Question

In: Computer Science

1. Explain the purpose of resource pooling in regards to cloud computing. 2.When data is uploaded...

1. Explain the purpose of resource pooling in regards to cloud computing.

2.When data is uploaded to a cloud service provider's infrastructure, it is often said the organization loses physical control over their data. Explain how this is not entirely true.

3. Select the cloud technology that best fits the following scenario. A VM is allocated 8GB of memory and averages 3 to 4GB of memory utilization. Another VM is started and needs an additional 4GB of memory. The hypervisor is able to take the unused 4GB from the first VM and allocate it to the second VM.

Solutions

Expert Solution

1.
The purpose of resource pooling in regards to cloud computing:

  • According to consumer's demand, ‘The provider’s computing resources are managed for providing services to multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned.
  • Customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction which concludes that customer have location independence.(e.g., country, state, or datacenter).
  • Examples of resources include storage, processing, memory, and network bandwidth.

2.
This is not entirely true that When data is uploaded to a cloud service provider's infrastructure, the organization loses physical control over their data.

  • Some systems managers still believe the promise of cloud computing exceeds the technological reality.
  • They refer the Qualities such as:
  1. security,
  2. customizability,
  3. longevity,
  4. quality,
  5. reliability and others.

as being key inhibitors to adoption and valid causes for corporate hesitation.

  • In my opinion, the elephant in the room is really the loss of control that happens when ICT becomes cloud-based and widely accessible to the public.
  • Giving up direct control has to be one of the hardest things corporate managers have to do (or more correctly to re-do).   

The basic premise seems to be that if it’s under your control, then nothing much can go wrong!

Is the loss of cloud control a valid fear?

We will examine WHAT we are trying to control.
Four types come to mind:

  1. Control over data
  2. Control over functionality
  3. Control over assets
  4. Control over access

There are other things that need to be considered,

We can examine HOW a user can control a cloud ecosystem.
Several levels of control could be considered:

  1. Executive control (governance)
  2. Financial control
  3. Solution control
  4. Operational control
  • It does highlight some of the areas that Information and Technology managers need to consider.
  • In essence, the debate needs to change from simply “we’ve lost control” to how best to share the controls among the different stakeholders while maintaining strong oversight.
  • Perhaps one of the most important controls, from the user perspective, is simply having control over "who your suppliers are!"

3.
There are six methodologies to look at when talking about virtualization techniques in cloud computing:

  1. Network Virtualization
  2. Storage Virtualizing
  3. Server Virtualization
  4. Data Virtualization
  5. Desktop Virtualizing
  6. Application Virtualization


The cloud technology that best fits the following scenario is Storage Virtualizing in Cloud Computing.

  • This technique gives the user an ability to pool the hardware storage space from several interconnected storage devices into a simulated single storage device which is managed from one single console.
  • This storage technique is often used in storage area networks.

Storage manipulation in the cloud is mostly used for

  1. Backup,
  2. Archiving, and
  3. Recovering

of data by hiding the real and physical complex storage architecture.

  • Administrators can implement it with software applications or by employing hardware and software hybrid appliances.

Related Solutions

List and explain five of the costs to be budgeted when migrating to cloud computing.
List and explain five of the costs to be budgeted when migrating to cloud computing.
Describe the cloud storage levels depicted. Describe the following cloud computing principles:   SLA Monitor Hypervisor Resource...
Describe the cloud storage levels depicted. Describe the following cloud computing principles:   SLA Monitor Hypervisor Resource cluster Include a link to a company selling one of these resources.
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing,...
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
The purpose of this assignment is to articulate how Internet and cloud computing resources can be...
The purpose of this assignment is to articulate how Internet and cloud computing resources can be leveraged to generate competitive advantage and achieve organizational goals. For this assignment, imagine you are presenting your sales pitch to a potential investor who has shown interest in your new Internet-based startup company. You are hoping to convince the potential investor to partner with you by investing $5,000.00 for the use of Internet and cloud computing resources. In 250-words or less, write a proposal...
What role does big data and cloud computing play in marketintelligence?
What role does big data and cloud computing play in market intelligence?
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?  
The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing,...
The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and provide examples. 2. What is social network & it's influence on today's society? Give examples of social network..
The Cloud Effect" Please respond to the following 1. Many firms are relying on cloud computing,...
The Cloud Effect" Please respond to the following 1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire...
Explain the disaster recovery plan for AWS cloud. [Hint : chapter 10] Cloud Computing, Kris Jamsa,...
Explain the disaster recovery plan for AWS cloud. [Hint : chapter 10] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT