Welcome!

Cloud Computing Blog

Jamal Mazhar

Subscribe to Jamal Mazhar: eMailAlertsEmail Alerts
Get Jamal Mazhar via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jamal Mazhar

Automating the deployment and runtime management of large application deployments running on multiple cloud resources across various cloud providers is a challenging problem. Managing remote resources is not a new problem the big difference is that in cloud the resources are added and removed dynamically and at a larger scale. Before cloud people have built management systems using two approaches: Agent Agentless Historically the major trade-off between the agent and the agentless approach has been control vs. rollout time and maintenance costs. You usually get more control with the agent approach compared to the agentless approach. Whereas, the agentless approach is easy to deploy and manage as it doesn’t require rolling out new agents and maintaining their versions. At Kaavo for deploying software and performing runtime configuration we choose to use SSH instead of ... (more)

Using Cloud for Disaster Recovery

Use of cloud for DR solutions is becoming more common, even the organizations which are not using cloud for mission critical production applications are moving towards using cloud for application DR. Business Case for Using Cloud for the DR Faster Recovery Time Objective (RTO): Typically DR requires lengthy manual processes to fully restore the business applications at the DR site.  Having backup data and servers at the DR site is easy, however, restoring the entire application or service takes time.  E.g. full application restoration requires starting services in specified order... (more)

Building a Private Cloud Within a Public Cloud

One of our customers wanted to establish a site to site connectivity between their datacenter and  public cloud (Amazon EC2) and then have a private network within Amazon EC2 with their own custom IP addresses for their servers in the cloud.  Basically the idea here is to augment the internal datacenter resources with the resources in the public cloud securely so that the servers in the cloud appear as if they are part of their own private corporate network.  The idea here is to isolate the servers used by the customer in the cloud from the rest of the servers in the cloud using ... (more)

How Secure Is Data in the Cloud?

University of Berkley has published an excellent paper on cloud computing, the argument regarding data security in the cloud is that encrypted data in the cloud can be more secure than unencrypted data in the internal datacenter. Almost nobody uses encryption in internal datacenters as they are percieved as secure.  Here is an excerpt from the study: “We believe that there are no fundamental obstacles to making a cloud-computing environment as secure as the vast majority of in-house IT environments, and that many of the obstacles can be overcome immediately with well understood ... (more)

Cloud Ecosystem and How the Players fit in the End-to-End Solution for Enterprise Customers

As we are in the early stages of the transformation offered by cloud computing, there is lot of confusion around how various solutions and offerings fit in the overall picture for enterprise customers and the benefits of various offerings.  Whether you have to deliver SaaS, PaaS, or Custom Apps there are three building blocks you need to deliver them, datacenter with virtualization, IaaS layer on top of virtualization, and application/workload management for efficient deployment and management.  It can be argued that you don’t need virtualization or IaaS to deliver the Sa... (more)