Optimizing IT Services Using Cloud, Data Center, and Adherence To

Optimizing IT Services Using Cloud, Data Center, and Adherence To

Optimizing IT Services using Cloud, Data Center, and Adherence to Compliance Standards EMC Proven Professional Knowledge Sharing 2011 Amrith Raj Radhakrishnan IT Analyst Tata Consultancy Services Limited [email protected] [email protected] Table of Contents Preface ...................................................................................................................................... 6 Executive Summary ................................................................................................................... 7 1. Introduction ......................................................................................................................... 9 1.1 Evolving Information Technology ...................................................................................... 9 1.2 Data center growth ..........................................................................................................11 1.3 Need for Green ................................................................................................................13 1.4 IT Costs ...........................................................................................................................15 1.5 Compliance and Governance ..........................................................................................16 2. Cloud Computing Considerations .......................................................................................17 2.1 In-house/On-premises model ...........................................................................................17 2.2 Businesses need services, not technologies ....................................................................18 2.3 Definition .........................................................................................................................19 2.4 Importance of Cloud Computing ......................................................................................22 2.5 Impact of Cloud Computing .............................................................................................23 2.5.1 Individual Consumers ..........................................................................................23 2.5.2 Individual Businesses ..........................................................................................24 2.5.3 Start-ups ..............................................................................................................24 2.5.4 Small and Medium-Size Businesses ....................................................................25 2.5.5 Enterprise Businesses .........................................................................................25 2.6 Governing the Cloud ........................................................................................................26 2.7 Risks in the Cloud ............................................................................................................27 2.7.1 Confidentiality ......................................................................................................27 2.7.2 Data Integrity .......................................................................................................28 2.7.3 Data Availability ...................................................................................................29 2.7.4 Identity and Access Management ........................................................................29 2011 EMC Proven Professional Knowledge Sharing 2 2.8 Threats to Cloud Computing ............................................................................................30 2.8.1 Abuse and Nefarious Use of Cloud Computing ....................................................30 2.8.2 Insecure Interfaces and APIs Description ............................................................31 2.8.3 Malicious Insiders ................................................................................................32 2.8.4 Shared Technology Issues...................................................................................33 2.8.5 Data Loss or Leakage ..........................................................................................34 2.8.6 Account or Service Hijacking ...............................................................................35 2.8.7 Unknown Risk Profile ...........................................................................................35 2.9 Migration to the Cloud......................................................................................................37 2.10 Cloud Migration - Assessment Phase ............................................................................38 2.10.1 Identify the asset for cloud deployment ................................................................38 2.10.2 Check Return on Investment and Total Cost of Ownership ..................................42 2.10.3 Risk Assessment .................................................................................................43 2.10.4 Selecting the Deployment Model..........................................................................43 2.10.5 Due diligence, feasibility, and audits ....................................................................43 2.10.6 Identify and Calculate Costs ................................................................................44 2.11 Proof of concept and migration phase ...........................................................................44 2.11.1 Proof of Concept ..................................................................................................45 2.11.2 Pre-plan and Migration .........................................................................................45 2.12 Leveraging the Cloud .....................................................................................................46 2.13 Optimizing the Cloud .....................................................................................................46 3. Efficient Data Centers ........................................................................................................47 3.1 Time to transform the data center ....................................................................................47 3.2 Considerations for Efficient Data Centers ........................................................................48 3.3 Data Center Tiers ............................................................................................................49 3.4 Data Center Consolidation ...............................................................................................51 3.5 Equipment Placement and Cooling ..................................................................................52 3.5.1 Airflow: Front to Back and Side to Side ................................................................56 2011 EMC Proven Professional Knowledge Sharing 3 3.6 Optimizing the Core infrastructure ...................................................................................57 3.7 Server virtualization and consolidation .............................................................................57 3.7.1 Virtualization Considerations ................................................................................60 3.8 I/O Virtualization ..............................................................................................................61 3.8.1 Fabric Sprawl .......................................................................................................61 3.8.2 An Introduction to I/O Virtualization ......................................................................61 3.8.3 InfiniBand (IBA) ....................................................................................................62 3.8.4 Data Center Bridging ...........................................................................................63 3.8.5 Multi-Root Input/Output Virtualization ...................................................................65 3.8.6 I/O Virtualization Comparison ..............................................................................67 3.9 Optimizing Storage ..........................................................................................................67 3.9.1 Requirement Gathering: Storage Checklist ..........................................................68 3.9.2 Storage Virtualization ...........................................................................................69 3.9.3 Replication Selection recommendations ..............................................................74 3.9.4 Best practices in Storage Capacity Management .................................................75 3.10 Converged Infrastructure ...............................................................................................75 3.11 Open Source Solutions ..................................................................................................77 3.11.1 Operating System – Servers and Workstations ....................................................77 3.11.2 Storage ................................................................................................................78 3.12 Section Conclusion ........................................................................................................81 4. IT Compliance and Controls ...............................................................................................81 4.1 Why be compliant? ..........................................................................................................82

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    102 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us