Welcome!

Cloud Computing Blog

Jamal Mazhar

Subscribe to Jamal Mazhar: eMailAlertsEmail Alerts
Get Jamal Mazhar via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jamal Mazhar

One of our customers wanted to establish a site to site connectivity between their datacenter and  public cloud (Amazon EC2) and then have a private network within Amazon EC2 with their own custom IP addresses for their servers in the cloud.  Basically the idea here is to augment the internal datacenter resources with the resources in the public cloud securely so that the servers in the cloud appear as if they are part of their own private corporate network.  The idea here is to isolate the servers used by the customer in the cloud from the rest of the servers in the cloud using private network, just like the corporate internal datacenters are isolated using private network with private routers routing the internal traffic. Kaavo team setup the required network using OpenSwan and OpenVPN, see the figure below. The advantage of this setup is that users within the co... (more)

Managing IT Risks in a Cloudy World – Take away from Amazon recent outage

Several popular websites and companies were impacted by the recent Amazon cloud outage.  It was quite surprising to see that so many of the companies had no backup plans to restore their applications at an alternate location.  Just because we are using cloud doesn’t mean that we should forget all the lessons we have learned over the years in managing IT risks.  There are several ways companies can mitigate their risk exposure due to these types of outages.  For example one of Kaavo’s customers runs their application across Amazon and Rackspace cloud using Kaavo IMOD; ... (more)

How Secure Is Data in the Cloud?

University of Berkley has published an excellent paper on cloud computing, the argument regarding data security in the cloud is that encrypted data in the cloud can be more secure than unencrypted data in the internal datacenter. Almost nobody uses encryption in internal datacenters as they are percieved as secure.  Here is an excerpt from the study: “We believe that there are no fundamental obstacles to making a cloud-computing environment as secure as the vast majority of in-house IT environments, and that many of the obstacles can be overcome immediately with well understood ... (more)

Deploying and Managing Custom Apps in the Cloud

At Kaavo we recognized that there is a need to provide a horizontal framework that anyone can use to quickly build a vertical solution for running and managing their complex custom applications in the cloud. To enable single click deployment and runtime management of any custom application in the cloud Kaavo’s IMOD uses System Definition file for automating complex workflows and dependencies for deployment and runtime management.  Understanding the structure of System Definition file is important to fully benefit from Kaavo’s application centric management approach. System Defin... (more)

Cloud Ecosystem and How the Players fit in the End-to-End Solution for Enterprise Customers

As we are in the early stages of the transformation offered by cloud computing, there is lot of confusion around how various solutions and offerings fit in the overall picture for enterprise customers and the benefits of various offerings.  Whether you have to deliver SaaS, PaaS, or Custom Apps there are three building blocks you need to deliver them, datacenter with virtualization, IaaS layer on top of virtualization, and application/workload management for efficient deployment and management.  It can be argued that you don’t need virtualization or IaaS to deliver the Sa... (more)