INDEX
Accounting and finance, impact of elastic cloud model on
ACID transactions
Acme eAuctions (AEA) case study
Active-passive cold model
Active-passive warm model
AEA case study. See Acme eAuctions (AEA) case study
Agility of cloud computing
Allspaw, John
Amazon EC2
Amazon Elastic Block Store
Amazon Web Services (AWS)
Apigee
API management
API SaaS tools
Application layer
Applications
Application stack layer
Architecture
Archiving use cases
Auditing
Automating
Automation strategy for security
AWS. See Amazon Web Services
Backup and restore method, classic
BASE transactions
Bias, Randy
Big-data PaaS solutions
Business and technical requirements. See Customer requirements
Business architecture diagram
Business impact of elastic cloud model
Business models
Case studies
Cash flow
Categories of information, monitoring
CD (continuous delivery)
CDNs (content delivery networks)
Centralization strategy for security
Centralized logging strategy
Change, resistance to. See also Organizational change
Chatter
CI (continuous integration)
Client-server era
Cloud bursting
Cloud computing
Cloud culture
Cloud Security Alliance
Cloud service providers (CSPs). See also Vendors
Cloud stack
Coghead
Column store databases
Commodity clouds
Compliance, monitoring
Concur expense management software
Consumer, maturity of, and auditing strategy
Consumer experience, visualizing
Content delivery networks (CDNs)
Continuous delivery (CD)
Continuous integration (CI)
Costs
Criticality of services
CSPs (cloud service providers). See also Vendors
Customer requirements/expectations
Data
Database as a Service (DBaaS) products
Data mining and analytics use cases
Defining SLAs
Delayed time performance
Deployment models
Deployments
Designing cloud services
Detection area of focus
DevOps
Directing logs to isolated storage areas
Disaster recovery planning
Document store databases
Domains to monitor
Downtime, cost of
Dynamic data sets
Elastic cloud model
Encryption of data
Engine Yard
Enterprise architecture, value of
Enterprise clouds
Enterprise management, complexity of
Enterprise model
Eucalyptus
Expectations, misguided
Experimenting and DevOps
Failure
Fault tolerance with software
Feature flags
Fielding, Roy
Files, storing data as
Financial aspects of service models
Force.com
Fragile systems
Functional requirements
GitHub
GoGrid
Government requests for data
Graph databases
Hammond, Paul
HATEOAS
Heroku
HIPAA (Health Insurance Portability and Accountability Act)
Horizontal scaling
Hosting solutions
Human resources, impact of elastic cloud model on
Hybrid clouds
IaaS. See Infrastructure as a Service
Implementing cloud initiatives
Infrastructure
Infrastructure as a Service (IaaS)
Infrastructure layer, performance at
Innovation, resistance to
Internet
Inventory of actors and SLAs
IT, impact of elastic cloud model on
Key management and security
Key performance indicators (KPIs), monitoring
Key-value store databases
Kim, Gene
Kotter, John
Layer 7 Technologies
Legacy applications, porting to cloud
Legacy systems, migrating to cloud
Legal department, impact of elastic cloud model on
Location of data
Log files, uses of
Logging
Loosely coupled architecture
Machine images, standard set of
Mainframe computers
Managing vendor SLAs
Mashery
Maturity of product and security
M-Dot Network
Mergers and acquisitions
Metrics to monitor
Microsoft Azure
Migrating
Minimal viable product
Mobile applications and PaaS
Monitoring
Multitenancy design strategies
National Institute of Standards and Technology (NIST)
National Oceanic and Atmospheric Administration
Near real time performance
Netflix
NIST. See National Institute of Standards and Technology
Nonfunctional requirements
NoSQL databases
Obama campaign e-commerce site
On-demand software solutions. See Software as a Service
Open-source cloud-based solutions
OpenStack
Organizational aspects of service models
Organizational change
Outages. See also Disaster recovery planning
Ownership of data
PaaS. See Platform as a Service
Passwords, API keys compared to
Patch management and security
Pay-as-you-go pricing model
PCs
PDP strategy
Performance, monitoring
Performance requirements of data
Personally identifiable information (PII)
Physical characteristics of data
Platform as a Service (PaaS)
Policy enforcement and security
Pragmatic approach for building services
Prevention area of focus
Primary data center, disaster recovery planning for
Private clouds
Private keys
Private PaaS
Private PaaS service providers
Proactive monitoring
Problem statement
Product components and SLAs
Production environment and quality monitoring
Project constraints
Protection area of focus
Prototyping, comparison of costs of
Public clouds
Public keys
Public PaaS service providers
Python
Quality, monitoring
Rackspace
Reactive monitoring
Real-time performance
Recovery point objective
Recovery time objective
Redundancy, cross-region and cross-zone
Regulations
Requirements. See Customer requirements/expectations
Resistance to change
RESTful (Representational State Transfer) services
Retention period for data
RFC 5424 Syslog protocol
Risk aspects of service models
Risk tolerance and security
SaaS. See Software as a Service
Sales, impact of elastic cloud model on
Salesforce.com
Scaling techniques
Security
Security as a Service (SecaaS)
Self-service provisioning
Sensitivity of data and security
Service level agreement (SLA)
Service levels, monitoring
Service models
Session hijacking
Single tenancy
Skills shortage
SLA. See Service level agreement
Snowden, Edward
Software as a Service (SaaS)
Software escrow
Standardization strategy for security
Standardizing log formats
State constraints
Stateful services
Stateless services
Static data sets
Storage use cases
Store types for data
Strategic aspects of service models
Systems thinking. See also DevOps
Target industry and security
Technical aspects of service models
Tenancy of systems
Test environment use cases
Third-party software solutions and PaaS
Throttling
Throughput, monitoring
Tightly coupled architecture
Transaction boundaries
Transmission boundaries and security
Tumblr
USA Patriot Act of 2001
User characteristics
User layer
U.S.-EU Safe Harbor regulations
Value of recovery, and cost of downtime
Vendors
Vertical scaling
Volatility of data
Volume of data
Web security
Workday
Worst practices
18.223.122.15