise wasted while buying and booting new server (Varia & Mathew, 2013).
    [Show full text]
  • Serra Labs Cpo
    SERRA LABS CPO Cost-Performance Optimization for Cloud Applications Q3/2020 Private and Confidential Cloud Cost-Performance Problem Cloud Application Usage Dynamically changes while Cloud Application Capacity remains Inelastic resulting in Waste or Slowdown or Both Waste due to Slowdown due to Over-Capacity Under-Capacity relative to Usage relative to Usage Excess Costs User Dissatisfaction $ $$$ 35% Waste 48% Slowdown (Flexera Cloud Surveys 2018-20) (HIMSS Cloud Survey 2018) Addressing the Cloud Cost-Performance Problem Cloud Capacity Management needs to match the Elasticity of Cloud Application Resource Demand to Minimize Waste and Avoid Slowdown Inelastically Provisioned waste Elastically Provisioned Resource Demand Power slowdown Resource Time Elastic versus Inelastic Cloud Resource Provisioning to Meet Dynamic Resource Demand CPO Approach Utilization Health Metrics Metrics ○ ML-driven Cloud Application Resources for Utilization and Health Levels Analyze ○ AI-based Recommendations for Multiple Recommend Optimization Goals that Differently Trade-Off Cost and Performance Validate ○ Simulation-based Validation Optimization Benefits of Selected Resize Recommendation Before Resizing ○ ML-driven Continual Anticipation of Anticipate Suboptimality Private and Confidential CPO Deployment Architecture Comparison with Current Solutions Serra RightScale (Flexera) Labs CloudHealth (VMware) ParkMyCloud (Turbonomic) Mostly Cost Right Performance Ignores Performance, at the Right Cost, Here & Now, $$ Unvalidated, Continually Often Simplistic Broad
    [Show full text]