INDEX

Accounting and finance, impact of elastic cloud model on

ACID transactions

Acme eAuctions (AEA) case study

business architecture
business problem statement
cloud deployment models
cloud service models
data design decisions
dealing with change
disaster recovery planning
final architecture
IaaS use case
logging strategy
mobile development decision
monitoring strategy
organization change planning
PaaS use case
pragmatic approach
SaaS use case
security requirements
service level agreements

Active-passive cold model

Active-passive warm model

AEA case study. See Acme eAuctions (AEA) case study

Agility of cloud computing

Allspaw, John

Amazon EC2

Amazon Elastic Block Store

Amazon Web Services (AWS)

availability zones
compliance road map
Global Start-Up Challenge
as IaaS
infrastructure management and
Netflix and
outages
security of
service level agreement

Apigee

API management

API SaaS tools

Application layer

KPIs and
performance at
security and

Applications

cloud, auditing
cost of building in cloud
legacy, porting to cloud
migrating to cloud
mobile, and PaaS
web, security of

Application stack layer

Architecture

business architecture diagram
defining
enterprise, value of
loosely coupled
tightly coupled

Archiving use cases

Auditing

cloud applications
design strategies for
regulations and
security and

Automating

deployments
infrastructure

Automation strategy for security

AWS. See Amazon Web Services

Backup and restore method, classic

BASE transactions

Bias, Randy

Big-data PaaS solutions

Business and technical requirements. See Customer requirements

Business architecture diagram

Business impact of elastic cloud model

Business models

Case studies

Instagram
National Oceanic and Atmospheric Administration
Netflix
Obama campaign e-commerce site
See also Acme eAuctions (AEA) case study

Cash flow

Categories of information, monitoring

CD (continuous delivery)

CDNs (content delivery networks)

Centralization strategy for security

Centralized logging strategy

Change, resistance to. See also Organizational change

Chatter

CI (continuous integration)

Client-server era

Cloud bursting

Cloud computing

agility of
benefits of
characteristics of
evolution of
maturation of
overview of
security maturation
use cases
visual model of
See also Case studies; Designing cloud services; Hybrid clouds; Private clouds; Public clouds; Worst practices

Cloud culture

Cloud Security Alliance

IaaS definition
PaaS definition

Cloud service providers (CSPs). See also Vendors

Cloud stack

choosing service model and
IaaS
monitoring and
overview of
PaaS
SaaS

Coghead

Column store databases

Commodity clouds

Compliance, monitoring

Concur expense management software

Consumer, maturity of, and auditing strategy

Consumer experience, visualizing

Content delivery networks (CDNs)

Continuous delivery (CD)

Continuous integration (CI)

Costs

of downtime
expectations for reductions in
of IaaS
managing SLAs
of ownership
of prototyping
unexpected

Criticality of services

cost of downtime and
SLAs and

CSPs (cloud service providers). See also Vendors

Customer requirements/expectations

identifying
misunderstanding
for security
SLAs and
why, who, what, where, when, and how of

Data

characteristics of
encryption of
government requests for
store types for
tenancy of system and characteristics of
See also Security

Database as a Service (DBaaS) products

Data mining and analytics use cases

Defining SLAs

Delayed time performance

Deployment models

AEA case study
overview of
PaaS
selecting

Deployments

automating
daily

Designing cloud services

business architecture diagram
consumer experience
data requirements
for failure
pragmatic approach
problem statement
project constraints
state constraints
user characteristics
See also Customer requirements

Detection area of focus

DevOps

automating deployments
automating infrastructure
continuous integration and continuous delivery
designing feature flags
developing mind-set
measuring, monitoring, and experimenting
overview of

Directing logs to isolated storage areas

Disaster recovery planning

cost of downtime
hybrid clouds and
for IaaS
overview of
for PaaS
for primary data center
for SaaS

Document store databases

Domains to monitor

Downtime, cost of

Dynamic data sets

Elastic cloud model

Encryption of data

Engine Yard

Enterprise architecture, value of

Enterprise clouds

Enterprise management, complexity of

Enterprise model

Eucalyptus

Expectations, misguided

Experimenting and DevOps

Failure

designing for
planning for
prevention of
See also Disaster recovery planning; Outages

Fault tolerance with software

Feature flags

Fielding, Roy

Files, storing data as

Financial aspects of service models

Force.com

Fragile systems

Functional requirements

GitHub

GoGrid

Google

Apps Engine
Gmail
as PaaS solution

Government requests for data

Graph databases

Hammond, Paul

HATEOAS

Heroku

HIPAA (Health Insurance Portability and Accountability Act)

Horizontal scaling

Hosting solutions

Human resources, impact of elastic cloud model on

Hybrid clouds

disaster recovery planning with
overview of

IaaS. See Infrastructure as a Service

Implementing cloud initiatives

Infrastructure

automating
provisioning

Infrastructure as a Service (IaaS)

auditing cloud applications
cloud stack
costs of
described
disaster recovery planning for
logging strategies
monitoring
overview of
regulations for
selecting

Infrastructure layer, performance at

Innovation, resistance to

Instagram

Internet

business operating model with
level of complexity of systems and

Inventory of actors and SLAs

IT, impact of elastic cloud model on

Key management and security

Key performance indicators (KPIs), monitoring

Key-value store databases

Kim, Gene

Kotter, John

Layer 7 Technologies

Legacy applications, porting to cloud

Legacy systems, migrating to cloud

Legal department, impact of elastic cloud model on

Location of data

Log files, uses of

Logging

centralized strategy for
security and

Loosely coupled architecture

Machine images, standard set of

Mainframe computers

Managing vendor SLAs

Mashery

Maturity of product and security

M-Dot Network

Mergers and acquisitions

Metrics to monitor

Microsoft Azure

Migrating

applications to cloud
legacy systems to cloud

Minimal viable product

Mobile applications and PaaS

Monitoring

DevOps and
overview of
proactive compared to reactive
requirements for
security and
strategies by category
strategies by service level

Multitenancy design strategies

National Institute of Standards and Technology (NIST)

IaaS definition
PaaS definition
public cloud definition
SaaS definition
visual model of cloud computing

National Oceanic and Atmospheric Administration

Near real time performance

Netflix

NIST. See National Institute of Standards and Technology

Nonfunctional requirements

NoSQL databases

Obama campaign e-commerce site

On-demand software solutions. See Software as a Service

Open-source cloud-based solutions

OpenStack

Organizational aspects of service models

business impact
choosing model and
enterprise compared to elastic cloud models
IT impact
overview of

Organizational change

management of
planning
in real world
underestimating impacts of

Outages. See also Disaster recovery planning

Ownership of data

PaaS. See Platform as a Service

Passwords, API keys compared to

Patch management and security

Pay-as-you-go pricing model

PCs

PDP strategy

Performance, monitoring

Performance requirements of data

Personally identifiable information (PII)

encryption of
security of
SLAs and

Physical characteristics of data

Platform as a Service (PaaS)

auditing cloud applications
cloud stack
costs of
described
disaster recovery planning for
as game changer
logging strategies
monitoring and
overview of
regulations for
security of
selecting
SLAs of
See also Microsoft Azure

Policy enforcement and security

Pragmatic approach for building services

Prevention area of focus

Primary data center, disaster recovery planning for

active-active hot
active-passive cold
active-passive warm
classic backup and restore method
overview of

Private clouds

Private keys

Private PaaS

Private PaaS service providers

Proactive monitoring

Problem statement

Product components and SLAs

Production environment and quality monitoring

Project constraints

Protection area of focus

Prototyping, comparison of costs of

Public clouds

Public keys

Public PaaS service providers

Python

Quality, monitoring

Rackspace

Reactive monitoring

Real-time performance

Recovery point objective

Recovery time objective

Redundancy, cross-region and cross-zone

Regulations

auditing and
compliance with, and SLAs
data design decisions and
list of
monitoring compliance with
USA Patriot Act
U.S.-EU Safe Harbor

Requirements. See Customer requirements/expectations

Resistance to change

RESTful (Representational State Transfer) services

Retention period for data

RFC 5424 Syslog protocol

Risk aspects of service models

Risk tolerance and security

SaaS. See Software as a Service

Sales, impact of elastic cloud model on

Salesforce.com

Scaling techniques

Security

areas of focus
of AWS
cloud service providers and
maturation of
misinformation about
monitoring
overview of
requirements for
service models and
skills shortage and
strategies for
truth about
of web

Security as a Service (SecaaS)

Self-service provisioning

Sensitivity of data and security

Service level agreement (SLA)

defining
factors impacting
managing
monitoring
overview of

Service levels, monitoring

Service models

overview of
security requirements for
selecting
See also Infrastructure as a Service; Platform as a Service; Software as a Service

Session hijacking

Single tenancy

Skills shortage

SLA. See Service level agreement

Snowden, Edward

Software as a Service (SaaS)

auditing cloud applications
cloud stack
costs of
described
disaster recovery planning for
logging strategies
monitoring and
overview of
regulations for
security of
selecting
SLAs and

Software escrow

Standardization strategy for security

Standardizing log formats

State constraints

Stateful services

Stateless services

Static data sets

Storage use cases

Store types for data

Strategic aspects of service models

Systems thinking. See also DevOps

Target industry and security

Technical aspects of service models

Tenancy of systems

Test environment use cases

Third-party software solutions and PaaS

Throttling

Throughput, monitoring

Tightly coupled architecture

Transaction boundaries

Transmission boundaries and security

Tumblr

USA Patriot Act of 2001

User characteristics

User layer

performance at
security and

U.S.-EU Safe Harbor regulations

Value of recovery, and cost of downtime

Vendors

cloud migration services of
leveraging multiple public
lock-in
managing SLAs
PaaS
SaaS
security requirements for
selecting
shutdown of
See also Cloud service providers; Outages

Vertical scaling

Volatility of data

Volume of data

Web security

Workday

Worst practices

migrating applications to cloud
misguided expectations
misunderstanding customer requirements
outages and out of business scenarios
overview of
security misinformation
selecting vendors
skills shortage
underestimating impacts of change
unexpected costs
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.122.15