The Best Discussions on Cloud Computing and its Concepts

Discussion 1: What do you think is the most important element of Cloud Computing? Virtualization? Democratization of Computing? Scalability and fast provisioning? Commoditization of infrastructure? Other? Explain your answer.


In my perspective Cloud Computing would not be conceivable without virtualization, not for any deep or hidden specialized reasons, but rather for one undeniable business prerequisite: the requirement for multi-tenancy. With a specific end goal to profit by economies of scale, distributed computing is predicated upon the sharing of a typical framework by numerous gatherings of clients, frequently alluded to as tenants. What’s more, multi-tenancy must be accomplished through some sort of virtualization, either at the application server level Google AppEngine, at the database level like in, CPU level present in Amazon EC2 and/or kernel level in Red Hat. Dissimilar to matrix/grid computing, which regularly pooled and amassed distributed figuring assets with the end goal of taking care of expansive registering employments that couldn’t fit or would take too long to finish on a solitary server, Cloud Computing makes virtual cuts of assets from groups of servers and stockpiling gadgets, consummately estimated to fit the particular needs of numerous clients. Such virtual assets can be little or substantial, and scale flexibly as client needs develop after some time. In our past sample, virtualization implies that the CRM application utilized by our business group is served by such a system that is usually utilized by more than 60,000 different tenants, all safely disconnected from each other.


Discussion 2: Which of the Ten Laws of Cloudonomics do you think is the most important law? Explain your answer.


From all the laws of Cloudonomics, I consider the thought of Law 9 that states “Don’t put all your eggs in one basket” essential, which implies that the reliability of a framework increments with the expansion of excess, geologically scattered segments, for example, data centers and capacity clusters. Distributed computing sellers have the scale and differing qualities to do as such. While no limited amount of data centers will ever give 100 percent reliability, we can verge on a to a great degree high reliability structural planning with just a couple data centers. In the event that a cloud supplier needs to give high accessibility benefits all around to dormancy touchy applications, there must be a couple data centers in every locale. No limited amount of data centers will ever give 100% reliability, yet we can verge on “an amazingly high reliability structural planning” with just a couple data centers. Cloud suppliers that need to ensure high accessibility benefits all inclusive for inactivity delicate applications must build up a couple data centers in each district. So search for cloud suppliers so prepared. At the end of the day the reliability of a framework with ‘n’ excess segments, each with reliability r, is 1-(1-r)n. So if the reliability of a solitary data center is 99 percent, two data centers give four nines (99.99 percent) and three data centers give six nines (99.9999 percent).


Discussion 3: Find an interesting SaaS (product) and post the following.

  1. Name of the Product:

The SaaS product of my choice would be ‘E2open

  1. Description:

The E2open Business Network offers cloud answers for organizations that oversee or take part in distributed supply chains obliging joint effort over various endeavors with a specific end goal to source, deliver, and satisfy request on a worldwide premise. The E2open Business Network utilizes an open cloud inter-operability which demonstrates cross-standard inter-operations capability.

  1. Pricing:

Prices may vary according to the services you acquire from E2Open but starting price in general is $19.24.

  1. URL (web link):

  1. Why is the product interesting to you?

In my research I’ve found out that E2open leads Supply Chain-SRM Saas Market, sending and working a bigger number of frameworks than whatever other organization. The supply chain-SRM business addresses both interior and outside procedures. Interior procedures, for example, propelled arranging and booking, interest molding and manufacturing plant streamlining have been the domain of customary on-premises endeavor programming. Growing confirmation outside procedures that give much ability and control over amplified supply networks, for example, seller oversaw stock, supply-request synchronization and procure-to-pay, can be overseen more cost-and time-viably and with higher data quality by between big business software enterprises in a SaaS model.



Discussion 4: What do you think are the most important components of data center reliability? Explain your answer.


It’s always the first thing to be implied that physical security is a foundation of a solid data center. Keeping your systems safely secured and giving entry to approved personnel only goes hand and hand with allowing just the essential access to servers, applications and data over the network. It will be safe to say that the most significant resources of any organization live in the data center. Small-time hackers will follow tablets or individual phones. Experts will focus on the data center. Furthermore there ought to be a system of accountability like Data centers ought to log passage points of interest by means of identification access. Guests ought to sign in and sign out and stay under supervision at all times. Inspecting of network/application/document assets ought to be turned on. Another parameter which is of significance while planning a data center is Capacity, it is vital to know the measure of data center and different offices to be outlined. It speaks to most extreme load a data center can deal with. Objective of limit parameter is to verify that enough power and cooling is accessible at data center.


Discussion 5: The author contends that “Cloud Computing is fundamentally more secure than traditional approaches”. Do you agree or disagree with the author’s contention? Why or why not?


I contend that Cloud Computing is on a very basic level is more secure than conventional methods however so as to guarantee this security, some essential prerequisites must be met. Cloud Computing security ought to be seen as an organization in the middle of vendors and customers where both assume liability for their own specific territory. In keeping up this communitarian methodology, Cloud Computing can and ought to be an altogether more secure method for conveying computing than customary methodologies. Cloud Computing isn’t essentially pretty much secure than your present surroundings. Similarly as with any new innovation, it makes new dangers and new open doors. Now and again moving to the cloud gives a chance to re-draftsman more established applications and base to meet or surpass cutting edge security prerequisites. Vendors have an obligation to guarantee their data focuses are very secure as it is dependably less demanding to evade a physical interruption than it is to secure data once border security has been ruptured. Vendors ought to give careful consideration to the hypervisor as security ruptures at this level can have real falling impacts. Network security, like other security viewpoints, comprises of diverse levels of security. These incorporate edge controls, controls to point of confinement network get to, and records to manage access control.


Discussion 6: There are a number of technical considerations that need to be addressed in order to ensure an efficient and successful move to the Cloud. Which of these technical considerations do you consider to be the most important? Why?

There are a number of considerations to choose from all really important but few vital of these considerations are as under:

SSO and Provisioning

Your cloud framework and software supplier ought to provide means to empower Single Sign on (SSO) integration with much utilized web (SaaS) and customary Windows by use Terminal Server or Citrix, for example. Like HP’s LaunchPad gives Single Sign On connectors to a developing number of web resources and various customary Windows-based applications. SSO is empowered through Active Directory (AD) or eDirectory/LDAP.

Flexible App Hosting & File Storage

The virtual desktop permits you to assign the area of applications and documents that are gotten to by end clients. A few instruments (SaaS) you may need oversaw in the cloud while different devices, for example, Windows applications, you may need to render as distributed applications utilizing mainly facilitated Terminal Server or Citrix tech.

Sustainable and Affordable

Assets are rapidly versatile over shared resources, so you pay for what you utilize. Administration of applications moves to the cloud supplier and it takes less time to convey new administrations for end clients. Cloud arrangements likewise scale with interest, in this way extra handling force and data transfer capacity is accessible as presupposed amid top utilization times.

Discussion 7: What do you think are the most important skills for a Cloud Computing professional to possess? Why?


As far as technical skills are concerned, while the type and level of aptitudes needed on staff will rely on upon how a great part of the cloud will be built and managed in-house, there’s no doubt that the capacity to develop applications that can run rapidly on the Internet. The learning base would should be vigorously centered on Internet capacities. Java and. NET structure aptitudes may go to the cutting edge, and also learning of virtualization. Information of open-source instruments and dialects might likewise become an integral factor too. With respect to, a comprehension of security conventions is key, regardless of what sort of cloud is being sent. Identified with this is a comprehension of orders and regulations, for example, HIPAA, Sarbanes-Oxley and so forth. Venture administration abilities have been a need for quite a while with IT anticipates, which oblige marshaling individuals and a mixture of assets from over the undertaking to concur on objectives, build up courses of events, and meet developments in an auspicious way. Last however not the minimum Data experts are in solid need in this area, and the individuals who can outline & design systems that can ingest Big Data from the cloud, or utilize the cloud to give logical situations.


Discussion 8: Do you feel that the Private Cloud constitutes a legitimate example of the Cloud? Why or why not?

Private clouds don’t bode well for little organizations. Be that as it may, for huge and even medium-sized organizations, IT groups can make parts of their frameworks virtual, so they can utilize their business procedures and PC assets in a private cloud. As the idea turns out to be more develop, the thought would be to move everything that needs more adaptability to the cloud. As a general rule Private cloud is an advertising term for an undertaking computing architecture that is ensured by a firewall. They have a critical physical foot shaped impression, obliging distributions of space, equipment, and natural controls. These assets must be invigorated intermittently, bringing about extra capital consumptions. They have pulled in feedback in light of the fact that clients still need to purchase, fabricate, and oversee them and consequently don’t profit by less active administration, basically lacking the financial model that makes cloud computing such a fascinating idea so as I would see it no, it might be a type of actualizing a cloud domain yet not a true blue sample of what cloud computing essentially is about.


Discussion 9: Which one of the major open initiatives in Cloud Computing (e.g., OpenStack, Open Source Cloud, Open Cloud Initiative, etc.) do you think will have the greatest impact over the new few years? Why?

OpenStack was initially created by NASA and Rackspace, and is likewise sponsored by any semblance of IBM, HP and Dell. It’s a progression of three center ventures that can be utilized to assemble a private cloud stage: Compute, Object Storage and Image Service. These three undertakings give the base to overseeing virtual servers, stockpiling and machine pictures. The upside of this is that clients can pick which activities/elements are needed. Different establishment bundles are accessible for the different activities.

CloudStack has been around since 2009 and is executed in more than 100 generation clouds. Unlike OpenStack, CloudStack installation is very streamlined and quite organized in documention. The CloudStack open source code was gained by Citrix with the obtaining and discharged as open source. This gives CloudStack a head start as it was at that point programming being utilized as a part of creation. CloudStack is intended for enormous versatility and unified administration, permitting a huge number of servers from one point.

In general, CloudStack is better bundled for big business appropriation, particularly in situations not officially acquainted with open source. Its establishment bundling and customization on administrator/end-client entrance are intended for speedy, scalable selection of the private cloud. OpenStack, then again, can be best portrayed as an establishment or system for cloud computing, not almost as cleaned.

Discussion 10 : Which checklist item(s) (from the Lesson 10 Appendix) do you think is (are) most important for cloud readiness? Explain your answer.

In a cloud environment, you can’t depend on the basic tools or virtualization layer to keep your application running regardless of equipment disappointments and this makes new open doors as far as application architecture. In the event that the hidden equipment crashes, so will your application. There are obviously a couple of special cases, however the general policy remains that applications intended for the cloud must record for the likelihood of sudden disappointment.

Applications infrequently live in separation. They should be designed, and composed with different applications. Case in point, the backend for a portable application will presumably need access to a database to store and access client data.

In any case, similar to as explained above, if your database itself is running in a cloud, then the servers it keeps running on may once in a while crash. At the point when that happens, your application needs to nimbly handle the circumstance. Shockingly, there is normally a base level of coordination that is essential i.e. in the event that your database expert is being fizzled over, your application needs to redesign its procedure.

The effective arranging and execution of a move to the Cloud needs to consider every application separately. The evaluation procedure doesn’t should be broad in any case, by looking into every application, the advantage that can be normal and the movement activity needed can measured.



Neil Ward-Dutton. (2010). Software Infrastructure for Business Value. Retrieved from EBIZ:

Calif. (n.d.). E2open Leads Supply Chain-SRM SaaS Market, Deploying and Operating More Systems Than Any Other Company . Retrieved from PRNewswire:

David Linthicum. (2010). 3 elements of good clouds. Retrieved from InfoWorld:

Defining Cloud Computing for Business Users. (2009). Retrieved from SocialMediaToday:

Haleena. (2013). Software as a Service (SaaS) Companies. Retrieved from Zeendo:

Industry Perspectives . (2013). Parameters to Consider for a Successful Data Center Design Project. Retrieved from

Joe Weinman. (2008). The 10 Laws of Cloudonomics. Retrieved from GigaOM Research:

Judith Hurwitz, Marcia Kaufman, Fern Halper, and Dan Kirsch. (n.d.). Cloud Computing Elements. Retrieved from

MWD Editor. (2009). Value to Seven Cloud Computing Elements. Retrieved from

Scott Matteson. (2013). 10 critical elements of an efficient data center. Retrieved from

Sunny Puri and Michael Kuppinger. (2003). Commissioning: Best Way to Ensure Data Center Reliability. Retrieved from–11065

TeamSungardas. (n.d.). 7 Key Elements of a Successful Cloud Strategy​. Retrieved from

The Top 20 Software as a Service (SaaS) Vendors. (n.d.). Retrieved from

VirtualDensity. (2009). The Laws of Cloudonomics. Retrieved from VirtualDensity:


Please enter your comment!
Please enter your name here