Page 270 - How Cloud Computing Is Transforming Business and Why You Cant Afford to Be Left Behind
P. 270
INDEX
PathViewCloud, 136, 148 Recruitment, social networking, 173–
PC Revolution, 16–17, 21, 39 174
Peer-to-peer computing, 16–24, 188– Red Hat, 121
190, 240 Relational database, 242
Perl, 240 Reorganization (See Business reor-
Pfister, Gregory, 39, 41–42 ganization)
Phases of Internet computing, 17–21, Representational State Transfer
188–190 (REST), 242
PHP (hypertext preprocesser), 5, 241 Resistance to the cloud, 103–126
Pratt, Ian, 61 “cloud computing,” as name, 104–
Private cloud, 69–85 106
data center challenges, 88–91 security, 106–109
defined, 241 shared standards and best prac-
economies of scale, 72–73, 79 tices, 124–126
hardware choices, 73–77 vendor lock-in, 109–124
NIST definition of, 224 Resource management (See Opera-
Norrod on, 128 tions management)
public cloud synchronization, 70– Resource pooling, NIST, 222–223
72, 81–82 (See also Hybrid Revolution:
cloud) Cloud, 1–24, 168
security concerns, 71–72, 84–85, PC Revolution, 16–17, 21, 39
151–162 Ricketts, Conrad, 32
self-provisioning and cost, 77–78, RightScale, 31, 94, 97, 99, 112, 117
80–81 Risk management, 231–233
steps to develop, 76–85 Rosenblum, Diane, 67
virtualization, 79–80, 91–92 Rosenblum, Mendel, 61, 67
Productivity gains, and cloud, xii rPath, 64–66
Programmatic control, 9, 18–19, 152, Ruby on Rails, 242
187, 189, 199, 201–206
Provider chaining, risk management, S
233 S3 (Simple Storage Service), 64, 95,
Public cloud: 97, 123, 232–233, 242
defined, 241 SaaS (software as a service), 4, 160–
NIST definition of, 225 161, 223–224, 243
security, 151–162 Salesforce.com, 4, 141, 160–161, 169
(See also Hybrid cloud; specific cloud Samba, 175
providers) SAP, 232
Python, 211, 241 Sarbanes-Oxley, 132
Savvis, 99, 109, 117
Q Sayegh, Emil, 33
Quintiles, 20 Scaling (See Flexibility and scaling ca-
pabilities)
R Security, 145–162
Rackspace and/or Rackspace Cloud, failure/stability, 146–151
8, 32–34, 40, 42, 70 private cloud, 71–72, 84–85
Rapid elasticity, NIST, 223 protective actions, 157–160
Rates (See Cost of services) public vs. private, 151–162
rBuilder, 94 resistance to the cloud, 106–109
Reavis, Jim, 125 vulnerabilities, 152–157
250