60 likes | 149 Views
Engineering the Cloud. Anna Loretta Q. Capanang. Cloud Engineering. The process of designing the systems necessary to leverage the power and economics of cloud resources to solve business problems.
E N D
Engineering the Cloud Anna Loretta Q. Capanang
Cloud Engineering • The process of designing the systems necessary to leverage the power and economics of cloud resources to solve business problems. • The application of engineering disciplines to cloud computing which brings a systematic approach to the high level concerns of commercialization, standardization and governance of cloud computing solutions. • Influences the methods and tools of engineering in envisioning, building up, operating and maintaining cloud computing systems and solutions. • http://www.gartner.com/it-glossary/cloud-engineering/ Accessed: August 25, 2013. • http://en.wikipedia.org/wiki/Cloud_Engineering Accessed: August 25, 2013.
Cloud Technology Benefits • Achieve economies of scale • Reduce spending on technology infrastructure • Globalize your workforce on the cheap • Streamline processes • Reduce capital costs
Cloud Technology Benefits • Improve accessibility • Monitor projects more effectively • Less personnel training is needed • Minimize licensing new software • Improve flexibility
Cloud Issues on Software Engineering • Security • Privacy • Regulatory and legal issues • The negotiation of quality of service (QoS) between users and providers to establish Service Level Agreements(SLAs) • The mechanisms and algorithms for allocation of VM resources to meet SLAs, and • Manage risks associated with the violation of SLAs.
Recommendations • Use model-based approaches to capture different security views and link such views in a holistic cloud security model • Delivered mechanisms (such as elasticity engines) and APIs should provide flexible security interfaces • Support for multi-tenancy where each user can see only his security configurations, elasticity, to scale up and down based on the current context. • Support integration and coordination with other security controls at different layers to deliver integrated security. • Be adaptive to meet continuous environment changes and stakeholders needs.