+ All Categories
Home > Documents > Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

Date post: 22-Sep-2020
Category:
Upload: others
View: 45 times
Download: 1 times
Share this document with a friend
192
GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987 Cloud Computing Essentials Duration: 2 Days Course Code: GK3210 Overview: In this interactive, introductory-level course, you will gain a solid understanding of the fundamental concepts and architecture of cloud computing and of the design and deployment of a cloud computing platform. You will learn about the evolution of the cloud and its ability to increase processing power and bandwidth capabilities, and you will learn who's who in cloud computing, the products and services offered, and common platforms and applications. You will examine the pros and cons of implementing a cloud computing platform, including the financial benefits and the security risks, and you'll learn about cloud computing standards and best practices. Target Audience: Those interested in learning the essentials of cloud computing, including IT managers seeking basic cloud computing knowledge to determine whether or not to use cloud services, technical professionals who need to understand the basics of cloud computing, and those in sales or marketing functions who sell cloud services and want to increase their ability to communicate with experienced technical professionals Objectives: Essential elements of cloud computing Products used to implement virtualization architecture Pros and cons of cloud computing Security and privacy issues with cloud computing Who's who in cloud computing and the products and services Federation and presence they offer Cloud computing standards and best practices The business case for going to the cloud Platforms and applications used by cloud computing end users Building virtualized environments How mobile devices can be used in the cloud Virtualization architecture Prerequisites: Introduction to Information Technology (CompTIA Strata IT Fundamentals) Follow-on-Courses: Data Center Infrastructure Management VMware vSphere: Install, Configure, Manage [V4.1] VMware View: Install, Configure, Manage [V4.5] Implementing and Managing Microsoft Server Virtualization (M10215) DCASD - Designing Data Center Application Services v2.0
Transcript
Page 1: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Essentials

Duration: 2 Days Course Code: GK3210

Overview:

In this interactive, introductory-level course, you will gain a solid understanding of the fundamental concepts and architecture of cloudcomputing and of the design and deployment of a cloud computing platform. You will learn about the evolution of the cloud and its ability toincrease processing power and bandwidth capabilities, and you will learn who's who in cloud computing, the products and services offered, andcommon platforms and applications. You will examine the pros and cons of implementing a cloud computing platform, including the financialbenefits and the security risks, and you'll learn about cloud computing standards and best practices.

Target Audience:

Those interested in learning the essentials of cloud computing, including IT managers seeking basic cloud computing knowledge to determinewhether or not to use cloud services, technical professionals who need to understand the basics of cloud computing, and those in sales ormarketing functions who sell cloud services and want to increase their ability to communicate with experienced technical professionals

Objectives:

Essential elements of cloud computing Products used to implement virtualization architecture

Pros and cons of cloud computing Security and privacy issues with cloud computing

Who's who in cloud computing and the products and services Federation and presencethey offer

Cloud computing standards and best practicesThe business case for going to the cloud

Platforms and applications used by cloud computing end usersBuilding virtualized environments

How mobile devices can be used in the cloud Virtualization architecture

Prerequisites:

Introduction to Information Technology (CompTIA Strata ITFundamentals)

Follow-on-Courses:Data Center Infrastructure ManagementVMware vSphere: Install, Configure, Manage [V4.1]VMware View: Install, Configure, Manage [V4.5]Implementing and Managing Microsoft Server Virtualization (M10215)DCASD - Designing Data Center Application Services v2.0

Page 2: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Page 3: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Content:

1. Introduction to Cloud Computingline line line

What is Cloud Computing? Cloud Computing Defined Cloud Computing DefinedCloud Computing Architecture Cloud Computing ArchitectureCloud Computing Terms Cloud Computing Terms

line Communication-as-a-Service (CaaS) Communication-as-a-Service (CaaS)Cloud Computing Defined Infrastructure-as-a-Service (IaaS) Infrastructure-as-a-Service (IaaS)Cloud Computing Architecture Monitoring-as-a-Service (MaaS) Monitoring-as-a-Service (MaaS)Cloud Computing Terms Software-as-a-Service (SaaS) Software-as-a-Service (SaaS)Communication-as-a-Service (CaaS) Platform-as-a-Service (PaaS) Platform-as-a-Service (PaaS)Infrastructure-as-a-Service (IaaS) Benefits and Limitations of Cloud Benefits and Limitations of CloudMonitoring-as-a-Service (MaaS) Computing ComputingSoftware-as-a-Service (SaaS) Benefits BenefitsPlatform-as-a-Service (PaaS) Limitations LimitationsBenefits and Limitations of Cloud Computing Cloud Computing Case Studies Cloud Computing Case StudiesBenefits How Companies Are Using Cloud How Companies Are Using CloudLimitations Computing ComputingCloud Computing Case Studies Implementing Applications and Services Implementing Applications and Services inHow Companies Are Using Cloud in the Cloud the CloudComputing Using Your Company's Services vs. the Using Your Company's Services vs. theImplementing Applications and Services in Cloud Provider Cloud Providerthe Cloud A Cloud Service Provider Introduced A Cloud Service Provider IntroducedUsing Your Company's Services vs. the Cloud Computing Risks and Issues Cloud Computing Risks and Issues Cloud Provider Products and Services Provided by Cloud Products and Services Provided by CloudA Cloud Service Provider Introduced Computing Companies Computing Companies Cloud Computing Risks and Issues Operational OperationalProducts and Services Provided by Cloud Economic EconomicComputing Companies Staffing StaffingOperational Should Your Company Invest in Cloud Should Your Company Invest in CloudEconomic Computing? Computing?Staffing What Should Not be Moved to the Cloud What Should Not be Moved to the Cloud Should Your Company Invest in Cloud Virtualization in Mainframe Architectures Virtualization in Mainframe ArchitecturesComputing? and Operating Systems and Operating SystemsWhat Should Not be Moved to the Cloud LANs and the Cloud LANs and the CloudVirtualization in Mainframe Architectures Internet and the Cloud Internet and the Cloudand Operating Systems Web Services, Browsers, and the Cloud Web Services, Browsers, and the CloudLANs and the Cloud Thin Client Thin ClientInternet and the Cloud Advances in Networking and Processing Advances in Networking and ProcessingWeb Services, Browsers, and the Cloud Speeds that Led to Cloud Computing Speeds that Led to Cloud ComputingThin Client Networking Developments Networking DevelopmentsAdvances in Networking and Processing Increased Processing Speeds Increased Processing SpeedsSpeeds that Led to Cloud Computing Managed Service Provider Model to Managed Service Provider Model to CloudNetworking Developments Cloud Computing and Software as a Computing and Software as a ServiceIncreased Processing Speeds Service (SaaS) (SaaS)Managed Service Provider Model to Cloud Single Purpose Architectures Migrate to Single Purpose Architectures Migrate toComputing and Software as a Service Multipurpose Architectures Multipurpose Architectures(SaaS) Data Center Virtualization Data Center VirtualizationSingle Purpose Architectures Migrate to Collaboration CollaborationMultipurpose Architectures The Cloud as a Reach Extender The Cloud as a Reach ExtenderData Center Virtualization The Cloud as a Communication Enabler The Cloud as a Communication EnablerCollaboration The Cloud as an Employee Enabler The Cloud as an Employee EnablerThe Cloud as a Reach Extender Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA)The Cloud as a Communication Enabler Evolving from SOA to the Cloud Evolving from SOA to the CloudThe Cloud as an Employee Enabler Capacity: Limited Performance Capacity: Limited PerformanceService-Oriented Architecture (SOA) Availability: Communications Failure and Availability: Communications Failure andEvolving from SOA to the Cloud Performance Issues Performance IssuesCapacity: Limited Performance Security: Newer Security Protocols Security: Newer Security Protocols ProvideAvailability: Communications Failure and Provide More Protection More ProtectionPerformance Issues What's Next in Cloud Computing What's Next in Cloud Computing Security: Newer Security Protocols Provide Using Industry and International Using Industry and International StandardsMore Protection Standards Independent ComponentsWhat's Next in Cloud Computing Independent Components Message BaseUsing Industry and International Standards Message Base Location IndependenceIndependent Components Location Independence Communication Requirements for Cloud

Page 4: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Message Base Communication Requirements for Cloud ImplementationLocation Independence Implementation Public InternetCommunication Requirements for Cloud Public Internet Private InternetImplementation Private Internet Routing to the DatacenterPublic Internet Routing to the Datacenter Switching within the Data CenterPrivate Internet Switching within the Data Center BandwidthRouting to the Datacenter Bandwidth Tools Used to Measure NetworkSwitching within the Data Center Tools Used to Measure Network PerformanceBandwidth Performance Using the Protocol Analyzer to MeasureTools Used to Measure Network Using the Protocol Analyzer to Measure BandwidthPerformance Bandwidth Using Ping and Traceroute to MeasureUsing the Protocol Analyzer to Measure Using Ping and Traceroute to Measure Network PerformanceBandwidth Network Performance SecurityUsing Ping and Traceroute to Measure Security SSLNetwork Performance SSL VPNSecurity VPN OverheadSSL Overhead Storage Options for Cloud ComputingVPN Storage Options for Cloud Computing Storage CapacityOverhead Storage Capacity Data Protection and PartitioningStorage Options for Cloud Computing Data Protection and Partitioning NASStorage Capacity NAS SANData Protection and Partitioning SAN CASNAS CAS RedundancySAN Redundancy ReplicationCAS Replication MultisitingRedundancy Multisiting Backup and RecoveryReplication Backup and Recovery Server Software Environments thatMultisiting Server Software Environments that Support Cloud ComputingBackup and Recovery Support Cloud Computing Server CapacityServer Software Environments that Support Server Capacity VirtualizationCloud Computing Virtualization ClusteringServer Capacity Clustering ExpansionVirtualization Expansion Server FunctionsClustering Server Functions ApplicationExpansion Application WebServer Functions Web DatabaseApplication Database Vendor Approaches to Cloud ComputingWeb Vendor Approaches to Cloud Computing Role of Open Source Software in DataDatabase Role of Open Source Software in Data CenterVendor Approaches to Cloud Computing Center Cost Reduction vs. ReliabilityRole of Open Source Software in Data Cost Reduction vs. Reliability Open Source Server SoftwareCenter Open Source Server Software Open Source Database SoftwareCost Reduction vs. Reliability Open Source Database Software Open Source Applications SoftwareOpen Source Server Software Open Source Applications Software Open Source System ManagementOpen Source Database Software Open Source System Management SoftwareOpen Source Applications Software Software Open Source Load-Balancing Software Open Source System Management Software Open Source Load-Balancing Software The HypervisorOpen Source Load-Balancing Software The Hypervisor Virtualization as the "Operating System"The Hypervisor Virtualization as the "Operating System" Virtualization with a Host OperatingVirtualization as the "Operating System" Virtualization with a Host Operating SystemVirtualization with a Host Operating System System Virtualization Infections on VirtualizedVirtualization Infections on Virtualized Virtualization Infections on Virtualized EnvironmentsEnvironments Environments Type 1 Virtualized EnvironmentType 1 Virtualized Environment Type 1 Virtualized Environment Type 2 Virtualized EnvironmentType 2 Virtualized Environment Type 2 Virtualized Environment Virtualization EnvironmentsVirtualization Environments Virtualization Environments Microsoft VirtualizationMicrosoft Virtualization Microsoft Virtualization Sun xVM VirtualBoxSun xVM VirtualBox Sun xVM VirtualBox Linux/UNIX VirtualizationLinux/UNIX Virtualization Linux/UNIX Virtualization VMware ProductsVMware Products VMware Products Data Center and Cloud InfrastructureData Center and Cloud Infrastructure Data Center and Cloud Infrastructure ProductsProducts Products End-User and Desktop ProductsEnd-User and Desktop Products End-User and Desktop Products IBM VirtualizationIBM Virtualization IBM Virtualization Using VMware to see a Virtualized ServerUsing VMware to see a Virtualized Server Using VMware to see a Virtualized Server Environment Environment Environment What It Is

Page 5: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What It Is What It Is Permissive FederationPermissive Federation Permissive Federation Verified FederationVerified Federation Verified Federation Encrypted FederationEncrypted Federation Encrypted Federation Trusted FederationTrusted Federation Trusted Federation Using XMPP in the Federated EnvironmentUsing XMPP in the Federated Environment Using XMPP in the Federated Presence in the CloudPresence in the Cloud Environment What It IsWhat It Is Presence in the Cloud Presence ProtocolsPresence Protocols What It Is Leveraging PresenceLeveraging Presence Presence Protocols Presence EnabledPresence Enabled Leveraging Presence The Future of PresenceThe Future of Presence Presence Enabled The Interrelation of Identity, Presence, andThe Interrelation of Identity, Presence, and The Future of Presence Location in the CloudLocation in the Cloud The Interrelation of Identity, Presence, Identity ManagementIdentity Management and Location in the Cloud What It IsWhat It Is Identity Management Future of Identity in the CloudFuture of Identity in the Cloud What It Is Privacy and Its Relation to Cloud-BasedPrivacy and Its Relation to Cloud-Based Future of Identity in the Cloud Information SystemsInformation Systems Privacy and Its Relation to Cloud-Based Personal InformationPersonal Information Information Systems Privacy-Related IssuesPrivacy-Related Issues Personal Information Finding Your Private Information Finding Your Private Information Privacy-Related Issues What It IsWhat It Is Finding Your Private Information Open Cloud Consortium Working GroupsOpen Cloud Consortium Working Groups What It Is Project MatsuProject Matsu Open Cloud Consortium Working Groups Project CometProject Comet Project Matsu HPC in the CloudHPC in the Cloud Project Comet The Open Cloud TestbedThe Open Cloud Testbed HPC in the Cloud The Open Science Data CloudThe Open Science Data Cloud The Open Cloud Testbed Intercloud TestbedIntercloud Testbed The Open Science Data Cloud Reporting on an Open Cloud ConsortiumReporting on an Open Cloud Consortium Intercloud Testbed Working GroupWorking Group Reporting on an Open Cloud Consortium Distributed Management Task ForceDistributed Management Task Force Working Group (DMTF)(DMTF) Distributed Management Task Force What It Is?What It Is? (DMTF) DMTK Working Groups Associated withDMTK Working Groups Associated with What It Is? Cloud ComputingCloud Computing DMTK Working Groups Associated with Standards for Application DevelopersStandards for Application Developers Cloud Computing ProtocolsProtocols Standards for Application Developers Scripting LanguagesScripting Languages Protocols Content Formatting Standards andContent Formatting Standards and Scripting Languages LanguagesLanguages Content Formatting Standards and Standards for Security in the CloudStandards for Security in the Cloud Languages Confidentiality, Integrity, AvailabilityConfidentiality, Integrity, Availability Standards for Security in the Cloud Authentication, Authorization,Authentication, Authorization, Accountability Confidentiality, Integrity, Availability AccountabilityRegulations for Privacy Authentication, Authorization, Regulations for PrivacySecurity Protocols Accountability Security ProtocolsEstablishing a Baseline for Cloud Regulations for Privacy Establishing a Baseline for CloudPerformance Security Protocols PerformanceBest Practices for Selecting a Vendor and Establishing a Baseline for Cloud Best Practices for Selecting a Vendor andImplementing Cloud-Based Applications Performance Implementing Cloud-Based ApplicationsChoosing the Right Vendor Best Practices for Selecting a Vendor Choosing the Right VendorImplementing Cloud-Based Applications and Implementing Cloud-Based Implementing Cloud-Based Applications Citrix Applications CitrixWindows Remote Desktop Choosing the Right Vendor Windows Remote DesktopVnc Implementing Cloud-Based Applications VncWeb Browsers Citrix Web BrowsersServer Extensions Windows Remote Desktop Server ExtensionsThin Clients Vnc Thin ClientsSmart Phones, Pads, Pods, etc. Web Browsers Smart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths and Server Extensions Virtual Terminal Security Strengths andWeaknesses Thin Clients WeaknessesStrengths Smart Phones, Pads, Pods, etc. StrengthsWeaknesses Virtual Terminal Security Strengths and Weaknesses iPhone Weaknesses iPhoneAndroid Strengths Android

Page 6: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

BlackBerry Weaknesses BlackBerryWindows Mobile iPhone Windows MobileUbuntu Mobile Internet Device Android Ubuntu Mobile Internet DeviceMobile Platform Virtualization BlackBerry Mobile Platform VirtualizationKernel-Based Virtual Machine Windows Mobile Kernel-Based Virtual MachineVMware Mobile Virtualization Platform Ubuntu Mobile Internet Device VMware Mobile Virtualization PlatformCollaboration Applications for Mobile Mobile Platform Virtualization Collaboration Applications for MobilePlatforms Kernel-Based Virtual Machine PlatformsText Messaging VMware Mobile Virtualization Platform Text MessagingiPhone Applications Collaboration Applications for Mobile iPhone ApplicationsBlackBerry Applications Platforms BlackBerry ApplicationsDroid Applications Text Messaging Droid Applications

iPhone ApplicationsBlackBerry Applications

line Droid Applications lineCloud Computing Defined Cloud Computing DefinedCloud Computing Architecture Cloud Computing ArchitectureCloud Computing Terms line Cloud Computing TermsCommunication-as-a-Service (CaaS) Cloud Computing Defined Communication-as-a-Service (CaaS)Infrastructure-as-a-Service (IaaS) Cloud Computing Architecture Infrastructure-as-a-Service (IaaS)Monitoring-as-a-Service (MaaS) Cloud Computing Terms Monitoring-as-a-Service (MaaS)Software-as-a-Service (SaaS) Communication-as-a-Service (CaaS) Software-as-a-Service (SaaS)Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS)Benefits and Limitations of Cloud Computing Monitoring-as-a-Service (MaaS) Benefits and Limitations of CloudBenefits Software-as-a-Service (SaaS) ComputingLimitations Platform-as-a-Service (PaaS) BenefitsCloud Computing Case Studies Benefits and Limitations of Cloud LimitationsHow Companies Are Using Cloud Computing Cloud Computing Case StudiesComputing Benefits How Companies Are Using CloudImplementing Applications and Services in Limitations Computingthe Cloud Cloud Computing Case Studies Implementing Applications and Services inUsing Your Company's Services vs. the How Companies Are Using Cloud the CloudCloud Provider Computing Using Your Company's Services vs. theA Cloud Service Provider Introduced Implementing Applications and Services Cloud ProviderCloud Computing Risks and Issues in the Cloud A Cloud Service Provider IntroducedProducts and Services Provided by Cloud Using Your Company's Services vs. the Cloud Computing Risks and Issues Computing Companies Cloud Provider Products and Services Provided by CloudOperational A Cloud Service Provider Introduced Computing Companies Economic Cloud Computing Risks and Issues OperationalStaffing Products and Services Provided by Cloud EconomicShould Your Company Invest in Cloud Computing Companies StaffingComputing? Operational Should Your Company Invest in CloudWhat Should Not be Moved to the Cloud Economic Computing?Virtualization in Mainframe Architectures Staffing What Should Not be Moved to the Cloud and Operating Systems Should Your Company Invest in Cloud Virtualization in Mainframe ArchitecturesLANs and the Cloud Computing? and Operating SystemsInternet and the Cloud What Should Not be Moved to the Cloud LANs and the CloudWeb Services, Browsers, and the Cloud Virtualization in Mainframe Architectures Internet and the CloudThin Client and Operating Systems Web Services, Browsers, and the CloudAdvances in Networking and Processing LANs and the Cloud Thin ClientSpeeds that Led to Cloud Computing Internet and the Cloud Advances in Networking and ProcessingNetworking Developments Web Services, Browsers, and the Cloud Speeds that Led to Cloud ComputingIncreased Processing Speeds Thin Client Networking DevelopmentsManaged Service Provider Model to Cloud Advances in Networking and Processing Increased Processing SpeedsComputing and Software as a Service Speeds that Led to Cloud Computing Managed Service Provider Model to Cloud(SaaS) Networking Developments Computing and Software as a ServiceSingle Purpose Architectures Migrate to Increased Processing Speeds (SaaS)Multipurpose Architectures Managed Service Provider Model to Single Purpose Architectures Migrate toData Center Virtualization Cloud Computing and Software as a Multipurpose ArchitecturesCollaboration Service (SaaS) Data Center VirtualizationThe Cloud as a Reach Extender Single Purpose Architectures Migrate to CollaborationThe Cloud as a Communication Enabler Multipurpose Architectures The Cloud as a Reach ExtenderThe Cloud as an Employee Enabler Data Center Virtualization The Cloud as a Communication EnablerService-Oriented Architecture (SOA) Collaboration The Cloud as an Employee EnablerEvolving from SOA to the Cloud The Cloud as a Reach Extender Service-Oriented Architecture (SOA)Capacity: Limited Performance The Cloud as a Communication Enabler Evolving from SOA to the Cloud

Page 7: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Availability: Communications Failure and The Cloud as an Employee Enabler Capacity: Limited PerformancePerformance Issues Service-Oriented Architecture (SOA) Availability: Communications Failure andSecurity: Newer Security Protocols Provide Evolving from SOA to the Cloud Performance IssuesMore Protection Capacity: Limited Performance Security: Newer Security Protocols ProvideWhat's Next in Cloud Computing Availability: Communications Failure and More ProtectionUsing Industry and International Standards Performance Issues What's Next in Cloud Computing Independent Components Security: Newer Security Protocols Using Industry and International StandardsMessage Base Provide More Protection Independent ComponentsLocation Independence What's Next in Cloud Computing Message BaseCommunication Requirements for Cloud Using Industry and International Location IndependenceImplementation Standards Communication Requirements for CloudPublic Internet Independent Components ImplementationPrivate Internet Message Base Public InternetRouting to the Datacenter Location Independence Private InternetSwitching within the Data Center Communication Requirements for Cloud Routing to the DatacenterBandwidth Implementation Switching within the Data CenterTools Used to Measure Network Public Internet BandwidthPerformance Private Internet Tools Used to Measure NetworkUsing the Protocol Analyzer to Measure Routing to the Datacenter PerformanceBandwidth Switching within the Data Center Using the Protocol Analyzer to MeasureUsing Ping and Traceroute to Measure Bandwidth BandwidthNetwork Performance Tools Used to Measure Network Using Ping and Traceroute to MeasureSecurity Performance Network PerformanceSSL Using the Protocol Analyzer to Measure SecurityVPN Bandwidth SSLOverhead Using Ping and Traceroute to Measure VPNStorage Options for Cloud Computing Network Performance OverheadStorage Capacity Security Storage Options for Cloud ComputingData Protection and Partitioning SSL Storage CapacityNAS VPN Data Protection and PartitioningSAN Overhead NASCAS Storage Options for Cloud Computing SANRedundancy Storage Capacity CASReplication Data Protection and Partitioning RedundancyMultisiting NAS ReplicationBackup and Recovery SAN MultisitingServer Software Environments that Support CAS Backup and RecoveryCloud Computing Redundancy Server Software Environments thatServer Capacity Replication Support Cloud ComputingVirtualization Multisiting Server CapacityClustering Backup and Recovery VirtualizationExpansion Server Software Environments that ClusteringServer Functions Support Cloud Computing ExpansionApplication Server Capacity Server FunctionsWeb Virtualization ApplicationDatabase Clustering WebVendor Approaches to Cloud Computing Expansion DatabaseRole of Open Source Software in Data Server Functions Vendor Approaches to Cloud ComputingCenter Application Role of Open Source Software in DataCost Reduction vs. Reliability Web CenterOpen Source Server Software Database Cost Reduction vs. ReliabilityOpen Source Database Software Vendor Approaches to Cloud Computing Open Source Server SoftwareOpen Source Applications Software Role of Open Source Software in Data Open Source Database SoftwareOpen Source System Management Software Center Open Source Applications SoftwareOpen Source Load-Balancing Software Cost Reduction vs. Reliability Open Source System ManagementThe Hypervisor Open Source Server Software SoftwareVirtualization as the "Operating System" Open Source Database Software Open Source Load-Balancing Software Virtualization with a Host Operating System Open Source Applications Software The HypervisorVirtualization Infections on Virtualized Open Source System Management Virtualization as the "Operating System"Environments Software Virtualization with a Host OperatingType 1 Virtualized Environment Open Source Load-Balancing Software SystemType 2 Virtualized Environment The Hypervisor Virtualization Infections on VirtualizedVirtualization Environments Virtualization as the "Operating System" EnvironmentsMicrosoft Virtualization Virtualization with a Host Operating Type 1 Virtualized EnvironmentSun xVM VirtualBox System Type 2 Virtualized EnvironmentLinux/UNIX Virtualization Virtualization Infections on Virtualized Virtualization Environments

Page 8: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

VMware Products Environments Microsoft VirtualizationData Center and Cloud Infrastructure Type 1 Virtualized Environment Sun xVM VirtualBoxProducts Type 2 Virtualized Environment Linux/UNIX VirtualizationEnd-User and Desktop Products Virtualization Environments VMware ProductsIBM Virtualization Microsoft Virtualization Data Center and Cloud InfrastructureUsing VMware to see a Virtualized Server Sun xVM VirtualBox ProductsEnvironment Linux/UNIX Virtualization End-User and Desktop ProductsWhat It Is VMware Products IBM VirtualizationPermissive Federation Data Center and Cloud Infrastructure Using VMware to see a Virtualized ServerVerified Federation Products Environment Encrypted Federation End-User and Desktop Products What It IsTrusted Federation IBM Virtualization Permissive FederationUsing XMPP in the Federated Environment Using VMware to see a Virtualized Server Verified FederationPresence in the Cloud Environment Encrypted FederationWhat It Is What It Is Trusted FederationPresence Protocols Permissive Federation Using XMPP in the Federated EnvironmentLeveraging Presence Verified Federation Presence in the CloudPresence Enabled Encrypted Federation What It IsThe Future of Presence Trusted Federation Presence ProtocolsThe Interrelation of Identity, Presence, and Using XMPP in the Federated Leveraging PresenceLocation in the Cloud Environment Presence EnabledIdentity Management Presence in the Cloud The Future of PresenceWhat It Is What It Is The Interrelation of Identity, Presence, andFuture of Identity in the Cloud Presence Protocols Location in the CloudPrivacy and Its Relation to Cloud-Based Leveraging Presence Identity ManagementInformation Systems Presence Enabled What It IsPersonal Information The Future of Presence Future of Identity in the CloudPrivacy-Related Issues The Interrelation of Identity, Presence, Privacy and Its Relation to Cloud-BasedFinding Your Private Information and Location in the Cloud Information SystemsWhat It Is Identity Management Personal InformationOpen Cloud Consortium Working Groups What It Is Privacy-Related IssuesProject Matsu Future of Identity in the Cloud Finding Your Private Information Project Comet Privacy and Its Relation to Cloud-Based What It IsHPC in the Cloud Information Systems Open Cloud Consortium Working GroupsThe Open Cloud Testbed Personal Information Project MatsuThe Open Science Data Cloud Privacy-Related Issues Project CometIntercloud Testbed Finding Your Private Information HPC in the CloudReporting on an Open Cloud Consortium What It Is The Open Cloud TestbedWorking Group Open Cloud Consortium Working Groups The Open Science Data CloudDistributed Management Task Force Project Matsu Intercloud Testbed(DMTF) Project Comet Reporting on an Open Cloud ConsortiumWhat It Is? HPC in the Cloud Working GroupDMTK Working Groups Associated with The Open Cloud Testbed Distributed Management Task ForceCloud Computing The Open Science Data Cloud (DMTF)Standards for Application Developers Intercloud Testbed What It Is?Protocols Reporting on an Open Cloud Consortium DMTK Working Groups Associated withScripting Languages Working Group Cloud ComputingContent Formatting Standards and Distributed Management Task Force Standards for Application DevelopersLanguages (DMTF) ProtocolsStandards for Security in the Cloud What It Is? Scripting LanguagesConfidentiality, Integrity, Availability DMTK Working Groups Associated with Content Formatting Standards andAuthentication, Authorization, Accountability Cloud Computing LanguagesRegulations for Privacy Standards for Application Developers Standards for Security in the CloudSecurity Protocols Protocols Confidentiality, Integrity, AvailabilityEstablishing a Baseline for Cloud Scripting Languages Authentication, Authorization,Performance Content Formatting Standards and AccountabilityBest Practices for Selecting a Vendor and Languages Regulations for PrivacyImplementing Cloud-Based Applications Standards for Security in the Cloud Security ProtocolsChoosing the Right Vendor Confidentiality, Integrity, Availability Establishing a Baseline for CloudImplementing Cloud-Based Applications Authentication, Authorization, PerformanceCitrix Accountability Best Practices for Selecting a Vendor andWindows Remote Desktop Regulations for Privacy Implementing Cloud-Based ApplicationsVnc Security Protocols Choosing the Right VendorWeb Browsers Establishing a Baseline for Cloud Implementing Cloud-Based Applications Server Extensions Performance CitrixThin Clients Best Practices for Selecting a Vendor Windows Remote Desktop

Page 9: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Smart Phones, Pads, Pods, etc. and Implementing Cloud-Based VncVirtual Terminal Security Strengths and Applications Web BrowsersWeaknesses Choosing the Right Vendor Server ExtensionsStrengths Implementing Cloud-Based Applications Thin ClientsWeaknesses Citrix Smart Phones, Pads, Pods, etc.iPhone Windows Remote Desktop Virtual Terminal Security Strengths andAndroid Vnc WeaknessesBlackBerry Web Browsers StrengthsWindows Mobile Server Extensions Weaknesses Ubuntu Mobile Internet Device Thin Clients iPhoneMobile Platform Virtualization Smart Phones, Pads, Pods, etc. AndroidKernel-Based Virtual Machine Virtual Terminal Security Strengths and BlackBerryVMware Mobile Virtualization Platform Weaknesses Windows MobileCollaboration Applications for Mobile Strengths Ubuntu Mobile Internet DevicePlatforms Weaknesses Mobile Platform VirtualizationText Messaging iPhone Kernel-Based Virtual MachineiPhone Applications Android VMware Mobile Virtualization PlatformBlackBerry Applications BlackBerry Collaboration Applications for MobileDroid Applications Windows Mobile Platforms

Ubuntu Mobile Internet Device Text MessagingMobile Platform Virtualization iPhone Applications

line Kernel-Based Virtual Machine BlackBerry ApplicationsCloud Computing Defined VMware Mobile Virtualization Platform Droid Applications Cloud Computing Architecture Collaboration Applications for MobileCloud Computing Terms PlatformsCommunication-as-a-Service (CaaS) Text Messaging lineInfrastructure-as-a-Service (IaaS) iPhone Applications Cloud Computing DefinedMonitoring-as-a-Service (MaaS) BlackBerry Applications Cloud Computing ArchitectureSoftware-as-a-Service (SaaS) Droid Applications Cloud Computing TermsPlatform-as-a-Service (PaaS) Communication-as-a-Service (CaaS)Benefits and Limitations of Cloud Computing Infrastructure-as-a-Service (IaaS)Benefits line Monitoring-as-a-Service (MaaS)Limitations Cloud Computing Defined Software-as-a-Service (SaaS)Cloud Computing Case Studies Cloud Computing Architecture Platform-as-a-Service (PaaS)How Companies Are Using Cloud Cloud Computing Terms Benefits and Limitations of CloudComputing Communication-as-a-Service (CaaS) ComputingImplementing Applications and Services in Infrastructure-as-a-Service (IaaS) Benefitsthe Cloud Monitoring-as-a-Service (MaaS) LimitationsUsing Your Company's Services vs. the Software-as-a-Service (SaaS) Cloud Computing Case StudiesCloud Provider Platform-as-a-Service (PaaS) How Companies Are Using CloudA Cloud Service Provider Introduced Benefits and Limitations of Cloud ComputingCloud Computing Risks and Issues Computing Implementing Applications and Services inProducts and Services Provided by Cloud Benefits the CloudComputing Companies Limitations Using Your Company's Services vs. theOperational Cloud Computing Case Studies Cloud ProviderEconomic How Companies Are Using Cloud A Cloud Service Provider IntroducedStaffing Computing Cloud Computing Risks and Issues Should Your Company Invest in Cloud Implementing Applications and Services Products and Services Provided by CloudComputing? in the Cloud Computing Companies What Should Not be Moved to the Cloud Using Your Company's Services vs. the OperationalVirtualization in Mainframe Architectures Cloud Provider Economicand Operating Systems A Cloud Service Provider Introduced StaffingLANs and the Cloud Cloud Computing Risks and Issues Should Your Company Invest in CloudInternet and the Cloud Products and Services Provided by Cloud Computing?Web Services, Browsers, and the Cloud Computing Companies What Should Not be Moved to the Cloud Thin Client Operational Virtualization in Mainframe ArchitecturesAdvances in Networking and Processing Economic and Operating SystemsSpeeds that Led to Cloud Computing Staffing LANs and the CloudNetworking Developments Should Your Company Invest in Cloud Internet and the CloudIncreased Processing Speeds Computing? Web Services, Browsers, and the CloudManaged Service Provider Model to Cloud What Should Not be Moved to the Cloud Thin ClientComputing and Software as a Service Virtualization in Mainframe Architectures Advances in Networking and Processing(SaaS) and Operating Systems Speeds that Led to Cloud ComputingSingle Purpose Architectures Migrate to LANs and the Cloud Networking DevelopmentsMultipurpose Architectures Internet and the Cloud Increased Processing SpeedsData Center Virtualization Web Services, Browsers, and the Cloud Managed Service Provider Model to Cloud

Page 10: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Collaboration Thin Client Computing and Software as a ServiceThe Cloud as a Reach Extender Advances in Networking and Processing (SaaS)The Cloud as a Communication Enabler Speeds that Led to Cloud Computing Single Purpose Architectures Migrate toThe Cloud as an Employee Enabler Networking Developments Multipurpose ArchitecturesService-Oriented Architecture (SOA) Increased Processing Speeds Data Center VirtualizationEvolving from SOA to the Cloud Managed Service Provider Model to CollaborationCapacity: Limited Performance Cloud Computing and Software as a The Cloud as a Reach ExtenderAvailability: Communications Failure and Service (SaaS) The Cloud as a Communication EnablerPerformance Issues Single Purpose Architectures Migrate to The Cloud as an Employee EnablerSecurity: Newer Security Protocols Provide Multipurpose Architectures Service-Oriented Architecture (SOA)More Protection Data Center Virtualization Evolving from SOA to the CloudWhat's Next in Cloud Computing Collaboration Capacity: Limited PerformanceUsing Industry and International Standards The Cloud as a Reach Extender Availability: Communications Failure andIndependent Components The Cloud as a Communication Enabler Performance IssuesMessage Base The Cloud as an Employee Enabler Security: Newer Security Protocols ProvideLocation Independence Service-Oriented Architecture (SOA) More ProtectionCommunication Requirements for Cloud Evolving from SOA to the Cloud What's Next in Cloud Computing Implementation Capacity: Limited Performance Using Industry and International StandardsPublic Internet Availability: Communications Failure and Independent ComponentsPrivate Internet Performance Issues Message BaseRouting to the Datacenter Security: Newer Security Protocols Location IndependenceSwitching within the Data Center Provide More Protection Communication Requirements for CloudBandwidth What's Next in Cloud Computing ImplementationTools Used to Measure Network Using Industry and International Public InternetPerformance Standards Private InternetUsing the Protocol Analyzer to Measure Independent Components Routing to the DatacenterBandwidth Message Base Switching within the Data CenterUsing Ping and Traceroute to Measure Location Independence BandwidthNetwork Performance Communication Requirements for Cloud Tools Used to Measure NetworkSecurity Implementation PerformanceSSL Public Internet Using the Protocol Analyzer to MeasureVPN Private Internet BandwidthOverhead Routing to the Datacenter Using Ping and Traceroute to MeasureStorage Options for Cloud Computing Switching within the Data Center Network PerformanceStorage Capacity Bandwidth SecurityData Protection and Partitioning Tools Used to Measure Network SSLNAS Performance VPNSAN Using the Protocol Analyzer to Measure OverheadCAS Bandwidth Storage Options for Cloud ComputingRedundancy Using Ping and Traceroute to Measure Storage CapacityReplication Network Performance Data Protection and PartitioningMultisiting Security NASBackup and Recovery SSL SANServer Software Environments that Support VPN CASCloud Computing Overhead RedundancyServer Capacity Storage Options for Cloud Computing ReplicationVirtualization Storage Capacity MultisitingClustering Data Protection and Partitioning Backup and RecoveryExpansion NAS Server Software Environments thatServer Functions SAN Support Cloud ComputingApplication CAS Server CapacityWeb Redundancy VirtualizationDatabase Replication ClusteringVendor Approaches to Cloud Computing Multisiting ExpansionRole of Open Source Software in Data Backup and Recovery Server FunctionsCenter Server Software Environments that ApplicationCost Reduction vs. Reliability Support Cloud Computing WebOpen Source Server Software Server Capacity DatabaseOpen Source Database Software Virtualization Vendor Approaches to Cloud ComputingOpen Source Applications Software Clustering Role of Open Source Software in DataOpen Source System Management Software Expansion CenterOpen Source Load-Balancing Software Server Functions Cost Reduction vs. ReliabilityThe Hypervisor Application Open Source Server SoftwareVirtualization as the "Operating System" Web Open Source Database SoftwareVirtualization with a Host Operating System Database Open Source Applications SoftwareVirtualization Infections on Virtualized Vendor Approaches to Cloud Computing Open Source System Management

Page 11: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Environments Role of Open Source Software in Data SoftwareType 1 Virtualized Environment Center Open Source Load-Balancing Software Type 2 Virtualized Environment Cost Reduction vs. Reliability The HypervisorVirtualization Environments Open Source Server Software Virtualization as the "Operating System"Microsoft Virtualization Open Source Database Software Virtualization with a Host OperatingSun xVM VirtualBox Open Source Applications Software SystemLinux/UNIX Virtualization Open Source System Management Virtualization Infections on VirtualizedVMware Products Software EnvironmentsData Center and Cloud Infrastructure Open Source Load-Balancing Software Type 1 Virtualized EnvironmentProducts The Hypervisor Type 2 Virtualized EnvironmentEnd-User and Desktop Products Virtualization as the "Operating System" Virtualization EnvironmentsIBM Virtualization Virtualization with a Host Operating Microsoft VirtualizationUsing VMware to see a Virtualized Server System Sun xVM VirtualBoxEnvironment Virtualization Infections on Virtualized Linux/UNIX VirtualizationWhat It Is Environments VMware ProductsPermissive Federation Type 1 Virtualized Environment Data Center and Cloud InfrastructureVerified Federation Type 2 Virtualized Environment ProductsEncrypted Federation Virtualization Environments End-User and Desktop ProductsTrusted Federation Microsoft Virtualization IBM VirtualizationUsing XMPP in the Federated Environment Sun xVM VirtualBox Using VMware to see a Virtualized ServerPresence in the Cloud Linux/UNIX Virtualization Environment What It Is VMware Products What It IsPresence Protocols Data Center and Cloud Infrastructure Permissive FederationLeveraging Presence Products Verified FederationPresence Enabled End-User and Desktop Products Encrypted FederationThe Future of Presence IBM Virtualization Trusted FederationThe Interrelation of Identity, Presence, and Using VMware to see a Virtualized Server Using XMPP in the Federated EnvironmentLocation in the Cloud Environment Presence in the CloudIdentity Management What It Is What It IsWhat It Is Permissive Federation Presence ProtocolsFuture of Identity in the Cloud Verified Federation Leveraging PresencePrivacy and Its Relation to Cloud-Based Encrypted Federation Presence EnabledInformation Systems Trusted Federation The Future of PresencePersonal Information Using XMPP in the Federated The Interrelation of Identity, Presence, andPrivacy-Related Issues Environment Location in the CloudFinding Your Private Information Presence in the Cloud Identity ManagementWhat It Is What It Is What It IsOpen Cloud Consortium Working Groups Presence Protocols Future of Identity in the CloudProject Matsu Leveraging Presence Privacy and Its Relation to Cloud-BasedProject Comet Presence Enabled Information SystemsHPC in the Cloud The Future of Presence Personal InformationThe Open Cloud Testbed The Interrelation of Identity, Presence, Privacy-Related IssuesThe Open Science Data Cloud and Location in the Cloud Finding Your Private Information Intercloud Testbed Identity Management What It IsReporting on an Open Cloud Consortium What It Is Open Cloud Consortium Working GroupsWorking Group Future of Identity in the Cloud Project MatsuDistributed Management Task Force Privacy and Its Relation to Cloud-Based Project Comet(DMTF) Information Systems HPC in the CloudWhat It Is? Personal Information The Open Cloud TestbedDMTK Working Groups Associated with Privacy-Related Issues The Open Science Data CloudCloud Computing Finding Your Private Information Intercloud TestbedStandards for Application Developers What It Is Reporting on an Open Cloud ConsortiumProtocols Open Cloud Consortium Working Groups Working GroupScripting Languages Project Matsu Distributed Management Task ForceContent Formatting Standards and Project Comet (DMTF)Languages HPC in the Cloud What It Is?Standards for Security in the Cloud The Open Cloud Testbed DMTK Working Groups Associated withConfidentiality, Integrity, Availability The Open Science Data Cloud Cloud ComputingAuthentication, Authorization, Accountability Intercloud Testbed Standards for Application DevelopersRegulations for Privacy Reporting on an Open Cloud Consortium ProtocolsSecurity Protocols Working Group Scripting LanguagesEstablishing a Baseline for Cloud Distributed Management Task Force Content Formatting Standards andPerformance (DMTF) LanguagesBest Practices for Selecting a Vendor and What It Is? Standards for Security in the CloudImplementing Cloud-Based Applications DMTK Working Groups Associated with Confidentiality, Integrity, AvailabilityChoosing the Right Vendor Cloud Computing Authentication, Authorization,

Page 12: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Implementing Cloud-Based Applications Standards for Application Developers AccountabilityCitrix Protocols Regulations for PrivacyWindows Remote Desktop Scripting Languages Security ProtocolsVnc Content Formatting Standards and Establishing a Baseline for CloudWeb Browsers Languages PerformanceServer Extensions Standards for Security in the Cloud Best Practices for Selecting a Vendor andThin Clients Confidentiality, Integrity, Availability Implementing Cloud-Based ApplicationsSmart Phones, Pads, Pods, etc. Authentication, Authorization, Choosing the Right VendorVirtual Terminal Security Strengths and Accountability Implementing Cloud-Based Applications Weaknesses Regulations for Privacy CitrixStrengths Security Protocols Windows Remote DesktopWeaknesses Establishing a Baseline for Cloud VnciPhone Performance Web BrowsersAndroid Best Practices for Selecting a Vendor Server ExtensionsBlackBerry and Implementing Cloud-Based Thin ClientsWindows Mobile Applications Smart Phones, Pads, Pods, etc.Ubuntu Mobile Internet Device Choosing the Right Vendor Virtual Terminal Security Strengths andMobile Platform Virtualization Implementing Cloud-Based Applications WeaknessesKernel-Based Virtual Machine Citrix StrengthsVMware Mobile Virtualization Platform Windows Remote Desktop Weaknesses Collaboration Applications for Mobile Vnc iPhonePlatforms Web Browsers AndroidText Messaging Server Extensions BlackBerryiPhone Applications Thin Clients Windows MobileBlackBerry Applications Smart Phones, Pads, Pods, etc. Ubuntu Mobile Internet DeviceDroid Applications Virtual Terminal Security Strengths and Mobile Platform Virtualization

Weaknesses Kernel-Based Virtual MachineStrengths VMware Mobile Virtualization Platform

line Weaknesses Collaboration Applications for MobileCloud Computing Defined iPhone PlatformsCloud Computing Architecture Android Text MessagingCloud Computing Terms BlackBerry iPhone ApplicationsCommunication-as-a-Service (CaaS) Windows Mobile BlackBerry ApplicationsInfrastructure-as-a-Service (IaaS) Ubuntu Mobile Internet Device Droid Applications Monitoring-as-a-Service (MaaS) Mobile Platform VirtualizationSoftware-as-a-Service (SaaS) Kernel-Based Virtual MachinePlatform-as-a-Service (PaaS) VMware Mobile Virtualization Platform lineBenefits and Limitations of Cloud Computing Collaboration Applications for Mobile Cloud Computing DefinedBenefits Platforms Cloud Computing ArchitectureLimitations Text Messaging Cloud Computing TermsCloud Computing Case Studies iPhone Applications Communication-as-a-Service (CaaS)How Companies Are Using Cloud BlackBerry Applications Infrastructure-as-a-Service (IaaS)Computing Droid Applications Monitoring-as-a-Service (MaaS)Implementing Applications and Services in Software-as-a-Service (SaaS)the Cloud Platform-as-a-Service (PaaS)Using Your Company's Services vs. the line Benefits and Limitations of CloudCloud Provider Cloud Computing Defined ComputingA Cloud Service Provider Introduced Cloud Computing Architecture BenefitsCloud Computing Risks and Issues Cloud Computing Terms LimitationsProducts and Services Provided by Cloud Communication-as-a-Service (CaaS) Cloud Computing Case StudiesComputing Companies Infrastructure-as-a-Service (IaaS) How Companies Are Using CloudOperational Monitoring-as-a-Service (MaaS) ComputingEconomic Software-as-a-Service (SaaS) Implementing Applications and Services inStaffing Platform-as-a-Service (PaaS) the CloudShould Your Company Invest in Cloud Benefits and Limitations of Cloud Using Your Company's Services vs. theComputing? Computing Cloud ProviderWhat Should Not be Moved to the Cloud Benefits A Cloud Service Provider IntroducedVirtualization in Mainframe Architectures Limitations Cloud Computing Risks and Issues and Operating Systems Cloud Computing Case Studies Products and Services Provided by CloudLANs and the Cloud How Companies Are Using Cloud Computing Companies Internet and the Cloud Computing OperationalWeb Services, Browsers, and the Cloud Implementing Applications and Services EconomicThin Client in the Cloud StaffingAdvances in Networking and Processing Using Your Company's Services vs. the Should Your Company Invest in CloudSpeeds that Led to Cloud Computing Cloud Provider Computing?Networking Developments A Cloud Service Provider Introduced What Should Not be Moved to the Cloud

Page 13: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Increased Processing Speeds Cloud Computing Risks and Issues Virtualization in Mainframe ArchitecturesManaged Service Provider Model to Cloud Products and Services Provided by Cloud and Operating SystemsComputing and Software as a Service Computing Companies LANs and the Cloud(SaaS) Operational Internet and the CloudSingle Purpose Architectures Migrate to Economic Web Services, Browsers, and the CloudMultipurpose Architectures Staffing Thin ClientData Center Virtualization Should Your Company Invest in Cloud Advances in Networking and ProcessingCollaboration Computing? Speeds that Led to Cloud ComputingThe Cloud as a Reach Extender What Should Not be Moved to the Cloud Networking DevelopmentsThe Cloud as a Communication Enabler Virtualization in Mainframe Architectures Increased Processing SpeedsThe Cloud as an Employee Enabler and Operating Systems Managed Service Provider Model to CloudService-Oriented Architecture (SOA) LANs and the Cloud Computing and Software as a ServiceEvolving from SOA to the Cloud Internet and the Cloud (SaaS)Capacity: Limited Performance Web Services, Browsers, and the Cloud Single Purpose Architectures Migrate toAvailability: Communications Failure and Thin Client Multipurpose ArchitecturesPerformance Issues Advances in Networking and Processing Data Center VirtualizationSecurity: Newer Security Protocols Provide Speeds that Led to Cloud Computing CollaborationMore Protection Networking Developments The Cloud as a Reach ExtenderWhat's Next in Cloud Computing Increased Processing Speeds The Cloud as a Communication EnablerUsing Industry and International Standards Managed Service Provider Model to The Cloud as an Employee EnablerIndependent Components Cloud Computing and Software as a Service-Oriented Architecture (SOA)Message Base Service (SaaS) Evolving from SOA to the CloudLocation Independence Single Purpose Architectures Migrate to Capacity: Limited PerformanceCommunication Requirements for Cloud Multipurpose Architectures Availability: Communications Failure andImplementation Data Center Virtualization Performance IssuesPublic Internet Collaboration Security: Newer Security Protocols ProvidePrivate Internet The Cloud as a Reach Extender More ProtectionRouting to the Datacenter The Cloud as a Communication Enabler What's Next in Cloud Computing Switching within the Data Center The Cloud as an Employee Enabler Using Industry and International StandardsBandwidth Service-Oriented Architecture (SOA) Independent ComponentsTools Used to Measure Network Evolving from SOA to the Cloud Message BasePerformance Capacity: Limited Performance Location IndependenceUsing the Protocol Analyzer to Measure Availability: Communications Failure and Communication Requirements for CloudBandwidth Performance Issues ImplementationUsing Ping and Traceroute to Measure Security: Newer Security Protocols Public InternetNetwork Performance Provide More Protection Private InternetSecurity What's Next in Cloud Computing Routing to the DatacenterSSL Using Industry and International Switching within the Data CenterVPN Standards BandwidthOverhead Independent Components Tools Used to Measure NetworkStorage Options for Cloud Computing Message Base PerformanceStorage Capacity Location Independence Using the Protocol Analyzer to MeasureData Protection and Partitioning Communication Requirements for Cloud BandwidthNAS Implementation Using Ping and Traceroute to MeasureSAN Public Internet Network PerformanceCAS Private Internet SecurityRedundancy Routing to the Datacenter SSLReplication Switching within the Data Center VPNMultisiting Bandwidth OverheadBackup and Recovery Tools Used to Measure Network Storage Options for Cloud ComputingServer Software Environments that Support Performance Storage CapacityCloud Computing Using the Protocol Analyzer to Measure Data Protection and PartitioningServer Capacity Bandwidth NASVirtualization Using Ping and Traceroute to Measure SANClustering Network Performance CASExpansion Security RedundancyServer Functions SSL ReplicationApplication VPN MultisitingWeb Overhead Backup and RecoveryDatabase Storage Options for Cloud Computing Server Software Environments thatVendor Approaches to Cloud Computing Storage Capacity Support Cloud ComputingRole of Open Source Software in Data Data Protection and Partitioning Server CapacityCenter NAS VirtualizationCost Reduction vs. Reliability SAN ClusteringOpen Source Server Software CAS ExpansionOpen Source Database Software Redundancy Server Functions

Page 14: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Open Source Applications Software Replication ApplicationOpen Source System Management Software Multisiting WebOpen Source Load-Balancing Software Backup and Recovery DatabaseThe Hypervisor Server Software Environments that Vendor Approaches to Cloud ComputingVirtualization as the "Operating System" Support Cloud Computing Role of Open Source Software in DataVirtualization with a Host Operating System Server Capacity CenterVirtualization Infections on Virtualized Virtualization Cost Reduction vs. ReliabilityEnvironments Clustering Open Source Server SoftwareType 1 Virtualized Environment Expansion Open Source Database SoftwareType 2 Virtualized Environment Server Functions Open Source Applications SoftwareVirtualization Environments Application Open Source System ManagementMicrosoft Virtualization Web SoftwareSun xVM VirtualBox Database Open Source Load-Balancing Software Linux/UNIX Virtualization Vendor Approaches to Cloud Computing The HypervisorVMware Products Role of Open Source Software in Data Virtualization as the "Operating System"Data Center and Cloud Infrastructure Center Virtualization with a Host OperatingProducts Cost Reduction vs. Reliability SystemEnd-User and Desktop Products Open Source Server Software Virtualization Infections on VirtualizedIBM Virtualization Open Source Database Software EnvironmentsUsing VMware to see a Virtualized Server Open Source Applications Software Type 1 Virtualized EnvironmentEnvironment Open Source System Management Type 2 Virtualized EnvironmentWhat It Is Software Virtualization EnvironmentsPermissive Federation Open Source Load-Balancing Software Microsoft VirtualizationVerified Federation The Hypervisor Sun xVM VirtualBoxEncrypted Federation Virtualization as the "Operating System" Linux/UNIX VirtualizationTrusted Federation Virtualization with a Host Operating VMware ProductsUsing XMPP in the Federated Environment System Data Center and Cloud InfrastructurePresence in the Cloud Virtualization Infections on Virtualized ProductsWhat It Is Environments End-User and Desktop ProductsPresence Protocols Type 1 Virtualized Environment IBM VirtualizationLeveraging Presence Type 2 Virtualized Environment Using VMware to see a Virtualized ServerPresence Enabled Virtualization Environments Environment The Future of Presence Microsoft Virtualization What It IsThe Interrelation of Identity, Presence, and Sun xVM VirtualBox Permissive FederationLocation in the Cloud Linux/UNIX Virtualization Verified FederationIdentity Management VMware Products Encrypted FederationWhat It Is Data Center and Cloud Infrastructure Trusted FederationFuture of Identity in the Cloud Products Using XMPP in the Federated EnvironmentPrivacy and Its Relation to Cloud-Based End-User and Desktop Products Presence in the CloudInformation Systems IBM Virtualization What It IsPersonal Information Using VMware to see a Virtualized Server Presence ProtocolsPrivacy-Related Issues Environment Leveraging PresenceFinding Your Private Information What It Is Presence EnabledWhat It Is Permissive Federation The Future of PresenceOpen Cloud Consortium Working Groups Verified Federation The Interrelation of Identity, Presence, andProject Matsu Encrypted Federation Location in the CloudProject Comet Trusted Federation Identity ManagementHPC in the Cloud Using XMPP in the Federated What It IsThe Open Cloud Testbed Environment Future of Identity in the CloudThe Open Science Data Cloud Presence in the Cloud Privacy and Its Relation to Cloud-BasedIntercloud Testbed What It Is Information SystemsReporting on an Open Cloud Consortium Presence Protocols Personal InformationWorking Group Leveraging Presence Privacy-Related IssuesDistributed Management Task Force Presence Enabled Finding Your Private Information (DMTF) The Future of Presence What It IsWhat It Is? The Interrelation of Identity, Presence, Open Cloud Consortium Working GroupsDMTK Working Groups Associated with and Location in the Cloud Project MatsuCloud Computing Identity Management Project CometStandards for Application Developers What It Is HPC in the CloudProtocols Future of Identity in the Cloud The Open Cloud TestbedScripting Languages Privacy and Its Relation to Cloud-Based The Open Science Data CloudContent Formatting Standards and Information Systems Intercloud TestbedLanguages Personal Information Reporting on an Open Cloud ConsortiumStandards for Security in the Cloud Privacy-Related Issues Working GroupConfidentiality, Integrity, Availability Finding Your Private Information Distributed Management Task ForceAuthentication, Authorization, Accountability What It Is (DMTF)

Page 15: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Regulations for Privacy Open Cloud Consortium Working Groups What It Is?Security Protocols Project Matsu DMTK Working Groups Associated withEstablishing a Baseline for Cloud Project Comet Cloud ComputingPerformance HPC in the Cloud Standards for Application DevelopersBest Practices for Selecting a Vendor and The Open Cloud Testbed ProtocolsImplementing Cloud-Based Applications The Open Science Data Cloud Scripting LanguagesChoosing the Right Vendor Intercloud Testbed Content Formatting Standards andImplementing Cloud-Based Applications Reporting on an Open Cloud Consortium LanguagesCitrix Working Group Standards for Security in the CloudWindows Remote Desktop Distributed Management Task Force Confidentiality, Integrity, AvailabilityVnc (DMTF) Authentication, Authorization,Web Browsers What It Is? AccountabilityServer Extensions DMTK Working Groups Associated with Regulations for PrivacyThin Clients Cloud Computing Security ProtocolsSmart Phones, Pads, Pods, etc. Standards for Application Developers Establishing a Baseline for CloudVirtual Terminal Security Strengths and Protocols PerformanceWeaknesses Scripting Languages Best Practices for Selecting a Vendor andStrengths Content Formatting Standards and Implementing Cloud-Based ApplicationsWeaknesses Languages Choosing the Right VendoriPhone Standards for Security in the Cloud Implementing Cloud-Based Applications Android Confidentiality, Integrity, Availability CitrixBlackBerry Authentication, Authorization, Windows Remote DesktopWindows Mobile Accountability VncUbuntu Mobile Internet Device Regulations for Privacy Web BrowsersMobile Platform Virtualization Security Protocols Server ExtensionsKernel-Based Virtual Machine Establishing a Baseline for Cloud Thin ClientsVMware Mobile Virtualization Platform Performance Smart Phones, Pads, Pods, etc.Collaboration Applications for Mobile Best Practices for Selecting a Vendor Virtual Terminal Security Strengths andPlatforms and Implementing Cloud-Based WeaknessesText Messaging Applications StrengthsiPhone Applications Choosing the Right Vendor Weaknesses BlackBerry Applications Implementing Cloud-Based Applications iPhoneDroid Applications Citrix Android

Windows Remote Desktop BlackBerryVnc Windows Mobile

line Web Browsers Ubuntu Mobile Internet DeviceCloud Computing Defined Server Extensions Mobile Platform VirtualizationCloud Computing Architecture Thin Clients Kernel-Based Virtual MachineCloud Computing Terms Smart Phones, Pads, Pods, etc. VMware Mobile Virtualization PlatformCommunication-as-a-Service (CaaS) Virtual Terminal Security Strengths and Collaboration Applications for MobileInfrastructure-as-a-Service (IaaS) Weaknesses PlatformsMonitoring-as-a-Service (MaaS) Strengths Text MessagingSoftware-as-a-Service (SaaS) Weaknesses iPhone ApplicationsPlatform-as-a-Service (PaaS) iPhone BlackBerry ApplicationsBenefits and Limitations of Cloud Computing Android Droid Applications Benefits BlackBerryLimitations Windows MobileCloud Computing Case Studies Ubuntu Mobile Internet Device lineHow Companies Are Using Cloud Mobile Platform Virtualization Cloud Computing DefinedComputing Kernel-Based Virtual Machine Cloud Computing ArchitectureImplementing Applications and Services in VMware Mobile Virtualization Platform Cloud Computing Termsthe Cloud Collaboration Applications for Mobile Communication-as-a-Service (CaaS)Using Your Company's Services vs. the Platforms Infrastructure-as-a-Service (IaaS)Cloud Provider Text Messaging Monitoring-as-a-Service (MaaS)A Cloud Service Provider Introduced iPhone Applications Software-as-a-Service (SaaS)Cloud Computing Risks and Issues BlackBerry Applications Platform-as-a-Service (PaaS)Products and Services Provided by Cloud Droid Applications Benefits and Limitations of CloudComputing Companies ComputingOperational BenefitsEconomic line LimitationsStaffing Cloud Computing Defined Cloud Computing Case StudiesShould Your Company Invest in Cloud Cloud Computing Architecture How Companies Are Using CloudComputing? Cloud Computing Terms ComputingWhat Should Not be Moved to the Cloud Communication-as-a-Service (CaaS) Implementing Applications and Services inVirtualization in Mainframe Architectures Infrastructure-as-a-Service (IaaS) the Cloudand Operating Systems Monitoring-as-a-Service (MaaS) Using Your Company's Services vs. the

Page 16: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

LANs and the Cloud Software-as-a-Service (SaaS) Cloud ProviderInternet and the Cloud Platform-as-a-Service (PaaS) A Cloud Service Provider IntroducedWeb Services, Browsers, and the Cloud Benefits and Limitations of Cloud Cloud Computing Risks and Issues Thin Client Computing Products and Services Provided by CloudAdvances in Networking and Processing Benefits Computing Companies Speeds that Led to Cloud Computing Limitations OperationalNetworking Developments Cloud Computing Case Studies EconomicIncreased Processing Speeds How Companies Are Using Cloud StaffingManaged Service Provider Model to Cloud Computing Should Your Company Invest in CloudComputing and Software as a Service Implementing Applications and Services Computing?(SaaS) in the Cloud What Should Not be Moved to the Cloud Single Purpose Architectures Migrate to Using Your Company's Services vs. the Virtualization in Mainframe ArchitecturesMultipurpose Architectures Cloud Provider and Operating SystemsData Center Virtualization A Cloud Service Provider Introduced LANs and the CloudCollaboration Cloud Computing Risks and Issues Internet and the CloudThe Cloud as a Reach Extender Products and Services Provided by Cloud Web Services, Browsers, and the CloudThe Cloud as a Communication Enabler Computing Companies Thin ClientThe Cloud as an Employee Enabler Operational Advances in Networking and ProcessingService-Oriented Architecture (SOA) Economic Speeds that Led to Cloud ComputingEvolving from SOA to the Cloud Staffing Networking DevelopmentsCapacity: Limited Performance Should Your Company Invest in Cloud Increased Processing SpeedsAvailability: Communications Failure and Computing? Managed Service Provider Model to CloudPerformance Issues What Should Not be Moved to the Cloud Computing and Software as a ServiceSecurity: Newer Security Protocols Provide Virtualization in Mainframe Architectures (SaaS)More Protection and Operating Systems Single Purpose Architectures Migrate toWhat's Next in Cloud Computing LANs and the Cloud Multipurpose ArchitecturesUsing Industry and International Standards Internet and the Cloud Data Center VirtualizationIndependent Components Web Services, Browsers, and the Cloud CollaborationMessage Base Thin Client The Cloud as a Reach ExtenderLocation Independence Advances in Networking and Processing The Cloud as a Communication EnablerCommunication Requirements for Cloud Speeds that Led to Cloud Computing The Cloud as an Employee EnablerImplementation Networking Developments Service-Oriented Architecture (SOA)Public Internet Increased Processing Speeds Evolving from SOA to the CloudPrivate Internet Managed Service Provider Model to Capacity: Limited PerformanceRouting to the Datacenter Cloud Computing and Software as a Availability: Communications Failure andSwitching within the Data Center Service (SaaS) Performance IssuesBandwidth Single Purpose Architectures Migrate to Security: Newer Security Protocols ProvideTools Used to Measure Network Multipurpose Architectures More ProtectionPerformance Data Center Virtualization What's Next in Cloud Computing Using the Protocol Analyzer to Measure Collaboration Using Industry and International StandardsBandwidth The Cloud as a Reach Extender Independent ComponentsUsing Ping and Traceroute to Measure The Cloud as a Communication Enabler Message BaseNetwork Performance The Cloud as an Employee Enabler Location IndependenceSecurity Service-Oriented Architecture (SOA) Communication Requirements for CloudSSL Evolving from SOA to the Cloud ImplementationVPN Capacity: Limited Performance Public InternetOverhead Availability: Communications Failure and Private InternetStorage Options for Cloud Computing Performance Issues Routing to the DatacenterStorage Capacity Security: Newer Security Protocols Switching within the Data CenterData Protection and Partitioning Provide More Protection BandwidthNAS What's Next in Cloud Computing Tools Used to Measure NetworkSAN Using Industry and International PerformanceCAS Standards Using the Protocol Analyzer to MeasureRedundancy Independent Components BandwidthReplication Message Base Using Ping and Traceroute to MeasureMultisiting Location Independence Network PerformanceBackup and Recovery Communication Requirements for Cloud SecurityServer Software Environments that Support Implementation SSLCloud Computing Public Internet VPNServer Capacity Private Internet OverheadVirtualization Routing to the Datacenter Storage Options for Cloud ComputingClustering Switching within the Data Center Storage CapacityExpansion Bandwidth Data Protection and PartitioningServer Functions Tools Used to Measure Network NASApplication Performance SANWeb Using the Protocol Analyzer to Measure CAS

Page 17: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Database Bandwidth RedundancyVendor Approaches to Cloud Computing Using Ping and Traceroute to Measure ReplicationRole of Open Source Software in Data Network Performance MultisitingCenter Security Backup and RecoveryCost Reduction vs. Reliability SSL Server Software Environments thatOpen Source Server Software VPN Support Cloud ComputingOpen Source Database Software Overhead Server CapacityOpen Source Applications Software Storage Options for Cloud Computing VirtualizationOpen Source System Management Software Storage Capacity ClusteringOpen Source Load-Balancing Software Data Protection and Partitioning ExpansionThe Hypervisor NAS Server FunctionsVirtualization as the "Operating System" SAN ApplicationVirtualization with a Host Operating System CAS WebVirtualization Infections on Virtualized Redundancy DatabaseEnvironments Replication Vendor Approaches to Cloud ComputingType 1 Virtualized Environment Multisiting Role of Open Source Software in DataType 2 Virtualized Environment Backup and Recovery CenterVirtualization Environments Server Software Environments that Cost Reduction vs. ReliabilityMicrosoft Virtualization Support Cloud Computing Open Source Server SoftwareSun xVM VirtualBox Server Capacity Open Source Database SoftwareLinux/UNIX Virtualization Virtualization Open Source Applications SoftwareVMware Products Clustering Open Source System ManagementData Center and Cloud Infrastructure Expansion SoftwareProducts Server Functions Open Source Load-Balancing Software End-User and Desktop Products Application The HypervisorIBM Virtualization Web Virtualization as the "Operating System"Using VMware to see a Virtualized Server Database Virtualization with a Host OperatingEnvironment Vendor Approaches to Cloud Computing SystemWhat It Is Role of Open Source Software in Data Virtualization Infections on VirtualizedPermissive Federation Center EnvironmentsVerified Federation Cost Reduction vs. Reliability Type 1 Virtualized EnvironmentEncrypted Federation Open Source Server Software Type 2 Virtualized EnvironmentTrusted Federation Open Source Database Software Virtualization EnvironmentsUsing XMPP in the Federated Environment Open Source Applications Software Microsoft VirtualizationPresence in the Cloud Open Source System Management Sun xVM VirtualBoxWhat It Is Software Linux/UNIX VirtualizationPresence Protocols Open Source Load-Balancing Software VMware ProductsLeveraging Presence The Hypervisor Data Center and Cloud InfrastructurePresence Enabled Virtualization as the "Operating System" ProductsThe Future of Presence Virtualization with a Host Operating End-User and Desktop ProductsThe Interrelation of Identity, Presence, and System IBM VirtualizationLocation in the Cloud Virtualization Infections on Virtualized Using VMware to see a Virtualized ServerIdentity Management Environments Environment What It Is Type 1 Virtualized Environment What It IsFuture of Identity in the Cloud Type 2 Virtualized Environment Permissive FederationPrivacy and Its Relation to Cloud-Based Virtualization Environments Verified FederationInformation Systems Microsoft Virtualization Encrypted FederationPersonal Information Sun xVM VirtualBox Trusted FederationPrivacy-Related Issues Linux/UNIX Virtualization Using XMPP in the Federated EnvironmentFinding Your Private Information VMware Products Presence in the CloudWhat It Is Data Center and Cloud Infrastructure What It IsOpen Cloud Consortium Working Groups Products Presence ProtocolsProject Matsu End-User and Desktop Products Leveraging PresenceProject Comet IBM Virtualization Presence EnabledHPC in the Cloud Using VMware to see a Virtualized Server The Future of PresenceThe Open Cloud Testbed Environment The Interrelation of Identity, Presence, andThe Open Science Data Cloud What It Is Location in the CloudIntercloud Testbed Permissive Federation Identity ManagementReporting on an Open Cloud Consortium Verified Federation What It IsWorking Group Encrypted Federation Future of Identity in the CloudDistributed Management Task Force Trusted Federation Privacy and Its Relation to Cloud-Based(DMTF) Using XMPP in the Federated Information SystemsWhat It Is? Environment Personal InformationDMTK Working Groups Associated with Presence in the Cloud Privacy-Related IssuesCloud Computing What It Is Finding Your Private Information Standards for Application Developers Presence Protocols What It Is

Page 18: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Protocols Leveraging Presence Open Cloud Consortium Working GroupsScripting Languages Presence Enabled Project MatsuContent Formatting Standards and The Future of Presence Project CometLanguages The Interrelation of Identity, Presence, HPC in the CloudStandards for Security in the Cloud and Location in the Cloud The Open Cloud TestbedConfidentiality, Integrity, Availability Identity Management The Open Science Data CloudAuthentication, Authorization, Accountability What It Is Intercloud TestbedRegulations for Privacy Future of Identity in the Cloud Reporting on an Open Cloud ConsortiumSecurity Protocols Privacy and Its Relation to Cloud-Based Working GroupEstablishing a Baseline for Cloud Information Systems Distributed Management Task ForcePerformance Personal Information (DMTF)Best Practices for Selecting a Vendor and Privacy-Related Issues What It Is?Implementing Cloud-Based Applications Finding Your Private Information DMTK Working Groups Associated withChoosing the Right Vendor What It Is Cloud ComputingImplementing Cloud-Based Applications Open Cloud Consortium Working Groups Standards for Application DevelopersCitrix Project Matsu ProtocolsWindows Remote Desktop Project Comet Scripting LanguagesVnc HPC in the Cloud Content Formatting Standards andWeb Browsers The Open Cloud Testbed LanguagesServer Extensions The Open Science Data Cloud Standards for Security in the CloudThin Clients Intercloud Testbed Confidentiality, Integrity, AvailabilitySmart Phones, Pads, Pods, etc. Reporting on an Open Cloud Consortium Authentication, Authorization,Virtual Terminal Security Strengths and Working Group AccountabilityWeaknesses Distributed Management Task Force Regulations for PrivacyStrengths (DMTF) Security ProtocolsWeaknesses What It Is? Establishing a Baseline for CloudiPhone DMTK Working Groups Associated with PerformanceAndroid Cloud Computing Best Practices for Selecting a Vendor andBlackBerry Standards for Application Developers Implementing Cloud-Based ApplicationsWindows Mobile Protocols Choosing the Right VendorUbuntu Mobile Internet Device Scripting Languages Implementing Cloud-Based Applications Mobile Platform Virtualization Content Formatting Standards and CitrixKernel-Based Virtual Machine Languages Windows Remote DesktopVMware Mobile Virtualization Platform Standards for Security in the Cloud VncCollaboration Applications for Mobile Confidentiality, Integrity, Availability Web BrowsersPlatforms Authentication, Authorization, Server ExtensionsText Messaging Accountability Thin ClientsiPhone Applications Regulations for Privacy Smart Phones, Pads, Pods, etc.BlackBerry Applications Security Protocols Virtual Terminal Security Strengths andDroid Applications Establishing a Baseline for Cloud Weaknesses

Performance StrengthsBest Practices for Selecting a Vendor Weaknesses

line and Implementing Cloud-Based iPhoneCloud Computing Defined Applications AndroidCloud Computing Architecture Choosing the Right Vendor BlackBerryCloud Computing Terms Implementing Cloud-Based Applications Windows MobileCommunication-as-a-Service (CaaS) Citrix Ubuntu Mobile Internet DeviceInfrastructure-as-a-Service (IaaS) Windows Remote Desktop Mobile Platform VirtualizationMonitoring-as-a-Service (MaaS) Vnc Kernel-Based Virtual MachineSoftware-as-a-Service (SaaS) Web Browsers VMware Mobile Virtualization PlatformPlatform-as-a-Service (PaaS) Server Extensions Collaboration Applications for MobileBenefits and Limitations of Cloud Computing Thin Clients PlatformsBenefits Smart Phones, Pads, Pods, etc. Text MessagingLimitations Virtual Terminal Security Strengths and iPhone ApplicationsCloud Computing Case Studies Weaknesses BlackBerry ApplicationsHow Companies Are Using Cloud Strengths Droid Applications Computing Weaknesses Implementing Applications and Services in iPhonethe Cloud Android lineUsing Your Company's Services vs. the BlackBerry Cloud Computing DefinedCloud Provider Windows Mobile Cloud Computing ArchitectureA Cloud Service Provider Introduced Ubuntu Mobile Internet Device Cloud Computing TermsCloud Computing Risks and Issues Mobile Platform Virtualization Communication-as-a-Service (CaaS)Products and Services Provided by Cloud Kernel-Based Virtual Machine Infrastructure-as-a-Service (IaaS)Computing Companies VMware Mobile Virtualization Platform Monitoring-as-a-Service (MaaS)Operational Collaboration Applications for Mobile Software-as-a-Service (SaaS)

Page 19: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Economic Platforms Platform-as-a-Service (PaaS)Staffing Text Messaging Benefits and Limitations of CloudShould Your Company Invest in Cloud iPhone Applications ComputingComputing? BlackBerry Applications BenefitsWhat Should Not be Moved to the Cloud Droid Applications LimitationsVirtualization in Mainframe Architectures Cloud Computing Case Studiesand Operating Systems How Companies Are Using CloudLANs and the Cloud line ComputingInternet and the Cloud Cloud Computing Defined Implementing Applications and Services inWeb Services, Browsers, and the Cloud Cloud Computing Architecture the CloudThin Client Cloud Computing Terms Using Your Company's Services vs. theAdvances in Networking and Processing Communication-as-a-Service (CaaS) Cloud ProviderSpeeds that Led to Cloud Computing Infrastructure-as-a-Service (IaaS) A Cloud Service Provider IntroducedNetworking Developments Monitoring-as-a-Service (MaaS) Cloud Computing Risks and Issues Increased Processing Speeds Software-as-a-Service (SaaS) Products and Services Provided by CloudManaged Service Provider Model to Cloud Platform-as-a-Service (PaaS) Computing Companies Computing and Software as a Service Benefits and Limitations of Cloud Operational(SaaS) Computing EconomicSingle Purpose Architectures Migrate to Benefits StaffingMultipurpose Architectures Limitations Should Your Company Invest in CloudData Center Virtualization Cloud Computing Case Studies Computing?Collaboration How Companies Are Using Cloud What Should Not be Moved to the Cloud The Cloud as a Reach Extender Computing Virtualization in Mainframe ArchitecturesThe Cloud as a Communication Enabler Implementing Applications and Services and Operating SystemsThe Cloud as an Employee Enabler in the Cloud LANs and the CloudService-Oriented Architecture (SOA) Using Your Company's Services vs. the Internet and the CloudEvolving from SOA to the Cloud Cloud Provider Web Services, Browsers, and the CloudCapacity: Limited Performance A Cloud Service Provider Introduced Thin ClientAvailability: Communications Failure and Cloud Computing Risks and Issues Advances in Networking and ProcessingPerformance Issues Products and Services Provided by Cloud Speeds that Led to Cloud ComputingSecurity: Newer Security Protocols Provide Computing Companies Networking DevelopmentsMore Protection Operational Increased Processing SpeedsWhat's Next in Cloud Computing Economic Managed Service Provider Model to CloudUsing Industry and International Standards Staffing Computing and Software as a ServiceIndependent Components Should Your Company Invest in Cloud (SaaS)Message Base Computing? Single Purpose Architectures Migrate toLocation Independence What Should Not be Moved to the Cloud Multipurpose ArchitecturesCommunication Requirements for Cloud Virtualization in Mainframe Architectures Data Center VirtualizationImplementation and Operating Systems CollaborationPublic Internet LANs and the Cloud The Cloud as a Reach ExtenderPrivate Internet Internet and the Cloud The Cloud as a Communication EnablerRouting to the Datacenter Web Services, Browsers, and the Cloud The Cloud as an Employee EnablerSwitching within the Data Center Thin Client Service-Oriented Architecture (SOA)Bandwidth Advances in Networking and Processing Evolving from SOA to the CloudTools Used to Measure Network Speeds that Led to Cloud Computing Capacity: Limited PerformancePerformance Networking Developments Availability: Communications Failure andUsing the Protocol Analyzer to Measure Increased Processing Speeds Performance IssuesBandwidth Managed Service Provider Model to Security: Newer Security Protocols ProvideUsing Ping and Traceroute to Measure Cloud Computing and Software as a More ProtectionNetwork Performance Service (SaaS) What's Next in Cloud Computing Security Single Purpose Architectures Migrate to Using Industry and International StandardsSSL Multipurpose Architectures Independent ComponentsVPN Data Center Virtualization Message BaseOverhead Collaboration Location IndependenceStorage Options for Cloud Computing The Cloud as a Reach Extender Communication Requirements for CloudStorage Capacity The Cloud as a Communication Enabler ImplementationData Protection and Partitioning The Cloud as an Employee Enabler Public InternetNAS Service-Oriented Architecture (SOA) Private InternetSAN Evolving from SOA to the Cloud Routing to the DatacenterCAS Capacity: Limited Performance Switching within the Data CenterRedundancy Availability: Communications Failure and BandwidthReplication Performance Issues Tools Used to Measure NetworkMultisiting Security: Newer Security Protocols PerformanceBackup and Recovery Provide More Protection Using the Protocol Analyzer to MeasureServer Software Environments that Support What's Next in Cloud Computing BandwidthCloud Computing Using Industry and International Using Ping and Traceroute to Measure

Page 20: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Capacity Standards Network PerformanceVirtualization Independent Components SecurityClustering Message Base SSLExpansion Location Independence VPNServer Functions Communication Requirements for Cloud OverheadApplication Implementation Storage Options for Cloud ComputingWeb Public Internet Storage CapacityDatabase Private Internet Data Protection and PartitioningVendor Approaches to Cloud Computing Routing to the Datacenter NASRole of Open Source Software in Data Switching within the Data Center SANCenter Bandwidth CASCost Reduction vs. Reliability Tools Used to Measure Network RedundancyOpen Source Server Software Performance ReplicationOpen Source Database Software Using the Protocol Analyzer to Measure MultisitingOpen Source Applications Software Bandwidth Backup and RecoveryOpen Source System Management Software Using Ping and Traceroute to Measure Server Software Environments thatOpen Source Load-Balancing Software Network Performance Support Cloud ComputingThe Hypervisor Security Server CapacityVirtualization as the "Operating System" SSL VirtualizationVirtualization with a Host Operating System VPN ClusteringVirtualization Infections on Virtualized Overhead ExpansionEnvironments Storage Options for Cloud Computing Server FunctionsType 1 Virtualized Environment Storage Capacity ApplicationType 2 Virtualized Environment Data Protection and Partitioning WebVirtualization Environments NAS DatabaseMicrosoft Virtualization SAN Vendor Approaches to Cloud ComputingSun xVM VirtualBox CAS Role of Open Source Software in DataLinux/UNIX Virtualization Redundancy CenterVMware Products Replication Cost Reduction vs. ReliabilityData Center and Cloud Infrastructure Multisiting Open Source Server SoftwareProducts Backup and Recovery Open Source Database SoftwareEnd-User and Desktop Products Server Software Environments that Open Source Applications SoftwareIBM Virtualization Support Cloud Computing Open Source System ManagementUsing VMware to see a Virtualized Server Server Capacity SoftwareEnvironment Virtualization Open Source Load-Balancing Software What It Is Clustering The HypervisorPermissive Federation Expansion Virtualization as the "Operating System"Verified Federation Server Functions Virtualization with a Host OperatingEncrypted Federation Application SystemTrusted Federation Web Virtualization Infections on VirtualizedUsing XMPP in the Federated Environment Database EnvironmentsPresence in the Cloud Vendor Approaches to Cloud Computing Type 1 Virtualized EnvironmentWhat It Is Role of Open Source Software in Data Type 2 Virtualized EnvironmentPresence Protocols Center Virtualization EnvironmentsLeveraging Presence Cost Reduction vs. Reliability Microsoft VirtualizationPresence Enabled Open Source Server Software Sun xVM VirtualBoxThe Future of Presence Open Source Database Software Linux/UNIX VirtualizationThe Interrelation of Identity, Presence, and Open Source Applications Software VMware ProductsLocation in the Cloud Open Source System Management Data Center and Cloud InfrastructureIdentity Management Software ProductsWhat It Is Open Source Load-Balancing Software End-User and Desktop ProductsFuture of Identity in the Cloud The Hypervisor IBM VirtualizationPrivacy and Its Relation to Cloud-Based Virtualization as the "Operating System" Using VMware to see a Virtualized ServerInformation Systems Virtualization with a Host Operating Environment Personal Information System What It IsPrivacy-Related Issues Virtualization Infections on Virtualized Permissive FederationFinding Your Private Information Environments Verified FederationWhat It Is Type 1 Virtualized Environment Encrypted FederationOpen Cloud Consortium Working Groups Type 2 Virtualized Environment Trusted FederationProject Matsu Virtualization Environments Using XMPP in the Federated EnvironmentProject Comet Microsoft Virtualization Presence in the CloudHPC in the Cloud Sun xVM VirtualBox What It IsThe Open Cloud Testbed Linux/UNIX Virtualization Presence ProtocolsThe Open Science Data Cloud VMware Products Leveraging PresenceIntercloud Testbed Data Center and Cloud Infrastructure Presence EnabledReporting on an Open Cloud Consortium Products The Future of Presence

Page 21: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Working Group End-User and Desktop Products The Interrelation of Identity, Presence, andDistributed Management Task Force IBM Virtualization Location in the Cloud(DMTF) Using VMware to see a Virtualized Server Identity ManagementWhat It Is? Environment What It IsDMTK Working Groups Associated with What It Is Future of Identity in the CloudCloud Computing Permissive Federation Privacy and Its Relation to Cloud-BasedStandards for Application Developers Verified Federation Information SystemsProtocols Encrypted Federation Personal InformationScripting Languages Trusted Federation Privacy-Related IssuesContent Formatting Standards and Using XMPP in the Federated Finding Your Private Information Languages Environment What It IsStandards for Security in the Cloud Presence in the Cloud Open Cloud Consortium Working GroupsConfidentiality, Integrity, Availability What It Is Project MatsuAuthentication, Authorization, Accountability Presence Protocols Project CometRegulations for Privacy Leveraging Presence HPC in the CloudSecurity Protocols Presence Enabled The Open Cloud TestbedEstablishing a Baseline for Cloud The Future of Presence The Open Science Data CloudPerformance The Interrelation of Identity, Presence, Intercloud TestbedBest Practices for Selecting a Vendor and and Location in the Cloud Reporting on an Open Cloud ConsortiumImplementing Cloud-Based Applications Identity Management Working GroupChoosing the Right Vendor What It Is Distributed Management Task ForceImplementing Cloud-Based Applications Future of Identity in the Cloud (DMTF)Citrix Privacy and Its Relation to Cloud-Based What It Is?Windows Remote Desktop Information Systems DMTK Working Groups Associated withVnc Personal Information Cloud ComputingWeb Browsers Privacy-Related Issues Standards for Application DevelopersServer Extensions Finding Your Private Information ProtocolsThin Clients What It Is Scripting LanguagesSmart Phones, Pads, Pods, etc. Open Cloud Consortium Working Groups Content Formatting Standards andVirtual Terminal Security Strengths and Project Matsu LanguagesWeaknesses Project Comet Standards for Security in the CloudStrengths HPC in the Cloud Confidentiality, Integrity, AvailabilityWeaknesses The Open Cloud Testbed Authentication, Authorization,iPhone The Open Science Data Cloud AccountabilityAndroid Intercloud Testbed Regulations for PrivacyBlackBerry Reporting on an Open Cloud Consortium Security ProtocolsWindows Mobile Working Group Establishing a Baseline for CloudUbuntu Mobile Internet Device Distributed Management Task Force PerformanceMobile Platform Virtualization (DMTF) Best Practices for Selecting a Vendor andKernel-Based Virtual Machine What It Is? Implementing Cloud-Based ApplicationsVMware Mobile Virtualization Platform DMTK Working Groups Associated with Choosing the Right VendorCollaboration Applications for Mobile Cloud Computing Implementing Cloud-Based Applications Platforms Standards for Application Developers CitrixText Messaging Protocols Windows Remote DesktopiPhone Applications Scripting Languages VncBlackBerry Applications Content Formatting Standards and Web BrowsersDroid Applications Languages Server Extensions

Standards for Security in the Cloud Thin ClientsConfidentiality, Integrity, Availability Smart Phones, Pads, Pods, etc.

line Authentication, Authorization, Virtual Terminal Security Strengths andCloud Computing Defined Accountability WeaknessesCloud Computing Architecture Regulations for Privacy StrengthsCloud Computing Terms Security Protocols Weaknesses Communication-as-a-Service (CaaS) Establishing a Baseline for Cloud iPhoneInfrastructure-as-a-Service (IaaS) Performance AndroidMonitoring-as-a-Service (MaaS) Best Practices for Selecting a Vendor BlackBerrySoftware-as-a-Service (SaaS) and Implementing Cloud-Based Windows MobilePlatform-as-a-Service (PaaS) Applications Ubuntu Mobile Internet DeviceBenefits and Limitations of Cloud Computing Choosing the Right Vendor Mobile Platform VirtualizationBenefits Implementing Cloud-Based Applications Kernel-Based Virtual MachineLimitations Citrix VMware Mobile Virtualization PlatformCloud Computing Case Studies Windows Remote Desktop Collaboration Applications for MobileHow Companies Are Using Cloud Vnc PlatformsComputing Web Browsers Text MessagingImplementing Applications and Services in Server Extensions iPhone Applicationsthe Cloud Thin Clients BlackBerry Applications

Page 22: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using Your Company's Services vs. the Smart Phones, Pads, Pods, etc. Droid Applications Cloud Provider Virtual Terminal Security Strengths andA Cloud Service Provider Introduced WeaknessesCloud Computing Risks and Issues Strengths lineProducts and Services Provided by Cloud Weaknesses Cloud Computing DefinedComputing Companies iPhone Cloud Computing ArchitectureOperational Android Cloud Computing TermsEconomic BlackBerry Communication-as-a-Service (CaaS)Staffing Windows Mobile Infrastructure-as-a-Service (IaaS)Should Your Company Invest in Cloud Ubuntu Mobile Internet Device Monitoring-as-a-Service (MaaS)Computing? Mobile Platform Virtualization Software-as-a-Service (SaaS)What Should Not be Moved to the Cloud Kernel-Based Virtual Machine Platform-as-a-Service (PaaS)Virtualization in Mainframe Architectures VMware Mobile Virtualization Platform Benefits and Limitations of Cloudand Operating Systems Collaboration Applications for Mobile ComputingLANs and the Cloud Platforms BenefitsInternet and the Cloud Text Messaging LimitationsWeb Services, Browsers, and the Cloud iPhone Applications Cloud Computing Case StudiesThin Client BlackBerry Applications How Companies Are Using CloudAdvances in Networking and Processing Droid Applications ComputingSpeeds that Led to Cloud Computing Implementing Applications and Services inNetworking Developments the CloudIncreased Processing Speeds line Using Your Company's Services vs. theManaged Service Provider Model to Cloud Cloud Computing Defined Cloud ProviderComputing and Software as a Service Cloud Computing Architecture A Cloud Service Provider Introduced(SaaS) Cloud Computing Terms Cloud Computing Risks and Issues Single Purpose Architectures Migrate to Communication-as-a-Service (CaaS) Products and Services Provided by CloudMultipurpose Architectures Infrastructure-as-a-Service (IaaS) Computing Companies Data Center Virtualization Monitoring-as-a-Service (MaaS) OperationalCollaboration Software-as-a-Service (SaaS) EconomicThe Cloud as a Reach Extender Platform-as-a-Service (PaaS) StaffingThe Cloud as a Communication Enabler Benefits and Limitations of Cloud Should Your Company Invest in CloudThe Cloud as an Employee Enabler Computing Computing?Service-Oriented Architecture (SOA) Benefits What Should Not be Moved to the Cloud Evolving from SOA to the Cloud Limitations Virtualization in Mainframe ArchitecturesCapacity: Limited Performance Cloud Computing Case Studies and Operating SystemsAvailability: Communications Failure and How Companies Are Using Cloud LANs and the CloudPerformance Issues Computing Internet and the CloudSecurity: Newer Security Protocols Provide Implementing Applications and Services Web Services, Browsers, and the CloudMore Protection in the Cloud Thin ClientWhat's Next in Cloud Computing Using Your Company's Services vs. the Advances in Networking and ProcessingUsing Industry and International Standards Cloud Provider Speeds that Led to Cloud ComputingIndependent Components A Cloud Service Provider Introduced Networking DevelopmentsMessage Base Cloud Computing Risks and Issues Increased Processing SpeedsLocation Independence Products and Services Provided by Cloud Managed Service Provider Model to CloudCommunication Requirements for Cloud Computing Companies Computing and Software as a ServiceImplementation Operational (SaaS)Public Internet Economic Single Purpose Architectures Migrate toPrivate Internet Staffing Multipurpose ArchitecturesRouting to the Datacenter Should Your Company Invest in Cloud Data Center VirtualizationSwitching within the Data Center Computing? CollaborationBandwidth What Should Not be Moved to the Cloud The Cloud as a Reach ExtenderTools Used to Measure Network Virtualization in Mainframe Architectures The Cloud as a Communication EnablerPerformance and Operating Systems The Cloud as an Employee EnablerUsing the Protocol Analyzer to Measure LANs and the Cloud Service-Oriented Architecture (SOA)Bandwidth Internet and the Cloud Evolving from SOA to the CloudUsing Ping and Traceroute to Measure Web Services, Browsers, and the Cloud Capacity: Limited PerformanceNetwork Performance Thin Client Availability: Communications Failure andSecurity Advances in Networking and Processing Performance IssuesSSL Speeds that Led to Cloud Computing Security: Newer Security Protocols ProvideVPN Networking Developments More ProtectionOverhead Increased Processing Speeds What's Next in Cloud Computing Storage Options for Cloud Computing Managed Service Provider Model to Using Industry and International StandardsStorage Capacity Cloud Computing and Software as a Independent ComponentsData Protection and Partitioning Service (SaaS) Message BaseNAS Single Purpose Architectures Migrate to Location IndependenceSAN Multipurpose Architectures Communication Requirements for Cloud

Page 23: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

CAS Data Center Virtualization ImplementationRedundancy Collaboration Public InternetReplication The Cloud as a Reach Extender Private InternetMultisiting The Cloud as a Communication Enabler Routing to the DatacenterBackup and Recovery The Cloud as an Employee Enabler Switching within the Data CenterServer Software Environments that Support Service-Oriented Architecture (SOA) BandwidthCloud Computing Evolving from SOA to the Cloud Tools Used to Measure NetworkServer Capacity Capacity: Limited Performance PerformanceVirtualization Availability: Communications Failure and Using the Protocol Analyzer to MeasureClustering Performance Issues BandwidthExpansion Security: Newer Security Protocols Using Ping and Traceroute to MeasureServer Functions Provide More Protection Network PerformanceApplication What's Next in Cloud Computing SecurityWeb Using Industry and International SSLDatabase Standards VPNVendor Approaches to Cloud Computing Independent Components OverheadRole of Open Source Software in Data Message Base Storage Options for Cloud ComputingCenter Location Independence Storage CapacityCost Reduction vs. Reliability Communication Requirements for Cloud Data Protection and PartitioningOpen Source Server Software Implementation NASOpen Source Database Software Public Internet SANOpen Source Applications Software Private Internet CASOpen Source System Management Software Routing to the Datacenter RedundancyOpen Source Load-Balancing Software Switching within the Data Center ReplicationThe Hypervisor Bandwidth MultisitingVirtualization as the "Operating System" Tools Used to Measure Network Backup and RecoveryVirtualization with a Host Operating System Performance Server Software Environments thatVirtualization Infections on Virtualized Using the Protocol Analyzer to Measure Support Cloud ComputingEnvironments Bandwidth Server CapacityType 1 Virtualized Environment Using Ping and Traceroute to Measure VirtualizationType 2 Virtualized Environment Network Performance ClusteringVirtualization Environments Security ExpansionMicrosoft Virtualization SSL Server FunctionsSun xVM VirtualBox VPN ApplicationLinux/UNIX Virtualization Overhead WebVMware Products Storage Options for Cloud Computing DatabaseData Center and Cloud Infrastructure Storage Capacity Vendor Approaches to Cloud ComputingProducts Data Protection and Partitioning Role of Open Source Software in DataEnd-User and Desktop Products NAS CenterIBM Virtualization SAN Cost Reduction vs. ReliabilityUsing VMware to see a Virtualized Server CAS Open Source Server SoftwareEnvironment Redundancy Open Source Database SoftwareWhat It Is Replication Open Source Applications SoftwarePermissive Federation Multisiting Open Source System ManagementVerified Federation Backup and Recovery SoftwareEncrypted Federation Server Software Environments that Open Source Load-Balancing Software Trusted Federation Support Cloud Computing The HypervisorUsing XMPP in the Federated Environment Server Capacity Virtualization as the "Operating System"Presence in the Cloud Virtualization Virtualization with a Host OperatingWhat It Is Clustering SystemPresence Protocols Expansion Virtualization Infections on VirtualizedLeveraging Presence Server Functions EnvironmentsPresence Enabled Application Type 1 Virtualized EnvironmentThe Future of Presence Web Type 2 Virtualized EnvironmentThe Interrelation of Identity, Presence, and Database Virtualization EnvironmentsLocation in the Cloud Vendor Approaches to Cloud Computing Microsoft VirtualizationIdentity Management Role of Open Source Software in Data Sun xVM VirtualBoxWhat It Is Center Linux/UNIX VirtualizationFuture of Identity in the Cloud Cost Reduction vs. Reliability VMware ProductsPrivacy and Its Relation to Cloud-Based Open Source Server Software Data Center and Cloud InfrastructureInformation Systems Open Source Database Software ProductsPersonal Information Open Source Applications Software End-User and Desktop ProductsPrivacy-Related Issues Open Source System Management IBM VirtualizationFinding Your Private Information Software Using VMware to see a Virtualized ServerWhat It Is Open Source Load-Balancing Software Environment Open Cloud Consortium Working Groups The Hypervisor What It Is

Page 24: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Project Matsu Virtualization as the "Operating System" Permissive FederationProject Comet Virtualization with a Host Operating Verified FederationHPC in the Cloud System Encrypted FederationThe Open Cloud Testbed Virtualization Infections on Virtualized Trusted FederationThe Open Science Data Cloud Environments Using XMPP in the Federated EnvironmentIntercloud Testbed Type 1 Virtualized Environment Presence in the CloudReporting on an Open Cloud Consortium Type 2 Virtualized Environment What It IsWorking Group Virtualization Environments Presence ProtocolsDistributed Management Task Force Microsoft Virtualization Leveraging Presence(DMTF) Sun xVM VirtualBox Presence EnabledWhat It Is? Linux/UNIX Virtualization The Future of PresenceDMTK Working Groups Associated with VMware Products The Interrelation of Identity, Presence, andCloud Computing Data Center and Cloud Infrastructure Location in the CloudStandards for Application Developers Products Identity ManagementProtocols End-User and Desktop Products What It IsScripting Languages IBM Virtualization Future of Identity in the CloudContent Formatting Standards and Using VMware to see a Virtualized Server Privacy and Its Relation to Cloud-BasedLanguages Environment Information SystemsStandards for Security in the Cloud What It Is Personal InformationConfidentiality, Integrity, Availability Permissive Federation Privacy-Related IssuesAuthentication, Authorization, Accountability Verified Federation Finding Your Private Information Regulations for Privacy Encrypted Federation What It IsSecurity Protocols Trusted Federation Open Cloud Consortium Working GroupsEstablishing a Baseline for Cloud Using XMPP in the Federated Project MatsuPerformance Environment Project CometBest Practices for Selecting a Vendor and Presence in the Cloud HPC in the CloudImplementing Cloud-Based Applications What It Is The Open Cloud TestbedChoosing the Right Vendor Presence Protocols The Open Science Data CloudImplementing Cloud-Based Applications Leveraging Presence Intercloud TestbedCitrix Presence Enabled Reporting on an Open Cloud ConsortiumWindows Remote Desktop The Future of Presence Working GroupVnc The Interrelation of Identity, Presence, Distributed Management Task ForceWeb Browsers and Location in the Cloud (DMTF)Server Extensions Identity Management What It Is?Thin Clients What It Is DMTK Working Groups Associated withSmart Phones, Pads, Pods, etc. Future of Identity in the Cloud Cloud ComputingVirtual Terminal Security Strengths and Privacy and Its Relation to Cloud-Based Standards for Application DevelopersWeaknesses Information Systems ProtocolsStrengths Personal Information Scripting LanguagesWeaknesses Privacy-Related Issues Content Formatting Standards andiPhone Finding Your Private Information LanguagesAndroid What It Is Standards for Security in the CloudBlackBerry Open Cloud Consortium Working Groups Confidentiality, Integrity, AvailabilityWindows Mobile Project Matsu Authentication, Authorization,Ubuntu Mobile Internet Device Project Comet AccountabilityMobile Platform Virtualization HPC in the Cloud Regulations for PrivacyKernel-Based Virtual Machine The Open Cloud Testbed Security ProtocolsVMware Mobile Virtualization Platform The Open Science Data Cloud Establishing a Baseline for CloudCollaboration Applications for Mobile Intercloud Testbed PerformancePlatforms Reporting on an Open Cloud Consortium Best Practices for Selecting a Vendor andText Messaging Working Group Implementing Cloud-Based ApplicationsiPhone Applications Distributed Management Task Force Choosing the Right VendorBlackBerry Applications (DMTF) Implementing Cloud-Based Applications Droid Applications What It Is? Citrix

DMTK Working Groups Associated with Windows Remote DesktopCloud Computing Vnc

line Standards for Application Developers Web BrowsersCloud Computing Defined Protocols Server ExtensionsCloud Computing Architecture Scripting Languages Thin ClientsCloud Computing Terms Content Formatting Standards and Smart Phones, Pads, Pods, etc.Communication-as-a-Service (CaaS) Languages Virtual Terminal Security Strengths andInfrastructure-as-a-Service (IaaS) Standards for Security in the Cloud WeaknessesMonitoring-as-a-Service (MaaS) Confidentiality, Integrity, Availability StrengthsSoftware-as-a-Service (SaaS) Authentication, Authorization, Weaknesses Platform-as-a-Service (PaaS) Accountability iPhoneBenefits and Limitations of Cloud Computing Regulations for Privacy Android

Page 25: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Benefits Security Protocols BlackBerryLimitations Establishing a Baseline for Cloud Windows MobileCloud Computing Case Studies Performance Ubuntu Mobile Internet DeviceHow Companies Are Using Cloud Best Practices for Selecting a Vendor Mobile Platform VirtualizationComputing and Implementing Cloud-Based Kernel-Based Virtual MachineImplementing Applications and Services in Applications VMware Mobile Virtualization Platformthe Cloud Choosing the Right Vendor Collaboration Applications for MobileUsing Your Company's Services vs. the Implementing Cloud-Based Applications PlatformsCloud Provider Citrix Text MessagingA Cloud Service Provider Introduced Windows Remote Desktop iPhone ApplicationsCloud Computing Risks and Issues Vnc BlackBerry ApplicationsProducts and Services Provided by Cloud Web Browsers Droid Applications Computing Companies Server ExtensionsOperational Thin ClientsEconomic Smart Phones, Pads, Pods, etc. lineStaffing Virtual Terminal Security Strengths and Cloud Computing DefinedShould Your Company Invest in Cloud Weaknesses Cloud Computing ArchitectureComputing? Strengths Cloud Computing TermsWhat Should Not be Moved to the Cloud Weaknesses Communication-as-a-Service (CaaS)Virtualization in Mainframe Architectures iPhone Infrastructure-as-a-Service (IaaS)and Operating Systems Android Monitoring-as-a-Service (MaaS)LANs and the Cloud BlackBerry Software-as-a-Service (SaaS)Internet and the Cloud Windows Mobile Platform-as-a-Service (PaaS)Web Services, Browsers, and the Cloud Ubuntu Mobile Internet Device Benefits and Limitations of CloudThin Client Mobile Platform Virtualization ComputingAdvances in Networking and Processing Kernel-Based Virtual Machine BenefitsSpeeds that Led to Cloud Computing VMware Mobile Virtualization Platform LimitationsNetworking Developments Collaboration Applications for Mobile Cloud Computing Case StudiesIncreased Processing Speeds Platforms How Companies Are Using CloudManaged Service Provider Model to Cloud Text Messaging ComputingComputing and Software as a Service iPhone Applications Implementing Applications and Services in(SaaS) BlackBerry Applications the CloudSingle Purpose Architectures Migrate to Droid Applications Using Your Company's Services vs. theMultipurpose Architectures Cloud ProviderData Center Virtualization A Cloud Service Provider IntroducedCollaboration line Cloud Computing Risks and Issues The Cloud as a Reach Extender Cloud Computing Defined Products and Services Provided by CloudThe Cloud as a Communication Enabler Cloud Computing Architecture Computing Companies The Cloud as an Employee Enabler Cloud Computing Terms OperationalService-Oriented Architecture (SOA) Communication-as-a-Service (CaaS) EconomicEvolving from SOA to the Cloud Infrastructure-as-a-Service (IaaS) StaffingCapacity: Limited Performance Monitoring-as-a-Service (MaaS) Should Your Company Invest in CloudAvailability: Communications Failure and Software-as-a-Service (SaaS) Computing?Performance Issues Platform-as-a-Service (PaaS) What Should Not be Moved to the Cloud Security: Newer Security Protocols Provide Benefits and Limitations of Cloud Virtualization in Mainframe ArchitecturesMore Protection Computing and Operating SystemsWhat's Next in Cloud Computing Benefits LANs and the CloudUsing Industry and International Standards Limitations Internet and the CloudIndependent Components Cloud Computing Case Studies Web Services, Browsers, and the CloudMessage Base How Companies Are Using Cloud Thin ClientLocation Independence Computing Advances in Networking and ProcessingCommunication Requirements for Cloud Implementing Applications and Services Speeds that Led to Cloud ComputingImplementation in the Cloud Networking DevelopmentsPublic Internet Using Your Company's Services vs. the Increased Processing SpeedsPrivate Internet Cloud Provider Managed Service Provider Model to CloudRouting to the Datacenter A Cloud Service Provider Introduced Computing and Software as a ServiceSwitching within the Data Center Cloud Computing Risks and Issues (SaaS)Bandwidth Products and Services Provided by Cloud Single Purpose Architectures Migrate toTools Used to Measure Network Computing Companies Multipurpose ArchitecturesPerformance Operational Data Center VirtualizationUsing the Protocol Analyzer to Measure Economic CollaborationBandwidth Staffing The Cloud as a Reach ExtenderUsing Ping and Traceroute to Measure Should Your Company Invest in Cloud The Cloud as a Communication EnablerNetwork Performance Computing? The Cloud as an Employee EnablerSecurity What Should Not be Moved to the Cloud Service-Oriented Architecture (SOA)SSL Virtualization in Mainframe Architectures Evolving from SOA to the Cloud

Page 26: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

VPN and Operating Systems Capacity: Limited PerformanceOverhead LANs and the Cloud Availability: Communications Failure andStorage Options for Cloud Computing Internet and the Cloud Performance IssuesStorage Capacity Web Services, Browsers, and the Cloud Security: Newer Security Protocols ProvideData Protection and Partitioning Thin Client More ProtectionNAS Advances in Networking and Processing What's Next in Cloud Computing SAN Speeds that Led to Cloud Computing Using Industry and International StandardsCAS Networking Developments Independent ComponentsRedundancy Increased Processing Speeds Message BaseReplication Managed Service Provider Model to Location IndependenceMultisiting Cloud Computing and Software as a Communication Requirements for CloudBackup and Recovery Service (SaaS) ImplementationServer Software Environments that Support Single Purpose Architectures Migrate to Public InternetCloud Computing Multipurpose Architectures Private InternetServer Capacity Data Center Virtualization Routing to the DatacenterVirtualization Collaboration Switching within the Data CenterClustering The Cloud as a Reach Extender BandwidthExpansion The Cloud as a Communication Enabler Tools Used to Measure NetworkServer Functions The Cloud as an Employee Enabler PerformanceApplication Service-Oriented Architecture (SOA) Using the Protocol Analyzer to MeasureWeb Evolving from SOA to the Cloud BandwidthDatabase Capacity: Limited Performance Using Ping and Traceroute to MeasureVendor Approaches to Cloud Computing Availability: Communications Failure and Network PerformanceRole of Open Source Software in Data Performance Issues SecurityCenter Security: Newer Security Protocols SSLCost Reduction vs. Reliability Provide More Protection VPNOpen Source Server Software What's Next in Cloud Computing OverheadOpen Source Database Software Using Industry and International Storage Options for Cloud ComputingOpen Source Applications Software Standards Storage CapacityOpen Source System Management Software Independent Components Data Protection and PartitioningOpen Source Load-Balancing Software Message Base NASThe Hypervisor Location Independence SANVirtualization as the "Operating System" Communication Requirements for Cloud CASVirtualization with a Host Operating System Implementation RedundancyVirtualization Infections on Virtualized Public Internet ReplicationEnvironments Private Internet MultisitingType 1 Virtualized Environment Routing to the Datacenter Backup and RecoveryType 2 Virtualized Environment Switching within the Data Center Server Software Environments thatVirtualization Environments Bandwidth Support Cloud ComputingMicrosoft Virtualization Tools Used to Measure Network Server CapacitySun xVM VirtualBox Performance VirtualizationLinux/UNIX Virtualization Using the Protocol Analyzer to Measure ClusteringVMware Products Bandwidth ExpansionData Center and Cloud Infrastructure Using Ping and Traceroute to Measure Server FunctionsProducts Network Performance ApplicationEnd-User and Desktop Products Security WebIBM Virtualization SSL DatabaseUsing VMware to see a Virtualized Server VPN Vendor Approaches to Cloud ComputingEnvironment Overhead Role of Open Source Software in DataWhat It Is Storage Options for Cloud Computing CenterPermissive Federation Storage Capacity Cost Reduction vs. ReliabilityVerified Federation Data Protection and Partitioning Open Source Server SoftwareEncrypted Federation NAS Open Source Database SoftwareTrusted Federation SAN Open Source Applications SoftwareUsing XMPP in the Federated Environment CAS Open Source System ManagementPresence in the Cloud Redundancy SoftwareWhat It Is Replication Open Source Load-Balancing Software Presence Protocols Multisiting The HypervisorLeveraging Presence Backup and Recovery Virtualization as the "Operating System"Presence Enabled Server Software Environments that Virtualization with a Host OperatingThe Future of Presence Support Cloud Computing SystemThe Interrelation of Identity, Presence, and Server Capacity Virtualization Infections on VirtualizedLocation in the Cloud Virtualization EnvironmentsIdentity Management Clustering Type 1 Virtualized EnvironmentWhat It Is Expansion Type 2 Virtualized EnvironmentFuture of Identity in the Cloud Server Functions Virtualization Environments

Page 27: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Privacy and Its Relation to Cloud-Based Application Microsoft VirtualizationInformation Systems Web Sun xVM VirtualBoxPersonal Information Database Linux/UNIX VirtualizationPrivacy-Related Issues Vendor Approaches to Cloud Computing VMware ProductsFinding Your Private Information Role of Open Source Software in Data Data Center and Cloud InfrastructureWhat It Is Center ProductsOpen Cloud Consortium Working Groups Cost Reduction vs. Reliability End-User and Desktop ProductsProject Matsu Open Source Server Software IBM VirtualizationProject Comet Open Source Database Software Using VMware to see a Virtualized ServerHPC in the Cloud Open Source Applications Software Environment The Open Cloud Testbed Open Source System Management What It IsThe Open Science Data Cloud Software Permissive FederationIntercloud Testbed Open Source Load-Balancing Software Verified FederationReporting on an Open Cloud Consortium The Hypervisor Encrypted FederationWorking Group Virtualization as the "Operating System" Trusted FederationDistributed Management Task Force Virtualization with a Host Operating Using XMPP in the Federated Environment(DMTF) System Presence in the CloudWhat It Is? Virtualization Infections on Virtualized What It IsDMTK Working Groups Associated with Environments Presence ProtocolsCloud Computing Type 1 Virtualized Environment Leveraging PresenceStandards for Application Developers Type 2 Virtualized Environment Presence EnabledProtocols Virtualization Environments The Future of PresenceScripting Languages Microsoft Virtualization The Interrelation of Identity, Presence, andContent Formatting Standards and Sun xVM VirtualBox Location in the CloudLanguages Linux/UNIX Virtualization Identity ManagementStandards for Security in the Cloud VMware Products What It IsConfidentiality, Integrity, Availability Data Center and Cloud Infrastructure Future of Identity in the CloudAuthentication, Authorization, Accountability Products Privacy and Its Relation to Cloud-BasedRegulations for Privacy End-User and Desktop Products Information SystemsSecurity Protocols IBM Virtualization Personal InformationEstablishing a Baseline for Cloud Using VMware to see a Virtualized Server Privacy-Related IssuesPerformance Environment Finding Your Private Information Best Practices for Selecting a Vendor and What It Is What It IsImplementing Cloud-Based Applications Permissive Federation Open Cloud Consortium Working GroupsChoosing the Right Vendor Verified Federation Project MatsuImplementing Cloud-Based Applications Encrypted Federation Project CometCitrix Trusted Federation HPC in the CloudWindows Remote Desktop Using XMPP in the Federated The Open Cloud TestbedVnc Environment The Open Science Data CloudWeb Browsers Presence in the Cloud Intercloud TestbedServer Extensions What It Is Reporting on an Open Cloud ConsortiumThin Clients Presence Protocols Working GroupSmart Phones, Pads, Pods, etc. Leveraging Presence Distributed Management Task ForceVirtual Terminal Security Strengths and Presence Enabled (DMTF)Weaknesses The Future of Presence What It Is?Strengths The Interrelation of Identity, Presence, DMTK Working Groups Associated withWeaknesses and Location in the Cloud Cloud ComputingiPhone Identity Management Standards for Application DevelopersAndroid What It Is ProtocolsBlackBerry Future of Identity in the Cloud Scripting LanguagesWindows Mobile Privacy and Its Relation to Cloud-Based Content Formatting Standards andUbuntu Mobile Internet Device Information Systems LanguagesMobile Platform Virtualization Personal Information Standards for Security in the CloudKernel-Based Virtual Machine Privacy-Related Issues Confidentiality, Integrity, AvailabilityVMware Mobile Virtualization Platform Finding Your Private Information Authentication, Authorization,Collaboration Applications for Mobile What It Is AccountabilityPlatforms Open Cloud Consortium Working Groups Regulations for PrivacyText Messaging Project Matsu Security ProtocolsiPhone Applications Project Comet Establishing a Baseline for CloudBlackBerry Applications HPC in the Cloud PerformanceDroid Applications The Open Cloud Testbed Best Practices for Selecting a Vendor and

The Open Science Data Cloud Implementing Cloud-Based ApplicationsIntercloud Testbed Choosing the Right Vendor

line Reporting on an Open Cloud Consortium Implementing Cloud-Based Applications Cloud Computing Defined Working Group CitrixCloud Computing Architecture Distributed Management Task Force Windows Remote Desktop

Page 28: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Terms (DMTF) VncCommunication-as-a-Service (CaaS) What It Is? Web BrowsersInfrastructure-as-a-Service (IaaS) DMTK Working Groups Associated with Server ExtensionsMonitoring-as-a-Service (MaaS) Cloud Computing Thin ClientsSoftware-as-a-Service (SaaS) Standards for Application Developers Smart Phones, Pads, Pods, etc.Platform-as-a-Service (PaaS) Protocols Virtual Terminal Security Strengths andBenefits and Limitations of Cloud Computing Scripting Languages WeaknessesBenefits Content Formatting Standards and StrengthsLimitations Languages Weaknesses Cloud Computing Case Studies Standards for Security in the Cloud iPhoneHow Companies Are Using Cloud Confidentiality, Integrity, Availability AndroidComputing Authentication, Authorization, BlackBerryImplementing Applications and Services in Accountability Windows Mobilethe Cloud Regulations for Privacy Ubuntu Mobile Internet DeviceUsing Your Company's Services vs. the Security Protocols Mobile Platform VirtualizationCloud Provider Establishing a Baseline for Cloud Kernel-Based Virtual MachineA Cloud Service Provider Introduced Performance VMware Mobile Virtualization PlatformCloud Computing Risks and Issues Best Practices for Selecting a Vendor Collaboration Applications for MobileProducts and Services Provided by Cloud and Implementing Cloud-Based PlatformsComputing Companies Applications Text MessagingOperational Choosing the Right Vendor iPhone ApplicationsEconomic Implementing Cloud-Based Applications BlackBerry ApplicationsStaffing Citrix Droid Applications Should Your Company Invest in Cloud Windows Remote DesktopComputing? Vnc 8. Cloud Computing Standards and BestWhat Should Not be Moved to the Cloud Web Browsers PracticesVirtualization in Mainframe Architectures Server Extensions lineand Operating Systems Thin Clients Open Cloud ConsortiumLANs and the Cloud Smart Phones, Pads, Pods, etc.Internet and the Cloud Virtual Terminal Security Strengths andWeb Services, Browsers, and the Cloud Weaknesses lineThin Client Strengths Cloud Computing DefinedAdvances in Networking and Processing Weaknesses Cloud Computing ArchitectureSpeeds that Led to Cloud Computing iPhone Cloud Computing TermsNetworking Developments Android Communication-as-a-Service (CaaS)Increased Processing Speeds BlackBerry Infrastructure-as-a-Service (IaaS)Managed Service Provider Model to Cloud Windows Mobile Monitoring-as-a-Service (MaaS)Computing and Software as a Service Ubuntu Mobile Internet Device Software-as-a-Service (SaaS)(SaaS) Mobile Platform Virtualization Platform-as-a-Service (PaaS)Single Purpose Architectures Migrate to Kernel-Based Virtual Machine Benefits and Limitations of CloudMultipurpose Architectures VMware Mobile Virtualization Platform ComputingData Center Virtualization Collaboration Applications for Mobile BenefitsCollaboration Platforms LimitationsThe Cloud as a Reach Extender Text Messaging Cloud Computing Case StudiesThe Cloud as a Communication Enabler iPhone Applications How Companies Are Using CloudThe Cloud as an Employee Enabler BlackBerry Applications ComputingService-Oriented Architecture (SOA) Droid Applications Implementing Applications and Services inEvolving from SOA to the Cloud the CloudCapacity: Limited Performance Using Your Company's Services vs. theAvailability: Communications Failure and line Cloud ProviderPerformance Issues Cloud Computing Defined A Cloud Service Provider IntroducedSecurity: Newer Security Protocols Provide Cloud Computing Architecture Cloud Computing Risks and Issues More Protection Cloud Computing Terms Products and Services Provided by CloudWhat's Next in Cloud Computing Communication-as-a-Service (CaaS) Computing Companies Using Industry and International Standards Infrastructure-as-a-Service (IaaS) OperationalIndependent Components Monitoring-as-a-Service (MaaS) EconomicMessage Base Software-as-a-Service (SaaS) StaffingLocation Independence Platform-as-a-Service (PaaS) Should Your Company Invest in CloudCommunication Requirements for Cloud Benefits and Limitations of Cloud Computing?Implementation Computing What Should Not be Moved to the Cloud Public Internet Benefits Virtualization in Mainframe ArchitecturesPrivate Internet Limitations and Operating SystemsRouting to the Datacenter Cloud Computing Case Studies LANs and the CloudSwitching within the Data Center How Companies Are Using Cloud Internet and the CloudBandwidth Computing Web Services, Browsers, and the CloudTools Used to Measure Network Implementing Applications and Services Thin Client

Page 29: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Performance in the Cloud Advances in Networking and ProcessingUsing the Protocol Analyzer to Measure Using Your Company's Services vs. the Speeds that Led to Cloud ComputingBandwidth Cloud Provider Networking DevelopmentsUsing Ping and Traceroute to Measure A Cloud Service Provider Introduced Increased Processing SpeedsNetwork Performance Cloud Computing Risks and Issues Managed Service Provider Model to CloudSecurity Products and Services Provided by Cloud Computing and Software as a ServiceSSL Computing Companies (SaaS)VPN Operational Single Purpose Architectures Migrate toOverhead Economic Multipurpose ArchitecturesStorage Options for Cloud Computing Staffing Data Center VirtualizationStorage Capacity Should Your Company Invest in Cloud CollaborationData Protection and Partitioning Computing? The Cloud as a Reach ExtenderNAS What Should Not be Moved to the Cloud The Cloud as a Communication EnablerSAN Virtualization in Mainframe Architectures The Cloud as an Employee EnablerCAS and Operating Systems Service-Oriented Architecture (SOA)Redundancy LANs and the Cloud Evolving from SOA to the CloudReplication Internet and the Cloud Capacity: Limited PerformanceMultisiting Web Services, Browsers, and the Cloud Availability: Communications Failure andBackup and Recovery Thin Client Performance IssuesServer Software Environments that Support Advances in Networking and Processing Security: Newer Security Protocols ProvideCloud Computing Speeds that Led to Cloud Computing More ProtectionServer Capacity Networking Developments What's Next in Cloud Computing Virtualization Increased Processing Speeds Using Industry and International StandardsClustering Managed Service Provider Model to Independent ComponentsExpansion Cloud Computing and Software as a Message BaseServer Functions Service (SaaS) Location IndependenceApplication Single Purpose Architectures Migrate to Communication Requirements for CloudWeb Multipurpose Architectures ImplementationDatabase Data Center Virtualization Public InternetVendor Approaches to Cloud Computing Collaboration Private InternetRole of Open Source Software in Data The Cloud as a Reach Extender Routing to the DatacenterCenter The Cloud as a Communication Enabler Switching within the Data CenterCost Reduction vs. Reliability The Cloud as an Employee Enabler BandwidthOpen Source Server Software Service-Oriented Architecture (SOA) Tools Used to Measure NetworkOpen Source Database Software Evolving from SOA to the Cloud PerformanceOpen Source Applications Software Capacity: Limited Performance Using the Protocol Analyzer to MeasureOpen Source System Management Software Availability: Communications Failure and BandwidthOpen Source Load-Balancing Software Performance Issues Using Ping and Traceroute to MeasureThe Hypervisor Security: Newer Security Protocols Network PerformanceVirtualization as the "Operating System" Provide More Protection SecurityVirtualization with a Host Operating System What's Next in Cloud Computing SSLVirtualization Infections on Virtualized Using Industry and International VPNEnvironments Standards OverheadType 1 Virtualized Environment Independent Components Storage Options for Cloud ComputingType 2 Virtualized Environment Message Base Storage CapacityVirtualization Environments Location Independence Data Protection and PartitioningMicrosoft Virtualization Communication Requirements for Cloud NASSun xVM VirtualBox Implementation SANLinux/UNIX Virtualization Public Internet CASVMware Products Private Internet RedundancyData Center and Cloud Infrastructure Routing to the Datacenter ReplicationProducts Switching within the Data Center MultisitingEnd-User and Desktop Products Bandwidth Backup and RecoveryIBM Virtualization Tools Used to Measure Network Server Software Environments thatUsing VMware to see a Virtualized Server Performance Support Cloud ComputingEnvironment Using the Protocol Analyzer to Measure Server CapacityWhat It Is Bandwidth VirtualizationPermissive Federation Using Ping and Traceroute to Measure ClusteringVerified Federation Network Performance ExpansionEncrypted Federation Security Server FunctionsTrusted Federation SSL ApplicationUsing XMPP in the Federated Environment VPN WebPresence in the Cloud Overhead DatabaseWhat It Is Storage Options for Cloud Computing Vendor Approaches to Cloud ComputingPresence Protocols Storage Capacity Role of Open Source Software in DataLeveraging Presence Data Protection and Partitioning Center

Page 30: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Presence Enabled NAS Cost Reduction vs. ReliabilityThe Future of Presence SAN Open Source Server SoftwareThe Interrelation of Identity, Presence, and CAS Open Source Database SoftwareLocation in the Cloud Redundancy Open Source Applications SoftwareIdentity Management Replication Open Source System ManagementWhat It Is Multisiting SoftwareFuture of Identity in the Cloud Backup and Recovery Open Source Load-Balancing Software Privacy and Its Relation to Cloud-Based Server Software Environments that The HypervisorInformation Systems Support Cloud Computing Virtualization as the "Operating System"Personal Information Server Capacity Virtualization with a Host OperatingPrivacy-Related Issues Virtualization SystemFinding Your Private Information Clustering Virtualization Infections on VirtualizedWhat It Is Expansion EnvironmentsOpen Cloud Consortium Working Groups Server Functions Type 1 Virtualized EnvironmentProject Matsu Application Type 2 Virtualized EnvironmentProject Comet Web Virtualization EnvironmentsHPC in the Cloud Database Microsoft VirtualizationThe Open Cloud Testbed Vendor Approaches to Cloud Computing Sun xVM VirtualBoxThe Open Science Data Cloud Role of Open Source Software in Data Linux/UNIX VirtualizationIntercloud Testbed Center VMware ProductsReporting on an Open Cloud Consortium Cost Reduction vs. Reliability Data Center and Cloud InfrastructureWorking Group Open Source Server Software ProductsDistributed Management Task Force Open Source Database Software End-User and Desktop Products(DMTF) Open Source Applications Software IBM VirtualizationWhat It Is? Open Source System Management Using VMware to see a Virtualized ServerDMTK Working Groups Associated with Software Environment Cloud Computing Open Source Load-Balancing Software What It IsStandards for Application Developers The Hypervisor Permissive FederationProtocols Virtualization as the "Operating System" Verified FederationScripting Languages Virtualization with a Host Operating Encrypted FederationContent Formatting Standards and System Trusted FederationLanguages Virtualization Infections on Virtualized Using XMPP in the Federated EnvironmentStandards for Security in the Cloud Environments Presence in the CloudConfidentiality, Integrity, Availability Type 1 Virtualized Environment What It IsAuthentication, Authorization, Accountability Type 2 Virtualized Environment Presence ProtocolsRegulations for Privacy Virtualization Environments Leveraging PresenceSecurity Protocols Microsoft Virtualization Presence EnabledEstablishing a Baseline for Cloud Sun xVM VirtualBox The Future of PresencePerformance Linux/UNIX Virtualization The Interrelation of Identity, Presence, andBest Practices for Selecting a Vendor and VMware Products Location in the CloudImplementing Cloud-Based Applications Data Center and Cloud Infrastructure Identity ManagementChoosing the Right Vendor Products What It IsImplementing Cloud-Based Applications End-User and Desktop Products Future of Identity in the CloudCitrix IBM Virtualization Privacy and Its Relation to Cloud-BasedWindows Remote Desktop Using VMware to see a Virtualized Server Information SystemsVnc Environment Personal InformationWeb Browsers What It Is Privacy-Related IssuesServer Extensions Permissive Federation Finding Your Private Information Thin Clients Verified Federation What It IsSmart Phones, Pads, Pods, etc. Encrypted Federation Open Cloud Consortium Working GroupsVirtual Terminal Security Strengths and Trusted Federation Project MatsuWeaknesses Using XMPP in the Federated Project CometStrengths Environment HPC in the CloudWeaknesses Presence in the Cloud The Open Cloud TestbediPhone What It Is The Open Science Data CloudAndroid Presence Protocols Intercloud TestbedBlackBerry Leveraging Presence Reporting on an Open Cloud ConsortiumWindows Mobile Presence Enabled Working GroupUbuntu Mobile Internet Device The Future of Presence Distributed Management Task ForceMobile Platform Virtualization The Interrelation of Identity, Presence, (DMTF)Kernel-Based Virtual Machine and Location in the Cloud What It Is?VMware Mobile Virtualization Platform Identity Management DMTK Working Groups Associated withCollaboration Applications for Mobile What It Is Cloud ComputingPlatforms Future of Identity in the Cloud Standards for Application DevelopersText Messaging Privacy and Its Relation to Cloud-Based ProtocolsiPhone Applications Information Systems Scripting Languages

Page 31: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

BlackBerry Applications Personal Information Content Formatting Standards andDroid Applications Privacy-Related Issues Languages

Finding Your Private Information Standards for Security in the CloudWhat It Is Confidentiality, Integrity, Availability

line Open Cloud Consortium Working Groups Authentication, Authorization,Cloud Computing Defined Project Matsu AccountabilityCloud Computing Architecture Project Comet Regulations for PrivacyCloud Computing Terms HPC in the Cloud Security ProtocolsCommunication-as-a-Service (CaaS) The Open Cloud Testbed Establishing a Baseline for CloudInfrastructure-as-a-Service (IaaS) The Open Science Data Cloud PerformanceMonitoring-as-a-Service (MaaS) Intercloud Testbed Best Practices for Selecting a Vendor andSoftware-as-a-Service (SaaS) Reporting on an Open Cloud Consortium Implementing Cloud-Based ApplicationsPlatform-as-a-Service (PaaS) Working Group Choosing the Right VendorBenefits and Limitations of Cloud Computing Distributed Management Task Force Implementing Cloud-Based Applications Benefits (DMTF) CitrixLimitations What It Is? Windows Remote DesktopCloud Computing Case Studies DMTK Working Groups Associated with VncHow Companies Are Using Cloud Cloud Computing Web BrowsersComputing Standards for Application Developers Server ExtensionsImplementing Applications and Services in Protocols Thin Clientsthe Cloud Scripting Languages Smart Phones, Pads, Pods, etc.Using Your Company's Services vs. the Content Formatting Standards and Virtual Terminal Security Strengths andCloud Provider Languages WeaknessesA Cloud Service Provider Introduced Standards for Security in the Cloud StrengthsCloud Computing Risks and Issues Confidentiality, Integrity, Availability Weaknesses Products and Services Provided by Cloud Authentication, Authorization, iPhoneComputing Companies Accountability AndroidOperational Regulations for Privacy BlackBerryEconomic Security Protocols Windows MobileStaffing Establishing a Baseline for Cloud Ubuntu Mobile Internet DeviceShould Your Company Invest in Cloud Performance Mobile Platform VirtualizationComputing? Best Practices for Selecting a Vendor Kernel-Based Virtual MachineWhat Should Not be Moved to the Cloud and Implementing Cloud-Based VMware Mobile Virtualization PlatformVirtualization in Mainframe Architectures Applications Collaboration Applications for Mobileand Operating Systems Choosing the Right Vendor PlatformsLANs and the Cloud Implementing Cloud-Based Applications Text MessagingInternet and the Cloud Citrix iPhone ApplicationsWeb Services, Browsers, and the Cloud Windows Remote Desktop BlackBerry ApplicationsThin Client Vnc Droid Applications Advances in Networking and Processing Web BrowsersSpeeds that Led to Cloud Computing Server ExtensionsNetworking Developments Thin Clients lineIncreased Processing Speeds Smart Phones, Pads, Pods, etc. Cloud Computing DefinedManaged Service Provider Model to Cloud Virtual Terminal Security Strengths and Cloud Computing ArchitectureComputing and Software as a Service Weaknesses Cloud Computing Terms(SaaS) Strengths Communication-as-a-Service (CaaS)Single Purpose Architectures Migrate to Weaknesses Infrastructure-as-a-Service (IaaS)Multipurpose Architectures iPhone Monitoring-as-a-Service (MaaS)Data Center Virtualization Android Software-as-a-Service (SaaS)Collaboration BlackBerry Platform-as-a-Service (PaaS)The Cloud as a Reach Extender Windows Mobile Benefits and Limitations of CloudThe Cloud as a Communication Enabler Ubuntu Mobile Internet Device ComputingThe Cloud as an Employee Enabler Mobile Platform Virtualization BenefitsService-Oriented Architecture (SOA) Kernel-Based Virtual Machine LimitationsEvolving from SOA to the Cloud VMware Mobile Virtualization Platform Cloud Computing Case StudiesCapacity: Limited Performance Collaboration Applications for Mobile How Companies Are Using CloudAvailability: Communications Failure and Platforms ComputingPerformance Issues Text Messaging Implementing Applications and Services inSecurity: Newer Security Protocols Provide iPhone Applications the CloudMore Protection BlackBerry Applications Using Your Company's Services vs. theWhat's Next in Cloud Computing Droid Applications Cloud ProviderUsing Industry and International Standards A Cloud Service Provider IntroducedIndependent Components Cloud Computing Risks and Issues Message Base line Products and Services Provided by CloudLocation Independence Cloud Computing Defined Computing Companies Communication Requirements for Cloud Cloud Computing Architecture Operational

Page 32: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Implementation Cloud Computing Terms EconomicPublic Internet Communication-as-a-Service (CaaS) StaffingPrivate Internet Infrastructure-as-a-Service (IaaS) Should Your Company Invest in CloudRouting to the Datacenter Monitoring-as-a-Service (MaaS) Computing?Switching within the Data Center Software-as-a-Service (SaaS) What Should Not be Moved to the Cloud Bandwidth Platform-as-a-Service (PaaS) Virtualization in Mainframe ArchitecturesTools Used to Measure Network Benefits and Limitations of Cloud and Operating SystemsPerformance Computing LANs and the CloudUsing the Protocol Analyzer to Measure Benefits Internet and the CloudBandwidth Limitations Web Services, Browsers, and the CloudUsing Ping and Traceroute to Measure Cloud Computing Case Studies Thin ClientNetwork Performance How Companies Are Using Cloud Advances in Networking and ProcessingSecurity Computing Speeds that Led to Cloud ComputingSSL Implementing Applications and Services Networking DevelopmentsVPN in the Cloud Increased Processing SpeedsOverhead Using Your Company's Services vs. the Managed Service Provider Model to CloudStorage Options for Cloud Computing Cloud Provider Computing and Software as a ServiceStorage Capacity A Cloud Service Provider Introduced (SaaS)Data Protection and Partitioning Cloud Computing Risks and Issues Single Purpose Architectures Migrate toNAS Products and Services Provided by Cloud Multipurpose ArchitecturesSAN Computing Companies Data Center VirtualizationCAS Operational CollaborationRedundancy Economic The Cloud as a Reach ExtenderReplication Staffing The Cloud as a Communication EnablerMultisiting Should Your Company Invest in Cloud The Cloud as an Employee EnablerBackup and Recovery Computing? Service-Oriented Architecture (SOA)Server Software Environments that Support What Should Not be Moved to the Cloud Evolving from SOA to the CloudCloud Computing Virtualization in Mainframe Architectures Capacity: Limited PerformanceServer Capacity and Operating Systems Availability: Communications Failure andVirtualization LANs and the Cloud Performance IssuesClustering Internet and the Cloud Security: Newer Security Protocols ProvideExpansion Web Services, Browsers, and the Cloud More ProtectionServer Functions Thin Client What's Next in Cloud Computing Application Advances in Networking and Processing Using Industry and International StandardsWeb Speeds that Led to Cloud Computing Independent ComponentsDatabase Networking Developments Message BaseVendor Approaches to Cloud Computing Increased Processing Speeds Location IndependenceRole of Open Source Software in Data Managed Service Provider Model to Communication Requirements for CloudCenter Cloud Computing and Software as a ImplementationCost Reduction vs. Reliability Service (SaaS) Public InternetOpen Source Server Software Single Purpose Architectures Migrate to Private InternetOpen Source Database Software Multipurpose Architectures Routing to the DatacenterOpen Source Applications Software Data Center Virtualization Switching within the Data CenterOpen Source System Management Software Collaboration BandwidthOpen Source Load-Balancing Software The Cloud as a Reach Extender Tools Used to Measure NetworkThe Hypervisor The Cloud as a Communication Enabler PerformanceVirtualization as the "Operating System" The Cloud as an Employee Enabler Using the Protocol Analyzer to MeasureVirtualization with a Host Operating System Service-Oriented Architecture (SOA) BandwidthVirtualization Infections on Virtualized Evolving from SOA to the Cloud Using Ping and Traceroute to MeasureEnvironments Capacity: Limited Performance Network PerformanceType 1 Virtualized Environment Availability: Communications Failure and SecurityType 2 Virtualized Environment Performance Issues SSLVirtualization Environments Security: Newer Security Protocols VPNMicrosoft Virtualization Provide More Protection OverheadSun xVM VirtualBox What's Next in Cloud Computing Storage Options for Cloud ComputingLinux/UNIX Virtualization Using Industry and International Storage CapacityVMware Products Standards Data Protection and PartitioningData Center and Cloud Infrastructure Independent Components NASProducts Message Base SANEnd-User and Desktop Products Location Independence CASIBM Virtualization Communication Requirements for Cloud RedundancyUsing VMware to see a Virtualized Server Implementation ReplicationEnvironment Public Internet MultisitingWhat It Is Private Internet Backup and RecoveryPermissive Federation Routing to the Datacenter Server Software Environments thatVerified Federation Switching within the Data Center Support Cloud Computing

Page 33: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Encrypted Federation Bandwidth Server CapacityTrusted Federation Tools Used to Measure Network VirtualizationUsing XMPP in the Federated Environment Performance ClusteringPresence in the Cloud Using the Protocol Analyzer to Measure ExpansionWhat It Is Bandwidth Server FunctionsPresence Protocols Using Ping and Traceroute to Measure ApplicationLeveraging Presence Network Performance WebPresence Enabled Security DatabaseThe Future of Presence SSL Vendor Approaches to Cloud ComputingThe Interrelation of Identity, Presence, and VPN Role of Open Source Software in DataLocation in the Cloud Overhead CenterIdentity Management Storage Options for Cloud Computing Cost Reduction vs. ReliabilityWhat It Is Storage Capacity Open Source Server SoftwareFuture of Identity in the Cloud Data Protection and Partitioning Open Source Database SoftwarePrivacy and Its Relation to Cloud-Based NAS Open Source Applications SoftwareInformation Systems SAN Open Source System ManagementPersonal Information CAS SoftwarePrivacy-Related Issues Redundancy Open Source Load-Balancing Software Finding Your Private Information Replication The HypervisorWhat It Is Multisiting Virtualization as the "Operating System"Open Cloud Consortium Working Groups Backup and Recovery Virtualization with a Host OperatingProject Matsu Server Software Environments that SystemProject Comet Support Cloud Computing Virtualization Infections on VirtualizedHPC in the Cloud Server Capacity EnvironmentsThe Open Cloud Testbed Virtualization Type 1 Virtualized EnvironmentThe Open Science Data Cloud Clustering Type 2 Virtualized EnvironmentIntercloud Testbed Expansion Virtualization EnvironmentsReporting on an Open Cloud Consortium Server Functions Microsoft VirtualizationWorking Group Application Sun xVM VirtualBoxDistributed Management Task Force Web Linux/UNIX Virtualization(DMTF) Database VMware ProductsWhat It Is? Vendor Approaches to Cloud Computing Data Center and Cloud InfrastructureDMTK Working Groups Associated with Role of Open Source Software in Data ProductsCloud Computing Center End-User and Desktop ProductsStandards for Application Developers Cost Reduction vs. Reliability IBM VirtualizationProtocols Open Source Server Software Using VMware to see a Virtualized ServerScripting Languages Open Source Database Software Environment Content Formatting Standards and Open Source Applications Software What It IsLanguages Open Source System Management Permissive FederationStandards for Security in the Cloud Software Verified FederationConfidentiality, Integrity, Availability Open Source Load-Balancing Software Encrypted FederationAuthentication, Authorization, Accountability The Hypervisor Trusted FederationRegulations for Privacy Virtualization as the "Operating System" Using XMPP in the Federated EnvironmentSecurity Protocols Virtualization with a Host Operating Presence in the CloudEstablishing a Baseline for Cloud System What It IsPerformance Virtualization Infections on Virtualized Presence ProtocolsBest Practices for Selecting a Vendor and Environments Leveraging PresenceImplementing Cloud-Based Applications Type 1 Virtualized Environment Presence EnabledChoosing the Right Vendor Type 2 Virtualized Environment The Future of PresenceImplementing Cloud-Based Applications Virtualization Environments The Interrelation of Identity, Presence, andCitrix Microsoft Virtualization Location in the CloudWindows Remote Desktop Sun xVM VirtualBox Identity ManagementVnc Linux/UNIX Virtualization What It IsWeb Browsers VMware Products Future of Identity in the CloudServer Extensions Data Center and Cloud Infrastructure Privacy and Its Relation to Cloud-BasedThin Clients Products Information SystemsSmart Phones, Pads, Pods, etc. End-User and Desktop Products Personal InformationVirtual Terminal Security Strengths and IBM Virtualization Privacy-Related IssuesWeaknesses Using VMware to see a Virtualized Server Finding Your Private Information Strengths Environment What It IsWeaknesses What It Is Open Cloud Consortium Working GroupsiPhone Permissive Federation Project MatsuAndroid Verified Federation Project CometBlackBerry Encrypted Federation HPC in the CloudWindows Mobile Trusted Federation The Open Cloud TestbedUbuntu Mobile Internet Device Using XMPP in the Federated The Open Science Data Cloud

Page 34: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Mobile Platform Virtualization Environment Intercloud TestbedKernel-Based Virtual Machine Presence in the Cloud Reporting on an Open Cloud ConsortiumVMware Mobile Virtualization Platform What It Is Working GroupCollaboration Applications for Mobile Presence Protocols Distributed Management Task ForcePlatforms Leveraging Presence (DMTF)Text Messaging Presence Enabled What It Is?iPhone Applications The Future of Presence DMTK Working Groups Associated withBlackBerry Applications The Interrelation of Identity, Presence, Cloud ComputingDroid Applications and Location in the Cloud Standards for Application Developers

Identity Management ProtocolsWhat It Is Scripting Languages

line Future of Identity in the Cloud Content Formatting Standards andCloud Computing Defined Privacy and Its Relation to Cloud-Based LanguagesCloud Computing Architecture Information Systems Standards for Security in the CloudCloud Computing Terms Personal Information Confidentiality, Integrity, AvailabilityCommunication-as-a-Service (CaaS) Privacy-Related Issues Authentication, Authorization,Infrastructure-as-a-Service (IaaS) Finding Your Private Information AccountabilityMonitoring-as-a-Service (MaaS) What It Is Regulations for PrivacySoftware-as-a-Service (SaaS) Open Cloud Consortium Working Groups Security ProtocolsPlatform-as-a-Service (PaaS) Project Matsu Establishing a Baseline for CloudBenefits and Limitations of Cloud Computing Project Comet PerformanceBenefits HPC in the Cloud Best Practices for Selecting a Vendor andLimitations The Open Cloud Testbed Implementing Cloud-Based ApplicationsCloud Computing Case Studies The Open Science Data Cloud Choosing the Right VendorHow Companies Are Using Cloud Intercloud Testbed Implementing Cloud-Based Applications Computing Reporting on an Open Cloud Consortium CitrixImplementing Applications and Services in Working Group Windows Remote Desktopthe Cloud Distributed Management Task Force VncUsing Your Company's Services vs. the (DMTF) Web BrowsersCloud Provider What It Is? Server ExtensionsA Cloud Service Provider Introduced DMTK Working Groups Associated with Thin ClientsCloud Computing Risks and Issues Cloud Computing Smart Phones, Pads, Pods, etc.Products and Services Provided by Cloud Standards for Application Developers Virtual Terminal Security Strengths andComputing Companies Protocols WeaknessesOperational Scripting Languages StrengthsEconomic Content Formatting Standards and Weaknesses Staffing Languages iPhoneShould Your Company Invest in Cloud Standards for Security in the Cloud AndroidComputing? Confidentiality, Integrity, Availability BlackBerryWhat Should Not be Moved to the Cloud Authentication, Authorization, Windows MobileVirtualization in Mainframe Architectures Accountability Ubuntu Mobile Internet Deviceand Operating Systems Regulations for Privacy Mobile Platform VirtualizationLANs and the Cloud Security Protocols Kernel-Based Virtual MachineInternet and the Cloud Establishing a Baseline for Cloud VMware Mobile Virtualization PlatformWeb Services, Browsers, and the Cloud Performance Collaboration Applications for MobileThin Client Best Practices for Selecting a Vendor PlatformsAdvances in Networking and Processing and Implementing Cloud-Based Text MessagingSpeeds that Led to Cloud Computing Applications iPhone ApplicationsNetworking Developments Choosing the Right Vendor BlackBerry ApplicationsIncreased Processing Speeds Implementing Cloud-Based Applications Droid Applications Managed Service Provider Model to Cloud CitrixComputing and Software as a Service Windows Remote Desktop(SaaS) Vnc lineSingle Purpose Architectures Migrate to Web Browsers Cloud Computing DefinedMultipurpose Architectures Server Extensions Cloud Computing ArchitectureData Center Virtualization Thin Clients Cloud Computing TermsCollaboration Smart Phones, Pads, Pods, etc. Communication-as-a-Service (CaaS)The Cloud as a Reach Extender Virtual Terminal Security Strengths and Infrastructure-as-a-Service (IaaS)The Cloud as a Communication Enabler Weaknesses Monitoring-as-a-Service (MaaS)The Cloud as an Employee Enabler Strengths Software-as-a-Service (SaaS)Service-Oriented Architecture (SOA) Weaknesses Platform-as-a-Service (PaaS)Evolving from SOA to the Cloud iPhone Benefits and Limitations of CloudCapacity: Limited Performance Android ComputingAvailability: Communications Failure and BlackBerry BenefitsPerformance Issues Windows Mobile LimitationsSecurity: Newer Security Protocols Provide Ubuntu Mobile Internet Device Cloud Computing Case Studies

Page 35: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

More Protection Mobile Platform Virtualization How Companies Are Using CloudWhat's Next in Cloud Computing Kernel-Based Virtual Machine ComputingUsing Industry and International Standards VMware Mobile Virtualization Platform Implementing Applications and Services inIndependent Components Collaboration Applications for Mobile the CloudMessage Base Platforms Using Your Company's Services vs. theLocation Independence Text Messaging Cloud ProviderCommunication Requirements for Cloud iPhone Applications A Cloud Service Provider IntroducedImplementation BlackBerry Applications Cloud Computing Risks and Issues Public Internet Droid Applications Products and Services Provided by CloudPrivate Internet Computing Companies Routing to the Datacenter OperationalSwitching within the Data Center line EconomicBandwidth Cloud Computing Defined StaffingTools Used to Measure Network Cloud Computing Architecture Should Your Company Invest in CloudPerformance Cloud Computing Terms Computing?Using the Protocol Analyzer to Measure Communication-as-a-Service (CaaS) What Should Not be Moved to the Cloud Bandwidth Infrastructure-as-a-Service (IaaS) Virtualization in Mainframe ArchitecturesUsing Ping and Traceroute to Measure Monitoring-as-a-Service (MaaS) and Operating SystemsNetwork Performance Software-as-a-Service (SaaS) LANs and the CloudSecurity Platform-as-a-Service (PaaS) Internet and the CloudSSL Benefits and Limitations of Cloud Web Services, Browsers, and the CloudVPN Computing Thin ClientOverhead Benefits Advances in Networking and ProcessingStorage Options for Cloud Computing Limitations Speeds that Led to Cloud ComputingStorage Capacity Cloud Computing Case Studies Networking DevelopmentsData Protection and Partitioning How Companies Are Using Cloud Increased Processing SpeedsNAS Computing Managed Service Provider Model to CloudSAN Implementing Applications and Services Computing and Software as a ServiceCAS in the Cloud (SaaS)Redundancy Using Your Company's Services vs. the Single Purpose Architectures Migrate toReplication Cloud Provider Multipurpose ArchitecturesMultisiting A Cloud Service Provider Introduced Data Center VirtualizationBackup and Recovery Cloud Computing Risks and Issues CollaborationServer Software Environments that Support Products and Services Provided by Cloud The Cloud as a Reach ExtenderCloud Computing Computing Companies The Cloud as a Communication EnablerServer Capacity Operational The Cloud as an Employee EnablerVirtualization Economic Service-Oriented Architecture (SOA)Clustering Staffing Evolving from SOA to the CloudExpansion Should Your Company Invest in Cloud Capacity: Limited PerformanceServer Functions Computing? Availability: Communications Failure andApplication What Should Not be Moved to the Cloud Performance IssuesWeb Virtualization in Mainframe Architectures Security: Newer Security Protocols ProvideDatabase and Operating Systems More ProtectionVendor Approaches to Cloud Computing LANs and the Cloud What's Next in Cloud Computing Role of Open Source Software in Data Internet and the Cloud Using Industry and International StandardsCenter Web Services, Browsers, and the Cloud Independent ComponentsCost Reduction vs. Reliability Thin Client Message BaseOpen Source Server Software Advances in Networking and Processing Location IndependenceOpen Source Database Software Speeds that Led to Cloud Computing Communication Requirements for CloudOpen Source Applications Software Networking Developments ImplementationOpen Source System Management Software Increased Processing Speeds Public InternetOpen Source Load-Balancing Software Managed Service Provider Model to Private InternetThe Hypervisor Cloud Computing and Software as a Routing to the DatacenterVirtualization as the "Operating System" Service (SaaS) Switching within the Data CenterVirtualization with a Host Operating System Single Purpose Architectures Migrate to BandwidthVirtualization Infections on Virtualized Multipurpose Architectures Tools Used to Measure NetworkEnvironments Data Center Virtualization PerformanceType 1 Virtualized Environment Collaboration Using the Protocol Analyzer to MeasureType 2 Virtualized Environment The Cloud as a Reach Extender BandwidthVirtualization Environments The Cloud as a Communication Enabler Using Ping and Traceroute to MeasureMicrosoft Virtualization The Cloud as an Employee Enabler Network PerformanceSun xVM VirtualBox Service-Oriented Architecture (SOA) SecurityLinux/UNIX Virtualization Evolving from SOA to the Cloud SSLVMware Products Capacity: Limited Performance VPNData Center and Cloud Infrastructure Availability: Communications Failure and OverheadProducts Performance Issues Storage Options for Cloud Computing

Page 36: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

End-User and Desktop Products Security: Newer Security Protocols Storage CapacityIBM Virtualization Provide More Protection Data Protection and PartitioningUsing VMware to see a Virtualized Server What's Next in Cloud Computing NASEnvironment Using Industry and International SANWhat It Is Standards CASPermissive Federation Independent Components RedundancyVerified Federation Message Base ReplicationEncrypted Federation Location Independence MultisitingTrusted Federation Communication Requirements for Cloud Backup and RecoveryUsing XMPP in the Federated Environment Implementation Server Software Environments thatPresence in the Cloud Public Internet Support Cloud ComputingWhat It Is Private Internet Server CapacityPresence Protocols Routing to the Datacenter VirtualizationLeveraging Presence Switching within the Data Center ClusteringPresence Enabled Bandwidth ExpansionThe Future of Presence Tools Used to Measure Network Server FunctionsThe Interrelation of Identity, Presence, and Performance ApplicationLocation in the Cloud Using the Protocol Analyzer to Measure WebIdentity Management Bandwidth DatabaseWhat It Is Using Ping and Traceroute to Measure Vendor Approaches to Cloud ComputingFuture of Identity in the Cloud Network Performance Role of Open Source Software in DataPrivacy and Its Relation to Cloud-Based Security CenterInformation Systems SSL Cost Reduction vs. ReliabilityPersonal Information VPN Open Source Server SoftwarePrivacy-Related Issues Overhead Open Source Database SoftwareFinding Your Private Information Storage Options for Cloud Computing Open Source Applications SoftwareWhat It Is Storage Capacity Open Source System ManagementOpen Cloud Consortium Working Groups Data Protection and Partitioning SoftwareProject Matsu NAS Open Source Load-Balancing Software Project Comet SAN The HypervisorHPC in the Cloud CAS Virtualization as the "Operating System"The Open Cloud Testbed Redundancy Virtualization with a Host OperatingThe Open Science Data Cloud Replication SystemIntercloud Testbed Multisiting Virtualization Infections on VirtualizedReporting on an Open Cloud Consortium Backup and Recovery EnvironmentsWorking Group Server Software Environments that Type 1 Virtualized EnvironmentDistributed Management Task Force Support Cloud Computing Type 2 Virtualized Environment(DMTF) Server Capacity Virtualization EnvironmentsWhat It Is? Virtualization Microsoft VirtualizationDMTK Working Groups Associated with Clustering Sun xVM VirtualBoxCloud Computing Expansion Linux/UNIX VirtualizationStandards for Application Developers Server Functions VMware ProductsProtocols Application Data Center and Cloud InfrastructureScripting Languages Web ProductsContent Formatting Standards and Database End-User and Desktop ProductsLanguages Vendor Approaches to Cloud Computing IBM VirtualizationStandards for Security in the Cloud Role of Open Source Software in Data Using VMware to see a Virtualized ServerConfidentiality, Integrity, Availability Center Environment Authentication, Authorization, Accountability Cost Reduction vs. Reliability What It IsRegulations for Privacy Open Source Server Software Permissive FederationSecurity Protocols Open Source Database Software Verified FederationEstablishing a Baseline for Cloud Open Source Applications Software Encrypted FederationPerformance Open Source System Management Trusted FederationBest Practices for Selecting a Vendor and Software Using XMPP in the Federated EnvironmentImplementing Cloud-Based Applications Open Source Load-Balancing Software Presence in the CloudChoosing the Right Vendor The Hypervisor What It IsImplementing Cloud-Based Applications Virtualization as the "Operating System" Presence ProtocolsCitrix Virtualization with a Host Operating Leveraging PresenceWindows Remote Desktop System Presence EnabledVnc Virtualization Infections on Virtualized The Future of PresenceWeb Browsers Environments The Interrelation of Identity, Presence, andServer Extensions Type 1 Virtualized Environment Location in the CloudThin Clients Type 2 Virtualized Environment Identity ManagementSmart Phones, Pads, Pods, etc. Virtualization Environments What It IsVirtual Terminal Security Strengths and Microsoft Virtualization Future of Identity in the CloudWeaknesses Sun xVM VirtualBox Privacy and Its Relation to Cloud-Based

Page 37: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Strengths Linux/UNIX Virtualization Information SystemsWeaknesses VMware Products Personal InformationiPhone Data Center and Cloud Infrastructure Privacy-Related IssuesAndroid Products Finding Your Private Information BlackBerry End-User and Desktop Products What It IsWindows Mobile IBM Virtualization Open Cloud Consortium Working GroupsUbuntu Mobile Internet Device Using VMware to see a Virtualized Server Project MatsuMobile Platform Virtualization Environment Project CometKernel-Based Virtual Machine What It Is HPC in the CloudVMware Mobile Virtualization Platform Permissive Federation The Open Cloud TestbedCollaboration Applications for Mobile Verified Federation The Open Science Data CloudPlatforms Encrypted Federation Intercloud TestbedText Messaging Trusted Federation Reporting on an Open Cloud ConsortiumiPhone Applications Using XMPP in the Federated Working GroupBlackBerry Applications Environment Distributed Management Task ForceDroid Applications Presence in the Cloud (DMTF)

What It Is What It Is?Presence Protocols DMTK Working Groups Associated with

line Leveraging Presence Cloud ComputingCloud Computing Defined Presence Enabled Standards for Application DevelopersCloud Computing Architecture The Future of Presence ProtocolsCloud Computing Terms The Interrelation of Identity, Presence, Scripting LanguagesCommunication-as-a-Service (CaaS) and Location in the Cloud Content Formatting Standards andInfrastructure-as-a-Service (IaaS) Identity Management LanguagesMonitoring-as-a-Service (MaaS) What It Is Standards for Security in the CloudSoftware-as-a-Service (SaaS) Future of Identity in the Cloud Confidentiality, Integrity, AvailabilityPlatform-as-a-Service (PaaS) Privacy and Its Relation to Cloud-Based Authentication, Authorization,Benefits and Limitations of Cloud Computing Information Systems AccountabilityBenefits Personal Information Regulations for PrivacyLimitations Privacy-Related Issues Security ProtocolsCloud Computing Case Studies Finding Your Private Information Establishing a Baseline for CloudHow Companies Are Using Cloud What It Is PerformanceComputing Open Cloud Consortium Working Groups Best Practices for Selecting a Vendor andImplementing Applications and Services in Project Matsu Implementing Cloud-Based Applicationsthe Cloud Project Comet Choosing the Right VendorUsing Your Company's Services vs. the HPC in the Cloud Implementing Cloud-Based Applications Cloud Provider The Open Cloud Testbed CitrixA Cloud Service Provider Introduced The Open Science Data Cloud Windows Remote DesktopCloud Computing Risks and Issues Intercloud Testbed VncProducts and Services Provided by Cloud Reporting on an Open Cloud Consortium Web BrowsersComputing Companies Working Group Server ExtensionsOperational Distributed Management Task Force Thin ClientsEconomic (DMTF) Smart Phones, Pads, Pods, etc.Staffing What It Is? Virtual Terminal Security Strengths andShould Your Company Invest in Cloud DMTK Working Groups Associated with WeaknessesComputing? Cloud Computing StrengthsWhat Should Not be Moved to the Cloud Standards for Application Developers Weaknesses Virtualization in Mainframe Architectures Protocols iPhoneand Operating Systems Scripting Languages AndroidLANs and the Cloud Content Formatting Standards and BlackBerryInternet and the Cloud Languages Windows MobileWeb Services, Browsers, and the Cloud Standards for Security in the Cloud Ubuntu Mobile Internet DeviceThin Client Confidentiality, Integrity, Availability Mobile Platform VirtualizationAdvances in Networking and Processing Authentication, Authorization, Kernel-Based Virtual MachineSpeeds that Led to Cloud Computing Accountability VMware Mobile Virtualization PlatformNetworking Developments Regulations for Privacy Collaboration Applications for MobileIncreased Processing Speeds Security Protocols PlatformsManaged Service Provider Model to Cloud Establishing a Baseline for Cloud Text MessagingComputing and Software as a Service Performance iPhone Applications(SaaS) Best Practices for Selecting a Vendor BlackBerry ApplicationsSingle Purpose Architectures Migrate to and Implementing Cloud-Based Droid Applications Multipurpose Architectures ApplicationsData Center Virtualization Choosing the Right VendorCollaboration Implementing Cloud-Based Applications lineThe Cloud as a Reach Extender Citrix Cloud Computing DefinedThe Cloud as a Communication Enabler Windows Remote Desktop Cloud Computing Architecture

Page 38: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Cloud as an Employee Enabler Vnc Cloud Computing TermsService-Oriented Architecture (SOA) Web Browsers Communication-as-a-Service (CaaS)Evolving from SOA to the Cloud Server Extensions Infrastructure-as-a-Service (IaaS)Capacity: Limited Performance Thin Clients Monitoring-as-a-Service (MaaS)Availability: Communications Failure and Smart Phones, Pads, Pods, etc. Software-as-a-Service (SaaS)Performance Issues Virtual Terminal Security Strengths and Platform-as-a-Service (PaaS)Security: Newer Security Protocols Provide Weaknesses Benefits and Limitations of CloudMore Protection Strengths ComputingWhat's Next in Cloud Computing Weaknesses BenefitsUsing Industry and International Standards iPhone LimitationsIndependent Components Android Cloud Computing Case StudiesMessage Base BlackBerry How Companies Are Using CloudLocation Independence Windows Mobile ComputingCommunication Requirements for Cloud Ubuntu Mobile Internet Device Implementing Applications and Services inImplementation Mobile Platform Virtualization the CloudPublic Internet Kernel-Based Virtual Machine Using Your Company's Services vs. thePrivate Internet VMware Mobile Virtualization Platform Cloud ProviderRouting to the Datacenter Collaboration Applications for Mobile A Cloud Service Provider IntroducedSwitching within the Data Center Platforms Cloud Computing Risks and Issues Bandwidth Text Messaging Products and Services Provided by CloudTools Used to Measure Network iPhone Applications Computing Companies Performance BlackBerry Applications OperationalUsing the Protocol Analyzer to Measure Droid Applications EconomicBandwidth StaffingUsing Ping and Traceroute to Measure Should Your Company Invest in CloudNetwork Performance line Computing?Security Cloud Computing Defined What Should Not be Moved to the Cloud SSL Cloud Computing Architecture Virtualization in Mainframe ArchitecturesVPN Cloud Computing Terms and Operating SystemsOverhead Communication-as-a-Service (CaaS) LANs and the CloudStorage Options for Cloud Computing Infrastructure-as-a-Service (IaaS) Internet and the CloudStorage Capacity Monitoring-as-a-Service (MaaS) Web Services, Browsers, and the CloudData Protection and Partitioning Software-as-a-Service (SaaS) Thin ClientNAS Platform-as-a-Service (PaaS) Advances in Networking and ProcessingSAN Benefits and Limitations of Cloud Speeds that Led to Cloud ComputingCAS Computing Networking DevelopmentsRedundancy Benefits Increased Processing SpeedsReplication Limitations Managed Service Provider Model to CloudMultisiting Cloud Computing Case Studies Computing and Software as a ServiceBackup and Recovery How Companies Are Using Cloud (SaaS)Server Software Environments that Support Computing Single Purpose Architectures Migrate toCloud Computing Implementing Applications and Services Multipurpose ArchitecturesServer Capacity in the Cloud Data Center VirtualizationVirtualization Using Your Company's Services vs. the CollaborationClustering Cloud Provider The Cloud as a Reach ExtenderExpansion A Cloud Service Provider Introduced The Cloud as a Communication EnablerServer Functions Cloud Computing Risks and Issues The Cloud as an Employee EnablerApplication Products and Services Provided by Cloud Service-Oriented Architecture (SOA)Web Computing Companies Evolving from SOA to the CloudDatabase Operational Capacity: Limited PerformanceVendor Approaches to Cloud Computing Economic Availability: Communications Failure andRole of Open Source Software in Data Staffing Performance IssuesCenter Should Your Company Invest in Cloud Security: Newer Security Protocols ProvideCost Reduction vs. Reliability Computing? More ProtectionOpen Source Server Software What Should Not be Moved to the Cloud What's Next in Cloud Computing Open Source Database Software Virtualization in Mainframe Architectures Using Industry and International StandardsOpen Source Applications Software and Operating Systems Independent ComponentsOpen Source System Management Software LANs and the Cloud Message BaseOpen Source Load-Balancing Software Internet and the Cloud Location IndependenceThe Hypervisor Web Services, Browsers, and the Cloud Communication Requirements for CloudVirtualization as the "Operating System" Thin Client ImplementationVirtualization with a Host Operating System Advances in Networking and Processing Public InternetVirtualization Infections on Virtualized Speeds that Led to Cloud Computing Private InternetEnvironments Networking Developments Routing to the DatacenterType 1 Virtualized Environment Increased Processing Speeds Switching within the Data CenterType 2 Virtualized Environment Managed Service Provider Model to Bandwidth

Page 39: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization Environments Cloud Computing and Software as a Tools Used to Measure NetworkMicrosoft Virtualization Service (SaaS) PerformanceSun xVM VirtualBox Single Purpose Architectures Migrate to Using the Protocol Analyzer to MeasureLinux/UNIX Virtualization Multipurpose Architectures BandwidthVMware Products Data Center Virtualization Using Ping and Traceroute to MeasureData Center and Cloud Infrastructure Collaboration Network PerformanceProducts The Cloud as a Reach Extender SecurityEnd-User and Desktop Products The Cloud as a Communication Enabler SSLIBM Virtualization The Cloud as an Employee Enabler VPNUsing VMware to see a Virtualized Server Service-Oriented Architecture (SOA) OverheadEnvironment Evolving from SOA to the Cloud Storage Options for Cloud ComputingWhat It Is Capacity: Limited Performance Storage CapacityPermissive Federation Availability: Communications Failure and Data Protection and PartitioningVerified Federation Performance Issues NASEncrypted Federation Security: Newer Security Protocols SANTrusted Federation Provide More Protection CASUsing XMPP in the Federated Environment What's Next in Cloud Computing RedundancyPresence in the Cloud Using Industry and International ReplicationWhat It Is Standards MultisitingPresence Protocols Independent Components Backup and RecoveryLeveraging Presence Message Base Server Software Environments thatPresence Enabled Location Independence Support Cloud ComputingThe Future of Presence Communication Requirements for Cloud Server CapacityThe Interrelation of Identity, Presence, and Implementation VirtualizationLocation in the Cloud Public Internet ClusteringIdentity Management Private Internet ExpansionWhat It Is Routing to the Datacenter Server FunctionsFuture of Identity in the Cloud Switching within the Data Center ApplicationPrivacy and Its Relation to Cloud-Based Bandwidth WebInformation Systems Tools Used to Measure Network DatabasePersonal Information Performance Vendor Approaches to Cloud ComputingPrivacy-Related Issues Using the Protocol Analyzer to Measure Role of Open Source Software in DataFinding Your Private Information Bandwidth CenterWhat It Is Using Ping and Traceroute to Measure Cost Reduction vs. ReliabilityOpen Cloud Consortium Working Groups Network Performance Open Source Server SoftwareProject Matsu Security Open Source Database SoftwareProject Comet SSL Open Source Applications SoftwareHPC in the Cloud VPN Open Source System ManagementThe Open Cloud Testbed Overhead SoftwareThe Open Science Data Cloud Storage Options for Cloud Computing Open Source Load-Balancing Software Intercloud Testbed Storage Capacity The HypervisorReporting on an Open Cloud Consortium Data Protection and Partitioning Virtualization as the "Operating System"Working Group NAS Virtualization with a Host OperatingDistributed Management Task Force SAN System(DMTF) CAS Virtualization Infections on VirtualizedWhat It Is? Redundancy EnvironmentsDMTK Working Groups Associated with Replication Type 1 Virtualized EnvironmentCloud Computing Multisiting Type 2 Virtualized EnvironmentStandards for Application Developers Backup and Recovery Virtualization EnvironmentsProtocols Server Software Environments that Microsoft VirtualizationScripting Languages Support Cloud Computing Sun xVM VirtualBoxContent Formatting Standards and Server Capacity Linux/UNIX VirtualizationLanguages Virtualization VMware ProductsStandards for Security in the Cloud Clustering Data Center and Cloud InfrastructureConfidentiality, Integrity, Availability Expansion ProductsAuthentication, Authorization, Accountability Server Functions End-User and Desktop ProductsRegulations for Privacy Application IBM VirtualizationSecurity Protocols Web Using VMware to see a Virtualized ServerEstablishing a Baseline for Cloud Database Environment Performance Vendor Approaches to Cloud Computing What It IsBest Practices for Selecting a Vendor and Role of Open Source Software in Data Permissive FederationImplementing Cloud-Based Applications Center Verified FederationChoosing the Right Vendor Cost Reduction vs. Reliability Encrypted FederationImplementing Cloud-Based Applications Open Source Server Software Trusted FederationCitrix Open Source Database Software Using XMPP in the Federated EnvironmentWindows Remote Desktop Open Source Applications Software Presence in the Cloud

Page 40: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Vnc Open Source System Management What It IsWeb Browsers Software Presence ProtocolsServer Extensions Open Source Load-Balancing Software Leveraging PresenceThin Clients The Hypervisor Presence EnabledSmart Phones, Pads, Pods, etc. Virtualization as the "Operating System" The Future of PresenceVirtual Terminal Security Strengths and Virtualization with a Host Operating The Interrelation of Identity, Presence, andWeaknesses System Location in the CloudStrengths Virtualization Infections on Virtualized Identity ManagementWeaknesses Environments What It IsiPhone Type 1 Virtualized Environment Future of Identity in the CloudAndroid Type 2 Virtualized Environment Privacy and Its Relation to Cloud-BasedBlackBerry Virtualization Environments Information SystemsWindows Mobile Microsoft Virtualization Personal InformationUbuntu Mobile Internet Device Sun xVM VirtualBox Privacy-Related IssuesMobile Platform Virtualization Linux/UNIX Virtualization Finding Your Private Information Kernel-Based Virtual Machine VMware Products What It IsVMware Mobile Virtualization Platform Data Center and Cloud Infrastructure Open Cloud Consortium Working GroupsCollaboration Applications for Mobile Products Project MatsuPlatforms End-User and Desktop Products Project CometText Messaging IBM Virtualization HPC in the CloudiPhone Applications Using VMware to see a Virtualized Server The Open Cloud TestbedBlackBerry Applications Environment The Open Science Data CloudDroid Applications What It Is Intercloud Testbed

Permissive Federation Reporting on an Open Cloud ConsortiumVerified Federation Working Group

line Encrypted Federation Distributed Management Task ForceCloud Computing Defined Trusted Federation (DMTF)Cloud Computing Architecture Using XMPP in the Federated What It Is?Cloud Computing Terms Environment DMTK Working Groups Associated withCommunication-as-a-Service (CaaS) Presence in the Cloud Cloud ComputingInfrastructure-as-a-Service (IaaS) What It Is Standards for Application DevelopersMonitoring-as-a-Service (MaaS) Presence Protocols ProtocolsSoftware-as-a-Service (SaaS) Leveraging Presence Scripting LanguagesPlatform-as-a-Service (PaaS) Presence Enabled Content Formatting Standards andBenefits and Limitations of Cloud Computing The Future of Presence LanguagesBenefits The Interrelation of Identity, Presence, Standards for Security in the CloudLimitations and Location in the Cloud Confidentiality, Integrity, AvailabilityCloud Computing Case Studies Identity Management Authentication, Authorization,How Companies Are Using Cloud What It Is AccountabilityComputing Future of Identity in the Cloud Regulations for PrivacyImplementing Applications and Services in Privacy and Its Relation to Cloud-Based Security Protocolsthe Cloud Information Systems Establishing a Baseline for CloudUsing Your Company's Services vs. the Personal Information PerformanceCloud Provider Privacy-Related Issues Best Practices for Selecting a Vendor andA Cloud Service Provider Introduced Finding Your Private Information Implementing Cloud-Based ApplicationsCloud Computing Risks and Issues What It Is Choosing the Right VendorProducts and Services Provided by Cloud Open Cloud Consortium Working Groups Implementing Cloud-Based Applications Computing Companies Project Matsu CitrixOperational Project Comet Windows Remote DesktopEconomic HPC in the Cloud VncStaffing The Open Cloud Testbed Web BrowsersShould Your Company Invest in Cloud The Open Science Data Cloud Server ExtensionsComputing? Intercloud Testbed Thin ClientsWhat Should Not be Moved to the Cloud Reporting on an Open Cloud Consortium Smart Phones, Pads, Pods, etc.Virtualization in Mainframe Architectures Working Group Virtual Terminal Security Strengths andand Operating Systems Distributed Management Task Force WeaknessesLANs and the Cloud (DMTF) StrengthsInternet and the Cloud What It Is? Weaknesses Web Services, Browsers, and the Cloud DMTK Working Groups Associated with iPhoneThin Client Cloud Computing AndroidAdvances in Networking and Processing Standards for Application Developers BlackBerrySpeeds that Led to Cloud Computing Protocols Windows MobileNetworking Developments Scripting Languages Ubuntu Mobile Internet DeviceIncreased Processing Speeds Content Formatting Standards and Mobile Platform VirtualizationManaged Service Provider Model to Cloud Languages Kernel-Based Virtual MachineComputing and Software as a Service Standards for Security in the Cloud VMware Mobile Virtualization Platform

Page 41: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

(SaaS) Confidentiality, Integrity, Availability Collaboration Applications for MobileSingle Purpose Architectures Migrate to Authentication, Authorization, PlatformsMultipurpose Architectures Accountability Text MessagingData Center Virtualization Regulations for Privacy iPhone ApplicationsCollaboration Security Protocols BlackBerry ApplicationsThe Cloud as a Reach Extender Establishing a Baseline for Cloud Droid Applications The Cloud as a Communication Enabler PerformanceThe Cloud as an Employee Enabler Best Practices for Selecting a VendorService-Oriented Architecture (SOA) and Implementing Cloud-Based lineEvolving from SOA to the Cloud Applications Cloud Computing DefinedCapacity: Limited Performance Choosing the Right Vendor Cloud Computing ArchitectureAvailability: Communications Failure and Implementing Cloud-Based Applications Cloud Computing TermsPerformance Issues Citrix Communication-as-a-Service (CaaS)Security: Newer Security Protocols Provide Windows Remote Desktop Infrastructure-as-a-Service (IaaS)More Protection Vnc Monitoring-as-a-Service (MaaS)What's Next in Cloud Computing Web Browsers Software-as-a-Service (SaaS)Using Industry and International Standards Server Extensions Platform-as-a-Service (PaaS)Independent Components Thin Clients Benefits and Limitations of CloudMessage Base Smart Phones, Pads, Pods, etc. ComputingLocation Independence Virtual Terminal Security Strengths and BenefitsCommunication Requirements for Cloud Weaknesses LimitationsImplementation Strengths Cloud Computing Case StudiesPublic Internet Weaknesses How Companies Are Using CloudPrivate Internet iPhone ComputingRouting to the Datacenter Android Implementing Applications and Services inSwitching within the Data Center BlackBerry the CloudBandwidth Windows Mobile Using Your Company's Services vs. theTools Used to Measure Network Ubuntu Mobile Internet Device Cloud ProviderPerformance Mobile Platform Virtualization A Cloud Service Provider IntroducedUsing the Protocol Analyzer to Measure Kernel-Based Virtual Machine Cloud Computing Risks and Issues Bandwidth VMware Mobile Virtualization Platform Products and Services Provided by CloudUsing Ping and Traceroute to Measure Collaboration Applications for Mobile Computing Companies Network Performance Platforms OperationalSecurity Text Messaging EconomicSSL iPhone Applications StaffingVPN BlackBerry Applications Should Your Company Invest in CloudOverhead Droid Applications Computing?Storage Options for Cloud Computing What Should Not be Moved to the Cloud Storage Capacity Virtualization in Mainframe ArchitecturesData Protection and Partitioning line and Operating SystemsNAS Cloud Computing Defined LANs and the CloudSAN Cloud Computing Architecture Internet and the CloudCAS Cloud Computing Terms Web Services, Browsers, and the CloudRedundancy Communication-as-a-Service (CaaS) Thin ClientReplication Infrastructure-as-a-Service (IaaS) Advances in Networking and ProcessingMultisiting Monitoring-as-a-Service (MaaS) Speeds that Led to Cloud ComputingBackup and Recovery Software-as-a-Service (SaaS) Networking DevelopmentsServer Software Environments that Support Platform-as-a-Service (PaaS) Increased Processing SpeedsCloud Computing Benefits and Limitations of Cloud Managed Service Provider Model to CloudServer Capacity Computing Computing and Software as a ServiceVirtualization Benefits (SaaS)Clustering Limitations Single Purpose Architectures Migrate toExpansion Cloud Computing Case Studies Multipurpose ArchitecturesServer Functions How Companies Are Using Cloud Data Center VirtualizationApplication Computing CollaborationWeb Implementing Applications and Services The Cloud as a Reach ExtenderDatabase in the Cloud The Cloud as a Communication EnablerVendor Approaches to Cloud Computing Using Your Company's Services vs. the The Cloud as an Employee EnablerRole of Open Source Software in Data Cloud Provider Service-Oriented Architecture (SOA)Center A Cloud Service Provider Introduced Evolving from SOA to the CloudCost Reduction vs. Reliability Cloud Computing Risks and Issues Capacity: Limited PerformanceOpen Source Server Software Products and Services Provided by Cloud Availability: Communications Failure andOpen Source Database Software Computing Companies Performance IssuesOpen Source Applications Software Operational Security: Newer Security Protocols ProvideOpen Source System Management Software Economic More ProtectionOpen Source Load-Balancing Software Staffing What's Next in Cloud Computing

Page 42: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Hypervisor Should Your Company Invest in Cloud Using Industry and International StandardsVirtualization as the "Operating System" Computing? Independent ComponentsVirtualization with a Host Operating System What Should Not be Moved to the Cloud Message BaseVirtualization Infections on Virtualized Virtualization in Mainframe Architectures Location IndependenceEnvironments and Operating Systems Communication Requirements for CloudType 1 Virtualized Environment LANs and the Cloud ImplementationType 2 Virtualized Environment Internet and the Cloud Public InternetVirtualization Environments Web Services, Browsers, and the Cloud Private InternetMicrosoft Virtualization Thin Client Routing to the DatacenterSun xVM VirtualBox Advances in Networking and Processing Switching within the Data CenterLinux/UNIX Virtualization Speeds that Led to Cloud Computing BandwidthVMware Products Networking Developments Tools Used to Measure NetworkData Center and Cloud Infrastructure Increased Processing Speeds PerformanceProducts Managed Service Provider Model to Using the Protocol Analyzer to MeasureEnd-User and Desktop Products Cloud Computing and Software as a BandwidthIBM Virtualization Service (SaaS) Using Ping and Traceroute to MeasureUsing VMware to see a Virtualized Server Single Purpose Architectures Migrate to Network PerformanceEnvironment Multipurpose Architectures SecurityWhat It Is Data Center Virtualization SSLPermissive Federation Collaboration VPNVerified Federation The Cloud as a Reach Extender OverheadEncrypted Federation The Cloud as a Communication Enabler Storage Options for Cloud ComputingTrusted Federation The Cloud as an Employee Enabler Storage CapacityUsing XMPP in the Federated Environment Service-Oriented Architecture (SOA) Data Protection and PartitioningPresence in the Cloud Evolving from SOA to the Cloud NASWhat It Is Capacity: Limited Performance SANPresence Protocols Availability: Communications Failure and CASLeveraging Presence Performance Issues RedundancyPresence Enabled Security: Newer Security Protocols ReplicationThe Future of Presence Provide More Protection MultisitingThe Interrelation of Identity, Presence, and What's Next in Cloud Computing Backup and RecoveryLocation in the Cloud Using Industry and International Server Software Environments thatIdentity Management Standards Support Cloud ComputingWhat It Is Independent Components Server CapacityFuture of Identity in the Cloud Message Base VirtualizationPrivacy and Its Relation to Cloud-Based Location Independence ClusteringInformation Systems Communication Requirements for Cloud ExpansionPersonal Information Implementation Server FunctionsPrivacy-Related Issues Public Internet ApplicationFinding Your Private Information Private Internet WebWhat It Is Routing to the Datacenter DatabaseOpen Cloud Consortium Working Groups Switching within the Data Center Vendor Approaches to Cloud ComputingProject Matsu Bandwidth Role of Open Source Software in DataProject Comet Tools Used to Measure Network CenterHPC in the Cloud Performance Cost Reduction vs. ReliabilityThe Open Cloud Testbed Using the Protocol Analyzer to Measure Open Source Server SoftwareThe Open Science Data Cloud Bandwidth Open Source Database SoftwareIntercloud Testbed Using Ping and Traceroute to Measure Open Source Applications SoftwareReporting on an Open Cloud Consortium Network Performance Open Source System ManagementWorking Group Security SoftwareDistributed Management Task Force SSL Open Source Load-Balancing Software (DMTF) VPN The HypervisorWhat It Is? Overhead Virtualization as the "Operating System"DMTK Working Groups Associated with Storage Options for Cloud Computing Virtualization with a Host OperatingCloud Computing Storage Capacity SystemStandards for Application Developers Data Protection and Partitioning Virtualization Infections on VirtualizedProtocols NAS EnvironmentsScripting Languages SAN Type 1 Virtualized EnvironmentContent Formatting Standards and CAS Type 2 Virtualized EnvironmentLanguages Redundancy Virtualization EnvironmentsStandards for Security in the Cloud Replication Microsoft VirtualizationConfidentiality, Integrity, Availability Multisiting Sun xVM VirtualBoxAuthentication, Authorization, Accountability Backup and Recovery Linux/UNIX VirtualizationRegulations for Privacy Server Software Environments that VMware ProductsSecurity Protocols Support Cloud Computing Data Center and Cloud InfrastructureEstablishing a Baseline for Cloud Server Capacity Products

Page 43: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Performance Virtualization End-User and Desktop ProductsBest Practices for Selecting a Vendor and Clustering IBM VirtualizationImplementing Cloud-Based Applications Expansion Using VMware to see a Virtualized ServerChoosing the Right Vendor Server Functions Environment Implementing Cloud-Based Applications Application What It IsCitrix Web Permissive FederationWindows Remote Desktop Database Verified FederationVnc Vendor Approaches to Cloud Computing Encrypted FederationWeb Browsers Role of Open Source Software in Data Trusted FederationServer Extensions Center Using XMPP in the Federated EnvironmentThin Clients Cost Reduction vs. Reliability Presence in the CloudSmart Phones, Pads, Pods, etc. Open Source Server Software What It IsVirtual Terminal Security Strengths and Open Source Database Software Presence ProtocolsWeaknesses Open Source Applications Software Leveraging PresenceStrengths Open Source System Management Presence EnabledWeaknesses Software The Future of PresenceiPhone Open Source Load-Balancing Software The Interrelation of Identity, Presence, andAndroid The Hypervisor Location in the CloudBlackBerry Virtualization as the "Operating System" Identity ManagementWindows Mobile Virtualization with a Host Operating What It IsUbuntu Mobile Internet Device System Future of Identity in the CloudMobile Platform Virtualization Virtualization Infections on Virtualized Privacy and Its Relation to Cloud-BasedKernel-Based Virtual Machine Environments Information SystemsVMware Mobile Virtualization Platform Type 1 Virtualized Environment Personal InformationCollaboration Applications for Mobile Type 2 Virtualized Environment Privacy-Related IssuesPlatforms Virtualization Environments Finding Your Private Information Text Messaging Microsoft Virtualization What It IsiPhone Applications Sun xVM VirtualBox Open Cloud Consortium Working GroupsBlackBerry Applications Linux/UNIX Virtualization Project MatsuDroid Applications VMware Products Project Comet

Data Center and Cloud Infrastructure HPC in the CloudProducts The Open Cloud Testbed

line End-User and Desktop Products The Open Science Data CloudCloud Computing Defined IBM Virtualization Intercloud TestbedCloud Computing Architecture Using VMware to see a Virtualized Server Reporting on an Open Cloud ConsortiumCloud Computing Terms Environment Working GroupCommunication-as-a-Service (CaaS) What It Is Distributed Management Task ForceInfrastructure-as-a-Service (IaaS) Permissive Federation (DMTF)Monitoring-as-a-Service (MaaS) Verified Federation What It Is?Software-as-a-Service (SaaS) Encrypted Federation DMTK Working Groups Associated withPlatform-as-a-Service (PaaS) Trusted Federation Cloud ComputingBenefits and Limitations of Cloud Computing Using XMPP in the Federated Standards for Application DevelopersBenefits Environment ProtocolsLimitations Presence in the Cloud Scripting LanguagesCloud Computing Case Studies What It Is Content Formatting Standards andHow Companies Are Using Cloud Presence Protocols LanguagesComputing Leveraging Presence Standards for Security in the CloudImplementing Applications and Services in Presence Enabled Confidentiality, Integrity, Availabilitythe Cloud The Future of Presence Authentication, Authorization,Using Your Company's Services vs. the The Interrelation of Identity, Presence, AccountabilityCloud Provider and Location in the Cloud Regulations for PrivacyA Cloud Service Provider Introduced Identity Management Security ProtocolsCloud Computing Risks and Issues What It Is Establishing a Baseline for CloudProducts and Services Provided by Cloud Future of Identity in the Cloud PerformanceComputing Companies Privacy and Its Relation to Cloud-Based Best Practices for Selecting a Vendor andOperational Information Systems Implementing Cloud-Based ApplicationsEconomic Personal Information Choosing the Right VendorStaffing Privacy-Related Issues Implementing Cloud-Based Applications Should Your Company Invest in Cloud Finding Your Private Information CitrixComputing? What It Is Windows Remote DesktopWhat Should Not be Moved to the Cloud Open Cloud Consortium Working Groups VncVirtualization in Mainframe Architectures Project Matsu Web Browsersand Operating Systems Project Comet Server ExtensionsLANs and the Cloud HPC in the Cloud Thin ClientsInternet and the Cloud The Open Cloud Testbed Smart Phones, Pads, Pods, etc.Web Services, Browsers, and the Cloud The Open Science Data Cloud Virtual Terminal Security Strengths and

Page 44: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Thin Client Intercloud Testbed WeaknessesAdvances in Networking and Processing Reporting on an Open Cloud Consortium StrengthsSpeeds that Led to Cloud Computing Working Group Weaknesses Networking Developments Distributed Management Task Force iPhoneIncreased Processing Speeds (DMTF) AndroidManaged Service Provider Model to Cloud What It Is? BlackBerryComputing and Software as a Service DMTK Working Groups Associated with Windows Mobile(SaaS) Cloud Computing Ubuntu Mobile Internet DeviceSingle Purpose Architectures Migrate to Standards for Application Developers Mobile Platform VirtualizationMultipurpose Architectures Protocols Kernel-Based Virtual MachineData Center Virtualization Scripting Languages VMware Mobile Virtualization PlatformCollaboration Content Formatting Standards and Collaboration Applications for MobileThe Cloud as a Reach Extender Languages PlatformsThe Cloud as a Communication Enabler Standards for Security in the Cloud Text MessagingThe Cloud as an Employee Enabler Confidentiality, Integrity, Availability iPhone ApplicationsService-Oriented Architecture (SOA) Authentication, Authorization, BlackBerry ApplicationsEvolving from SOA to the Cloud Accountability Droid Applications Capacity: Limited Performance Regulations for PrivacyAvailability: Communications Failure and Security ProtocolsPerformance Issues Establishing a Baseline for Cloud lineSecurity: Newer Security Protocols Provide Performance Cloud Computing DefinedMore Protection Best Practices for Selecting a Vendor Cloud Computing ArchitectureWhat's Next in Cloud Computing and Implementing Cloud-Based Cloud Computing TermsUsing Industry and International Standards Applications Communication-as-a-Service (CaaS)Independent Components Choosing the Right Vendor Infrastructure-as-a-Service (IaaS)Message Base Implementing Cloud-Based Applications Monitoring-as-a-Service (MaaS)Location Independence Citrix Software-as-a-Service (SaaS)Communication Requirements for Cloud Windows Remote Desktop Platform-as-a-Service (PaaS)Implementation Vnc Benefits and Limitations of CloudPublic Internet Web Browsers ComputingPrivate Internet Server Extensions BenefitsRouting to the Datacenter Thin Clients LimitationsSwitching within the Data Center Smart Phones, Pads, Pods, etc. Cloud Computing Case StudiesBandwidth Virtual Terminal Security Strengths and How Companies Are Using CloudTools Used to Measure Network Weaknesses ComputingPerformance Strengths Implementing Applications and Services inUsing the Protocol Analyzer to Measure Weaknesses the CloudBandwidth iPhone Using Your Company's Services vs. theUsing Ping and Traceroute to Measure Android Cloud ProviderNetwork Performance BlackBerry A Cloud Service Provider IntroducedSecurity Windows Mobile Cloud Computing Risks and Issues SSL Ubuntu Mobile Internet Device Products and Services Provided by CloudVPN Mobile Platform Virtualization Computing Companies Overhead Kernel-Based Virtual Machine OperationalStorage Options for Cloud Computing VMware Mobile Virtualization Platform EconomicStorage Capacity Collaboration Applications for Mobile StaffingData Protection and Partitioning Platforms Should Your Company Invest in CloudNAS Text Messaging Computing?SAN iPhone Applications What Should Not be Moved to the Cloud CAS BlackBerry Applications Virtualization in Mainframe ArchitecturesRedundancy Droid Applications and Operating SystemsReplication LANs and the CloudMultisiting Internet and the CloudBackup and Recovery line Web Services, Browsers, and the CloudServer Software Environments that Support Cloud Computing Defined Thin ClientCloud Computing Cloud Computing Architecture Advances in Networking and ProcessingServer Capacity Cloud Computing Terms Speeds that Led to Cloud ComputingVirtualization Communication-as-a-Service (CaaS) Networking DevelopmentsClustering Infrastructure-as-a-Service (IaaS) Increased Processing SpeedsExpansion Monitoring-as-a-Service (MaaS) Managed Service Provider Model to CloudServer Functions Software-as-a-Service (SaaS) Computing and Software as a ServiceApplication Platform-as-a-Service (PaaS) (SaaS)Web Benefits and Limitations of Cloud Single Purpose Architectures Migrate toDatabase Computing Multipurpose ArchitecturesVendor Approaches to Cloud Computing Benefits Data Center VirtualizationRole of Open Source Software in Data Limitations Collaboration

Page 45: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Center Cloud Computing Case Studies The Cloud as a Reach ExtenderCost Reduction vs. Reliability How Companies Are Using Cloud The Cloud as a Communication EnablerOpen Source Server Software Computing The Cloud as an Employee EnablerOpen Source Database Software Implementing Applications and Services Service-Oriented Architecture (SOA)Open Source Applications Software in the Cloud Evolving from SOA to the CloudOpen Source System Management Software Using Your Company's Services vs. the Capacity: Limited PerformanceOpen Source Load-Balancing Software Cloud Provider Availability: Communications Failure andThe Hypervisor A Cloud Service Provider Introduced Performance IssuesVirtualization as the "Operating System" Cloud Computing Risks and Issues Security: Newer Security Protocols ProvideVirtualization with a Host Operating System Products and Services Provided by Cloud More ProtectionVirtualization Infections on Virtualized Computing Companies What's Next in Cloud Computing Environments Operational Using Industry and International StandardsType 1 Virtualized Environment Economic Independent ComponentsType 2 Virtualized Environment Staffing Message BaseVirtualization Environments Should Your Company Invest in Cloud Location IndependenceMicrosoft Virtualization Computing? Communication Requirements for CloudSun xVM VirtualBox What Should Not be Moved to the Cloud ImplementationLinux/UNIX Virtualization Virtualization in Mainframe Architectures Public InternetVMware Products and Operating Systems Private InternetData Center and Cloud Infrastructure LANs and the Cloud Routing to the DatacenterProducts Internet and the Cloud Switching within the Data CenterEnd-User and Desktop Products Web Services, Browsers, and the Cloud BandwidthIBM Virtualization Thin Client Tools Used to Measure NetworkUsing VMware to see a Virtualized Server Advances in Networking and Processing PerformanceEnvironment Speeds that Led to Cloud Computing Using the Protocol Analyzer to MeasureWhat It Is Networking Developments BandwidthPermissive Federation Increased Processing Speeds Using Ping and Traceroute to MeasureVerified Federation Managed Service Provider Model to Network PerformanceEncrypted Federation Cloud Computing and Software as a SecurityTrusted Federation Service (SaaS) SSLUsing XMPP in the Federated Environment Single Purpose Architectures Migrate to VPNPresence in the Cloud Multipurpose Architectures OverheadWhat It Is Data Center Virtualization Storage Options for Cloud ComputingPresence Protocols Collaboration Storage CapacityLeveraging Presence The Cloud as a Reach Extender Data Protection and PartitioningPresence Enabled The Cloud as a Communication Enabler NASThe Future of Presence The Cloud as an Employee Enabler SANThe Interrelation of Identity, Presence, and Service-Oriented Architecture (SOA) CASLocation in the Cloud Evolving from SOA to the Cloud RedundancyIdentity Management Capacity: Limited Performance ReplicationWhat It Is Availability: Communications Failure and MultisitingFuture of Identity in the Cloud Performance Issues Backup and RecoveryPrivacy and Its Relation to Cloud-Based Security: Newer Security Protocols Server Software Environments thatInformation Systems Provide More Protection Support Cloud ComputingPersonal Information What's Next in Cloud Computing Server CapacityPrivacy-Related Issues Using Industry and International VirtualizationFinding Your Private Information Standards ClusteringWhat It Is Independent Components ExpansionOpen Cloud Consortium Working Groups Message Base Server FunctionsProject Matsu Location Independence ApplicationProject Comet Communication Requirements for Cloud WebHPC in the Cloud Implementation DatabaseThe Open Cloud Testbed Public Internet Vendor Approaches to Cloud ComputingThe Open Science Data Cloud Private Internet Role of Open Source Software in DataIntercloud Testbed Routing to the Datacenter CenterReporting on an Open Cloud Consortium Switching within the Data Center Cost Reduction vs. ReliabilityWorking Group Bandwidth Open Source Server SoftwareDistributed Management Task Force Tools Used to Measure Network Open Source Database Software(DMTF) Performance Open Source Applications SoftwareWhat It Is? Using the Protocol Analyzer to Measure Open Source System ManagementDMTK Working Groups Associated with Bandwidth SoftwareCloud Computing Using Ping and Traceroute to Measure Open Source Load-Balancing Software Standards for Application Developers Network Performance The HypervisorProtocols Security Virtualization as the "Operating System"Scripting Languages SSL Virtualization with a Host OperatingContent Formatting Standards and VPN System

Page 46: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Languages Overhead Virtualization Infections on VirtualizedStandards for Security in the Cloud Storage Options for Cloud Computing EnvironmentsConfidentiality, Integrity, Availability Storage Capacity Type 1 Virtualized EnvironmentAuthentication, Authorization, Accountability Data Protection and Partitioning Type 2 Virtualized EnvironmentRegulations for Privacy NAS Virtualization EnvironmentsSecurity Protocols SAN Microsoft VirtualizationEstablishing a Baseline for Cloud CAS Sun xVM VirtualBoxPerformance Redundancy Linux/UNIX VirtualizationBest Practices for Selecting a Vendor and Replication VMware ProductsImplementing Cloud-Based Applications Multisiting Data Center and Cloud InfrastructureChoosing the Right Vendor Backup and Recovery ProductsImplementing Cloud-Based Applications Server Software Environments that End-User and Desktop ProductsCitrix Support Cloud Computing IBM VirtualizationWindows Remote Desktop Server Capacity Using VMware to see a Virtualized ServerVnc Virtualization Environment Web Browsers Clustering What It IsServer Extensions Expansion Permissive FederationThin Clients Server Functions Verified FederationSmart Phones, Pads, Pods, etc. Application Encrypted FederationVirtual Terminal Security Strengths and Web Trusted FederationWeaknesses Database Using XMPP in the Federated EnvironmentStrengths Vendor Approaches to Cloud Computing Presence in the CloudWeaknesses Role of Open Source Software in Data What It IsiPhone Center Presence ProtocolsAndroid Cost Reduction vs. Reliability Leveraging PresenceBlackBerry Open Source Server Software Presence EnabledWindows Mobile Open Source Database Software The Future of PresenceUbuntu Mobile Internet Device Open Source Applications Software The Interrelation of Identity, Presence, andMobile Platform Virtualization Open Source System Management Location in the CloudKernel-Based Virtual Machine Software Identity ManagementVMware Mobile Virtualization Platform Open Source Load-Balancing Software What It IsCollaboration Applications for Mobile The Hypervisor Future of Identity in the CloudPlatforms Virtualization as the "Operating System" Privacy and Its Relation to Cloud-BasedText Messaging Virtualization with a Host Operating Information SystemsiPhone Applications System Personal InformationBlackBerry Applications Virtualization Infections on Virtualized Privacy-Related IssuesDroid Applications Environments Finding Your Private Information

Type 1 Virtualized Environment What It IsType 2 Virtualized Environment Open Cloud Consortium Working Groups

line Virtualization Environments Project MatsuCloud Computing Defined Microsoft Virtualization Project CometCloud Computing Architecture Sun xVM VirtualBox HPC in the CloudCloud Computing Terms Linux/UNIX Virtualization The Open Cloud TestbedCommunication-as-a-Service (CaaS) VMware Products The Open Science Data CloudInfrastructure-as-a-Service (IaaS) Data Center and Cloud Infrastructure Intercloud TestbedMonitoring-as-a-Service (MaaS) Products Reporting on an Open Cloud ConsortiumSoftware-as-a-Service (SaaS) End-User and Desktop Products Working GroupPlatform-as-a-Service (PaaS) IBM Virtualization Distributed Management Task ForceBenefits and Limitations of Cloud Computing Using VMware to see a Virtualized Server (DMTF)Benefits Environment What It Is?Limitations What It Is DMTK Working Groups Associated withCloud Computing Case Studies Permissive Federation Cloud ComputingHow Companies Are Using Cloud Verified Federation Standards for Application DevelopersComputing Encrypted Federation ProtocolsImplementing Applications and Services in Trusted Federation Scripting Languagesthe Cloud Using XMPP in the Federated Content Formatting Standards andUsing Your Company's Services vs. the Environment LanguagesCloud Provider Presence in the Cloud Standards for Security in the CloudA Cloud Service Provider Introduced What It Is Confidentiality, Integrity, AvailabilityCloud Computing Risks and Issues Presence Protocols Authentication, Authorization,Products and Services Provided by Cloud Leveraging Presence AccountabilityComputing Companies Presence Enabled Regulations for PrivacyOperational The Future of Presence Security ProtocolsEconomic The Interrelation of Identity, Presence, Establishing a Baseline for CloudStaffing and Location in the Cloud PerformanceShould Your Company Invest in Cloud Identity Management Best Practices for Selecting a Vendor and

Page 47: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Computing? What It Is Implementing Cloud-Based ApplicationsWhat Should Not be Moved to the Cloud Future of Identity in the Cloud Choosing the Right VendorVirtualization in Mainframe Architectures Privacy and Its Relation to Cloud-Based Implementing Cloud-Based Applications and Operating Systems Information Systems CitrixLANs and the Cloud Personal Information Windows Remote DesktopInternet and the Cloud Privacy-Related Issues VncWeb Services, Browsers, and the Cloud Finding Your Private Information Web BrowsersThin Client What It Is Server ExtensionsAdvances in Networking and Processing Open Cloud Consortium Working Groups Thin ClientsSpeeds that Led to Cloud Computing Project Matsu Smart Phones, Pads, Pods, etc.Networking Developments Project Comet Virtual Terminal Security Strengths andIncreased Processing Speeds HPC in the Cloud WeaknessesManaged Service Provider Model to Cloud The Open Cloud Testbed StrengthsComputing and Software as a Service The Open Science Data Cloud Weaknesses (SaaS) Intercloud Testbed iPhoneSingle Purpose Architectures Migrate to Reporting on an Open Cloud Consortium AndroidMultipurpose Architectures Working Group BlackBerryData Center Virtualization Distributed Management Task Force Windows MobileCollaboration (DMTF) Ubuntu Mobile Internet DeviceThe Cloud as a Reach Extender What It Is? Mobile Platform VirtualizationThe Cloud as a Communication Enabler DMTK Working Groups Associated with Kernel-Based Virtual MachineThe Cloud as an Employee Enabler Cloud Computing VMware Mobile Virtualization PlatformService-Oriented Architecture (SOA) Standards for Application Developers Collaboration Applications for MobileEvolving from SOA to the Cloud Protocols PlatformsCapacity: Limited Performance Scripting Languages Text MessagingAvailability: Communications Failure and Content Formatting Standards and iPhone ApplicationsPerformance Issues Languages BlackBerry ApplicationsSecurity: Newer Security Protocols Provide Standards for Security in the Cloud Droid Applications More Protection Confidentiality, Integrity, AvailabilityWhat's Next in Cloud Computing Authentication, Authorization,Using Industry and International Standards Accountability lineIndependent Components Regulations for Privacy Cloud Computing DefinedMessage Base Security Protocols Cloud Computing ArchitectureLocation Independence Establishing a Baseline for Cloud Cloud Computing TermsCommunication Requirements for Cloud Performance Communication-as-a-Service (CaaS)Implementation Best Practices for Selecting a Vendor Infrastructure-as-a-Service (IaaS)Public Internet and Implementing Cloud-Based Monitoring-as-a-Service (MaaS)Private Internet Applications Software-as-a-Service (SaaS)Routing to the Datacenter Choosing the Right Vendor Platform-as-a-Service (PaaS)Switching within the Data Center Implementing Cloud-Based Applications Benefits and Limitations of CloudBandwidth Citrix ComputingTools Used to Measure Network Windows Remote Desktop BenefitsPerformance Vnc LimitationsUsing the Protocol Analyzer to Measure Web Browsers Cloud Computing Case StudiesBandwidth Server Extensions How Companies Are Using CloudUsing Ping and Traceroute to Measure Thin Clients ComputingNetwork Performance Smart Phones, Pads, Pods, etc. Implementing Applications and Services inSecurity Virtual Terminal Security Strengths and the CloudSSL Weaknesses Using Your Company's Services vs. theVPN Strengths Cloud ProviderOverhead Weaknesses A Cloud Service Provider IntroducedStorage Options for Cloud Computing iPhone Cloud Computing Risks and Issues Storage Capacity Android Products and Services Provided by CloudData Protection and Partitioning BlackBerry Computing Companies NAS Windows Mobile OperationalSAN Ubuntu Mobile Internet Device EconomicCAS Mobile Platform Virtualization StaffingRedundancy Kernel-Based Virtual Machine Should Your Company Invest in CloudReplication VMware Mobile Virtualization Platform Computing?Multisiting Collaboration Applications for Mobile What Should Not be Moved to the Cloud Backup and Recovery Platforms Virtualization in Mainframe ArchitecturesServer Software Environments that Support Text Messaging and Operating SystemsCloud Computing iPhone Applications LANs and the CloudServer Capacity BlackBerry Applications Internet and the CloudVirtualization Droid Applications Web Services, Browsers, and the CloudClustering Thin Client

Page 48: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Expansion Advances in Networking and ProcessingServer Functions line Speeds that Led to Cloud ComputingApplication Cloud Computing Defined Networking DevelopmentsWeb Cloud Computing Architecture Increased Processing SpeedsDatabase Cloud Computing Terms Managed Service Provider Model to CloudVendor Approaches to Cloud Computing Communication-as-a-Service (CaaS) Computing and Software as a ServiceRole of Open Source Software in Data Infrastructure-as-a-Service (IaaS) (SaaS)Center Monitoring-as-a-Service (MaaS) Single Purpose Architectures Migrate toCost Reduction vs. Reliability Software-as-a-Service (SaaS) Multipurpose ArchitecturesOpen Source Server Software Platform-as-a-Service (PaaS) Data Center VirtualizationOpen Source Database Software Benefits and Limitations of Cloud CollaborationOpen Source Applications Software Computing The Cloud as a Reach ExtenderOpen Source System Management Software Benefits The Cloud as a Communication EnablerOpen Source Load-Balancing Software Limitations The Cloud as an Employee EnablerThe Hypervisor Cloud Computing Case Studies Service-Oriented Architecture (SOA)Virtualization as the "Operating System" How Companies Are Using Cloud Evolving from SOA to the CloudVirtualization with a Host Operating System Computing Capacity: Limited PerformanceVirtualization Infections on Virtualized Implementing Applications and Services Availability: Communications Failure andEnvironments in the Cloud Performance IssuesType 1 Virtualized Environment Using Your Company's Services vs. the Security: Newer Security Protocols ProvideType 2 Virtualized Environment Cloud Provider More ProtectionVirtualization Environments A Cloud Service Provider Introduced What's Next in Cloud Computing Microsoft Virtualization Cloud Computing Risks and Issues Using Industry and International StandardsSun xVM VirtualBox Products and Services Provided by Cloud Independent ComponentsLinux/UNIX Virtualization Computing Companies Message BaseVMware Products Operational Location IndependenceData Center and Cloud Infrastructure Economic Communication Requirements for CloudProducts Staffing ImplementationEnd-User and Desktop Products Should Your Company Invest in Cloud Public InternetIBM Virtualization Computing? Private InternetUsing VMware to see a Virtualized Server What Should Not be Moved to the Cloud Routing to the DatacenterEnvironment Virtualization in Mainframe Architectures Switching within the Data CenterWhat It Is and Operating Systems BandwidthPermissive Federation LANs and the Cloud Tools Used to Measure NetworkVerified Federation Internet and the Cloud PerformanceEncrypted Federation Web Services, Browsers, and the Cloud Using the Protocol Analyzer to MeasureTrusted Federation Thin Client BandwidthUsing XMPP in the Federated Environment Advances in Networking and Processing Using Ping and Traceroute to MeasurePresence in the Cloud Speeds that Led to Cloud Computing Network PerformanceWhat It Is Networking Developments SecurityPresence Protocols Increased Processing Speeds SSLLeveraging Presence Managed Service Provider Model to VPNPresence Enabled Cloud Computing and Software as a OverheadThe Future of Presence Service (SaaS) Storage Options for Cloud ComputingThe Interrelation of Identity, Presence, and Single Purpose Architectures Migrate to Storage CapacityLocation in the Cloud Multipurpose Architectures Data Protection and PartitioningIdentity Management Data Center Virtualization NASWhat It Is Collaboration SANFuture of Identity in the Cloud The Cloud as a Reach Extender CASPrivacy and Its Relation to Cloud-Based The Cloud as a Communication Enabler RedundancyInformation Systems The Cloud as an Employee Enabler ReplicationPersonal Information Service-Oriented Architecture (SOA) MultisitingPrivacy-Related Issues Evolving from SOA to the Cloud Backup and RecoveryFinding Your Private Information Capacity: Limited Performance Server Software Environments thatWhat It Is Availability: Communications Failure and Support Cloud ComputingOpen Cloud Consortium Working Groups Performance Issues Server CapacityProject Matsu Security: Newer Security Protocols VirtualizationProject Comet Provide More Protection ClusteringHPC in the Cloud What's Next in Cloud Computing ExpansionThe Open Cloud Testbed Using Industry and International Server FunctionsThe Open Science Data Cloud Standards ApplicationIntercloud Testbed Independent Components WebReporting on an Open Cloud Consortium Message Base DatabaseWorking Group Location Independence Vendor Approaches to Cloud ComputingDistributed Management Task Force Communication Requirements for Cloud Role of Open Source Software in Data(DMTF) Implementation Center

Page 49: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What It Is? Public Internet Cost Reduction vs. ReliabilityDMTK Working Groups Associated with Private Internet Open Source Server SoftwareCloud Computing Routing to the Datacenter Open Source Database SoftwareStandards for Application Developers Switching within the Data Center Open Source Applications SoftwareProtocols Bandwidth Open Source System ManagementScripting Languages Tools Used to Measure Network SoftwareContent Formatting Standards and Performance Open Source Load-Balancing Software Languages Using the Protocol Analyzer to Measure The HypervisorStandards for Security in the Cloud Bandwidth Virtualization as the "Operating System"Confidentiality, Integrity, Availability Using Ping and Traceroute to Measure Virtualization with a Host OperatingAuthentication, Authorization, Accountability Network Performance SystemRegulations for Privacy Security Virtualization Infections on VirtualizedSecurity Protocols SSL EnvironmentsEstablishing a Baseline for Cloud VPN Type 1 Virtualized EnvironmentPerformance Overhead Type 2 Virtualized EnvironmentBest Practices for Selecting a Vendor and Storage Options for Cloud Computing Virtualization EnvironmentsImplementing Cloud-Based Applications Storage Capacity Microsoft VirtualizationChoosing the Right Vendor Data Protection and Partitioning Sun xVM VirtualBoxImplementing Cloud-Based Applications NAS Linux/UNIX VirtualizationCitrix SAN VMware ProductsWindows Remote Desktop CAS Data Center and Cloud InfrastructureVnc Redundancy ProductsWeb Browsers Replication End-User and Desktop ProductsServer Extensions Multisiting IBM VirtualizationThin Clients Backup and Recovery Using VMware to see a Virtualized ServerSmart Phones, Pads, Pods, etc. Server Software Environments that Environment Virtual Terminal Security Strengths and Support Cloud Computing What It IsWeaknesses Server Capacity Permissive FederationStrengths Virtualization Verified FederationWeaknesses Clustering Encrypted FederationiPhone Expansion Trusted FederationAndroid Server Functions Using XMPP in the Federated EnvironmentBlackBerry Application Presence in the CloudWindows Mobile Web What It IsUbuntu Mobile Internet Device Database Presence ProtocolsMobile Platform Virtualization Vendor Approaches to Cloud Computing Leveraging PresenceKernel-Based Virtual Machine Role of Open Source Software in Data Presence EnabledVMware Mobile Virtualization Platform Center The Future of PresenceCollaboration Applications for Mobile Cost Reduction vs. Reliability The Interrelation of Identity, Presence, andPlatforms Open Source Server Software Location in the CloudText Messaging Open Source Database Software Identity ManagementiPhone Applications Open Source Applications Software What It IsBlackBerry Applications Open Source System Management Future of Identity in the CloudDroid Applications Software Privacy and Its Relation to Cloud-Based

Open Source Load-Balancing Software Information SystemsThe Hypervisor Personal Information

line Virtualization as the "Operating System" Privacy-Related IssuesCloud Computing Defined Virtualization with a Host Operating Finding Your Private Information Cloud Computing Architecture System What It IsCloud Computing Terms Virtualization Infections on Virtualized Open Cloud Consortium Working GroupsCommunication-as-a-Service (CaaS) Environments Project MatsuInfrastructure-as-a-Service (IaaS) Type 1 Virtualized Environment Project CometMonitoring-as-a-Service (MaaS) Type 2 Virtualized Environment HPC in the CloudSoftware-as-a-Service (SaaS) Virtualization Environments The Open Cloud TestbedPlatform-as-a-Service (PaaS) Microsoft Virtualization The Open Science Data CloudBenefits and Limitations of Cloud Computing Sun xVM VirtualBox Intercloud TestbedBenefits Linux/UNIX Virtualization Reporting on an Open Cloud ConsortiumLimitations VMware Products Working GroupCloud Computing Case Studies Data Center and Cloud Infrastructure Distributed Management Task ForceHow Companies Are Using Cloud Products (DMTF)Computing End-User and Desktop Products What It Is?Implementing Applications and Services in IBM Virtualization DMTK Working Groups Associated withthe Cloud Using VMware to see a Virtualized Server Cloud ComputingUsing Your Company's Services vs. the Environment Standards for Application DevelopersCloud Provider What It Is ProtocolsA Cloud Service Provider Introduced Permissive Federation Scripting Languages

Page 50: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Risks and Issues Verified Federation Content Formatting Standards andProducts and Services Provided by Cloud Encrypted Federation LanguagesComputing Companies Trusted Federation Standards for Security in the CloudOperational Using XMPP in the Federated Confidentiality, Integrity, AvailabilityEconomic Environment Authentication, Authorization,Staffing Presence in the Cloud AccountabilityShould Your Company Invest in Cloud What It Is Regulations for PrivacyComputing? Presence Protocols Security ProtocolsWhat Should Not be Moved to the Cloud Leveraging Presence Establishing a Baseline for CloudVirtualization in Mainframe Architectures Presence Enabled Performanceand Operating Systems The Future of Presence Best Practices for Selecting a Vendor andLANs and the Cloud The Interrelation of Identity, Presence, Implementing Cloud-Based ApplicationsInternet and the Cloud and Location in the Cloud Choosing the Right VendorWeb Services, Browsers, and the Cloud Identity Management Implementing Cloud-Based Applications Thin Client What It Is CitrixAdvances in Networking and Processing Future of Identity in the Cloud Windows Remote DesktopSpeeds that Led to Cloud Computing Privacy and Its Relation to Cloud-Based VncNetworking Developments Information Systems Web BrowsersIncreased Processing Speeds Personal Information Server ExtensionsManaged Service Provider Model to Cloud Privacy-Related Issues Thin ClientsComputing and Software as a Service Finding Your Private Information Smart Phones, Pads, Pods, etc.(SaaS) What It Is Virtual Terminal Security Strengths andSingle Purpose Architectures Migrate to Open Cloud Consortium Working Groups WeaknessesMultipurpose Architectures Project Matsu StrengthsData Center Virtualization Project Comet Weaknesses Collaboration HPC in the Cloud iPhoneThe Cloud as a Reach Extender The Open Cloud Testbed AndroidThe Cloud as a Communication Enabler The Open Science Data Cloud BlackBerryThe Cloud as an Employee Enabler Intercloud Testbed Windows MobileService-Oriented Architecture (SOA) Reporting on an Open Cloud Consortium Ubuntu Mobile Internet DeviceEvolving from SOA to the Cloud Working Group Mobile Platform VirtualizationCapacity: Limited Performance Distributed Management Task Force Kernel-Based Virtual MachineAvailability: Communications Failure and (DMTF) VMware Mobile Virtualization PlatformPerformance Issues What It Is? Collaboration Applications for MobileSecurity: Newer Security Protocols Provide DMTK Working Groups Associated with PlatformsMore Protection Cloud Computing Text MessagingWhat's Next in Cloud Computing Standards for Application Developers iPhone ApplicationsUsing Industry and International Standards Protocols BlackBerry ApplicationsIndependent Components Scripting Languages Droid Applications Message Base Content Formatting Standards andLocation Independence LanguagesCommunication Requirements for Cloud Standards for Security in the Cloud lineImplementation Confidentiality, Integrity, Availability Cloud Computing DefinedPublic Internet Authentication, Authorization, Cloud Computing ArchitecturePrivate Internet Accountability Cloud Computing TermsRouting to the Datacenter Regulations for Privacy Communication-as-a-Service (CaaS)Switching within the Data Center Security Protocols Infrastructure-as-a-Service (IaaS)Bandwidth Establishing a Baseline for Cloud Monitoring-as-a-Service (MaaS)Tools Used to Measure Network Performance Software-as-a-Service (SaaS)Performance Best Practices for Selecting a Vendor Platform-as-a-Service (PaaS)Using the Protocol Analyzer to Measure and Implementing Cloud-Based Benefits and Limitations of CloudBandwidth Applications ComputingUsing Ping and Traceroute to Measure Choosing the Right Vendor BenefitsNetwork Performance Implementing Cloud-Based Applications LimitationsSecurity Citrix Cloud Computing Case StudiesSSL Windows Remote Desktop How Companies Are Using CloudVPN Vnc ComputingOverhead Web Browsers Implementing Applications and Services inStorage Options for Cloud Computing Server Extensions the CloudStorage Capacity Thin Clients Using Your Company's Services vs. theData Protection and Partitioning Smart Phones, Pads, Pods, etc. Cloud ProviderNAS Virtual Terminal Security Strengths and A Cloud Service Provider IntroducedSAN Weaknesses Cloud Computing Risks and Issues CAS Strengths Products and Services Provided by CloudRedundancy Weaknesses Computing Companies Replication iPhone Operational

Page 51: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Multisiting Android EconomicBackup and Recovery BlackBerry StaffingServer Software Environments that Support Windows Mobile Should Your Company Invest in CloudCloud Computing Ubuntu Mobile Internet Device Computing?Server Capacity Mobile Platform Virtualization What Should Not be Moved to the Cloud Virtualization Kernel-Based Virtual Machine Virtualization in Mainframe ArchitecturesClustering VMware Mobile Virtualization Platform and Operating SystemsExpansion Collaboration Applications for Mobile LANs and the CloudServer Functions Platforms Internet and the CloudApplication Text Messaging Web Services, Browsers, and the CloudWeb iPhone Applications Thin ClientDatabase BlackBerry Applications Advances in Networking and ProcessingVendor Approaches to Cloud Computing Droid Applications Speeds that Led to Cloud ComputingRole of Open Source Software in Data Networking DevelopmentsCenter Increased Processing SpeedsCost Reduction vs. Reliability line Managed Service Provider Model to CloudOpen Source Server Software Cloud Computing Defined Computing and Software as a ServiceOpen Source Database Software Cloud Computing Architecture (SaaS)Open Source Applications Software Cloud Computing Terms Single Purpose Architectures Migrate toOpen Source System Management Software Communication-as-a-Service (CaaS) Multipurpose ArchitecturesOpen Source Load-Balancing Software Infrastructure-as-a-Service (IaaS) Data Center VirtualizationThe Hypervisor Monitoring-as-a-Service (MaaS) CollaborationVirtualization as the "Operating System" Software-as-a-Service (SaaS) The Cloud as a Reach ExtenderVirtualization with a Host Operating System Platform-as-a-Service (PaaS) The Cloud as a Communication EnablerVirtualization Infections on Virtualized Benefits and Limitations of Cloud The Cloud as an Employee EnablerEnvironments Computing Service-Oriented Architecture (SOA)Type 1 Virtualized Environment Benefits Evolving from SOA to the CloudType 2 Virtualized Environment Limitations Capacity: Limited PerformanceVirtualization Environments Cloud Computing Case Studies Availability: Communications Failure andMicrosoft Virtualization How Companies Are Using Cloud Performance IssuesSun xVM VirtualBox Computing Security: Newer Security Protocols ProvideLinux/UNIX Virtualization Implementing Applications and Services More ProtectionVMware Products in the Cloud What's Next in Cloud Computing Data Center and Cloud Infrastructure Using Your Company's Services vs. the Using Industry and International StandardsProducts Cloud Provider Independent ComponentsEnd-User and Desktop Products A Cloud Service Provider Introduced Message BaseIBM Virtualization Cloud Computing Risks and Issues Location IndependenceUsing VMware to see a Virtualized Server Products and Services Provided by Cloud Communication Requirements for CloudEnvironment Computing Companies ImplementationWhat It Is Operational Public InternetPermissive Federation Economic Private InternetVerified Federation Staffing Routing to the DatacenterEncrypted Federation Should Your Company Invest in Cloud Switching within the Data CenterTrusted Federation Computing? BandwidthUsing XMPP in the Federated Environment What Should Not be Moved to the Cloud Tools Used to Measure NetworkPresence in the Cloud Virtualization in Mainframe Architectures PerformanceWhat It Is and Operating Systems Using the Protocol Analyzer to MeasurePresence Protocols LANs and the Cloud BandwidthLeveraging Presence Internet and the Cloud Using Ping and Traceroute to MeasurePresence Enabled Web Services, Browsers, and the Cloud Network PerformanceThe Future of Presence Thin Client SecurityThe Interrelation of Identity, Presence, and Advances in Networking and Processing SSLLocation in the Cloud Speeds that Led to Cloud Computing VPNIdentity Management Networking Developments OverheadWhat It Is Increased Processing Speeds Storage Options for Cloud ComputingFuture of Identity in the Cloud Managed Service Provider Model to Storage CapacityPrivacy and Its Relation to Cloud-Based Cloud Computing and Software as a Data Protection and PartitioningInformation Systems Service (SaaS) NASPersonal Information Single Purpose Architectures Migrate to SANPrivacy-Related Issues Multipurpose Architectures CASFinding Your Private Information Data Center Virtualization RedundancyWhat It Is Collaboration ReplicationOpen Cloud Consortium Working Groups The Cloud as a Reach Extender MultisitingProject Matsu The Cloud as a Communication Enabler Backup and RecoveryProject Comet The Cloud as an Employee Enabler Server Software Environments thatHPC in the Cloud Service-Oriented Architecture (SOA) Support Cloud Computing

Page 52: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Open Cloud Testbed Evolving from SOA to the Cloud Server CapacityThe Open Science Data Cloud Capacity: Limited Performance VirtualizationIntercloud Testbed Availability: Communications Failure and ClusteringReporting on an Open Cloud Consortium Performance Issues ExpansionWorking Group Security: Newer Security Protocols Server FunctionsDistributed Management Task Force Provide More Protection Application(DMTF) What's Next in Cloud Computing WebWhat It Is? Using Industry and International DatabaseDMTK Working Groups Associated with Standards Vendor Approaches to Cloud ComputingCloud Computing Independent Components Role of Open Source Software in DataStandards for Application Developers Message Base CenterProtocols Location Independence Cost Reduction vs. ReliabilityScripting Languages Communication Requirements for Cloud Open Source Server SoftwareContent Formatting Standards and Implementation Open Source Database SoftwareLanguages Public Internet Open Source Applications SoftwareStandards for Security in the Cloud Private Internet Open Source System ManagementConfidentiality, Integrity, Availability Routing to the Datacenter SoftwareAuthentication, Authorization, Accountability Switching within the Data Center Open Source Load-Balancing Software Regulations for Privacy Bandwidth The HypervisorSecurity Protocols Tools Used to Measure Network Virtualization as the "Operating System"Establishing a Baseline for Cloud Performance Virtualization with a Host OperatingPerformance Using the Protocol Analyzer to Measure SystemBest Practices for Selecting a Vendor and Bandwidth Virtualization Infections on VirtualizedImplementing Cloud-Based Applications Using Ping and Traceroute to Measure EnvironmentsChoosing the Right Vendor Network Performance Type 1 Virtualized EnvironmentImplementing Cloud-Based Applications Security Type 2 Virtualized EnvironmentCitrix SSL Virtualization EnvironmentsWindows Remote Desktop VPN Microsoft VirtualizationVnc Overhead Sun xVM VirtualBoxWeb Browsers Storage Options for Cloud Computing Linux/UNIX VirtualizationServer Extensions Storage Capacity VMware ProductsThin Clients Data Protection and Partitioning Data Center and Cloud InfrastructureSmart Phones, Pads, Pods, etc. NAS ProductsVirtual Terminal Security Strengths and SAN End-User and Desktop ProductsWeaknesses CAS IBM VirtualizationStrengths Redundancy Using VMware to see a Virtualized ServerWeaknesses Replication Environment iPhone Multisiting What It IsAndroid Backup and Recovery Permissive FederationBlackBerry Server Software Environments that Verified FederationWindows Mobile Support Cloud Computing Encrypted FederationUbuntu Mobile Internet Device Server Capacity Trusted FederationMobile Platform Virtualization Virtualization Using XMPP in the Federated EnvironmentKernel-Based Virtual Machine Clustering Presence in the CloudVMware Mobile Virtualization Platform Expansion What It IsCollaboration Applications for Mobile Server Functions Presence ProtocolsPlatforms Application Leveraging PresenceText Messaging Web Presence EnablediPhone Applications Database The Future of PresenceBlackBerry Applications Vendor Approaches to Cloud Computing The Interrelation of Identity, Presence, andDroid Applications Role of Open Source Software in Data Location in the Cloud

Center Identity ManagementCost Reduction vs. Reliability What It Is

line Open Source Server Software Future of Identity in the CloudCloud Computing Defined Open Source Database Software Privacy and Its Relation to Cloud-BasedCloud Computing Architecture Open Source Applications Software Information SystemsCloud Computing Terms Open Source System Management Personal InformationCommunication-as-a-Service (CaaS) Software Privacy-Related IssuesInfrastructure-as-a-Service (IaaS) Open Source Load-Balancing Software Finding Your Private Information Monitoring-as-a-Service (MaaS) The Hypervisor What It IsSoftware-as-a-Service (SaaS) Virtualization as the "Operating System" Open Cloud Consortium Working GroupsPlatform-as-a-Service (PaaS) Virtualization with a Host Operating Project MatsuBenefits and Limitations of Cloud Computing System Project CometBenefits Virtualization Infections on Virtualized HPC in the CloudLimitations Environments The Open Cloud TestbedCloud Computing Case Studies Type 1 Virtualized Environment The Open Science Data Cloud

Page 53: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

How Companies Are Using Cloud Type 2 Virtualized Environment Intercloud TestbedComputing Virtualization Environments Reporting on an Open Cloud ConsortiumImplementing Applications and Services in Microsoft Virtualization Working Groupthe Cloud Sun xVM VirtualBox Distributed Management Task ForceUsing Your Company's Services vs. the Linux/UNIX Virtualization (DMTF)Cloud Provider VMware Products What It Is?A Cloud Service Provider Introduced Data Center and Cloud Infrastructure DMTK Working Groups Associated withCloud Computing Risks and Issues Products Cloud ComputingProducts and Services Provided by Cloud End-User and Desktop Products Standards for Application DevelopersComputing Companies IBM Virtualization ProtocolsOperational Using VMware to see a Virtualized Server Scripting LanguagesEconomic Environment Content Formatting Standards andStaffing What It Is LanguagesShould Your Company Invest in Cloud Permissive Federation Standards for Security in the CloudComputing? Verified Federation Confidentiality, Integrity, AvailabilityWhat Should Not be Moved to the Cloud Encrypted Federation Authentication, Authorization,Virtualization in Mainframe Architectures Trusted Federation Accountabilityand Operating Systems Using XMPP in the Federated Regulations for PrivacyLANs and the Cloud Environment Security ProtocolsInternet and the Cloud Presence in the Cloud Establishing a Baseline for CloudWeb Services, Browsers, and the Cloud What It Is PerformanceThin Client Presence Protocols Best Practices for Selecting a Vendor andAdvances in Networking and Processing Leveraging Presence Implementing Cloud-Based ApplicationsSpeeds that Led to Cloud Computing Presence Enabled Choosing the Right VendorNetworking Developments The Future of Presence Implementing Cloud-Based Applications Increased Processing Speeds The Interrelation of Identity, Presence, CitrixManaged Service Provider Model to Cloud and Location in the Cloud Windows Remote DesktopComputing and Software as a Service Identity Management Vnc(SaaS) What It Is Web BrowsersSingle Purpose Architectures Migrate to Future of Identity in the Cloud Server ExtensionsMultipurpose Architectures Privacy and Its Relation to Cloud-Based Thin ClientsData Center Virtualization Information Systems Smart Phones, Pads, Pods, etc.Collaboration Personal Information Virtual Terminal Security Strengths andThe Cloud as a Reach Extender Privacy-Related Issues WeaknessesThe Cloud as a Communication Enabler Finding Your Private Information StrengthsThe Cloud as an Employee Enabler What It Is Weaknesses Service-Oriented Architecture (SOA) Open Cloud Consortium Working Groups iPhoneEvolving from SOA to the Cloud Project Matsu AndroidCapacity: Limited Performance Project Comet BlackBerryAvailability: Communications Failure and HPC in the Cloud Windows MobilePerformance Issues The Open Cloud Testbed Ubuntu Mobile Internet DeviceSecurity: Newer Security Protocols Provide The Open Science Data Cloud Mobile Platform VirtualizationMore Protection Intercloud Testbed Kernel-Based Virtual MachineWhat's Next in Cloud Computing Reporting on an Open Cloud Consortium VMware Mobile Virtualization PlatformUsing Industry and International Standards Working Group Collaboration Applications for MobileIndependent Components Distributed Management Task Force PlatformsMessage Base (DMTF) Text MessagingLocation Independence What It Is? iPhone ApplicationsCommunication Requirements for Cloud DMTK Working Groups Associated with BlackBerry ApplicationsImplementation Cloud Computing Droid Applications Public Internet Standards for Application DevelopersPrivate Internet ProtocolsRouting to the Datacenter Scripting Languages lineSwitching within the Data Center Content Formatting Standards and Cloud Computing DefinedBandwidth Languages Cloud Computing ArchitectureTools Used to Measure Network Standards for Security in the Cloud Cloud Computing TermsPerformance Confidentiality, Integrity, Availability Communication-as-a-Service (CaaS)Using the Protocol Analyzer to Measure Authentication, Authorization, Infrastructure-as-a-Service (IaaS)Bandwidth Accountability Monitoring-as-a-Service (MaaS)Using Ping and Traceroute to Measure Regulations for Privacy Software-as-a-Service (SaaS)Network Performance Security Protocols Platform-as-a-Service (PaaS)Security Establishing a Baseline for Cloud Benefits and Limitations of CloudSSL Performance ComputingVPN Best Practices for Selecting a Vendor BenefitsOverhead and Implementing Cloud-Based LimitationsStorage Options for Cloud Computing Applications Cloud Computing Case Studies

Page 54: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Storage Capacity Choosing the Right Vendor How Companies Are Using CloudData Protection and Partitioning Implementing Cloud-Based Applications ComputingNAS Citrix Implementing Applications and Services inSAN Windows Remote Desktop the CloudCAS Vnc Using Your Company's Services vs. theRedundancy Web Browsers Cloud ProviderReplication Server Extensions A Cloud Service Provider IntroducedMultisiting Thin Clients Cloud Computing Risks and Issues Backup and Recovery Smart Phones, Pads, Pods, etc. Products and Services Provided by CloudServer Software Environments that Support Virtual Terminal Security Strengths and Computing Companies Cloud Computing Weaknesses OperationalServer Capacity Strengths EconomicVirtualization Weaknesses StaffingClustering iPhone Should Your Company Invest in CloudExpansion Android Computing?Server Functions BlackBerry What Should Not be Moved to the Cloud Application Windows Mobile Virtualization in Mainframe ArchitecturesWeb Ubuntu Mobile Internet Device and Operating SystemsDatabase Mobile Platform Virtualization LANs and the CloudVendor Approaches to Cloud Computing Kernel-Based Virtual Machine Internet and the CloudRole of Open Source Software in Data VMware Mobile Virtualization Platform Web Services, Browsers, and the CloudCenter Collaboration Applications for Mobile Thin ClientCost Reduction vs. Reliability Platforms Advances in Networking and ProcessingOpen Source Server Software Text Messaging Speeds that Led to Cloud ComputingOpen Source Database Software iPhone Applications Networking DevelopmentsOpen Source Applications Software BlackBerry Applications Increased Processing SpeedsOpen Source System Management Software Droid Applications Managed Service Provider Model to CloudOpen Source Load-Balancing Software Computing and Software as a ServiceThe Hypervisor (SaaS)Virtualization as the "Operating System" line Single Purpose Architectures Migrate toVirtualization with a Host Operating System Cloud Computing Defined Multipurpose ArchitecturesVirtualization Infections on Virtualized Cloud Computing Architecture Data Center VirtualizationEnvironments Cloud Computing Terms CollaborationType 1 Virtualized Environment Communication-as-a-Service (CaaS) The Cloud as a Reach ExtenderType 2 Virtualized Environment Infrastructure-as-a-Service (IaaS) The Cloud as a Communication EnablerVirtualization Environments Monitoring-as-a-Service (MaaS) The Cloud as an Employee EnablerMicrosoft Virtualization Software-as-a-Service (SaaS) Service-Oriented Architecture (SOA)Sun xVM VirtualBox Platform-as-a-Service (PaaS) Evolving from SOA to the CloudLinux/UNIX Virtualization Benefits and Limitations of Cloud Capacity: Limited PerformanceVMware Products Computing Availability: Communications Failure andData Center and Cloud Infrastructure Benefits Performance IssuesProducts Limitations Security: Newer Security Protocols ProvideEnd-User and Desktop Products Cloud Computing Case Studies More ProtectionIBM Virtualization How Companies Are Using Cloud What's Next in Cloud Computing Using VMware to see a Virtualized Server Computing Using Industry and International StandardsEnvironment Implementing Applications and Services Independent ComponentsWhat It Is in the Cloud Message BasePermissive Federation Using Your Company's Services vs. the Location IndependenceVerified Federation Cloud Provider Communication Requirements for CloudEncrypted Federation A Cloud Service Provider Introduced ImplementationTrusted Federation Cloud Computing Risks and Issues Public InternetUsing XMPP in the Federated Environment Products and Services Provided by Cloud Private InternetPresence in the Cloud Computing Companies Routing to the DatacenterWhat It Is Operational Switching within the Data CenterPresence Protocols Economic BandwidthLeveraging Presence Staffing Tools Used to Measure NetworkPresence Enabled Should Your Company Invest in Cloud PerformanceThe Future of Presence Computing? Using the Protocol Analyzer to MeasureThe Interrelation of Identity, Presence, and What Should Not be Moved to the Cloud BandwidthLocation in the Cloud Virtualization in Mainframe Architectures Using Ping and Traceroute to MeasureIdentity Management and Operating Systems Network PerformanceWhat It Is LANs and the Cloud SecurityFuture of Identity in the Cloud Internet and the Cloud SSLPrivacy and Its Relation to Cloud-Based Web Services, Browsers, and the Cloud VPNInformation Systems Thin Client OverheadPersonal Information Advances in Networking and Processing Storage Options for Cloud Computing

Page 55: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Privacy-Related Issues Speeds that Led to Cloud Computing Storage CapacityFinding Your Private Information Networking Developments Data Protection and PartitioningWhat It Is Increased Processing Speeds NASOpen Cloud Consortium Working Groups Managed Service Provider Model to SANProject Matsu Cloud Computing and Software as a CASProject Comet Service (SaaS) RedundancyHPC in the Cloud Single Purpose Architectures Migrate to ReplicationThe Open Cloud Testbed Multipurpose Architectures MultisitingThe Open Science Data Cloud Data Center Virtualization Backup and RecoveryIntercloud Testbed Collaboration Server Software Environments thatReporting on an Open Cloud Consortium The Cloud as a Reach Extender Support Cloud ComputingWorking Group The Cloud as a Communication Enabler Server CapacityDistributed Management Task Force The Cloud as an Employee Enabler Virtualization(DMTF) Service-Oriented Architecture (SOA) ClusteringWhat It Is? Evolving from SOA to the Cloud ExpansionDMTK Working Groups Associated with Capacity: Limited Performance Server FunctionsCloud Computing Availability: Communications Failure and ApplicationStandards for Application Developers Performance Issues WebProtocols Security: Newer Security Protocols DatabaseScripting Languages Provide More Protection Vendor Approaches to Cloud ComputingContent Formatting Standards and What's Next in Cloud Computing Role of Open Source Software in DataLanguages Using Industry and International CenterStandards for Security in the Cloud Standards Cost Reduction vs. ReliabilityConfidentiality, Integrity, Availability Independent Components Open Source Server SoftwareAuthentication, Authorization, Accountability Message Base Open Source Database SoftwareRegulations for Privacy Location Independence Open Source Applications SoftwareSecurity Protocols Communication Requirements for Cloud Open Source System ManagementEstablishing a Baseline for Cloud Implementation SoftwarePerformance Public Internet Open Source Load-Balancing Software Best Practices for Selecting a Vendor and Private Internet The HypervisorImplementing Cloud-Based Applications Routing to the Datacenter Virtualization as the "Operating System"Choosing the Right Vendor Switching within the Data Center Virtualization with a Host OperatingImplementing Cloud-Based Applications Bandwidth SystemCitrix Tools Used to Measure Network Virtualization Infections on VirtualizedWindows Remote Desktop Performance EnvironmentsVnc Using the Protocol Analyzer to Measure Type 1 Virtualized EnvironmentWeb Browsers Bandwidth Type 2 Virtualized EnvironmentServer Extensions Using Ping and Traceroute to Measure Virtualization EnvironmentsThin Clients Network Performance Microsoft VirtualizationSmart Phones, Pads, Pods, etc. Security Sun xVM VirtualBoxVirtual Terminal Security Strengths and SSL Linux/UNIX VirtualizationWeaknesses VPN VMware ProductsStrengths Overhead Data Center and Cloud InfrastructureWeaknesses Storage Options for Cloud Computing ProductsiPhone Storage Capacity End-User and Desktop ProductsAndroid Data Protection and Partitioning IBM VirtualizationBlackBerry NAS Using VMware to see a Virtualized ServerWindows Mobile SAN Environment Ubuntu Mobile Internet Device CAS What It IsMobile Platform Virtualization Redundancy Permissive FederationKernel-Based Virtual Machine Replication Verified FederationVMware Mobile Virtualization Platform Multisiting Encrypted FederationCollaboration Applications for Mobile Backup and Recovery Trusted FederationPlatforms Server Software Environments that Using XMPP in the Federated EnvironmentText Messaging Support Cloud Computing Presence in the CloudiPhone Applications Server Capacity What It IsBlackBerry Applications Virtualization Presence ProtocolsDroid Applications Clustering Leveraging Presence

Expansion Presence Enabled2. Who's Who in Today's Cloud Server Functions The Future of Presenceline Application The Interrelation of Identity, Presence, and

Cloud Computing Companies Web Location in the CloudDatabase Identity ManagementVendor Approaches to Cloud Computing What It Is

line Role of Open Source Software in Data Future of Identity in the CloudCloud Computing Defined Center Privacy and Its Relation to Cloud-Based

Page 56: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Architecture Cost Reduction vs. Reliability Information SystemsCloud Computing Terms Open Source Server Software Personal InformationCommunication-as-a-Service (CaaS) Open Source Database Software Privacy-Related IssuesInfrastructure-as-a-Service (IaaS) Open Source Applications Software Finding Your Private Information Monitoring-as-a-Service (MaaS) Open Source System Management What It IsSoftware-as-a-Service (SaaS) Software Open Cloud Consortium Working GroupsPlatform-as-a-Service (PaaS) Open Source Load-Balancing Software Project MatsuBenefits and Limitations of Cloud Computing The Hypervisor Project CometBenefits Virtualization as the "Operating System" HPC in the CloudLimitations Virtualization with a Host Operating The Open Cloud TestbedCloud Computing Case Studies System The Open Science Data CloudHow Companies Are Using Cloud Virtualization Infections on Virtualized Intercloud TestbedComputing Environments Reporting on an Open Cloud ConsortiumImplementing Applications and Services in Type 1 Virtualized Environment Working Groupthe Cloud Type 2 Virtualized Environment Distributed Management Task ForceUsing Your Company's Services vs. the Virtualization Environments (DMTF)Cloud Provider Microsoft Virtualization What It Is?A Cloud Service Provider Introduced Sun xVM VirtualBox DMTK Working Groups Associated withCloud Computing Risks and Issues Linux/UNIX Virtualization Cloud ComputingProducts and Services Provided by Cloud VMware Products Standards for Application DevelopersComputing Companies Data Center and Cloud Infrastructure ProtocolsOperational Products Scripting LanguagesEconomic End-User and Desktop Products Content Formatting Standards andStaffing IBM Virtualization LanguagesShould Your Company Invest in Cloud Using VMware to see a Virtualized Server Standards for Security in the CloudComputing? Environment Confidentiality, Integrity, AvailabilityWhat Should Not be Moved to the Cloud What It Is Authentication, Authorization,Virtualization in Mainframe Architectures Permissive Federation Accountabilityand Operating Systems Verified Federation Regulations for PrivacyLANs and the Cloud Encrypted Federation Security ProtocolsInternet and the Cloud Trusted Federation Establishing a Baseline for CloudWeb Services, Browsers, and the Cloud Using XMPP in the Federated PerformanceThin Client Environment Best Practices for Selecting a Vendor andAdvances in Networking and Processing Presence in the Cloud Implementing Cloud-Based ApplicationsSpeeds that Led to Cloud Computing What It Is Choosing the Right VendorNetworking Developments Presence Protocols Implementing Cloud-Based Applications Increased Processing Speeds Leveraging Presence CitrixManaged Service Provider Model to Cloud Presence Enabled Windows Remote DesktopComputing and Software as a Service The Future of Presence Vnc(SaaS) The Interrelation of Identity, Presence, Web BrowsersSingle Purpose Architectures Migrate to and Location in the Cloud Server ExtensionsMultipurpose Architectures Identity Management Thin ClientsData Center Virtualization What It Is Smart Phones, Pads, Pods, etc.Collaboration Future of Identity in the Cloud Virtual Terminal Security Strengths andThe Cloud as a Reach Extender Privacy and Its Relation to Cloud-Based WeaknessesThe Cloud as a Communication Enabler Information Systems StrengthsThe Cloud as an Employee Enabler Personal Information Weaknesses Service-Oriented Architecture (SOA) Privacy-Related Issues iPhoneEvolving from SOA to the Cloud Finding Your Private Information AndroidCapacity: Limited Performance What It Is BlackBerryAvailability: Communications Failure and Open Cloud Consortium Working Groups Windows MobilePerformance Issues Project Matsu Ubuntu Mobile Internet DeviceSecurity: Newer Security Protocols Provide Project Comet Mobile Platform VirtualizationMore Protection HPC in the Cloud Kernel-Based Virtual MachineWhat's Next in Cloud Computing The Open Cloud Testbed VMware Mobile Virtualization PlatformUsing Industry and International Standards The Open Science Data Cloud Collaboration Applications for MobileIndependent Components Intercloud Testbed PlatformsMessage Base Reporting on an Open Cloud Consortium Text MessagingLocation Independence Working Group iPhone ApplicationsCommunication Requirements for Cloud Distributed Management Task Force BlackBerry ApplicationsImplementation (DMTF) Droid Applications Public Internet What It Is?Private Internet DMTK Working Groups Associated withRouting to the Datacenter Cloud Computing lineSwitching within the Data Center Standards for Application Developers Cloud Computing DefinedBandwidth Protocols Cloud Computing Architecture

Page 57: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Tools Used to Measure Network Scripting Languages Cloud Computing TermsPerformance Content Formatting Standards and Communication-as-a-Service (CaaS)Using the Protocol Analyzer to Measure Languages Infrastructure-as-a-Service (IaaS)Bandwidth Standards for Security in the Cloud Monitoring-as-a-Service (MaaS)Using Ping and Traceroute to Measure Confidentiality, Integrity, Availability Software-as-a-Service (SaaS)Network Performance Authentication, Authorization, Platform-as-a-Service (PaaS)Security Accountability Benefits and Limitations of CloudSSL Regulations for Privacy ComputingVPN Security Protocols BenefitsOverhead Establishing a Baseline for Cloud LimitationsStorage Options for Cloud Computing Performance Cloud Computing Case StudiesStorage Capacity Best Practices for Selecting a Vendor How Companies Are Using CloudData Protection and Partitioning and Implementing Cloud-Based ComputingNAS Applications Implementing Applications and Services inSAN Choosing the Right Vendor the CloudCAS Implementing Cloud-Based Applications Using Your Company's Services vs. theRedundancy Citrix Cloud ProviderReplication Windows Remote Desktop A Cloud Service Provider IntroducedMultisiting Vnc Cloud Computing Risks and Issues Backup and Recovery Web Browsers Products and Services Provided by CloudServer Software Environments that Support Server Extensions Computing Companies Cloud Computing Thin Clients OperationalServer Capacity Smart Phones, Pads, Pods, etc. EconomicVirtualization Virtual Terminal Security Strengths and StaffingClustering Weaknesses Should Your Company Invest in CloudExpansion Strengths Computing?Server Functions Weaknesses What Should Not be Moved to the Cloud Application iPhone Virtualization in Mainframe ArchitecturesWeb Android and Operating SystemsDatabase BlackBerry LANs and the CloudVendor Approaches to Cloud Computing Windows Mobile Internet and the CloudRole of Open Source Software in Data Ubuntu Mobile Internet Device Web Services, Browsers, and the CloudCenter Mobile Platform Virtualization Thin ClientCost Reduction vs. Reliability Kernel-Based Virtual Machine Advances in Networking and ProcessingOpen Source Server Software VMware Mobile Virtualization Platform Speeds that Led to Cloud ComputingOpen Source Database Software Collaboration Applications for Mobile Networking DevelopmentsOpen Source Applications Software Platforms Increased Processing SpeedsOpen Source System Management Software Text Messaging Managed Service Provider Model to CloudOpen Source Load-Balancing Software iPhone Applications Computing and Software as a ServiceThe Hypervisor BlackBerry Applications (SaaS)Virtualization as the "Operating System" Droid Applications Single Purpose Architectures Migrate toVirtualization with a Host Operating System Multipurpose ArchitecturesVirtualization Infections on Virtualized Data Center VirtualizationEnvironments line CollaborationType 1 Virtualized Environment Cloud Computing Defined The Cloud as a Reach ExtenderType 2 Virtualized Environment Cloud Computing Architecture The Cloud as a Communication EnablerVirtualization Environments Cloud Computing Terms The Cloud as an Employee EnablerMicrosoft Virtualization Communication-as-a-Service (CaaS) Service-Oriented Architecture (SOA)Sun xVM VirtualBox Infrastructure-as-a-Service (IaaS) Evolving from SOA to the CloudLinux/UNIX Virtualization Monitoring-as-a-Service (MaaS) Capacity: Limited PerformanceVMware Products Software-as-a-Service (SaaS) Availability: Communications Failure andData Center and Cloud Infrastructure Platform-as-a-Service (PaaS) Performance IssuesProducts Benefits and Limitations of Cloud Security: Newer Security Protocols ProvideEnd-User and Desktop Products Computing More ProtectionIBM Virtualization Benefits What's Next in Cloud Computing Using VMware to see a Virtualized Server Limitations Using Industry and International StandardsEnvironment Cloud Computing Case Studies Independent ComponentsWhat It Is How Companies Are Using Cloud Message BasePermissive Federation Computing Location IndependenceVerified Federation Implementing Applications and Services Communication Requirements for CloudEncrypted Federation in the Cloud ImplementationTrusted Federation Using Your Company's Services vs. the Public InternetUsing XMPP in the Federated Environment Cloud Provider Private InternetPresence in the Cloud A Cloud Service Provider Introduced Routing to the DatacenterWhat It Is Cloud Computing Risks and Issues Switching within the Data CenterPresence Protocols Products and Services Provided by Cloud Bandwidth

Page 58: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Leveraging Presence Computing Companies Tools Used to Measure NetworkPresence Enabled Operational PerformanceThe Future of Presence Economic Using the Protocol Analyzer to MeasureThe Interrelation of Identity, Presence, and Staffing BandwidthLocation in the Cloud Should Your Company Invest in Cloud Using Ping and Traceroute to MeasureIdentity Management Computing? Network PerformanceWhat It Is What Should Not be Moved to the Cloud SecurityFuture of Identity in the Cloud Virtualization in Mainframe Architectures SSLPrivacy and Its Relation to Cloud-Based and Operating Systems VPNInformation Systems LANs and the Cloud OverheadPersonal Information Internet and the Cloud Storage Options for Cloud ComputingPrivacy-Related Issues Web Services, Browsers, and the Cloud Storage CapacityFinding Your Private Information Thin Client Data Protection and PartitioningWhat It Is Advances in Networking and Processing NASOpen Cloud Consortium Working Groups Speeds that Led to Cloud Computing SANProject Matsu Networking Developments CASProject Comet Increased Processing Speeds RedundancyHPC in the Cloud Managed Service Provider Model to ReplicationThe Open Cloud Testbed Cloud Computing and Software as a MultisitingThe Open Science Data Cloud Service (SaaS) Backup and RecoveryIntercloud Testbed Single Purpose Architectures Migrate to Server Software Environments thatReporting on an Open Cloud Consortium Multipurpose Architectures Support Cloud ComputingWorking Group Data Center Virtualization Server CapacityDistributed Management Task Force Collaboration Virtualization(DMTF) The Cloud as a Reach Extender ClusteringWhat It Is? The Cloud as a Communication Enabler ExpansionDMTK Working Groups Associated with The Cloud as an Employee Enabler Server FunctionsCloud Computing Service-Oriented Architecture (SOA) ApplicationStandards for Application Developers Evolving from SOA to the Cloud WebProtocols Capacity: Limited Performance DatabaseScripting Languages Availability: Communications Failure and Vendor Approaches to Cloud ComputingContent Formatting Standards and Performance Issues Role of Open Source Software in DataLanguages Security: Newer Security Protocols CenterStandards for Security in the Cloud Provide More Protection Cost Reduction vs. ReliabilityConfidentiality, Integrity, Availability What's Next in Cloud Computing Open Source Server SoftwareAuthentication, Authorization, Accountability Using Industry and International Open Source Database SoftwareRegulations for Privacy Standards Open Source Applications SoftwareSecurity Protocols Independent Components Open Source System ManagementEstablishing a Baseline for Cloud Message Base SoftwarePerformance Location Independence Open Source Load-Balancing Software Best Practices for Selecting a Vendor and Communication Requirements for Cloud The HypervisorImplementing Cloud-Based Applications Implementation Virtualization as the "Operating System"Choosing the Right Vendor Public Internet Virtualization with a Host OperatingImplementing Cloud-Based Applications Private Internet SystemCitrix Routing to the Datacenter Virtualization Infections on VirtualizedWindows Remote Desktop Switching within the Data Center EnvironmentsVnc Bandwidth Type 1 Virtualized EnvironmentWeb Browsers Tools Used to Measure Network Type 2 Virtualized EnvironmentServer Extensions Performance Virtualization EnvironmentsThin Clients Using the Protocol Analyzer to Measure Microsoft VirtualizationSmart Phones, Pads, Pods, etc. Bandwidth Sun xVM VirtualBoxVirtual Terminal Security Strengths and Using Ping and Traceroute to Measure Linux/UNIX VirtualizationWeaknesses Network Performance VMware ProductsStrengths Security Data Center and Cloud InfrastructureWeaknesses SSL ProductsiPhone VPN End-User and Desktop ProductsAndroid Overhead IBM VirtualizationBlackBerry Storage Options for Cloud Computing Using VMware to see a Virtualized ServerWindows Mobile Storage Capacity Environment Ubuntu Mobile Internet Device Data Protection and Partitioning What It IsMobile Platform Virtualization NAS Permissive FederationKernel-Based Virtual Machine SAN Verified FederationVMware Mobile Virtualization Platform CAS Encrypted FederationCollaboration Applications for Mobile Redundancy Trusted FederationPlatforms Replication Using XMPP in the Federated EnvironmentText Messaging Multisiting Presence in the Cloud

Page 59: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

iPhone Applications Backup and Recovery What It IsBlackBerry Applications Server Software Environments that Presence ProtocolsDroid Applications Support Cloud Computing Leveraging Presence

Server Capacity Presence Enabled3. The Business Case for Going to the Cloud Virtualization The Future of Presenceline Clustering The Interrelation of Identity, Presence, and

Benefits of Cloud Computing Expansion Location in the CloudServer Functions Identity ManagementApplication What It Is

line Web Future of Identity in the CloudCloud Computing Defined Database Privacy and Its Relation to Cloud-BasedCloud Computing Architecture Vendor Approaches to Cloud Computing Information SystemsCloud Computing Terms Role of Open Source Software in Data Personal InformationCommunication-as-a-Service (CaaS) Center Privacy-Related IssuesInfrastructure-as-a-Service (IaaS) Cost Reduction vs. Reliability Finding Your Private Information Monitoring-as-a-Service (MaaS) Open Source Server Software What It IsSoftware-as-a-Service (SaaS) Open Source Database Software Open Cloud Consortium Working GroupsPlatform-as-a-Service (PaaS) Open Source Applications Software Project MatsuBenefits and Limitations of Cloud Computing Open Source System Management Project CometBenefits Software HPC in the CloudLimitations Open Source Load-Balancing Software The Open Cloud TestbedCloud Computing Case Studies The Hypervisor The Open Science Data CloudHow Companies Are Using Cloud Virtualization as the "Operating System" Intercloud TestbedComputing Virtualization with a Host Operating Reporting on an Open Cloud ConsortiumImplementing Applications and Services in System Working Groupthe Cloud Virtualization Infections on Virtualized Distributed Management Task ForceUsing Your Company's Services vs. the Environments (DMTF)Cloud Provider Type 1 Virtualized Environment What It Is?A Cloud Service Provider Introduced Type 2 Virtualized Environment DMTK Working Groups Associated withCloud Computing Risks and Issues Virtualization Environments Cloud ComputingProducts and Services Provided by Cloud Microsoft Virtualization Standards for Application DevelopersComputing Companies Sun xVM VirtualBox ProtocolsOperational Linux/UNIX Virtualization Scripting LanguagesEconomic VMware Products Content Formatting Standards andStaffing Data Center and Cloud Infrastructure LanguagesShould Your Company Invest in Cloud Products Standards for Security in the CloudComputing? End-User and Desktop Products Confidentiality, Integrity, AvailabilityWhat Should Not be Moved to the Cloud IBM Virtualization Authentication, Authorization,Virtualization in Mainframe Architectures Using VMware to see a Virtualized Server Accountabilityand Operating Systems Environment Regulations for PrivacyLANs and the Cloud What It Is Security ProtocolsInternet and the Cloud Permissive Federation Establishing a Baseline for CloudWeb Services, Browsers, and the Cloud Verified Federation PerformanceThin Client Encrypted Federation Best Practices for Selecting a Vendor andAdvances in Networking and Processing Trusted Federation Implementing Cloud-Based ApplicationsSpeeds that Led to Cloud Computing Using XMPP in the Federated Choosing the Right VendorNetworking Developments Environment Implementing Cloud-Based Applications Increased Processing Speeds Presence in the Cloud CitrixManaged Service Provider Model to Cloud What It Is Windows Remote DesktopComputing and Software as a Service Presence Protocols Vnc(SaaS) Leveraging Presence Web BrowsersSingle Purpose Architectures Migrate to Presence Enabled Server ExtensionsMultipurpose Architectures The Future of Presence Thin ClientsData Center Virtualization The Interrelation of Identity, Presence, Smart Phones, Pads, Pods, etc.Collaboration and Location in the Cloud Virtual Terminal Security Strengths andThe Cloud as a Reach Extender Identity Management WeaknessesThe Cloud as a Communication Enabler What It Is StrengthsThe Cloud as an Employee Enabler Future of Identity in the Cloud Weaknesses Service-Oriented Architecture (SOA) Privacy and Its Relation to Cloud-Based iPhoneEvolving from SOA to the Cloud Information Systems AndroidCapacity: Limited Performance Personal Information BlackBerryAvailability: Communications Failure and Privacy-Related Issues Windows MobilePerformance Issues Finding Your Private Information Ubuntu Mobile Internet DeviceSecurity: Newer Security Protocols Provide What It Is Mobile Platform VirtualizationMore Protection Open Cloud Consortium Working Groups Kernel-Based Virtual MachineWhat's Next in Cloud Computing Project Matsu VMware Mobile Virtualization Platform

Page 60: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using Industry and International Standards Project Comet Collaboration Applications for MobileIndependent Components HPC in the Cloud PlatformsMessage Base The Open Cloud Testbed Text MessagingLocation Independence The Open Science Data Cloud iPhone ApplicationsCommunication Requirements for Cloud Intercloud Testbed BlackBerry ApplicationsImplementation Reporting on an Open Cloud Consortium Droid Applications Public Internet Working GroupPrivate Internet Distributed Management Task ForceRouting to the Datacenter (DMTF) lineSwitching within the Data Center What It Is? Cloud Computing DefinedBandwidth DMTK Working Groups Associated with Cloud Computing ArchitectureTools Used to Measure Network Cloud Computing Cloud Computing TermsPerformance Standards for Application Developers Communication-as-a-Service (CaaS)Using the Protocol Analyzer to Measure Protocols Infrastructure-as-a-Service (IaaS)Bandwidth Scripting Languages Monitoring-as-a-Service (MaaS)Using Ping and Traceroute to Measure Content Formatting Standards and Software-as-a-Service (SaaS)Network Performance Languages Platform-as-a-Service (PaaS)Security Standards for Security in the Cloud Benefits and Limitations of CloudSSL Confidentiality, Integrity, Availability ComputingVPN Authentication, Authorization, BenefitsOverhead Accountability LimitationsStorage Options for Cloud Computing Regulations for Privacy Cloud Computing Case StudiesStorage Capacity Security Protocols How Companies Are Using CloudData Protection and Partitioning Establishing a Baseline for Cloud ComputingNAS Performance Implementing Applications and Services inSAN Best Practices for Selecting a Vendor the CloudCAS and Implementing Cloud-Based Using Your Company's Services vs. theRedundancy Applications Cloud ProviderReplication Choosing the Right Vendor A Cloud Service Provider IntroducedMultisiting Implementing Cloud-Based Applications Cloud Computing Risks and Issues Backup and Recovery Citrix Products and Services Provided by CloudServer Software Environments that Support Windows Remote Desktop Computing Companies Cloud Computing Vnc OperationalServer Capacity Web Browsers EconomicVirtualization Server Extensions StaffingClustering Thin Clients Should Your Company Invest in CloudExpansion Smart Phones, Pads, Pods, etc. Computing?Server Functions Virtual Terminal Security Strengths and What Should Not be Moved to the Cloud Application Weaknesses Virtualization in Mainframe ArchitecturesWeb Strengths and Operating SystemsDatabase Weaknesses LANs and the CloudVendor Approaches to Cloud Computing iPhone Internet and the CloudRole of Open Source Software in Data Android Web Services, Browsers, and the CloudCenter BlackBerry Thin ClientCost Reduction vs. Reliability Windows Mobile Advances in Networking and ProcessingOpen Source Server Software Ubuntu Mobile Internet Device Speeds that Led to Cloud ComputingOpen Source Database Software Mobile Platform Virtualization Networking DevelopmentsOpen Source Applications Software Kernel-Based Virtual Machine Increased Processing SpeedsOpen Source System Management Software VMware Mobile Virtualization Platform Managed Service Provider Model to CloudOpen Source Load-Balancing Software Collaboration Applications for Mobile Computing and Software as a ServiceThe Hypervisor Platforms (SaaS)Virtualization as the "Operating System" Text Messaging Single Purpose Architectures Migrate toVirtualization with a Host Operating System iPhone Applications Multipurpose ArchitecturesVirtualization Infections on Virtualized BlackBerry Applications Data Center VirtualizationEnvironments Droid Applications CollaborationType 1 Virtualized Environment The Cloud as a Reach ExtenderType 2 Virtualized Environment The Cloud as a Communication EnablerVirtualization Environments line The Cloud as an Employee EnablerMicrosoft Virtualization Cloud Computing Defined Service-Oriented Architecture (SOA)Sun xVM VirtualBox Cloud Computing Architecture Evolving from SOA to the CloudLinux/UNIX Virtualization Cloud Computing Terms Capacity: Limited PerformanceVMware Products Communication-as-a-Service (CaaS) Availability: Communications Failure andData Center and Cloud Infrastructure Infrastructure-as-a-Service (IaaS) Performance IssuesProducts Monitoring-as-a-Service (MaaS) Security: Newer Security Protocols ProvideEnd-User and Desktop Products Software-as-a-Service (SaaS) More ProtectionIBM Virtualization Platform-as-a-Service (PaaS) What's Next in Cloud Computing

Page 61: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using VMware to see a Virtualized Server Benefits and Limitations of Cloud Using Industry and International StandardsEnvironment Computing Independent ComponentsWhat It Is Benefits Message BasePermissive Federation Limitations Location IndependenceVerified Federation Cloud Computing Case Studies Communication Requirements for CloudEncrypted Federation How Companies Are Using Cloud ImplementationTrusted Federation Computing Public InternetUsing XMPP in the Federated Environment Implementing Applications and Services Private InternetPresence in the Cloud in the Cloud Routing to the DatacenterWhat It Is Using Your Company's Services vs. the Switching within the Data CenterPresence Protocols Cloud Provider BandwidthLeveraging Presence A Cloud Service Provider Introduced Tools Used to Measure NetworkPresence Enabled Cloud Computing Risks and Issues PerformanceThe Future of Presence Products and Services Provided by Cloud Using the Protocol Analyzer to MeasureThe Interrelation of Identity, Presence, and Computing Companies BandwidthLocation in the Cloud Operational Using Ping and Traceroute to MeasureIdentity Management Economic Network PerformanceWhat It Is Staffing SecurityFuture of Identity in the Cloud Should Your Company Invest in Cloud SSLPrivacy and Its Relation to Cloud-Based Computing? VPNInformation Systems What Should Not be Moved to the Cloud OverheadPersonal Information Virtualization in Mainframe Architectures Storage Options for Cloud ComputingPrivacy-Related Issues and Operating Systems Storage CapacityFinding Your Private Information LANs and the Cloud Data Protection and PartitioningWhat It Is Internet and the Cloud NASOpen Cloud Consortium Working Groups Web Services, Browsers, and the Cloud SANProject Matsu Thin Client CASProject Comet Advances in Networking and Processing RedundancyHPC in the Cloud Speeds that Led to Cloud Computing ReplicationThe Open Cloud Testbed Networking Developments MultisitingThe Open Science Data Cloud Increased Processing Speeds Backup and RecoveryIntercloud Testbed Managed Service Provider Model to Server Software Environments thatReporting on an Open Cloud Consortium Cloud Computing and Software as a Support Cloud ComputingWorking Group Service (SaaS) Server CapacityDistributed Management Task Force Single Purpose Architectures Migrate to Virtualization(DMTF) Multipurpose Architectures ClusteringWhat It Is? Data Center Virtualization ExpansionDMTK Working Groups Associated with Collaboration Server FunctionsCloud Computing The Cloud as a Reach Extender ApplicationStandards for Application Developers The Cloud as a Communication Enabler WebProtocols The Cloud as an Employee Enabler DatabaseScripting Languages Service-Oriented Architecture (SOA) Vendor Approaches to Cloud ComputingContent Formatting Standards and Evolving from SOA to the Cloud Role of Open Source Software in DataLanguages Capacity: Limited Performance CenterStandards for Security in the Cloud Availability: Communications Failure and Cost Reduction vs. ReliabilityConfidentiality, Integrity, Availability Performance Issues Open Source Server SoftwareAuthentication, Authorization, Accountability Security: Newer Security Protocols Open Source Database SoftwareRegulations for Privacy Provide More Protection Open Source Applications SoftwareSecurity Protocols What's Next in Cloud Computing Open Source System ManagementEstablishing a Baseline for Cloud Using Industry and International SoftwarePerformance Standards Open Source Load-Balancing Software Best Practices for Selecting a Vendor and Independent Components The HypervisorImplementing Cloud-Based Applications Message Base Virtualization as the "Operating System"Choosing the Right Vendor Location Independence Virtualization with a Host OperatingImplementing Cloud-Based Applications Communication Requirements for Cloud SystemCitrix Implementation Virtualization Infections on VirtualizedWindows Remote Desktop Public Internet EnvironmentsVnc Private Internet Type 1 Virtualized EnvironmentWeb Browsers Routing to the Datacenter Type 2 Virtualized EnvironmentServer Extensions Switching within the Data Center Virtualization EnvironmentsThin Clients Bandwidth Microsoft VirtualizationSmart Phones, Pads, Pods, etc. Tools Used to Measure Network Sun xVM VirtualBoxVirtual Terminal Security Strengths and Performance Linux/UNIX VirtualizationWeaknesses Using the Protocol Analyzer to Measure VMware ProductsStrengths Bandwidth Data Center and Cloud InfrastructureWeaknesses Using Ping and Traceroute to Measure Products

Page 62: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

iPhone Network Performance End-User and Desktop ProductsAndroid Security IBM VirtualizationBlackBerry SSL Using VMware to see a Virtualized ServerWindows Mobile VPN Environment Ubuntu Mobile Internet Device Overhead What It IsMobile Platform Virtualization Storage Options for Cloud Computing Permissive FederationKernel-Based Virtual Machine Storage Capacity Verified FederationVMware Mobile Virtualization Platform Data Protection and Partitioning Encrypted FederationCollaboration Applications for Mobile NAS Trusted FederationPlatforms SAN Using XMPP in the Federated EnvironmentText Messaging CAS Presence in the CloudiPhone Applications Redundancy What It IsBlackBerry Applications Replication Presence ProtocolsDroid Applications Multisiting Leveraging Presence

Backup and Recovery Presence EnabledServer Software Environments that The Future of Presence

line Support Cloud Computing The Interrelation of Identity, Presence, andCloud Computing Defined Server Capacity Location in the CloudCloud Computing Architecture Virtualization Identity ManagementCloud Computing Terms Clustering What It IsCommunication-as-a-Service (CaaS) Expansion Future of Identity in the CloudInfrastructure-as-a-Service (IaaS) Server Functions Privacy and Its Relation to Cloud-BasedMonitoring-as-a-Service (MaaS) Application Information SystemsSoftware-as-a-Service (SaaS) Web Personal InformationPlatform-as-a-Service (PaaS) Database Privacy-Related IssuesBenefits and Limitations of Cloud Computing Vendor Approaches to Cloud Computing Finding Your Private Information Benefits Role of Open Source Software in Data What It IsLimitations Center Open Cloud Consortium Working GroupsCloud Computing Case Studies Cost Reduction vs. Reliability Project MatsuHow Companies Are Using Cloud Open Source Server Software Project CometComputing Open Source Database Software HPC in the CloudImplementing Applications and Services in Open Source Applications Software The Open Cloud Testbedthe Cloud Open Source System Management The Open Science Data CloudUsing Your Company's Services vs. the Software Intercloud TestbedCloud Provider Open Source Load-Balancing Software Reporting on an Open Cloud ConsortiumA Cloud Service Provider Introduced The Hypervisor Working GroupCloud Computing Risks and Issues Virtualization as the "Operating System" Distributed Management Task ForceProducts and Services Provided by Cloud Virtualization with a Host Operating (DMTF)Computing Companies System What It Is?Operational Virtualization Infections on Virtualized DMTK Working Groups Associated withEconomic Environments Cloud ComputingStaffing Type 1 Virtualized Environment Standards for Application DevelopersShould Your Company Invest in Cloud Type 2 Virtualized Environment ProtocolsComputing? Virtualization Environments Scripting LanguagesWhat Should Not be Moved to the Cloud Microsoft Virtualization Content Formatting Standards andVirtualization in Mainframe Architectures Sun xVM VirtualBox Languagesand Operating Systems Linux/UNIX Virtualization Standards for Security in the CloudLANs and the Cloud VMware Products Confidentiality, Integrity, AvailabilityInternet and the Cloud Data Center and Cloud Infrastructure Authentication, Authorization,Web Services, Browsers, and the Cloud Products AccountabilityThin Client End-User and Desktop Products Regulations for PrivacyAdvances in Networking and Processing IBM Virtualization Security ProtocolsSpeeds that Led to Cloud Computing Using VMware to see a Virtualized Server Establishing a Baseline for CloudNetworking Developments Environment PerformanceIncreased Processing Speeds What It Is Best Practices for Selecting a Vendor andManaged Service Provider Model to Cloud Permissive Federation Implementing Cloud-Based ApplicationsComputing and Software as a Service Verified Federation Choosing the Right Vendor(SaaS) Encrypted Federation Implementing Cloud-Based Applications Single Purpose Architectures Migrate to Trusted Federation CitrixMultipurpose Architectures Using XMPP in the Federated Windows Remote DesktopData Center Virtualization Environment VncCollaboration Presence in the Cloud Web BrowsersThe Cloud as a Reach Extender What It Is Server ExtensionsThe Cloud as a Communication Enabler Presence Protocols Thin ClientsThe Cloud as an Employee Enabler Leveraging Presence Smart Phones, Pads, Pods, etc.Service-Oriented Architecture (SOA) Presence Enabled Virtual Terminal Security Strengths and

Page 63: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Evolving from SOA to the Cloud The Future of Presence WeaknessesCapacity: Limited Performance The Interrelation of Identity, Presence, StrengthsAvailability: Communications Failure and and Location in the Cloud Weaknesses Performance Issues Identity Management iPhoneSecurity: Newer Security Protocols Provide What It Is AndroidMore Protection Future of Identity in the Cloud BlackBerryWhat's Next in Cloud Computing Privacy and Its Relation to Cloud-Based Windows MobileUsing Industry and International Standards Information Systems Ubuntu Mobile Internet DeviceIndependent Components Personal Information Mobile Platform VirtualizationMessage Base Privacy-Related Issues Kernel-Based Virtual MachineLocation Independence Finding Your Private Information VMware Mobile Virtualization PlatformCommunication Requirements for Cloud What It Is Collaboration Applications for MobileImplementation Open Cloud Consortium Working Groups PlatformsPublic Internet Project Matsu Text MessagingPrivate Internet Project Comet iPhone ApplicationsRouting to the Datacenter HPC in the Cloud BlackBerry ApplicationsSwitching within the Data Center The Open Cloud Testbed Droid Applications Bandwidth The Open Science Data CloudTools Used to Measure Network Intercloud TestbedPerformance Reporting on an Open Cloud Consortium lineUsing the Protocol Analyzer to Measure Working Group Cloud Computing DefinedBandwidth Distributed Management Task Force Cloud Computing ArchitectureUsing Ping and Traceroute to Measure (DMTF) Cloud Computing TermsNetwork Performance What It Is? Communication-as-a-Service (CaaS)Security DMTK Working Groups Associated with Infrastructure-as-a-Service (IaaS)SSL Cloud Computing Monitoring-as-a-Service (MaaS)VPN Standards for Application Developers Software-as-a-Service (SaaS)Overhead Protocols Platform-as-a-Service (PaaS)Storage Options for Cloud Computing Scripting Languages Benefits and Limitations of CloudStorage Capacity Content Formatting Standards and ComputingData Protection and Partitioning Languages BenefitsNAS Standards for Security in the Cloud LimitationsSAN Confidentiality, Integrity, Availability Cloud Computing Case StudiesCAS Authentication, Authorization, How Companies Are Using CloudRedundancy Accountability ComputingReplication Regulations for Privacy Implementing Applications and Services inMultisiting Security Protocols the CloudBackup and Recovery Establishing a Baseline for Cloud Using Your Company's Services vs. theServer Software Environments that Support Performance Cloud ProviderCloud Computing Best Practices for Selecting a Vendor A Cloud Service Provider IntroducedServer Capacity and Implementing Cloud-Based Cloud Computing Risks and Issues Virtualization Applications Products and Services Provided by CloudClustering Choosing the Right Vendor Computing Companies Expansion Implementing Cloud-Based Applications OperationalServer Functions Citrix EconomicApplication Windows Remote Desktop StaffingWeb Vnc Should Your Company Invest in CloudDatabase Web Browsers Computing?Vendor Approaches to Cloud Computing Server Extensions What Should Not be Moved to the Cloud Role of Open Source Software in Data Thin Clients Virtualization in Mainframe ArchitecturesCenter Smart Phones, Pads, Pods, etc. and Operating SystemsCost Reduction vs. Reliability Virtual Terminal Security Strengths and LANs and the CloudOpen Source Server Software Weaknesses Internet and the CloudOpen Source Database Software Strengths Web Services, Browsers, and the CloudOpen Source Applications Software Weaknesses Thin ClientOpen Source System Management Software iPhone Advances in Networking and ProcessingOpen Source Load-Balancing Software Android Speeds that Led to Cloud ComputingThe Hypervisor BlackBerry Networking DevelopmentsVirtualization as the "Operating System" Windows Mobile Increased Processing SpeedsVirtualization with a Host Operating System Ubuntu Mobile Internet Device Managed Service Provider Model to CloudVirtualization Infections on Virtualized Mobile Platform Virtualization Computing and Software as a ServiceEnvironments Kernel-Based Virtual Machine (SaaS)Type 1 Virtualized Environment VMware Mobile Virtualization Platform Single Purpose Architectures Migrate toType 2 Virtualized Environment Collaboration Applications for Mobile Multipurpose ArchitecturesVirtualization Environments Platforms Data Center VirtualizationMicrosoft Virtualization Text Messaging Collaboration

Page 64: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Sun xVM VirtualBox iPhone Applications The Cloud as a Reach ExtenderLinux/UNIX Virtualization BlackBerry Applications The Cloud as a Communication EnablerVMware Products Droid Applications The Cloud as an Employee EnablerData Center and Cloud Infrastructure Service-Oriented Architecture (SOA)Products Evolving from SOA to the CloudEnd-User and Desktop Products line Capacity: Limited PerformanceIBM Virtualization Cloud Computing Defined Availability: Communications Failure andUsing VMware to see a Virtualized Server Cloud Computing Architecture Performance IssuesEnvironment Cloud Computing Terms Security: Newer Security Protocols ProvideWhat It Is Communication-as-a-Service (CaaS) More ProtectionPermissive Federation Infrastructure-as-a-Service (IaaS) What's Next in Cloud Computing Verified Federation Monitoring-as-a-Service (MaaS) Using Industry and International StandardsEncrypted Federation Software-as-a-Service (SaaS) Independent ComponentsTrusted Federation Platform-as-a-Service (PaaS) Message BaseUsing XMPP in the Federated Environment Benefits and Limitations of Cloud Location IndependencePresence in the Cloud Computing Communication Requirements for CloudWhat It Is Benefits ImplementationPresence Protocols Limitations Public InternetLeveraging Presence Cloud Computing Case Studies Private InternetPresence Enabled How Companies Are Using Cloud Routing to the DatacenterThe Future of Presence Computing Switching within the Data CenterThe Interrelation of Identity, Presence, and Implementing Applications and Services BandwidthLocation in the Cloud in the Cloud Tools Used to Measure NetworkIdentity Management Using Your Company's Services vs. the PerformanceWhat It Is Cloud Provider Using the Protocol Analyzer to MeasureFuture of Identity in the Cloud A Cloud Service Provider Introduced BandwidthPrivacy and Its Relation to Cloud-Based Cloud Computing Risks and Issues Using Ping and Traceroute to MeasureInformation Systems Products and Services Provided by Cloud Network PerformancePersonal Information Computing Companies SecurityPrivacy-Related Issues Operational SSLFinding Your Private Information Economic VPNWhat It Is Staffing OverheadOpen Cloud Consortium Working Groups Should Your Company Invest in Cloud Storage Options for Cloud ComputingProject Matsu Computing? Storage CapacityProject Comet What Should Not be Moved to the Cloud Data Protection and PartitioningHPC in the Cloud Virtualization in Mainframe Architectures NASThe Open Cloud Testbed and Operating Systems SANThe Open Science Data Cloud LANs and the Cloud CASIntercloud Testbed Internet and the Cloud RedundancyReporting on an Open Cloud Consortium Web Services, Browsers, and the Cloud ReplicationWorking Group Thin Client MultisitingDistributed Management Task Force Advances in Networking and Processing Backup and Recovery(DMTF) Speeds that Led to Cloud Computing Server Software Environments thatWhat It Is? Networking Developments Support Cloud ComputingDMTK Working Groups Associated with Increased Processing Speeds Server CapacityCloud Computing Managed Service Provider Model to VirtualizationStandards for Application Developers Cloud Computing and Software as a ClusteringProtocols Service (SaaS) ExpansionScripting Languages Single Purpose Architectures Migrate to Server FunctionsContent Formatting Standards and Multipurpose Architectures ApplicationLanguages Data Center Virtualization WebStandards for Security in the Cloud Collaboration DatabaseConfidentiality, Integrity, Availability The Cloud as a Reach Extender Vendor Approaches to Cloud ComputingAuthentication, Authorization, Accountability The Cloud as a Communication Enabler Role of Open Source Software in DataRegulations for Privacy The Cloud as an Employee Enabler CenterSecurity Protocols Service-Oriented Architecture (SOA) Cost Reduction vs. ReliabilityEstablishing a Baseline for Cloud Evolving from SOA to the Cloud Open Source Server SoftwarePerformance Capacity: Limited Performance Open Source Database SoftwareBest Practices for Selecting a Vendor and Availability: Communications Failure and Open Source Applications SoftwareImplementing Cloud-Based Applications Performance Issues Open Source System ManagementChoosing the Right Vendor Security: Newer Security Protocols SoftwareImplementing Cloud-Based Applications Provide More Protection Open Source Load-Balancing Software Citrix What's Next in Cloud Computing The HypervisorWindows Remote Desktop Using Industry and International Virtualization as the "Operating System"Vnc Standards Virtualization with a Host OperatingWeb Browsers Independent Components System

Page 65: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Extensions Message Base Virtualization Infections on VirtualizedThin Clients Location Independence EnvironmentsSmart Phones, Pads, Pods, etc. Communication Requirements for Cloud Type 1 Virtualized EnvironmentVirtual Terminal Security Strengths and Implementation Type 2 Virtualized EnvironmentWeaknesses Public Internet Virtualization EnvironmentsStrengths Private Internet Microsoft VirtualizationWeaknesses Routing to the Datacenter Sun xVM VirtualBoxiPhone Switching within the Data Center Linux/UNIX VirtualizationAndroid Bandwidth VMware ProductsBlackBerry Tools Used to Measure Network Data Center and Cloud InfrastructureWindows Mobile Performance ProductsUbuntu Mobile Internet Device Using the Protocol Analyzer to Measure End-User and Desktop ProductsMobile Platform Virtualization Bandwidth IBM VirtualizationKernel-Based Virtual Machine Using Ping and Traceroute to Measure Using VMware to see a Virtualized ServerVMware Mobile Virtualization Platform Network Performance Environment Collaboration Applications for Mobile Security What It IsPlatforms SSL Permissive FederationText Messaging VPN Verified FederationiPhone Applications Overhead Encrypted FederationBlackBerry Applications Storage Options for Cloud Computing Trusted FederationDroid Applications Storage Capacity Using XMPP in the Federated Environment

Data Protection and Partitioning Presence in the CloudNAS What It Is

line SAN Presence ProtocolsCloud Computing Defined CAS Leveraging PresenceCloud Computing Architecture Redundancy Presence EnabledCloud Computing Terms Replication The Future of PresenceCommunication-as-a-Service (CaaS) Multisiting The Interrelation of Identity, Presence, andInfrastructure-as-a-Service (IaaS) Backup and Recovery Location in the CloudMonitoring-as-a-Service (MaaS) Server Software Environments that Identity ManagementSoftware-as-a-Service (SaaS) Support Cloud Computing What It IsPlatform-as-a-Service (PaaS) Server Capacity Future of Identity in the CloudBenefits and Limitations of Cloud Computing Virtualization Privacy and Its Relation to Cloud-BasedBenefits Clustering Information SystemsLimitations Expansion Personal InformationCloud Computing Case Studies Server Functions Privacy-Related IssuesHow Companies Are Using Cloud Application Finding Your Private Information Computing Web What It IsImplementing Applications and Services in Database Open Cloud Consortium Working Groupsthe Cloud Vendor Approaches to Cloud Computing Project MatsuUsing Your Company's Services vs. the Role of Open Source Software in Data Project CometCloud Provider Center HPC in the CloudA Cloud Service Provider Introduced Cost Reduction vs. Reliability The Open Cloud TestbedCloud Computing Risks and Issues Open Source Server Software The Open Science Data CloudProducts and Services Provided by Cloud Open Source Database Software Intercloud TestbedComputing Companies Open Source Applications Software Reporting on an Open Cloud ConsortiumOperational Open Source System Management Working GroupEconomic Software Distributed Management Task ForceStaffing Open Source Load-Balancing Software (DMTF)Should Your Company Invest in Cloud The Hypervisor What It Is?Computing? Virtualization as the "Operating System" DMTK Working Groups Associated withWhat Should Not be Moved to the Cloud Virtualization with a Host Operating Cloud ComputingVirtualization in Mainframe Architectures System Standards for Application Developersand Operating Systems Virtualization Infections on Virtualized ProtocolsLANs and the Cloud Environments Scripting LanguagesInternet and the Cloud Type 1 Virtualized Environment Content Formatting Standards andWeb Services, Browsers, and the Cloud Type 2 Virtualized Environment LanguagesThin Client Virtualization Environments Standards for Security in the CloudAdvances in Networking and Processing Microsoft Virtualization Confidentiality, Integrity, AvailabilitySpeeds that Led to Cloud Computing Sun xVM VirtualBox Authentication, Authorization,Networking Developments Linux/UNIX Virtualization AccountabilityIncreased Processing Speeds VMware Products Regulations for PrivacyManaged Service Provider Model to Cloud Data Center and Cloud Infrastructure Security ProtocolsComputing and Software as a Service Products Establishing a Baseline for Cloud(SaaS) End-User and Desktop Products PerformanceSingle Purpose Architectures Migrate to IBM Virtualization Best Practices for Selecting a Vendor and

Page 66: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Multipurpose Architectures Using VMware to see a Virtualized Server Implementing Cloud-Based ApplicationsData Center Virtualization Environment Choosing the Right VendorCollaboration What It Is Implementing Cloud-Based Applications The Cloud as a Reach Extender Permissive Federation CitrixThe Cloud as a Communication Enabler Verified Federation Windows Remote DesktopThe Cloud as an Employee Enabler Encrypted Federation VncService-Oriented Architecture (SOA) Trusted Federation Web BrowsersEvolving from SOA to the Cloud Using XMPP in the Federated Server ExtensionsCapacity: Limited Performance Environment Thin ClientsAvailability: Communications Failure and Presence in the Cloud Smart Phones, Pads, Pods, etc.Performance Issues What It Is Virtual Terminal Security Strengths andSecurity: Newer Security Protocols Provide Presence Protocols WeaknessesMore Protection Leveraging Presence StrengthsWhat's Next in Cloud Computing Presence Enabled Weaknesses Using Industry and International Standards The Future of Presence iPhoneIndependent Components The Interrelation of Identity, Presence, AndroidMessage Base and Location in the Cloud BlackBerryLocation Independence Identity Management Windows MobileCommunication Requirements for Cloud What It Is Ubuntu Mobile Internet DeviceImplementation Future of Identity in the Cloud Mobile Platform VirtualizationPublic Internet Privacy and Its Relation to Cloud-Based Kernel-Based Virtual MachinePrivate Internet Information Systems VMware Mobile Virtualization PlatformRouting to the Datacenter Personal Information Collaboration Applications for MobileSwitching within the Data Center Privacy-Related Issues PlatformsBandwidth Finding Your Private Information Text MessagingTools Used to Measure Network What It Is iPhone ApplicationsPerformance Open Cloud Consortium Working Groups BlackBerry ApplicationsUsing the Protocol Analyzer to Measure Project Matsu Droid Applications Bandwidth Project CometUsing Ping and Traceroute to Measure HPC in the CloudNetwork Performance The Open Cloud Testbed lineSecurity The Open Science Data Cloud Cloud Computing DefinedSSL Intercloud Testbed Cloud Computing ArchitectureVPN Reporting on an Open Cloud Consortium Cloud Computing TermsOverhead Working Group Communication-as-a-Service (CaaS)Storage Options for Cloud Computing Distributed Management Task Force Infrastructure-as-a-Service (IaaS)Storage Capacity (DMTF) Monitoring-as-a-Service (MaaS)Data Protection and Partitioning What It Is? Software-as-a-Service (SaaS)NAS DMTK Working Groups Associated with Platform-as-a-Service (PaaS)SAN Cloud Computing Benefits and Limitations of CloudCAS Standards for Application Developers ComputingRedundancy Protocols BenefitsReplication Scripting Languages LimitationsMultisiting Content Formatting Standards and Cloud Computing Case StudiesBackup and Recovery Languages How Companies Are Using CloudServer Software Environments that Support Standards for Security in the Cloud ComputingCloud Computing Confidentiality, Integrity, Availability Implementing Applications and Services inServer Capacity Authentication, Authorization, the CloudVirtualization Accountability Using Your Company's Services vs. theClustering Regulations for Privacy Cloud ProviderExpansion Security Protocols A Cloud Service Provider IntroducedServer Functions Establishing a Baseline for Cloud Cloud Computing Risks and Issues Application Performance Products and Services Provided by CloudWeb Best Practices for Selecting a Vendor Computing Companies Database and Implementing Cloud-Based OperationalVendor Approaches to Cloud Computing Applications EconomicRole of Open Source Software in Data Choosing the Right Vendor StaffingCenter Implementing Cloud-Based Applications Should Your Company Invest in CloudCost Reduction vs. Reliability Citrix Computing?Open Source Server Software Windows Remote Desktop What Should Not be Moved to the Cloud Open Source Database Software Vnc Virtualization in Mainframe ArchitecturesOpen Source Applications Software Web Browsers and Operating SystemsOpen Source System Management Software Server Extensions LANs and the CloudOpen Source Load-Balancing Software Thin Clients Internet and the CloudThe Hypervisor Smart Phones, Pads, Pods, etc. Web Services, Browsers, and the CloudVirtualization as the "Operating System" Virtual Terminal Security Strengths and Thin Client

Page 67: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization with a Host Operating System Weaknesses Advances in Networking and ProcessingVirtualization Infections on Virtualized Strengths Speeds that Led to Cloud ComputingEnvironments Weaknesses Networking DevelopmentsType 1 Virtualized Environment iPhone Increased Processing SpeedsType 2 Virtualized Environment Android Managed Service Provider Model to CloudVirtualization Environments BlackBerry Computing and Software as a ServiceMicrosoft Virtualization Windows Mobile (SaaS)Sun xVM VirtualBox Ubuntu Mobile Internet Device Single Purpose Architectures Migrate toLinux/UNIX Virtualization Mobile Platform Virtualization Multipurpose ArchitecturesVMware Products Kernel-Based Virtual Machine Data Center VirtualizationData Center and Cloud Infrastructure VMware Mobile Virtualization Platform CollaborationProducts Collaboration Applications for Mobile The Cloud as a Reach ExtenderEnd-User and Desktop Products Platforms The Cloud as a Communication EnablerIBM Virtualization Text Messaging The Cloud as an Employee EnablerUsing VMware to see a Virtualized Server iPhone Applications Service-Oriented Architecture (SOA)Environment BlackBerry Applications Evolving from SOA to the CloudWhat It Is Droid Applications Capacity: Limited PerformancePermissive Federation Availability: Communications Failure andVerified Federation Performance IssuesEncrypted Federation line Security: Newer Security Protocols ProvideTrusted Federation Cloud Computing Defined More ProtectionUsing XMPP in the Federated Environment Cloud Computing Architecture What's Next in Cloud Computing Presence in the Cloud Cloud Computing Terms Using Industry and International StandardsWhat It Is Communication-as-a-Service (CaaS) Independent ComponentsPresence Protocols Infrastructure-as-a-Service (IaaS) Message BaseLeveraging Presence Monitoring-as-a-Service (MaaS) Location IndependencePresence Enabled Software-as-a-Service (SaaS) Communication Requirements for CloudThe Future of Presence Platform-as-a-Service (PaaS) ImplementationThe Interrelation of Identity, Presence, and Benefits and Limitations of Cloud Public InternetLocation in the Cloud Computing Private InternetIdentity Management Benefits Routing to the DatacenterWhat It Is Limitations Switching within the Data CenterFuture of Identity in the Cloud Cloud Computing Case Studies BandwidthPrivacy and Its Relation to Cloud-Based How Companies Are Using Cloud Tools Used to Measure NetworkInformation Systems Computing PerformancePersonal Information Implementing Applications and Services Using the Protocol Analyzer to MeasurePrivacy-Related Issues in the Cloud BandwidthFinding Your Private Information Using Your Company's Services vs. the Using Ping and Traceroute to MeasureWhat It Is Cloud Provider Network PerformanceOpen Cloud Consortium Working Groups A Cloud Service Provider Introduced SecurityProject Matsu Cloud Computing Risks and Issues SSLProject Comet Products and Services Provided by Cloud VPNHPC in the Cloud Computing Companies OverheadThe Open Cloud Testbed Operational Storage Options for Cloud ComputingThe Open Science Data Cloud Economic Storage CapacityIntercloud Testbed Staffing Data Protection and PartitioningReporting on an Open Cloud Consortium Should Your Company Invest in Cloud NASWorking Group Computing? SANDistributed Management Task Force What Should Not be Moved to the Cloud CAS(DMTF) Virtualization in Mainframe Architectures RedundancyWhat It Is? and Operating Systems ReplicationDMTK Working Groups Associated with LANs and the Cloud MultisitingCloud Computing Internet and the Cloud Backup and RecoveryStandards for Application Developers Web Services, Browsers, and the Cloud Server Software Environments thatProtocols Thin Client Support Cloud ComputingScripting Languages Advances in Networking and Processing Server CapacityContent Formatting Standards and Speeds that Led to Cloud Computing VirtualizationLanguages Networking Developments ClusteringStandards for Security in the Cloud Increased Processing Speeds ExpansionConfidentiality, Integrity, Availability Managed Service Provider Model to Server FunctionsAuthentication, Authorization, Accountability Cloud Computing and Software as a ApplicationRegulations for Privacy Service (SaaS) WebSecurity Protocols Single Purpose Architectures Migrate to DatabaseEstablishing a Baseline for Cloud Multipurpose Architectures Vendor Approaches to Cloud ComputingPerformance Data Center Virtualization Role of Open Source Software in DataBest Practices for Selecting a Vendor and Collaboration Center

Page 68: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Implementing Cloud-Based Applications The Cloud as a Reach Extender Cost Reduction vs. ReliabilityChoosing the Right Vendor The Cloud as a Communication Enabler Open Source Server SoftwareImplementing Cloud-Based Applications The Cloud as an Employee Enabler Open Source Database SoftwareCitrix Service-Oriented Architecture (SOA) Open Source Applications SoftwareWindows Remote Desktop Evolving from SOA to the Cloud Open Source System ManagementVnc Capacity: Limited Performance SoftwareWeb Browsers Availability: Communications Failure and Open Source Load-Balancing Software Server Extensions Performance Issues The HypervisorThin Clients Security: Newer Security Protocols Virtualization as the "Operating System"Smart Phones, Pads, Pods, etc. Provide More Protection Virtualization with a Host OperatingVirtual Terminal Security Strengths and What's Next in Cloud Computing SystemWeaknesses Using Industry and International Virtualization Infections on VirtualizedStrengths Standards EnvironmentsWeaknesses Independent Components Type 1 Virtualized EnvironmentiPhone Message Base Type 2 Virtualized EnvironmentAndroid Location Independence Virtualization EnvironmentsBlackBerry Communication Requirements for Cloud Microsoft VirtualizationWindows Mobile Implementation Sun xVM VirtualBoxUbuntu Mobile Internet Device Public Internet Linux/UNIX VirtualizationMobile Platform Virtualization Private Internet VMware ProductsKernel-Based Virtual Machine Routing to the Datacenter Data Center and Cloud InfrastructureVMware Mobile Virtualization Platform Switching within the Data Center ProductsCollaboration Applications for Mobile Bandwidth End-User and Desktop ProductsPlatforms Tools Used to Measure Network IBM VirtualizationText Messaging Performance Using VMware to see a Virtualized ServeriPhone Applications Using the Protocol Analyzer to Measure Environment BlackBerry Applications Bandwidth What It IsDroid Applications Using Ping and Traceroute to Measure Permissive Federation

Network Performance Verified FederationSecurity Encrypted Federation

line SSL Trusted FederationCloud Computing Defined VPN Using XMPP in the Federated EnvironmentCloud Computing Architecture Overhead Presence in the CloudCloud Computing Terms Storage Options for Cloud Computing What It IsCommunication-as-a-Service (CaaS) Storage Capacity Presence ProtocolsInfrastructure-as-a-Service (IaaS) Data Protection and Partitioning Leveraging PresenceMonitoring-as-a-Service (MaaS) NAS Presence EnabledSoftware-as-a-Service (SaaS) SAN The Future of PresencePlatform-as-a-Service (PaaS) CAS The Interrelation of Identity, Presence, andBenefits and Limitations of Cloud Computing Redundancy Location in the CloudBenefits Replication Identity ManagementLimitations Multisiting What It IsCloud Computing Case Studies Backup and Recovery Future of Identity in the CloudHow Companies Are Using Cloud Server Software Environments that Privacy and Its Relation to Cloud-BasedComputing Support Cloud Computing Information SystemsImplementing Applications and Services in Server Capacity Personal Informationthe Cloud Virtualization Privacy-Related IssuesUsing Your Company's Services vs. the Clustering Finding Your Private Information Cloud Provider Expansion What It IsA Cloud Service Provider Introduced Server Functions Open Cloud Consortium Working GroupsCloud Computing Risks and Issues Application Project MatsuProducts and Services Provided by Cloud Web Project CometComputing Companies Database HPC in the CloudOperational Vendor Approaches to Cloud Computing The Open Cloud TestbedEconomic Role of Open Source Software in Data The Open Science Data CloudStaffing Center Intercloud TestbedShould Your Company Invest in Cloud Cost Reduction vs. Reliability Reporting on an Open Cloud ConsortiumComputing? Open Source Server Software Working GroupWhat Should Not be Moved to the Cloud Open Source Database Software Distributed Management Task ForceVirtualization in Mainframe Architectures Open Source Applications Software (DMTF)and Operating Systems Open Source System Management What It Is?LANs and the Cloud Software DMTK Working Groups Associated withInternet and the Cloud Open Source Load-Balancing Software Cloud ComputingWeb Services, Browsers, and the Cloud The Hypervisor Standards for Application DevelopersThin Client Virtualization as the "Operating System" ProtocolsAdvances in Networking and Processing Virtualization with a Host Operating Scripting Languages

Page 69: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Speeds that Led to Cloud Computing System Content Formatting Standards andNetworking Developments Virtualization Infections on Virtualized LanguagesIncreased Processing Speeds Environments Standards for Security in the CloudManaged Service Provider Model to Cloud Type 1 Virtualized Environment Confidentiality, Integrity, AvailabilityComputing and Software as a Service Type 2 Virtualized Environment Authentication, Authorization,(SaaS) Virtualization Environments AccountabilitySingle Purpose Architectures Migrate to Microsoft Virtualization Regulations for PrivacyMultipurpose Architectures Sun xVM VirtualBox Security ProtocolsData Center Virtualization Linux/UNIX Virtualization Establishing a Baseline for CloudCollaboration VMware Products PerformanceThe Cloud as a Reach Extender Data Center and Cloud Infrastructure Best Practices for Selecting a Vendor andThe Cloud as a Communication Enabler Products Implementing Cloud-Based ApplicationsThe Cloud as an Employee Enabler End-User and Desktop Products Choosing the Right VendorService-Oriented Architecture (SOA) IBM Virtualization Implementing Cloud-Based Applications Evolving from SOA to the Cloud Using VMware to see a Virtualized Server CitrixCapacity: Limited Performance Environment Windows Remote DesktopAvailability: Communications Failure and What It Is VncPerformance Issues Permissive Federation Web BrowsersSecurity: Newer Security Protocols Provide Verified Federation Server ExtensionsMore Protection Encrypted Federation Thin ClientsWhat's Next in Cloud Computing Trusted Federation Smart Phones, Pads, Pods, etc.Using Industry and International Standards Using XMPP in the Federated Virtual Terminal Security Strengths andIndependent Components Environment WeaknessesMessage Base Presence in the Cloud StrengthsLocation Independence What It Is Weaknesses Communication Requirements for Cloud Presence Protocols iPhoneImplementation Leveraging Presence AndroidPublic Internet Presence Enabled BlackBerryPrivate Internet The Future of Presence Windows MobileRouting to the Datacenter The Interrelation of Identity, Presence, Ubuntu Mobile Internet DeviceSwitching within the Data Center and Location in the Cloud Mobile Platform VirtualizationBandwidth Identity Management Kernel-Based Virtual MachineTools Used to Measure Network What It Is VMware Mobile Virtualization PlatformPerformance Future of Identity in the Cloud Collaboration Applications for MobileUsing the Protocol Analyzer to Measure Privacy and Its Relation to Cloud-Based PlatformsBandwidth Information Systems Text MessagingUsing Ping and Traceroute to Measure Personal Information iPhone ApplicationsNetwork Performance Privacy-Related Issues BlackBerry ApplicationsSecurity Finding Your Private Information Droid Applications SSL What It IsVPN Open Cloud Consortium Working GroupsOverhead Project Matsu lineStorage Options for Cloud Computing Project Comet Cloud Computing DefinedStorage Capacity HPC in the Cloud Cloud Computing ArchitectureData Protection and Partitioning The Open Cloud Testbed Cloud Computing TermsNAS The Open Science Data Cloud Communication-as-a-Service (CaaS)SAN Intercloud Testbed Infrastructure-as-a-Service (IaaS)CAS Reporting on an Open Cloud Consortium Monitoring-as-a-Service (MaaS)Redundancy Working Group Software-as-a-Service (SaaS)Replication Distributed Management Task Force Platform-as-a-Service (PaaS)Multisiting (DMTF) Benefits and Limitations of CloudBackup and Recovery What It Is? ComputingServer Software Environments that Support DMTK Working Groups Associated with BenefitsCloud Computing Cloud Computing LimitationsServer Capacity Standards for Application Developers Cloud Computing Case StudiesVirtualization Protocols How Companies Are Using CloudClustering Scripting Languages ComputingExpansion Content Formatting Standards and Implementing Applications and Services inServer Functions Languages the CloudApplication Standards for Security in the Cloud Using Your Company's Services vs. theWeb Confidentiality, Integrity, Availability Cloud ProviderDatabase Authentication, Authorization, A Cloud Service Provider IntroducedVendor Approaches to Cloud Computing Accountability Cloud Computing Risks and Issues Role of Open Source Software in Data Regulations for Privacy Products and Services Provided by CloudCenter Security Protocols Computing Companies Cost Reduction vs. Reliability Establishing a Baseline for Cloud Operational

Page 70: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Open Source Server Software Performance EconomicOpen Source Database Software Best Practices for Selecting a Vendor StaffingOpen Source Applications Software and Implementing Cloud-Based Should Your Company Invest in CloudOpen Source System Management Software Applications Computing?Open Source Load-Balancing Software Choosing the Right Vendor What Should Not be Moved to the Cloud The Hypervisor Implementing Cloud-Based Applications Virtualization in Mainframe ArchitecturesVirtualization as the "Operating System" Citrix and Operating SystemsVirtualization with a Host Operating System Windows Remote Desktop LANs and the CloudVirtualization Infections on Virtualized Vnc Internet and the CloudEnvironments Web Browsers Web Services, Browsers, and the CloudType 1 Virtualized Environment Server Extensions Thin ClientType 2 Virtualized Environment Thin Clients Advances in Networking and ProcessingVirtualization Environments Smart Phones, Pads, Pods, etc. Speeds that Led to Cloud ComputingMicrosoft Virtualization Virtual Terminal Security Strengths and Networking DevelopmentsSun xVM VirtualBox Weaknesses Increased Processing SpeedsLinux/UNIX Virtualization Strengths Managed Service Provider Model to CloudVMware Products Weaknesses Computing and Software as a ServiceData Center and Cloud Infrastructure iPhone (SaaS)Products Android Single Purpose Architectures Migrate toEnd-User and Desktop Products BlackBerry Multipurpose ArchitecturesIBM Virtualization Windows Mobile Data Center VirtualizationUsing VMware to see a Virtualized Server Ubuntu Mobile Internet Device CollaborationEnvironment Mobile Platform Virtualization The Cloud as a Reach ExtenderWhat It Is Kernel-Based Virtual Machine The Cloud as a Communication EnablerPermissive Federation VMware Mobile Virtualization Platform The Cloud as an Employee EnablerVerified Federation Collaboration Applications for Mobile Service-Oriented Architecture (SOA)Encrypted Federation Platforms Evolving from SOA to the CloudTrusted Federation Text Messaging Capacity: Limited PerformanceUsing XMPP in the Federated Environment iPhone Applications Availability: Communications Failure andPresence in the Cloud BlackBerry Applications Performance IssuesWhat It Is Droid Applications Security: Newer Security Protocols ProvidePresence Protocols More ProtectionLeveraging Presence What's Next in Cloud Computing Presence Enabled line Using Industry and International StandardsThe Future of Presence Cloud Computing Defined Independent ComponentsThe Interrelation of Identity, Presence, and Cloud Computing Architecture Message BaseLocation in the Cloud Cloud Computing Terms Location IndependenceIdentity Management Communication-as-a-Service (CaaS) Communication Requirements for CloudWhat It Is Infrastructure-as-a-Service (IaaS) ImplementationFuture of Identity in the Cloud Monitoring-as-a-Service (MaaS) Public InternetPrivacy and Its Relation to Cloud-Based Software-as-a-Service (SaaS) Private InternetInformation Systems Platform-as-a-Service (PaaS) Routing to the DatacenterPersonal Information Benefits and Limitations of Cloud Switching within the Data CenterPrivacy-Related Issues Computing BandwidthFinding Your Private Information Benefits Tools Used to Measure NetworkWhat It Is Limitations PerformanceOpen Cloud Consortium Working Groups Cloud Computing Case Studies Using the Protocol Analyzer to MeasureProject Matsu How Companies Are Using Cloud BandwidthProject Comet Computing Using Ping and Traceroute to MeasureHPC in the Cloud Implementing Applications and Services Network PerformanceThe Open Cloud Testbed in the Cloud SecurityThe Open Science Data Cloud Using Your Company's Services vs. the SSLIntercloud Testbed Cloud Provider VPNReporting on an Open Cloud Consortium A Cloud Service Provider Introduced OverheadWorking Group Cloud Computing Risks and Issues Storage Options for Cloud ComputingDistributed Management Task Force Products and Services Provided by Cloud Storage Capacity(DMTF) Computing Companies Data Protection and PartitioningWhat It Is? Operational NASDMTK Working Groups Associated with Economic SANCloud Computing Staffing CASStandards for Application Developers Should Your Company Invest in Cloud RedundancyProtocols Computing? ReplicationScripting Languages What Should Not be Moved to the Cloud MultisitingContent Formatting Standards and Virtualization in Mainframe Architectures Backup and RecoveryLanguages and Operating Systems Server Software Environments thatStandards for Security in the Cloud LANs and the Cloud Support Cloud Computing

Page 71: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Confidentiality, Integrity, Availability Internet and the Cloud Server CapacityAuthentication, Authorization, Accountability Web Services, Browsers, and the Cloud VirtualizationRegulations for Privacy Thin Client ClusteringSecurity Protocols Advances in Networking and Processing ExpansionEstablishing a Baseline for Cloud Speeds that Led to Cloud Computing Server FunctionsPerformance Networking Developments ApplicationBest Practices for Selecting a Vendor and Increased Processing Speeds WebImplementing Cloud-Based Applications Managed Service Provider Model to DatabaseChoosing the Right Vendor Cloud Computing and Software as a Vendor Approaches to Cloud ComputingImplementing Cloud-Based Applications Service (SaaS) Role of Open Source Software in DataCitrix Single Purpose Architectures Migrate to CenterWindows Remote Desktop Multipurpose Architectures Cost Reduction vs. ReliabilityVnc Data Center Virtualization Open Source Server SoftwareWeb Browsers Collaboration Open Source Database SoftwareServer Extensions The Cloud as a Reach Extender Open Source Applications SoftwareThin Clients The Cloud as a Communication Enabler Open Source System ManagementSmart Phones, Pads, Pods, etc. The Cloud as an Employee Enabler SoftwareVirtual Terminal Security Strengths and Service-Oriented Architecture (SOA) Open Source Load-Balancing Software Weaknesses Evolving from SOA to the Cloud The HypervisorStrengths Capacity: Limited Performance Virtualization as the "Operating System"Weaknesses Availability: Communications Failure and Virtualization with a Host OperatingiPhone Performance Issues SystemAndroid Security: Newer Security Protocols Virtualization Infections on VirtualizedBlackBerry Provide More Protection EnvironmentsWindows Mobile What's Next in Cloud Computing Type 1 Virtualized EnvironmentUbuntu Mobile Internet Device Using Industry and International Type 2 Virtualized EnvironmentMobile Platform Virtualization Standards Virtualization EnvironmentsKernel-Based Virtual Machine Independent Components Microsoft VirtualizationVMware Mobile Virtualization Platform Message Base Sun xVM VirtualBoxCollaboration Applications for Mobile Location Independence Linux/UNIX VirtualizationPlatforms Communication Requirements for Cloud VMware ProductsText Messaging Implementation Data Center and Cloud InfrastructureiPhone Applications Public Internet ProductsBlackBerry Applications Private Internet End-User and Desktop ProductsDroid Applications Routing to the Datacenter IBM Virtualization

Switching within the Data Center Using VMware to see a Virtualized ServerBandwidth Environment

line Tools Used to Measure Network What It IsCloud Computing Defined Performance Permissive FederationCloud Computing Architecture Using the Protocol Analyzer to Measure Verified FederationCloud Computing Terms Bandwidth Encrypted FederationCommunication-as-a-Service (CaaS) Using Ping and Traceroute to Measure Trusted FederationInfrastructure-as-a-Service (IaaS) Network Performance Using XMPP in the Federated EnvironmentMonitoring-as-a-Service (MaaS) Security Presence in the CloudSoftware-as-a-Service (SaaS) SSL What It IsPlatform-as-a-Service (PaaS) VPN Presence ProtocolsBenefits and Limitations of Cloud Computing Overhead Leveraging PresenceBenefits Storage Options for Cloud Computing Presence EnabledLimitations Storage Capacity The Future of PresenceCloud Computing Case Studies Data Protection and Partitioning The Interrelation of Identity, Presence, andHow Companies Are Using Cloud NAS Location in the CloudComputing SAN Identity ManagementImplementing Applications and Services in CAS What It Isthe Cloud Redundancy Future of Identity in the CloudUsing Your Company's Services vs. the Replication Privacy and Its Relation to Cloud-BasedCloud Provider Multisiting Information SystemsA Cloud Service Provider Introduced Backup and Recovery Personal InformationCloud Computing Risks and Issues Server Software Environments that Privacy-Related IssuesProducts and Services Provided by Cloud Support Cloud Computing Finding Your Private Information Computing Companies Server Capacity What It IsOperational Virtualization Open Cloud Consortium Working GroupsEconomic Clustering Project MatsuStaffing Expansion Project CometShould Your Company Invest in Cloud Server Functions HPC in the CloudComputing? Application The Open Cloud TestbedWhat Should Not be Moved to the Cloud Web The Open Science Data Cloud

Page 72: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization in Mainframe Architectures Database Intercloud Testbedand Operating Systems Vendor Approaches to Cloud Computing Reporting on an Open Cloud ConsortiumLANs and the Cloud Role of Open Source Software in Data Working GroupInternet and the Cloud Center Distributed Management Task ForceWeb Services, Browsers, and the Cloud Cost Reduction vs. Reliability (DMTF)Thin Client Open Source Server Software What It Is?Advances in Networking and Processing Open Source Database Software DMTK Working Groups Associated withSpeeds that Led to Cloud Computing Open Source Applications Software Cloud ComputingNetworking Developments Open Source System Management Standards for Application DevelopersIncreased Processing Speeds Software ProtocolsManaged Service Provider Model to Cloud Open Source Load-Balancing Software Scripting LanguagesComputing and Software as a Service The Hypervisor Content Formatting Standards and(SaaS) Virtualization as the "Operating System" LanguagesSingle Purpose Architectures Migrate to Virtualization with a Host Operating Standards for Security in the CloudMultipurpose Architectures System Confidentiality, Integrity, AvailabilityData Center Virtualization Virtualization Infections on Virtualized Authentication, Authorization,Collaboration Environments AccountabilityThe Cloud as a Reach Extender Type 1 Virtualized Environment Regulations for PrivacyThe Cloud as a Communication Enabler Type 2 Virtualized Environment Security ProtocolsThe Cloud as an Employee Enabler Virtualization Environments Establishing a Baseline for CloudService-Oriented Architecture (SOA) Microsoft Virtualization PerformanceEvolving from SOA to the Cloud Sun xVM VirtualBox Best Practices for Selecting a Vendor andCapacity: Limited Performance Linux/UNIX Virtualization Implementing Cloud-Based ApplicationsAvailability: Communications Failure and VMware Products Choosing the Right VendorPerformance Issues Data Center and Cloud Infrastructure Implementing Cloud-Based Applications Security: Newer Security Protocols Provide Products CitrixMore Protection End-User and Desktop Products Windows Remote DesktopWhat's Next in Cloud Computing IBM Virtualization VncUsing Industry and International Standards Using VMware to see a Virtualized Server Web BrowsersIndependent Components Environment Server ExtensionsMessage Base What It Is Thin ClientsLocation Independence Permissive Federation Smart Phones, Pads, Pods, etc.Communication Requirements for Cloud Verified Federation Virtual Terminal Security Strengths andImplementation Encrypted Federation WeaknessesPublic Internet Trusted Federation StrengthsPrivate Internet Using XMPP in the Federated Weaknesses Routing to the Datacenter Environment iPhoneSwitching within the Data Center Presence in the Cloud AndroidBandwidth What It Is BlackBerryTools Used to Measure Network Presence Protocols Windows MobilePerformance Leveraging Presence Ubuntu Mobile Internet DeviceUsing the Protocol Analyzer to Measure Presence Enabled Mobile Platform VirtualizationBandwidth The Future of Presence Kernel-Based Virtual MachineUsing Ping and Traceroute to Measure The Interrelation of Identity, Presence, VMware Mobile Virtualization PlatformNetwork Performance and Location in the Cloud Collaboration Applications for MobileSecurity Identity Management PlatformsSSL What It Is Text MessagingVPN Future of Identity in the Cloud iPhone ApplicationsOverhead Privacy and Its Relation to Cloud-Based BlackBerry ApplicationsStorage Options for Cloud Computing Information Systems Droid Applications Storage Capacity Personal InformationData Protection and Partitioning Privacy-Related IssuesNAS Finding Your Private Information lineSAN What It Is Cloud Computing DefinedCAS Open Cloud Consortium Working Groups Cloud Computing ArchitectureRedundancy Project Matsu Cloud Computing TermsReplication Project Comet Communication-as-a-Service (CaaS)Multisiting HPC in the Cloud Infrastructure-as-a-Service (IaaS)Backup and Recovery The Open Cloud Testbed Monitoring-as-a-Service (MaaS)Server Software Environments that Support The Open Science Data Cloud Software-as-a-Service (SaaS)Cloud Computing Intercloud Testbed Platform-as-a-Service (PaaS)Server Capacity Reporting on an Open Cloud Consortium Benefits and Limitations of CloudVirtualization Working Group ComputingClustering Distributed Management Task Force BenefitsExpansion (DMTF) LimitationsServer Functions What It Is? Cloud Computing Case Studies

Page 73: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Application DMTK Working Groups Associated with How Companies Are Using CloudWeb Cloud Computing ComputingDatabase Standards for Application Developers Implementing Applications and Services inVendor Approaches to Cloud Computing Protocols the CloudRole of Open Source Software in Data Scripting Languages Using Your Company's Services vs. theCenter Content Formatting Standards and Cloud ProviderCost Reduction vs. Reliability Languages A Cloud Service Provider IntroducedOpen Source Server Software Standards for Security in the Cloud Cloud Computing Risks and Issues Open Source Database Software Confidentiality, Integrity, Availability Products and Services Provided by CloudOpen Source Applications Software Authentication, Authorization, Computing Companies Open Source System Management Software Accountability OperationalOpen Source Load-Balancing Software Regulations for Privacy EconomicThe Hypervisor Security Protocols StaffingVirtualization as the "Operating System" Establishing a Baseline for Cloud Should Your Company Invest in CloudVirtualization with a Host Operating System Performance Computing?Virtualization Infections on Virtualized Best Practices for Selecting a Vendor What Should Not be Moved to the Cloud Environments and Implementing Cloud-Based Virtualization in Mainframe ArchitecturesType 1 Virtualized Environment Applications and Operating SystemsType 2 Virtualized Environment Choosing the Right Vendor LANs and the CloudVirtualization Environments Implementing Cloud-Based Applications Internet and the CloudMicrosoft Virtualization Citrix Web Services, Browsers, and the CloudSun xVM VirtualBox Windows Remote Desktop Thin ClientLinux/UNIX Virtualization Vnc Advances in Networking and ProcessingVMware Products Web Browsers Speeds that Led to Cloud ComputingData Center and Cloud Infrastructure Server Extensions Networking DevelopmentsProducts Thin Clients Increased Processing SpeedsEnd-User and Desktop Products Smart Phones, Pads, Pods, etc. Managed Service Provider Model to CloudIBM Virtualization Virtual Terminal Security Strengths and Computing and Software as a ServiceUsing VMware to see a Virtualized Server Weaknesses (SaaS)Environment Strengths Single Purpose Architectures Migrate toWhat It Is Weaknesses Multipurpose ArchitecturesPermissive Federation iPhone Data Center VirtualizationVerified Federation Android CollaborationEncrypted Federation BlackBerry The Cloud as a Reach ExtenderTrusted Federation Windows Mobile The Cloud as a Communication EnablerUsing XMPP in the Federated Environment Ubuntu Mobile Internet Device The Cloud as an Employee EnablerPresence in the Cloud Mobile Platform Virtualization Service-Oriented Architecture (SOA)What It Is Kernel-Based Virtual Machine Evolving from SOA to the CloudPresence Protocols VMware Mobile Virtualization Platform Capacity: Limited PerformanceLeveraging Presence Collaboration Applications for Mobile Availability: Communications Failure andPresence Enabled Platforms Performance IssuesThe Future of Presence Text Messaging Security: Newer Security Protocols ProvideThe Interrelation of Identity, Presence, and iPhone Applications More ProtectionLocation in the Cloud BlackBerry Applications What's Next in Cloud Computing Identity Management Droid Applications Using Industry and International StandardsWhat It Is Independent ComponentsFuture of Identity in the Cloud Message BasePrivacy and Its Relation to Cloud-Based line Location IndependenceInformation Systems Cloud Computing Defined Communication Requirements for CloudPersonal Information Cloud Computing Architecture ImplementationPrivacy-Related Issues Cloud Computing Terms Public InternetFinding Your Private Information Communication-as-a-Service (CaaS) Private InternetWhat It Is Infrastructure-as-a-Service (IaaS) Routing to the DatacenterOpen Cloud Consortium Working Groups Monitoring-as-a-Service (MaaS) Switching within the Data CenterProject Matsu Software-as-a-Service (SaaS) BandwidthProject Comet Platform-as-a-Service (PaaS) Tools Used to Measure NetworkHPC in the Cloud Benefits and Limitations of Cloud PerformanceThe Open Cloud Testbed Computing Using the Protocol Analyzer to MeasureThe Open Science Data Cloud Benefits BandwidthIntercloud Testbed Limitations Using Ping and Traceroute to MeasureReporting on an Open Cloud Consortium Cloud Computing Case Studies Network PerformanceWorking Group How Companies Are Using Cloud SecurityDistributed Management Task Force Computing SSL(DMTF) Implementing Applications and Services VPNWhat It Is? in the Cloud OverheadDMTK Working Groups Associated with Using Your Company's Services vs. the Storage Options for Cloud Computing

Page 74: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Cloud Provider Storage CapacityStandards for Application Developers A Cloud Service Provider Introduced Data Protection and PartitioningProtocols Cloud Computing Risks and Issues NASScripting Languages Products and Services Provided by Cloud SANContent Formatting Standards and Computing Companies CASLanguages Operational RedundancyStandards for Security in the Cloud Economic ReplicationConfidentiality, Integrity, Availability Staffing MultisitingAuthentication, Authorization, Accountability Should Your Company Invest in Cloud Backup and RecoveryRegulations for Privacy Computing? Server Software Environments thatSecurity Protocols What Should Not be Moved to the Cloud Support Cloud ComputingEstablishing a Baseline for Cloud Virtualization in Mainframe Architectures Server CapacityPerformance and Operating Systems VirtualizationBest Practices for Selecting a Vendor and LANs and the Cloud ClusteringImplementing Cloud-Based Applications Internet and the Cloud ExpansionChoosing the Right Vendor Web Services, Browsers, and the Cloud Server FunctionsImplementing Cloud-Based Applications Thin Client ApplicationCitrix Advances in Networking and Processing WebWindows Remote Desktop Speeds that Led to Cloud Computing DatabaseVnc Networking Developments Vendor Approaches to Cloud ComputingWeb Browsers Increased Processing Speeds Role of Open Source Software in DataServer Extensions Managed Service Provider Model to CenterThin Clients Cloud Computing and Software as a Cost Reduction vs. ReliabilitySmart Phones, Pads, Pods, etc. Service (SaaS) Open Source Server SoftwareVirtual Terminal Security Strengths and Single Purpose Architectures Migrate to Open Source Database SoftwareWeaknesses Multipurpose Architectures Open Source Applications SoftwareStrengths Data Center Virtualization Open Source System ManagementWeaknesses Collaboration SoftwareiPhone The Cloud as a Reach Extender Open Source Load-Balancing Software Android The Cloud as a Communication Enabler The HypervisorBlackBerry The Cloud as an Employee Enabler Virtualization as the "Operating System"Windows Mobile Service-Oriented Architecture (SOA) Virtualization with a Host OperatingUbuntu Mobile Internet Device Evolving from SOA to the Cloud SystemMobile Platform Virtualization Capacity: Limited Performance Virtualization Infections on VirtualizedKernel-Based Virtual Machine Availability: Communications Failure and EnvironmentsVMware Mobile Virtualization Platform Performance Issues Type 1 Virtualized EnvironmentCollaboration Applications for Mobile Security: Newer Security Protocols Type 2 Virtualized EnvironmentPlatforms Provide More Protection Virtualization EnvironmentsText Messaging What's Next in Cloud Computing Microsoft VirtualizationiPhone Applications Using Industry and International Sun xVM VirtualBoxBlackBerry Applications Standards Linux/UNIX VirtualizationDroid Applications Independent Components VMware Products

Message Base Data Center and Cloud Infrastructure4. The Evolution of Cloud Computing Location Independence Productsline Communication Requirements for Cloud End-User and Desktop Products

Early Mainframe Environment Implementation IBM VirtualizationPublic Internet Using VMware to see a Virtualized ServerPrivate Internet Environment

line Routing to the Datacenter What It IsCloud Computing Defined Switching within the Data Center Permissive FederationCloud Computing Architecture Bandwidth Verified FederationCloud Computing Terms Tools Used to Measure Network Encrypted FederationCommunication-as-a-Service (CaaS) Performance Trusted FederationInfrastructure-as-a-Service (IaaS) Using the Protocol Analyzer to Measure Using XMPP in the Federated EnvironmentMonitoring-as-a-Service (MaaS) Bandwidth Presence in the CloudSoftware-as-a-Service (SaaS) Using Ping and Traceroute to Measure What It IsPlatform-as-a-Service (PaaS) Network Performance Presence ProtocolsBenefits and Limitations of Cloud Computing Security Leveraging PresenceBenefits SSL Presence EnabledLimitations VPN The Future of PresenceCloud Computing Case Studies Overhead The Interrelation of Identity, Presence, andHow Companies Are Using Cloud Storage Options for Cloud Computing Location in the CloudComputing Storage Capacity Identity ManagementImplementing Applications and Services in Data Protection and Partitioning What It Isthe Cloud NAS Future of Identity in the CloudUsing Your Company's Services vs. the SAN Privacy and Its Relation to Cloud-Based

Page 75: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Provider CAS Information SystemsA Cloud Service Provider Introduced Redundancy Personal InformationCloud Computing Risks and Issues Replication Privacy-Related IssuesProducts and Services Provided by Cloud Multisiting Finding Your Private Information Computing Companies Backup and Recovery What It IsOperational Server Software Environments that Open Cloud Consortium Working GroupsEconomic Support Cloud Computing Project MatsuStaffing Server Capacity Project CometShould Your Company Invest in Cloud Virtualization HPC in the CloudComputing? Clustering The Open Cloud TestbedWhat Should Not be Moved to the Cloud Expansion The Open Science Data CloudVirtualization in Mainframe Architectures Server Functions Intercloud Testbedand Operating Systems Application Reporting on an Open Cloud ConsortiumLANs and the Cloud Web Working GroupInternet and the Cloud Database Distributed Management Task ForceWeb Services, Browsers, and the Cloud Vendor Approaches to Cloud Computing (DMTF)Thin Client Role of Open Source Software in Data What It Is?Advances in Networking and Processing Center DMTK Working Groups Associated withSpeeds that Led to Cloud Computing Cost Reduction vs. Reliability Cloud ComputingNetworking Developments Open Source Server Software Standards for Application DevelopersIncreased Processing Speeds Open Source Database Software ProtocolsManaged Service Provider Model to Cloud Open Source Applications Software Scripting LanguagesComputing and Software as a Service Open Source System Management Content Formatting Standards and(SaaS) Software LanguagesSingle Purpose Architectures Migrate to Open Source Load-Balancing Software Standards for Security in the CloudMultipurpose Architectures The Hypervisor Confidentiality, Integrity, AvailabilityData Center Virtualization Virtualization as the "Operating System" Authentication, Authorization,Collaboration Virtualization with a Host Operating AccountabilityThe Cloud as a Reach Extender System Regulations for PrivacyThe Cloud as a Communication Enabler Virtualization Infections on Virtualized Security ProtocolsThe Cloud as an Employee Enabler Environments Establishing a Baseline for CloudService-Oriented Architecture (SOA) Type 1 Virtualized Environment PerformanceEvolving from SOA to the Cloud Type 2 Virtualized Environment Best Practices for Selecting a Vendor andCapacity: Limited Performance Virtualization Environments Implementing Cloud-Based ApplicationsAvailability: Communications Failure and Microsoft Virtualization Choosing the Right VendorPerformance Issues Sun xVM VirtualBox Implementing Cloud-Based Applications Security: Newer Security Protocols Provide Linux/UNIX Virtualization CitrixMore Protection VMware Products Windows Remote DesktopWhat's Next in Cloud Computing Data Center and Cloud Infrastructure VncUsing Industry and International Standards Products Web BrowsersIndependent Components End-User and Desktop Products Server ExtensionsMessage Base IBM Virtualization Thin ClientsLocation Independence Using VMware to see a Virtualized Server Smart Phones, Pads, Pods, etc.Communication Requirements for Cloud Environment Virtual Terminal Security Strengths andImplementation What It Is WeaknessesPublic Internet Permissive Federation StrengthsPrivate Internet Verified Federation Weaknesses Routing to the Datacenter Encrypted Federation iPhoneSwitching within the Data Center Trusted Federation AndroidBandwidth Using XMPP in the Federated BlackBerryTools Used to Measure Network Environment Windows MobilePerformance Presence in the Cloud Ubuntu Mobile Internet DeviceUsing the Protocol Analyzer to Measure What It Is Mobile Platform VirtualizationBandwidth Presence Protocols Kernel-Based Virtual MachineUsing Ping and Traceroute to Measure Leveraging Presence VMware Mobile Virtualization PlatformNetwork Performance Presence Enabled Collaboration Applications for MobileSecurity The Future of Presence PlatformsSSL The Interrelation of Identity, Presence, Text MessagingVPN and Location in the Cloud iPhone ApplicationsOverhead Identity Management BlackBerry ApplicationsStorage Options for Cloud Computing What It Is Droid Applications Storage Capacity Future of Identity in the CloudData Protection and Partitioning Privacy and Its Relation to Cloud-BasedNAS Information Systems lineSAN Personal Information Cloud Computing DefinedCAS Privacy-Related Issues Cloud Computing Architecture

Page 76: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Redundancy Finding Your Private Information Cloud Computing TermsReplication What It Is Communication-as-a-Service (CaaS)Multisiting Open Cloud Consortium Working Groups Infrastructure-as-a-Service (IaaS)Backup and Recovery Project Matsu Monitoring-as-a-Service (MaaS)Server Software Environments that Support Project Comet Software-as-a-Service (SaaS)Cloud Computing HPC in the Cloud Platform-as-a-Service (PaaS)Server Capacity The Open Cloud Testbed Benefits and Limitations of CloudVirtualization The Open Science Data Cloud ComputingClustering Intercloud Testbed BenefitsExpansion Reporting on an Open Cloud Consortium LimitationsServer Functions Working Group Cloud Computing Case StudiesApplication Distributed Management Task Force How Companies Are Using CloudWeb (DMTF) ComputingDatabase What It Is? Implementing Applications and Services inVendor Approaches to Cloud Computing DMTK Working Groups Associated with the CloudRole of Open Source Software in Data Cloud Computing Using Your Company's Services vs. theCenter Standards for Application Developers Cloud ProviderCost Reduction vs. Reliability Protocols A Cloud Service Provider IntroducedOpen Source Server Software Scripting Languages Cloud Computing Risks and Issues Open Source Database Software Content Formatting Standards and Products and Services Provided by CloudOpen Source Applications Software Languages Computing Companies Open Source System Management Software Standards for Security in the Cloud OperationalOpen Source Load-Balancing Software Confidentiality, Integrity, Availability EconomicThe Hypervisor Authentication, Authorization, StaffingVirtualization as the "Operating System" Accountability Should Your Company Invest in CloudVirtualization with a Host Operating System Regulations for Privacy Computing?Virtualization Infections on Virtualized Security Protocols What Should Not be Moved to the Cloud Environments Establishing a Baseline for Cloud Virtualization in Mainframe ArchitecturesType 1 Virtualized Environment Performance and Operating SystemsType 2 Virtualized Environment Best Practices for Selecting a Vendor LANs and the CloudVirtualization Environments and Implementing Cloud-Based Internet and the CloudMicrosoft Virtualization Applications Web Services, Browsers, and the CloudSun xVM VirtualBox Choosing the Right Vendor Thin ClientLinux/UNIX Virtualization Implementing Cloud-Based Applications Advances in Networking and ProcessingVMware Products Citrix Speeds that Led to Cloud ComputingData Center and Cloud Infrastructure Windows Remote Desktop Networking DevelopmentsProducts Vnc Increased Processing SpeedsEnd-User and Desktop Products Web Browsers Managed Service Provider Model to CloudIBM Virtualization Server Extensions Computing and Software as a ServiceUsing VMware to see a Virtualized Server Thin Clients (SaaS)Environment Smart Phones, Pads, Pods, etc. Single Purpose Architectures Migrate toWhat It Is Virtual Terminal Security Strengths and Multipurpose ArchitecturesPermissive Federation Weaknesses Data Center VirtualizationVerified Federation Strengths CollaborationEncrypted Federation Weaknesses The Cloud as a Reach ExtenderTrusted Federation iPhone The Cloud as a Communication EnablerUsing XMPP in the Federated Environment Android The Cloud as an Employee EnablerPresence in the Cloud BlackBerry Service-Oriented Architecture (SOA)What It Is Windows Mobile Evolving from SOA to the CloudPresence Protocols Ubuntu Mobile Internet Device Capacity: Limited PerformanceLeveraging Presence Mobile Platform Virtualization Availability: Communications Failure andPresence Enabled Kernel-Based Virtual Machine Performance IssuesThe Future of Presence VMware Mobile Virtualization Platform Security: Newer Security Protocols ProvideThe Interrelation of Identity, Presence, and Collaboration Applications for Mobile More ProtectionLocation in the Cloud Platforms What's Next in Cloud Computing Identity Management Text Messaging Using Industry and International StandardsWhat It Is iPhone Applications Independent ComponentsFuture of Identity in the Cloud BlackBerry Applications Message BasePrivacy and Its Relation to Cloud-Based Droid Applications Location IndependenceInformation Systems Communication Requirements for CloudPersonal Information ImplementationPrivacy-Related Issues line Public InternetFinding Your Private Information Cloud Computing Defined Private InternetWhat It Is Cloud Computing Architecture Routing to the DatacenterOpen Cloud Consortium Working Groups Cloud Computing Terms Switching within the Data CenterProject Matsu Communication-as-a-Service (CaaS) Bandwidth

Page 77: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Project Comet Infrastructure-as-a-Service (IaaS) Tools Used to Measure NetworkHPC in the Cloud Monitoring-as-a-Service (MaaS) PerformanceThe Open Cloud Testbed Software-as-a-Service (SaaS) Using the Protocol Analyzer to MeasureThe Open Science Data Cloud Platform-as-a-Service (PaaS) BandwidthIntercloud Testbed Benefits and Limitations of Cloud Using Ping and Traceroute to MeasureReporting on an Open Cloud Consortium Computing Network PerformanceWorking Group Benefits SecurityDistributed Management Task Force Limitations SSL(DMTF) Cloud Computing Case Studies VPNWhat It Is? How Companies Are Using Cloud OverheadDMTK Working Groups Associated with Computing Storage Options for Cloud ComputingCloud Computing Implementing Applications and Services Storage CapacityStandards for Application Developers in the Cloud Data Protection and PartitioningProtocols Using Your Company's Services vs. the NASScripting Languages Cloud Provider SANContent Formatting Standards and A Cloud Service Provider Introduced CASLanguages Cloud Computing Risks and Issues RedundancyStandards for Security in the Cloud Products and Services Provided by Cloud ReplicationConfidentiality, Integrity, Availability Computing Companies MultisitingAuthentication, Authorization, Accountability Operational Backup and RecoveryRegulations for Privacy Economic Server Software Environments thatSecurity Protocols Staffing Support Cloud ComputingEstablishing a Baseline for Cloud Should Your Company Invest in Cloud Server CapacityPerformance Computing? VirtualizationBest Practices for Selecting a Vendor and What Should Not be Moved to the Cloud ClusteringImplementing Cloud-Based Applications Virtualization in Mainframe Architectures ExpansionChoosing the Right Vendor and Operating Systems Server FunctionsImplementing Cloud-Based Applications LANs and the Cloud ApplicationCitrix Internet and the Cloud WebWindows Remote Desktop Web Services, Browsers, and the Cloud DatabaseVnc Thin Client Vendor Approaches to Cloud ComputingWeb Browsers Advances in Networking and Processing Role of Open Source Software in DataServer Extensions Speeds that Led to Cloud Computing CenterThin Clients Networking Developments Cost Reduction vs. ReliabilitySmart Phones, Pads, Pods, etc. Increased Processing Speeds Open Source Server SoftwareVirtual Terminal Security Strengths and Managed Service Provider Model to Open Source Database SoftwareWeaknesses Cloud Computing and Software as a Open Source Applications SoftwareStrengths Service (SaaS) Open Source System ManagementWeaknesses Single Purpose Architectures Migrate to SoftwareiPhone Multipurpose Architectures Open Source Load-Balancing Software Android Data Center Virtualization The HypervisorBlackBerry Collaboration Virtualization as the "Operating System"Windows Mobile The Cloud as a Reach Extender Virtualization with a Host OperatingUbuntu Mobile Internet Device The Cloud as a Communication Enabler SystemMobile Platform Virtualization The Cloud as an Employee Enabler Virtualization Infections on VirtualizedKernel-Based Virtual Machine Service-Oriented Architecture (SOA) EnvironmentsVMware Mobile Virtualization Platform Evolving from SOA to the Cloud Type 1 Virtualized EnvironmentCollaboration Applications for Mobile Capacity: Limited Performance Type 2 Virtualized EnvironmentPlatforms Availability: Communications Failure and Virtualization EnvironmentsText Messaging Performance Issues Microsoft VirtualizationiPhone Applications Security: Newer Security Protocols Sun xVM VirtualBoxBlackBerry Applications Provide More Protection Linux/UNIX VirtualizationDroid Applications What's Next in Cloud Computing VMware Products

Using Industry and International Data Center and Cloud InfrastructureStandards Products

line Independent Components End-User and Desktop ProductsCloud Computing Defined Message Base IBM VirtualizationCloud Computing Architecture Location Independence Using VMware to see a Virtualized ServerCloud Computing Terms Communication Requirements for Cloud Environment Communication-as-a-Service (CaaS) Implementation What It IsInfrastructure-as-a-Service (IaaS) Public Internet Permissive FederationMonitoring-as-a-Service (MaaS) Private Internet Verified FederationSoftware-as-a-Service (SaaS) Routing to the Datacenter Encrypted FederationPlatform-as-a-Service (PaaS) Switching within the Data Center Trusted FederationBenefits and Limitations of Cloud Computing Bandwidth Using XMPP in the Federated EnvironmentBenefits Tools Used to Measure Network Presence in the Cloud

Page 78: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Limitations Performance What It IsCloud Computing Case Studies Using the Protocol Analyzer to Measure Presence ProtocolsHow Companies Are Using Cloud Bandwidth Leveraging PresenceComputing Using Ping and Traceroute to Measure Presence EnabledImplementing Applications and Services in Network Performance The Future of Presencethe Cloud Security The Interrelation of Identity, Presence, andUsing Your Company's Services vs. the SSL Location in the CloudCloud Provider VPN Identity ManagementA Cloud Service Provider Introduced Overhead What It IsCloud Computing Risks and Issues Storage Options for Cloud Computing Future of Identity in the CloudProducts and Services Provided by Cloud Storage Capacity Privacy and Its Relation to Cloud-BasedComputing Companies Data Protection and Partitioning Information SystemsOperational NAS Personal InformationEconomic SAN Privacy-Related IssuesStaffing CAS Finding Your Private Information Should Your Company Invest in Cloud Redundancy What It IsComputing? Replication Open Cloud Consortium Working GroupsWhat Should Not be Moved to the Cloud Multisiting Project MatsuVirtualization in Mainframe Architectures Backup and Recovery Project Cometand Operating Systems Server Software Environments that HPC in the CloudLANs and the Cloud Support Cloud Computing The Open Cloud TestbedInternet and the Cloud Server Capacity The Open Science Data CloudWeb Services, Browsers, and the Cloud Virtualization Intercloud TestbedThin Client Clustering Reporting on an Open Cloud ConsortiumAdvances in Networking and Processing Expansion Working GroupSpeeds that Led to Cloud Computing Server Functions Distributed Management Task ForceNetworking Developments Application (DMTF)Increased Processing Speeds Web What It Is?Managed Service Provider Model to Cloud Database DMTK Working Groups Associated withComputing and Software as a Service Vendor Approaches to Cloud Computing Cloud Computing(SaaS) Role of Open Source Software in Data Standards for Application DevelopersSingle Purpose Architectures Migrate to Center ProtocolsMultipurpose Architectures Cost Reduction vs. Reliability Scripting LanguagesData Center Virtualization Open Source Server Software Content Formatting Standards andCollaboration Open Source Database Software LanguagesThe Cloud as a Reach Extender Open Source Applications Software Standards for Security in the CloudThe Cloud as a Communication Enabler Open Source System Management Confidentiality, Integrity, AvailabilityThe Cloud as an Employee Enabler Software Authentication, Authorization,Service-Oriented Architecture (SOA) Open Source Load-Balancing Software AccountabilityEvolving from SOA to the Cloud The Hypervisor Regulations for PrivacyCapacity: Limited Performance Virtualization as the "Operating System" Security ProtocolsAvailability: Communications Failure and Virtualization with a Host Operating Establishing a Baseline for CloudPerformance Issues System PerformanceSecurity: Newer Security Protocols Provide Virtualization Infections on Virtualized Best Practices for Selecting a Vendor andMore Protection Environments Implementing Cloud-Based ApplicationsWhat's Next in Cloud Computing Type 1 Virtualized Environment Choosing the Right VendorUsing Industry and International Standards Type 2 Virtualized Environment Implementing Cloud-Based Applications Independent Components Virtualization Environments CitrixMessage Base Microsoft Virtualization Windows Remote DesktopLocation Independence Sun xVM VirtualBox VncCommunication Requirements for Cloud Linux/UNIX Virtualization Web BrowsersImplementation VMware Products Server ExtensionsPublic Internet Data Center and Cloud Infrastructure Thin ClientsPrivate Internet Products Smart Phones, Pads, Pods, etc.Routing to the Datacenter End-User and Desktop Products Virtual Terminal Security Strengths andSwitching within the Data Center IBM Virtualization WeaknessesBandwidth Using VMware to see a Virtualized Server StrengthsTools Used to Measure Network Environment Weaknesses Performance What It Is iPhoneUsing the Protocol Analyzer to Measure Permissive Federation AndroidBandwidth Verified Federation BlackBerryUsing Ping and Traceroute to Measure Encrypted Federation Windows MobileNetwork Performance Trusted Federation Ubuntu Mobile Internet DeviceSecurity Using XMPP in the Federated Mobile Platform VirtualizationSSL Environment Kernel-Based Virtual MachineVPN Presence in the Cloud VMware Mobile Virtualization Platform

Page 79: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Overhead What It Is Collaboration Applications for MobileStorage Options for Cloud Computing Presence Protocols PlatformsStorage Capacity Leveraging Presence Text MessagingData Protection and Partitioning Presence Enabled iPhone ApplicationsNAS The Future of Presence BlackBerry ApplicationsSAN The Interrelation of Identity, Presence, Droid Applications CAS and Location in the CloudRedundancy Identity ManagementReplication What It Is lineMultisiting Future of Identity in the Cloud Cloud Computing DefinedBackup and Recovery Privacy and Its Relation to Cloud-Based Cloud Computing ArchitectureServer Software Environments that Support Information Systems Cloud Computing TermsCloud Computing Personal Information Communication-as-a-Service (CaaS)Server Capacity Privacy-Related Issues Infrastructure-as-a-Service (IaaS)Virtualization Finding Your Private Information Monitoring-as-a-Service (MaaS)Clustering What It Is Software-as-a-Service (SaaS)Expansion Open Cloud Consortium Working Groups Platform-as-a-Service (PaaS)Server Functions Project Matsu Benefits and Limitations of CloudApplication Project Comet ComputingWeb HPC in the Cloud BenefitsDatabase The Open Cloud Testbed LimitationsVendor Approaches to Cloud Computing The Open Science Data Cloud Cloud Computing Case StudiesRole of Open Source Software in Data Intercloud Testbed How Companies Are Using CloudCenter Reporting on an Open Cloud Consortium ComputingCost Reduction vs. Reliability Working Group Implementing Applications and Services inOpen Source Server Software Distributed Management Task Force the CloudOpen Source Database Software (DMTF) Using Your Company's Services vs. theOpen Source Applications Software What It Is? Cloud ProviderOpen Source System Management Software DMTK Working Groups Associated with A Cloud Service Provider IntroducedOpen Source Load-Balancing Software Cloud Computing Cloud Computing Risks and Issues The Hypervisor Standards for Application Developers Products and Services Provided by CloudVirtualization as the "Operating System" Protocols Computing Companies Virtualization with a Host Operating System Scripting Languages OperationalVirtualization Infections on Virtualized Content Formatting Standards and EconomicEnvironments Languages StaffingType 1 Virtualized Environment Standards for Security in the Cloud Should Your Company Invest in CloudType 2 Virtualized Environment Confidentiality, Integrity, Availability Computing?Virtualization Environments Authentication, Authorization, What Should Not be Moved to the Cloud Microsoft Virtualization Accountability Virtualization in Mainframe ArchitecturesSun xVM VirtualBox Regulations for Privacy and Operating SystemsLinux/UNIX Virtualization Security Protocols LANs and the CloudVMware Products Establishing a Baseline for Cloud Internet and the CloudData Center and Cloud Infrastructure Performance Web Services, Browsers, and the CloudProducts Best Practices for Selecting a Vendor Thin ClientEnd-User and Desktop Products and Implementing Cloud-Based Advances in Networking and ProcessingIBM Virtualization Applications Speeds that Led to Cloud ComputingUsing VMware to see a Virtualized Server Choosing the Right Vendor Networking DevelopmentsEnvironment Implementing Cloud-Based Applications Increased Processing SpeedsWhat It Is Citrix Managed Service Provider Model to CloudPermissive Federation Windows Remote Desktop Computing and Software as a ServiceVerified Federation Vnc (SaaS)Encrypted Federation Web Browsers Single Purpose Architectures Migrate toTrusted Federation Server Extensions Multipurpose ArchitecturesUsing XMPP in the Federated Environment Thin Clients Data Center VirtualizationPresence in the Cloud Smart Phones, Pads, Pods, etc. CollaborationWhat It Is Virtual Terminal Security Strengths and The Cloud as a Reach ExtenderPresence Protocols Weaknesses The Cloud as a Communication EnablerLeveraging Presence Strengths The Cloud as an Employee EnablerPresence Enabled Weaknesses Service-Oriented Architecture (SOA)The Future of Presence iPhone Evolving from SOA to the CloudThe Interrelation of Identity, Presence, and Android Capacity: Limited PerformanceLocation in the Cloud BlackBerry Availability: Communications Failure andIdentity Management Windows Mobile Performance IssuesWhat It Is Ubuntu Mobile Internet Device Security: Newer Security Protocols ProvideFuture of Identity in the Cloud Mobile Platform Virtualization More ProtectionPrivacy and Its Relation to Cloud-Based Kernel-Based Virtual Machine What's Next in Cloud Computing

Page 80: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Information Systems VMware Mobile Virtualization Platform Using Industry and International StandardsPersonal Information Collaboration Applications for Mobile Independent ComponentsPrivacy-Related Issues Platforms Message BaseFinding Your Private Information Text Messaging Location IndependenceWhat It Is iPhone Applications Communication Requirements for CloudOpen Cloud Consortium Working Groups BlackBerry Applications ImplementationProject Matsu Droid Applications Public InternetProject Comet Private InternetHPC in the Cloud Routing to the DatacenterThe Open Cloud Testbed line Switching within the Data CenterThe Open Science Data Cloud Cloud Computing Defined BandwidthIntercloud Testbed Cloud Computing Architecture Tools Used to Measure NetworkReporting on an Open Cloud Consortium Cloud Computing Terms PerformanceWorking Group Communication-as-a-Service (CaaS) Using the Protocol Analyzer to MeasureDistributed Management Task Force Infrastructure-as-a-Service (IaaS) Bandwidth(DMTF) Monitoring-as-a-Service (MaaS) Using Ping and Traceroute to MeasureWhat It Is? Software-as-a-Service (SaaS) Network PerformanceDMTK Working Groups Associated with Platform-as-a-Service (PaaS) SecurityCloud Computing Benefits and Limitations of Cloud SSLStandards for Application Developers Computing VPNProtocols Benefits OverheadScripting Languages Limitations Storage Options for Cloud ComputingContent Formatting Standards and Cloud Computing Case Studies Storage CapacityLanguages How Companies Are Using Cloud Data Protection and PartitioningStandards for Security in the Cloud Computing NASConfidentiality, Integrity, Availability Implementing Applications and Services SANAuthentication, Authorization, Accountability in the Cloud CASRegulations for Privacy Using Your Company's Services vs. the RedundancySecurity Protocols Cloud Provider ReplicationEstablishing a Baseline for Cloud A Cloud Service Provider Introduced MultisitingPerformance Cloud Computing Risks and Issues Backup and RecoveryBest Practices for Selecting a Vendor and Products and Services Provided by Cloud Server Software Environments thatImplementing Cloud-Based Applications Computing Companies Support Cloud ComputingChoosing the Right Vendor Operational Server CapacityImplementing Cloud-Based Applications Economic VirtualizationCitrix Staffing ClusteringWindows Remote Desktop Should Your Company Invest in Cloud ExpansionVnc Computing? Server FunctionsWeb Browsers What Should Not be Moved to the Cloud ApplicationServer Extensions Virtualization in Mainframe Architectures WebThin Clients and Operating Systems DatabaseSmart Phones, Pads, Pods, etc. LANs and the Cloud Vendor Approaches to Cloud ComputingVirtual Terminal Security Strengths and Internet and the Cloud Role of Open Source Software in DataWeaknesses Web Services, Browsers, and the Cloud CenterStrengths Thin Client Cost Reduction vs. ReliabilityWeaknesses Advances in Networking and Processing Open Source Server SoftwareiPhone Speeds that Led to Cloud Computing Open Source Database SoftwareAndroid Networking Developments Open Source Applications SoftwareBlackBerry Increased Processing Speeds Open Source System ManagementWindows Mobile Managed Service Provider Model to SoftwareUbuntu Mobile Internet Device Cloud Computing and Software as a Open Source Load-Balancing Software Mobile Platform Virtualization Service (SaaS) The HypervisorKernel-Based Virtual Machine Single Purpose Architectures Migrate to Virtualization as the "Operating System"VMware Mobile Virtualization Platform Multipurpose Architectures Virtualization with a Host OperatingCollaboration Applications for Mobile Data Center Virtualization SystemPlatforms Collaboration Virtualization Infections on VirtualizedText Messaging The Cloud as a Reach Extender EnvironmentsiPhone Applications The Cloud as a Communication Enabler Type 1 Virtualized EnvironmentBlackBerry Applications The Cloud as an Employee Enabler Type 2 Virtualized EnvironmentDroid Applications Service-Oriented Architecture (SOA) Virtualization Environments

Evolving from SOA to the Cloud Microsoft VirtualizationCapacity: Limited Performance Sun xVM VirtualBox

line Availability: Communications Failure and Linux/UNIX VirtualizationCloud Computing Defined Performance Issues VMware ProductsCloud Computing Architecture Security: Newer Security Protocols Data Center and Cloud InfrastructureCloud Computing Terms Provide More Protection Products

Page 81: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Communication-as-a-Service (CaaS) What's Next in Cloud Computing End-User and Desktop ProductsInfrastructure-as-a-Service (IaaS) Using Industry and International IBM VirtualizationMonitoring-as-a-Service (MaaS) Standards Using VMware to see a Virtualized ServerSoftware-as-a-Service (SaaS) Independent Components Environment Platform-as-a-Service (PaaS) Message Base What It IsBenefits and Limitations of Cloud Computing Location Independence Permissive FederationBenefits Communication Requirements for Cloud Verified FederationLimitations Implementation Encrypted FederationCloud Computing Case Studies Public Internet Trusted FederationHow Companies Are Using Cloud Private Internet Using XMPP in the Federated EnvironmentComputing Routing to the Datacenter Presence in the CloudImplementing Applications and Services in Switching within the Data Center What It Isthe Cloud Bandwidth Presence ProtocolsUsing Your Company's Services vs. the Tools Used to Measure Network Leveraging PresenceCloud Provider Performance Presence EnabledA Cloud Service Provider Introduced Using the Protocol Analyzer to Measure The Future of PresenceCloud Computing Risks and Issues Bandwidth The Interrelation of Identity, Presence, andProducts and Services Provided by Cloud Using Ping and Traceroute to Measure Location in the CloudComputing Companies Network Performance Identity ManagementOperational Security What It IsEconomic SSL Future of Identity in the CloudStaffing VPN Privacy and Its Relation to Cloud-BasedShould Your Company Invest in Cloud Overhead Information SystemsComputing? Storage Options for Cloud Computing Personal InformationWhat Should Not be Moved to the Cloud Storage Capacity Privacy-Related IssuesVirtualization in Mainframe Architectures Data Protection and Partitioning Finding Your Private Information and Operating Systems NAS What It IsLANs and the Cloud SAN Open Cloud Consortium Working GroupsInternet and the Cloud CAS Project MatsuWeb Services, Browsers, and the Cloud Redundancy Project CometThin Client Replication HPC in the CloudAdvances in Networking and Processing Multisiting The Open Cloud TestbedSpeeds that Led to Cloud Computing Backup and Recovery The Open Science Data CloudNetworking Developments Server Software Environments that Intercloud TestbedIncreased Processing Speeds Support Cloud Computing Reporting on an Open Cloud ConsortiumManaged Service Provider Model to Cloud Server Capacity Working GroupComputing and Software as a Service Virtualization Distributed Management Task Force(SaaS) Clustering (DMTF)Single Purpose Architectures Migrate to Expansion What It Is?Multipurpose Architectures Server Functions DMTK Working Groups Associated withData Center Virtualization Application Cloud ComputingCollaboration Web Standards for Application DevelopersThe Cloud as a Reach Extender Database ProtocolsThe Cloud as a Communication Enabler Vendor Approaches to Cloud Computing Scripting LanguagesThe Cloud as an Employee Enabler Role of Open Source Software in Data Content Formatting Standards andService-Oriented Architecture (SOA) Center LanguagesEvolving from SOA to the Cloud Cost Reduction vs. Reliability Standards for Security in the CloudCapacity: Limited Performance Open Source Server Software Confidentiality, Integrity, AvailabilityAvailability: Communications Failure and Open Source Database Software Authentication, Authorization,Performance Issues Open Source Applications Software AccountabilitySecurity: Newer Security Protocols Provide Open Source System Management Regulations for PrivacyMore Protection Software Security ProtocolsWhat's Next in Cloud Computing Open Source Load-Balancing Software Establishing a Baseline for CloudUsing Industry and International Standards The Hypervisor PerformanceIndependent Components Virtualization as the "Operating System" Best Practices for Selecting a Vendor andMessage Base Virtualization with a Host Operating Implementing Cloud-Based ApplicationsLocation Independence System Choosing the Right VendorCommunication Requirements for Cloud Virtualization Infections on Virtualized Implementing Cloud-Based Applications Implementation Environments CitrixPublic Internet Type 1 Virtualized Environment Windows Remote DesktopPrivate Internet Type 2 Virtualized Environment VncRouting to the Datacenter Virtualization Environments Web BrowsersSwitching within the Data Center Microsoft Virtualization Server ExtensionsBandwidth Sun xVM VirtualBox Thin ClientsTools Used to Measure Network Linux/UNIX Virtualization Smart Phones, Pads, Pods, etc.Performance VMware Products Virtual Terminal Security Strengths and

Page 82: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using the Protocol Analyzer to Measure Data Center and Cloud Infrastructure WeaknessesBandwidth Products StrengthsUsing Ping and Traceroute to Measure End-User and Desktop Products Weaknesses Network Performance IBM Virtualization iPhoneSecurity Using VMware to see a Virtualized Server AndroidSSL Environment BlackBerryVPN What It Is Windows MobileOverhead Permissive Federation Ubuntu Mobile Internet DeviceStorage Options for Cloud Computing Verified Federation Mobile Platform VirtualizationStorage Capacity Encrypted Federation Kernel-Based Virtual MachineData Protection and Partitioning Trusted Federation VMware Mobile Virtualization PlatformNAS Using XMPP in the Federated Collaboration Applications for MobileSAN Environment PlatformsCAS Presence in the Cloud Text MessagingRedundancy What It Is iPhone ApplicationsReplication Presence Protocols BlackBerry ApplicationsMultisiting Leveraging Presence Droid Applications Backup and Recovery Presence EnabledServer Software Environments that Support The Future of PresenceCloud Computing The Interrelation of Identity, Presence, lineServer Capacity and Location in the Cloud Cloud Computing DefinedVirtualization Identity Management Cloud Computing ArchitectureClustering What It Is Cloud Computing TermsExpansion Future of Identity in the Cloud Communication-as-a-Service (CaaS)Server Functions Privacy and Its Relation to Cloud-Based Infrastructure-as-a-Service (IaaS)Application Information Systems Monitoring-as-a-Service (MaaS)Web Personal Information Software-as-a-Service (SaaS)Database Privacy-Related Issues Platform-as-a-Service (PaaS)Vendor Approaches to Cloud Computing Finding Your Private Information Benefits and Limitations of CloudRole of Open Source Software in Data What It Is ComputingCenter Open Cloud Consortium Working Groups BenefitsCost Reduction vs. Reliability Project Matsu LimitationsOpen Source Server Software Project Comet Cloud Computing Case StudiesOpen Source Database Software HPC in the Cloud How Companies Are Using CloudOpen Source Applications Software The Open Cloud Testbed ComputingOpen Source System Management Software The Open Science Data Cloud Implementing Applications and Services inOpen Source Load-Balancing Software Intercloud Testbed the CloudThe Hypervisor Reporting on an Open Cloud Consortium Using Your Company's Services vs. theVirtualization as the "Operating System" Working Group Cloud ProviderVirtualization with a Host Operating System Distributed Management Task Force A Cloud Service Provider IntroducedVirtualization Infections on Virtualized (DMTF) Cloud Computing Risks and Issues Environments What It Is? Products and Services Provided by CloudType 1 Virtualized Environment DMTK Working Groups Associated with Computing Companies Type 2 Virtualized Environment Cloud Computing OperationalVirtualization Environments Standards for Application Developers EconomicMicrosoft Virtualization Protocols StaffingSun xVM VirtualBox Scripting Languages Should Your Company Invest in CloudLinux/UNIX Virtualization Content Formatting Standards and Computing?VMware Products Languages What Should Not be Moved to the Cloud Data Center and Cloud Infrastructure Standards for Security in the Cloud Virtualization in Mainframe ArchitecturesProducts Confidentiality, Integrity, Availability and Operating SystemsEnd-User and Desktop Products Authentication, Authorization, LANs and the CloudIBM Virtualization Accountability Internet and the CloudUsing VMware to see a Virtualized Server Regulations for Privacy Web Services, Browsers, and the CloudEnvironment Security Protocols Thin ClientWhat It Is Establishing a Baseline for Cloud Advances in Networking and ProcessingPermissive Federation Performance Speeds that Led to Cloud ComputingVerified Federation Best Practices for Selecting a Vendor Networking DevelopmentsEncrypted Federation and Implementing Cloud-Based Increased Processing SpeedsTrusted Federation Applications Managed Service Provider Model to CloudUsing XMPP in the Federated Environment Choosing the Right Vendor Computing and Software as a ServicePresence in the Cloud Implementing Cloud-Based Applications (SaaS)What It Is Citrix Single Purpose Architectures Migrate toPresence Protocols Windows Remote Desktop Multipurpose ArchitecturesLeveraging Presence Vnc Data Center VirtualizationPresence Enabled Web Browsers Collaboration

Page 83: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Future of Presence Server Extensions The Cloud as a Reach ExtenderThe Interrelation of Identity, Presence, and Thin Clients The Cloud as a Communication EnablerLocation in the Cloud Smart Phones, Pads, Pods, etc. The Cloud as an Employee EnablerIdentity Management Virtual Terminal Security Strengths and Service-Oriented Architecture (SOA)What It Is Weaknesses Evolving from SOA to the CloudFuture of Identity in the Cloud Strengths Capacity: Limited PerformancePrivacy and Its Relation to Cloud-Based Weaknesses Availability: Communications Failure andInformation Systems iPhone Performance IssuesPersonal Information Android Security: Newer Security Protocols ProvidePrivacy-Related Issues BlackBerry More ProtectionFinding Your Private Information Windows Mobile What's Next in Cloud Computing What It Is Ubuntu Mobile Internet Device Using Industry and International StandardsOpen Cloud Consortium Working Groups Mobile Platform Virtualization Independent ComponentsProject Matsu Kernel-Based Virtual Machine Message BaseProject Comet VMware Mobile Virtualization Platform Location IndependenceHPC in the Cloud Collaboration Applications for Mobile Communication Requirements for CloudThe Open Cloud Testbed Platforms ImplementationThe Open Science Data Cloud Text Messaging Public InternetIntercloud Testbed iPhone Applications Private InternetReporting on an Open Cloud Consortium BlackBerry Applications Routing to the DatacenterWorking Group Droid Applications Switching within the Data CenterDistributed Management Task Force Bandwidth(DMTF) Tools Used to Measure NetworkWhat It Is? line PerformanceDMTK Working Groups Associated with Cloud Computing Defined Using the Protocol Analyzer to MeasureCloud Computing Cloud Computing Architecture BandwidthStandards for Application Developers Cloud Computing Terms Using Ping and Traceroute to MeasureProtocols Communication-as-a-Service (CaaS) Network PerformanceScripting Languages Infrastructure-as-a-Service (IaaS) SecurityContent Formatting Standards and Monitoring-as-a-Service (MaaS) SSLLanguages Software-as-a-Service (SaaS) VPNStandards for Security in the Cloud Platform-as-a-Service (PaaS) OverheadConfidentiality, Integrity, Availability Benefits and Limitations of Cloud Storage Options for Cloud ComputingAuthentication, Authorization, Accountability Computing Storage CapacityRegulations for Privacy Benefits Data Protection and PartitioningSecurity Protocols Limitations NASEstablishing a Baseline for Cloud Cloud Computing Case Studies SANPerformance How Companies Are Using Cloud CASBest Practices for Selecting a Vendor and Computing RedundancyImplementing Cloud-Based Applications Implementing Applications and Services ReplicationChoosing the Right Vendor in the Cloud MultisitingImplementing Cloud-Based Applications Using Your Company's Services vs. the Backup and RecoveryCitrix Cloud Provider Server Software Environments thatWindows Remote Desktop A Cloud Service Provider Introduced Support Cloud ComputingVnc Cloud Computing Risks and Issues Server CapacityWeb Browsers Products and Services Provided by Cloud VirtualizationServer Extensions Computing Companies ClusteringThin Clients Operational ExpansionSmart Phones, Pads, Pods, etc. Economic Server FunctionsVirtual Terminal Security Strengths and Staffing ApplicationWeaknesses Should Your Company Invest in Cloud WebStrengths Computing? DatabaseWeaknesses What Should Not be Moved to the Cloud Vendor Approaches to Cloud ComputingiPhone Virtualization in Mainframe Architectures Role of Open Source Software in DataAndroid and Operating Systems CenterBlackBerry LANs and the Cloud Cost Reduction vs. ReliabilityWindows Mobile Internet and the Cloud Open Source Server SoftwareUbuntu Mobile Internet Device Web Services, Browsers, and the Cloud Open Source Database SoftwareMobile Platform Virtualization Thin Client Open Source Applications SoftwareKernel-Based Virtual Machine Advances in Networking and Processing Open Source System ManagementVMware Mobile Virtualization Platform Speeds that Led to Cloud Computing SoftwareCollaboration Applications for Mobile Networking Developments Open Source Load-Balancing Software Platforms Increased Processing Speeds The HypervisorText Messaging Managed Service Provider Model to Virtualization as the "Operating System"iPhone Applications Cloud Computing and Software as a Virtualization with a Host OperatingBlackBerry Applications Service (SaaS) System

Page 84: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Droid Applications Single Purpose Architectures Migrate to Virtualization Infections on VirtualizedMultipurpose Architectures EnvironmentsData Center Virtualization Type 1 Virtualized Environment

line Collaboration Type 2 Virtualized EnvironmentCloud Computing Defined The Cloud as a Reach Extender Virtualization EnvironmentsCloud Computing Architecture The Cloud as a Communication Enabler Microsoft VirtualizationCloud Computing Terms The Cloud as an Employee Enabler Sun xVM VirtualBoxCommunication-as-a-Service (CaaS) Service-Oriented Architecture (SOA) Linux/UNIX VirtualizationInfrastructure-as-a-Service (IaaS) Evolving from SOA to the Cloud VMware ProductsMonitoring-as-a-Service (MaaS) Capacity: Limited Performance Data Center and Cloud InfrastructureSoftware-as-a-Service (SaaS) Availability: Communications Failure and ProductsPlatform-as-a-Service (PaaS) Performance Issues End-User and Desktop ProductsBenefits and Limitations of Cloud Computing Security: Newer Security Protocols IBM VirtualizationBenefits Provide More Protection Using VMware to see a Virtualized ServerLimitations What's Next in Cloud Computing Environment Cloud Computing Case Studies Using Industry and International What It IsHow Companies Are Using Cloud Standards Permissive FederationComputing Independent Components Verified FederationImplementing Applications and Services in Message Base Encrypted Federationthe Cloud Location Independence Trusted FederationUsing Your Company's Services vs. the Communication Requirements for Cloud Using XMPP in the Federated EnvironmentCloud Provider Implementation Presence in the CloudA Cloud Service Provider Introduced Public Internet What It IsCloud Computing Risks and Issues Private Internet Presence ProtocolsProducts and Services Provided by Cloud Routing to the Datacenter Leveraging PresenceComputing Companies Switching within the Data Center Presence EnabledOperational Bandwidth The Future of PresenceEconomic Tools Used to Measure Network The Interrelation of Identity, Presence, andStaffing Performance Location in the CloudShould Your Company Invest in Cloud Using the Protocol Analyzer to Measure Identity ManagementComputing? Bandwidth What It IsWhat Should Not be Moved to the Cloud Using Ping and Traceroute to Measure Future of Identity in the CloudVirtualization in Mainframe Architectures Network Performance Privacy and Its Relation to Cloud-Basedand Operating Systems Security Information SystemsLANs and the Cloud SSL Personal InformationInternet and the Cloud VPN Privacy-Related IssuesWeb Services, Browsers, and the Cloud Overhead Finding Your Private Information Thin Client Storage Options for Cloud Computing What It IsAdvances in Networking and Processing Storage Capacity Open Cloud Consortium Working GroupsSpeeds that Led to Cloud Computing Data Protection and Partitioning Project MatsuNetworking Developments NAS Project CometIncreased Processing Speeds SAN HPC in the CloudManaged Service Provider Model to Cloud CAS The Open Cloud TestbedComputing and Software as a Service Redundancy The Open Science Data Cloud(SaaS) Replication Intercloud TestbedSingle Purpose Architectures Migrate to Multisiting Reporting on an Open Cloud ConsortiumMultipurpose Architectures Backup and Recovery Working GroupData Center Virtualization Server Software Environments that Distributed Management Task ForceCollaboration Support Cloud Computing (DMTF)The Cloud as a Reach Extender Server Capacity What It Is?The Cloud as a Communication Enabler Virtualization DMTK Working Groups Associated withThe Cloud as an Employee Enabler Clustering Cloud ComputingService-Oriented Architecture (SOA) Expansion Standards for Application DevelopersEvolving from SOA to the Cloud Server Functions ProtocolsCapacity: Limited Performance Application Scripting LanguagesAvailability: Communications Failure and Web Content Formatting Standards andPerformance Issues Database LanguagesSecurity: Newer Security Protocols Provide Vendor Approaches to Cloud Computing Standards for Security in the CloudMore Protection Role of Open Source Software in Data Confidentiality, Integrity, AvailabilityWhat's Next in Cloud Computing Center Authentication, Authorization,Using Industry and International Standards Cost Reduction vs. Reliability AccountabilityIndependent Components Open Source Server Software Regulations for PrivacyMessage Base Open Source Database Software Security ProtocolsLocation Independence Open Source Applications Software Establishing a Baseline for CloudCommunication Requirements for Cloud Open Source System Management PerformanceImplementation Software Best Practices for Selecting a Vendor and

Page 85: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Public Internet Open Source Load-Balancing Software Implementing Cloud-Based ApplicationsPrivate Internet The Hypervisor Choosing the Right VendorRouting to the Datacenter Virtualization as the "Operating System" Implementing Cloud-Based Applications Switching within the Data Center Virtualization with a Host Operating CitrixBandwidth System Windows Remote DesktopTools Used to Measure Network Virtualization Infections on Virtualized VncPerformance Environments Web BrowsersUsing the Protocol Analyzer to Measure Type 1 Virtualized Environment Server ExtensionsBandwidth Type 2 Virtualized Environment Thin ClientsUsing Ping and Traceroute to Measure Virtualization Environments Smart Phones, Pads, Pods, etc.Network Performance Microsoft Virtualization Virtual Terminal Security Strengths andSecurity Sun xVM VirtualBox WeaknessesSSL Linux/UNIX Virtualization StrengthsVPN VMware Products Weaknesses Overhead Data Center and Cloud Infrastructure iPhoneStorage Options for Cloud Computing Products AndroidStorage Capacity End-User and Desktop Products BlackBerryData Protection and Partitioning IBM Virtualization Windows MobileNAS Using VMware to see a Virtualized Server Ubuntu Mobile Internet DeviceSAN Environment Mobile Platform VirtualizationCAS What It Is Kernel-Based Virtual MachineRedundancy Permissive Federation VMware Mobile Virtualization PlatformReplication Verified Federation Collaboration Applications for MobileMultisiting Encrypted Federation PlatformsBackup and Recovery Trusted Federation Text MessagingServer Software Environments that Support Using XMPP in the Federated iPhone ApplicationsCloud Computing Environment BlackBerry ApplicationsServer Capacity Presence in the Cloud Droid Applications Virtualization What It IsClustering Presence ProtocolsExpansion Leveraging Presence lineServer Functions Presence Enabled Cloud Computing DefinedApplication The Future of Presence Cloud Computing ArchitectureWeb The Interrelation of Identity, Presence, Cloud Computing TermsDatabase and Location in the Cloud Communication-as-a-Service (CaaS)Vendor Approaches to Cloud Computing Identity Management Infrastructure-as-a-Service (IaaS)Role of Open Source Software in Data What It Is Monitoring-as-a-Service (MaaS)Center Future of Identity in the Cloud Software-as-a-Service (SaaS)Cost Reduction vs. Reliability Privacy and Its Relation to Cloud-Based Platform-as-a-Service (PaaS)Open Source Server Software Information Systems Benefits and Limitations of CloudOpen Source Database Software Personal Information ComputingOpen Source Applications Software Privacy-Related Issues BenefitsOpen Source System Management Software Finding Your Private Information LimitationsOpen Source Load-Balancing Software What It Is Cloud Computing Case StudiesThe Hypervisor Open Cloud Consortium Working Groups How Companies Are Using CloudVirtualization as the "Operating System" Project Matsu ComputingVirtualization with a Host Operating System Project Comet Implementing Applications and Services inVirtualization Infections on Virtualized HPC in the Cloud the CloudEnvironments The Open Cloud Testbed Using Your Company's Services vs. theType 1 Virtualized Environment The Open Science Data Cloud Cloud ProviderType 2 Virtualized Environment Intercloud Testbed A Cloud Service Provider IntroducedVirtualization Environments Reporting on an Open Cloud Consortium Cloud Computing Risks and Issues Microsoft Virtualization Working Group Products and Services Provided by CloudSun xVM VirtualBox Distributed Management Task Force Computing Companies Linux/UNIX Virtualization (DMTF) OperationalVMware Products What It Is? EconomicData Center and Cloud Infrastructure DMTK Working Groups Associated with StaffingProducts Cloud Computing Should Your Company Invest in CloudEnd-User and Desktop Products Standards for Application Developers Computing?IBM Virtualization Protocols What Should Not be Moved to the Cloud Using VMware to see a Virtualized Server Scripting Languages Virtualization in Mainframe ArchitecturesEnvironment Content Formatting Standards and and Operating SystemsWhat It Is Languages LANs and the CloudPermissive Federation Standards for Security in the Cloud Internet and the CloudVerified Federation Confidentiality, Integrity, Availability Web Services, Browsers, and the CloudEncrypted Federation Authentication, Authorization, Thin Client

Page 86: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Trusted Federation Accountability Advances in Networking and ProcessingUsing XMPP in the Federated Environment Regulations for Privacy Speeds that Led to Cloud ComputingPresence in the Cloud Security Protocols Networking DevelopmentsWhat It Is Establishing a Baseline for Cloud Increased Processing SpeedsPresence Protocols Performance Managed Service Provider Model to CloudLeveraging Presence Best Practices for Selecting a Vendor Computing and Software as a ServicePresence Enabled and Implementing Cloud-Based (SaaS)The Future of Presence Applications Single Purpose Architectures Migrate toThe Interrelation of Identity, Presence, and Choosing the Right Vendor Multipurpose ArchitecturesLocation in the Cloud Implementing Cloud-Based Applications Data Center VirtualizationIdentity Management Citrix CollaborationWhat It Is Windows Remote Desktop The Cloud as a Reach ExtenderFuture of Identity in the Cloud Vnc The Cloud as a Communication EnablerPrivacy and Its Relation to Cloud-Based Web Browsers The Cloud as an Employee EnablerInformation Systems Server Extensions Service-Oriented Architecture (SOA)Personal Information Thin Clients Evolving from SOA to the CloudPrivacy-Related Issues Smart Phones, Pads, Pods, etc. Capacity: Limited PerformanceFinding Your Private Information Virtual Terminal Security Strengths and Availability: Communications Failure andWhat It Is Weaknesses Performance IssuesOpen Cloud Consortium Working Groups Strengths Security: Newer Security Protocols ProvideProject Matsu Weaknesses More ProtectionProject Comet iPhone What's Next in Cloud Computing HPC in the Cloud Android Using Industry and International StandardsThe Open Cloud Testbed BlackBerry Independent ComponentsThe Open Science Data Cloud Windows Mobile Message BaseIntercloud Testbed Ubuntu Mobile Internet Device Location IndependenceReporting on an Open Cloud Consortium Mobile Platform Virtualization Communication Requirements for CloudWorking Group Kernel-Based Virtual Machine ImplementationDistributed Management Task Force VMware Mobile Virtualization Platform Public Internet(DMTF) Collaboration Applications for Mobile Private InternetWhat It Is? Platforms Routing to the DatacenterDMTK Working Groups Associated with Text Messaging Switching within the Data CenterCloud Computing iPhone Applications BandwidthStandards for Application Developers BlackBerry Applications Tools Used to Measure NetworkProtocols Droid Applications PerformanceScripting Languages Using the Protocol Analyzer to MeasureContent Formatting Standards and BandwidthLanguages line Using Ping and Traceroute to MeasureStandards for Security in the Cloud Cloud Computing Defined Network PerformanceConfidentiality, Integrity, Availability Cloud Computing Architecture SecurityAuthentication, Authorization, Accountability Cloud Computing Terms SSLRegulations for Privacy Communication-as-a-Service (CaaS) VPNSecurity Protocols Infrastructure-as-a-Service (IaaS) OverheadEstablishing a Baseline for Cloud Monitoring-as-a-Service (MaaS) Storage Options for Cloud ComputingPerformance Software-as-a-Service (SaaS) Storage CapacityBest Practices for Selecting a Vendor and Platform-as-a-Service (PaaS) Data Protection and PartitioningImplementing Cloud-Based Applications Benefits and Limitations of Cloud NASChoosing the Right Vendor Computing SANImplementing Cloud-Based Applications Benefits CASCitrix Limitations RedundancyWindows Remote Desktop Cloud Computing Case Studies ReplicationVnc How Companies Are Using Cloud MultisitingWeb Browsers Computing Backup and RecoveryServer Extensions Implementing Applications and Services Server Software Environments thatThin Clients in the Cloud Support Cloud ComputingSmart Phones, Pads, Pods, etc. Using Your Company's Services vs. the Server CapacityVirtual Terminal Security Strengths and Cloud Provider VirtualizationWeaknesses A Cloud Service Provider Introduced ClusteringStrengths Cloud Computing Risks and Issues ExpansionWeaknesses Products and Services Provided by Cloud Server FunctionsiPhone Computing Companies ApplicationAndroid Operational WebBlackBerry Economic DatabaseWindows Mobile Staffing Vendor Approaches to Cloud ComputingUbuntu Mobile Internet Device Should Your Company Invest in Cloud Role of Open Source Software in DataMobile Platform Virtualization Computing? Center

Page 87: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Kernel-Based Virtual Machine What Should Not be Moved to the Cloud Cost Reduction vs. ReliabilityVMware Mobile Virtualization Platform Virtualization in Mainframe Architectures Open Source Server SoftwareCollaboration Applications for Mobile and Operating Systems Open Source Database SoftwarePlatforms LANs and the Cloud Open Source Applications SoftwareText Messaging Internet and the Cloud Open Source System ManagementiPhone Applications Web Services, Browsers, and the Cloud SoftwareBlackBerry Applications Thin Client Open Source Load-Balancing Software Droid Applications Advances in Networking and Processing The Hypervisor

Speeds that Led to Cloud Computing Virtualization as the "Operating System"Networking Developments Virtualization with a Host Operating

line Increased Processing Speeds SystemCloud Computing Defined Managed Service Provider Model to Virtualization Infections on VirtualizedCloud Computing Architecture Cloud Computing and Software as a EnvironmentsCloud Computing Terms Service (SaaS) Type 1 Virtualized EnvironmentCommunication-as-a-Service (CaaS) Single Purpose Architectures Migrate to Type 2 Virtualized EnvironmentInfrastructure-as-a-Service (IaaS) Multipurpose Architectures Virtualization EnvironmentsMonitoring-as-a-Service (MaaS) Data Center Virtualization Microsoft VirtualizationSoftware-as-a-Service (SaaS) Collaboration Sun xVM VirtualBoxPlatform-as-a-Service (PaaS) The Cloud as a Reach Extender Linux/UNIX VirtualizationBenefits and Limitations of Cloud Computing The Cloud as a Communication Enabler VMware ProductsBenefits The Cloud as an Employee Enabler Data Center and Cloud InfrastructureLimitations Service-Oriented Architecture (SOA) ProductsCloud Computing Case Studies Evolving from SOA to the Cloud End-User and Desktop ProductsHow Companies Are Using Cloud Capacity: Limited Performance IBM VirtualizationComputing Availability: Communications Failure and Using VMware to see a Virtualized ServerImplementing Applications and Services in Performance Issues Environment the Cloud Security: Newer Security Protocols What It IsUsing Your Company's Services vs. the Provide More Protection Permissive FederationCloud Provider What's Next in Cloud Computing Verified FederationA Cloud Service Provider Introduced Using Industry and International Encrypted FederationCloud Computing Risks and Issues Standards Trusted FederationProducts and Services Provided by Cloud Independent Components Using XMPP in the Federated EnvironmentComputing Companies Message Base Presence in the CloudOperational Location Independence What It IsEconomic Communication Requirements for Cloud Presence ProtocolsStaffing Implementation Leveraging PresenceShould Your Company Invest in Cloud Public Internet Presence EnabledComputing? Private Internet The Future of PresenceWhat Should Not be Moved to the Cloud Routing to the Datacenter The Interrelation of Identity, Presence, andVirtualization in Mainframe Architectures Switching within the Data Center Location in the Cloudand Operating Systems Bandwidth Identity ManagementLANs and the Cloud Tools Used to Measure Network What It IsInternet and the Cloud Performance Future of Identity in the CloudWeb Services, Browsers, and the Cloud Using the Protocol Analyzer to Measure Privacy and Its Relation to Cloud-BasedThin Client Bandwidth Information SystemsAdvances in Networking and Processing Using Ping and Traceroute to Measure Personal InformationSpeeds that Led to Cloud Computing Network Performance Privacy-Related IssuesNetworking Developments Security Finding Your Private Information Increased Processing Speeds SSL What It IsManaged Service Provider Model to Cloud VPN Open Cloud Consortium Working GroupsComputing and Software as a Service Overhead Project Matsu(SaaS) Storage Options for Cloud Computing Project CometSingle Purpose Architectures Migrate to Storage Capacity HPC in the CloudMultipurpose Architectures Data Protection and Partitioning The Open Cloud TestbedData Center Virtualization NAS The Open Science Data CloudCollaboration SAN Intercloud TestbedThe Cloud as a Reach Extender CAS Reporting on an Open Cloud ConsortiumThe Cloud as a Communication Enabler Redundancy Working GroupThe Cloud as an Employee Enabler Replication Distributed Management Task ForceService-Oriented Architecture (SOA) Multisiting (DMTF)Evolving from SOA to the Cloud Backup and Recovery What It Is?Capacity: Limited Performance Server Software Environments that DMTK Working Groups Associated withAvailability: Communications Failure and Support Cloud Computing Cloud ComputingPerformance Issues Server Capacity Standards for Application DevelopersSecurity: Newer Security Protocols Provide Virtualization ProtocolsMore Protection Clustering Scripting Languages

Page 88: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What's Next in Cloud Computing Expansion Content Formatting Standards andUsing Industry and International Standards Server Functions LanguagesIndependent Components Application Standards for Security in the CloudMessage Base Web Confidentiality, Integrity, AvailabilityLocation Independence Database Authentication, Authorization,Communication Requirements for Cloud Vendor Approaches to Cloud Computing AccountabilityImplementation Role of Open Source Software in Data Regulations for PrivacyPublic Internet Center Security ProtocolsPrivate Internet Cost Reduction vs. Reliability Establishing a Baseline for CloudRouting to the Datacenter Open Source Server Software PerformanceSwitching within the Data Center Open Source Database Software Best Practices for Selecting a Vendor andBandwidth Open Source Applications Software Implementing Cloud-Based ApplicationsTools Used to Measure Network Open Source System Management Choosing the Right VendorPerformance Software Implementing Cloud-Based Applications Using the Protocol Analyzer to Measure Open Source Load-Balancing Software CitrixBandwidth The Hypervisor Windows Remote DesktopUsing Ping and Traceroute to Measure Virtualization as the "Operating System" VncNetwork Performance Virtualization with a Host Operating Web BrowsersSecurity System Server ExtensionsSSL Virtualization Infections on Virtualized Thin ClientsVPN Environments Smart Phones, Pads, Pods, etc.Overhead Type 1 Virtualized Environment Virtual Terminal Security Strengths andStorage Options for Cloud Computing Type 2 Virtualized Environment WeaknessesStorage Capacity Virtualization Environments StrengthsData Protection and Partitioning Microsoft Virtualization Weaknesses NAS Sun xVM VirtualBox iPhoneSAN Linux/UNIX Virtualization AndroidCAS VMware Products BlackBerryRedundancy Data Center and Cloud Infrastructure Windows MobileReplication Products Ubuntu Mobile Internet DeviceMultisiting End-User and Desktop Products Mobile Platform VirtualizationBackup and Recovery IBM Virtualization Kernel-Based Virtual MachineServer Software Environments that Support Using VMware to see a Virtualized Server VMware Mobile Virtualization PlatformCloud Computing Environment Collaboration Applications for MobileServer Capacity What It Is PlatformsVirtualization Permissive Federation Text MessagingClustering Verified Federation iPhone ApplicationsExpansion Encrypted Federation BlackBerry ApplicationsServer Functions Trusted Federation Droid Applications Application Using XMPP in the FederatedWeb EnvironmentDatabase Presence in the Cloud lineVendor Approaches to Cloud Computing What It Is Cloud Computing DefinedRole of Open Source Software in Data Presence Protocols Cloud Computing ArchitectureCenter Leveraging Presence Cloud Computing TermsCost Reduction vs. Reliability Presence Enabled Communication-as-a-Service (CaaS)Open Source Server Software The Future of Presence Infrastructure-as-a-Service (IaaS)Open Source Database Software The Interrelation of Identity, Presence, Monitoring-as-a-Service (MaaS)Open Source Applications Software and Location in the Cloud Software-as-a-Service (SaaS)Open Source System Management Software Identity Management Platform-as-a-Service (PaaS)Open Source Load-Balancing Software What It Is Benefits and Limitations of CloudThe Hypervisor Future of Identity in the Cloud ComputingVirtualization as the "Operating System" Privacy and Its Relation to Cloud-Based BenefitsVirtualization with a Host Operating System Information Systems LimitationsVirtualization Infections on Virtualized Personal Information Cloud Computing Case StudiesEnvironments Privacy-Related Issues How Companies Are Using CloudType 1 Virtualized Environment Finding Your Private Information ComputingType 2 Virtualized Environment What It Is Implementing Applications and Services inVirtualization Environments Open Cloud Consortium Working Groups the CloudMicrosoft Virtualization Project Matsu Using Your Company's Services vs. theSun xVM VirtualBox Project Comet Cloud ProviderLinux/UNIX Virtualization HPC in the Cloud A Cloud Service Provider IntroducedVMware Products The Open Cloud Testbed Cloud Computing Risks and Issues Data Center and Cloud Infrastructure The Open Science Data Cloud Products and Services Provided by CloudProducts Intercloud Testbed Computing Companies End-User and Desktop Products Reporting on an Open Cloud Consortium Operational

Page 89: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

IBM Virtualization Working Group EconomicUsing VMware to see a Virtualized Server Distributed Management Task Force StaffingEnvironment (DMTF) Should Your Company Invest in CloudWhat It Is What It Is? Computing?Permissive Federation DMTK Working Groups Associated with What Should Not be Moved to the Cloud Verified Federation Cloud Computing Virtualization in Mainframe ArchitecturesEncrypted Federation Standards for Application Developers and Operating SystemsTrusted Federation Protocols LANs and the CloudUsing XMPP in the Federated Environment Scripting Languages Internet and the CloudPresence in the Cloud Content Formatting Standards and Web Services, Browsers, and the CloudWhat It Is Languages Thin ClientPresence Protocols Standards for Security in the Cloud Advances in Networking and ProcessingLeveraging Presence Confidentiality, Integrity, Availability Speeds that Led to Cloud ComputingPresence Enabled Authentication, Authorization, Networking DevelopmentsThe Future of Presence Accountability Increased Processing SpeedsThe Interrelation of Identity, Presence, and Regulations for Privacy Managed Service Provider Model to CloudLocation in the Cloud Security Protocols Computing and Software as a ServiceIdentity Management Establishing a Baseline for Cloud (SaaS)What It Is Performance Single Purpose Architectures Migrate toFuture of Identity in the Cloud Best Practices for Selecting a Vendor Multipurpose ArchitecturesPrivacy and Its Relation to Cloud-Based and Implementing Cloud-Based Data Center VirtualizationInformation Systems Applications CollaborationPersonal Information Choosing the Right Vendor The Cloud as a Reach ExtenderPrivacy-Related Issues Implementing Cloud-Based Applications The Cloud as a Communication EnablerFinding Your Private Information Citrix The Cloud as an Employee EnablerWhat It Is Windows Remote Desktop Service-Oriented Architecture (SOA)Open Cloud Consortium Working Groups Vnc Evolving from SOA to the CloudProject Matsu Web Browsers Capacity: Limited PerformanceProject Comet Server Extensions Availability: Communications Failure andHPC in the Cloud Thin Clients Performance IssuesThe Open Cloud Testbed Smart Phones, Pads, Pods, etc. Security: Newer Security Protocols ProvideThe Open Science Data Cloud Virtual Terminal Security Strengths and More ProtectionIntercloud Testbed Weaknesses What's Next in Cloud Computing Reporting on an Open Cloud Consortium Strengths Using Industry and International StandardsWorking Group Weaknesses Independent ComponentsDistributed Management Task Force iPhone Message Base(DMTF) Android Location IndependenceWhat It Is? BlackBerry Communication Requirements for CloudDMTK Working Groups Associated with Windows Mobile ImplementationCloud Computing Ubuntu Mobile Internet Device Public InternetStandards for Application Developers Mobile Platform Virtualization Private InternetProtocols Kernel-Based Virtual Machine Routing to the DatacenterScripting Languages VMware Mobile Virtualization Platform Switching within the Data CenterContent Formatting Standards and Collaboration Applications for Mobile BandwidthLanguages Platforms Tools Used to Measure NetworkStandards for Security in the Cloud Text Messaging PerformanceConfidentiality, Integrity, Availability iPhone Applications Using the Protocol Analyzer to MeasureAuthentication, Authorization, Accountability BlackBerry Applications BandwidthRegulations for Privacy Droid Applications Using Ping and Traceroute to MeasureSecurity Protocols Network PerformanceEstablishing a Baseline for Cloud SecurityPerformance line SSLBest Practices for Selecting a Vendor and Cloud Computing Defined VPNImplementing Cloud-Based Applications Cloud Computing Architecture OverheadChoosing the Right Vendor Cloud Computing Terms Storage Options for Cloud ComputingImplementing Cloud-Based Applications Communication-as-a-Service (CaaS) Storage CapacityCitrix Infrastructure-as-a-Service (IaaS) Data Protection and PartitioningWindows Remote Desktop Monitoring-as-a-Service (MaaS) NASVnc Software-as-a-Service (SaaS) SANWeb Browsers Platform-as-a-Service (PaaS) CASServer Extensions Benefits and Limitations of Cloud RedundancyThin Clients Computing ReplicationSmart Phones, Pads, Pods, etc. Benefits MultisitingVirtual Terminal Security Strengths and Limitations Backup and RecoveryWeaknesses Cloud Computing Case Studies Server Software Environments thatStrengths How Companies Are Using Cloud Support Cloud Computing

Page 90: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Weaknesses Computing Server CapacityiPhone Implementing Applications and Services VirtualizationAndroid in the Cloud ClusteringBlackBerry Using Your Company's Services vs. the ExpansionWindows Mobile Cloud Provider Server FunctionsUbuntu Mobile Internet Device A Cloud Service Provider Introduced ApplicationMobile Platform Virtualization Cloud Computing Risks and Issues WebKernel-Based Virtual Machine Products and Services Provided by Cloud DatabaseVMware Mobile Virtualization Platform Computing Companies Vendor Approaches to Cloud ComputingCollaboration Applications for Mobile Operational Role of Open Source Software in DataPlatforms Economic CenterText Messaging Staffing Cost Reduction vs. ReliabilityiPhone Applications Should Your Company Invest in Cloud Open Source Server SoftwareBlackBerry Applications Computing? Open Source Database SoftwareDroid Applications What Should Not be Moved to the Cloud Open Source Applications Software

Virtualization in Mainframe Architectures Open Source System Managementand Operating Systems Software

line LANs and the Cloud Open Source Load-Balancing Software Cloud Computing Defined Internet and the Cloud The HypervisorCloud Computing Architecture Web Services, Browsers, and the Cloud Virtualization as the "Operating System"Cloud Computing Terms Thin Client Virtualization with a Host OperatingCommunication-as-a-Service (CaaS) Advances in Networking and Processing SystemInfrastructure-as-a-Service (IaaS) Speeds that Led to Cloud Computing Virtualization Infections on VirtualizedMonitoring-as-a-Service (MaaS) Networking Developments EnvironmentsSoftware-as-a-Service (SaaS) Increased Processing Speeds Type 1 Virtualized EnvironmentPlatform-as-a-Service (PaaS) Managed Service Provider Model to Type 2 Virtualized EnvironmentBenefits and Limitations of Cloud Computing Cloud Computing and Software as a Virtualization EnvironmentsBenefits Service (SaaS) Microsoft VirtualizationLimitations Single Purpose Architectures Migrate to Sun xVM VirtualBoxCloud Computing Case Studies Multipurpose Architectures Linux/UNIX VirtualizationHow Companies Are Using Cloud Data Center Virtualization VMware ProductsComputing Collaboration Data Center and Cloud InfrastructureImplementing Applications and Services in The Cloud as a Reach Extender Productsthe Cloud The Cloud as a Communication Enabler End-User and Desktop ProductsUsing Your Company's Services vs. the The Cloud as an Employee Enabler IBM VirtualizationCloud Provider Service-Oriented Architecture (SOA) Using VMware to see a Virtualized ServerA Cloud Service Provider Introduced Evolving from SOA to the Cloud Environment Cloud Computing Risks and Issues Capacity: Limited Performance What It IsProducts and Services Provided by Cloud Availability: Communications Failure and Permissive FederationComputing Companies Performance Issues Verified FederationOperational Security: Newer Security Protocols Encrypted FederationEconomic Provide More Protection Trusted FederationStaffing What's Next in Cloud Computing Using XMPP in the Federated EnvironmentShould Your Company Invest in Cloud Using Industry and International Presence in the CloudComputing? Standards What It IsWhat Should Not be Moved to the Cloud Independent Components Presence ProtocolsVirtualization in Mainframe Architectures Message Base Leveraging Presenceand Operating Systems Location Independence Presence EnabledLANs and the Cloud Communication Requirements for Cloud The Future of PresenceInternet and the Cloud Implementation The Interrelation of Identity, Presence, andWeb Services, Browsers, and the Cloud Public Internet Location in the CloudThin Client Private Internet Identity ManagementAdvances in Networking and Processing Routing to the Datacenter What It IsSpeeds that Led to Cloud Computing Switching within the Data Center Future of Identity in the CloudNetworking Developments Bandwidth Privacy and Its Relation to Cloud-BasedIncreased Processing Speeds Tools Used to Measure Network Information SystemsManaged Service Provider Model to Cloud Performance Personal InformationComputing and Software as a Service Using the Protocol Analyzer to Measure Privacy-Related Issues(SaaS) Bandwidth Finding Your Private Information Single Purpose Architectures Migrate to Using Ping and Traceroute to Measure What It IsMultipurpose Architectures Network Performance Open Cloud Consortium Working GroupsData Center Virtualization Security Project MatsuCollaboration SSL Project CometThe Cloud as a Reach Extender VPN HPC in the CloudThe Cloud as a Communication Enabler Overhead The Open Cloud TestbedThe Cloud as an Employee Enabler Storage Options for Cloud Computing The Open Science Data Cloud

Page 91: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Service-Oriented Architecture (SOA) Storage Capacity Intercloud TestbedEvolving from SOA to the Cloud Data Protection and Partitioning Reporting on an Open Cloud ConsortiumCapacity: Limited Performance NAS Working GroupAvailability: Communications Failure and SAN Distributed Management Task ForcePerformance Issues CAS (DMTF)Security: Newer Security Protocols Provide Redundancy What It Is?More Protection Replication DMTK Working Groups Associated withWhat's Next in Cloud Computing Multisiting Cloud ComputingUsing Industry and International Standards Backup and Recovery Standards for Application DevelopersIndependent Components Server Software Environments that ProtocolsMessage Base Support Cloud Computing Scripting LanguagesLocation Independence Server Capacity Content Formatting Standards andCommunication Requirements for Cloud Virtualization LanguagesImplementation Clustering Standards for Security in the CloudPublic Internet Expansion Confidentiality, Integrity, AvailabilityPrivate Internet Server Functions Authentication, Authorization,Routing to the Datacenter Application AccountabilitySwitching within the Data Center Web Regulations for PrivacyBandwidth Database Security ProtocolsTools Used to Measure Network Vendor Approaches to Cloud Computing Establishing a Baseline for CloudPerformance Role of Open Source Software in Data PerformanceUsing the Protocol Analyzer to Measure Center Best Practices for Selecting a Vendor andBandwidth Cost Reduction vs. Reliability Implementing Cloud-Based ApplicationsUsing Ping and Traceroute to Measure Open Source Server Software Choosing the Right VendorNetwork Performance Open Source Database Software Implementing Cloud-Based Applications Security Open Source Applications Software CitrixSSL Open Source System Management Windows Remote DesktopVPN Software VncOverhead Open Source Load-Balancing Software Web BrowsersStorage Options for Cloud Computing The Hypervisor Server ExtensionsStorage Capacity Virtualization as the "Operating System" Thin ClientsData Protection and Partitioning Virtualization with a Host Operating Smart Phones, Pads, Pods, etc.NAS System Virtual Terminal Security Strengths andSAN Virtualization Infections on Virtualized WeaknessesCAS Environments StrengthsRedundancy Type 1 Virtualized Environment Weaknesses Replication Type 2 Virtualized Environment iPhoneMultisiting Virtualization Environments AndroidBackup and Recovery Microsoft Virtualization BlackBerryServer Software Environments that Support Sun xVM VirtualBox Windows MobileCloud Computing Linux/UNIX Virtualization Ubuntu Mobile Internet DeviceServer Capacity VMware Products Mobile Platform VirtualizationVirtualization Data Center and Cloud Infrastructure Kernel-Based Virtual MachineClustering Products VMware Mobile Virtualization PlatformExpansion End-User and Desktop Products Collaboration Applications for MobileServer Functions IBM Virtualization PlatformsApplication Using VMware to see a Virtualized Server Text MessagingWeb Environment iPhone ApplicationsDatabase What It Is BlackBerry ApplicationsVendor Approaches to Cloud Computing Permissive Federation Droid Applications Role of Open Source Software in Data Verified FederationCenter Encrypted FederationCost Reduction vs. Reliability Trusted Federation lineOpen Source Server Software Using XMPP in the Federated Cloud Computing DefinedOpen Source Database Software Environment Cloud Computing ArchitectureOpen Source Applications Software Presence in the Cloud Cloud Computing TermsOpen Source System Management Software What It Is Communication-as-a-Service (CaaS)Open Source Load-Balancing Software Presence Protocols Infrastructure-as-a-Service (IaaS)The Hypervisor Leveraging Presence Monitoring-as-a-Service (MaaS)Virtualization as the "Operating System" Presence Enabled Software-as-a-Service (SaaS)Virtualization with a Host Operating System The Future of Presence Platform-as-a-Service (PaaS)Virtualization Infections on Virtualized The Interrelation of Identity, Presence, Benefits and Limitations of CloudEnvironments and Location in the Cloud ComputingType 1 Virtualized Environment Identity Management BenefitsType 2 Virtualized Environment What It Is LimitationsVirtualization Environments Future of Identity in the Cloud Cloud Computing Case Studies

Page 92: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Microsoft Virtualization Privacy and Its Relation to Cloud-Based How Companies Are Using CloudSun xVM VirtualBox Information Systems ComputingLinux/UNIX Virtualization Personal Information Implementing Applications and Services inVMware Products Privacy-Related Issues the CloudData Center and Cloud Infrastructure Finding Your Private Information Using Your Company's Services vs. theProducts What It Is Cloud ProviderEnd-User and Desktop Products Open Cloud Consortium Working Groups A Cloud Service Provider IntroducedIBM Virtualization Project Matsu Cloud Computing Risks and Issues Using VMware to see a Virtualized Server Project Comet Products and Services Provided by CloudEnvironment HPC in the Cloud Computing Companies What It Is The Open Cloud Testbed OperationalPermissive Federation The Open Science Data Cloud EconomicVerified Federation Intercloud Testbed StaffingEncrypted Federation Reporting on an Open Cloud Consortium Should Your Company Invest in CloudTrusted Federation Working Group Computing?Using XMPP in the Federated Environment Distributed Management Task Force What Should Not be Moved to the Cloud Presence in the Cloud (DMTF) Virtualization in Mainframe ArchitecturesWhat It Is What It Is? and Operating SystemsPresence Protocols DMTK Working Groups Associated with LANs and the CloudLeveraging Presence Cloud Computing Internet and the CloudPresence Enabled Standards for Application Developers Web Services, Browsers, and the CloudThe Future of Presence Protocols Thin ClientThe Interrelation of Identity, Presence, and Scripting Languages Advances in Networking and ProcessingLocation in the Cloud Content Formatting Standards and Speeds that Led to Cloud ComputingIdentity Management Languages Networking DevelopmentsWhat It Is Standards for Security in the Cloud Increased Processing SpeedsFuture of Identity in the Cloud Confidentiality, Integrity, Availability Managed Service Provider Model to CloudPrivacy and Its Relation to Cloud-Based Authentication, Authorization, Computing and Software as a ServiceInformation Systems Accountability (SaaS)Personal Information Regulations for Privacy Single Purpose Architectures Migrate toPrivacy-Related Issues Security Protocols Multipurpose ArchitecturesFinding Your Private Information Establishing a Baseline for Cloud Data Center VirtualizationWhat It Is Performance CollaborationOpen Cloud Consortium Working Groups Best Practices for Selecting a Vendor The Cloud as a Reach ExtenderProject Matsu and Implementing Cloud-Based The Cloud as a Communication EnablerProject Comet Applications The Cloud as an Employee EnablerHPC in the Cloud Choosing the Right Vendor Service-Oriented Architecture (SOA)The Open Cloud Testbed Implementing Cloud-Based Applications Evolving from SOA to the CloudThe Open Science Data Cloud Citrix Capacity: Limited PerformanceIntercloud Testbed Windows Remote Desktop Availability: Communications Failure andReporting on an Open Cloud Consortium Vnc Performance IssuesWorking Group Web Browsers Security: Newer Security Protocols ProvideDistributed Management Task Force Server Extensions More Protection(DMTF) Thin Clients What's Next in Cloud Computing What It Is? Smart Phones, Pads, Pods, etc. Using Industry and International StandardsDMTK Working Groups Associated with Virtual Terminal Security Strengths and Independent ComponentsCloud Computing Weaknesses Message BaseStandards for Application Developers Strengths Location IndependenceProtocols Weaknesses Communication Requirements for CloudScripting Languages iPhone ImplementationContent Formatting Standards and Android Public InternetLanguages BlackBerry Private InternetStandards for Security in the Cloud Windows Mobile Routing to the DatacenterConfidentiality, Integrity, Availability Ubuntu Mobile Internet Device Switching within the Data CenterAuthentication, Authorization, Accountability Mobile Platform Virtualization BandwidthRegulations for Privacy Kernel-Based Virtual Machine Tools Used to Measure NetworkSecurity Protocols VMware Mobile Virtualization Platform PerformanceEstablishing a Baseline for Cloud Collaboration Applications for Mobile Using the Protocol Analyzer to MeasurePerformance Platforms BandwidthBest Practices for Selecting a Vendor and Text Messaging Using Ping and Traceroute to MeasureImplementing Cloud-Based Applications iPhone Applications Network PerformanceChoosing the Right Vendor BlackBerry Applications SecurityImplementing Cloud-Based Applications Droid Applications SSLCitrix VPNWindows Remote Desktop OverheadVnc line Storage Options for Cloud Computing

Page 93: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Web Browsers Cloud Computing Defined Storage CapacityServer Extensions Cloud Computing Architecture Data Protection and PartitioningThin Clients Cloud Computing Terms NASSmart Phones, Pads, Pods, etc. Communication-as-a-Service (CaaS) SANVirtual Terminal Security Strengths and Infrastructure-as-a-Service (IaaS) CASWeaknesses Monitoring-as-a-Service (MaaS) RedundancyStrengths Software-as-a-Service (SaaS) ReplicationWeaknesses Platform-as-a-Service (PaaS) MultisitingiPhone Benefits and Limitations of Cloud Backup and RecoveryAndroid Computing Server Software Environments thatBlackBerry Benefits Support Cloud ComputingWindows Mobile Limitations Server CapacityUbuntu Mobile Internet Device Cloud Computing Case Studies VirtualizationMobile Platform Virtualization How Companies Are Using Cloud ClusteringKernel-Based Virtual Machine Computing ExpansionVMware Mobile Virtualization Platform Implementing Applications and Services Server FunctionsCollaboration Applications for Mobile in the Cloud ApplicationPlatforms Using Your Company's Services vs. the WebText Messaging Cloud Provider DatabaseiPhone Applications A Cloud Service Provider Introduced Vendor Approaches to Cloud ComputingBlackBerry Applications Cloud Computing Risks and Issues Role of Open Source Software in DataDroid Applications Products and Services Provided by Cloud Center

Computing Companies Cost Reduction vs. ReliabilityOperational Open Source Server Software

line Economic Open Source Database SoftwareCloud Computing Defined Staffing Open Source Applications SoftwareCloud Computing Architecture Should Your Company Invest in Cloud Open Source System ManagementCloud Computing Terms Computing? SoftwareCommunication-as-a-Service (CaaS) What Should Not be Moved to the Cloud Open Source Load-Balancing Software Infrastructure-as-a-Service (IaaS) Virtualization in Mainframe Architectures The HypervisorMonitoring-as-a-Service (MaaS) and Operating Systems Virtualization as the "Operating System"Software-as-a-Service (SaaS) LANs and the Cloud Virtualization with a Host OperatingPlatform-as-a-Service (PaaS) Internet and the Cloud SystemBenefits and Limitations of Cloud Computing Web Services, Browsers, and the Cloud Virtualization Infections on VirtualizedBenefits Thin Client EnvironmentsLimitations Advances in Networking and Processing Type 1 Virtualized EnvironmentCloud Computing Case Studies Speeds that Led to Cloud Computing Type 2 Virtualized EnvironmentHow Companies Are Using Cloud Networking Developments Virtualization EnvironmentsComputing Increased Processing Speeds Microsoft VirtualizationImplementing Applications and Services in Managed Service Provider Model to Sun xVM VirtualBoxthe Cloud Cloud Computing and Software as a Linux/UNIX VirtualizationUsing Your Company's Services vs. the Service (SaaS) VMware ProductsCloud Provider Single Purpose Architectures Migrate to Data Center and Cloud InfrastructureA Cloud Service Provider Introduced Multipurpose Architectures ProductsCloud Computing Risks and Issues Data Center Virtualization End-User and Desktop ProductsProducts and Services Provided by Cloud Collaboration IBM VirtualizationComputing Companies The Cloud as a Reach Extender Using VMware to see a Virtualized ServerOperational The Cloud as a Communication Enabler Environment Economic The Cloud as an Employee Enabler What It IsStaffing Service-Oriented Architecture (SOA) Permissive FederationShould Your Company Invest in Cloud Evolving from SOA to the Cloud Verified FederationComputing? Capacity: Limited Performance Encrypted FederationWhat Should Not be Moved to the Cloud Availability: Communications Failure and Trusted FederationVirtualization in Mainframe Architectures Performance Issues Using XMPP in the Federated Environmentand Operating Systems Security: Newer Security Protocols Presence in the CloudLANs and the Cloud Provide More Protection What It IsInternet and the Cloud What's Next in Cloud Computing Presence ProtocolsWeb Services, Browsers, and the Cloud Using Industry and International Leveraging PresenceThin Client Standards Presence EnabledAdvances in Networking and Processing Independent Components The Future of PresenceSpeeds that Led to Cloud Computing Message Base The Interrelation of Identity, Presence, andNetworking Developments Location Independence Location in the CloudIncreased Processing Speeds Communication Requirements for Cloud Identity ManagementManaged Service Provider Model to Cloud Implementation What It IsComputing and Software as a Service Public Internet Future of Identity in the Cloud(SaaS) Private Internet Privacy and Its Relation to Cloud-Based

Page 94: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Single Purpose Architectures Migrate to Routing to the Datacenter Information SystemsMultipurpose Architectures Switching within the Data Center Personal InformationData Center Virtualization Bandwidth Privacy-Related IssuesCollaboration Tools Used to Measure Network Finding Your Private Information The Cloud as a Reach Extender Performance What It IsThe Cloud as a Communication Enabler Using the Protocol Analyzer to Measure Open Cloud Consortium Working GroupsThe Cloud as an Employee Enabler Bandwidth Project MatsuService-Oriented Architecture (SOA) Using Ping and Traceroute to Measure Project CometEvolving from SOA to the Cloud Network Performance HPC in the CloudCapacity: Limited Performance Security The Open Cloud TestbedAvailability: Communications Failure and SSL The Open Science Data CloudPerformance Issues VPN Intercloud TestbedSecurity: Newer Security Protocols Provide Overhead Reporting on an Open Cloud ConsortiumMore Protection Storage Options for Cloud Computing Working GroupWhat's Next in Cloud Computing Storage Capacity Distributed Management Task ForceUsing Industry and International Standards Data Protection and Partitioning (DMTF)Independent Components NAS What It Is?Message Base SAN DMTK Working Groups Associated withLocation Independence CAS Cloud ComputingCommunication Requirements for Cloud Redundancy Standards for Application DevelopersImplementation Replication ProtocolsPublic Internet Multisiting Scripting LanguagesPrivate Internet Backup and Recovery Content Formatting Standards andRouting to the Datacenter Server Software Environments that LanguagesSwitching within the Data Center Support Cloud Computing Standards for Security in the CloudBandwidth Server Capacity Confidentiality, Integrity, AvailabilityTools Used to Measure Network Virtualization Authentication, Authorization,Performance Clustering AccountabilityUsing the Protocol Analyzer to Measure Expansion Regulations for PrivacyBandwidth Server Functions Security ProtocolsUsing Ping and Traceroute to Measure Application Establishing a Baseline for CloudNetwork Performance Web PerformanceSecurity Database Best Practices for Selecting a Vendor andSSL Vendor Approaches to Cloud Computing Implementing Cloud-Based ApplicationsVPN Role of Open Source Software in Data Choosing the Right VendorOverhead Center Implementing Cloud-Based Applications Storage Options for Cloud Computing Cost Reduction vs. Reliability CitrixStorage Capacity Open Source Server Software Windows Remote DesktopData Protection and Partitioning Open Source Database Software VncNAS Open Source Applications Software Web BrowsersSAN Open Source System Management Server ExtensionsCAS Software Thin ClientsRedundancy Open Source Load-Balancing Software Smart Phones, Pads, Pods, etc.Replication The Hypervisor Virtual Terminal Security Strengths andMultisiting Virtualization as the "Operating System" WeaknessesBackup and Recovery Virtualization with a Host Operating StrengthsServer Software Environments that Support System Weaknesses Cloud Computing Virtualization Infections on Virtualized iPhoneServer Capacity Environments AndroidVirtualization Type 1 Virtualized Environment BlackBerryClustering Type 2 Virtualized Environment Windows MobileExpansion Virtualization Environments Ubuntu Mobile Internet DeviceServer Functions Microsoft Virtualization Mobile Platform VirtualizationApplication Sun xVM VirtualBox Kernel-Based Virtual MachineWeb Linux/UNIX Virtualization VMware Mobile Virtualization PlatformDatabase VMware Products Collaboration Applications for MobileVendor Approaches to Cloud Computing Data Center and Cloud Infrastructure PlatformsRole of Open Source Software in Data Products Text MessagingCenter End-User and Desktop Products iPhone ApplicationsCost Reduction vs. Reliability IBM Virtualization BlackBerry ApplicationsOpen Source Server Software Using VMware to see a Virtualized Server Droid Applications Open Source Database Software Environment Open Source Applications Software What It IsOpen Source System Management Software Permissive Federation lineOpen Source Load-Balancing Software Verified Federation Cloud Computing DefinedThe Hypervisor Encrypted Federation Cloud Computing Architecture

Page 95: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization as the "Operating System" Trusted Federation Cloud Computing TermsVirtualization with a Host Operating System Using XMPP in the Federated Communication-as-a-Service (CaaS)Virtualization Infections on Virtualized Environment Infrastructure-as-a-Service (IaaS)Environments Presence in the Cloud Monitoring-as-a-Service (MaaS)Type 1 Virtualized Environment What It Is Software-as-a-Service (SaaS)Type 2 Virtualized Environment Presence Protocols Platform-as-a-Service (PaaS)Virtualization Environments Leveraging Presence Benefits and Limitations of CloudMicrosoft Virtualization Presence Enabled ComputingSun xVM VirtualBox The Future of Presence BenefitsLinux/UNIX Virtualization The Interrelation of Identity, Presence, LimitationsVMware Products and Location in the Cloud Cloud Computing Case StudiesData Center and Cloud Infrastructure Identity Management How Companies Are Using CloudProducts What It Is ComputingEnd-User and Desktop Products Future of Identity in the Cloud Implementing Applications and Services inIBM Virtualization Privacy and Its Relation to Cloud-Based the CloudUsing VMware to see a Virtualized Server Information Systems Using Your Company's Services vs. theEnvironment Personal Information Cloud ProviderWhat It Is Privacy-Related Issues A Cloud Service Provider IntroducedPermissive Federation Finding Your Private Information Cloud Computing Risks and Issues Verified Federation What It Is Products and Services Provided by CloudEncrypted Federation Open Cloud Consortium Working Groups Computing Companies Trusted Federation Project Matsu OperationalUsing XMPP in the Federated Environment Project Comet EconomicPresence in the Cloud HPC in the Cloud StaffingWhat It Is The Open Cloud Testbed Should Your Company Invest in CloudPresence Protocols The Open Science Data Cloud Computing?Leveraging Presence Intercloud Testbed What Should Not be Moved to the Cloud Presence Enabled Reporting on an Open Cloud Consortium Virtualization in Mainframe ArchitecturesThe Future of Presence Working Group and Operating SystemsThe Interrelation of Identity, Presence, and Distributed Management Task Force LANs and the CloudLocation in the Cloud (DMTF) Internet and the CloudIdentity Management What It Is? Web Services, Browsers, and the CloudWhat It Is DMTK Working Groups Associated with Thin ClientFuture of Identity in the Cloud Cloud Computing Advances in Networking and ProcessingPrivacy and Its Relation to Cloud-Based Standards for Application Developers Speeds that Led to Cloud ComputingInformation Systems Protocols Networking DevelopmentsPersonal Information Scripting Languages Increased Processing SpeedsPrivacy-Related Issues Content Formatting Standards and Managed Service Provider Model to CloudFinding Your Private Information Languages Computing and Software as a ServiceWhat It Is Standards for Security in the Cloud (SaaS)Open Cloud Consortium Working Groups Confidentiality, Integrity, Availability Single Purpose Architectures Migrate toProject Matsu Authentication, Authorization, Multipurpose ArchitecturesProject Comet Accountability Data Center VirtualizationHPC in the Cloud Regulations for Privacy CollaborationThe Open Cloud Testbed Security Protocols The Cloud as a Reach ExtenderThe Open Science Data Cloud Establishing a Baseline for Cloud The Cloud as a Communication EnablerIntercloud Testbed Performance The Cloud as an Employee EnablerReporting on an Open Cloud Consortium Best Practices for Selecting a Vendor Service-Oriented Architecture (SOA)Working Group and Implementing Cloud-Based Evolving from SOA to the CloudDistributed Management Task Force Applications Capacity: Limited Performance(DMTF) Choosing the Right Vendor Availability: Communications Failure andWhat It Is? Implementing Cloud-Based Applications Performance IssuesDMTK Working Groups Associated with Citrix Security: Newer Security Protocols ProvideCloud Computing Windows Remote Desktop More ProtectionStandards for Application Developers Vnc What's Next in Cloud Computing Protocols Web Browsers Using Industry and International StandardsScripting Languages Server Extensions Independent ComponentsContent Formatting Standards and Thin Clients Message BaseLanguages Smart Phones, Pads, Pods, etc. Location IndependenceStandards for Security in the Cloud Virtual Terminal Security Strengths and Communication Requirements for CloudConfidentiality, Integrity, Availability Weaknesses ImplementationAuthentication, Authorization, Accountability Strengths Public InternetRegulations for Privacy Weaknesses Private InternetSecurity Protocols iPhone Routing to the DatacenterEstablishing a Baseline for Cloud Android Switching within the Data CenterPerformance BlackBerry Bandwidth

Page 96: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Best Practices for Selecting a Vendor and Windows Mobile Tools Used to Measure NetworkImplementing Cloud-Based Applications Ubuntu Mobile Internet Device PerformanceChoosing the Right Vendor Mobile Platform Virtualization Using the Protocol Analyzer to MeasureImplementing Cloud-Based Applications Kernel-Based Virtual Machine BandwidthCitrix VMware Mobile Virtualization Platform Using Ping and Traceroute to MeasureWindows Remote Desktop Collaboration Applications for Mobile Network PerformanceVnc Platforms SecurityWeb Browsers Text Messaging SSLServer Extensions iPhone Applications VPNThin Clients BlackBerry Applications OverheadSmart Phones, Pads, Pods, etc. Droid Applications Storage Options for Cloud ComputingVirtual Terminal Security Strengths and Storage CapacityWeaknesses Data Protection and PartitioningStrengths line NASWeaknesses Cloud Computing Defined SANiPhone Cloud Computing Architecture CASAndroid Cloud Computing Terms RedundancyBlackBerry Communication-as-a-Service (CaaS) ReplicationWindows Mobile Infrastructure-as-a-Service (IaaS) MultisitingUbuntu Mobile Internet Device Monitoring-as-a-Service (MaaS) Backup and RecoveryMobile Platform Virtualization Software-as-a-Service (SaaS) Server Software Environments thatKernel-Based Virtual Machine Platform-as-a-Service (PaaS) Support Cloud ComputingVMware Mobile Virtualization Platform Benefits and Limitations of Cloud Server CapacityCollaboration Applications for Mobile Computing VirtualizationPlatforms Benefits ClusteringText Messaging Limitations ExpansioniPhone Applications Cloud Computing Case Studies Server FunctionsBlackBerry Applications How Companies Are Using Cloud ApplicationDroid Applications Computing Web

Implementing Applications and Services Databasein the Cloud Vendor Approaches to Cloud Computing

line Using Your Company's Services vs. the Role of Open Source Software in DataCloud Computing Defined Cloud Provider CenterCloud Computing Architecture A Cloud Service Provider Introduced Cost Reduction vs. ReliabilityCloud Computing Terms Cloud Computing Risks and Issues Open Source Server SoftwareCommunication-as-a-Service (CaaS) Products and Services Provided by Cloud Open Source Database SoftwareInfrastructure-as-a-Service (IaaS) Computing Companies Open Source Applications SoftwareMonitoring-as-a-Service (MaaS) Operational Open Source System ManagementSoftware-as-a-Service (SaaS) Economic SoftwarePlatform-as-a-Service (PaaS) Staffing Open Source Load-Balancing Software Benefits and Limitations of Cloud Computing Should Your Company Invest in Cloud The HypervisorBenefits Computing? Virtualization as the "Operating System"Limitations What Should Not be Moved to the Cloud Virtualization with a Host OperatingCloud Computing Case Studies Virtualization in Mainframe Architectures SystemHow Companies Are Using Cloud and Operating Systems Virtualization Infections on VirtualizedComputing LANs and the Cloud EnvironmentsImplementing Applications and Services in Internet and the Cloud Type 1 Virtualized Environmentthe Cloud Web Services, Browsers, and the Cloud Type 2 Virtualized EnvironmentUsing Your Company's Services vs. the Thin Client Virtualization EnvironmentsCloud Provider Advances in Networking and Processing Microsoft VirtualizationA Cloud Service Provider Introduced Speeds that Led to Cloud Computing Sun xVM VirtualBoxCloud Computing Risks and Issues Networking Developments Linux/UNIX VirtualizationProducts and Services Provided by Cloud Increased Processing Speeds VMware ProductsComputing Companies Managed Service Provider Model to Data Center and Cloud InfrastructureOperational Cloud Computing and Software as a ProductsEconomic Service (SaaS) End-User and Desktop ProductsStaffing Single Purpose Architectures Migrate to IBM VirtualizationShould Your Company Invest in Cloud Multipurpose Architectures Using VMware to see a Virtualized ServerComputing? Data Center Virtualization Environment What Should Not be Moved to the Cloud Collaboration What It IsVirtualization in Mainframe Architectures The Cloud as a Reach Extender Permissive Federationand Operating Systems The Cloud as a Communication Enabler Verified FederationLANs and the Cloud The Cloud as an Employee Enabler Encrypted FederationInternet and the Cloud Service-Oriented Architecture (SOA) Trusted FederationWeb Services, Browsers, and the Cloud Evolving from SOA to the Cloud Using XMPP in the Federated EnvironmentThin Client Capacity: Limited Performance Presence in the Cloud

Page 97: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Advances in Networking and Processing Availability: Communications Failure and What It IsSpeeds that Led to Cloud Computing Performance Issues Presence ProtocolsNetworking Developments Security: Newer Security Protocols Leveraging PresenceIncreased Processing Speeds Provide More Protection Presence EnabledManaged Service Provider Model to Cloud What's Next in Cloud Computing The Future of PresenceComputing and Software as a Service Using Industry and International The Interrelation of Identity, Presence, and(SaaS) Standards Location in the CloudSingle Purpose Architectures Migrate to Independent Components Identity ManagementMultipurpose Architectures Message Base What It IsData Center Virtualization Location Independence Future of Identity in the CloudCollaboration Communication Requirements for Cloud Privacy and Its Relation to Cloud-BasedThe Cloud as a Reach Extender Implementation Information SystemsThe Cloud as a Communication Enabler Public Internet Personal InformationThe Cloud as an Employee Enabler Private Internet Privacy-Related IssuesService-Oriented Architecture (SOA) Routing to the Datacenter Finding Your Private Information Evolving from SOA to the Cloud Switching within the Data Center What It IsCapacity: Limited Performance Bandwidth Open Cloud Consortium Working GroupsAvailability: Communications Failure and Tools Used to Measure Network Project MatsuPerformance Issues Performance Project CometSecurity: Newer Security Protocols Provide Using the Protocol Analyzer to Measure HPC in the CloudMore Protection Bandwidth The Open Cloud TestbedWhat's Next in Cloud Computing Using Ping and Traceroute to Measure The Open Science Data CloudUsing Industry and International Standards Network Performance Intercloud TestbedIndependent Components Security Reporting on an Open Cloud ConsortiumMessage Base SSL Working GroupLocation Independence VPN Distributed Management Task ForceCommunication Requirements for Cloud Overhead (DMTF)Implementation Storage Options for Cloud Computing What It Is?Public Internet Storage Capacity DMTK Working Groups Associated withPrivate Internet Data Protection and Partitioning Cloud ComputingRouting to the Datacenter NAS Standards for Application DevelopersSwitching within the Data Center SAN ProtocolsBandwidth CAS Scripting LanguagesTools Used to Measure Network Redundancy Content Formatting Standards andPerformance Replication LanguagesUsing the Protocol Analyzer to Measure Multisiting Standards for Security in the CloudBandwidth Backup and Recovery Confidentiality, Integrity, AvailabilityUsing Ping and Traceroute to Measure Server Software Environments that Authentication, Authorization,Network Performance Support Cloud Computing AccountabilitySecurity Server Capacity Regulations for PrivacySSL Virtualization Security ProtocolsVPN Clustering Establishing a Baseline for CloudOverhead Expansion PerformanceStorage Options for Cloud Computing Server Functions Best Practices for Selecting a Vendor andStorage Capacity Application Implementing Cloud-Based ApplicationsData Protection and Partitioning Web Choosing the Right VendorNAS Database Implementing Cloud-Based Applications SAN Vendor Approaches to Cloud Computing CitrixCAS Role of Open Source Software in Data Windows Remote DesktopRedundancy Center VncReplication Cost Reduction vs. Reliability Web BrowsersMultisiting Open Source Server Software Server ExtensionsBackup and Recovery Open Source Database Software Thin ClientsServer Software Environments that Support Open Source Applications Software Smart Phones, Pads, Pods, etc.Cloud Computing Open Source System Management Virtual Terminal Security Strengths andServer Capacity Software WeaknessesVirtualization Open Source Load-Balancing Software StrengthsClustering The Hypervisor Weaknesses Expansion Virtualization as the "Operating System" iPhoneServer Functions Virtualization with a Host Operating AndroidApplication System BlackBerryWeb Virtualization Infections on Virtualized Windows MobileDatabase Environments Ubuntu Mobile Internet DeviceVendor Approaches to Cloud Computing Type 1 Virtualized Environment Mobile Platform VirtualizationRole of Open Source Software in Data Type 2 Virtualized Environment Kernel-Based Virtual MachineCenter Virtualization Environments VMware Mobile Virtualization Platform

Page 98: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cost Reduction vs. Reliability Microsoft Virtualization Collaboration Applications for MobileOpen Source Server Software Sun xVM VirtualBox PlatformsOpen Source Database Software Linux/UNIX Virtualization Text MessagingOpen Source Applications Software VMware Products iPhone ApplicationsOpen Source System Management Software Data Center and Cloud Infrastructure BlackBerry ApplicationsOpen Source Load-Balancing Software Products Droid Applications The Hypervisor End-User and Desktop ProductsVirtualization as the "Operating System" IBM VirtualizationVirtualization with a Host Operating System Using VMware to see a Virtualized Server lineVirtualization Infections on Virtualized Environment Cloud Computing DefinedEnvironments What It Is Cloud Computing ArchitectureType 1 Virtualized Environment Permissive Federation Cloud Computing TermsType 2 Virtualized Environment Verified Federation Communication-as-a-Service (CaaS)Virtualization Environments Encrypted Federation Infrastructure-as-a-Service (IaaS)Microsoft Virtualization Trusted Federation Monitoring-as-a-Service (MaaS)Sun xVM VirtualBox Using XMPP in the Federated Software-as-a-Service (SaaS)Linux/UNIX Virtualization Environment Platform-as-a-Service (PaaS)VMware Products Presence in the Cloud Benefits and Limitations of CloudData Center and Cloud Infrastructure What It Is ComputingProducts Presence Protocols BenefitsEnd-User and Desktop Products Leveraging Presence LimitationsIBM Virtualization Presence Enabled Cloud Computing Case StudiesUsing VMware to see a Virtualized Server The Future of Presence How Companies Are Using CloudEnvironment The Interrelation of Identity, Presence, ComputingWhat It Is and Location in the Cloud Implementing Applications and Services inPermissive Federation Identity Management the CloudVerified Federation What It Is Using Your Company's Services vs. theEncrypted Federation Future of Identity in the Cloud Cloud ProviderTrusted Federation Privacy and Its Relation to Cloud-Based A Cloud Service Provider IntroducedUsing XMPP in the Federated Environment Information Systems Cloud Computing Risks and Issues Presence in the Cloud Personal Information Products and Services Provided by CloudWhat It Is Privacy-Related Issues Computing Companies Presence Protocols Finding Your Private Information OperationalLeveraging Presence What It Is EconomicPresence Enabled Open Cloud Consortium Working Groups StaffingThe Future of Presence Project Matsu Should Your Company Invest in CloudThe Interrelation of Identity, Presence, and Project Comet Computing?Location in the Cloud HPC in the Cloud What Should Not be Moved to the Cloud Identity Management The Open Cloud Testbed Virtualization in Mainframe ArchitecturesWhat It Is The Open Science Data Cloud and Operating SystemsFuture of Identity in the Cloud Intercloud Testbed LANs and the CloudPrivacy and Its Relation to Cloud-Based Reporting on an Open Cloud Consortium Internet and the CloudInformation Systems Working Group Web Services, Browsers, and the CloudPersonal Information Distributed Management Task Force Thin ClientPrivacy-Related Issues (DMTF) Advances in Networking and ProcessingFinding Your Private Information What It Is? Speeds that Led to Cloud ComputingWhat It Is DMTK Working Groups Associated with Networking DevelopmentsOpen Cloud Consortium Working Groups Cloud Computing Increased Processing SpeedsProject Matsu Standards for Application Developers Managed Service Provider Model to CloudProject Comet Protocols Computing and Software as a ServiceHPC in the Cloud Scripting Languages (SaaS)The Open Cloud Testbed Content Formatting Standards and Single Purpose Architectures Migrate toThe Open Science Data Cloud Languages Multipurpose ArchitecturesIntercloud Testbed Standards for Security in the Cloud Data Center VirtualizationReporting on an Open Cloud Consortium Confidentiality, Integrity, Availability CollaborationWorking Group Authentication, Authorization, The Cloud as a Reach ExtenderDistributed Management Task Force Accountability The Cloud as a Communication Enabler(DMTF) Regulations for Privacy The Cloud as an Employee EnablerWhat It Is? Security Protocols Service-Oriented Architecture (SOA)DMTK Working Groups Associated with Establishing a Baseline for Cloud Evolving from SOA to the CloudCloud Computing Performance Capacity: Limited PerformanceStandards for Application Developers Best Practices for Selecting a Vendor Availability: Communications Failure andProtocols and Implementing Cloud-Based Performance IssuesScripting Languages Applications Security: Newer Security Protocols ProvideContent Formatting Standards and Choosing the Right Vendor More ProtectionLanguages Implementing Cloud-Based Applications What's Next in Cloud Computing

Page 99: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Standards for Security in the Cloud Citrix Using Industry and International StandardsConfidentiality, Integrity, Availability Windows Remote Desktop Independent ComponentsAuthentication, Authorization, Accountability Vnc Message BaseRegulations for Privacy Web Browsers Location IndependenceSecurity Protocols Server Extensions Communication Requirements for CloudEstablishing a Baseline for Cloud Thin Clients ImplementationPerformance Smart Phones, Pads, Pods, etc. Public InternetBest Practices for Selecting a Vendor and Virtual Terminal Security Strengths and Private InternetImplementing Cloud-Based Applications Weaknesses Routing to the DatacenterChoosing the Right Vendor Strengths Switching within the Data CenterImplementing Cloud-Based Applications Weaknesses BandwidthCitrix iPhone Tools Used to Measure NetworkWindows Remote Desktop Android PerformanceVnc BlackBerry Using the Protocol Analyzer to MeasureWeb Browsers Windows Mobile BandwidthServer Extensions Ubuntu Mobile Internet Device Using Ping and Traceroute to MeasureThin Clients Mobile Platform Virtualization Network PerformanceSmart Phones, Pads, Pods, etc. Kernel-Based Virtual Machine SecurityVirtual Terminal Security Strengths and VMware Mobile Virtualization Platform SSLWeaknesses Collaboration Applications for Mobile VPNStrengths Platforms OverheadWeaknesses Text Messaging Storage Options for Cloud ComputingiPhone iPhone Applications Storage CapacityAndroid BlackBerry Applications Data Protection and PartitioningBlackBerry Droid Applications NASWindows Mobile SANUbuntu Mobile Internet Device CASMobile Platform Virtualization line RedundancyKernel-Based Virtual Machine Cloud Computing Defined ReplicationVMware Mobile Virtualization Platform Cloud Computing Architecture MultisitingCollaboration Applications for Mobile Cloud Computing Terms Backup and RecoveryPlatforms Communication-as-a-Service (CaaS) Server Software Environments thatText Messaging Infrastructure-as-a-Service (IaaS) Support Cloud ComputingiPhone Applications Monitoring-as-a-Service (MaaS) Server CapacityBlackBerry Applications Software-as-a-Service (SaaS) VirtualizationDroid Applications Platform-as-a-Service (PaaS) Clustering

Benefits and Limitations of Cloud ExpansionComputing Server Functions

line Benefits ApplicationCloud Computing Defined Limitations WebCloud Computing Architecture Cloud Computing Case Studies DatabaseCloud Computing Terms How Companies Are Using Cloud Vendor Approaches to Cloud ComputingCommunication-as-a-Service (CaaS) Computing Role of Open Source Software in DataInfrastructure-as-a-Service (IaaS) Implementing Applications and Services CenterMonitoring-as-a-Service (MaaS) in the Cloud Cost Reduction vs. ReliabilitySoftware-as-a-Service (SaaS) Using Your Company's Services vs. the Open Source Server SoftwarePlatform-as-a-Service (PaaS) Cloud Provider Open Source Database SoftwareBenefits and Limitations of Cloud Computing A Cloud Service Provider Introduced Open Source Applications SoftwareBenefits Cloud Computing Risks and Issues Open Source System ManagementLimitations Products and Services Provided by Cloud SoftwareCloud Computing Case Studies Computing Companies Open Source Load-Balancing Software How Companies Are Using Cloud Operational The HypervisorComputing Economic Virtualization as the "Operating System"Implementing Applications and Services in Staffing Virtualization with a Host Operatingthe Cloud Should Your Company Invest in Cloud SystemUsing Your Company's Services vs. the Computing? Virtualization Infections on VirtualizedCloud Provider What Should Not be Moved to the Cloud EnvironmentsA Cloud Service Provider Introduced Virtualization in Mainframe Architectures Type 1 Virtualized EnvironmentCloud Computing Risks and Issues and Operating Systems Type 2 Virtualized EnvironmentProducts and Services Provided by Cloud LANs and the Cloud Virtualization EnvironmentsComputing Companies Internet and the Cloud Microsoft VirtualizationOperational Web Services, Browsers, and the Cloud Sun xVM VirtualBoxEconomic Thin Client Linux/UNIX VirtualizationStaffing Advances in Networking and Processing VMware ProductsShould Your Company Invest in Cloud Speeds that Led to Cloud Computing Data Center and Cloud InfrastructureComputing? Networking Developments Products

Page 100: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What Should Not be Moved to the Cloud Increased Processing Speeds End-User and Desktop ProductsVirtualization in Mainframe Architectures Managed Service Provider Model to IBM Virtualizationand Operating Systems Cloud Computing and Software as a Using VMware to see a Virtualized ServerLANs and the Cloud Service (SaaS) Environment Internet and the Cloud Single Purpose Architectures Migrate to What It IsWeb Services, Browsers, and the Cloud Multipurpose Architectures Permissive FederationThin Client Data Center Virtualization Verified FederationAdvances in Networking and Processing Collaboration Encrypted FederationSpeeds that Led to Cloud Computing The Cloud as a Reach Extender Trusted FederationNetworking Developments The Cloud as a Communication Enabler Using XMPP in the Federated EnvironmentIncreased Processing Speeds The Cloud as an Employee Enabler Presence in the CloudManaged Service Provider Model to Cloud Service-Oriented Architecture (SOA) What It IsComputing and Software as a Service Evolving from SOA to the Cloud Presence Protocols(SaaS) Capacity: Limited Performance Leveraging PresenceSingle Purpose Architectures Migrate to Availability: Communications Failure and Presence EnabledMultipurpose Architectures Performance Issues The Future of PresenceData Center Virtualization Security: Newer Security Protocols The Interrelation of Identity, Presence, andCollaboration Provide More Protection Location in the CloudThe Cloud as a Reach Extender What's Next in Cloud Computing Identity ManagementThe Cloud as a Communication Enabler Using Industry and International What It IsThe Cloud as an Employee Enabler Standards Future of Identity in the CloudService-Oriented Architecture (SOA) Independent Components Privacy and Its Relation to Cloud-BasedEvolving from SOA to the Cloud Message Base Information SystemsCapacity: Limited Performance Location Independence Personal InformationAvailability: Communications Failure and Communication Requirements for Cloud Privacy-Related IssuesPerformance Issues Implementation Finding Your Private Information Security: Newer Security Protocols Provide Public Internet What It IsMore Protection Private Internet Open Cloud Consortium Working GroupsWhat's Next in Cloud Computing Routing to the Datacenter Project MatsuUsing Industry and International Standards Switching within the Data Center Project CometIndependent Components Bandwidth HPC in the CloudMessage Base Tools Used to Measure Network The Open Cloud TestbedLocation Independence Performance The Open Science Data CloudCommunication Requirements for Cloud Using the Protocol Analyzer to Measure Intercloud TestbedImplementation Bandwidth Reporting on an Open Cloud ConsortiumPublic Internet Using Ping and Traceroute to Measure Working GroupPrivate Internet Network Performance Distributed Management Task ForceRouting to the Datacenter Security (DMTF)Switching within the Data Center SSL What It Is?Bandwidth VPN DMTK Working Groups Associated withTools Used to Measure Network Overhead Cloud ComputingPerformance Storage Options for Cloud Computing Standards for Application DevelopersUsing the Protocol Analyzer to Measure Storage Capacity ProtocolsBandwidth Data Protection and Partitioning Scripting LanguagesUsing Ping and Traceroute to Measure NAS Content Formatting Standards andNetwork Performance SAN LanguagesSecurity CAS Standards for Security in the CloudSSL Redundancy Confidentiality, Integrity, AvailabilityVPN Replication Authentication, Authorization,Overhead Multisiting AccountabilityStorage Options for Cloud Computing Backup and Recovery Regulations for PrivacyStorage Capacity Server Software Environments that Security ProtocolsData Protection and Partitioning Support Cloud Computing Establishing a Baseline for CloudNAS Server Capacity PerformanceSAN Virtualization Best Practices for Selecting a Vendor andCAS Clustering Implementing Cloud-Based ApplicationsRedundancy Expansion Choosing the Right VendorReplication Server Functions Implementing Cloud-Based Applications Multisiting Application CitrixBackup and Recovery Web Windows Remote DesktopServer Software Environments that Support Database VncCloud Computing Vendor Approaches to Cloud Computing Web BrowsersServer Capacity Role of Open Source Software in Data Server ExtensionsVirtualization Center Thin ClientsClustering Cost Reduction vs. Reliability Smart Phones, Pads, Pods, etc.Expansion Open Source Server Software Virtual Terminal Security Strengths and

Page 101: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Functions Open Source Database Software WeaknessesApplication Open Source Applications Software StrengthsWeb Open Source System Management Weaknesses Database Software iPhoneVendor Approaches to Cloud Computing Open Source Load-Balancing Software AndroidRole of Open Source Software in Data The Hypervisor BlackBerryCenter Virtualization as the "Operating System" Windows MobileCost Reduction vs. Reliability Virtualization with a Host Operating Ubuntu Mobile Internet DeviceOpen Source Server Software System Mobile Platform VirtualizationOpen Source Database Software Virtualization Infections on Virtualized Kernel-Based Virtual MachineOpen Source Applications Software Environments VMware Mobile Virtualization PlatformOpen Source System Management Software Type 1 Virtualized Environment Collaboration Applications for MobileOpen Source Load-Balancing Software Type 2 Virtualized Environment PlatformsThe Hypervisor Virtualization Environments Text MessagingVirtualization as the "Operating System" Microsoft Virtualization iPhone ApplicationsVirtualization with a Host Operating System Sun xVM VirtualBox BlackBerry ApplicationsVirtualization Infections on Virtualized Linux/UNIX Virtualization Droid Applications Environments VMware ProductsType 1 Virtualized Environment Data Center and Cloud InfrastructureType 2 Virtualized Environment Products lineVirtualization Environments End-User and Desktop Products Cloud Computing DefinedMicrosoft Virtualization IBM Virtualization Cloud Computing ArchitectureSun xVM VirtualBox Using VMware to see a Virtualized Server Cloud Computing TermsLinux/UNIX Virtualization Environment Communication-as-a-Service (CaaS)VMware Products What It Is Infrastructure-as-a-Service (IaaS)Data Center and Cloud Infrastructure Permissive Federation Monitoring-as-a-Service (MaaS)Products Verified Federation Software-as-a-Service (SaaS)End-User and Desktop Products Encrypted Federation Platform-as-a-Service (PaaS)IBM Virtualization Trusted Federation Benefits and Limitations of CloudUsing VMware to see a Virtualized Server Using XMPP in the Federated ComputingEnvironment Environment BenefitsWhat It Is Presence in the Cloud LimitationsPermissive Federation What It Is Cloud Computing Case StudiesVerified Federation Presence Protocols How Companies Are Using CloudEncrypted Federation Leveraging Presence ComputingTrusted Federation Presence Enabled Implementing Applications and Services inUsing XMPP in the Federated Environment The Future of Presence the CloudPresence in the Cloud The Interrelation of Identity, Presence, Using Your Company's Services vs. theWhat It Is and Location in the Cloud Cloud ProviderPresence Protocols Identity Management A Cloud Service Provider IntroducedLeveraging Presence What It Is Cloud Computing Risks and Issues Presence Enabled Future of Identity in the Cloud Products and Services Provided by CloudThe Future of Presence Privacy and Its Relation to Cloud-Based Computing Companies The Interrelation of Identity, Presence, and Information Systems OperationalLocation in the Cloud Personal Information EconomicIdentity Management Privacy-Related Issues StaffingWhat It Is Finding Your Private Information Should Your Company Invest in CloudFuture of Identity in the Cloud What It Is Computing?Privacy and Its Relation to Cloud-Based Open Cloud Consortium Working Groups What Should Not be Moved to the Cloud Information Systems Project Matsu Virtualization in Mainframe ArchitecturesPersonal Information Project Comet and Operating SystemsPrivacy-Related Issues HPC in the Cloud LANs and the CloudFinding Your Private Information The Open Cloud Testbed Internet and the CloudWhat It Is The Open Science Data Cloud Web Services, Browsers, and the CloudOpen Cloud Consortium Working Groups Intercloud Testbed Thin ClientProject Matsu Reporting on an Open Cloud Consortium Advances in Networking and ProcessingProject Comet Working Group Speeds that Led to Cloud ComputingHPC in the Cloud Distributed Management Task Force Networking DevelopmentsThe Open Cloud Testbed (DMTF) Increased Processing SpeedsThe Open Science Data Cloud What It Is? Managed Service Provider Model to CloudIntercloud Testbed DMTK Working Groups Associated with Computing and Software as a ServiceReporting on an Open Cloud Consortium Cloud Computing (SaaS)Working Group Standards for Application Developers Single Purpose Architectures Migrate toDistributed Management Task Force Protocols Multipurpose Architectures(DMTF) Scripting Languages Data Center VirtualizationWhat It Is? Content Formatting Standards and Collaboration

Page 102: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

DMTK Working Groups Associated with Languages The Cloud as a Reach ExtenderCloud Computing Standards for Security in the Cloud The Cloud as a Communication EnablerStandards for Application Developers Confidentiality, Integrity, Availability The Cloud as an Employee EnablerProtocols Authentication, Authorization, Service-Oriented Architecture (SOA)Scripting Languages Accountability Evolving from SOA to the CloudContent Formatting Standards and Regulations for Privacy Capacity: Limited PerformanceLanguages Security Protocols Availability: Communications Failure andStandards for Security in the Cloud Establishing a Baseline for Cloud Performance IssuesConfidentiality, Integrity, Availability Performance Security: Newer Security Protocols ProvideAuthentication, Authorization, Accountability Best Practices for Selecting a Vendor More ProtectionRegulations for Privacy and Implementing Cloud-Based What's Next in Cloud Computing Security Protocols Applications Using Industry and International StandardsEstablishing a Baseline for Cloud Choosing the Right Vendor Independent ComponentsPerformance Implementing Cloud-Based Applications Message BaseBest Practices for Selecting a Vendor and Citrix Location IndependenceImplementing Cloud-Based Applications Windows Remote Desktop Communication Requirements for CloudChoosing the Right Vendor Vnc ImplementationImplementing Cloud-Based Applications Web Browsers Public InternetCitrix Server Extensions Private InternetWindows Remote Desktop Thin Clients Routing to the DatacenterVnc Smart Phones, Pads, Pods, etc. Switching within the Data CenterWeb Browsers Virtual Terminal Security Strengths and BandwidthServer Extensions Weaknesses Tools Used to Measure NetworkThin Clients Strengths PerformanceSmart Phones, Pads, Pods, etc. Weaknesses Using the Protocol Analyzer to MeasureVirtual Terminal Security Strengths and iPhone BandwidthWeaknesses Android Using Ping and Traceroute to MeasureStrengths BlackBerry Network PerformanceWeaknesses Windows Mobile SecurityiPhone Ubuntu Mobile Internet Device SSLAndroid Mobile Platform Virtualization VPNBlackBerry Kernel-Based Virtual Machine OverheadWindows Mobile VMware Mobile Virtualization Platform Storage Options for Cloud ComputingUbuntu Mobile Internet Device Collaboration Applications for Mobile Storage CapacityMobile Platform Virtualization Platforms Data Protection and PartitioningKernel-Based Virtual Machine Text Messaging NASVMware Mobile Virtualization Platform iPhone Applications SANCollaboration Applications for Mobile BlackBerry Applications CASPlatforms Droid Applications RedundancyText Messaging ReplicationiPhone Applications MultisitingBlackBerry Applications line Backup and RecoveryDroid Applications Cloud Computing Defined Server Software Environments that

Cloud Computing Architecture Support Cloud ComputingCloud Computing Terms Server Capacity

line Communication-as-a-Service (CaaS) VirtualizationCloud Computing Defined Infrastructure-as-a-Service (IaaS) ClusteringCloud Computing Architecture Monitoring-as-a-Service (MaaS) ExpansionCloud Computing Terms Software-as-a-Service (SaaS) Server FunctionsCommunication-as-a-Service (CaaS) Platform-as-a-Service (PaaS) ApplicationInfrastructure-as-a-Service (IaaS) Benefits and Limitations of Cloud WebMonitoring-as-a-Service (MaaS) Computing DatabaseSoftware-as-a-Service (SaaS) Benefits Vendor Approaches to Cloud ComputingPlatform-as-a-Service (PaaS) Limitations Role of Open Source Software in DataBenefits and Limitations of Cloud Computing Cloud Computing Case Studies CenterBenefits How Companies Are Using Cloud Cost Reduction vs. ReliabilityLimitations Computing Open Source Server SoftwareCloud Computing Case Studies Implementing Applications and Services Open Source Database SoftwareHow Companies Are Using Cloud in the Cloud Open Source Applications SoftwareComputing Using Your Company's Services vs. the Open Source System ManagementImplementing Applications and Services in Cloud Provider Softwarethe Cloud A Cloud Service Provider Introduced Open Source Load-Balancing Software Using Your Company's Services vs. the Cloud Computing Risks and Issues The HypervisorCloud Provider Products and Services Provided by Cloud Virtualization as the "Operating System"A Cloud Service Provider Introduced Computing Companies Virtualization with a Host OperatingCloud Computing Risks and Issues Operational System

Page 103: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Products and Services Provided by Cloud Economic Virtualization Infections on VirtualizedComputing Companies Staffing EnvironmentsOperational Should Your Company Invest in Cloud Type 1 Virtualized EnvironmentEconomic Computing? Type 2 Virtualized EnvironmentStaffing What Should Not be Moved to the Cloud Virtualization EnvironmentsShould Your Company Invest in Cloud Virtualization in Mainframe Architectures Microsoft VirtualizationComputing? and Operating Systems Sun xVM VirtualBoxWhat Should Not be Moved to the Cloud LANs and the Cloud Linux/UNIX VirtualizationVirtualization in Mainframe Architectures Internet and the Cloud VMware Productsand Operating Systems Web Services, Browsers, and the Cloud Data Center and Cloud InfrastructureLANs and the Cloud Thin Client ProductsInternet and the Cloud Advances in Networking and Processing End-User and Desktop ProductsWeb Services, Browsers, and the Cloud Speeds that Led to Cloud Computing IBM VirtualizationThin Client Networking Developments Using VMware to see a Virtualized ServerAdvances in Networking and Processing Increased Processing Speeds Environment Speeds that Led to Cloud Computing Managed Service Provider Model to What It IsNetworking Developments Cloud Computing and Software as a Permissive FederationIncreased Processing Speeds Service (SaaS) Verified FederationManaged Service Provider Model to Cloud Single Purpose Architectures Migrate to Encrypted FederationComputing and Software as a Service Multipurpose Architectures Trusted Federation(SaaS) Data Center Virtualization Using XMPP in the Federated EnvironmentSingle Purpose Architectures Migrate to Collaboration Presence in the CloudMultipurpose Architectures The Cloud as a Reach Extender What It IsData Center Virtualization The Cloud as a Communication Enabler Presence ProtocolsCollaboration The Cloud as an Employee Enabler Leveraging PresenceThe Cloud as a Reach Extender Service-Oriented Architecture (SOA) Presence EnabledThe Cloud as a Communication Enabler Evolving from SOA to the Cloud The Future of PresenceThe Cloud as an Employee Enabler Capacity: Limited Performance The Interrelation of Identity, Presence, andService-Oriented Architecture (SOA) Availability: Communications Failure and Location in the CloudEvolving from SOA to the Cloud Performance Issues Identity ManagementCapacity: Limited Performance Security: Newer Security Protocols What It IsAvailability: Communications Failure and Provide More Protection Future of Identity in the CloudPerformance Issues What's Next in Cloud Computing Privacy and Its Relation to Cloud-BasedSecurity: Newer Security Protocols Provide Using Industry and International Information SystemsMore Protection Standards Personal InformationWhat's Next in Cloud Computing Independent Components Privacy-Related IssuesUsing Industry and International Standards Message Base Finding Your Private Information Independent Components Location Independence What It IsMessage Base Communication Requirements for Cloud Open Cloud Consortium Working GroupsLocation Independence Implementation Project MatsuCommunication Requirements for Cloud Public Internet Project CometImplementation Private Internet HPC in the CloudPublic Internet Routing to the Datacenter The Open Cloud TestbedPrivate Internet Switching within the Data Center The Open Science Data CloudRouting to the Datacenter Bandwidth Intercloud TestbedSwitching within the Data Center Tools Used to Measure Network Reporting on an Open Cloud ConsortiumBandwidth Performance Working GroupTools Used to Measure Network Using the Protocol Analyzer to Measure Distributed Management Task ForcePerformance Bandwidth (DMTF)Using the Protocol Analyzer to Measure Using Ping and Traceroute to Measure What It Is?Bandwidth Network Performance DMTK Working Groups Associated withUsing Ping and Traceroute to Measure Security Cloud ComputingNetwork Performance SSL Standards for Application DevelopersSecurity VPN ProtocolsSSL Overhead Scripting LanguagesVPN Storage Options for Cloud Computing Content Formatting Standards andOverhead Storage Capacity LanguagesStorage Options for Cloud Computing Data Protection and Partitioning Standards for Security in the CloudStorage Capacity NAS Confidentiality, Integrity, AvailabilityData Protection and Partitioning SAN Authentication, Authorization,NAS CAS AccountabilitySAN Redundancy Regulations for PrivacyCAS Replication Security ProtocolsRedundancy Multisiting Establishing a Baseline for CloudReplication Backup and Recovery PerformanceMultisiting Server Software Environments that Best Practices for Selecting a Vendor and

Page 104: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Backup and Recovery Support Cloud Computing Implementing Cloud-Based ApplicationsServer Software Environments that Support Server Capacity Choosing the Right VendorCloud Computing Virtualization Implementing Cloud-Based Applications Server Capacity Clustering CitrixVirtualization Expansion Windows Remote DesktopClustering Server Functions VncExpansion Application Web BrowsersServer Functions Web Server ExtensionsApplication Database Thin ClientsWeb Vendor Approaches to Cloud Computing Smart Phones, Pads, Pods, etc.Database Role of Open Source Software in Data Virtual Terminal Security Strengths andVendor Approaches to Cloud Computing Center WeaknessesRole of Open Source Software in Data Cost Reduction vs. Reliability StrengthsCenter Open Source Server Software Weaknesses Cost Reduction vs. Reliability Open Source Database Software iPhoneOpen Source Server Software Open Source Applications Software AndroidOpen Source Database Software Open Source System Management BlackBerryOpen Source Applications Software Software Windows MobileOpen Source System Management Software Open Source Load-Balancing Software Ubuntu Mobile Internet DeviceOpen Source Load-Balancing Software The Hypervisor Mobile Platform VirtualizationThe Hypervisor Virtualization as the "Operating System" Kernel-Based Virtual MachineVirtualization as the "Operating System" Virtualization with a Host Operating VMware Mobile Virtualization PlatformVirtualization with a Host Operating System System Collaboration Applications for MobileVirtualization Infections on Virtualized Virtualization Infections on Virtualized PlatformsEnvironments Environments Text MessagingType 1 Virtualized Environment Type 1 Virtualized Environment iPhone ApplicationsType 2 Virtualized Environment Type 2 Virtualized Environment BlackBerry ApplicationsVirtualization Environments Virtualization Environments Droid Applications Microsoft Virtualization Microsoft VirtualizationSun xVM VirtualBox Sun xVM VirtualBoxLinux/UNIX Virtualization Linux/UNIX Virtualization lineVMware Products VMware Products Cloud Computing DefinedData Center and Cloud Infrastructure Data Center and Cloud Infrastructure Cloud Computing ArchitectureProducts Products Cloud Computing TermsEnd-User and Desktop Products End-User and Desktop Products Communication-as-a-Service (CaaS)IBM Virtualization IBM Virtualization Infrastructure-as-a-Service (IaaS)Using VMware to see a Virtualized Server Using VMware to see a Virtualized Server Monitoring-as-a-Service (MaaS)Environment Environment Software-as-a-Service (SaaS)What It Is What It Is Platform-as-a-Service (PaaS)Permissive Federation Permissive Federation Benefits and Limitations of CloudVerified Federation Verified Federation ComputingEncrypted Federation Encrypted Federation BenefitsTrusted Federation Trusted Federation LimitationsUsing XMPP in the Federated Environment Using XMPP in the Federated Cloud Computing Case StudiesPresence in the Cloud Environment How Companies Are Using CloudWhat It Is Presence in the Cloud ComputingPresence Protocols What It Is Implementing Applications and Services inLeveraging Presence Presence Protocols the CloudPresence Enabled Leveraging Presence Using Your Company's Services vs. theThe Future of Presence Presence Enabled Cloud ProviderThe Interrelation of Identity, Presence, and The Future of Presence A Cloud Service Provider IntroducedLocation in the Cloud The Interrelation of Identity, Presence, Cloud Computing Risks and Issues Identity Management and Location in the Cloud Products and Services Provided by CloudWhat It Is Identity Management Computing Companies Future of Identity in the Cloud What It Is OperationalPrivacy and Its Relation to Cloud-Based Future of Identity in the Cloud EconomicInformation Systems Privacy and Its Relation to Cloud-Based StaffingPersonal Information Information Systems Should Your Company Invest in CloudPrivacy-Related Issues Personal Information Computing?Finding Your Private Information Privacy-Related Issues What Should Not be Moved to the Cloud What It Is Finding Your Private Information Virtualization in Mainframe ArchitecturesOpen Cloud Consortium Working Groups What It Is and Operating SystemsProject Matsu Open Cloud Consortium Working Groups LANs and the CloudProject Comet Project Matsu Internet and the CloudHPC in the Cloud Project Comet Web Services, Browsers, and the CloudThe Open Cloud Testbed HPC in the Cloud Thin Client

Page 105: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Open Science Data Cloud The Open Cloud Testbed Advances in Networking and ProcessingIntercloud Testbed The Open Science Data Cloud Speeds that Led to Cloud ComputingReporting on an Open Cloud Consortium Intercloud Testbed Networking DevelopmentsWorking Group Reporting on an Open Cloud Consortium Increased Processing SpeedsDistributed Management Task Force Working Group Managed Service Provider Model to Cloud(DMTF) Distributed Management Task Force Computing and Software as a ServiceWhat It Is? (DMTF) (SaaS)DMTK Working Groups Associated with What It Is? Single Purpose Architectures Migrate toCloud Computing DMTK Working Groups Associated with Multipurpose ArchitecturesStandards for Application Developers Cloud Computing Data Center VirtualizationProtocols Standards for Application Developers CollaborationScripting Languages Protocols The Cloud as a Reach ExtenderContent Formatting Standards and Scripting Languages The Cloud as a Communication EnablerLanguages Content Formatting Standards and The Cloud as an Employee EnablerStandards for Security in the Cloud Languages Service-Oriented Architecture (SOA)Confidentiality, Integrity, Availability Standards for Security in the Cloud Evolving from SOA to the CloudAuthentication, Authorization, Accountability Confidentiality, Integrity, Availability Capacity: Limited PerformanceRegulations for Privacy Authentication, Authorization, Availability: Communications Failure andSecurity Protocols Accountability Performance IssuesEstablishing a Baseline for Cloud Regulations for Privacy Security: Newer Security Protocols ProvidePerformance Security Protocols More ProtectionBest Practices for Selecting a Vendor and Establishing a Baseline for Cloud What's Next in Cloud Computing Implementing Cloud-Based Applications Performance Using Industry and International StandardsChoosing the Right Vendor Best Practices for Selecting a Vendor Independent ComponentsImplementing Cloud-Based Applications and Implementing Cloud-Based Message BaseCitrix Applications Location IndependenceWindows Remote Desktop Choosing the Right Vendor Communication Requirements for CloudVnc Implementing Cloud-Based Applications ImplementationWeb Browsers Citrix Public InternetServer Extensions Windows Remote Desktop Private InternetThin Clients Vnc Routing to the DatacenterSmart Phones, Pads, Pods, etc. Web Browsers Switching within the Data CenterVirtual Terminal Security Strengths and Server Extensions BandwidthWeaknesses Thin Clients Tools Used to Measure NetworkStrengths Smart Phones, Pads, Pods, etc. PerformanceWeaknesses Virtual Terminal Security Strengths and Using the Protocol Analyzer to MeasureiPhone Weaknesses BandwidthAndroid Strengths Using Ping and Traceroute to MeasureBlackBerry Weaknesses Network PerformanceWindows Mobile iPhone SecurityUbuntu Mobile Internet Device Android SSLMobile Platform Virtualization BlackBerry VPNKernel-Based Virtual Machine Windows Mobile OverheadVMware Mobile Virtualization Platform Ubuntu Mobile Internet Device Storage Options for Cloud ComputingCollaboration Applications for Mobile Mobile Platform Virtualization Storage CapacityPlatforms Kernel-Based Virtual Machine Data Protection and PartitioningText Messaging VMware Mobile Virtualization Platform NASiPhone Applications Collaboration Applications for Mobile SANBlackBerry Applications Platforms CASDroid Applications Text Messaging Redundancy

iPhone Applications ReplicationBlackBerry Applications Multisiting

line Droid Applications Backup and RecoveryCloud Computing Defined Server Software Environments thatCloud Computing Architecture 6. Virtualization Support Cloud ComputingCloud Computing Terms line Server CapacityCommunication-as-a-Service (CaaS) Student Virtualization Architectures VirtualizationInfrastructure-as-a-Service (IaaS) ClusteringMonitoring-as-a-Service (MaaS) ExpansionSoftware-as-a-Service (SaaS) line Server FunctionsPlatform-as-a-Service (PaaS) Cloud Computing Defined ApplicationBenefits and Limitations of Cloud Computing Cloud Computing Architecture WebBenefits Cloud Computing Terms DatabaseLimitations Communication-as-a-Service (CaaS) Vendor Approaches to Cloud ComputingCloud Computing Case Studies Infrastructure-as-a-Service (IaaS) Role of Open Source Software in DataHow Companies Are Using Cloud Monitoring-as-a-Service (MaaS) Center

Page 106: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Computing Software-as-a-Service (SaaS) Cost Reduction vs. ReliabilityImplementing Applications and Services in Platform-as-a-Service (PaaS) Open Source Server Softwarethe Cloud Benefits and Limitations of Cloud Open Source Database SoftwareUsing Your Company's Services vs. the Computing Open Source Applications SoftwareCloud Provider Benefits Open Source System ManagementA Cloud Service Provider Introduced Limitations SoftwareCloud Computing Risks and Issues Cloud Computing Case Studies Open Source Load-Balancing Software Products and Services Provided by Cloud How Companies Are Using Cloud The HypervisorComputing Companies Computing Virtualization as the "Operating System"Operational Implementing Applications and Services Virtualization with a Host OperatingEconomic in the Cloud SystemStaffing Using Your Company's Services vs. the Virtualization Infections on VirtualizedShould Your Company Invest in Cloud Cloud Provider EnvironmentsComputing? A Cloud Service Provider Introduced Type 1 Virtualized EnvironmentWhat Should Not be Moved to the Cloud Cloud Computing Risks and Issues Type 2 Virtualized EnvironmentVirtualization in Mainframe Architectures Products and Services Provided by Cloud Virtualization Environmentsand Operating Systems Computing Companies Microsoft VirtualizationLANs and the Cloud Operational Sun xVM VirtualBoxInternet and the Cloud Economic Linux/UNIX VirtualizationWeb Services, Browsers, and the Cloud Staffing VMware ProductsThin Client Should Your Company Invest in Cloud Data Center and Cloud InfrastructureAdvances in Networking and Processing Computing? ProductsSpeeds that Led to Cloud Computing What Should Not be Moved to the Cloud End-User and Desktop ProductsNetworking Developments Virtualization in Mainframe Architectures IBM VirtualizationIncreased Processing Speeds and Operating Systems Using VMware to see a Virtualized ServerManaged Service Provider Model to Cloud LANs and the Cloud Environment Computing and Software as a Service Internet and the Cloud What It Is(SaaS) Web Services, Browsers, and the Cloud Permissive FederationSingle Purpose Architectures Migrate to Thin Client Verified FederationMultipurpose Architectures Advances in Networking and Processing Encrypted FederationData Center Virtualization Speeds that Led to Cloud Computing Trusted FederationCollaboration Networking Developments Using XMPP in the Federated EnvironmentThe Cloud as a Reach Extender Increased Processing Speeds Presence in the CloudThe Cloud as a Communication Enabler Managed Service Provider Model to What It IsThe Cloud as an Employee Enabler Cloud Computing and Software as a Presence ProtocolsService-Oriented Architecture (SOA) Service (SaaS) Leveraging PresenceEvolving from SOA to the Cloud Single Purpose Architectures Migrate to Presence EnabledCapacity: Limited Performance Multipurpose Architectures The Future of PresenceAvailability: Communications Failure and Data Center Virtualization The Interrelation of Identity, Presence, andPerformance Issues Collaboration Location in the CloudSecurity: Newer Security Protocols Provide The Cloud as a Reach Extender Identity ManagementMore Protection The Cloud as a Communication Enabler What It IsWhat's Next in Cloud Computing The Cloud as an Employee Enabler Future of Identity in the CloudUsing Industry and International Standards Service-Oriented Architecture (SOA) Privacy and Its Relation to Cloud-BasedIndependent Components Evolving from SOA to the Cloud Information SystemsMessage Base Capacity: Limited Performance Personal InformationLocation Independence Availability: Communications Failure and Privacy-Related IssuesCommunication Requirements for Cloud Performance Issues Finding Your Private Information Implementation Security: Newer Security Protocols What It IsPublic Internet Provide More Protection Open Cloud Consortium Working GroupsPrivate Internet What's Next in Cloud Computing Project MatsuRouting to the Datacenter Using Industry and International Project CometSwitching within the Data Center Standards HPC in the CloudBandwidth Independent Components The Open Cloud TestbedTools Used to Measure Network Message Base The Open Science Data CloudPerformance Location Independence Intercloud TestbedUsing the Protocol Analyzer to Measure Communication Requirements for Cloud Reporting on an Open Cloud ConsortiumBandwidth Implementation Working GroupUsing Ping and Traceroute to Measure Public Internet Distributed Management Task ForceNetwork Performance Private Internet (DMTF)Security Routing to the Datacenter What It Is?SSL Switching within the Data Center DMTK Working Groups Associated withVPN Bandwidth Cloud ComputingOverhead Tools Used to Measure Network Standards for Application DevelopersStorage Options for Cloud Computing Performance ProtocolsStorage Capacity Using the Protocol Analyzer to Measure Scripting Languages

Page 107: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Data Protection and Partitioning Bandwidth Content Formatting Standards andNAS Using Ping and Traceroute to Measure LanguagesSAN Network Performance Standards for Security in the CloudCAS Security Confidentiality, Integrity, AvailabilityRedundancy SSL Authentication, Authorization,Replication VPN AccountabilityMultisiting Overhead Regulations for PrivacyBackup and Recovery Storage Options for Cloud Computing Security ProtocolsServer Software Environments that Support Storage Capacity Establishing a Baseline for CloudCloud Computing Data Protection and Partitioning PerformanceServer Capacity NAS Best Practices for Selecting a Vendor andVirtualization SAN Implementing Cloud-Based ApplicationsClustering CAS Choosing the Right VendorExpansion Redundancy Implementing Cloud-Based Applications Server Functions Replication CitrixApplication Multisiting Windows Remote DesktopWeb Backup and Recovery VncDatabase Server Software Environments that Web BrowsersVendor Approaches to Cloud Computing Support Cloud Computing Server ExtensionsRole of Open Source Software in Data Server Capacity Thin ClientsCenter Virtualization Smart Phones, Pads, Pods, etc.Cost Reduction vs. Reliability Clustering Virtual Terminal Security Strengths andOpen Source Server Software Expansion WeaknessesOpen Source Database Software Server Functions StrengthsOpen Source Applications Software Application Weaknesses Open Source System Management Software Web iPhoneOpen Source Load-Balancing Software Database AndroidThe Hypervisor Vendor Approaches to Cloud Computing BlackBerryVirtualization as the "Operating System" Role of Open Source Software in Data Windows MobileVirtualization with a Host Operating System Center Ubuntu Mobile Internet DeviceVirtualization Infections on Virtualized Cost Reduction vs. Reliability Mobile Platform VirtualizationEnvironments Open Source Server Software Kernel-Based Virtual MachineType 1 Virtualized Environment Open Source Database Software VMware Mobile Virtualization PlatformType 2 Virtualized Environment Open Source Applications Software Collaboration Applications for MobileVirtualization Environments Open Source System Management PlatformsMicrosoft Virtualization Software Text MessagingSun xVM VirtualBox Open Source Load-Balancing Software iPhone ApplicationsLinux/UNIX Virtualization The Hypervisor BlackBerry ApplicationsVMware Products Virtualization as the "Operating System" Droid Applications Data Center and Cloud Infrastructure Virtualization with a Host OperatingProducts System 9. End-User Access to Cloud ComputingEnd-User and Desktop Products Virtualization Infections on Virtualized lineIBM Virtualization Environments Cloud Access Methods Available to EndUsing VMware to see a Virtualized Server Type 1 Virtualized Environment UsersEnvironment Type 2 Virtualized EnvironmentWhat It Is Virtualization EnvironmentsPermissive Federation Microsoft Virtualization lineVerified Federation Sun xVM VirtualBox Cloud Computing DefinedEncrypted Federation Linux/UNIX Virtualization Cloud Computing ArchitectureTrusted Federation VMware Products Cloud Computing TermsUsing XMPP in the Federated Environment Data Center and Cloud Infrastructure Communication-as-a-Service (CaaS)Presence in the Cloud Products Infrastructure-as-a-Service (IaaS)What It Is End-User and Desktop Products Monitoring-as-a-Service (MaaS)Presence Protocols IBM Virtualization Software-as-a-Service (SaaS)Leveraging Presence Using VMware to see a Virtualized Server Platform-as-a-Service (PaaS)Presence Enabled Environment Benefits and Limitations of CloudThe Future of Presence What It Is ComputingThe Interrelation of Identity, Presence, and Permissive Federation BenefitsLocation in the Cloud Verified Federation LimitationsIdentity Management Encrypted Federation Cloud Computing Case StudiesWhat It Is Trusted Federation How Companies Are Using CloudFuture of Identity in the Cloud Using XMPP in the Federated ComputingPrivacy and Its Relation to Cloud-Based Environment Implementing Applications and Services inInformation Systems Presence in the Cloud the CloudPersonal Information What It Is Using Your Company's Services vs. thePrivacy-Related Issues Presence Protocols Cloud Provider

Page 108: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Finding Your Private Information Leveraging Presence A Cloud Service Provider IntroducedWhat It Is Presence Enabled Cloud Computing Risks and Issues Open Cloud Consortium Working Groups The Future of Presence Products and Services Provided by CloudProject Matsu The Interrelation of Identity, Presence, Computing Companies Project Comet and Location in the Cloud OperationalHPC in the Cloud Identity Management EconomicThe Open Cloud Testbed What It Is StaffingThe Open Science Data Cloud Future of Identity in the Cloud Should Your Company Invest in CloudIntercloud Testbed Privacy and Its Relation to Cloud-Based Computing?Reporting on an Open Cloud Consortium Information Systems What Should Not be Moved to the Cloud Working Group Personal Information Virtualization in Mainframe ArchitecturesDistributed Management Task Force Privacy-Related Issues and Operating Systems(DMTF) Finding Your Private Information LANs and the CloudWhat It Is? What It Is Internet and the CloudDMTK Working Groups Associated with Open Cloud Consortium Working Groups Web Services, Browsers, and the CloudCloud Computing Project Matsu Thin ClientStandards for Application Developers Project Comet Advances in Networking and ProcessingProtocols HPC in the Cloud Speeds that Led to Cloud ComputingScripting Languages The Open Cloud Testbed Networking DevelopmentsContent Formatting Standards and The Open Science Data Cloud Increased Processing SpeedsLanguages Intercloud Testbed Managed Service Provider Model to CloudStandards for Security in the Cloud Reporting on an Open Cloud Consortium Computing and Software as a ServiceConfidentiality, Integrity, Availability Working Group (SaaS)Authentication, Authorization, Accountability Distributed Management Task Force Single Purpose Architectures Migrate toRegulations for Privacy (DMTF) Multipurpose ArchitecturesSecurity Protocols What It Is? Data Center VirtualizationEstablishing a Baseline for Cloud DMTK Working Groups Associated with CollaborationPerformance Cloud Computing The Cloud as a Reach ExtenderBest Practices for Selecting a Vendor and Standards for Application Developers The Cloud as a Communication EnablerImplementing Cloud-Based Applications Protocols The Cloud as an Employee EnablerChoosing the Right Vendor Scripting Languages Service-Oriented Architecture (SOA)Implementing Cloud-Based Applications Content Formatting Standards and Evolving from SOA to the CloudCitrix Languages Capacity: Limited PerformanceWindows Remote Desktop Standards for Security in the Cloud Availability: Communications Failure andVnc Confidentiality, Integrity, Availability Performance IssuesWeb Browsers Authentication, Authorization, Security: Newer Security Protocols ProvideServer Extensions Accountability More ProtectionThin Clients Regulations for Privacy What's Next in Cloud Computing Smart Phones, Pads, Pods, etc. Security Protocols Using Industry and International StandardsVirtual Terminal Security Strengths and Establishing a Baseline for Cloud Independent ComponentsWeaknesses Performance Message BaseStrengths Best Practices for Selecting a Vendor Location IndependenceWeaknesses and Implementing Cloud-Based Communication Requirements for CloudiPhone Applications ImplementationAndroid Choosing the Right Vendor Public InternetBlackBerry Implementing Cloud-Based Applications Private InternetWindows Mobile Citrix Routing to the DatacenterUbuntu Mobile Internet Device Windows Remote Desktop Switching within the Data CenterMobile Platform Virtualization Vnc BandwidthKernel-Based Virtual Machine Web Browsers Tools Used to Measure NetworkVMware Mobile Virtualization Platform Server Extensions PerformanceCollaboration Applications for Mobile Thin Clients Using the Protocol Analyzer to MeasurePlatforms Smart Phones, Pads, Pods, etc. BandwidthText Messaging Virtual Terminal Security Strengths and Using Ping and Traceroute to MeasureiPhone Applications Weaknesses Network PerformanceBlackBerry Applications Strengths SecurityDroid Applications Weaknesses SSL

iPhone VPNAndroid Overhead

line BlackBerry Storage Options for Cloud ComputingCloud Computing Defined Windows Mobile Storage CapacityCloud Computing Architecture Ubuntu Mobile Internet Device Data Protection and PartitioningCloud Computing Terms Mobile Platform Virtualization NASCommunication-as-a-Service (CaaS) Kernel-Based Virtual Machine SANInfrastructure-as-a-Service (IaaS) VMware Mobile Virtualization Platform CASMonitoring-as-a-Service (MaaS) Collaboration Applications for Mobile Redundancy

Page 109: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Software-as-a-Service (SaaS) Platforms ReplicationPlatform-as-a-Service (PaaS) Text Messaging MultisitingBenefits and Limitations of Cloud Computing iPhone Applications Backup and RecoveryBenefits BlackBerry Applications Server Software Environments thatLimitations Droid Applications Support Cloud ComputingCloud Computing Case Studies Server CapacityHow Companies Are Using Cloud VirtualizationComputing line ClusteringImplementing Applications and Services in Cloud Computing Defined Expansionthe Cloud Cloud Computing Architecture Server FunctionsUsing Your Company's Services vs. the Cloud Computing Terms ApplicationCloud Provider Communication-as-a-Service (CaaS) WebA Cloud Service Provider Introduced Infrastructure-as-a-Service (IaaS) DatabaseCloud Computing Risks and Issues Monitoring-as-a-Service (MaaS) Vendor Approaches to Cloud ComputingProducts and Services Provided by Cloud Software-as-a-Service (SaaS) Role of Open Source Software in DataComputing Companies Platform-as-a-Service (PaaS) CenterOperational Benefits and Limitations of Cloud Cost Reduction vs. ReliabilityEconomic Computing Open Source Server SoftwareStaffing Benefits Open Source Database SoftwareShould Your Company Invest in Cloud Limitations Open Source Applications SoftwareComputing? Cloud Computing Case Studies Open Source System ManagementWhat Should Not be Moved to the Cloud How Companies Are Using Cloud SoftwareVirtualization in Mainframe Architectures Computing Open Source Load-Balancing Software and Operating Systems Implementing Applications and Services The HypervisorLANs and the Cloud in the Cloud Virtualization as the "Operating System"Internet and the Cloud Using Your Company's Services vs. the Virtualization with a Host OperatingWeb Services, Browsers, and the Cloud Cloud Provider SystemThin Client A Cloud Service Provider Introduced Virtualization Infections on VirtualizedAdvances in Networking and Processing Cloud Computing Risks and Issues EnvironmentsSpeeds that Led to Cloud Computing Products and Services Provided by Cloud Type 1 Virtualized EnvironmentNetworking Developments Computing Companies Type 2 Virtualized EnvironmentIncreased Processing Speeds Operational Virtualization EnvironmentsManaged Service Provider Model to Cloud Economic Microsoft VirtualizationComputing and Software as a Service Staffing Sun xVM VirtualBox(SaaS) Should Your Company Invest in Cloud Linux/UNIX VirtualizationSingle Purpose Architectures Migrate to Computing? VMware ProductsMultipurpose Architectures What Should Not be Moved to the Cloud Data Center and Cloud InfrastructureData Center Virtualization Virtualization in Mainframe Architectures ProductsCollaboration and Operating Systems End-User and Desktop ProductsThe Cloud as a Reach Extender LANs and the Cloud IBM VirtualizationThe Cloud as a Communication Enabler Internet and the Cloud Using VMware to see a Virtualized ServerThe Cloud as an Employee Enabler Web Services, Browsers, and the Cloud Environment Service-Oriented Architecture (SOA) Thin Client What It IsEvolving from SOA to the Cloud Advances in Networking and Processing Permissive FederationCapacity: Limited Performance Speeds that Led to Cloud Computing Verified FederationAvailability: Communications Failure and Networking Developments Encrypted FederationPerformance Issues Increased Processing Speeds Trusted FederationSecurity: Newer Security Protocols Provide Managed Service Provider Model to Using XMPP in the Federated EnvironmentMore Protection Cloud Computing and Software as a Presence in the CloudWhat's Next in Cloud Computing Service (SaaS) What It IsUsing Industry and International Standards Single Purpose Architectures Migrate to Presence ProtocolsIndependent Components Multipurpose Architectures Leveraging PresenceMessage Base Data Center Virtualization Presence EnabledLocation Independence Collaboration The Future of PresenceCommunication Requirements for Cloud The Cloud as a Reach Extender The Interrelation of Identity, Presence, andImplementation The Cloud as a Communication Enabler Location in the CloudPublic Internet The Cloud as an Employee Enabler Identity ManagementPrivate Internet Service-Oriented Architecture (SOA) What It IsRouting to the Datacenter Evolving from SOA to the Cloud Future of Identity in the CloudSwitching within the Data Center Capacity: Limited Performance Privacy and Its Relation to Cloud-BasedBandwidth Availability: Communications Failure and Information SystemsTools Used to Measure Network Performance Issues Personal InformationPerformance Security: Newer Security Protocols Privacy-Related IssuesUsing the Protocol Analyzer to Measure Provide More Protection Finding Your Private Information Bandwidth What's Next in Cloud Computing What It IsUsing Ping and Traceroute to Measure Using Industry and International Open Cloud Consortium Working Groups

Page 110: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Network Performance Standards Project MatsuSecurity Independent Components Project CometSSL Message Base HPC in the CloudVPN Location Independence The Open Cloud TestbedOverhead Communication Requirements for Cloud The Open Science Data CloudStorage Options for Cloud Computing Implementation Intercloud TestbedStorage Capacity Public Internet Reporting on an Open Cloud ConsortiumData Protection and Partitioning Private Internet Working GroupNAS Routing to the Datacenter Distributed Management Task ForceSAN Switching within the Data Center (DMTF)CAS Bandwidth What It Is?Redundancy Tools Used to Measure Network DMTK Working Groups Associated withReplication Performance Cloud ComputingMultisiting Using the Protocol Analyzer to Measure Standards for Application DevelopersBackup and Recovery Bandwidth ProtocolsServer Software Environments that Support Using Ping and Traceroute to Measure Scripting LanguagesCloud Computing Network Performance Content Formatting Standards andServer Capacity Security LanguagesVirtualization SSL Standards for Security in the CloudClustering VPN Confidentiality, Integrity, AvailabilityExpansion Overhead Authentication, Authorization,Server Functions Storage Options for Cloud Computing AccountabilityApplication Storage Capacity Regulations for PrivacyWeb Data Protection and Partitioning Security ProtocolsDatabase NAS Establishing a Baseline for CloudVendor Approaches to Cloud Computing SAN PerformanceRole of Open Source Software in Data CAS Best Practices for Selecting a Vendor andCenter Redundancy Implementing Cloud-Based ApplicationsCost Reduction vs. Reliability Replication Choosing the Right VendorOpen Source Server Software Multisiting Implementing Cloud-Based Applications Open Source Database Software Backup and Recovery CitrixOpen Source Applications Software Server Software Environments that Windows Remote DesktopOpen Source System Management Software Support Cloud Computing VncOpen Source Load-Balancing Software Server Capacity Web BrowsersThe Hypervisor Virtualization Server ExtensionsVirtualization as the "Operating System" Clustering Thin ClientsVirtualization with a Host Operating System Expansion Smart Phones, Pads, Pods, etc.Virtualization Infections on Virtualized Server Functions Virtual Terminal Security Strengths andEnvironments Application WeaknessesType 1 Virtualized Environment Web StrengthsType 2 Virtualized Environment Database Weaknesses Virtualization Environments Vendor Approaches to Cloud Computing iPhoneMicrosoft Virtualization Role of Open Source Software in Data AndroidSun xVM VirtualBox Center BlackBerryLinux/UNIX Virtualization Cost Reduction vs. Reliability Windows MobileVMware Products Open Source Server Software Ubuntu Mobile Internet DeviceData Center and Cloud Infrastructure Open Source Database Software Mobile Platform VirtualizationProducts Open Source Applications Software Kernel-Based Virtual MachineEnd-User and Desktop Products Open Source System Management VMware Mobile Virtualization PlatformIBM Virtualization Software Collaboration Applications for MobileUsing VMware to see a Virtualized Server Open Source Load-Balancing Software PlatformsEnvironment The Hypervisor Text MessagingWhat It Is Virtualization as the "Operating System" iPhone ApplicationsPermissive Federation Virtualization with a Host Operating BlackBerry ApplicationsVerified Federation System Droid Applications Encrypted Federation Virtualization Infections on VirtualizedTrusted Federation EnvironmentsUsing XMPP in the Federated Environment Type 1 Virtualized Environment linePresence in the Cloud Type 2 Virtualized Environment Cloud Computing DefinedWhat It Is Virtualization Environments Cloud Computing ArchitecturePresence Protocols Microsoft Virtualization Cloud Computing TermsLeveraging Presence Sun xVM VirtualBox Communication-as-a-Service (CaaS)Presence Enabled Linux/UNIX Virtualization Infrastructure-as-a-Service (IaaS)The Future of Presence VMware Products Monitoring-as-a-Service (MaaS)The Interrelation of Identity, Presence, and Data Center and Cloud Infrastructure Software-as-a-Service (SaaS)Location in the Cloud Products Platform-as-a-Service (PaaS)

Page 111: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Identity Management End-User and Desktop Products Benefits and Limitations of CloudWhat It Is IBM Virtualization ComputingFuture of Identity in the Cloud Using VMware to see a Virtualized Server BenefitsPrivacy and Its Relation to Cloud-Based Environment LimitationsInformation Systems What It Is Cloud Computing Case StudiesPersonal Information Permissive Federation How Companies Are Using CloudPrivacy-Related Issues Verified Federation ComputingFinding Your Private Information Encrypted Federation Implementing Applications and Services inWhat It Is Trusted Federation the CloudOpen Cloud Consortium Working Groups Using XMPP in the Federated Using Your Company's Services vs. theProject Matsu Environment Cloud ProviderProject Comet Presence in the Cloud A Cloud Service Provider IntroducedHPC in the Cloud What It Is Cloud Computing Risks and Issues The Open Cloud Testbed Presence Protocols Products and Services Provided by CloudThe Open Science Data Cloud Leveraging Presence Computing Companies Intercloud Testbed Presence Enabled OperationalReporting on an Open Cloud Consortium The Future of Presence EconomicWorking Group The Interrelation of Identity, Presence, StaffingDistributed Management Task Force and Location in the Cloud Should Your Company Invest in Cloud(DMTF) Identity Management Computing?What It Is? What It Is What Should Not be Moved to the Cloud DMTK Working Groups Associated with Future of Identity in the Cloud Virtualization in Mainframe ArchitecturesCloud Computing Privacy and Its Relation to Cloud-Based and Operating SystemsStandards for Application Developers Information Systems LANs and the CloudProtocols Personal Information Internet and the CloudScripting Languages Privacy-Related Issues Web Services, Browsers, and the CloudContent Formatting Standards and Finding Your Private Information Thin ClientLanguages What It Is Advances in Networking and ProcessingStandards for Security in the Cloud Open Cloud Consortium Working Groups Speeds that Led to Cloud ComputingConfidentiality, Integrity, Availability Project Matsu Networking DevelopmentsAuthentication, Authorization, Accountability Project Comet Increased Processing SpeedsRegulations for Privacy HPC in the Cloud Managed Service Provider Model to CloudSecurity Protocols The Open Cloud Testbed Computing and Software as a ServiceEstablishing a Baseline for Cloud The Open Science Data Cloud (SaaS)Performance Intercloud Testbed Single Purpose Architectures Migrate toBest Practices for Selecting a Vendor and Reporting on an Open Cloud Consortium Multipurpose ArchitecturesImplementing Cloud-Based Applications Working Group Data Center VirtualizationChoosing the Right Vendor Distributed Management Task Force CollaborationImplementing Cloud-Based Applications (DMTF) The Cloud as a Reach ExtenderCitrix What It Is? The Cloud as a Communication EnablerWindows Remote Desktop DMTK Working Groups Associated with The Cloud as an Employee EnablerVnc Cloud Computing Service-Oriented Architecture (SOA)Web Browsers Standards for Application Developers Evolving from SOA to the CloudServer Extensions Protocols Capacity: Limited PerformanceThin Clients Scripting Languages Availability: Communications Failure andSmart Phones, Pads, Pods, etc. Content Formatting Standards and Performance IssuesVirtual Terminal Security Strengths and Languages Security: Newer Security Protocols ProvideWeaknesses Standards for Security in the Cloud More ProtectionStrengths Confidentiality, Integrity, Availability What's Next in Cloud Computing Weaknesses Authentication, Authorization, Using Industry and International StandardsiPhone Accountability Independent ComponentsAndroid Regulations for Privacy Message BaseBlackBerry Security Protocols Location IndependenceWindows Mobile Establishing a Baseline for Cloud Communication Requirements for CloudUbuntu Mobile Internet Device Performance ImplementationMobile Platform Virtualization Best Practices for Selecting a Vendor Public InternetKernel-Based Virtual Machine and Implementing Cloud-Based Private InternetVMware Mobile Virtualization Platform Applications Routing to the DatacenterCollaboration Applications for Mobile Choosing the Right Vendor Switching within the Data CenterPlatforms Implementing Cloud-Based Applications BandwidthText Messaging Citrix Tools Used to Measure NetworkiPhone Applications Windows Remote Desktop PerformanceBlackBerry Applications Vnc Using the Protocol Analyzer to MeasureDroid Applications Web Browsers Bandwidth

Server Extensions Using Ping and Traceroute to MeasureThin Clients Network Performance

Page 112: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

line Smart Phones, Pads, Pods, etc. SecurityCloud Computing Defined Virtual Terminal Security Strengths and SSLCloud Computing Architecture Weaknesses VPNCloud Computing Terms Strengths OverheadCommunication-as-a-Service (CaaS) Weaknesses Storage Options for Cloud ComputingInfrastructure-as-a-Service (IaaS) iPhone Storage CapacityMonitoring-as-a-Service (MaaS) Android Data Protection and PartitioningSoftware-as-a-Service (SaaS) BlackBerry NASPlatform-as-a-Service (PaaS) Windows Mobile SANBenefits and Limitations of Cloud Computing Ubuntu Mobile Internet Device CASBenefits Mobile Platform Virtualization RedundancyLimitations Kernel-Based Virtual Machine ReplicationCloud Computing Case Studies VMware Mobile Virtualization Platform MultisitingHow Companies Are Using Cloud Collaboration Applications for Mobile Backup and RecoveryComputing Platforms Server Software Environments thatImplementing Applications and Services in Text Messaging Support Cloud Computingthe Cloud iPhone Applications Server CapacityUsing Your Company's Services vs. the BlackBerry Applications VirtualizationCloud Provider Droid Applications ClusteringA Cloud Service Provider Introduced ExpansionCloud Computing Risks and Issues Server FunctionsProducts and Services Provided by Cloud line ApplicationComputing Companies Cloud Computing Defined WebOperational Cloud Computing Architecture DatabaseEconomic Cloud Computing Terms Vendor Approaches to Cloud ComputingStaffing Communication-as-a-Service (CaaS) Role of Open Source Software in DataShould Your Company Invest in Cloud Infrastructure-as-a-Service (IaaS) CenterComputing? Monitoring-as-a-Service (MaaS) Cost Reduction vs. ReliabilityWhat Should Not be Moved to the Cloud Software-as-a-Service (SaaS) Open Source Server SoftwareVirtualization in Mainframe Architectures Platform-as-a-Service (PaaS) Open Source Database Softwareand Operating Systems Benefits and Limitations of Cloud Open Source Applications SoftwareLANs and the Cloud Computing Open Source System ManagementInternet and the Cloud Benefits SoftwareWeb Services, Browsers, and the Cloud Limitations Open Source Load-Balancing Software Thin Client Cloud Computing Case Studies The HypervisorAdvances in Networking and Processing How Companies Are Using Cloud Virtualization as the "Operating System"Speeds that Led to Cloud Computing Computing Virtualization with a Host OperatingNetworking Developments Implementing Applications and Services SystemIncreased Processing Speeds in the Cloud Virtualization Infections on VirtualizedManaged Service Provider Model to Cloud Using Your Company's Services vs. the EnvironmentsComputing and Software as a Service Cloud Provider Type 1 Virtualized Environment(SaaS) A Cloud Service Provider Introduced Type 2 Virtualized EnvironmentSingle Purpose Architectures Migrate to Cloud Computing Risks and Issues Virtualization EnvironmentsMultipurpose Architectures Products and Services Provided by Cloud Microsoft VirtualizationData Center Virtualization Computing Companies Sun xVM VirtualBoxCollaboration Operational Linux/UNIX VirtualizationThe Cloud as a Reach Extender Economic VMware ProductsThe Cloud as a Communication Enabler Staffing Data Center and Cloud InfrastructureThe Cloud as an Employee Enabler Should Your Company Invest in Cloud ProductsService-Oriented Architecture (SOA) Computing? End-User and Desktop ProductsEvolving from SOA to the Cloud What Should Not be Moved to the Cloud IBM VirtualizationCapacity: Limited Performance Virtualization in Mainframe Architectures Using VMware to see a Virtualized ServerAvailability: Communications Failure and and Operating Systems Environment Performance Issues LANs and the Cloud What It IsSecurity: Newer Security Protocols Provide Internet and the Cloud Permissive FederationMore Protection Web Services, Browsers, and the Cloud Verified FederationWhat's Next in Cloud Computing Thin Client Encrypted FederationUsing Industry and International Standards Advances in Networking and Processing Trusted FederationIndependent Components Speeds that Led to Cloud Computing Using XMPP in the Federated EnvironmentMessage Base Networking Developments Presence in the CloudLocation Independence Increased Processing Speeds What It IsCommunication Requirements for Cloud Managed Service Provider Model to Presence ProtocolsImplementation Cloud Computing and Software as a Leveraging PresencePublic Internet Service (SaaS) Presence EnabledPrivate Internet Single Purpose Architectures Migrate to The Future of PresenceRouting to the Datacenter Multipurpose Architectures The Interrelation of Identity, Presence, and

Page 113: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Switching within the Data Center Data Center Virtualization Location in the CloudBandwidth Collaboration Identity ManagementTools Used to Measure Network The Cloud as a Reach Extender What It IsPerformance The Cloud as a Communication Enabler Future of Identity in the CloudUsing the Protocol Analyzer to Measure The Cloud as an Employee Enabler Privacy and Its Relation to Cloud-BasedBandwidth Service-Oriented Architecture (SOA) Information SystemsUsing Ping and Traceroute to Measure Evolving from SOA to the Cloud Personal InformationNetwork Performance Capacity: Limited Performance Privacy-Related IssuesSecurity Availability: Communications Failure and Finding Your Private Information SSL Performance Issues What It IsVPN Security: Newer Security Protocols Open Cloud Consortium Working GroupsOverhead Provide More Protection Project MatsuStorage Options for Cloud Computing What's Next in Cloud Computing Project CometStorage Capacity Using Industry and International HPC in the CloudData Protection and Partitioning Standards The Open Cloud TestbedNAS Independent Components The Open Science Data CloudSAN Message Base Intercloud TestbedCAS Location Independence Reporting on an Open Cloud ConsortiumRedundancy Communication Requirements for Cloud Working GroupReplication Implementation Distributed Management Task ForceMultisiting Public Internet (DMTF)Backup and Recovery Private Internet What It Is?Server Software Environments that Support Routing to the Datacenter DMTK Working Groups Associated withCloud Computing Switching within the Data Center Cloud ComputingServer Capacity Bandwidth Standards for Application DevelopersVirtualization Tools Used to Measure Network ProtocolsClustering Performance Scripting LanguagesExpansion Using the Protocol Analyzer to Measure Content Formatting Standards andServer Functions Bandwidth LanguagesApplication Using Ping and Traceroute to Measure Standards for Security in the CloudWeb Network Performance Confidentiality, Integrity, AvailabilityDatabase Security Authentication, Authorization,Vendor Approaches to Cloud Computing SSL AccountabilityRole of Open Source Software in Data VPN Regulations for PrivacyCenter Overhead Security ProtocolsCost Reduction vs. Reliability Storage Options for Cloud Computing Establishing a Baseline for CloudOpen Source Server Software Storage Capacity PerformanceOpen Source Database Software Data Protection and Partitioning Best Practices for Selecting a Vendor andOpen Source Applications Software NAS Implementing Cloud-Based ApplicationsOpen Source System Management Software SAN Choosing the Right VendorOpen Source Load-Balancing Software CAS Implementing Cloud-Based Applications The Hypervisor Redundancy CitrixVirtualization as the "Operating System" Replication Windows Remote DesktopVirtualization with a Host Operating System Multisiting VncVirtualization Infections on Virtualized Backup and Recovery Web BrowsersEnvironments Server Software Environments that Server ExtensionsType 1 Virtualized Environment Support Cloud Computing Thin ClientsType 2 Virtualized Environment Server Capacity Smart Phones, Pads, Pods, etc.Virtualization Environments Virtualization Virtual Terminal Security Strengths andMicrosoft Virtualization Clustering WeaknessesSun xVM VirtualBox Expansion StrengthsLinux/UNIX Virtualization Server Functions Weaknesses VMware Products Application iPhoneData Center and Cloud Infrastructure Web AndroidProducts Database BlackBerryEnd-User and Desktop Products Vendor Approaches to Cloud Computing Windows MobileIBM Virtualization Role of Open Source Software in Data Ubuntu Mobile Internet DeviceUsing VMware to see a Virtualized Server Center Mobile Platform VirtualizationEnvironment Cost Reduction vs. Reliability Kernel-Based Virtual MachineWhat It Is Open Source Server Software VMware Mobile Virtualization PlatformPermissive Federation Open Source Database Software Collaboration Applications for MobileVerified Federation Open Source Applications Software PlatformsEncrypted Federation Open Source System Management Text MessagingTrusted Federation Software iPhone ApplicationsUsing XMPP in the Federated Environment Open Source Load-Balancing Software BlackBerry ApplicationsPresence in the Cloud The Hypervisor Droid Applications

Page 114: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What It Is Virtualization as the "Operating System"Presence Protocols Virtualization with a Host OperatingLeveraging Presence System linePresence Enabled Virtualization Infections on Virtualized Cloud Computing DefinedThe Future of Presence Environments Cloud Computing ArchitectureThe Interrelation of Identity, Presence, and Type 1 Virtualized Environment Cloud Computing TermsLocation in the Cloud Type 2 Virtualized Environment Communication-as-a-Service (CaaS)Identity Management Virtualization Environments Infrastructure-as-a-Service (IaaS)What It Is Microsoft Virtualization Monitoring-as-a-Service (MaaS)Future of Identity in the Cloud Sun xVM VirtualBox Software-as-a-Service (SaaS)Privacy and Its Relation to Cloud-Based Linux/UNIX Virtualization Platform-as-a-Service (PaaS)Information Systems VMware Products Benefits and Limitations of CloudPersonal Information Data Center and Cloud Infrastructure ComputingPrivacy-Related Issues Products BenefitsFinding Your Private Information End-User and Desktop Products LimitationsWhat It Is IBM Virtualization Cloud Computing Case StudiesOpen Cloud Consortium Working Groups Using VMware to see a Virtualized Server How Companies Are Using CloudProject Matsu Environment ComputingProject Comet What It Is Implementing Applications and Services inHPC in the Cloud Permissive Federation the CloudThe Open Cloud Testbed Verified Federation Using Your Company's Services vs. theThe Open Science Data Cloud Encrypted Federation Cloud ProviderIntercloud Testbed Trusted Federation A Cloud Service Provider IntroducedReporting on an Open Cloud Consortium Using XMPP in the Federated Cloud Computing Risks and Issues Working Group Environment Products and Services Provided by CloudDistributed Management Task Force Presence in the Cloud Computing Companies (DMTF) What It Is OperationalWhat It Is? Presence Protocols EconomicDMTK Working Groups Associated with Leveraging Presence StaffingCloud Computing Presence Enabled Should Your Company Invest in CloudStandards for Application Developers The Future of Presence Computing?Protocols The Interrelation of Identity, Presence, What Should Not be Moved to the Cloud Scripting Languages and Location in the Cloud Virtualization in Mainframe ArchitecturesContent Formatting Standards and Identity Management and Operating SystemsLanguages What It Is LANs and the CloudStandards for Security in the Cloud Future of Identity in the Cloud Internet and the CloudConfidentiality, Integrity, Availability Privacy and Its Relation to Cloud-Based Web Services, Browsers, and the CloudAuthentication, Authorization, Accountability Information Systems Thin ClientRegulations for Privacy Personal Information Advances in Networking and ProcessingSecurity Protocols Privacy-Related Issues Speeds that Led to Cloud ComputingEstablishing a Baseline for Cloud Finding Your Private Information Networking DevelopmentsPerformance What It Is Increased Processing SpeedsBest Practices for Selecting a Vendor and Open Cloud Consortium Working Groups Managed Service Provider Model to CloudImplementing Cloud-Based Applications Project Matsu Computing and Software as a ServiceChoosing the Right Vendor Project Comet (SaaS)Implementing Cloud-Based Applications HPC in the Cloud Single Purpose Architectures Migrate toCitrix The Open Cloud Testbed Multipurpose ArchitecturesWindows Remote Desktop The Open Science Data Cloud Data Center VirtualizationVnc Intercloud Testbed CollaborationWeb Browsers Reporting on an Open Cloud Consortium The Cloud as a Reach ExtenderServer Extensions Working Group The Cloud as a Communication EnablerThin Clients Distributed Management Task Force The Cloud as an Employee EnablerSmart Phones, Pads, Pods, etc. (DMTF) Service-Oriented Architecture (SOA)Virtual Terminal Security Strengths and What It Is? Evolving from SOA to the CloudWeaknesses DMTK Working Groups Associated with Capacity: Limited PerformanceStrengths Cloud Computing Availability: Communications Failure andWeaknesses Standards for Application Developers Performance IssuesiPhone Protocols Security: Newer Security Protocols ProvideAndroid Scripting Languages More ProtectionBlackBerry Content Formatting Standards and What's Next in Cloud Computing Windows Mobile Languages Using Industry and International StandardsUbuntu Mobile Internet Device Standards for Security in the Cloud Independent ComponentsMobile Platform Virtualization Confidentiality, Integrity, Availability Message BaseKernel-Based Virtual Machine Authentication, Authorization, Location IndependenceVMware Mobile Virtualization Platform Accountability Communication Requirements for CloudCollaboration Applications for Mobile Regulations for Privacy Implementation

Page 115: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Platforms Security Protocols Public InternetText Messaging Establishing a Baseline for Cloud Private InternetiPhone Applications Performance Routing to the DatacenterBlackBerry Applications Best Practices for Selecting a Vendor Switching within the Data CenterDroid Applications and Implementing Cloud-Based Bandwidth

Applications Tools Used to Measure NetworkChoosing the Right Vendor Performance

line Implementing Cloud-Based Applications Using the Protocol Analyzer to MeasureCloud Computing Defined Citrix BandwidthCloud Computing Architecture Windows Remote Desktop Using Ping and Traceroute to MeasureCloud Computing Terms Vnc Network PerformanceCommunication-as-a-Service (CaaS) Web Browsers SecurityInfrastructure-as-a-Service (IaaS) Server Extensions SSLMonitoring-as-a-Service (MaaS) Thin Clients VPNSoftware-as-a-Service (SaaS) Smart Phones, Pads, Pods, etc. OverheadPlatform-as-a-Service (PaaS) Virtual Terminal Security Strengths and Storage Options for Cloud ComputingBenefits and Limitations of Cloud Computing Weaknesses Storage CapacityBenefits Strengths Data Protection and PartitioningLimitations Weaknesses NASCloud Computing Case Studies iPhone SANHow Companies Are Using Cloud Android CASComputing BlackBerry RedundancyImplementing Applications and Services in Windows Mobile Replicationthe Cloud Ubuntu Mobile Internet Device MultisitingUsing Your Company's Services vs. the Mobile Platform Virtualization Backup and RecoveryCloud Provider Kernel-Based Virtual Machine Server Software Environments thatA Cloud Service Provider Introduced VMware Mobile Virtualization Platform Support Cloud ComputingCloud Computing Risks and Issues Collaboration Applications for Mobile Server CapacityProducts and Services Provided by Cloud Platforms VirtualizationComputing Companies Text Messaging ClusteringOperational iPhone Applications ExpansionEconomic BlackBerry Applications Server FunctionsStaffing Droid Applications ApplicationShould Your Company Invest in Cloud WebComputing? DatabaseWhat Should Not be Moved to the Cloud line Vendor Approaches to Cloud ComputingVirtualization in Mainframe Architectures Cloud Computing Defined Role of Open Source Software in Dataand Operating Systems Cloud Computing Architecture CenterLANs and the Cloud Cloud Computing Terms Cost Reduction vs. ReliabilityInternet and the Cloud Communication-as-a-Service (CaaS) Open Source Server SoftwareWeb Services, Browsers, and the Cloud Infrastructure-as-a-Service (IaaS) Open Source Database SoftwareThin Client Monitoring-as-a-Service (MaaS) Open Source Applications SoftwareAdvances in Networking and Processing Software-as-a-Service (SaaS) Open Source System ManagementSpeeds that Led to Cloud Computing Platform-as-a-Service (PaaS) SoftwareNetworking Developments Benefits and Limitations of Cloud Open Source Load-Balancing Software Increased Processing Speeds Computing The HypervisorManaged Service Provider Model to Cloud Benefits Virtualization as the "Operating System"Computing and Software as a Service Limitations Virtualization with a Host Operating(SaaS) Cloud Computing Case Studies SystemSingle Purpose Architectures Migrate to How Companies Are Using Cloud Virtualization Infections on VirtualizedMultipurpose Architectures Computing EnvironmentsData Center Virtualization Implementing Applications and Services Type 1 Virtualized EnvironmentCollaboration in the Cloud Type 2 Virtualized EnvironmentThe Cloud as a Reach Extender Using Your Company's Services vs. the Virtualization EnvironmentsThe Cloud as a Communication Enabler Cloud Provider Microsoft VirtualizationThe Cloud as an Employee Enabler A Cloud Service Provider Introduced Sun xVM VirtualBoxService-Oriented Architecture (SOA) Cloud Computing Risks and Issues Linux/UNIX VirtualizationEvolving from SOA to the Cloud Products and Services Provided by Cloud VMware ProductsCapacity: Limited Performance Computing Companies Data Center and Cloud InfrastructureAvailability: Communications Failure and Operational ProductsPerformance Issues Economic End-User and Desktop ProductsSecurity: Newer Security Protocols Provide Staffing IBM VirtualizationMore Protection Should Your Company Invest in Cloud Using VMware to see a Virtualized ServerWhat's Next in Cloud Computing Computing? Environment Using Industry and International Standards What Should Not be Moved to the Cloud What It IsIndependent Components Virtualization in Mainframe Architectures Permissive Federation

Page 116: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Message Base and Operating Systems Verified FederationLocation Independence LANs and the Cloud Encrypted FederationCommunication Requirements for Cloud Internet and the Cloud Trusted FederationImplementation Web Services, Browsers, and the Cloud Using XMPP in the Federated EnvironmentPublic Internet Thin Client Presence in the CloudPrivate Internet Advances in Networking and Processing What It IsRouting to the Datacenter Speeds that Led to Cloud Computing Presence ProtocolsSwitching within the Data Center Networking Developments Leveraging PresenceBandwidth Increased Processing Speeds Presence EnabledTools Used to Measure Network Managed Service Provider Model to The Future of PresencePerformance Cloud Computing and Software as a The Interrelation of Identity, Presence, andUsing the Protocol Analyzer to Measure Service (SaaS) Location in the CloudBandwidth Single Purpose Architectures Migrate to Identity ManagementUsing Ping and Traceroute to Measure Multipurpose Architectures What It IsNetwork Performance Data Center Virtualization Future of Identity in the CloudSecurity Collaboration Privacy and Its Relation to Cloud-BasedSSL The Cloud as a Reach Extender Information SystemsVPN The Cloud as a Communication Enabler Personal InformationOverhead The Cloud as an Employee Enabler Privacy-Related IssuesStorage Options for Cloud Computing Service-Oriented Architecture (SOA) Finding Your Private Information Storage Capacity Evolving from SOA to the Cloud What It IsData Protection and Partitioning Capacity: Limited Performance Open Cloud Consortium Working GroupsNAS Availability: Communications Failure and Project MatsuSAN Performance Issues Project CometCAS Security: Newer Security Protocols HPC in the CloudRedundancy Provide More Protection The Open Cloud TestbedReplication What's Next in Cloud Computing The Open Science Data CloudMultisiting Using Industry and International Intercloud TestbedBackup and Recovery Standards Reporting on an Open Cloud ConsortiumServer Software Environments that Support Independent Components Working GroupCloud Computing Message Base Distributed Management Task ForceServer Capacity Location Independence (DMTF)Virtualization Communication Requirements for Cloud What It Is?Clustering Implementation DMTK Working Groups Associated withExpansion Public Internet Cloud ComputingServer Functions Private Internet Standards for Application DevelopersApplication Routing to the Datacenter ProtocolsWeb Switching within the Data Center Scripting LanguagesDatabase Bandwidth Content Formatting Standards andVendor Approaches to Cloud Computing Tools Used to Measure Network LanguagesRole of Open Source Software in Data Performance Standards for Security in the CloudCenter Using the Protocol Analyzer to Measure Confidentiality, Integrity, AvailabilityCost Reduction vs. Reliability Bandwidth Authentication, Authorization,Open Source Server Software Using Ping and Traceroute to Measure AccountabilityOpen Source Database Software Network Performance Regulations for PrivacyOpen Source Applications Software Security Security ProtocolsOpen Source System Management Software SSL Establishing a Baseline for CloudOpen Source Load-Balancing Software VPN PerformanceThe Hypervisor Overhead Best Practices for Selecting a Vendor andVirtualization as the "Operating System" Storage Options for Cloud Computing Implementing Cloud-Based ApplicationsVirtualization with a Host Operating System Storage Capacity Choosing the Right VendorVirtualization Infections on Virtualized Data Protection and Partitioning Implementing Cloud-Based Applications Environments NAS CitrixType 1 Virtualized Environment SAN Windows Remote DesktopType 2 Virtualized Environment CAS VncVirtualization Environments Redundancy Web BrowsersMicrosoft Virtualization Replication Server ExtensionsSun xVM VirtualBox Multisiting Thin ClientsLinux/UNIX Virtualization Backup and Recovery Smart Phones, Pads, Pods, etc.VMware Products Server Software Environments that Virtual Terminal Security Strengths andData Center and Cloud Infrastructure Support Cloud Computing WeaknessesProducts Server Capacity StrengthsEnd-User and Desktop Products Virtualization Weaknesses IBM Virtualization Clustering iPhoneUsing VMware to see a Virtualized Server Expansion AndroidEnvironment Server Functions BlackBerry

Page 117: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What It Is Application Windows MobilePermissive Federation Web Ubuntu Mobile Internet DeviceVerified Federation Database Mobile Platform VirtualizationEncrypted Federation Vendor Approaches to Cloud Computing Kernel-Based Virtual MachineTrusted Federation Role of Open Source Software in Data VMware Mobile Virtualization PlatformUsing XMPP in the Federated Environment Center Collaboration Applications for MobilePresence in the Cloud Cost Reduction vs. Reliability PlatformsWhat It Is Open Source Server Software Text MessagingPresence Protocols Open Source Database Software iPhone ApplicationsLeveraging Presence Open Source Applications Software BlackBerry ApplicationsPresence Enabled Open Source System Management Droid Applications The Future of Presence SoftwareThe Interrelation of Identity, Presence, and Open Source Load-Balancing Software Location in the Cloud The Hypervisor lineIdentity Management Virtualization as the "Operating System" Cloud Computing DefinedWhat It Is Virtualization with a Host Operating Cloud Computing ArchitectureFuture of Identity in the Cloud System Cloud Computing TermsPrivacy and Its Relation to Cloud-Based Virtualization Infections on Virtualized Communication-as-a-Service (CaaS)Information Systems Environments Infrastructure-as-a-Service (IaaS)Personal Information Type 1 Virtualized Environment Monitoring-as-a-Service (MaaS)Privacy-Related Issues Type 2 Virtualized Environment Software-as-a-Service (SaaS)Finding Your Private Information Virtualization Environments Platform-as-a-Service (PaaS)What It Is Microsoft Virtualization Benefits and Limitations of CloudOpen Cloud Consortium Working Groups Sun xVM VirtualBox ComputingProject Matsu Linux/UNIX Virtualization BenefitsProject Comet VMware Products LimitationsHPC in the Cloud Data Center and Cloud Infrastructure Cloud Computing Case StudiesThe Open Cloud Testbed Products How Companies Are Using CloudThe Open Science Data Cloud End-User and Desktop Products ComputingIntercloud Testbed IBM Virtualization Implementing Applications and Services inReporting on an Open Cloud Consortium Using VMware to see a Virtualized Server the CloudWorking Group Environment Using Your Company's Services vs. theDistributed Management Task Force What It Is Cloud Provider(DMTF) Permissive Federation A Cloud Service Provider IntroducedWhat It Is? Verified Federation Cloud Computing Risks and Issues DMTK Working Groups Associated with Encrypted Federation Products and Services Provided by CloudCloud Computing Trusted Federation Computing Companies Standards for Application Developers Using XMPP in the Federated OperationalProtocols Environment EconomicScripting Languages Presence in the Cloud StaffingContent Formatting Standards and What It Is Should Your Company Invest in CloudLanguages Presence Protocols Computing?Standards for Security in the Cloud Leveraging Presence What Should Not be Moved to the Cloud Confidentiality, Integrity, Availability Presence Enabled Virtualization in Mainframe ArchitecturesAuthentication, Authorization, Accountability The Future of Presence and Operating SystemsRegulations for Privacy The Interrelation of Identity, Presence, LANs and the CloudSecurity Protocols and Location in the Cloud Internet and the CloudEstablishing a Baseline for Cloud Identity Management Web Services, Browsers, and the CloudPerformance What It Is Thin ClientBest Practices for Selecting a Vendor and Future of Identity in the Cloud Advances in Networking and ProcessingImplementing Cloud-Based Applications Privacy and Its Relation to Cloud-Based Speeds that Led to Cloud ComputingChoosing the Right Vendor Information Systems Networking DevelopmentsImplementing Cloud-Based Applications Personal Information Increased Processing SpeedsCitrix Privacy-Related Issues Managed Service Provider Model to CloudWindows Remote Desktop Finding Your Private Information Computing and Software as a ServiceVnc What It Is (SaaS)Web Browsers Open Cloud Consortium Working Groups Single Purpose Architectures Migrate toServer Extensions Project Matsu Multipurpose ArchitecturesThin Clients Project Comet Data Center VirtualizationSmart Phones, Pads, Pods, etc. HPC in the Cloud CollaborationVirtual Terminal Security Strengths and The Open Cloud Testbed The Cloud as a Reach ExtenderWeaknesses The Open Science Data Cloud The Cloud as a Communication EnablerStrengths Intercloud Testbed The Cloud as an Employee EnablerWeaknesses Reporting on an Open Cloud Consortium Service-Oriented Architecture (SOA)iPhone Working Group Evolving from SOA to the CloudAndroid Distributed Management Task Force Capacity: Limited Performance

Page 118: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

BlackBerry (DMTF) Availability: Communications Failure andWindows Mobile What It Is? Performance IssuesUbuntu Mobile Internet Device DMTK Working Groups Associated with Security: Newer Security Protocols ProvideMobile Platform Virtualization Cloud Computing More ProtectionKernel-Based Virtual Machine Standards for Application Developers What's Next in Cloud Computing VMware Mobile Virtualization Platform Protocols Using Industry and International StandardsCollaboration Applications for Mobile Scripting Languages Independent ComponentsPlatforms Content Formatting Standards and Message BaseText Messaging Languages Location IndependenceiPhone Applications Standards for Security in the Cloud Communication Requirements for CloudBlackBerry Applications Confidentiality, Integrity, Availability ImplementationDroid Applications Authentication, Authorization, Public Internet

Accountability Private InternetRegulations for Privacy Routing to the Datacenter

line Security Protocols Switching within the Data CenterCloud Computing Defined Establishing a Baseline for Cloud BandwidthCloud Computing Architecture Performance Tools Used to Measure NetworkCloud Computing Terms Best Practices for Selecting a Vendor PerformanceCommunication-as-a-Service (CaaS) and Implementing Cloud-Based Using the Protocol Analyzer to MeasureInfrastructure-as-a-Service (IaaS) Applications BandwidthMonitoring-as-a-Service (MaaS) Choosing the Right Vendor Using Ping and Traceroute to MeasureSoftware-as-a-Service (SaaS) Implementing Cloud-Based Applications Network PerformancePlatform-as-a-Service (PaaS) Citrix SecurityBenefits and Limitations of Cloud Computing Windows Remote Desktop SSLBenefits Vnc VPNLimitations Web Browsers OverheadCloud Computing Case Studies Server Extensions Storage Options for Cloud ComputingHow Companies Are Using Cloud Thin Clients Storage CapacityComputing Smart Phones, Pads, Pods, etc. Data Protection and PartitioningImplementing Applications and Services in Virtual Terminal Security Strengths and NASthe Cloud Weaknesses SANUsing Your Company's Services vs. the Strengths CASCloud Provider Weaknesses RedundancyA Cloud Service Provider Introduced iPhone ReplicationCloud Computing Risks and Issues Android MultisitingProducts and Services Provided by Cloud BlackBerry Backup and RecoveryComputing Companies Windows Mobile Server Software Environments thatOperational Ubuntu Mobile Internet Device Support Cloud ComputingEconomic Mobile Platform Virtualization Server CapacityStaffing Kernel-Based Virtual Machine VirtualizationShould Your Company Invest in Cloud VMware Mobile Virtualization Platform ClusteringComputing? Collaboration Applications for Mobile ExpansionWhat Should Not be Moved to the Cloud Platforms Server FunctionsVirtualization in Mainframe Architectures Text Messaging Applicationand Operating Systems iPhone Applications WebLANs and the Cloud BlackBerry Applications DatabaseInternet and the Cloud Droid Applications Vendor Approaches to Cloud ComputingWeb Services, Browsers, and the Cloud Role of Open Source Software in DataThin Client CenterAdvances in Networking and Processing line Cost Reduction vs. ReliabilitySpeeds that Led to Cloud Computing Cloud Computing Defined Open Source Server SoftwareNetworking Developments Cloud Computing Architecture Open Source Database SoftwareIncreased Processing Speeds Cloud Computing Terms Open Source Applications SoftwareManaged Service Provider Model to Cloud Communication-as-a-Service (CaaS) Open Source System ManagementComputing and Software as a Service Infrastructure-as-a-Service (IaaS) Software(SaaS) Monitoring-as-a-Service (MaaS) Open Source Load-Balancing Software Single Purpose Architectures Migrate to Software-as-a-Service (SaaS) The HypervisorMultipurpose Architectures Platform-as-a-Service (PaaS) Virtualization as the "Operating System"Data Center Virtualization Benefits and Limitations of Cloud Virtualization with a Host OperatingCollaboration Computing SystemThe Cloud as a Reach Extender Benefits Virtualization Infections on VirtualizedThe Cloud as a Communication Enabler Limitations EnvironmentsThe Cloud as an Employee Enabler Cloud Computing Case Studies Type 1 Virtualized EnvironmentService-Oriented Architecture (SOA) How Companies Are Using Cloud Type 2 Virtualized EnvironmentEvolving from SOA to the Cloud Computing Virtualization EnvironmentsCapacity: Limited Performance Implementing Applications and Services Microsoft Virtualization

Page 119: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Availability: Communications Failure and in the Cloud Sun xVM VirtualBoxPerformance Issues Using Your Company's Services vs. the Linux/UNIX VirtualizationSecurity: Newer Security Protocols Provide Cloud Provider VMware ProductsMore Protection A Cloud Service Provider Introduced Data Center and Cloud InfrastructureWhat's Next in Cloud Computing Cloud Computing Risks and Issues ProductsUsing Industry and International Standards Products and Services Provided by Cloud End-User and Desktop ProductsIndependent Components Computing Companies IBM VirtualizationMessage Base Operational Using VMware to see a Virtualized ServerLocation Independence Economic Environment Communication Requirements for Cloud Staffing What It IsImplementation Should Your Company Invest in Cloud Permissive FederationPublic Internet Computing? Verified FederationPrivate Internet What Should Not be Moved to the Cloud Encrypted FederationRouting to the Datacenter Virtualization in Mainframe Architectures Trusted FederationSwitching within the Data Center and Operating Systems Using XMPP in the Federated EnvironmentBandwidth LANs and the Cloud Presence in the CloudTools Used to Measure Network Internet and the Cloud What It IsPerformance Web Services, Browsers, and the Cloud Presence ProtocolsUsing the Protocol Analyzer to Measure Thin Client Leveraging PresenceBandwidth Advances in Networking and Processing Presence EnabledUsing Ping and Traceroute to Measure Speeds that Led to Cloud Computing The Future of PresenceNetwork Performance Networking Developments The Interrelation of Identity, Presence, andSecurity Increased Processing Speeds Location in the CloudSSL Managed Service Provider Model to Identity ManagementVPN Cloud Computing and Software as a What It IsOverhead Service (SaaS) Future of Identity in the CloudStorage Options for Cloud Computing Single Purpose Architectures Migrate to Privacy and Its Relation to Cloud-BasedStorage Capacity Multipurpose Architectures Information SystemsData Protection and Partitioning Data Center Virtualization Personal InformationNAS Collaboration Privacy-Related IssuesSAN The Cloud as a Reach Extender Finding Your Private Information CAS The Cloud as a Communication Enabler What It IsRedundancy The Cloud as an Employee Enabler Open Cloud Consortium Working GroupsReplication Service-Oriented Architecture (SOA) Project MatsuMultisiting Evolving from SOA to the Cloud Project CometBackup and Recovery Capacity: Limited Performance HPC in the CloudServer Software Environments that Support Availability: Communications Failure and The Open Cloud TestbedCloud Computing Performance Issues The Open Science Data CloudServer Capacity Security: Newer Security Protocols Intercloud TestbedVirtualization Provide More Protection Reporting on an Open Cloud ConsortiumClustering What's Next in Cloud Computing Working GroupExpansion Using Industry and International Distributed Management Task ForceServer Functions Standards (DMTF)Application Independent Components What It Is?Web Message Base DMTK Working Groups Associated withDatabase Location Independence Cloud ComputingVendor Approaches to Cloud Computing Communication Requirements for Cloud Standards for Application DevelopersRole of Open Source Software in Data Implementation ProtocolsCenter Public Internet Scripting LanguagesCost Reduction vs. Reliability Private Internet Content Formatting Standards andOpen Source Server Software Routing to the Datacenter LanguagesOpen Source Database Software Switching within the Data Center Standards for Security in the CloudOpen Source Applications Software Bandwidth Confidentiality, Integrity, AvailabilityOpen Source System Management Software Tools Used to Measure Network Authentication, Authorization,Open Source Load-Balancing Software Performance AccountabilityThe Hypervisor Using the Protocol Analyzer to Measure Regulations for PrivacyVirtualization as the "Operating System" Bandwidth Security ProtocolsVirtualization with a Host Operating System Using Ping and Traceroute to Measure Establishing a Baseline for CloudVirtualization Infections on Virtualized Network Performance PerformanceEnvironments Security Best Practices for Selecting a Vendor andType 1 Virtualized Environment SSL Implementing Cloud-Based ApplicationsType 2 Virtualized Environment VPN Choosing the Right VendorVirtualization Environments Overhead Implementing Cloud-Based Applications Microsoft Virtualization Storage Options for Cloud Computing CitrixSun xVM VirtualBox Storage Capacity Windows Remote DesktopLinux/UNIX Virtualization Data Protection and Partitioning Vnc

Page 120: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

VMware Products NAS Web BrowsersData Center and Cloud Infrastructure SAN Server ExtensionsProducts CAS Thin ClientsEnd-User and Desktop Products Redundancy Smart Phones, Pads, Pods, etc.IBM Virtualization Replication Virtual Terminal Security Strengths andUsing VMware to see a Virtualized Server Multisiting WeaknessesEnvironment Backup and Recovery StrengthsWhat It Is Server Software Environments that Weaknesses Permissive Federation Support Cloud Computing iPhoneVerified Federation Server Capacity AndroidEncrypted Federation Virtualization BlackBerryTrusted Federation Clustering Windows MobileUsing XMPP in the Federated Environment Expansion Ubuntu Mobile Internet DevicePresence in the Cloud Server Functions Mobile Platform VirtualizationWhat It Is Application Kernel-Based Virtual MachinePresence Protocols Web VMware Mobile Virtualization PlatformLeveraging Presence Database Collaboration Applications for MobilePresence Enabled Vendor Approaches to Cloud Computing PlatformsThe Future of Presence Role of Open Source Software in Data Text MessagingThe Interrelation of Identity, Presence, and Center iPhone ApplicationsLocation in the Cloud Cost Reduction vs. Reliability BlackBerry ApplicationsIdentity Management Open Source Server Software Droid Applications What It Is Open Source Database SoftwareFuture of Identity in the Cloud Open Source Applications SoftwarePrivacy and Its Relation to Cloud-Based Open Source System Management lineInformation Systems Software Cloud Computing DefinedPersonal Information Open Source Load-Balancing Software Cloud Computing ArchitecturePrivacy-Related Issues The Hypervisor Cloud Computing TermsFinding Your Private Information Virtualization as the "Operating System" Communication-as-a-Service (CaaS)What It Is Virtualization with a Host Operating Infrastructure-as-a-Service (IaaS)Open Cloud Consortium Working Groups System Monitoring-as-a-Service (MaaS)Project Matsu Virtualization Infections on Virtualized Software-as-a-Service (SaaS)Project Comet Environments Platform-as-a-Service (PaaS)HPC in the Cloud Type 1 Virtualized Environment Benefits and Limitations of CloudThe Open Cloud Testbed Type 2 Virtualized Environment ComputingThe Open Science Data Cloud Virtualization Environments BenefitsIntercloud Testbed Microsoft Virtualization LimitationsReporting on an Open Cloud Consortium Sun xVM VirtualBox Cloud Computing Case StudiesWorking Group Linux/UNIX Virtualization How Companies Are Using CloudDistributed Management Task Force VMware Products Computing(DMTF) Data Center and Cloud Infrastructure Implementing Applications and Services inWhat It Is? Products the CloudDMTK Working Groups Associated with End-User and Desktop Products Using Your Company's Services vs. theCloud Computing IBM Virtualization Cloud ProviderStandards for Application Developers Using VMware to see a Virtualized Server A Cloud Service Provider IntroducedProtocols Environment Cloud Computing Risks and Issues Scripting Languages What It Is Products and Services Provided by CloudContent Formatting Standards and Permissive Federation Computing Companies Languages Verified Federation OperationalStandards for Security in the Cloud Encrypted Federation EconomicConfidentiality, Integrity, Availability Trusted Federation StaffingAuthentication, Authorization, Accountability Using XMPP in the Federated Should Your Company Invest in CloudRegulations for Privacy Environment Computing?Security Protocols Presence in the Cloud What Should Not be Moved to the Cloud Establishing a Baseline for Cloud What It Is Virtualization in Mainframe ArchitecturesPerformance Presence Protocols and Operating SystemsBest Practices for Selecting a Vendor and Leveraging Presence LANs and the CloudImplementing Cloud-Based Applications Presence Enabled Internet and the CloudChoosing the Right Vendor The Future of Presence Web Services, Browsers, and the CloudImplementing Cloud-Based Applications The Interrelation of Identity, Presence, Thin ClientCitrix and Location in the Cloud Advances in Networking and ProcessingWindows Remote Desktop Identity Management Speeds that Led to Cloud ComputingVnc What It Is Networking DevelopmentsWeb Browsers Future of Identity in the Cloud Increased Processing SpeedsServer Extensions Privacy and Its Relation to Cloud-Based Managed Service Provider Model to CloudThin Clients Information Systems Computing and Software as a Service

Page 121: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Smart Phones, Pads, Pods, etc. Personal Information (SaaS)Virtual Terminal Security Strengths and Privacy-Related Issues Single Purpose Architectures Migrate toWeaknesses Finding Your Private Information Multipurpose ArchitecturesStrengths What It Is Data Center VirtualizationWeaknesses Open Cloud Consortium Working Groups CollaborationiPhone Project Matsu The Cloud as a Reach ExtenderAndroid Project Comet The Cloud as a Communication EnablerBlackBerry HPC in the Cloud The Cloud as an Employee EnablerWindows Mobile The Open Cloud Testbed Service-Oriented Architecture (SOA)Ubuntu Mobile Internet Device The Open Science Data Cloud Evolving from SOA to the CloudMobile Platform Virtualization Intercloud Testbed Capacity: Limited PerformanceKernel-Based Virtual Machine Reporting on an Open Cloud Consortium Availability: Communications Failure andVMware Mobile Virtualization Platform Working Group Performance IssuesCollaboration Applications for Mobile Distributed Management Task Force Security: Newer Security Protocols ProvidePlatforms (DMTF) More ProtectionText Messaging What It Is? What's Next in Cloud Computing iPhone Applications DMTK Working Groups Associated with Using Industry and International StandardsBlackBerry Applications Cloud Computing Independent ComponentsDroid Applications Standards for Application Developers Message Base

Protocols Location IndependenceScripting Languages Communication Requirements for Cloud

line Content Formatting Standards and ImplementationCloud Computing Defined Languages Public InternetCloud Computing Architecture Standards for Security in the Cloud Private InternetCloud Computing Terms Confidentiality, Integrity, Availability Routing to the DatacenterCommunication-as-a-Service (CaaS) Authentication, Authorization, Switching within the Data CenterInfrastructure-as-a-Service (IaaS) Accountability BandwidthMonitoring-as-a-Service (MaaS) Regulations for Privacy Tools Used to Measure NetworkSoftware-as-a-Service (SaaS) Security Protocols PerformancePlatform-as-a-Service (PaaS) Establishing a Baseline for Cloud Using the Protocol Analyzer to MeasureBenefits and Limitations of Cloud Computing Performance BandwidthBenefits Best Practices for Selecting a Vendor Using Ping and Traceroute to MeasureLimitations and Implementing Cloud-Based Network PerformanceCloud Computing Case Studies Applications SecurityHow Companies Are Using Cloud Choosing the Right Vendor SSLComputing Implementing Cloud-Based Applications VPNImplementing Applications and Services in Citrix Overheadthe Cloud Windows Remote Desktop Storage Options for Cloud ComputingUsing Your Company's Services vs. the Vnc Storage CapacityCloud Provider Web Browsers Data Protection and PartitioningA Cloud Service Provider Introduced Server Extensions NASCloud Computing Risks and Issues Thin Clients SANProducts and Services Provided by Cloud Smart Phones, Pads, Pods, etc. CASComputing Companies Virtual Terminal Security Strengths and RedundancyOperational Weaknesses ReplicationEconomic Strengths MultisitingStaffing Weaknesses Backup and RecoveryShould Your Company Invest in Cloud iPhone Server Software Environments thatComputing? Android Support Cloud ComputingWhat Should Not be Moved to the Cloud BlackBerry Server CapacityVirtualization in Mainframe Architectures Windows Mobile Virtualizationand Operating Systems Ubuntu Mobile Internet Device ClusteringLANs and the Cloud Mobile Platform Virtualization ExpansionInternet and the Cloud Kernel-Based Virtual Machine Server FunctionsWeb Services, Browsers, and the Cloud VMware Mobile Virtualization Platform ApplicationThin Client Collaboration Applications for Mobile WebAdvances in Networking and Processing Platforms DatabaseSpeeds that Led to Cloud Computing Text Messaging Vendor Approaches to Cloud ComputingNetworking Developments iPhone Applications Role of Open Source Software in DataIncreased Processing Speeds BlackBerry Applications CenterManaged Service Provider Model to Cloud Droid Applications Cost Reduction vs. ReliabilityComputing and Software as a Service Open Source Server Software(SaaS) Open Source Database SoftwareSingle Purpose Architectures Migrate to line Open Source Applications SoftwareMultipurpose Architectures Cloud Computing Defined Open Source System ManagementData Center Virtualization Cloud Computing Architecture Software

Page 122: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Collaboration Cloud Computing Terms Open Source Load-Balancing Software The Cloud as a Reach Extender Communication-as-a-Service (CaaS) The HypervisorThe Cloud as a Communication Enabler Infrastructure-as-a-Service (IaaS) Virtualization as the "Operating System"The Cloud as an Employee Enabler Monitoring-as-a-Service (MaaS) Virtualization with a Host OperatingService-Oriented Architecture (SOA) Software-as-a-Service (SaaS) SystemEvolving from SOA to the Cloud Platform-as-a-Service (PaaS) Virtualization Infections on VirtualizedCapacity: Limited Performance Benefits and Limitations of Cloud EnvironmentsAvailability: Communications Failure and Computing Type 1 Virtualized EnvironmentPerformance Issues Benefits Type 2 Virtualized EnvironmentSecurity: Newer Security Protocols Provide Limitations Virtualization EnvironmentsMore Protection Cloud Computing Case Studies Microsoft VirtualizationWhat's Next in Cloud Computing How Companies Are Using Cloud Sun xVM VirtualBoxUsing Industry and International Standards Computing Linux/UNIX VirtualizationIndependent Components Implementing Applications and Services VMware ProductsMessage Base in the Cloud Data Center and Cloud InfrastructureLocation Independence Using Your Company's Services vs. the ProductsCommunication Requirements for Cloud Cloud Provider End-User and Desktop ProductsImplementation A Cloud Service Provider Introduced IBM VirtualizationPublic Internet Cloud Computing Risks and Issues Using VMware to see a Virtualized ServerPrivate Internet Products and Services Provided by Cloud Environment Routing to the Datacenter Computing Companies What It IsSwitching within the Data Center Operational Permissive FederationBandwidth Economic Verified FederationTools Used to Measure Network Staffing Encrypted FederationPerformance Should Your Company Invest in Cloud Trusted FederationUsing the Protocol Analyzer to Measure Computing? Using XMPP in the Federated EnvironmentBandwidth What Should Not be Moved to the Cloud Presence in the CloudUsing Ping and Traceroute to Measure Virtualization in Mainframe Architectures What It IsNetwork Performance and Operating Systems Presence ProtocolsSecurity LANs and the Cloud Leveraging PresenceSSL Internet and the Cloud Presence EnabledVPN Web Services, Browsers, and the Cloud The Future of PresenceOverhead Thin Client The Interrelation of Identity, Presence, andStorage Options for Cloud Computing Advances in Networking and Processing Location in the CloudStorage Capacity Speeds that Led to Cloud Computing Identity ManagementData Protection and Partitioning Networking Developments What It IsNAS Increased Processing Speeds Future of Identity in the CloudSAN Managed Service Provider Model to Privacy and Its Relation to Cloud-BasedCAS Cloud Computing and Software as a Information SystemsRedundancy Service (SaaS) Personal InformationReplication Single Purpose Architectures Migrate to Privacy-Related IssuesMultisiting Multipurpose Architectures Finding Your Private Information Backup and Recovery Data Center Virtualization What It IsServer Software Environments that Support Collaboration Open Cloud Consortium Working GroupsCloud Computing The Cloud as a Reach Extender Project MatsuServer Capacity The Cloud as a Communication Enabler Project CometVirtualization The Cloud as an Employee Enabler HPC in the CloudClustering Service-Oriented Architecture (SOA) The Open Cloud TestbedExpansion Evolving from SOA to the Cloud The Open Science Data CloudServer Functions Capacity: Limited Performance Intercloud TestbedApplication Availability: Communications Failure and Reporting on an Open Cloud ConsortiumWeb Performance Issues Working GroupDatabase Security: Newer Security Protocols Distributed Management Task ForceVendor Approaches to Cloud Computing Provide More Protection (DMTF)Role of Open Source Software in Data What's Next in Cloud Computing What It Is?Center Using Industry and International DMTK Working Groups Associated withCost Reduction vs. Reliability Standards Cloud ComputingOpen Source Server Software Independent Components Standards for Application DevelopersOpen Source Database Software Message Base ProtocolsOpen Source Applications Software Location Independence Scripting LanguagesOpen Source System Management Software Communication Requirements for Cloud Content Formatting Standards andOpen Source Load-Balancing Software Implementation LanguagesThe Hypervisor Public Internet Standards for Security in the CloudVirtualization as the "Operating System" Private Internet Confidentiality, Integrity, AvailabilityVirtualization with a Host Operating System Routing to the Datacenter Authentication, Authorization,Virtualization Infections on Virtualized Switching within the Data Center Accountability

Page 123: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Environments Bandwidth Regulations for PrivacyType 1 Virtualized Environment Tools Used to Measure Network Security ProtocolsType 2 Virtualized Environment Performance Establishing a Baseline for CloudVirtualization Environments Using the Protocol Analyzer to Measure PerformanceMicrosoft Virtualization Bandwidth Best Practices for Selecting a Vendor andSun xVM VirtualBox Using Ping and Traceroute to Measure Implementing Cloud-Based ApplicationsLinux/UNIX Virtualization Network Performance Choosing the Right VendorVMware Products Security Implementing Cloud-Based Applications Data Center and Cloud Infrastructure SSL CitrixProducts VPN Windows Remote DesktopEnd-User and Desktop Products Overhead VncIBM Virtualization Storage Options for Cloud Computing Web BrowsersUsing VMware to see a Virtualized Server Storage Capacity Server ExtensionsEnvironment Data Protection and Partitioning Thin ClientsWhat It Is NAS Smart Phones, Pads, Pods, etc.Permissive Federation SAN Virtual Terminal Security Strengths andVerified Federation CAS WeaknessesEncrypted Federation Redundancy StrengthsTrusted Federation Replication Weaknesses Using XMPP in the Federated Environment Multisiting iPhonePresence in the Cloud Backup and Recovery AndroidWhat It Is Server Software Environments that BlackBerryPresence Protocols Support Cloud Computing Windows MobileLeveraging Presence Server Capacity Ubuntu Mobile Internet DevicePresence Enabled Virtualization Mobile Platform VirtualizationThe Future of Presence Clustering Kernel-Based Virtual MachineThe Interrelation of Identity, Presence, and Expansion VMware Mobile Virtualization PlatformLocation in the Cloud Server Functions Collaboration Applications for MobileIdentity Management Application PlatformsWhat It Is Web Text MessagingFuture of Identity in the Cloud Database iPhone ApplicationsPrivacy and Its Relation to Cloud-Based Vendor Approaches to Cloud Computing BlackBerry ApplicationsInformation Systems Role of Open Source Software in Data Droid Applications Personal Information CenterPrivacy-Related Issues Cost Reduction vs. ReliabilityFinding Your Private Information Open Source Server Software lineWhat It Is Open Source Database Software Cloud Computing DefinedOpen Cloud Consortium Working Groups Open Source Applications Software Cloud Computing ArchitectureProject Matsu Open Source System Management Cloud Computing TermsProject Comet Software Communication-as-a-Service (CaaS)HPC in the Cloud Open Source Load-Balancing Software Infrastructure-as-a-Service (IaaS)The Open Cloud Testbed The Hypervisor Monitoring-as-a-Service (MaaS)The Open Science Data Cloud Virtualization as the "Operating System" Software-as-a-Service (SaaS)Intercloud Testbed Virtualization with a Host Operating Platform-as-a-Service (PaaS)Reporting on an Open Cloud Consortium System Benefits and Limitations of CloudWorking Group Virtualization Infections on Virtualized ComputingDistributed Management Task Force Environments Benefits(DMTF) Type 1 Virtualized Environment LimitationsWhat It Is? Type 2 Virtualized Environment Cloud Computing Case StudiesDMTK Working Groups Associated with Virtualization Environments How Companies Are Using CloudCloud Computing Microsoft Virtualization ComputingStandards for Application Developers Sun xVM VirtualBox Implementing Applications and Services inProtocols Linux/UNIX Virtualization the CloudScripting Languages VMware Products Using Your Company's Services vs. theContent Formatting Standards and Data Center and Cloud Infrastructure Cloud ProviderLanguages Products A Cloud Service Provider IntroducedStandards for Security in the Cloud End-User and Desktop Products Cloud Computing Risks and Issues Confidentiality, Integrity, Availability IBM Virtualization Products and Services Provided by CloudAuthentication, Authorization, Accountability Using VMware to see a Virtualized Server Computing Companies Regulations for Privacy Environment OperationalSecurity Protocols What It Is EconomicEstablishing a Baseline for Cloud Permissive Federation StaffingPerformance Verified Federation Should Your Company Invest in CloudBest Practices for Selecting a Vendor and Encrypted Federation Computing?Implementing Cloud-Based Applications Trusted Federation What Should Not be Moved to the Cloud Choosing the Right Vendor Using XMPP in the Federated Virtualization in Mainframe Architectures

Page 124: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Implementing Cloud-Based Applications Environment and Operating SystemsCitrix Presence in the Cloud LANs and the CloudWindows Remote Desktop What It Is Internet and the CloudVnc Presence Protocols Web Services, Browsers, and the CloudWeb Browsers Leveraging Presence Thin ClientServer Extensions Presence Enabled Advances in Networking and ProcessingThin Clients The Future of Presence Speeds that Led to Cloud ComputingSmart Phones, Pads, Pods, etc. The Interrelation of Identity, Presence, Networking DevelopmentsVirtual Terminal Security Strengths and and Location in the Cloud Increased Processing SpeedsWeaknesses Identity Management Managed Service Provider Model to CloudStrengths What It Is Computing and Software as a ServiceWeaknesses Future of Identity in the Cloud (SaaS)iPhone Privacy and Its Relation to Cloud-Based Single Purpose Architectures Migrate toAndroid Information Systems Multipurpose ArchitecturesBlackBerry Personal Information Data Center VirtualizationWindows Mobile Privacy-Related Issues CollaborationUbuntu Mobile Internet Device Finding Your Private Information The Cloud as a Reach ExtenderMobile Platform Virtualization What It Is The Cloud as a Communication EnablerKernel-Based Virtual Machine Open Cloud Consortium Working Groups The Cloud as an Employee EnablerVMware Mobile Virtualization Platform Project Matsu Service-Oriented Architecture (SOA)Collaboration Applications for Mobile Project Comet Evolving from SOA to the CloudPlatforms HPC in the Cloud Capacity: Limited PerformanceText Messaging The Open Cloud Testbed Availability: Communications Failure andiPhone Applications The Open Science Data Cloud Performance IssuesBlackBerry Applications Intercloud Testbed Security: Newer Security Protocols ProvideDroid Applications Reporting on an Open Cloud Consortium More Protection

Working Group What's Next in Cloud Computing Distributed Management Task Force Using Industry and International Standards

line (DMTF) Independent ComponentsCloud Computing Defined What It Is? Message BaseCloud Computing Architecture DMTK Working Groups Associated with Location IndependenceCloud Computing Terms Cloud Computing Communication Requirements for CloudCommunication-as-a-Service (CaaS) Standards for Application Developers ImplementationInfrastructure-as-a-Service (IaaS) Protocols Public InternetMonitoring-as-a-Service (MaaS) Scripting Languages Private InternetSoftware-as-a-Service (SaaS) Content Formatting Standards and Routing to the DatacenterPlatform-as-a-Service (PaaS) Languages Switching within the Data CenterBenefits and Limitations of Cloud Computing Standards for Security in the Cloud BandwidthBenefits Confidentiality, Integrity, Availability Tools Used to Measure NetworkLimitations Authentication, Authorization, PerformanceCloud Computing Case Studies Accountability Using the Protocol Analyzer to MeasureHow Companies Are Using Cloud Regulations for Privacy BandwidthComputing Security Protocols Using Ping and Traceroute to MeasureImplementing Applications and Services in Establishing a Baseline for Cloud Network Performancethe Cloud Performance SecurityUsing Your Company's Services vs. the Best Practices for Selecting a Vendor SSLCloud Provider and Implementing Cloud-Based VPNA Cloud Service Provider Introduced Applications OverheadCloud Computing Risks and Issues Choosing the Right Vendor Storage Options for Cloud ComputingProducts and Services Provided by Cloud Implementing Cloud-Based Applications Storage CapacityComputing Companies Citrix Data Protection and PartitioningOperational Windows Remote Desktop NASEconomic Vnc SANStaffing Web Browsers CASShould Your Company Invest in Cloud Server Extensions RedundancyComputing? Thin Clients ReplicationWhat Should Not be Moved to the Cloud Smart Phones, Pads, Pods, etc. MultisitingVirtualization in Mainframe Architectures Virtual Terminal Security Strengths and Backup and Recoveryand Operating Systems Weaknesses Server Software Environments thatLANs and the Cloud Strengths Support Cloud ComputingInternet and the Cloud Weaknesses Server CapacityWeb Services, Browsers, and the Cloud iPhone VirtualizationThin Client Android ClusteringAdvances in Networking and Processing BlackBerry ExpansionSpeeds that Led to Cloud Computing Windows Mobile Server FunctionsNetworking Developments Ubuntu Mobile Internet Device Application

Page 125: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Increased Processing Speeds Mobile Platform Virtualization WebManaged Service Provider Model to Cloud Kernel-Based Virtual Machine DatabaseComputing and Software as a Service VMware Mobile Virtualization Platform Vendor Approaches to Cloud Computing(SaaS) Collaboration Applications for Mobile Role of Open Source Software in DataSingle Purpose Architectures Migrate to Platforms CenterMultipurpose Architectures Text Messaging Cost Reduction vs. ReliabilityData Center Virtualization iPhone Applications Open Source Server SoftwareCollaboration BlackBerry Applications Open Source Database SoftwareThe Cloud as a Reach Extender Droid Applications Open Source Applications SoftwareThe Cloud as a Communication Enabler Open Source System ManagementThe Cloud as an Employee Enabler SoftwareService-Oriented Architecture (SOA) line Open Source Load-Balancing Software Evolving from SOA to the Cloud Cloud Computing Defined The HypervisorCapacity: Limited Performance Cloud Computing Architecture Virtualization as the "Operating System"Availability: Communications Failure and Cloud Computing Terms Virtualization with a Host OperatingPerformance Issues Communication-as-a-Service (CaaS) SystemSecurity: Newer Security Protocols Provide Infrastructure-as-a-Service (IaaS) Virtualization Infections on VirtualizedMore Protection Monitoring-as-a-Service (MaaS) EnvironmentsWhat's Next in Cloud Computing Software-as-a-Service (SaaS) Type 1 Virtualized EnvironmentUsing Industry and International Standards Platform-as-a-Service (PaaS) Type 2 Virtualized EnvironmentIndependent Components Benefits and Limitations of Cloud Virtualization EnvironmentsMessage Base Computing Microsoft VirtualizationLocation Independence Benefits Sun xVM VirtualBoxCommunication Requirements for Cloud Limitations Linux/UNIX VirtualizationImplementation Cloud Computing Case Studies VMware ProductsPublic Internet How Companies Are Using Cloud Data Center and Cloud InfrastructurePrivate Internet Computing ProductsRouting to the Datacenter Implementing Applications and Services End-User and Desktop ProductsSwitching within the Data Center in the Cloud IBM VirtualizationBandwidth Using Your Company's Services vs. the Using VMware to see a Virtualized ServerTools Used to Measure Network Cloud Provider Environment Performance A Cloud Service Provider Introduced What It IsUsing the Protocol Analyzer to Measure Cloud Computing Risks and Issues Permissive FederationBandwidth Products and Services Provided by Cloud Verified FederationUsing Ping and Traceroute to Measure Computing Companies Encrypted FederationNetwork Performance Operational Trusted FederationSecurity Economic Using XMPP in the Federated EnvironmentSSL Staffing Presence in the CloudVPN Should Your Company Invest in Cloud What It IsOverhead Computing? Presence ProtocolsStorage Options for Cloud Computing What Should Not be Moved to the Cloud Leveraging PresenceStorage Capacity Virtualization in Mainframe Architectures Presence EnabledData Protection and Partitioning and Operating Systems The Future of PresenceNAS LANs and the Cloud The Interrelation of Identity, Presence, andSAN Internet and the Cloud Location in the CloudCAS Web Services, Browsers, and the Cloud Identity ManagementRedundancy Thin Client What It IsReplication Advances in Networking and Processing Future of Identity in the CloudMultisiting Speeds that Led to Cloud Computing Privacy and Its Relation to Cloud-BasedBackup and Recovery Networking Developments Information SystemsServer Software Environments that Support Increased Processing Speeds Personal InformationCloud Computing Managed Service Provider Model to Privacy-Related IssuesServer Capacity Cloud Computing and Software as a Finding Your Private Information Virtualization Service (SaaS) What It IsClustering Single Purpose Architectures Migrate to Open Cloud Consortium Working GroupsExpansion Multipurpose Architectures Project MatsuServer Functions Data Center Virtualization Project CometApplication Collaboration HPC in the CloudWeb The Cloud as a Reach Extender The Open Cloud TestbedDatabase The Cloud as a Communication Enabler The Open Science Data CloudVendor Approaches to Cloud Computing The Cloud as an Employee Enabler Intercloud TestbedRole of Open Source Software in Data Service-Oriented Architecture (SOA) Reporting on an Open Cloud ConsortiumCenter Evolving from SOA to the Cloud Working GroupCost Reduction vs. Reliability Capacity: Limited Performance Distributed Management Task ForceOpen Source Server Software Availability: Communications Failure and (DMTF)Open Source Database Software Performance Issues What It Is?

Page 126: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Open Source Applications Software Security: Newer Security Protocols DMTK Working Groups Associated withOpen Source System Management Software Provide More Protection Cloud ComputingOpen Source Load-Balancing Software What's Next in Cloud Computing Standards for Application DevelopersThe Hypervisor Using Industry and International ProtocolsVirtualization as the "Operating System" Standards Scripting LanguagesVirtualization with a Host Operating System Independent Components Content Formatting Standards andVirtualization Infections on Virtualized Message Base LanguagesEnvironments Location Independence Standards for Security in the CloudType 1 Virtualized Environment Communication Requirements for Cloud Confidentiality, Integrity, AvailabilityType 2 Virtualized Environment Implementation Authentication, Authorization,Virtualization Environments Public Internet AccountabilityMicrosoft Virtualization Private Internet Regulations for PrivacySun xVM VirtualBox Routing to the Datacenter Security ProtocolsLinux/UNIX Virtualization Switching within the Data Center Establishing a Baseline for CloudVMware Products Bandwidth PerformanceData Center and Cloud Infrastructure Tools Used to Measure Network Best Practices for Selecting a Vendor andProducts Performance Implementing Cloud-Based ApplicationsEnd-User and Desktop Products Using the Protocol Analyzer to Measure Choosing the Right VendorIBM Virtualization Bandwidth Implementing Cloud-Based Applications Using VMware to see a Virtualized Server Using Ping and Traceroute to Measure CitrixEnvironment Network Performance Windows Remote DesktopWhat It Is Security VncPermissive Federation SSL Web BrowsersVerified Federation VPN Server ExtensionsEncrypted Federation Overhead Thin ClientsTrusted Federation Storage Options for Cloud Computing Smart Phones, Pads, Pods, etc.Using XMPP in the Federated Environment Storage Capacity Virtual Terminal Security Strengths andPresence in the Cloud Data Protection and Partitioning WeaknessesWhat It Is NAS StrengthsPresence Protocols SAN Weaknesses Leveraging Presence CAS iPhonePresence Enabled Redundancy AndroidThe Future of Presence Replication BlackBerryThe Interrelation of Identity, Presence, and Multisiting Windows MobileLocation in the Cloud Backup and Recovery Ubuntu Mobile Internet DeviceIdentity Management Server Software Environments that Mobile Platform VirtualizationWhat It Is Support Cloud Computing Kernel-Based Virtual MachineFuture of Identity in the Cloud Server Capacity VMware Mobile Virtualization PlatformPrivacy and Its Relation to Cloud-Based Virtualization Collaboration Applications for MobileInformation Systems Clustering PlatformsPersonal Information Expansion Text MessagingPrivacy-Related Issues Server Functions iPhone ApplicationsFinding Your Private Information Application BlackBerry ApplicationsWhat It Is Web Droid Applications Open Cloud Consortium Working Groups DatabaseProject Matsu Vendor Approaches to Cloud ComputingProject Comet Role of Open Source Software in Data lineHPC in the Cloud Center Cloud Computing DefinedThe Open Cloud Testbed Cost Reduction vs. Reliability Cloud Computing ArchitectureThe Open Science Data Cloud Open Source Server Software Cloud Computing TermsIntercloud Testbed Open Source Database Software Communication-as-a-Service (CaaS)Reporting on an Open Cloud Consortium Open Source Applications Software Infrastructure-as-a-Service (IaaS)Working Group Open Source System Management Monitoring-as-a-Service (MaaS)Distributed Management Task Force Software Software-as-a-Service (SaaS)(DMTF) Open Source Load-Balancing Software Platform-as-a-Service (PaaS)What It Is? The Hypervisor Benefits and Limitations of CloudDMTK Working Groups Associated with Virtualization as the "Operating System" ComputingCloud Computing Virtualization with a Host Operating BenefitsStandards for Application Developers System LimitationsProtocols Virtualization Infections on Virtualized Cloud Computing Case StudiesScripting Languages Environments How Companies Are Using CloudContent Formatting Standards and Type 1 Virtualized Environment ComputingLanguages Type 2 Virtualized Environment Implementing Applications and Services inStandards for Security in the Cloud Virtualization Environments the CloudConfidentiality, Integrity, Availability Microsoft Virtualization Using Your Company's Services vs. theAuthentication, Authorization, Accountability Sun xVM VirtualBox Cloud Provider

Page 127: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Regulations for Privacy Linux/UNIX Virtualization A Cloud Service Provider IntroducedSecurity Protocols VMware Products Cloud Computing Risks and Issues Establishing a Baseline for Cloud Data Center and Cloud Infrastructure Products and Services Provided by CloudPerformance Products Computing Companies Best Practices for Selecting a Vendor and End-User and Desktop Products OperationalImplementing Cloud-Based Applications IBM Virtualization EconomicChoosing the Right Vendor Using VMware to see a Virtualized Server StaffingImplementing Cloud-Based Applications Environment Should Your Company Invest in CloudCitrix What It Is Computing?Windows Remote Desktop Permissive Federation What Should Not be Moved to the Cloud Vnc Verified Federation Virtualization in Mainframe ArchitecturesWeb Browsers Encrypted Federation and Operating SystemsServer Extensions Trusted Federation LANs and the CloudThin Clients Using XMPP in the Federated Internet and the CloudSmart Phones, Pads, Pods, etc. Environment Web Services, Browsers, and the CloudVirtual Terminal Security Strengths and Presence in the Cloud Thin ClientWeaknesses What It Is Advances in Networking and ProcessingStrengths Presence Protocols Speeds that Led to Cloud ComputingWeaknesses Leveraging Presence Networking DevelopmentsiPhone Presence Enabled Increased Processing SpeedsAndroid The Future of Presence Managed Service Provider Model to CloudBlackBerry The Interrelation of Identity, Presence, Computing and Software as a ServiceWindows Mobile and Location in the Cloud (SaaS)Ubuntu Mobile Internet Device Identity Management Single Purpose Architectures Migrate toMobile Platform Virtualization What It Is Multipurpose ArchitecturesKernel-Based Virtual Machine Future of Identity in the Cloud Data Center VirtualizationVMware Mobile Virtualization Platform Privacy and Its Relation to Cloud-Based CollaborationCollaboration Applications for Mobile Information Systems The Cloud as a Reach ExtenderPlatforms Personal Information The Cloud as a Communication EnablerText Messaging Privacy-Related Issues The Cloud as an Employee EnableriPhone Applications Finding Your Private Information Service-Oriented Architecture (SOA)BlackBerry Applications What It Is Evolving from SOA to the CloudDroid Applications Open Cloud Consortium Working Groups Capacity: Limited Performance

Project Matsu Availability: Communications Failure andProject Comet Performance Issues

line HPC in the Cloud Security: Newer Security Protocols ProvideCloud Computing Defined The Open Cloud Testbed More ProtectionCloud Computing Architecture The Open Science Data Cloud What's Next in Cloud Computing Cloud Computing Terms Intercloud Testbed Using Industry and International StandardsCommunication-as-a-Service (CaaS) Reporting on an Open Cloud Consortium Independent ComponentsInfrastructure-as-a-Service (IaaS) Working Group Message BaseMonitoring-as-a-Service (MaaS) Distributed Management Task Force Location IndependenceSoftware-as-a-Service (SaaS) (DMTF) Communication Requirements for CloudPlatform-as-a-Service (PaaS) What It Is? ImplementationBenefits and Limitations of Cloud Computing DMTK Working Groups Associated with Public InternetBenefits Cloud Computing Private InternetLimitations Standards for Application Developers Routing to the DatacenterCloud Computing Case Studies Protocols Switching within the Data CenterHow Companies Are Using Cloud Scripting Languages BandwidthComputing Content Formatting Standards and Tools Used to Measure NetworkImplementing Applications and Services in Languages Performancethe Cloud Standards for Security in the Cloud Using the Protocol Analyzer to MeasureUsing Your Company's Services vs. the Confidentiality, Integrity, Availability BandwidthCloud Provider Authentication, Authorization, Using Ping and Traceroute to MeasureA Cloud Service Provider Introduced Accountability Network PerformanceCloud Computing Risks and Issues Regulations for Privacy SecurityProducts and Services Provided by Cloud Security Protocols SSLComputing Companies Establishing a Baseline for Cloud VPNOperational Performance OverheadEconomic Best Practices for Selecting a Vendor Storage Options for Cloud ComputingStaffing and Implementing Cloud-Based Storage CapacityShould Your Company Invest in Cloud Applications Data Protection and PartitioningComputing? Choosing the Right Vendor NASWhat Should Not be Moved to the Cloud Implementing Cloud-Based Applications SANVirtualization in Mainframe Architectures Citrix CASand Operating Systems Windows Remote Desktop Redundancy

Page 128: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

LANs and the Cloud Vnc ReplicationInternet and the Cloud Web Browsers MultisitingWeb Services, Browsers, and the Cloud Server Extensions Backup and RecoveryThin Client Thin Clients Server Software Environments thatAdvances in Networking and Processing Smart Phones, Pads, Pods, etc. Support Cloud ComputingSpeeds that Led to Cloud Computing Virtual Terminal Security Strengths and Server CapacityNetworking Developments Weaknesses VirtualizationIncreased Processing Speeds Strengths ClusteringManaged Service Provider Model to Cloud Weaknesses ExpansionComputing and Software as a Service iPhone Server Functions(SaaS) Android ApplicationSingle Purpose Architectures Migrate to BlackBerry WebMultipurpose Architectures Windows Mobile DatabaseData Center Virtualization Ubuntu Mobile Internet Device Vendor Approaches to Cloud ComputingCollaboration Mobile Platform Virtualization Role of Open Source Software in DataThe Cloud as a Reach Extender Kernel-Based Virtual Machine CenterThe Cloud as a Communication Enabler VMware Mobile Virtualization Platform Cost Reduction vs. ReliabilityThe Cloud as an Employee Enabler Collaboration Applications for Mobile Open Source Server SoftwareService-Oriented Architecture (SOA) Platforms Open Source Database SoftwareEvolving from SOA to the Cloud Text Messaging Open Source Applications SoftwareCapacity: Limited Performance iPhone Applications Open Source System ManagementAvailability: Communications Failure and BlackBerry Applications SoftwarePerformance Issues Droid Applications Open Source Load-Balancing Software Security: Newer Security Protocols Provide The HypervisorMore Protection Virtualization as the "Operating System"What's Next in Cloud Computing line Virtualization with a Host OperatingUsing Industry and International Standards Cloud Computing Defined SystemIndependent Components Cloud Computing Architecture Virtualization Infections on VirtualizedMessage Base Cloud Computing Terms EnvironmentsLocation Independence Communication-as-a-Service (CaaS) Type 1 Virtualized EnvironmentCommunication Requirements for Cloud Infrastructure-as-a-Service (IaaS) Type 2 Virtualized EnvironmentImplementation Monitoring-as-a-Service (MaaS) Virtualization EnvironmentsPublic Internet Software-as-a-Service (SaaS) Microsoft VirtualizationPrivate Internet Platform-as-a-Service (PaaS) Sun xVM VirtualBoxRouting to the Datacenter Benefits and Limitations of Cloud Linux/UNIX VirtualizationSwitching within the Data Center Computing VMware ProductsBandwidth Benefits Data Center and Cloud InfrastructureTools Used to Measure Network Limitations ProductsPerformance Cloud Computing Case Studies End-User and Desktop ProductsUsing the Protocol Analyzer to Measure How Companies Are Using Cloud IBM VirtualizationBandwidth Computing Using VMware to see a Virtualized ServerUsing Ping and Traceroute to Measure Implementing Applications and Services Environment Network Performance in the Cloud What It IsSecurity Using Your Company's Services vs. the Permissive FederationSSL Cloud Provider Verified FederationVPN A Cloud Service Provider Introduced Encrypted FederationOverhead Cloud Computing Risks and Issues Trusted FederationStorage Options for Cloud Computing Products and Services Provided by Cloud Using XMPP in the Federated EnvironmentStorage Capacity Computing Companies Presence in the CloudData Protection and Partitioning Operational What It IsNAS Economic Presence ProtocolsSAN Staffing Leveraging PresenceCAS Should Your Company Invest in Cloud Presence EnabledRedundancy Computing? The Future of PresenceReplication What Should Not be Moved to the Cloud The Interrelation of Identity, Presence, andMultisiting Virtualization in Mainframe Architectures Location in the CloudBackup and Recovery and Operating Systems Identity ManagementServer Software Environments that Support LANs and the Cloud What It IsCloud Computing Internet and the Cloud Future of Identity in the CloudServer Capacity Web Services, Browsers, and the Cloud Privacy and Its Relation to Cloud-BasedVirtualization Thin Client Information SystemsClustering Advances in Networking and Processing Personal InformationExpansion Speeds that Led to Cloud Computing Privacy-Related IssuesServer Functions Networking Developments Finding Your Private Information Application Increased Processing Speeds What It IsWeb Managed Service Provider Model to Open Cloud Consortium Working Groups

Page 129: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Database Cloud Computing and Software as a Project MatsuVendor Approaches to Cloud Computing Service (SaaS) Project CometRole of Open Source Software in Data Single Purpose Architectures Migrate to HPC in the CloudCenter Multipurpose Architectures The Open Cloud TestbedCost Reduction vs. Reliability Data Center Virtualization The Open Science Data CloudOpen Source Server Software Collaboration Intercloud TestbedOpen Source Database Software The Cloud as a Reach Extender Reporting on an Open Cloud ConsortiumOpen Source Applications Software The Cloud as a Communication Enabler Working GroupOpen Source System Management Software The Cloud as an Employee Enabler Distributed Management Task ForceOpen Source Load-Balancing Software Service-Oriented Architecture (SOA) (DMTF)The Hypervisor Evolving from SOA to the Cloud What It Is?Virtualization as the "Operating System" Capacity: Limited Performance DMTK Working Groups Associated withVirtualization with a Host Operating System Availability: Communications Failure and Cloud ComputingVirtualization Infections on Virtualized Performance Issues Standards for Application DevelopersEnvironments Security: Newer Security Protocols ProtocolsType 1 Virtualized Environment Provide More Protection Scripting LanguagesType 2 Virtualized Environment What's Next in Cloud Computing Content Formatting Standards andVirtualization Environments Using Industry and International LanguagesMicrosoft Virtualization Standards Standards for Security in the CloudSun xVM VirtualBox Independent Components Confidentiality, Integrity, AvailabilityLinux/UNIX Virtualization Message Base Authentication, Authorization,VMware Products Location Independence AccountabilityData Center and Cloud Infrastructure Communication Requirements for Cloud Regulations for PrivacyProducts Implementation Security ProtocolsEnd-User and Desktop Products Public Internet Establishing a Baseline for CloudIBM Virtualization Private Internet PerformanceUsing VMware to see a Virtualized Server Routing to the Datacenter Best Practices for Selecting a Vendor andEnvironment Switching within the Data Center Implementing Cloud-Based ApplicationsWhat It Is Bandwidth Choosing the Right VendorPermissive Federation Tools Used to Measure Network Implementing Cloud-Based Applications Verified Federation Performance CitrixEncrypted Federation Using the Protocol Analyzer to Measure Windows Remote DesktopTrusted Federation Bandwidth VncUsing XMPP in the Federated Environment Using Ping and Traceroute to Measure Web BrowsersPresence in the Cloud Network Performance Server ExtensionsWhat It Is Security Thin ClientsPresence Protocols SSL Smart Phones, Pads, Pods, etc.Leveraging Presence VPN Virtual Terminal Security Strengths andPresence Enabled Overhead WeaknessesThe Future of Presence Storage Options for Cloud Computing StrengthsThe Interrelation of Identity, Presence, and Storage Capacity Weaknesses Location in the Cloud Data Protection and Partitioning iPhoneIdentity Management NAS AndroidWhat It Is SAN BlackBerryFuture of Identity in the Cloud CAS Windows MobilePrivacy and Its Relation to Cloud-Based Redundancy Ubuntu Mobile Internet DeviceInformation Systems Replication Mobile Platform VirtualizationPersonal Information Multisiting Kernel-Based Virtual MachinePrivacy-Related Issues Backup and Recovery VMware Mobile Virtualization PlatformFinding Your Private Information Server Software Environments that Collaboration Applications for MobileWhat It Is Support Cloud Computing PlatformsOpen Cloud Consortium Working Groups Server Capacity Text MessagingProject Matsu Virtualization iPhone ApplicationsProject Comet Clustering BlackBerry ApplicationsHPC in the Cloud Expansion Droid Applications The Open Cloud Testbed Server FunctionsThe Open Science Data Cloud ApplicationIntercloud Testbed Web lineReporting on an Open Cloud Consortium Database Cloud Computing DefinedWorking Group Vendor Approaches to Cloud Computing Cloud Computing ArchitectureDistributed Management Task Force Role of Open Source Software in Data Cloud Computing Terms(DMTF) Center Communication-as-a-Service (CaaS)What It Is? Cost Reduction vs. Reliability Infrastructure-as-a-Service (IaaS)DMTK Working Groups Associated with Open Source Server Software Monitoring-as-a-Service (MaaS)Cloud Computing Open Source Database Software Software-as-a-Service (SaaS)Standards for Application Developers Open Source Applications Software Platform-as-a-Service (PaaS)

Page 130: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Protocols Open Source System Management Benefits and Limitations of CloudScripting Languages Software ComputingContent Formatting Standards and Open Source Load-Balancing Software BenefitsLanguages The Hypervisor LimitationsStandards for Security in the Cloud Virtualization as the "Operating System" Cloud Computing Case StudiesConfidentiality, Integrity, Availability Virtualization with a Host Operating How Companies Are Using CloudAuthentication, Authorization, Accountability System ComputingRegulations for Privacy Virtualization Infections on Virtualized Implementing Applications and Services inSecurity Protocols Environments the CloudEstablishing a Baseline for Cloud Type 1 Virtualized Environment Using Your Company's Services vs. thePerformance Type 2 Virtualized Environment Cloud ProviderBest Practices for Selecting a Vendor and Virtualization Environments A Cloud Service Provider IntroducedImplementing Cloud-Based Applications Microsoft Virtualization Cloud Computing Risks and Issues Choosing the Right Vendor Sun xVM VirtualBox Products and Services Provided by CloudImplementing Cloud-Based Applications Linux/UNIX Virtualization Computing Companies Citrix VMware Products OperationalWindows Remote Desktop Data Center and Cloud Infrastructure EconomicVnc Products StaffingWeb Browsers End-User and Desktop Products Should Your Company Invest in CloudServer Extensions IBM Virtualization Computing?Thin Clients Using VMware to see a Virtualized Server What Should Not be Moved to the Cloud Smart Phones, Pads, Pods, etc. Environment Virtualization in Mainframe ArchitecturesVirtual Terminal Security Strengths and What It Is and Operating SystemsWeaknesses Permissive Federation LANs and the CloudStrengths Verified Federation Internet and the CloudWeaknesses Encrypted Federation Web Services, Browsers, and the CloudiPhone Trusted Federation Thin ClientAndroid Using XMPP in the Federated Advances in Networking and ProcessingBlackBerry Environment Speeds that Led to Cloud ComputingWindows Mobile Presence in the Cloud Networking DevelopmentsUbuntu Mobile Internet Device What It Is Increased Processing SpeedsMobile Platform Virtualization Presence Protocols Managed Service Provider Model to CloudKernel-Based Virtual Machine Leveraging Presence Computing and Software as a ServiceVMware Mobile Virtualization Platform Presence Enabled (SaaS)Collaboration Applications for Mobile The Future of Presence Single Purpose Architectures Migrate toPlatforms The Interrelation of Identity, Presence, Multipurpose ArchitecturesText Messaging and Location in the Cloud Data Center VirtualizationiPhone Applications Identity Management CollaborationBlackBerry Applications What It Is The Cloud as a Reach ExtenderDroid Applications Future of Identity in the Cloud The Cloud as a Communication Enabler

Privacy and Its Relation to Cloud-Based The Cloud as an Employee EnablerInformation Systems Service-Oriented Architecture (SOA)

line Personal Information Evolving from SOA to the CloudCloud Computing Defined Privacy-Related Issues Capacity: Limited PerformanceCloud Computing Architecture Finding Your Private Information Availability: Communications Failure andCloud Computing Terms What It Is Performance IssuesCommunication-as-a-Service (CaaS) Open Cloud Consortium Working Groups Security: Newer Security Protocols ProvideInfrastructure-as-a-Service (IaaS) Project Matsu More ProtectionMonitoring-as-a-Service (MaaS) Project Comet What's Next in Cloud Computing Software-as-a-Service (SaaS) HPC in the Cloud Using Industry and International StandardsPlatform-as-a-Service (PaaS) The Open Cloud Testbed Independent ComponentsBenefits and Limitations of Cloud Computing The Open Science Data Cloud Message BaseBenefits Intercloud Testbed Location IndependenceLimitations Reporting on an Open Cloud Consortium Communication Requirements for CloudCloud Computing Case Studies Working Group ImplementationHow Companies Are Using Cloud Distributed Management Task Force Public InternetComputing (DMTF) Private InternetImplementing Applications and Services in What It Is? Routing to the Datacenterthe Cloud DMTK Working Groups Associated with Switching within the Data CenterUsing Your Company's Services vs. the Cloud Computing BandwidthCloud Provider Standards for Application Developers Tools Used to Measure NetworkA Cloud Service Provider Introduced Protocols PerformanceCloud Computing Risks and Issues Scripting Languages Using the Protocol Analyzer to MeasureProducts and Services Provided by Cloud Content Formatting Standards and BandwidthComputing Companies Languages Using Ping and Traceroute to MeasureOperational Standards for Security in the Cloud Network Performance

Page 131: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Economic Confidentiality, Integrity, Availability SecurityStaffing Authentication, Authorization, SSLShould Your Company Invest in Cloud Accountability VPNComputing? Regulations for Privacy OverheadWhat Should Not be Moved to the Cloud Security Protocols Storage Options for Cloud ComputingVirtualization in Mainframe Architectures Establishing a Baseline for Cloud Storage Capacityand Operating Systems Performance Data Protection and PartitioningLANs and the Cloud Best Practices for Selecting a Vendor NASInternet and the Cloud and Implementing Cloud-Based SANWeb Services, Browsers, and the Cloud Applications CASThin Client Choosing the Right Vendor RedundancyAdvances in Networking and Processing Implementing Cloud-Based Applications ReplicationSpeeds that Led to Cloud Computing Citrix MultisitingNetworking Developments Windows Remote Desktop Backup and RecoveryIncreased Processing Speeds Vnc Server Software Environments thatManaged Service Provider Model to Cloud Web Browsers Support Cloud ComputingComputing and Software as a Service Server Extensions Server Capacity(SaaS) Thin Clients VirtualizationSingle Purpose Architectures Migrate to Smart Phones, Pads, Pods, etc. ClusteringMultipurpose Architectures Virtual Terminal Security Strengths and ExpansionData Center Virtualization Weaknesses Server FunctionsCollaboration Strengths ApplicationThe Cloud as a Reach Extender Weaknesses WebThe Cloud as a Communication Enabler iPhone DatabaseThe Cloud as an Employee Enabler Android Vendor Approaches to Cloud ComputingService-Oriented Architecture (SOA) BlackBerry Role of Open Source Software in DataEvolving from SOA to the Cloud Windows Mobile CenterCapacity: Limited Performance Ubuntu Mobile Internet Device Cost Reduction vs. ReliabilityAvailability: Communications Failure and Mobile Platform Virtualization Open Source Server SoftwarePerformance Issues Kernel-Based Virtual Machine Open Source Database SoftwareSecurity: Newer Security Protocols Provide VMware Mobile Virtualization Platform Open Source Applications SoftwareMore Protection Collaboration Applications for Mobile Open Source System ManagementWhat's Next in Cloud Computing Platforms SoftwareUsing Industry and International Standards Text Messaging Open Source Load-Balancing Software Independent Components iPhone Applications The HypervisorMessage Base BlackBerry Applications Virtualization as the "Operating System"Location Independence Droid Applications Virtualization with a Host OperatingCommunication Requirements for Cloud SystemImplementation Virtualization Infections on VirtualizedPublic Internet line EnvironmentsPrivate Internet Cloud Computing Defined Type 1 Virtualized EnvironmentRouting to the Datacenter Cloud Computing Architecture Type 2 Virtualized EnvironmentSwitching within the Data Center Cloud Computing Terms Virtualization EnvironmentsBandwidth Communication-as-a-Service (CaaS) Microsoft VirtualizationTools Used to Measure Network Infrastructure-as-a-Service (IaaS) Sun xVM VirtualBoxPerformance Monitoring-as-a-Service (MaaS) Linux/UNIX VirtualizationUsing the Protocol Analyzer to Measure Software-as-a-Service (SaaS) VMware ProductsBandwidth Platform-as-a-Service (PaaS) Data Center and Cloud InfrastructureUsing Ping and Traceroute to Measure Benefits and Limitations of Cloud ProductsNetwork Performance Computing End-User and Desktop ProductsSecurity Benefits IBM VirtualizationSSL Limitations Using VMware to see a Virtualized ServerVPN Cloud Computing Case Studies Environment Overhead How Companies Are Using Cloud What It IsStorage Options for Cloud Computing Computing Permissive FederationStorage Capacity Implementing Applications and Services Verified FederationData Protection and Partitioning in the Cloud Encrypted FederationNAS Using Your Company's Services vs. the Trusted FederationSAN Cloud Provider Using XMPP in the Federated EnvironmentCAS A Cloud Service Provider Introduced Presence in the CloudRedundancy Cloud Computing Risks and Issues What It IsReplication Products and Services Provided by Cloud Presence ProtocolsMultisiting Computing Companies Leveraging PresenceBackup and Recovery Operational Presence EnabledServer Software Environments that Support Economic The Future of PresenceCloud Computing Staffing The Interrelation of Identity, Presence, and

Page 132: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Capacity Should Your Company Invest in Cloud Location in the CloudVirtualization Computing? Identity ManagementClustering What Should Not be Moved to the Cloud What It IsExpansion Virtualization in Mainframe Architectures Future of Identity in the CloudServer Functions and Operating Systems Privacy and Its Relation to Cloud-BasedApplication LANs and the Cloud Information SystemsWeb Internet and the Cloud Personal InformationDatabase Web Services, Browsers, and the Cloud Privacy-Related IssuesVendor Approaches to Cloud Computing Thin Client Finding Your Private Information Role of Open Source Software in Data Advances in Networking and Processing What It IsCenter Speeds that Led to Cloud Computing Open Cloud Consortium Working GroupsCost Reduction vs. Reliability Networking Developments Project MatsuOpen Source Server Software Increased Processing Speeds Project CometOpen Source Database Software Managed Service Provider Model to HPC in the CloudOpen Source Applications Software Cloud Computing and Software as a The Open Cloud TestbedOpen Source System Management Software Service (SaaS) The Open Science Data CloudOpen Source Load-Balancing Software Single Purpose Architectures Migrate to Intercloud TestbedThe Hypervisor Multipurpose Architectures Reporting on an Open Cloud ConsortiumVirtualization as the "Operating System" Data Center Virtualization Working GroupVirtualization with a Host Operating System Collaboration Distributed Management Task ForceVirtualization Infections on Virtualized The Cloud as a Reach Extender (DMTF)Environments The Cloud as a Communication Enabler What It Is?Type 1 Virtualized Environment The Cloud as an Employee Enabler DMTK Working Groups Associated withType 2 Virtualized Environment Service-Oriented Architecture (SOA) Cloud ComputingVirtualization Environments Evolving from SOA to the Cloud Standards for Application DevelopersMicrosoft Virtualization Capacity: Limited Performance ProtocolsSun xVM VirtualBox Availability: Communications Failure and Scripting LanguagesLinux/UNIX Virtualization Performance Issues Content Formatting Standards andVMware Products Security: Newer Security Protocols LanguagesData Center and Cloud Infrastructure Provide More Protection Standards for Security in the CloudProducts What's Next in Cloud Computing Confidentiality, Integrity, AvailabilityEnd-User and Desktop Products Using Industry and International Authentication, Authorization,IBM Virtualization Standards AccountabilityUsing VMware to see a Virtualized Server Independent Components Regulations for PrivacyEnvironment Message Base Security ProtocolsWhat It Is Location Independence Establishing a Baseline for CloudPermissive Federation Communication Requirements for Cloud PerformanceVerified Federation Implementation Best Practices for Selecting a Vendor andEncrypted Federation Public Internet Implementing Cloud-Based ApplicationsTrusted Federation Private Internet Choosing the Right VendorUsing XMPP in the Federated Environment Routing to the Datacenter Implementing Cloud-Based Applications Presence in the Cloud Switching within the Data Center CitrixWhat It Is Bandwidth Windows Remote DesktopPresence Protocols Tools Used to Measure Network VncLeveraging Presence Performance Web BrowsersPresence Enabled Using the Protocol Analyzer to Measure Server ExtensionsThe Future of Presence Bandwidth Thin ClientsThe Interrelation of Identity, Presence, and Using Ping and Traceroute to Measure Smart Phones, Pads, Pods, etc.Location in the Cloud Network Performance Virtual Terminal Security Strengths andIdentity Management Security WeaknessesWhat It Is SSL StrengthsFuture of Identity in the Cloud VPN Weaknesses Privacy and Its Relation to Cloud-Based Overhead iPhoneInformation Systems Storage Options for Cloud Computing AndroidPersonal Information Storage Capacity BlackBerryPrivacy-Related Issues Data Protection and Partitioning Windows MobileFinding Your Private Information NAS Ubuntu Mobile Internet DeviceWhat It Is SAN Mobile Platform VirtualizationOpen Cloud Consortium Working Groups CAS Kernel-Based Virtual MachineProject Matsu Redundancy VMware Mobile Virtualization PlatformProject Comet Replication Collaboration Applications for MobileHPC in the Cloud Multisiting PlatformsThe Open Cloud Testbed Backup and Recovery Text MessagingThe Open Science Data Cloud Server Software Environments that iPhone ApplicationsIntercloud Testbed Support Cloud Computing BlackBerry ApplicationsReporting on an Open Cloud Consortium Server Capacity Droid Applications

Page 133: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Working Group VirtualizationDistributed Management Task Force Clustering(DMTF) Expansion lineWhat It Is? Server Functions Cloud Computing DefinedDMTK Working Groups Associated with Application Cloud Computing ArchitectureCloud Computing Web Cloud Computing TermsStandards for Application Developers Database Communication-as-a-Service (CaaS)Protocols Vendor Approaches to Cloud Computing Infrastructure-as-a-Service (IaaS)Scripting Languages Role of Open Source Software in Data Monitoring-as-a-Service (MaaS)Content Formatting Standards and Center Software-as-a-Service (SaaS)Languages Cost Reduction vs. Reliability Platform-as-a-Service (PaaS)Standards for Security in the Cloud Open Source Server Software Benefits and Limitations of CloudConfidentiality, Integrity, Availability Open Source Database Software ComputingAuthentication, Authorization, Accountability Open Source Applications Software BenefitsRegulations for Privacy Open Source System Management LimitationsSecurity Protocols Software Cloud Computing Case StudiesEstablishing a Baseline for Cloud Open Source Load-Balancing Software How Companies Are Using CloudPerformance The Hypervisor ComputingBest Practices for Selecting a Vendor and Virtualization as the "Operating System" Implementing Applications and Services inImplementing Cloud-Based Applications Virtualization with a Host Operating the CloudChoosing the Right Vendor System Using Your Company's Services vs. theImplementing Cloud-Based Applications Virtualization Infections on Virtualized Cloud ProviderCitrix Environments A Cloud Service Provider IntroducedWindows Remote Desktop Type 1 Virtualized Environment Cloud Computing Risks and Issues Vnc Type 2 Virtualized Environment Products and Services Provided by CloudWeb Browsers Virtualization Environments Computing Companies Server Extensions Microsoft Virtualization OperationalThin Clients Sun xVM VirtualBox EconomicSmart Phones, Pads, Pods, etc. Linux/UNIX Virtualization StaffingVirtual Terminal Security Strengths and VMware Products Should Your Company Invest in CloudWeaknesses Data Center and Cloud Infrastructure Computing?Strengths Products What Should Not be Moved to the Cloud Weaknesses End-User and Desktop Products Virtualization in Mainframe ArchitecturesiPhone IBM Virtualization and Operating SystemsAndroid Using VMware to see a Virtualized Server LANs and the CloudBlackBerry Environment Internet and the CloudWindows Mobile What It Is Web Services, Browsers, and the CloudUbuntu Mobile Internet Device Permissive Federation Thin ClientMobile Platform Virtualization Verified Federation Advances in Networking and ProcessingKernel-Based Virtual Machine Encrypted Federation Speeds that Led to Cloud ComputingVMware Mobile Virtualization Platform Trusted Federation Networking DevelopmentsCollaboration Applications for Mobile Using XMPP in the Federated Increased Processing SpeedsPlatforms Environment Managed Service Provider Model to CloudText Messaging Presence in the Cloud Computing and Software as a ServiceiPhone Applications What It Is (SaaS)BlackBerry Applications Presence Protocols Single Purpose Architectures Migrate toDroid Applications Leveraging Presence Multipurpose Architectures

Presence Enabled Data Center VirtualizationThe Future of Presence Collaboration

line The Interrelation of Identity, Presence, The Cloud as a Reach ExtenderCloud Computing Defined and Location in the Cloud The Cloud as a Communication EnablerCloud Computing Architecture Identity Management The Cloud as an Employee EnablerCloud Computing Terms What It Is Service-Oriented Architecture (SOA)Communication-as-a-Service (CaaS) Future of Identity in the Cloud Evolving from SOA to the CloudInfrastructure-as-a-Service (IaaS) Privacy and Its Relation to Cloud-Based Capacity: Limited PerformanceMonitoring-as-a-Service (MaaS) Information Systems Availability: Communications Failure andSoftware-as-a-Service (SaaS) Personal Information Performance IssuesPlatform-as-a-Service (PaaS) Privacy-Related Issues Security: Newer Security Protocols ProvideBenefits and Limitations of Cloud Computing Finding Your Private Information More ProtectionBenefits What It Is What's Next in Cloud Computing Limitations Open Cloud Consortium Working Groups Using Industry and International StandardsCloud Computing Case Studies Project Matsu Independent ComponentsHow Companies Are Using Cloud Project Comet Message BaseComputing HPC in the Cloud Location IndependenceImplementing Applications and Services in The Open Cloud Testbed Communication Requirements for Cloudthe Cloud The Open Science Data Cloud Implementation

Page 134: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using Your Company's Services vs. the Intercloud Testbed Public InternetCloud Provider Reporting on an Open Cloud Consortium Private InternetA Cloud Service Provider Introduced Working Group Routing to the DatacenterCloud Computing Risks and Issues Distributed Management Task Force Switching within the Data CenterProducts and Services Provided by Cloud (DMTF) BandwidthComputing Companies What It Is? Tools Used to Measure NetworkOperational DMTK Working Groups Associated with PerformanceEconomic Cloud Computing Using the Protocol Analyzer to MeasureStaffing Standards for Application Developers BandwidthShould Your Company Invest in Cloud Protocols Using Ping and Traceroute to MeasureComputing? Scripting Languages Network PerformanceWhat Should Not be Moved to the Cloud Content Formatting Standards and SecurityVirtualization in Mainframe Architectures Languages SSLand Operating Systems Standards for Security in the Cloud VPNLANs and the Cloud Confidentiality, Integrity, Availability OverheadInternet and the Cloud Authentication, Authorization, Storage Options for Cloud ComputingWeb Services, Browsers, and the Cloud Accountability Storage CapacityThin Client Regulations for Privacy Data Protection and PartitioningAdvances in Networking and Processing Security Protocols NASSpeeds that Led to Cloud Computing Establishing a Baseline for Cloud SANNetworking Developments Performance CASIncreased Processing Speeds Best Practices for Selecting a Vendor RedundancyManaged Service Provider Model to Cloud and Implementing Cloud-Based ReplicationComputing and Software as a Service Applications Multisiting(SaaS) Choosing the Right Vendor Backup and RecoverySingle Purpose Architectures Migrate to Implementing Cloud-Based Applications Server Software Environments thatMultipurpose Architectures Citrix Support Cloud ComputingData Center Virtualization Windows Remote Desktop Server CapacityCollaboration Vnc VirtualizationThe Cloud as a Reach Extender Web Browsers ClusteringThe Cloud as a Communication Enabler Server Extensions ExpansionThe Cloud as an Employee Enabler Thin Clients Server FunctionsService-Oriented Architecture (SOA) Smart Phones, Pads, Pods, etc. ApplicationEvolving from SOA to the Cloud Virtual Terminal Security Strengths and WebCapacity: Limited Performance Weaknesses DatabaseAvailability: Communications Failure and Strengths Vendor Approaches to Cloud ComputingPerformance Issues Weaknesses Role of Open Source Software in DataSecurity: Newer Security Protocols Provide iPhone CenterMore Protection Android Cost Reduction vs. ReliabilityWhat's Next in Cloud Computing BlackBerry Open Source Server SoftwareUsing Industry and International Standards Windows Mobile Open Source Database SoftwareIndependent Components Ubuntu Mobile Internet Device Open Source Applications SoftwareMessage Base Mobile Platform Virtualization Open Source System ManagementLocation Independence Kernel-Based Virtual Machine SoftwareCommunication Requirements for Cloud VMware Mobile Virtualization Platform Open Source Load-Balancing Software Implementation Collaboration Applications for Mobile The HypervisorPublic Internet Platforms Virtualization as the "Operating System"Private Internet Text Messaging Virtualization with a Host OperatingRouting to the Datacenter iPhone Applications SystemSwitching within the Data Center BlackBerry Applications Virtualization Infections on VirtualizedBandwidth Droid Applications EnvironmentsTools Used to Measure Network Type 1 Virtualized EnvironmentPerformance Type 2 Virtualized EnvironmentUsing the Protocol Analyzer to Measure line Virtualization EnvironmentsBandwidth Cloud Computing Defined Microsoft VirtualizationUsing Ping and Traceroute to Measure Cloud Computing Architecture Sun xVM VirtualBoxNetwork Performance Cloud Computing Terms Linux/UNIX VirtualizationSecurity Communication-as-a-Service (CaaS) VMware ProductsSSL Infrastructure-as-a-Service (IaaS) Data Center and Cloud InfrastructureVPN Monitoring-as-a-Service (MaaS) ProductsOverhead Software-as-a-Service (SaaS) End-User and Desktop ProductsStorage Options for Cloud Computing Platform-as-a-Service (PaaS) IBM VirtualizationStorage Capacity Benefits and Limitations of Cloud Using VMware to see a Virtualized ServerData Protection and Partitioning Computing Environment NAS Benefits What It IsSAN Limitations Permissive Federation

Page 135: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

CAS Cloud Computing Case Studies Verified FederationRedundancy How Companies Are Using Cloud Encrypted FederationReplication Computing Trusted FederationMultisiting Implementing Applications and Services Using XMPP in the Federated EnvironmentBackup and Recovery in the Cloud Presence in the CloudServer Software Environments that Support Using Your Company's Services vs. the What It IsCloud Computing Cloud Provider Presence ProtocolsServer Capacity A Cloud Service Provider Introduced Leveraging PresenceVirtualization Cloud Computing Risks and Issues Presence EnabledClustering Products and Services Provided by Cloud The Future of PresenceExpansion Computing Companies The Interrelation of Identity, Presence, andServer Functions Operational Location in the CloudApplication Economic Identity ManagementWeb Staffing What It IsDatabase Should Your Company Invest in Cloud Future of Identity in the CloudVendor Approaches to Cloud Computing Computing? Privacy and Its Relation to Cloud-BasedRole of Open Source Software in Data What Should Not be Moved to the Cloud Information SystemsCenter Virtualization in Mainframe Architectures Personal InformationCost Reduction vs. Reliability and Operating Systems Privacy-Related IssuesOpen Source Server Software LANs and the Cloud Finding Your Private Information Open Source Database Software Internet and the Cloud What It IsOpen Source Applications Software Web Services, Browsers, and the Cloud Open Cloud Consortium Working GroupsOpen Source System Management Software Thin Client Project MatsuOpen Source Load-Balancing Software Advances in Networking and Processing Project CometThe Hypervisor Speeds that Led to Cloud Computing HPC in the CloudVirtualization as the "Operating System" Networking Developments The Open Cloud TestbedVirtualization with a Host Operating System Increased Processing Speeds The Open Science Data CloudVirtualization Infections on Virtualized Managed Service Provider Model to Intercloud TestbedEnvironments Cloud Computing and Software as a Reporting on an Open Cloud ConsortiumType 1 Virtualized Environment Service (SaaS) Working GroupType 2 Virtualized Environment Single Purpose Architectures Migrate to Distributed Management Task ForceVirtualization Environments Multipurpose Architectures (DMTF)Microsoft Virtualization Data Center Virtualization What It Is?Sun xVM VirtualBox Collaboration DMTK Working Groups Associated withLinux/UNIX Virtualization The Cloud as a Reach Extender Cloud ComputingVMware Products The Cloud as a Communication Enabler Standards for Application DevelopersData Center and Cloud Infrastructure The Cloud as an Employee Enabler ProtocolsProducts Service-Oriented Architecture (SOA) Scripting LanguagesEnd-User and Desktop Products Evolving from SOA to the Cloud Content Formatting Standards andIBM Virtualization Capacity: Limited Performance LanguagesUsing VMware to see a Virtualized Server Availability: Communications Failure and Standards for Security in the CloudEnvironment Performance Issues Confidentiality, Integrity, AvailabilityWhat It Is Security: Newer Security Protocols Authentication, Authorization,Permissive Federation Provide More Protection AccountabilityVerified Federation What's Next in Cloud Computing Regulations for PrivacyEncrypted Federation Using Industry and International Security ProtocolsTrusted Federation Standards Establishing a Baseline for CloudUsing XMPP in the Federated Environment Independent Components PerformancePresence in the Cloud Message Base Best Practices for Selecting a Vendor andWhat It Is Location Independence Implementing Cloud-Based ApplicationsPresence Protocols Communication Requirements for Cloud Choosing the Right VendorLeveraging Presence Implementation Implementing Cloud-Based Applications Presence Enabled Public Internet CitrixThe Future of Presence Private Internet Windows Remote DesktopThe Interrelation of Identity, Presence, and Routing to the Datacenter VncLocation in the Cloud Switching within the Data Center Web BrowsersIdentity Management Bandwidth Server ExtensionsWhat It Is Tools Used to Measure Network Thin ClientsFuture of Identity in the Cloud Performance Smart Phones, Pads, Pods, etc.Privacy and Its Relation to Cloud-Based Using the Protocol Analyzer to Measure Virtual Terminal Security Strengths andInformation Systems Bandwidth WeaknessesPersonal Information Using Ping and Traceroute to Measure StrengthsPrivacy-Related Issues Network Performance Weaknesses Finding Your Private Information Security iPhoneWhat It Is SSL AndroidOpen Cloud Consortium Working Groups VPN BlackBerry

Page 136: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Project Matsu Overhead Windows MobileProject Comet Storage Options for Cloud Computing Ubuntu Mobile Internet DeviceHPC in the Cloud Storage Capacity Mobile Platform VirtualizationThe Open Cloud Testbed Data Protection and Partitioning Kernel-Based Virtual MachineThe Open Science Data Cloud NAS VMware Mobile Virtualization PlatformIntercloud Testbed SAN Collaboration Applications for MobileReporting on an Open Cloud Consortium CAS PlatformsWorking Group Redundancy Text MessagingDistributed Management Task Force Replication iPhone Applications(DMTF) Multisiting BlackBerry ApplicationsWhat It Is? Backup and Recovery Droid Applications DMTK Working Groups Associated with Server Software Environments thatCloud Computing Support Cloud ComputingStandards for Application Developers Server Capacity lineProtocols Virtualization Cloud Computing DefinedScripting Languages Clustering Cloud Computing ArchitectureContent Formatting Standards and Expansion Cloud Computing TermsLanguages Server Functions Communication-as-a-Service (CaaS)Standards for Security in the Cloud Application Infrastructure-as-a-Service (IaaS)Confidentiality, Integrity, Availability Web Monitoring-as-a-Service (MaaS)Authentication, Authorization, Accountability Database Software-as-a-Service (SaaS)Regulations for Privacy Vendor Approaches to Cloud Computing Platform-as-a-Service (PaaS)Security Protocols Role of Open Source Software in Data Benefits and Limitations of CloudEstablishing a Baseline for Cloud Center ComputingPerformance Cost Reduction vs. Reliability BenefitsBest Practices for Selecting a Vendor and Open Source Server Software LimitationsImplementing Cloud-Based Applications Open Source Database Software Cloud Computing Case StudiesChoosing the Right Vendor Open Source Applications Software How Companies Are Using CloudImplementing Cloud-Based Applications Open Source System Management ComputingCitrix Software Implementing Applications and Services inWindows Remote Desktop Open Source Load-Balancing Software the CloudVnc The Hypervisor Using Your Company's Services vs. theWeb Browsers Virtualization as the "Operating System" Cloud ProviderServer Extensions Virtualization with a Host Operating A Cloud Service Provider IntroducedThin Clients System Cloud Computing Risks and Issues Smart Phones, Pads, Pods, etc. Virtualization Infections on Virtualized Products and Services Provided by CloudVirtual Terminal Security Strengths and Environments Computing Companies Weaknesses Type 1 Virtualized Environment OperationalStrengths Type 2 Virtualized Environment EconomicWeaknesses Virtualization Environments StaffingiPhone Microsoft Virtualization Should Your Company Invest in CloudAndroid Sun xVM VirtualBox Computing?BlackBerry Linux/UNIX Virtualization What Should Not be Moved to the Cloud Windows Mobile VMware Products Virtualization in Mainframe ArchitecturesUbuntu Mobile Internet Device Data Center and Cloud Infrastructure and Operating SystemsMobile Platform Virtualization Products LANs and the CloudKernel-Based Virtual Machine End-User and Desktop Products Internet and the CloudVMware Mobile Virtualization Platform IBM Virtualization Web Services, Browsers, and the CloudCollaboration Applications for Mobile Using VMware to see a Virtualized Server Thin ClientPlatforms Environment Advances in Networking and ProcessingText Messaging What It Is Speeds that Led to Cloud ComputingiPhone Applications Permissive Federation Networking DevelopmentsBlackBerry Applications Verified Federation Increased Processing SpeedsDroid Applications Encrypted Federation Managed Service Provider Model to Cloud

Trusted Federation Computing and Software as a ServiceUsing XMPP in the Federated (SaaS)

line Environment Single Purpose Architectures Migrate toCloud Computing Defined Presence in the Cloud Multipurpose ArchitecturesCloud Computing Architecture What It Is Data Center VirtualizationCloud Computing Terms Presence Protocols CollaborationCommunication-as-a-Service (CaaS) Leveraging Presence The Cloud as a Reach ExtenderInfrastructure-as-a-Service (IaaS) Presence Enabled The Cloud as a Communication EnablerMonitoring-as-a-Service (MaaS) The Future of Presence The Cloud as an Employee EnablerSoftware-as-a-Service (SaaS) The Interrelation of Identity, Presence, Service-Oriented Architecture (SOA)Platform-as-a-Service (PaaS) and Location in the Cloud Evolving from SOA to the CloudBenefits and Limitations of Cloud Computing Identity Management Capacity: Limited Performance

Page 137: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Benefits What It Is Availability: Communications Failure andLimitations Future of Identity in the Cloud Performance IssuesCloud Computing Case Studies Privacy and Its Relation to Cloud-Based Security: Newer Security Protocols ProvideHow Companies Are Using Cloud Information Systems More ProtectionComputing Personal Information What's Next in Cloud Computing Implementing Applications and Services in Privacy-Related Issues Using Industry and International Standardsthe Cloud Finding Your Private Information Independent ComponentsUsing Your Company's Services vs. the What It Is Message BaseCloud Provider Open Cloud Consortium Working Groups Location IndependenceA Cloud Service Provider Introduced Project Matsu Communication Requirements for CloudCloud Computing Risks and Issues Project Comet ImplementationProducts and Services Provided by Cloud HPC in the Cloud Public InternetComputing Companies The Open Cloud Testbed Private InternetOperational The Open Science Data Cloud Routing to the DatacenterEconomic Intercloud Testbed Switching within the Data CenterStaffing Reporting on an Open Cloud Consortium BandwidthShould Your Company Invest in Cloud Working Group Tools Used to Measure NetworkComputing? Distributed Management Task Force PerformanceWhat Should Not be Moved to the Cloud (DMTF) Using the Protocol Analyzer to MeasureVirtualization in Mainframe Architectures What It Is? Bandwidthand Operating Systems DMTK Working Groups Associated with Using Ping and Traceroute to MeasureLANs and the Cloud Cloud Computing Network PerformanceInternet and the Cloud Standards for Application Developers SecurityWeb Services, Browsers, and the Cloud Protocols SSLThin Client Scripting Languages VPNAdvances in Networking and Processing Content Formatting Standards and OverheadSpeeds that Led to Cloud Computing Languages Storage Options for Cloud ComputingNetworking Developments Standards for Security in the Cloud Storage CapacityIncreased Processing Speeds Confidentiality, Integrity, Availability Data Protection and PartitioningManaged Service Provider Model to Cloud Authentication, Authorization, NASComputing and Software as a Service Accountability SAN(SaaS) Regulations for Privacy CASSingle Purpose Architectures Migrate to Security Protocols RedundancyMultipurpose Architectures Establishing a Baseline for Cloud ReplicationData Center Virtualization Performance MultisitingCollaboration Best Practices for Selecting a Vendor Backup and RecoveryThe Cloud as a Reach Extender and Implementing Cloud-Based Server Software Environments thatThe Cloud as a Communication Enabler Applications Support Cloud ComputingThe Cloud as an Employee Enabler Choosing the Right Vendor Server CapacityService-Oriented Architecture (SOA) Implementing Cloud-Based Applications VirtualizationEvolving from SOA to the Cloud Citrix ClusteringCapacity: Limited Performance Windows Remote Desktop ExpansionAvailability: Communications Failure and Vnc Server FunctionsPerformance Issues Web Browsers ApplicationSecurity: Newer Security Protocols Provide Server Extensions WebMore Protection Thin Clients DatabaseWhat's Next in Cloud Computing Smart Phones, Pads, Pods, etc. Vendor Approaches to Cloud ComputingUsing Industry and International Standards Virtual Terminal Security Strengths and Role of Open Source Software in DataIndependent Components Weaknesses CenterMessage Base Strengths Cost Reduction vs. ReliabilityLocation Independence Weaknesses Open Source Server SoftwareCommunication Requirements for Cloud iPhone Open Source Database SoftwareImplementation Android Open Source Applications SoftwarePublic Internet BlackBerry Open Source System ManagementPrivate Internet Windows Mobile SoftwareRouting to the Datacenter Ubuntu Mobile Internet Device Open Source Load-Balancing Software Switching within the Data Center Mobile Platform Virtualization The HypervisorBandwidth Kernel-Based Virtual Machine Virtualization as the "Operating System"Tools Used to Measure Network VMware Mobile Virtualization Platform Virtualization with a Host OperatingPerformance Collaboration Applications for Mobile SystemUsing the Protocol Analyzer to Measure Platforms Virtualization Infections on VirtualizedBandwidth Text Messaging EnvironmentsUsing Ping and Traceroute to Measure iPhone Applications Type 1 Virtualized EnvironmentNetwork Performance BlackBerry Applications Type 2 Virtualized EnvironmentSecurity Droid Applications Virtualization EnvironmentsSSL Microsoft Virtualization

Page 138: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

VPN Sun xVM VirtualBoxOverhead line Linux/UNIX VirtualizationStorage Options for Cloud Computing Cloud Computing Defined VMware ProductsStorage Capacity Cloud Computing Architecture Data Center and Cloud InfrastructureData Protection and Partitioning Cloud Computing Terms ProductsNAS Communication-as-a-Service (CaaS) End-User and Desktop ProductsSAN Infrastructure-as-a-Service (IaaS) IBM VirtualizationCAS Monitoring-as-a-Service (MaaS) Using VMware to see a Virtualized ServerRedundancy Software-as-a-Service (SaaS) Environment Replication Platform-as-a-Service (PaaS) What It IsMultisiting Benefits and Limitations of Cloud Permissive FederationBackup and Recovery Computing Verified FederationServer Software Environments that Support Benefits Encrypted FederationCloud Computing Limitations Trusted FederationServer Capacity Cloud Computing Case Studies Using XMPP in the Federated EnvironmentVirtualization How Companies Are Using Cloud Presence in the CloudClustering Computing What It IsExpansion Implementing Applications and Services Presence ProtocolsServer Functions in the Cloud Leveraging PresenceApplication Using Your Company's Services vs. the Presence EnabledWeb Cloud Provider The Future of PresenceDatabase A Cloud Service Provider Introduced The Interrelation of Identity, Presence, andVendor Approaches to Cloud Computing Cloud Computing Risks and Issues Location in the CloudRole of Open Source Software in Data Products and Services Provided by Cloud Identity ManagementCenter Computing Companies What It IsCost Reduction vs. Reliability Operational Future of Identity in the CloudOpen Source Server Software Economic Privacy and Its Relation to Cloud-BasedOpen Source Database Software Staffing Information SystemsOpen Source Applications Software Should Your Company Invest in Cloud Personal InformationOpen Source System Management Software Computing? Privacy-Related IssuesOpen Source Load-Balancing Software What Should Not be Moved to the Cloud Finding Your Private Information The Hypervisor Virtualization in Mainframe Architectures What It IsVirtualization as the "Operating System" and Operating Systems Open Cloud Consortium Working GroupsVirtualization with a Host Operating System LANs and the Cloud Project MatsuVirtualization Infections on Virtualized Internet and the Cloud Project CometEnvironments Web Services, Browsers, and the Cloud HPC in the CloudType 1 Virtualized Environment Thin Client The Open Cloud TestbedType 2 Virtualized Environment Advances in Networking and Processing The Open Science Data CloudVirtualization Environments Speeds that Led to Cloud Computing Intercloud TestbedMicrosoft Virtualization Networking Developments Reporting on an Open Cloud ConsortiumSun xVM VirtualBox Increased Processing Speeds Working GroupLinux/UNIX Virtualization Managed Service Provider Model to Distributed Management Task ForceVMware Products Cloud Computing and Software as a (DMTF)Data Center and Cloud Infrastructure Service (SaaS) What It Is?Products Single Purpose Architectures Migrate to DMTK Working Groups Associated withEnd-User and Desktop Products Multipurpose Architectures Cloud ComputingIBM Virtualization Data Center Virtualization Standards for Application DevelopersUsing VMware to see a Virtualized Server Collaboration ProtocolsEnvironment The Cloud as a Reach Extender Scripting LanguagesWhat It Is The Cloud as a Communication Enabler Content Formatting Standards andPermissive Federation The Cloud as an Employee Enabler LanguagesVerified Federation Service-Oriented Architecture (SOA) Standards for Security in the CloudEncrypted Federation Evolving from SOA to the Cloud Confidentiality, Integrity, AvailabilityTrusted Federation Capacity: Limited Performance Authentication, Authorization,Using XMPP in the Federated Environment Availability: Communications Failure and AccountabilityPresence in the Cloud Performance Issues Regulations for PrivacyWhat It Is Security: Newer Security Protocols Security ProtocolsPresence Protocols Provide More Protection Establishing a Baseline for CloudLeveraging Presence What's Next in Cloud Computing PerformancePresence Enabled Using Industry and International Best Practices for Selecting a Vendor andThe Future of Presence Standards Implementing Cloud-Based ApplicationsThe Interrelation of Identity, Presence, and Independent Components Choosing the Right VendorLocation in the Cloud Message Base Implementing Cloud-Based Applications Identity Management Location Independence CitrixWhat It Is Communication Requirements for Cloud Windows Remote DesktopFuture of Identity in the Cloud Implementation Vnc

Page 139: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Privacy and Its Relation to Cloud-Based Public Internet Web BrowsersInformation Systems Private Internet Server ExtensionsPersonal Information Routing to the Datacenter Thin ClientsPrivacy-Related Issues Switching within the Data Center Smart Phones, Pads, Pods, etc.Finding Your Private Information Bandwidth Virtual Terminal Security Strengths andWhat It Is Tools Used to Measure Network WeaknessesOpen Cloud Consortium Working Groups Performance StrengthsProject Matsu Using the Protocol Analyzer to Measure Weaknesses Project Comet Bandwidth iPhoneHPC in the Cloud Using Ping and Traceroute to Measure AndroidThe Open Cloud Testbed Network Performance BlackBerryThe Open Science Data Cloud Security Windows MobileIntercloud Testbed SSL Ubuntu Mobile Internet DeviceReporting on an Open Cloud Consortium VPN Mobile Platform VirtualizationWorking Group Overhead Kernel-Based Virtual MachineDistributed Management Task Force Storage Options for Cloud Computing VMware Mobile Virtualization Platform(DMTF) Storage Capacity Collaboration Applications for MobileWhat It Is? Data Protection and Partitioning PlatformsDMTK Working Groups Associated with NAS Text MessagingCloud Computing SAN iPhone ApplicationsStandards for Application Developers CAS BlackBerry ApplicationsProtocols Redundancy Droid Applications Scripting Languages ReplicationContent Formatting Standards and Multisiting 10. Mobility and the CloudLanguages Backup and Recovery lineStandards for Security in the Cloud Server Software Environments that Mobile Operating Systems forConfidentiality, Integrity, Availability Support Cloud Computing SmartphonesAuthentication, Authorization, Accountability Server CapacityRegulations for Privacy VirtualizationSecurity Protocols Clustering lineEstablishing a Baseline for Cloud Expansion Cloud Computing DefinedPerformance Server Functions Cloud Computing ArchitectureBest Practices for Selecting a Vendor and Application Cloud Computing TermsImplementing Cloud-Based Applications Web Communication-as-a-Service (CaaS)Choosing the Right Vendor Database Infrastructure-as-a-Service (IaaS)Implementing Cloud-Based Applications Vendor Approaches to Cloud Computing Monitoring-as-a-Service (MaaS)Citrix Role of Open Source Software in Data Software-as-a-Service (SaaS)Windows Remote Desktop Center Platform-as-a-Service (PaaS)Vnc Cost Reduction vs. Reliability Benefits and Limitations of CloudWeb Browsers Open Source Server Software ComputingServer Extensions Open Source Database Software BenefitsThin Clients Open Source Applications Software LimitationsSmart Phones, Pads, Pods, etc. Open Source System Management Cloud Computing Case StudiesVirtual Terminal Security Strengths and Software How Companies Are Using CloudWeaknesses Open Source Load-Balancing Software ComputingStrengths The Hypervisor Implementing Applications and Services inWeaknesses Virtualization as the "Operating System" the CloudiPhone Virtualization with a Host Operating Using Your Company's Services vs. theAndroid System Cloud ProviderBlackBerry Virtualization Infections on Virtualized A Cloud Service Provider IntroducedWindows Mobile Environments Cloud Computing Risks and Issues Ubuntu Mobile Internet Device Type 1 Virtualized Environment Products and Services Provided by CloudMobile Platform Virtualization Type 2 Virtualized Environment Computing Companies Kernel-Based Virtual Machine Virtualization Environments OperationalVMware Mobile Virtualization Platform Microsoft Virtualization EconomicCollaboration Applications for Mobile Sun xVM VirtualBox StaffingPlatforms Linux/UNIX Virtualization Should Your Company Invest in CloudText Messaging VMware Products Computing?iPhone Applications Data Center and Cloud Infrastructure What Should Not be Moved to the Cloud BlackBerry Applications Products Virtualization in Mainframe ArchitecturesDroid Applications End-User and Desktop Products and Operating Systems

IBM Virtualization LANs and the Cloud5. Building Cloud Networks Using VMware to see a Virtualized Server Internet and the Cloudline Environment Web Services, Browsers, and the Cloud

Designing and Implementing a Data What It Is Thin ClientCenter-Based Cloud Permissive Federation Advances in Networking and Processing

Page 140: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Verified Federation Speeds that Led to Cloud ComputingEncrypted Federation Networking Developments

line Trusted Federation Increased Processing SpeedsCloud Computing Defined Using XMPP in the Federated Managed Service Provider Model to CloudCloud Computing Architecture Environment Computing and Software as a ServiceCloud Computing Terms Presence in the Cloud (SaaS)Communication-as-a-Service (CaaS) What It Is Single Purpose Architectures Migrate toInfrastructure-as-a-Service (IaaS) Presence Protocols Multipurpose ArchitecturesMonitoring-as-a-Service (MaaS) Leveraging Presence Data Center VirtualizationSoftware-as-a-Service (SaaS) Presence Enabled CollaborationPlatform-as-a-Service (PaaS) The Future of Presence The Cloud as a Reach ExtenderBenefits and Limitations of Cloud Computing The Interrelation of Identity, Presence, The Cloud as a Communication EnablerBenefits and Location in the Cloud The Cloud as an Employee EnablerLimitations Identity Management Service-Oriented Architecture (SOA)Cloud Computing Case Studies What It Is Evolving from SOA to the CloudHow Companies Are Using Cloud Future of Identity in the Cloud Capacity: Limited PerformanceComputing Privacy and Its Relation to Cloud-Based Availability: Communications Failure andImplementing Applications and Services in Information Systems Performance Issuesthe Cloud Personal Information Security: Newer Security Protocols ProvideUsing Your Company's Services vs. the Privacy-Related Issues More ProtectionCloud Provider Finding Your Private Information What's Next in Cloud Computing A Cloud Service Provider Introduced What It Is Using Industry and International StandardsCloud Computing Risks and Issues Open Cloud Consortium Working Groups Independent ComponentsProducts and Services Provided by Cloud Project Matsu Message BaseComputing Companies Project Comet Location IndependenceOperational HPC in the Cloud Communication Requirements for CloudEconomic The Open Cloud Testbed ImplementationStaffing The Open Science Data Cloud Public InternetShould Your Company Invest in Cloud Intercloud Testbed Private InternetComputing? Reporting on an Open Cloud Consortium Routing to the DatacenterWhat Should Not be Moved to the Cloud Working Group Switching within the Data CenterVirtualization in Mainframe Architectures Distributed Management Task Force Bandwidthand Operating Systems (DMTF) Tools Used to Measure NetworkLANs and the Cloud What It Is? PerformanceInternet and the Cloud DMTK Working Groups Associated with Using the Protocol Analyzer to MeasureWeb Services, Browsers, and the Cloud Cloud Computing BandwidthThin Client Standards for Application Developers Using Ping and Traceroute to MeasureAdvances in Networking and Processing Protocols Network PerformanceSpeeds that Led to Cloud Computing Scripting Languages SecurityNetworking Developments Content Formatting Standards and SSLIncreased Processing Speeds Languages VPNManaged Service Provider Model to Cloud Standards for Security in the Cloud OverheadComputing and Software as a Service Confidentiality, Integrity, Availability Storage Options for Cloud Computing(SaaS) Authentication, Authorization, Storage CapacitySingle Purpose Architectures Migrate to Accountability Data Protection and PartitioningMultipurpose Architectures Regulations for Privacy NASData Center Virtualization Security Protocols SANCollaboration Establishing a Baseline for Cloud CASThe Cloud as a Reach Extender Performance RedundancyThe Cloud as a Communication Enabler Best Practices for Selecting a Vendor ReplicationThe Cloud as an Employee Enabler and Implementing Cloud-Based MultisitingService-Oriented Architecture (SOA) Applications Backup and RecoveryEvolving from SOA to the Cloud Choosing the Right Vendor Server Software Environments thatCapacity: Limited Performance Implementing Cloud-Based Applications Support Cloud ComputingAvailability: Communications Failure and Citrix Server CapacityPerformance Issues Windows Remote Desktop VirtualizationSecurity: Newer Security Protocols Provide Vnc ClusteringMore Protection Web Browsers ExpansionWhat's Next in Cloud Computing Server Extensions Server FunctionsUsing Industry and International Standards Thin Clients ApplicationIndependent Components Smart Phones, Pads, Pods, etc. WebMessage Base Virtual Terminal Security Strengths and DatabaseLocation Independence Weaknesses Vendor Approaches to Cloud ComputingCommunication Requirements for Cloud Strengths Role of Open Source Software in DataImplementation Weaknesses CenterPublic Internet iPhone Cost Reduction vs. Reliability

Page 141: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Private Internet Android Open Source Server SoftwareRouting to the Datacenter BlackBerry Open Source Database SoftwareSwitching within the Data Center Windows Mobile Open Source Applications SoftwareBandwidth Ubuntu Mobile Internet Device Open Source System ManagementTools Used to Measure Network Mobile Platform Virtualization SoftwarePerformance Kernel-Based Virtual Machine Open Source Load-Balancing Software Using the Protocol Analyzer to Measure VMware Mobile Virtualization Platform The HypervisorBandwidth Collaboration Applications for Mobile Virtualization as the "Operating System"Using Ping and Traceroute to Measure Platforms Virtualization with a Host OperatingNetwork Performance Text Messaging SystemSecurity iPhone Applications Virtualization Infections on VirtualizedSSL BlackBerry Applications EnvironmentsVPN Droid Applications Type 1 Virtualized EnvironmentOverhead Type 2 Virtualized EnvironmentStorage Options for Cloud Computing Virtualization EnvironmentsStorage Capacity line Microsoft VirtualizationData Protection and Partitioning Cloud Computing Defined Sun xVM VirtualBoxNAS Cloud Computing Architecture Linux/UNIX VirtualizationSAN Cloud Computing Terms VMware ProductsCAS Communication-as-a-Service (CaaS) Data Center and Cloud InfrastructureRedundancy Infrastructure-as-a-Service (IaaS) ProductsReplication Monitoring-as-a-Service (MaaS) End-User and Desktop ProductsMultisiting Software-as-a-Service (SaaS) IBM VirtualizationBackup and Recovery Platform-as-a-Service (PaaS) Using VMware to see a Virtualized ServerServer Software Environments that Support Benefits and Limitations of Cloud Environment Cloud Computing Computing What It IsServer Capacity Benefits Permissive FederationVirtualization Limitations Verified FederationClustering Cloud Computing Case Studies Encrypted FederationExpansion How Companies Are Using Cloud Trusted FederationServer Functions Computing Using XMPP in the Federated EnvironmentApplication Implementing Applications and Services Presence in the CloudWeb in the Cloud What It IsDatabase Using Your Company's Services vs. the Presence ProtocolsVendor Approaches to Cloud Computing Cloud Provider Leveraging PresenceRole of Open Source Software in Data A Cloud Service Provider Introduced Presence EnabledCenter Cloud Computing Risks and Issues The Future of PresenceCost Reduction vs. Reliability Products and Services Provided by Cloud The Interrelation of Identity, Presence, andOpen Source Server Software Computing Companies Location in the CloudOpen Source Database Software Operational Identity ManagementOpen Source Applications Software Economic What It IsOpen Source System Management Software Staffing Future of Identity in the CloudOpen Source Load-Balancing Software Should Your Company Invest in Cloud Privacy and Its Relation to Cloud-BasedThe Hypervisor Computing? Information SystemsVirtualization as the "Operating System" What Should Not be Moved to the Cloud Personal InformationVirtualization with a Host Operating System Virtualization in Mainframe Architectures Privacy-Related IssuesVirtualization Infections on Virtualized and Operating Systems Finding Your Private Information Environments LANs and the Cloud What It IsType 1 Virtualized Environment Internet and the Cloud Open Cloud Consortium Working GroupsType 2 Virtualized Environment Web Services, Browsers, and the Cloud Project MatsuVirtualization Environments Thin Client Project CometMicrosoft Virtualization Advances in Networking and Processing HPC in the CloudSun xVM VirtualBox Speeds that Led to Cloud Computing The Open Cloud TestbedLinux/UNIX Virtualization Networking Developments The Open Science Data CloudVMware Products Increased Processing Speeds Intercloud TestbedData Center and Cloud Infrastructure Managed Service Provider Model to Reporting on an Open Cloud ConsortiumProducts Cloud Computing and Software as a Working GroupEnd-User and Desktop Products Service (SaaS) Distributed Management Task ForceIBM Virtualization Single Purpose Architectures Migrate to (DMTF)Using VMware to see a Virtualized Server Multipurpose Architectures What It Is?Environment Data Center Virtualization DMTK Working Groups Associated withWhat It Is Collaboration Cloud ComputingPermissive Federation The Cloud as a Reach Extender Standards for Application DevelopersVerified Federation The Cloud as a Communication Enabler ProtocolsEncrypted Federation The Cloud as an Employee Enabler Scripting LanguagesTrusted Federation Service-Oriented Architecture (SOA) Content Formatting Standards and

Page 142: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using XMPP in the Federated Environment Evolving from SOA to the Cloud LanguagesPresence in the Cloud Capacity: Limited Performance Standards for Security in the CloudWhat It Is Availability: Communications Failure and Confidentiality, Integrity, AvailabilityPresence Protocols Performance Issues Authentication, Authorization,Leveraging Presence Security: Newer Security Protocols AccountabilityPresence Enabled Provide More Protection Regulations for PrivacyThe Future of Presence What's Next in Cloud Computing Security ProtocolsThe Interrelation of Identity, Presence, and Using Industry and International Establishing a Baseline for CloudLocation in the Cloud Standards PerformanceIdentity Management Independent Components Best Practices for Selecting a Vendor andWhat It Is Message Base Implementing Cloud-Based ApplicationsFuture of Identity in the Cloud Location Independence Choosing the Right VendorPrivacy and Its Relation to Cloud-Based Communication Requirements for Cloud Implementing Cloud-Based Applications Information Systems Implementation CitrixPersonal Information Public Internet Windows Remote DesktopPrivacy-Related Issues Private Internet VncFinding Your Private Information Routing to the Datacenter Web BrowsersWhat It Is Switching within the Data Center Server ExtensionsOpen Cloud Consortium Working Groups Bandwidth Thin ClientsProject Matsu Tools Used to Measure Network Smart Phones, Pads, Pods, etc.Project Comet Performance Virtual Terminal Security Strengths andHPC in the Cloud Using the Protocol Analyzer to Measure WeaknessesThe Open Cloud Testbed Bandwidth StrengthsThe Open Science Data Cloud Using Ping and Traceroute to Measure Weaknesses Intercloud Testbed Network Performance iPhoneReporting on an Open Cloud Consortium Security AndroidWorking Group SSL BlackBerryDistributed Management Task Force VPN Windows Mobile(DMTF) Overhead Ubuntu Mobile Internet DeviceWhat It Is? Storage Options for Cloud Computing Mobile Platform VirtualizationDMTK Working Groups Associated with Storage Capacity Kernel-Based Virtual MachineCloud Computing Data Protection and Partitioning VMware Mobile Virtualization PlatformStandards for Application Developers NAS Collaboration Applications for MobileProtocols SAN PlatformsScripting Languages CAS Text MessagingContent Formatting Standards and Redundancy iPhone ApplicationsLanguages Replication BlackBerry ApplicationsStandards for Security in the Cloud Multisiting Droid Applications Confidentiality, Integrity, Availability Backup and RecoveryAuthentication, Authorization, Accountability Server Software Environments thatRegulations for Privacy Support Cloud Computing lineSecurity Protocols Server Capacity Cloud Computing DefinedEstablishing a Baseline for Cloud Virtualization Cloud Computing ArchitecturePerformance Clustering Cloud Computing TermsBest Practices for Selecting a Vendor and Expansion Communication-as-a-Service (CaaS)Implementing Cloud-Based Applications Server Functions Infrastructure-as-a-Service (IaaS)Choosing the Right Vendor Application Monitoring-as-a-Service (MaaS)Implementing Cloud-Based Applications Web Software-as-a-Service (SaaS)Citrix Database Platform-as-a-Service (PaaS)Windows Remote Desktop Vendor Approaches to Cloud Computing Benefits and Limitations of CloudVnc Role of Open Source Software in Data ComputingWeb Browsers Center BenefitsServer Extensions Cost Reduction vs. Reliability LimitationsThin Clients Open Source Server Software Cloud Computing Case StudiesSmart Phones, Pads, Pods, etc. Open Source Database Software How Companies Are Using CloudVirtual Terminal Security Strengths and Open Source Applications Software ComputingWeaknesses Open Source System Management Implementing Applications and Services inStrengths Software the CloudWeaknesses Open Source Load-Balancing Software Using Your Company's Services vs. theiPhone The Hypervisor Cloud ProviderAndroid Virtualization as the "Operating System" A Cloud Service Provider IntroducedBlackBerry Virtualization with a Host Operating Cloud Computing Risks and Issues Windows Mobile System Products and Services Provided by CloudUbuntu Mobile Internet Device Virtualization Infections on Virtualized Computing Companies Mobile Platform Virtualization Environments OperationalKernel-Based Virtual Machine Type 1 Virtualized Environment Economic

Page 143: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

VMware Mobile Virtualization Platform Type 2 Virtualized Environment StaffingCollaboration Applications for Mobile Virtualization Environments Should Your Company Invest in CloudPlatforms Microsoft Virtualization Computing?Text Messaging Sun xVM VirtualBox What Should Not be Moved to the Cloud iPhone Applications Linux/UNIX Virtualization Virtualization in Mainframe ArchitecturesBlackBerry Applications VMware Products and Operating SystemsDroid Applications Data Center and Cloud Infrastructure LANs and the Cloud

Products Internet and the CloudEnd-User and Desktop Products Web Services, Browsers, and the Cloud

line IBM Virtualization Thin ClientCloud Computing Defined Using VMware to see a Virtualized Server Advances in Networking and ProcessingCloud Computing Architecture Environment Speeds that Led to Cloud ComputingCloud Computing Terms What It Is Networking DevelopmentsCommunication-as-a-Service (CaaS) Permissive Federation Increased Processing SpeedsInfrastructure-as-a-Service (IaaS) Verified Federation Managed Service Provider Model to CloudMonitoring-as-a-Service (MaaS) Encrypted Federation Computing and Software as a ServiceSoftware-as-a-Service (SaaS) Trusted Federation (SaaS)Platform-as-a-Service (PaaS) Using XMPP in the Federated Single Purpose Architectures Migrate toBenefits and Limitations of Cloud Computing Environment Multipurpose ArchitecturesBenefits Presence in the Cloud Data Center VirtualizationLimitations What It Is CollaborationCloud Computing Case Studies Presence Protocols The Cloud as a Reach ExtenderHow Companies Are Using Cloud Leveraging Presence The Cloud as a Communication EnablerComputing Presence Enabled The Cloud as an Employee EnablerImplementing Applications and Services in The Future of Presence Service-Oriented Architecture (SOA)the Cloud The Interrelation of Identity, Presence, Evolving from SOA to the CloudUsing Your Company's Services vs. the and Location in the Cloud Capacity: Limited PerformanceCloud Provider Identity Management Availability: Communications Failure andA Cloud Service Provider Introduced What It Is Performance IssuesCloud Computing Risks and Issues Future of Identity in the Cloud Security: Newer Security Protocols ProvideProducts and Services Provided by Cloud Privacy and Its Relation to Cloud-Based More ProtectionComputing Companies Information Systems What's Next in Cloud Computing Operational Personal Information Using Industry and International StandardsEconomic Privacy-Related Issues Independent ComponentsStaffing Finding Your Private Information Message BaseShould Your Company Invest in Cloud What It Is Location IndependenceComputing? Open Cloud Consortium Working Groups Communication Requirements for CloudWhat Should Not be Moved to the Cloud Project Matsu ImplementationVirtualization in Mainframe Architectures Project Comet Public Internetand Operating Systems HPC in the Cloud Private InternetLANs and the Cloud The Open Cloud Testbed Routing to the DatacenterInternet and the Cloud The Open Science Data Cloud Switching within the Data CenterWeb Services, Browsers, and the Cloud Intercloud Testbed BandwidthThin Client Reporting on an Open Cloud Consortium Tools Used to Measure NetworkAdvances in Networking and Processing Working Group PerformanceSpeeds that Led to Cloud Computing Distributed Management Task Force Using the Protocol Analyzer to MeasureNetworking Developments (DMTF) BandwidthIncreased Processing Speeds What It Is? Using Ping and Traceroute to MeasureManaged Service Provider Model to Cloud DMTK Working Groups Associated with Network PerformanceComputing and Software as a Service Cloud Computing Security(SaaS) Standards for Application Developers SSLSingle Purpose Architectures Migrate to Protocols VPNMultipurpose Architectures Scripting Languages OverheadData Center Virtualization Content Formatting Standards and Storage Options for Cloud ComputingCollaboration Languages Storage CapacityThe Cloud as a Reach Extender Standards for Security in the Cloud Data Protection and PartitioningThe Cloud as a Communication Enabler Confidentiality, Integrity, Availability NASThe Cloud as an Employee Enabler Authentication, Authorization, SANService-Oriented Architecture (SOA) Accountability CASEvolving from SOA to the Cloud Regulations for Privacy RedundancyCapacity: Limited Performance Security Protocols ReplicationAvailability: Communications Failure and Establishing a Baseline for Cloud MultisitingPerformance Issues Performance Backup and RecoverySecurity: Newer Security Protocols Provide Best Practices for Selecting a Vendor Server Software Environments thatMore Protection and Implementing Cloud-Based Support Cloud ComputingWhat's Next in Cloud Computing Applications Server Capacity

Page 144: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using Industry and International Standards Choosing the Right Vendor VirtualizationIndependent Components Implementing Cloud-Based Applications ClusteringMessage Base Citrix ExpansionLocation Independence Windows Remote Desktop Server FunctionsCommunication Requirements for Cloud Vnc ApplicationImplementation Web Browsers WebPublic Internet Server Extensions DatabasePrivate Internet Thin Clients Vendor Approaches to Cloud ComputingRouting to the Datacenter Smart Phones, Pads, Pods, etc. Role of Open Source Software in DataSwitching within the Data Center Virtual Terminal Security Strengths and CenterBandwidth Weaknesses Cost Reduction vs. ReliabilityTools Used to Measure Network Strengths Open Source Server SoftwarePerformance Weaknesses Open Source Database SoftwareUsing the Protocol Analyzer to Measure iPhone Open Source Applications SoftwareBandwidth Android Open Source System ManagementUsing Ping and Traceroute to Measure BlackBerry SoftwareNetwork Performance Windows Mobile Open Source Load-Balancing Software Security Ubuntu Mobile Internet Device The HypervisorSSL Mobile Platform Virtualization Virtualization as the "Operating System"VPN Kernel-Based Virtual Machine Virtualization with a Host OperatingOverhead VMware Mobile Virtualization Platform SystemStorage Options for Cloud Computing Collaboration Applications for Mobile Virtualization Infections on VirtualizedStorage Capacity Platforms EnvironmentsData Protection and Partitioning Text Messaging Type 1 Virtualized EnvironmentNAS iPhone Applications Type 2 Virtualized EnvironmentSAN BlackBerry Applications Virtualization EnvironmentsCAS Droid Applications Microsoft VirtualizationRedundancy Sun xVM VirtualBoxReplication Linux/UNIX VirtualizationMultisiting line VMware ProductsBackup and Recovery Cloud Computing Defined Data Center and Cloud InfrastructureServer Software Environments that Support Cloud Computing Architecture ProductsCloud Computing Cloud Computing Terms End-User and Desktop ProductsServer Capacity Communication-as-a-Service (CaaS) IBM VirtualizationVirtualization Infrastructure-as-a-Service (IaaS) Using VMware to see a Virtualized ServerClustering Monitoring-as-a-Service (MaaS) Environment Expansion Software-as-a-Service (SaaS) What It IsServer Functions Platform-as-a-Service (PaaS) Permissive FederationApplication Benefits and Limitations of Cloud Verified FederationWeb Computing Encrypted FederationDatabase Benefits Trusted FederationVendor Approaches to Cloud Computing Limitations Using XMPP in the Federated EnvironmentRole of Open Source Software in Data Cloud Computing Case Studies Presence in the CloudCenter How Companies Are Using Cloud What It IsCost Reduction vs. Reliability Computing Presence ProtocolsOpen Source Server Software Implementing Applications and Services Leveraging PresenceOpen Source Database Software in the Cloud Presence EnabledOpen Source Applications Software Using Your Company's Services vs. the The Future of PresenceOpen Source System Management Software Cloud Provider The Interrelation of Identity, Presence, andOpen Source Load-Balancing Software A Cloud Service Provider Introduced Location in the CloudThe Hypervisor Cloud Computing Risks and Issues Identity ManagementVirtualization as the "Operating System" Products and Services Provided by Cloud What It IsVirtualization with a Host Operating System Computing Companies Future of Identity in the CloudVirtualization Infections on Virtualized Operational Privacy and Its Relation to Cloud-BasedEnvironments Economic Information SystemsType 1 Virtualized Environment Staffing Personal InformationType 2 Virtualized Environment Should Your Company Invest in Cloud Privacy-Related IssuesVirtualization Environments Computing? Finding Your Private Information Microsoft Virtualization What Should Not be Moved to the Cloud What It IsSun xVM VirtualBox Virtualization in Mainframe Architectures Open Cloud Consortium Working GroupsLinux/UNIX Virtualization and Operating Systems Project MatsuVMware Products LANs and the Cloud Project CometData Center and Cloud Infrastructure Internet and the Cloud HPC in the CloudProducts Web Services, Browsers, and the Cloud The Open Cloud TestbedEnd-User and Desktop Products Thin Client The Open Science Data CloudIBM Virtualization Advances in Networking and Processing Intercloud Testbed

Page 145: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Using VMware to see a Virtualized Server Speeds that Led to Cloud Computing Reporting on an Open Cloud ConsortiumEnvironment Networking Developments Working GroupWhat It Is Increased Processing Speeds Distributed Management Task ForcePermissive Federation Managed Service Provider Model to (DMTF)Verified Federation Cloud Computing and Software as a What It Is?Encrypted Federation Service (SaaS) DMTK Working Groups Associated withTrusted Federation Single Purpose Architectures Migrate to Cloud ComputingUsing XMPP in the Federated Environment Multipurpose Architectures Standards for Application DevelopersPresence in the Cloud Data Center Virtualization ProtocolsWhat It Is Collaboration Scripting LanguagesPresence Protocols The Cloud as a Reach Extender Content Formatting Standards andLeveraging Presence The Cloud as a Communication Enabler LanguagesPresence Enabled The Cloud as an Employee Enabler Standards for Security in the CloudThe Future of Presence Service-Oriented Architecture (SOA) Confidentiality, Integrity, AvailabilityThe Interrelation of Identity, Presence, and Evolving from SOA to the Cloud Authentication, Authorization,Location in the Cloud Capacity: Limited Performance AccountabilityIdentity Management Availability: Communications Failure and Regulations for PrivacyWhat It Is Performance Issues Security ProtocolsFuture of Identity in the Cloud Security: Newer Security Protocols Establishing a Baseline for CloudPrivacy and Its Relation to Cloud-Based Provide More Protection PerformanceInformation Systems What's Next in Cloud Computing Best Practices for Selecting a Vendor andPersonal Information Using Industry and International Implementing Cloud-Based ApplicationsPrivacy-Related Issues Standards Choosing the Right VendorFinding Your Private Information Independent Components Implementing Cloud-Based Applications What It Is Message Base CitrixOpen Cloud Consortium Working Groups Location Independence Windows Remote DesktopProject Matsu Communication Requirements for Cloud VncProject Comet Implementation Web BrowsersHPC in the Cloud Public Internet Server ExtensionsThe Open Cloud Testbed Private Internet Thin ClientsThe Open Science Data Cloud Routing to the Datacenter Smart Phones, Pads, Pods, etc.Intercloud Testbed Switching within the Data Center Virtual Terminal Security Strengths andReporting on an Open Cloud Consortium Bandwidth WeaknessesWorking Group Tools Used to Measure Network StrengthsDistributed Management Task Force Performance Weaknesses (DMTF) Using the Protocol Analyzer to Measure iPhoneWhat It Is? Bandwidth AndroidDMTK Working Groups Associated with Using Ping and Traceroute to Measure BlackBerryCloud Computing Network Performance Windows MobileStandards for Application Developers Security Ubuntu Mobile Internet DeviceProtocols SSL Mobile Platform VirtualizationScripting Languages VPN Kernel-Based Virtual MachineContent Formatting Standards and Overhead VMware Mobile Virtualization PlatformLanguages Storage Options for Cloud Computing Collaboration Applications for MobileStandards for Security in the Cloud Storage Capacity PlatformsConfidentiality, Integrity, Availability Data Protection and Partitioning Text MessagingAuthentication, Authorization, Accountability NAS iPhone ApplicationsRegulations for Privacy SAN BlackBerry ApplicationsSecurity Protocols CAS Droid Applications Establishing a Baseline for Cloud RedundancyPerformance ReplicationBest Practices for Selecting a Vendor and Multisiting lineImplementing Cloud-Based Applications Backup and Recovery Cloud Computing DefinedChoosing the Right Vendor Server Software Environments that Cloud Computing ArchitectureImplementing Cloud-Based Applications Support Cloud Computing Cloud Computing TermsCitrix Server Capacity Communication-as-a-Service (CaaS)Windows Remote Desktop Virtualization Infrastructure-as-a-Service (IaaS)Vnc Clustering Monitoring-as-a-Service (MaaS)Web Browsers Expansion Software-as-a-Service (SaaS)Server Extensions Server Functions Platform-as-a-Service (PaaS)Thin Clients Application Benefits and Limitations of CloudSmart Phones, Pads, Pods, etc. Web ComputingVirtual Terminal Security Strengths and Database BenefitsWeaknesses Vendor Approaches to Cloud Computing LimitationsStrengths Role of Open Source Software in Data Cloud Computing Case StudiesWeaknesses Center How Companies Are Using Cloud

Page 146: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

iPhone Cost Reduction vs. Reliability ComputingAndroid Open Source Server Software Implementing Applications and Services inBlackBerry Open Source Database Software the CloudWindows Mobile Open Source Applications Software Using Your Company's Services vs. theUbuntu Mobile Internet Device Open Source System Management Cloud ProviderMobile Platform Virtualization Software A Cloud Service Provider IntroducedKernel-Based Virtual Machine Open Source Load-Balancing Software Cloud Computing Risks and Issues VMware Mobile Virtualization Platform The Hypervisor Products and Services Provided by CloudCollaboration Applications for Mobile Virtualization as the "Operating System" Computing Companies Platforms Virtualization with a Host Operating OperationalText Messaging System EconomiciPhone Applications Virtualization Infections on Virtualized StaffingBlackBerry Applications Environments Should Your Company Invest in CloudDroid Applications Type 1 Virtualized Environment Computing?

Type 2 Virtualized Environment What Should Not be Moved to the Cloud Virtualization Environments Virtualization in Mainframe Architectures

line Microsoft Virtualization and Operating SystemsCloud Computing Defined Sun xVM VirtualBox LANs and the CloudCloud Computing Architecture Linux/UNIX Virtualization Internet and the CloudCloud Computing Terms VMware Products Web Services, Browsers, and the CloudCommunication-as-a-Service (CaaS) Data Center and Cloud Infrastructure Thin ClientInfrastructure-as-a-Service (IaaS) Products Advances in Networking and ProcessingMonitoring-as-a-Service (MaaS) End-User and Desktop Products Speeds that Led to Cloud ComputingSoftware-as-a-Service (SaaS) IBM Virtualization Networking DevelopmentsPlatform-as-a-Service (PaaS) Using VMware to see a Virtualized Server Increased Processing SpeedsBenefits and Limitations of Cloud Computing Environment Managed Service Provider Model to CloudBenefits What It Is Computing and Software as a ServiceLimitations Permissive Federation (SaaS)Cloud Computing Case Studies Verified Federation Single Purpose Architectures Migrate toHow Companies Are Using Cloud Encrypted Federation Multipurpose ArchitecturesComputing Trusted Federation Data Center VirtualizationImplementing Applications and Services in Using XMPP in the Federated Collaborationthe Cloud Environment The Cloud as a Reach ExtenderUsing Your Company's Services vs. the Presence in the Cloud The Cloud as a Communication EnablerCloud Provider What It Is The Cloud as an Employee EnablerA Cloud Service Provider Introduced Presence Protocols Service-Oriented Architecture (SOA)Cloud Computing Risks and Issues Leveraging Presence Evolving from SOA to the CloudProducts and Services Provided by Cloud Presence Enabled Capacity: Limited PerformanceComputing Companies The Future of Presence Availability: Communications Failure andOperational The Interrelation of Identity, Presence, Performance IssuesEconomic and Location in the Cloud Security: Newer Security Protocols ProvideStaffing Identity Management More ProtectionShould Your Company Invest in Cloud What It Is What's Next in Cloud Computing Computing? Future of Identity in the Cloud Using Industry and International StandardsWhat Should Not be Moved to the Cloud Privacy and Its Relation to Cloud-Based Independent ComponentsVirtualization in Mainframe Architectures Information Systems Message Baseand Operating Systems Personal Information Location IndependenceLANs and the Cloud Privacy-Related Issues Communication Requirements for CloudInternet and the Cloud Finding Your Private Information ImplementationWeb Services, Browsers, and the Cloud What It Is Public InternetThin Client Open Cloud Consortium Working Groups Private InternetAdvances in Networking and Processing Project Matsu Routing to the DatacenterSpeeds that Led to Cloud Computing Project Comet Switching within the Data CenterNetworking Developments HPC in the Cloud BandwidthIncreased Processing Speeds The Open Cloud Testbed Tools Used to Measure NetworkManaged Service Provider Model to Cloud The Open Science Data Cloud PerformanceComputing and Software as a Service Intercloud Testbed Using the Protocol Analyzer to Measure(SaaS) Reporting on an Open Cloud Consortium BandwidthSingle Purpose Architectures Migrate to Working Group Using Ping and Traceroute to MeasureMultipurpose Architectures Distributed Management Task Force Network PerformanceData Center Virtualization (DMTF) SecurityCollaboration What It Is? SSLThe Cloud as a Reach Extender DMTK Working Groups Associated with VPNThe Cloud as a Communication Enabler Cloud Computing OverheadThe Cloud as an Employee Enabler Standards for Application Developers Storage Options for Cloud ComputingService-Oriented Architecture (SOA) Protocols Storage Capacity

Page 147: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Evolving from SOA to the Cloud Scripting Languages Data Protection and PartitioningCapacity: Limited Performance Content Formatting Standards and NASAvailability: Communications Failure and Languages SANPerformance Issues Standards for Security in the Cloud CASSecurity: Newer Security Protocols Provide Confidentiality, Integrity, Availability RedundancyMore Protection Authentication, Authorization, ReplicationWhat's Next in Cloud Computing Accountability MultisitingUsing Industry and International Standards Regulations for Privacy Backup and RecoveryIndependent Components Security Protocols Server Software Environments thatMessage Base Establishing a Baseline for Cloud Support Cloud ComputingLocation Independence Performance Server CapacityCommunication Requirements for Cloud Best Practices for Selecting a Vendor VirtualizationImplementation and Implementing Cloud-Based ClusteringPublic Internet Applications ExpansionPrivate Internet Choosing the Right Vendor Server FunctionsRouting to the Datacenter Implementing Cloud-Based Applications ApplicationSwitching within the Data Center Citrix WebBandwidth Windows Remote Desktop DatabaseTools Used to Measure Network Vnc Vendor Approaches to Cloud ComputingPerformance Web Browsers Role of Open Source Software in DataUsing the Protocol Analyzer to Measure Server Extensions CenterBandwidth Thin Clients Cost Reduction vs. ReliabilityUsing Ping and Traceroute to Measure Smart Phones, Pads, Pods, etc. Open Source Server SoftwareNetwork Performance Virtual Terminal Security Strengths and Open Source Database SoftwareSecurity Weaknesses Open Source Applications SoftwareSSL Strengths Open Source System ManagementVPN Weaknesses SoftwareOverhead iPhone Open Source Load-Balancing Software Storage Options for Cloud Computing Android The HypervisorStorage Capacity BlackBerry Virtualization as the "Operating System"Data Protection and Partitioning Windows Mobile Virtualization with a Host OperatingNAS Ubuntu Mobile Internet Device SystemSAN Mobile Platform Virtualization Virtualization Infections on VirtualizedCAS Kernel-Based Virtual Machine EnvironmentsRedundancy VMware Mobile Virtualization Platform Type 1 Virtualized EnvironmentReplication Collaboration Applications for Mobile Type 2 Virtualized EnvironmentMultisiting Platforms Virtualization EnvironmentsBackup and Recovery Text Messaging Microsoft VirtualizationServer Software Environments that Support iPhone Applications Sun xVM VirtualBoxCloud Computing BlackBerry Applications Linux/UNIX VirtualizationServer Capacity Droid Applications VMware ProductsVirtualization Data Center and Cloud InfrastructureClustering ProductsExpansion line End-User and Desktop ProductsServer Functions Cloud Computing Defined IBM VirtualizationApplication Cloud Computing Architecture Using VMware to see a Virtualized ServerWeb Cloud Computing Terms Environment Database Communication-as-a-Service (CaaS) What It IsVendor Approaches to Cloud Computing Infrastructure-as-a-Service (IaaS) Permissive FederationRole of Open Source Software in Data Monitoring-as-a-Service (MaaS) Verified FederationCenter Software-as-a-Service (SaaS) Encrypted FederationCost Reduction vs. Reliability Platform-as-a-Service (PaaS) Trusted FederationOpen Source Server Software Benefits and Limitations of Cloud Using XMPP in the Federated EnvironmentOpen Source Database Software Computing Presence in the CloudOpen Source Applications Software Benefits What It IsOpen Source System Management Software Limitations Presence ProtocolsOpen Source Load-Balancing Software Cloud Computing Case Studies Leveraging PresenceThe Hypervisor How Companies Are Using Cloud Presence EnabledVirtualization as the "Operating System" Computing The Future of PresenceVirtualization with a Host Operating System Implementing Applications and Services The Interrelation of Identity, Presence, andVirtualization Infections on Virtualized in the Cloud Location in the CloudEnvironments Using Your Company's Services vs. the Identity ManagementType 1 Virtualized Environment Cloud Provider What It IsType 2 Virtualized Environment A Cloud Service Provider Introduced Future of Identity in the CloudVirtualization Environments Cloud Computing Risks and Issues Privacy and Its Relation to Cloud-BasedMicrosoft Virtualization Products and Services Provided by Cloud Information Systems

Page 148: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Sun xVM VirtualBox Computing Companies Personal InformationLinux/UNIX Virtualization Operational Privacy-Related IssuesVMware Products Economic Finding Your Private Information Data Center and Cloud Infrastructure Staffing What It IsProducts Should Your Company Invest in Cloud Open Cloud Consortium Working GroupsEnd-User and Desktop Products Computing? Project MatsuIBM Virtualization What Should Not be Moved to the Cloud Project CometUsing VMware to see a Virtualized Server Virtualization in Mainframe Architectures HPC in the CloudEnvironment and Operating Systems The Open Cloud TestbedWhat It Is LANs and the Cloud The Open Science Data CloudPermissive Federation Internet and the Cloud Intercloud TestbedVerified Federation Web Services, Browsers, and the Cloud Reporting on an Open Cloud ConsortiumEncrypted Federation Thin Client Working GroupTrusted Federation Advances in Networking and Processing Distributed Management Task ForceUsing XMPP in the Federated Environment Speeds that Led to Cloud Computing (DMTF)Presence in the Cloud Networking Developments What It Is?What It Is Increased Processing Speeds DMTK Working Groups Associated withPresence Protocols Managed Service Provider Model to Cloud ComputingLeveraging Presence Cloud Computing and Software as a Standards for Application DevelopersPresence Enabled Service (SaaS) ProtocolsThe Future of Presence Single Purpose Architectures Migrate to Scripting LanguagesThe Interrelation of Identity, Presence, and Multipurpose Architectures Content Formatting Standards andLocation in the Cloud Data Center Virtualization LanguagesIdentity Management Collaboration Standards for Security in the CloudWhat It Is The Cloud as a Reach Extender Confidentiality, Integrity, AvailabilityFuture of Identity in the Cloud The Cloud as a Communication Enabler Authentication, Authorization,Privacy and Its Relation to Cloud-Based The Cloud as an Employee Enabler AccountabilityInformation Systems Service-Oriented Architecture (SOA) Regulations for PrivacyPersonal Information Evolving from SOA to the Cloud Security ProtocolsPrivacy-Related Issues Capacity: Limited Performance Establishing a Baseline for CloudFinding Your Private Information Availability: Communications Failure and PerformanceWhat It Is Performance Issues Best Practices for Selecting a Vendor andOpen Cloud Consortium Working Groups Security: Newer Security Protocols Implementing Cloud-Based ApplicationsProject Matsu Provide More Protection Choosing the Right VendorProject Comet What's Next in Cloud Computing Implementing Cloud-Based Applications HPC in the Cloud Using Industry and International CitrixThe Open Cloud Testbed Standards Windows Remote DesktopThe Open Science Data Cloud Independent Components VncIntercloud Testbed Message Base Web BrowsersReporting on an Open Cloud Consortium Location Independence Server ExtensionsWorking Group Communication Requirements for Cloud Thin ClientsDistributed Management Task Force Implementation Smart Phones, Pads, Pods, etc.(DMTF) Public Internet Virtual Terminal Security Strengths andWhat It Is? Private Internet WeaknessesDMTK Working Groups Associated with Routing to the Datacenter StrengthsCloud Computing Switching within the Data Center Weaknesses Standards for Application Developers Bandwidth iPhoneProtocols Tools Used to Measure Network AndroidScripting Languages Performance BlackBerryContent Formatting Standards and Using the Protocol Analyzer to Measure Windows MobileLanguages Bandwidth Ubuntu Mobile Internet DeviceStandards for Security in the Cloud Using Ping and Traceroute to Measure Mobile Platform VirtualizationConfidentiality, Integrity, Availability Network Performance Kernel-Based Virtual MachineAuthentication, Authorization, Accountability Security VMware Mobile Virtualization PlatformRegulations for Privacy SSL Collaboration Applications for MobileSecurity Protocols VPN PlatformsEstablishing a Baseline for Cloud Overhead Text MessagingPerformance Storage Options for Cloud Computing iPhone ApplicationsBest Practices for Selecting a Vendor and Storage Capacity BlackBerry ApplicationsImplementing Cloud-Based Applications Data Protection and Partitioning Droid Applications Choosing the Right Vendor NASImplementing Cloud-Based Applications SANCitrix CAS lineWindows Remote Desktop Redundancy Cloud Computing DefinedVnc Replication Cloud Computing ArchitectureWeb Browsers Multisiting Cloud Computing Terms

Page 149: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Extensions Backup and Recovery Communication-as-a-Service (CaaS)Thin Clients Server Software Environments that Infrastructure-as-a-Service (IaaS)Smart Phones, Pads, Pods, etc. Support Cloud Computing Monitoring-as-a-Service (MaaS)Virtual Terminal Security Strengths and Server Capacity Software-as-a-Service (SaaS)Weaknesses Virtualization Platform-as-a-Service (PaaS)Strengths Clustering Benefits and Limitations of CloudWeaknesses Expansion ComputingiPhone Server Functions BenefitsAndroid Application LimitationsBlackBerry Web Cloud Computing Case StudiesWindows Mobile Database How Companies Are Using CloudUbuntu Mobile Internet Device Vendor Approaches to Cloud Computing ComputingMobile Platform Virtualization Role of Open Source Software in Data Implementing Applications and Services inKernel-Based Virtual Machine Center the CloudVMware Mobile Virtualization Platform Cost Reduction vs. Reliability Using Your Company's Services vs. theCollaboration Applications for Mobile Open Source Server Software Cloud ProviderPlatforms Open Source Database Software A Cloud Service Provider IntroducedText Messaging Open Source Applications Software Cloud Computing Risks and Issues iPhone Applications Open Source System Management Products and Services Provided by CloudBlackBerry Applications Software Computing Companies Droid Applications Open Source Load-Balancing Software Operational

The Hypervisor EconomicVirtualization as the "Operating System" Staffing

line Virtualization with a Host Operating Should Your Company Invest in CloudCloud Computing Defined System Computing?Cloud Computing Architecture Virtualization Infections on Virtualized What Should Not be Moved to the Cloud Cloud Computing Terms Environments Virtualization in Mainframe ArchitecturesCommunication-as-a-Service (CaaS) Type 1 Virtualized Environment and Operating SystemsInfrastructure-as-a-Service (IaaS) Type 2 Virtualized Environment LANs and the CloudMonitoring-as-a-Service (MaaS) Virtualization Environments Internet and the CloudSoftware-as-a-Service (SaaS) Microsoft Virtualization Web Services, Browsers, and the CloudPlatform-as-a-Service (PaaS) Sun xVM VirtualBox Thin ClientBenefits and Limitations of Cloud Computing Linux/UNIX Virtualization Advances in Networking and ProcessingBenefits VMware Products Speeds that Led to Cloud ComputingLimitations Data Center and Cloud Infrastructure Networking DevelopmentsCloud Computing Case Studies Products Increased Processing SpeedsHow Companies Are Using Cloud End-User and Desktop Products Managed Service Provider Model to CloudComputing IBM Virtualization Computing and Software as a ServiceImplementing Applications and Services in Using VMware to see a Virtualized Server (SaaS)the Cloud Environment Single Purpose Architectures Migrate toUsing Your Company's Services vs. the What It Is Multipurpose ArchitecturesCloud Provider Permissive Federation Data Center VirtualizationA Cloud Service Provider Introduced Verified Federation CollaborationCloud Computing Risks and Issues Encrypted Federation The Cloud as a Reach ExtenderProducts and Services Provided by Cloud Trusted Federation The Cloud as a Communication EnablerComputing Companies Using XMPP in the Federated The Cloud as an Employee EnablerOperational Environment Service-Oriented Architecture (SOA)Economic Presence in the Cloud Evolving from SOA to the CloudStaffing What It Is Capacity: Limited PerformanceShould Your Company Invest in Cloud Presence Protocols Availability: Communications Failure andComputing? Leveraging Presence Performance IssuesWhat Should Not be Moved to the Cloud Presence Enabled Security: Newer Security Protocols ProvideVirtualization in Mainframe Architectures The Future of Presence More Protectionand Operating Systems The Interrelation of Identity, Presence, What's Next in Cloud Computing LANs and the Cloud and Location in the Cloud Using Industry and International StandardsInternet and the Cloud Identity Management Independent ComponentsWeb Services, Browsers, and the Cloud What It Is Message BaseThin Client Future of Identity in the Cloud Location IndependenceAdvances in Networking and Processing Privacy and Its Relation to Cloud-Based Communication Requirements for CloudSpeeds that Led to Cloud Computing Information Systems ImplementationNetworking Developments Personal Information Public InternetIncreased Processing Speeds Privacy-Related Issues Private InternetManaged Service Provider Model to Cloud Finding Your Private Information Routing to the DatacenterComputing and Software as a Service What It Is Switching within the Data Center(SaaS) Open Cloud Consortium Working Groups BandwidthSingle Purpose Architectures Migrate to Project Matsu Tools Used to Measure Network

Page 150: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Multipurpose Architectures Project Comet PerformanceData Center Virtualization HPC in the Cloud Using the Protocol Analyzer to MeasureCollaboration The Open Cloud Testbed BandwidthThe Cloud as a Reach Extender The Open Science Data Cloud Using Ping and Traceroute to MeasureThe Cloud as a Communication Enabler Intercloud Testbed Network PerformanceThe Cloud as an Employee Enabler Reporting on an Open Cloud Consortium SecurityService-Oriented Architecture (SOA) Working Group SSLEvolving from SOA to the Cloud Distributed Management Task Force VPNCapacity: Limited Performance (DMTF) OverheadAvailability: Communications Failure and What It Is? Storage Options for Cloud ComputingPerformance Issues DMTK Working Groups Associated with Storage CapacitySecurity: Newer Security Protocols Provide Cloud Computing Data Protection and PartitioningMore Protection Standards for Application Developers NASWhat's Next in Cloud Computing Protocols SANUsing Industry and International Standards Scripting Languages CASIndependent Components Content Formatting Standards and RedundancyMessage Base Languages ReplicationLocation Independence Standards for Security in the Cloud MultisitingCommunication Requirements for Cloud Confidentiality, Integrity, Availability Backup and RecoveryImplementation Authentication, Authorization, Server Software Environments thatPublic Internet Accountability Support Cloud ComputingPrivate Internet Regulations for Privacy Server CapacityRouting to the Datacenter Security Protocols VirtualizationSwitching within the Data Center Establishing a Baseline for Cloud ClusteringBandwidth Performance ExpansionTools Used to Measure Network Best Practices for Selecting a Vendor Server FunctionsPerformance and Implementing Cloud-Based ApplicationUsing the Protocol Analyzer to Measure Applications WebBandwidth Choosing the Right Vendor DatabaseUsing Ping and Traceroute to Measure Implementing Cloud-Based Applications Vendor Approaches to Cloud ComputingNetwork Performance Citrix Role of Open Source Software in DataSecurity Windows Remote Desktop CenterSSL Vnc Cost Reduction vs. ReliabilityVPN Web Browsers Open Source Server SoftwareOverhead Server Extensions Open Source Database SoftwareStorage Options for Cloud Computing Thin Clients Open Source Applications SoftwareStorage Capacity Smart Phones, Pads, Pods, etc. Open Source System ManagementData Protection and Partitioning Virtual Terminal Security Strengths and SoftwareNAS Weaknesses Open Source Load-Balancing Software SAN Strengths The HypervisorCAS Weaknesses Virtualization as the "Operating System"Redundancy iPhone Virtualization with a Host OperatingReplication Android SystemMultisiting BlackBerry Virtualization Infections on VirtualizedBackup and Recovery Windows Mobile EnvironmentsServer Software Environments that Support Ubuntu Mobile Internet Device Type 1 Virtualized EnvironmentCloud Computing Mobile Platform Virtualization Type 2 Virtualized EnvironmentServer Capacity Kernel-Based Virtual Machine Virtualization EnvironmentsVirtualization VMware Mobile Virtualization Platform Microsoft VirtualizationClustering Collaboration Applications for Mobile Sun xVM VirtualBoxExpansion Platforms Linux/UNIX VirtualizationServer Functions Text Messaging VMware ProductsApplication iPhone Applications Data Center and Cloud InfrastructureWeb BlackBerry Applications ProductsDatabase Droid Applications End-User and Desktop ProductsVendor Approaches to Cloud Computing IBM VirtualizationRole of Open Source Software in Data Using VMware to see a Virtualized ServerCenter line Environment Cost Reduction vs. Reliability Cloud Computing Defined What It IsOpen Source Server Software Cloud Computing Architecture Permissive FederationOpen Source Database Software Cloud Computing Terms Verified FederationOpen Source Applications Software Communication-as-a-Service (CaaS) Encrypted FederationOpen Source System Management Software Infrastructure-as-a-Service (IaaS) Trusted FederationOpen Source Load-Balancing Software Monitoring-as-a-Service (MaaS) Using XMPP in the Federated EnvironmentThe Hypervisor Software-as-a-Service (SaaS) Presence in the CloudVirtualization as the "Operating System" Platform-as-a-Service (PaaS) What It Is

Page 151: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization with a Host Operating System Benefits and Limitations of Cloud Presence ProtocolsVirtualization Infections on Virtualized Computing Leveraging PresenceEnvironments Benefits Presence EnabledType 1 Virtualized Environment Limitations The Future of PresenceType 2 Virtualized Environment Cloud Computing Case Studies The Interrelation of Identity, Presence, andVirtualization Environments How Companies Are Using Cloud Location in the CloudMicrosoft Virtualization Computing Identity ManagementSun xVM VirtualBox Implementing Applications and Services What It IsLinux/UNIX Virtualization in the Cloud Future of Identity in the CloudVMware Products Using Your Company's Services vs. the Privacy and Its Relation to Cloud-BasedData Center and Cloud Infrastructure Cloud Provider Information SystemsProducts A Cloud Service Provider Introduced Personal InformationEnd-User and Desktop Products Cloud Computing Risks and Issues Privacy-Related IssuesIBM Virtualization Products and Services Provided by Cloud Finding Your Private Information Using VMware to see a Virtualized Server Computing Companies What It IsEnvironment Operational Open Cloud Consortium Working GroupsWhat It Is Economic Project MatsuPermissive Federation Staffing Project CometVerified Federation Should Your Company Invest in Cloud HPC in the CloudEncrypted Federation Computing? The Open Cloud TestbedTrusted Federation What Should Not be Moved to the Cloud The Open Science Data CloudUsing XMPP in the Federated Environment Virtualization in Mainframe Architectures Intercloud TestbedPresence in the Cloud and Operating Systems Reporting on an Open Cloud ConsortiumWhat It Is LANs and the Cloud Working GroupPresence Protocols Internet and the Cloud Distributed Management Task ForceLeveraging Presence Web Services, Browsers, and the Cloud (DMTF)Presence Enabled Thin Client What It Is?The Future of Presence Advances in Networking and Processing DMTK Working Groups Associated withThe Interrelation of Identity, Presence, and Speeds that Led to Cloud Computing Cloud ComputingLocation in the Cloud Networking Developments Standards for Application DevelopersIdentity Management Increased Processing Speeds ProtocolsWhat It Is Managed Service Provider Model to Scripting LanguagesFuture of Identity in the Cloud Cloud Computing and Software as a Content Formatting Standards andPrivacy and Its Relation to Cloud-Based Service (SaaS) LanguagesInformation Systems Single Purpose Architectures Migrate to Standards for Security in the CloudPersonal Information Multipurpose Architectures Confidentiality, Integrity, AvailabilityPrivacy-Related Issues Data Center Virtualization Authentication, Authorization,Finding Your Private Information Collaboration AccountabilityWhat It Is The Cloud as a Reach Extender Regulations for PrivacyOpen Cloud Consortium Working Groups The Cloud as a Communication Enabler Security ProtocolsProject Matsu The Cloud as an Employee Enabler Establishing a Baseline for CloudProject Comet Service-Oriented Architecture (SOA) PerformanceHPC in the Cloud Evolving from SOA to the Cloud Best Practices for Selecting a Vendor andThe Open Cloud Testbed Capacity: Limited Performance Implementing Cloud-Based ApplicationsThe Open Science Data Cloud Availability: Communications Failure and Choosing the Right VendorIntercloud Testbed Performance Issues Implementing Cloud-Based Applications Reporting on an Open Cloud Consortium Security: Newer Security Protocols CitrixWorking Group Provide More Protection Windows Remote DesktopDistributed Management Task Force What's Next in Cloud Computing Vnc(DMTF) Using Industry and International Web BrowsersWhat It Is? Standards Server ExtensionsDMTK Working Groups Associated with Independent Components Thin ClientsCloud Computing Message Base Smart Phones, Pads, Pods, etc.Standards for Application Developers Location Independence Virtual Terminal Security Strengths andProtocols Communication Requirements for Cloud WeaknessesScripting Languages Implementation StrengthsContent Formatting Standards and Public Internet Weaknesses Languages Private Internet iPhoneStandards for Security in the Cloud Routing to the Datacenter AndroidConfidentiality, Integrity, Availability Switching within the Data Center BlackBerryAuthentication, Authorization, Accountability Bandwidth Windows MobileRegulations for Privacy Tools Used to Measure Network Ubuntu Mobile Internet DeviceSecurity Protocols Performance Mobile Platform VirtualizationEstablishing a Baseline for Cloud Using the Protocol Analyzer to Measure Kernel-Based Virtual MachinePerformance Bandwidth VMware Mobile Virtualization PlatformBest Practices for Selecting a Vendor and Using Ping and Traceroute to Measure Collaboration Applications for Mobile

Page 152: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Implementing Cloud-Based Applications Network Performance PlatformsChoosing the Right Vendor Security Text MessagingImplementing Cloud-Based Applications SSL iPhone ApplicationsCitrix VPN BlackBerry ApplicationsWindows Remote Desktop Overhead Droid Applications Vnc Storage Options for Cloud ComputingWeb Browsers Storage CapacityServer Extensions Data Protection and Partitioning lineThin Clients NAS Cloud Computing DefinedSmart Phones, Pads, Pods, etc. SAN Cloud Computing ArchitectureVirtual Terminal Security Strengths and CAS Cloud Computing TermsWeaknesses Redundancy Communication-as-a-Service (CaaS)Strengths Replication Infrastructure-as-a-Service (IaaS)Weaknesses Multisiting Monitoring-as-a-Service (MaaS)iPhone Backup and Recovery Software-as-a-Service (SaaS)Android Server Software Environments that Platform-as-a-Service (PaaS)BlackBerry Support Cloud Computing Benefits and Limitations of CloudWindows Mobile Server Capacity ComputingUbuntu Mobile Internet Device Virtualization BenefitsMobile Platform Virtualization Clustering LimitationsKernel-Based Virtual Machine Expansion Cloud Computing Case StudiesVMware Mobile Virtualization Platform Server Functions How Companies Are Using CloudCollaboration Applications for Mobile Application ComputingPlatforms Web Implementing Applications and Services inText Messaging Database the CloudiPhone Applications Vendor Approaches to Cloud Computing Using Your Company's Services vs. theBlackBerry Applications Role of Open Source Software in Data Cloud ProviderDroid Applications Center A Cloud Service Provider Introduced

Cost Reduction vs. Reliability Cloud Computing Risks and Issues Open Source Server Software Products and Services Provided by Cloud

line Open Source Database Software Computing Companies Cloud Computing Defined Open Source Applications Software OperationalCloud Computing Architecture Open Source System Management EconomicCloud Computing Terms Software StaffingCommunication-as-a-Service (CaaS) Open Source Load-Balancing Software Should Your Company Invest in CloudInfrastructure-as-a-Service (IaaS) The Hypervisor Computing?Monitoring-as-a-Service (MaaS) Virtualization as the "Operating System" What Should Not be Moved to the Cloud Software-as-a-Service (SaaS) Virtualization with a Host Operating Virtualization in Mainframe ArchitecturesPlatform-as-a-Service (PaaS) System and Operating SystemsBenefits and Limitations of Cloud Computing Virtualization Infections on Virtualized LANs and the CloudBenefits Environments Internet and the CloudLimitations Type 1 Virtualized Environment Web Services, Browsers, and the CloudCloud Computing Case Studies Type 2 Virtualized Environment Thin ClientHow Companies Are Using Cloud Virtualization Environments Advances in Networking and ProcessingComputing Microsoft Virtualization Speeds that Led to Cloud ComputingImplementing Applications and Services in Sun xVM VirtualBox Networking Developmentsthe Cloud Linux/UNIX Virtualization Increased Processing SpeedsUsing Your Company's Services vs. the VMware Products Managed Service Provider Model to CloudCloud Provider Data Center and Cloud Infrastructure Computing and Software as a ServiceA Cloud Service Provider Introduced Products (SaaS)Cloud Computing Risks and Issues End-User and Desktop Products Single Purpose Architectures Migrate toProducts and Services Provided by Cloud IBM Virtualization Multipurpose ArchitecturesComputing Companies Using VMware to see a Virtualized Server Data Center VirtualizationOperational Environment CollaborationEconomic What It Is The Cloud as a Reach ExtenderStaffing Permissive Federation The Cloud as a Communication EnablerShould Your Company Invest in Cloud Verified Federation The Cloud as an Employee EnablerComputing? Encrypted Federation Service-Oriented Architecture (SOA)What Should Not be Moved to the Cloud Trusted Federation Evolving from SOA to the CloudVirtualization in Mainframe Architectures Using XMPP in the Federated Capacity: Limited Performanceand Operating Systems Environment Availability: Communications Failure andLANs and the Cloud Presence in the Cloud Performance IssuesInternet and the Cloud What It Is Security: Newer Security Protocols ProvideWeb Services, Browsers, and the Cloud Presence Protocols More ProtectionThin Client Leveraging Presence What's Next in Cloud Computing Advances in Networking and Processing Presence Enabled Using Industry and International Standards

Page 153: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Speeds that Led to Cloud Computing The Future of Presence Independent ComponentsNetworking Developments The Interrelation of Identity, Presence, Message BaseIncreased Processing Speeds and Location in the Cloud Location IndependenceManaged Service Provider Model to Cloud Identity Management Communication Requirements for CloudComputing and Software as a Service What It Is Implementation(SaaS) Future of Identity in the Cloud Public InternetSingle Purpose Architectures Migrate to Privacy and Its Relation to Cloud-Based Private InternetMultipurpose Architectures Information Systems Routing to the DatacenterData Center Virtualization Personal Information Switching within the Data CenterCollaboration Privacy-Related Issues BandwidthThe Cloud as a Reach Extender Finding Your Private Information Tools Used to Measure NetworkThe Cloud as a Communication Enabler What It Is PerformanceThe Cloud as an Employee Enabler Open Cloud Consortium Working Groups Using the Protocol Analyzer to MeasureService-Oriented Architecture (SOA) Project Matsu BandwidthEvolving from SOA to the Cloud Project Comet Using Ping and Traceroute to MeasureCapacity: Limited Performance HPC in the Cloud Network PerformanceAvailability: Communications Failure and The Open Cloud Testbed SecurityPerformance Issues The Open Science Data Cloud SSLSecurity: Newer Security Protocols Provide Intercloud Testbed VPNMore Protection Reporting on an Open Cloud Consortium OverheadWhat's Next in Cloud Computing Working Group Storage Options for Cloud ComputingUsing Industry and International Standards Distributed Management Task Force Storage CapacityIndependent Components (DMTF) Data Protection and PartitioningMessage Base What It Is? NASLocation Independence DMTK Working Groups Associated with SANCommunication Requirements for Cloud Cloud Computing CASImplementation Standards for Application Developers RedundancyPublic Internet Protocols ReplicationPrivate Internet Scripting Languages MultisitingRouting to the Datacenter Content Formatting Standards and Backup and RecoverySwitching within the Data Center Languages Server Software Environments thatBandwidth Standards for Security in the Cloud Support Cloud ComputingTools Used to Measure Network Confidentiality, Integrity, Availability Server CapacityPerformance Authentication, Authorization, VirtualizationUsing the Protocol Analyzer to Measure Accountability ClusteringBandwidth Regulations for Privacy ExpansionUsing Ping and Traceroute to Measure Security Protocols Server FunctionsNetwork Performance Establishing a Baseline for Cloud ApplicationSecurity Performance WebSSL Best Practices for Selecting a Vendor DatabaseVPN and Implementing Cloud-Based Vendor Approaches to Cloud ComputingOverhead Applications Role of Open Source Software in DataStorage Options for Cloud Computing Choosing the Right Vendor CenterStorage Capacity Implementing Cloud-Based Applications Cost Reduction vs. ReliabilityData Protection and Partitioning Citrix Open Source Server SoftwareNAS Windows Remote Desktop Open Source Database SoftwareSAN Vnc Open Source Applications SoftwareCAS Web Browsers Open Source System ManagementRedundancy Server Extensions SoftwareReplication Thin Clients Open Source Load-Balancing Software Multisiting Smart Phones, Pads, Pods, etc. The HypervisorBackup and Recovery Virtual Terminal Security Strengths and Virtualization as the "Operating System"Server Software Environments that Support Weaknesses Virtualization with a Host OperatingCloud Computing Strengths SystemServer Capacity Weaknesses Virtualization Infections on VirtualizedVirtualization iPhone EnvironmentsClustering Android Type 1 Virtualized EnvironmentExpansion BlackBerry Type 2 Virtualized EnvironmentServer Functions Windows Mobile Virtualization EnvironmentsApplication Ubuntu Mobile Internet Device Microsoft VirtualizationWeb Mobile Platform Virtualization Sun xVM VirtualBoxDatabase Kernel-Based Virtual Machine Linux/UNIX VirtualizationVendor Approaches to Cloud Computing VMware Mobile Virtualization Platform VMware ProductsRole of Open Source Software in Data Collaboration Applications for Mobile Data Center and Cloud InfrastructureCenter Platforms ProductsCost Reduction vs. Reliability Text Messaging End-User and Desktop Products

Page 154: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Open Source Server Software iPhone Applications IBM VirtualizationOpen Source Database Software BlackBerry Applications Using VMware to see a Virtualized ServerOpen Source Applications Software Droid Applications Environment Open Source System Management Software What It IsOpen Source Load-Balancing Software 7. Federation, Presence, Security, and Permissive FederationThe Hypervisor Privacy in the Cloud Verified FederationVirtualization as the "Operating System" line Encrypted FederationVirtualization with a Host Operating System Federation in the Cloud Trusted FederationVirtualization Infections on Virtualized Using XMPP in the Federated EnvironmentEnvironments Presence in the CloudType 1 Virtualized Environment line What It IsType 2 Virtualized Environment Cloud Computing Defined Presence ProtocolsVirtualization Environments Cloud Computing Architecture Leveraging PresenceMicrosoft Virtualization Cloud Computing Terms Presence EnabledSun xVM VirtualBox Communication-as-a-Service (CaaS) The Future of PresenceLinux/UNIX Virtualization Infrastructure-as-a-Service (IaaS) The Interrelation of Identity, Presence, andVMware Products Monitoring-as-a-Service (MaaS) Location in the CloudData Center and Cloud Infrastructure Software-as-a-Service (SaaS) Identity ManagementProducts Platform-as-a-Service (PaaS) What It IsEnd-User and Desktop Products Benefits and Limitations of Cloud Future of Identity in the CloudIBM Virtualization Computing Privacy and Its Relation to Cloud-BasedUsing VMware to see a Virtualized Server Benefits Information SystemsEnvironment Limitations Personal InformationWhat It Is Cloud Computing Case Studies Privacy-Related IssuesPermissive Federation How Companies Are Using Cloud Finding Your Private Information Verified Federation Computing What It IsEncrypted Federation Implementing Applications and Services Open Cloud Consortium Working GroupsTrusted Federation in the Cloud Project MatsuUsing XMPP in the Federated Environment Using Your Company's Services vs. the Project CometPresence in the Cloud Cloud Provider HPC in the CloudWhat It Is A Cloud Service Provider Introduced The Open Cloud TestbedPresence Protocols Cloud Computing Risks and Issues The Open Science Data CloudLeveraging Presence Products and Services Provided by Cloud Intercloud TestbedPresence Enabled Computing Companies Reporting on an Open Cloud ConsortiumThe Future of Presence Operational Working GroupThe Interrelation of Identity, Presence, and Economic Distributed Management Task ForceLocation in the Cloud Staffing (DMTF)Identity Management Should Your Company Invest in Cloud What It Is?What It Is Computing? DMTK Working Groups Associated withFuture of Identity in the Cloud What Should Not be Moved to the Cloud Cloud ComputingPrivacy and Its Relation to Cloud-Based Virtualization in Mainframe Architectures Standards for Application DevelopersInformation Systems and Operating Systems ProtocolsPersonal Information LANs and the Cloud Scripting LanguagesPrivacy-Related Issues Internet and the Cloud Content Formatting Standards andFinding Your Private Information Web Services, Browsers, and the Cloud LanguagesWhat It Is Thin Client Standards for Security in the CloudOpen Cloud Consortium Working Groups Advances in Networking and Processing Confidentiality, Integrity, AvailabilityProject Matsu Speeds that Led to Cloud Computing Authentication, Authorization,Project Comet Networking Developments AccountabilityHPC in the Cloud Increased Processing Speeds Regulations for PrivacyThe Open Cloud Testbed Managed Service Provider Model to Security ProtocolsThe Open Science Data Cloud Cloud Computing and Software as a Establishing a Baseline for CloudIntercloud Testbed Service (SaaS) PerformanceReporting on an Open Cloud Consortium Single Purpose Architectures Migrate to Best Practices for Selecting a Vendor andWorking Group Multipurpose Architectures Implementing Cloud-Based ApplicationsDistributed Management Task Force Data Center Virtualization Choosing the Right Vendor(DMTF) Collaboration Implementing Cloud-Based Applications What It Is? The Cloud as a Reach Extender CitrixDMTK Working Groups Associated with The Cloud as a Communication Enabler Windows Remote DesktopCloud Computing The Cloud as an Employee Enabler VncStandards for Application Developers Service-Oriented Architecture (SOA) Web BrowsersProtocols Evolving from SOA to the Cloud Server ExtensionsScripting Languages Capacity: Limited Performance Thin ClientsContent Formatting Standards and Availability: Communications Failure and Smart Phones, Pads, Pods, etc.Languages Performance Issues Virtual Terminal Security Strengths andStandards for Security in the Cloud Security: Newer Security Protocols Weaknesses

Page 155: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Confidentiality, Integrity, Availability Provide More Protection StrengthsAuthentication, Authorization, Accountability What's Next in Cloud Computing Weaknesses Regulations for Privacy Using Industry and International iPhoneSecurity Protocols Standards AndroidEstablishing a Baseline for Cloud Independent Components BlackBerryPerformance Message Base Windows MobileBest Practices for Selecting a Vendor and Location Independence Ubuntu Mobile Internet DeviceImplementing Cloud-Based Applications Communication Requirements for Cloud Mobile Platform VirtualizationChoosing the Right Vendor Implementation Kernel-Based Virtual MachineImplementing Cloud-Based Applications Public Internet VMware Mobile Virtualization PlatformCitrix Private Internet Collaboration Applications for MobileWindows Remote Desktop Routing to the Datacenter PlatformsVnc Switching within the Data Center Text MessagingWeb Browsers Bandwidth iPhone ApplicationsServer Extensions Tools Used to Measure Network BlackBerry ApplicationsThin Clients Performance Droid Applications Smart Phones, Pads, Pods, etc. Using the Protocol Analyzer to MeasureVirtual Terminal Security Strengths and BandwidthWeaknesses Using Ping and Traceroute to Measure lineStrengths Network Performance Cloud Computing DefinedWeaknesses Security Cloud Computing ArchitectureiPhone SSL Cloud Computing TermsAndroid VPN Communication-as-a-Service (CaaS)BlackBerry Overhead Infrastructure-as-a-Service (IaaS)Windows Mobile Storage Options for Cloud Computing Monitoring-as-a-Service (MaaS)Ubuntu Mobile Internet Device Storage Capacity Software-as-a-Service (SaaS)Mobile Platform Virtualization Data Protection and Partitioning Platform-as-a-Service (PaaS)Kernel-Based Virtual Machine NAS Benefits and Limitations of CloudVMware Mobile Virtualization Platform SAN ComputingCollaboration Applications for Mobile CAS BenefitsPlatforms Redundancy LimitationsText Messaging Replication Cloud Computing Case StudiesiPhone Applications Multisiting How Companies Are Using CloudBlackBerry Applications Backup and Recovery ComputingDroid Applications Server Software Environments that Implementing Applications and Services in

Support Cloud Computing the CloudServer Capacity Using Your Company's Services vs. the

line Virtualization Cloud ProviderCloud Computing Defined Clustering A Cloud Service Provider IntroducedCloud Computing Architecture Expansion Cloud Computing Risks and Issues Cloud Computing Terms Server Functions Products and Services Provided by CloudCommunication-as-a-Service (CaaS) Application Computing Companies Infrastructure-as-a-Service (IaaS) Web OperationalMonitoring-as-a-Service (MaaS) Database EconomicSoftware-as-a-Service (SaaS) Vendor Approaches to Cloud Computing StaffingPlatform-as-a-Service (PaaS) Role of Open Source Software in Data Should Your Company Invest in CloudBenefits and Limitations of Cloud Computing Center Computing?Benefits Cost Reduction vs. Reliability What Should Not be Moved to the Cloud Limitations Open Source Server Software Virtualization in Mainframe ArchitecturesCloud Computing Case Studies Open Source Database Software and Operating SystemsHow Companies Are Using Cloud Open Source Applications Software LANs and the CloudComputing Open Source System Management Internet and the CloudImplementing Applications and Services in Software Web Services, Browsers, and the Cloudthe Cloud Open Source Load-Balancing Software Thin ClientUsing Your Company's Services vs. the The Hypervisor Advances in Networking and ProcessingCloud Provider Virtualization as the "Operating System" Speeds that Led to Cloud ComputingA Cloud Service Provider Introduced Virtualization with a Host Operating Networking DevelopmentsCloud Computing Risks and Issues System Increased Processing SpeedsProducts and Services Provided by Cloud Virtualization Infections on Virtualized Managed Service Provider Model to CloudComputing Companies Environments Computing and Software as a ServiceOperational Type 1 Virtualized Environment (SaaS)Economic Type 2 Virtualized Environment Single Purpose Architectures Migrate toStaffing Virtualization Environments Multipurpose ArchitecturesShould Your Company Invest in Cloud Microsoft Virtualization Data Center VirtualizationComputing? Sun xVM VirtualBox CollaborationWhat Should Not be Moved to the Cloud Linux/UNIX Virtualization The Cloud as a Reach Extender

Page 156: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization in Mainframe Architectures VMware Products The Cloud as a Communication Enablerand Operating Systems Data Center and Cloud Infrastructure The Cloud as an Employee EnablerLANs and the Cloud Products Service-Oriented Architecture (SOA)Internet and the Cloud End-User and Desktop Products Evolving from SOA to the CloudWeb Services, Browsers, and the Cloud IBM Virtualization Capacity: Limited PerformanceThin Client Using VMware to see a Virtualized Server Availability: Communications Failure andAdvances in Networking and Processing Environment Performance IssuesSpeeds that Led to Cloud Computing What It Is Security: Newer Security Protocols ProvideNetworking Developments Permissive Federation More ProtectionIncreased Processing Speeds Verified Federation What's Next in Cloud Computing Managed Service Provider Model to Cloud Encrypted Federation Using Industry and International StandardsComputing and Software as a Service Trusted Federation Independent Components(SaaS) Using XMPP in the Federated Message BaseSingle Purpose Architectures Migrate to Environment Location IndependenceMultipurpose Architectures Presence in the Cloud Communication Requirements for CloudData Center Virtualization What It Is ImplementationCollaboration Presence Protocols Public InternetThe Cloud as a Reach Extender Leveraging Presence Private InternetThe Cloud as a Communication Enabler Presence Enabled Routing to the DatacenterThe Cloud as an Employee Enabler The Future of Presence Switching within the Data CenterService-Oriented Architecture (SOA) The Interrelation of Identity, Presence, BandwidthEvolving from SOA to the Cloud and Location in the Cloud Tools Used to Measure NetworkCapacity: Limited Performance Identity Management PerformanceAvailability: Communications Failure and What It Is Using the Protocol Analyzer to MeasurePerformance Issues Future of Identity in the Cloud BandwidthSecurity: Newer Security Protocols Provide Privacy and Its Relation to Cloud-Based Using Ping and Traceroute to MeasureMore Protection Information Systems Network PerformanceWhat's Next in Cloud Computing Personal Information SecurityUsing Industry and International Standards Privacy-Related Issues SSLIndependent Components Finding Your Private Information VPNMessage Base What It Is OverheadLocation Independence Open Cloud Consortium Working Groups Storage Options for Cloud ComputingCommunication Requirements for Cloud Project Matsu Storage CapacityImplementation Project Comet Data Protection and PartitioningPublic Internet HPC in the Cloud NASPrivate Internet The Open Cloud Testbed SANRouting to the Datacenter The Open Science Data Cloud CASSwitching within the Data Center Intercloud Testbed RedundancyBandwidth Reporting on an Open Cloud Consortium ReplicationTools Used to Measure Network Working Group MultisitingPerformance Distributed Management Task Force Backup and RecoveryUsing the Protocol Analyzer to Measure (DMTF) Server Software Environments thatBandwidth What It Is? Support Cloud ComputingUsing Ping and Traceroute to Measure DMTK Working Groups Associated with Server CapacityNetwork Performance Cloud Computing VirtualizationSecurity Standards for Application Developers ClusteringSSL Protocols ExpansionVPN Scripting Languages Server FunctionsOverhead Content Formatting Standards and ApplicationStorage Options for Cloud Computing Languages WebStorage Capacity Standards for Security in the Cloud DatabaseData Protection and Partitioning Confidentiality, Integrity, Availability Vendor Approaches to Cloud ComputingNAS Authentication, Authorization, Role of Open Source Software in DataSAN Accountability CenterCAS Regulations for Privacy Cost Reduction vs. ReliabilityRedundancy Security Protocols Open Source Server SoftwareReplication Establishing a Baseline for Cloud Open Source Database SoftwareMultisiting Performance Open Source Applications SoftwareBackup and Recovery Best Practices for Selecting a Vendor Open Source System ManagementServer Software Environments that Support and Implementing Cloud-Based SoftwareCloud Computing Applications Open Source Load-Balancing Software Server Capacity Choosing the Right Vendor The HypervisorVirtualization Implementing Cloud-Based Applications Virtualization as the "Operating System"Clustering Citrix Virtualization with a Host OperatingExpansion Windows Remote Desktop SystemServer Functions Vnc Virtualization Infections on Virtualized

Page 157: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Application Web Browsers EnvironmentsWeb Server Extensions Type 1 Virtualized EnvironmentDatabase Thin Clients Type 2 Virtualized EnvironmentVendor Approaches to Cloud Computing Smart Phones, Pads, Pods, etc. Virtualization EnvironmentsRole of Open Source Software in Data Virtual Terminal Security Strengths and Microsoft VirtualizationCenter Weaknesses Sun xVM VirtualBoxCost Reduction vs. Reliability Strengths Linux/UNIX VirtualizationOpen Source Server Software Weaknesses VMware ProductsOpen Source Database Software iPhone Data Center and Cloud InfrastructureOpen Source Applications Software Android ProductsOpen Source System Management Software BlackBerry End-User and Desktop ProductsOpen Source Load-Balancing Software Windows Mobile IBM VirtualizationThe Hypervisor Ubuntu Mobile Internet Device Using VMware to see a Virtualized ServerVirtualization as the "Operating System" Mobile Platform Virtualization Environment Virtualization with a Host Operating System Kernel-Based Virtual Machine What It IsVirtualization Infections on Virtualized VMware Mobile Virtualization Platform Permissive FederationEnvironments Collaboration Applications for Mobile Verified FederationType 1 Virtualized Environment Platforms Encrypted FederationType 2 Virtualized Environment Text Messaging Trusted FederationVirtualization Environments iPhone Applications Using XMPP in the Federated EnvironmentMicrosoft Virtualization BlackBerry Applications Presence in the CloudSun xVM VirtualBox Droid Applications What It IsLinux/UNIX Virtualization Presence ProtocolsVMware Products Leveraging PresenceData Center and Cloud Infrastructure line Presence EnabledProducts Cloud Computing Defined The Future of PresenceEnd-User and Desktop Products Cloud Computing Architecture The Interrelation of Identity, Presence, andIBM Virtualization Cloud Computing Terms Location in the CloudUsing VMware to see a Virtualized Server Communication-as-a-Service (CaaS) Identity ManagementEnvironment Infrastructure-as-a-Service (IaaS) What It IsWhat It Is Monitoring-as-a-Service (MaaS) Future of Identity in the CloudPermissive Federation Software-as-a-Service (SaaS) Privacy and Its Relation to Cloud-BasedVerified Federation Platform-as-a-Service (PaaS) Information SystemsEncrypted Federation Benefits and Limitations of Cloud Personal InformationTrusted Federation Computing Privacy-Related IssuesUsing XMPP in the Federated Environment Benefits Finding Your Private Information Presence in the Cloud Limitations What It IsWhat It Is Cloud Computing Case Studies Open Cloud Consortium Working GroupsPresence Protocols How Companies Are Using Cloud Project MatsuLeveraging Presence Computing Project CometPresence Enabled Implementing Applications and Services HPC in the CloudThe Future of Presence in the Cloud The Open Cloud TestbedThe Interrelation of Identity, Presence, and Using Your Company's Services vs. the The Open Science Data CloudLocation in the Cloud Cloud Provider Intercloud TestbedIdentity Management A Cloud Service Provider Introduced Reporting on an Open Cloud ConsortiumWhat It Is Cloud Computing Risks and Issues Working GroupFuture of Identity in the Cloud Products and Services Provided by Cloud Distributed Management Task ForcePrivacy and Its Relation to Cloud-Based Computing Companies (DMTF)Information Systems Operational What It Is?Personal Information Economic DMTK Working Groups Associated withPrivacy-Related Issues Staffing Cloud ComputingFinding Your Private Information Should Your Company Invest in Cloud Standards for Application DevelopersWhat It Is Computing? ProtocolsOpen Cloud Consortium Working Groups What Should Not be Moved to the Cloud Scripting LanguagesProject Matsu Virtualization in Mainframe Architectures Content Formatting Standards andProject Comet and Operating Systems LanguagesHPC in the Cloud LANs and the Cloud Standards for Security in the CloudThe Open Cloud Testbed Internet and the Cloud Confidentiality, Integrity, AvailabilityThe Open Science Data Cloud Web Services, Browsers, and the Cloud Authentication, Authorization,Intercloud Testbed Thin Client AccountabilityReporting on an Open Cloud Consortium Advances in Networking and Processing Regulations for PrivacyWorking Group Speeds that Led to Cloud Computing Security ProtocolsDistributed Management Task Force Networking Developments Establishing a Baseline for Cloud(DMTF) Increased Processing Speeds PerformanceWhat It Is? Managed Service Provider Model to Best Practices for Selecting a Vendor andDMTK Working Groups Associated with Cloud Computing and Software as a Implementing Cloud-Based Applications

Page 158: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Service (SaaS) Choosing the Right VendorStandards for Application Developers Single Purpose Architectures Migrate to Implementing Cloud-Based Applications Protocols Multipurpose Architectures CitrixScripting Languages Data Center Virtualization Windows Remote DesktopContent Formatting Standards and Collaboration VncLanguages The Cloud as a Reach Extender Web BrowsersStandards for Security in the Cloud The Cloud as a Communication Enabler Server ExtensionsConfidentiality, Integrity, Availability The Cloud as an Employee Enabler Thin ClientsAuthentication, Authorization, Accountability Service-Oriented Architecture (SOA) Smart Phones, Pads, Pods, etc.Regulations for Privacy Evolving from SOA to the Cloud Virtual Terminal Security Strengths andSecurity Protocols Capacity: Limited Performance WeaknessesEstablishing a Baseline for Cloud Availability: Communications Failure and StrengthsPerformance Performance Issues Weaknesses Best Practices for Selecting a Vendor and Security: Newer Security Protocols iPhoneImplementing Cloud-Based Applications Provide More Protection AndroidChoosing the Right Vendor What's Next in Cloud Computing BlackBerryImplementing Cloud-Based Applications Using Industry and International Windows MobileCitrix Standards Ubuntu Mobile Internet DeviceWindows Remote Desktop Independent Components Mobile Platform VirtualizationVnc Message Base Kernel-Based Virtual MachineWeb Browsers Location Independence VMware Mobile Virtualization PlatformServer Extensions Communication Requirements for Cloud Collaboration Applications for MobileThin Clients Implementation PlatformsSmart Phones, Pads, Pods, etc. Public Internet Text MessagingVirtual Terminal Security Strengths and Private Internet iPhone ApplicationsWeaknesses Routing to the Datacenter BlackBerry ApplicationsStrengths Switching within the Data Center Droid Applications Weaknesses BandwidthiPhone Tools Used to Measure NetworkAndroid Performance lineBlackBerry Using the Protocol Analyzer to Measure Cloud Computing DefinedWindows Mobile Bandwidth Cloud Computing ArchitectureUbuntu Mobile Internet Device Using Ping and Traceroute to Measure Cloud Computing TermsMobile Platform Virtualization Network Performance Communication-as-a-Service (CaaS)Kernel-Based Virtual Machine Security Infrastructure-as-a-Service (IaaS)VMware Mobile Virtualization Platform SSL Monitoring-as-a-Service (MaaS)Collaboration Applications for Mobile VPN Software-as-a-Service (SaaS)Platforms Overhead Platform-as-a-Service (PaaS)Text Messaging Storage Options for Cloud Computing Benefits and Limitations of CloudiPhone Applications Storage Capacity ComputingBlackBerry Applications Data Protection and Partitioning BenefitsDroid Applications NAS Limitations

SAN Cloud Computing Case StudiesCAS How Companies Are Using Cloud

line Redundancy ComputingCloud Computing Defined Replication Implementing Applications and Services inCloud Computing Architecture Multisiting the CloudCloud Computing Terms Backup and Recovery Using Your Company's Services vs. theCommunication-as-a-Service (CaaS) Server Software Environments that Cloud ProviderInfrastructure-as-a-Service (IaaS) Support Cloud Computing A Cloud Service Provider IntroducedMonitoring-as-a-Service (MaaS) Server Capacity Cloud Computing Risks and Issues Software-as-a-Service (SaaS) Virtualization Products and Services Provided by CloudPlatform-as-a-Service (PaaS) Clustering Computing Companies Benefits and Limitations of Cloud Computing Expansion OperationalBenefits Server Functions EconomicLimitations Application StaffingCloud Computing Case Studies Web Should Your Company Invest in CloudHow Companies Are Using Cloud Database Computing?Computing Vendor Approaches to Cloud Computing What Should Not be Moved to the Cloud Implementing Applications and Services in Role of Open Source Software in Data Virtualization in Mainframe Architecturesthe Cloud Center and Operating SystemsUsing Your Company's Services vs. the Cost Reduction vs. Reliability LANs and the CloudCloud Provider Open Source Server Software Internet and the CloudA Cloud Service Provider Introduced Open Source Database Software Web Services, Browsers, and the CloudCloud Computing Risks and Issues Open Source Applications Software Thin ClientProducts and Services Provided by Cloud Open Source System Management Advances in Networking and Processing

Page 159: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Computing Companies Software Speeds that Led to Cloud ComputingOperational Open Source Load-Balancing Software Networking DevelopmentsEconomic The Hypervisor Increased Processing SpeedsStaffing Virtualization as the "Operating System" Managed Service Provider Model to CloudShould Your Company Invest in Cloud Virtualization with a Host Operating Computing and Software as a ServiceComputing? System (SaaS)What Should Not be Moved to the Cloud Virtualization Infections on Virtualized Single Purpose Architectures Migrate toVirtualization in Mainframe Architectures Environments Multipurpose Architecturesand Operating Systems Type 1 Virtualized Environment Data Center VirtualizationLANs and the Cloud Type 2 Virtualized Environment CollaborationInternet and the Cloud Virtualization Environments The Cloud as a Reach ExtenderWeb Services, Browsers, and the Cloud Microsoft Virtualization The Cloud as a Communication EnablerThin Client Sun xVM VirtualBox The Cloud as an Employee EnablerAdvances in Networking and Processing Linux/UNIX Virtualization Service-Oriented Architecture (SOA)Speeds that Led to Cloud Computing VMware Products Evolving from SOA to the CloudNetworking Developments Data Center and Cloud Infrastructure Capacity: Limited PerformanceIncreased Processing Speeds Products Availability: Communications Failure andManaged Service Provider Model to Cloud End-User and Desktop Products Performance IssuesComputing and Software as a Service IBM Virtualization Security: Newer Security Protocols Provide(SaaS) Using VMware to see a Virtualized Server More ProtectionSingle Purpose Architectures Migrate to Environment What's Next in Cloud Computing Multipurpose Architectures What It Is Using Industry and International StandardsData Center Virtualization Permissive Federation Independent ComponentsCollaboration Verified Federation Message BaseThe Cloud as a Reach Extender Encrypted Federation Location IndependenceThe Cloud as a Communication Enabler Trusted Federation Communication Requirements for CloudThe Cloud as an Employee Enabler Using XMPP in the Federated ImplementationService-Oriented Architecture (SOA) Environment Public InternetEvolving from SOA to the Cloud Presence in the Cloud Private InternetCapacity: Limited Performance What It Is Routing to the DatacenterAvailability: Communications Failure and Presence Protocols Switching within the Data CenterPerformance Issues Leveraging Presence BandwidthSecurity: Newer Security Protocols Provide Presence Enabled Tools Used to Measure NetworkMore Protection The Future of Presence PerformanceWhat's Next in Cloud Computing The Interrelation of Identity, Presence, Using the Protocol Analyzer to MeasureUsing Industry and International Standards and Location in the Cloud BandwidthIndependent Components Identity Management Using Ping and Traceroute to MeasureMessage Base What It Is Network PerformanceLocation Independence Future of Identity in the Cloud SecurityCommunication Requirements for Cloud Privacy and Its Relation to Cloud-Based SSLImplementation Information Systems VPNPublic Internet Personal Information OverheadPrivate Internet Privacy-Related Issues Storage Options for Cloud ComputingRouting to the Datacenter Finding Your Private Information Storage CapacitySwitching within the Data Center What It Is Data Protection and PartitioningBandwidth Open Cloud Consortium Working Groups NASTools Used to Measure Network Project Matsu SANPerformance Project Comet CASUsing the Protocol Analyzer to Measure HPC in the Cloud RedundancyBandwidth The Open Cloud Testbed ReplicationUsing Ping and Traceroute to Measure The Open Science Data Cloud MultisitingNetwork Performance Intercloud Testbed Backup and RecoverySecurity Reporting on an Open Cloud Consortium Server Software Environments thatSSL Working Group Support Cloud ComputingVPN Distributed Management Task Force Server CapacityOverhead (DMTF) VirtualizationStorage Options for Cloud Computing What It Is? ClusteringStorage Capacity DMTK Working Groups Associated with ExpansionData Protection and Partitioning Cloud Computing Server FunctionsNAS Standards for Application Developers ApplicationSAN Protocols WebCAS Scripting Languages DatabaseRedundancy Content Formatting Standards and Vendor Approaches to Cloud ComputingReplication Languages Role of Open Source Software in DataMultisiting Standards for Security in the Cloud CenterBackup and Recovery Confidentiality, Integrity, Availability Cost Reduction vs. Reliability

Page 160: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Software Environments that Support Authentication, Authorization, Open Source Server SoftwareCloud Computing Accountability Open Source Database SoftwareServer Capacity Regulations for Privacy Open Source Applications SoftwareVirtualization Security Protocols Open Source System ManagementClustering Establishing a Baseline for Cloud SoftwareExpansion Performance Open Source Load-Balancing Software Server Functions Best Practices for Selecting a Vendor The HypervisorApplication and Implementing Cloud-Based Virtualization as the "Operating System"Web Applications Virtualization with a Host OperatingDatabase Choosing the Right Vendor SystemVendor Approaches to Cloud Computing Implementing Cloud-Based Applications Virtualization Infections on VirtualizedRole of Open Source Software in Data Citrix EnvironmentsCenter Windows Remote Desktop Type 1 Virtualized EnvironmentCost Reduction vs. Reliability Vnc Type 2 Virtualized EnvironmentOpen Source Server Software Web Browsers Virtualization EnvironmentsOpen Source Database Software Server Extensions Microsoft VirtualizationOpen Source Applications Software Thin Clients Sun xVM VirtualBoxOpen Source System Management Software Smart Phones, Pads, Pods, etc. Linux/UNIX VirtualizationOpen Source Load-Balancing Software Virtual Terminal Security Strengths and VMware ProductsThe Hypervisor Weaknesses Data Center and Cloud InfrastructureVirtualization as the "Operating System" Strengths ProductsVirtualization with a Host Operating System Weaknesses End-User and Desktop ProductsVirtualization Infections on Virtualized iPhone IBM VirtualizationEnvironments Android Using VMware to see a Virtualized ServerType 1 Virtualized Environment BlackBerry Environment Type 2 Virtualized Environment Windows Mobile What It IsVirtualization Environments Ubuntu Mobile Internet Device Permissive FederationMicrosoft Virtualization Mobile Platform Virtualization Verified FederationSun xVM VirtualBox Kernel-Based Virtual Machine Encrypted FederationLinux/UNIX Virtualization VMware Mobile Virtualization Platform Trusted FederationVMware Products Collaboration Applications for Mobile Using XMPP in the Federated EnvironmentData Center and Cloud Infrastructure Platforms Presence in the CloudProducts Text Messaging What It IsEnd-User and Desktop Products iPhone Applications Presence ProtocolsIBM Virtualization BlackBerry Applications Leveraging PresenceUsing VMware to see a Virtualized Server Droid Applications Presence EnabledEnvironment The Future of PresenceWhat It Is The Interrelation of Identity, Presence, andPermissive Federation line Location in the CloudVerified Federation Cloud Computing Defined Identity ManagementEncrypted Federation Cloud Computing Architecture What It IsTrusted Federation Cloud Computing Terms Future of Identity in the CloudUsing XMPP in the Federated Environment Communication-as-a-Service (CaaS) Privacy and Its Relation to Cloud-BasedPresence in the Cloud Infrastructure-as-a-Service (IaaS) Information SystemsWhat It Is Monitoring-as-a-Service (MaaS) Personal InformationPresence Protocols Software-as-a-Service (SaaS) Privacy-Related IssuesLeveraging Presence Platform-as-a-Service (PaaS) Finding Your Private Information Presence Enabled Benefits and Limitations of Cloud What It IsThe Future of Presence Computing Open Cloud Consortium Working GroupsThe Interrelation of Identity, Presence, and Benefits Project MatsuLocation in the Cloud Limitations Project CometIdentity Management Cloud Computing Case Studies HPC in the CloudWhat It Is How Companies Are Using Cloud The Open Cloud TestbedFuture of Identity in the Cloud Computing The Open Science Data CloudPrivacy and Its Relation to Cloud-Based Implementing Applications and Services Intercloud TestbedInformation Systems in the Cloud Reporting on an Open Cloud ConsortiumPersonal Information Using Your Company's Services vs. the Working GroupPrivacy-Related Issues Cloud Provider Distributed Management Task ForceFinding Your Private Information A Cloud Service Provider Introduced (DMTF)What It Is Cloud Computing Risks and Issues What It Is?Open Cloud Consortium Working Groups Products and Services Provided by Cloud DMTK Working Groups Associated withProject Matsu Computing Companies Cloud ComputingProject Comet Operational Standards for Application DevelopersHPC in the Cloud Economic ProtocolsThe Open Cloud Testbed Staffing Scripting LanguagesThe Open Science Data Cloud Should Your Company Invest in Cloud Content Formatting Standards and

Page 161: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Intercloud Testbed Computing? LanguagesReporting on an Open Cloud Consortium What Should Not be Moved to the Cloud Standards for Security in the CloudWorking Group Virtualization in Mainframe Architectures Confidentiality, Integrity, AvailabilityDistributed Management Task Force and Operating Systems Authentication, Authorization,(DMTF) LANs and the Cloud AccountabilityWhat It Is? Internet and the Cloud Regulations for PrivacyDMTK Working Groups Associated with Web Services, Browsers, and the Cloud Security ProtocolsCloud Computing Thin Client Establishing a Baseline for CloudStandards for Application Developers Advances in Networking and Processing PerformanceProtocols Speeds that Led to Cloud Computing Best Practices for Selecting a Vendor andScripting Languages Networking Developments Implementing Cloud-Based ApplicationsContent Formatting Standards and Increased Processing Speeds Choosing the Right VendorLanguages Managed Service Provider Model to Implementing Cloud-Based Applications Standards for Security in the Cloud Cloud Computing and Software as a CitrixConfidentiality, Integrity, Availability Service (SaaS) Windows Remote DesktopAuthentication, Authorization, Accountability Single Purpose Architectures Migrate to VncRegulations for Privacy Multipurpose Architectures Web BrowsersSecurity Protocols Data Center Virtualization Server ExtensionsEstablishing a Baseline for Cloud Collaboration Thin ClientsPerformance The Cloud as a Reach Extender Smart Phones, Pads, Pods, etc.Best Practices for Selecting a Vendor and The Cloud as a Communication Enabler Virtual Terminal Security Strengths andImplementing Cloud-Based Applications The Cloud as an Employee Enabler WeaknessesChoosing the Right Vendor Service-Oriented Architecture (SOA) StrengthsImplementing Cloud-Based Applications Evolving from SOA to the Cloud Weaknesses Citrix Capacity: Limited Performance iPhoneWindows Remote Desktop Availability: Communications Failure and AndroidVnc Performance Issues BlackBerryWeb Browsers Security: Newer Security Protocols Windows MobileServer Extensions Provide More Protection Ubuntu Mobile Internet DeviceThin Clients What's Next in Cloud Computing Mobile Platform VirtualizationSmart Phones, Pads, Pods, etc. Using Industry and International Kernel-Based Virtual MachineVirtual Terminal Security Strengths and Standards VMware Mobile Virtualization PlatformWeaknesses Independent Components Collaboration Applications for MobileStrengths Message Base PlatformsWeaknesses Location Independence Text MessagingiPhone Communication Requirements for Cloud iPhone ApplicationsAndroid Implementation BlackBerry ApplicationsBlackBerry Public Internet Droid Applications Windows Mobile Private InternetUbuntu Mobile Internet Device Routing to the DatacenterMobile Platform Virtualization Switching within the Data Center lineKernel-Based Virtual Machine Bandwidth Cloud Computing DefinedVMware Mobile Virtualization Platform Tools Used to Measure Network Cloud Computing ArchitectureCollaboration Applications for Mobile Performance Cloud Computing TermsPlatforms Using the Protocol Analyzer to Measure Communication-as-a-Service (CaaS)Text Messaging Bandwidth Infrastructure-as-a-Service (IaaS)iPhone Applications Using Ping and Traceroute to Measure Monitoring-as-a-Service (MaaS)BlackBerry Applications Network Performance Software-as-a-Service (SaaS)Droid Applications Security Platform-as-a-Service (PaaS)

SSL Benefits and Limitations of CloudVPN Computing

line Overhead BenefitsCloud Computing Defined Storage Options for Cloud Computing LimitationsCloud Computing Architecture Storage Capacity Cloud Computing Case StudiesCloud Computing Terms Data Protection and Partitioning How Companies Are Using CloudCommunication-as-a-Service (CaaS) NAS ComputingInfrastructure-as-a-Service (IaaS) SAN Implementing Applications and Services inMonitoring-as-a-Service (MaaS) CAS the CloudSoftware-as-a-Service (SaaS) Redundancy Using Your Company's Services vs. thePlatform-as-a-Service (PaaS) Replication Cloud ProviderBenefits and Limitations of Cloud Computing Multisiting A Cloud Service Provider IntroducedBenefits Backup and Recovery Cloud Computing Risks and Issues Limitations Server Software Environments that Products and Services Provided by CloudCloud Computing Case Studies Support Cloud Computing Computing Companies How Companies Are Using Cloud Server Capacity OperationalComputing Virtualization Economic

Page 162: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Implementing Applications and Services in Clustering Staffingthe Cloud Expansion Should Your Company Invest in CloudUsing Your Company's Services vs. the Server Functions Computing?Cloud Provider Application What Should Not be Moved to the Cloud A Cloud Service Provider Introduced Web Virtualization in Mainframe ArchitecturesCloud Computing Risks and Issues Database and Operating SystemsProducts and Services Provided by Cloud Vendor Approaches to Cloud Computing LANs and the CloudComputing Companies Role of Open Source Software in Data Internet and the CloudOperational Center Web Services, Browsers, and the CloudEconomic Cost Reduction vs. Reliability Thin ClientStaffing Open Source Server Software Advances in Networking and ProcessingShould Your Company Invest in Cloud Open Source Database Software Speeds that Led to Cloud ComputingComputing? Open Source Applications Software Networking DevelopmentsWhat Should Not be Moved to the Cloud Open Source System Management Increased Processing SpeedsVirtualization in Mainframe Architectures Software Managed Service Provider Model to Cloudand Operating Systems Open Source Load-Balancing Software Computing and Software as a ServiceLANs and the Cloud The Hypervisor (SaaS)Internet and the Cloud Virtualization as the "Operating System" Single Purpose Architectures Migrate toWeb Services, Browsers, and the Cloud Virtualization with a Host Operating Multipurpose ArchitecturesThin Client System Data Center VirtualizationAdvances in Networking and Processing Virtualization Infections on Virtualized CollaborationSpeeds that Led to Cloud Computing Environments The Cloud as a Reach ExtenderNetworking Developments Type 1 Virtualized Environment The Cloud as a Communication EnablerIncreased Processing Speeds Type 2 Virtualized Environment The Cloud as an Employee EnablerManaged Service Provider Model to Cloud Virtualization Environments Service-Oriented Architecture (SOA)Computing and Software as a Service Microsoft Virtualization Evolving from SOA to the Cloud(SaaS) Sun xVM VirtualBox Capacity: Limited PerformanceSingle Purpose Architectures Migrate to Linux/UNIX Virtualization Availability: Communications Failure andMultipurpose Architectures VMware Products Performance IssuesData Center Virtualization Data Center and Cloud Infrastructure Security: Newer Security Protocols ProvideCollaboration Products More ProtectionThe Cloud as a Reach Extender End-User and Desktop Products What's Next in Cloud Computing The Cloud as a Communication Enabler IBM Virtualization Using Industry and International StandardsThe Cloud as an Employee Enabler Using VMware to see a Virtualized Server Independent ComponentsService-Oriented Architecture (SOA) Environment Message BaseEvolving from SOA to the Cloud What It Is Location IndependenceCapacity: Limited Performance Permissive Federation Communication Requirements for CloudAvailability: Communications Failure and Verified Federation ImplementationPerformance Issues Encrypted Federation Public InternetSecurity: Newer Security Protocols Provide Trusted Federation Private InternetMore Protection Using XMPP in the Federated Routing to the DatacenterWhat's Next in Cloud Computing Environment Switching within the Data CenterUsing Industry and International Standards Presence in the Cloud BandwidthIndependent Components What It Is Tools Used to Measure NetworkMessage Base Presence Protocols PerformanceLocation Independence Leveraging Presence Using the Protocol Analyzer to MeasureCommunication Requirements for Cloud Presence Enabled BandwidthImplementation The Future of Presence Using Ping and Traceroute to MeasurePublic Internet The Interrelation of Identity, Presence, Network PerformancePrivate Internet and Location in the Cloud SecurityRouting to the Datacenter Identity Management SSLSwitching within the Data Center What It Is VPNBandwidth Future of Identity in the Cloud OverheadTools Used to Measure Network Privacy and Its Relation to Cloud-Based Storage Options for Cloud ComputingPerformance Information Systems Storage CapacityUsing the Protocol Analyzer to Measure Personal Information Data Protection and PartitioningBandwidth Privacy-Related Issues NASUsing Ping and Traceroute to Measure Finding Your Private Information SANNetwork Performance What It Is CASSecurity Open Cloud Consortium Working Groups RedundancySSL Project Matsu ReplicationVPN Project Comet MultisitingOverhead HPC in the Cloud Backup and RecoveryStorage Options for Cloud Computing The Open Cloud Testbed Server Software Environments thatStorage Capacity The Open Science Data Cloud Support Cloud ComputingData Protection and Partitioning Intercloud Testbed Server Capacity

Page 163: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

NAS Reporting on an Open Cloud Consortium VirtualizationSAN Working Group ClusteringCAS Distributed Management Task Force ExpansionRedundancy (DMTF) Server FunctionsReplication What It Is? ApplicationMultisiting DMTK Working Groups Associated with WebBackup and Recovery Cloud Computing DatabaseServer Software Environments that Support Standards for Application Developers Vendor Approaches to Cloud ComputingCloud Computing Protocols Role of Open Source Software in DataServer Capacity Scripting Languages CenterVirtualization Content Formatting Standards and Cost Reduction vs. ReliabilityClustering Languages Open Source Server SoftwareExpansion Standards for Security in the Cloud Open Source Database SoftwareServer Functions Confidentiality, Integrity, Availability Open Source Applications SoftwareApplication Authentication, Authorization, Open Source System ManagementWeb Accountability SoftwareDatabase Regulations for Privacy Open Source Load-Balancing Software Vendor Approaches to Cloud Computing Security Protocols The HypervisorRole of Open Source Software in Data Establishing a Baseline for Cloud Virtualization as the "Operating System"Center Performance Virtualization with a Host OperatingCost Reduction vs. Reliability Best Practices for Selecting a Vendor SystemOpen Source Server Software and Implementing Cloud-Based Virtualization Infections on VirtualizedOpen Source Database Software Applications EnvironmentsOpen Source Applications Software Choosing the Right Vendor Type 1 Virtualized EnvironmentOpen Source System Management Software Implementing Cloud-Based Applications Type 2 Virtualized EnvironmentOpen Source Load-Balancing Software Citrix Virtualization EnvironmentsThe Hypervisor Windows Remote Desktop Microsoft VirtualizationVirtualization as the "Operating System" Vnc Sun xVM VirtualBoxVirtualization with a Host Operating System Web Browsers Linux/UNIX VirtualizationVirtualization Infections on Virtualized Server Extensions VMware ProductsEnvironments Thin Clients Data Center and Cloud InfrastructureType 1 Virtualized Environment Smart Phones, Pads, Pods, etc. ProductsType 2 Virtualized Environment Virtual Terminal Security Strengths and End-User and Desktop ProductsVirtualization Environments Weaknesses IBM VirtualizationMicrosoft Virtualization Strengths Using VMware to see a Virtualized ServerSun xVM VirtualBox Weaknesses Environment Linux/UNIX Virtualization iPhone What It IsVMware Products Android Permissive FederationData Center and Cloud Infrastructure BlackBerry Verified FederationProducts Windows Mobile Encrypted FederationEnd-User and Desktop Products Ubuntu Mobile Internet Device Trusted FederationIBM Virtualization Mobile Platform Virtualization Using XMPP in the Federated EnvironmentUsing VMware to see a Virtualized Server Kernel-Based Virtual Machine Presence in the CloudEnvironment VMware Mobile Virtualization Platform What It IsWhat It Is Collaboration Applications for Mobile Presence ProtocolsPermissive Federation Platforms Leveraging PresenceVerified Federation Text Messaging Presence EnabledEncrypted Federation iPhone Applications The Future of PresenceTrusted Federation BlackBerry Applications The Interrelation of Identity, Presence, andUsing XMPP in the Federated Environment Droid Applications Location in the CloudPresence in the Cloud Identity ManagementWhat It Is What It IsPresence Protocols line Future of Identity in the CloudLeveraging Presence Cloud Computing Defined Privacy and Its Relation to Cloud-BasedPresence Enabled Cloud Computing Architecture Information SystemsThe Future of Presence Cloud Computing Terms Personal InformationThe Interrelation of Identity, Presence, and Communication-as-a-Service (CaaS) Privacy-Related IssuesLocation in the Cloud Infrastructure-as-a-Service (IaaS) Finding Your Private Information Identity Management Monitoring-as-a-Service (MaaS) What It IsWhat It Is Software-as-a-Service (SaaS) Open Cloud Consortium Working GroupsFuture of Identity in the Cloud Platform-as-a-Service (PaaS) Project MatsuPrivacy and Its Relation to Cloud-Based Benefits and Limitations of Cloud Project CometInformation Systems Computing HPC in the CloudPersonal Information Benefits The Open Cloud TestbedPrivacy-Related Issues Limitations The Open Science Data CloudFinding Your Private Information Cloud Computing Case Studies Intercloud Testbed

Page 164: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What It Is How Companies Are Using Cloud Reporting on an Open Cloud ConsortiumOpen Cloud Consortium Working Groups Computing Working GroupProject Matsu Implementing Applications and Services Distributed Management Task ForceProject Comet in the Cloud (DMTF)HPC in the Cloud Using Your Company's Services vs. the What It Is?The Open Cloud Testbed Cloud Provider DMTK Working Groups Associated withThe Open Science Data Cloud A Cloud Service Provider Introduced Cloud ComputingIntercloud Testbed Cloud Computing Risks and Issues Standards for Application DevelopersReporting on an Open Cloud Consortium Products and Services Provided by Cloud ProtocolsWorking Group Computing Companies Scripting LanguagesDistributed Management Task Force Operational Content Formatting Standards and(DMTF) Economic LanguagesWhat It Is? Staffing Standards for Security in the CloudDMTK Working Groups Associated with Should Your Company Invest in Cloud Confidentiality, Integrity, AvailabilityCloud Computing Computing? Authentication, Authorization,Standards for Application Developers What Should Not be Moved to the Cloud AccountabilityProtocols Virtualization in Mainframe Architectures Regulations for PrivacyScripting Languages and Operating Systems Security ProtocolsContent Formatting Standards and LANs and the Cloud Establishing a Baseline for CloudLanguages Internet and the Cloud PerformanceStandards for Security in the Cloud Web Services, Browsers, and the Cloud Best Practices for Selecting a Vendor andConfidentiality, Integrity, Availability Thin Client Implementing Cloud-Based ApplicationsAuthentication, Authorization, Accountability Advances in Networking and Processing Choosing the Right VendorRegulations for Privacy Speeds that Led to Cloud Computing Implementing Cloud-Based Applications Security Protocols Networking Developments CitrixEstablishing a Baseline for Cloud Increased Processing Speeds Windows Remote DesktopPerformance Managed Service Provider Model to VncBest Practices for Selecting a Vendor and Cloud Computing and Software as a Web BrowsersImplementing Cloud-Based Applications Service (SaaS) Server ExtensionsChoosing the Right Vendor Single Purpose Architectures Migrate to Thin ClientsImplementing Cloud-Based Applications Multipurpose Architectures Smart Phones, Pads, Pods, etc.Citrix Data Center Virtualization Virtual Terminal Security Strengths andWindows Remote Desktop Collaboration WeaknessesVnc The Cloud as a Reach Extender StrengthsWeb Browsers The Cloud as a Communication Enabler Weaknesses Server Extensions The Cloud as an Employee Enabler iPhoneThin Clients Service-Oriented Architecture (SOA) AndroidSmart Phones, Pads, Pods, etc. Evolving from SOA to the Cloud BlackBerryVirtual Terminal Security Strengths and Capacity: Limited Performance Windows MobileWeaknesses Availability: Communications Failure and Ubuntu Mobile Internet DeviceStrengths Performance Issues Mobile Platform VirtualizationWeaknesses Security: Newer Security Protocols Kernel-Based Virtual MachineiPhone Provide More Protection VMware Mobile Virtualization PlatformAndroid What's Next in Cloud Computing Collaboration Applications for MobileBlackBerry Using Industry and International PlatformsWindows Mobile Standards Text MessagingUbuntu Mobile Internet Device Independent Components iPhone ApplicationsMobile Platform Virtualization Message Base BlackBerry ApplicationsKernel-Based Virtual Machine Location Independence Droid Applications VMware Mobile Virtualization Platform Communication Requirements for CloudCollaboration Applications for Mobile ImplementationPlatforms Public Internet lineText Messaging Private Internet Cloud Computing DefinediPhone Applications Routing to the Datacenter Cloud Computing ArchitectureBlackBerry Applications Switching within the Data Center Cloud Computing TermsDroid Applications Bandwidth Communication-as-a-Service (CaaS)

Tools Used to Measure Network Infrastructure-as-a-Service (IaaS)Performance Monitoring-as-a-Service (MaaS)

line Using the Protocol Analyzer to Measure Software-as-a-Service (SaaS)Cloud Computing Defined Bandwidth Platform-as-a-Service (PaaS)Cloud Computing Architecture Using Ping and Traceroute to Measure Benefits and Limitations of CloudCloud Computing Terms Network Performance ComputingCommunication-as-a-Service (CaaS) Security BenefitsInfrastructure-as-a-Service (IaaS) SSL LimitationsMonitoring-as-a-Service (MaaS) VPN Cloud Computing Case StudiesSoftware-as-a-Service (SaaS) Overhead How Companies Are Using Cloud

Page 165: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Platform-as-a-Service (PaaS) Storage Options for Cloud Computing ComputingBenefits and Limitations of Cloud Computing Storage Capacity Implementing Applications and Services inBenefits Data Protection and Partitioning the CloudLimitations NAS Using Your Company's Services vs. theCloud Computing Case Studies SAN Cloud ProviderHow Companies Are Using Cloud CAS A Cloud Service Provider IntroducedComputing Redundancy Cloud Computing Risks and Issues Implementing Applications and Services in Replication Products and Services Provided by Cloudthe Cloud Multisiting Computing Companies Using Your Company's Services vs. the Backup and Recovery OperationalCloud Provider Server Software Environments that EconomicA Cloud Service Provider Introduced Support Cloud Computing StaffingCloud Computing Risks and Issues Server Capacity Should Your Company Invest in CloudProducts and Services Provided by Cloud Virtualization Computing?Computing Companies Clustering What Should Not be Moved to the Cloud Operational Expansion Virtualization in Mainframe ArchitecturesEconomic Server Functions and Operating SystemsStaffing Application LANs and the CloudShould Your Company Invest in Cloud Web Internet and the CloudComputing? Database Web Services, Browsers, and the CloudWhat Should Not be Moved to the Cloud Vendor Approaches to Cloud Computing Thin ClientVirtualization in Mainframe Architectures Role of Open Source Software in Data Advances in Networking and Processingand Operating Systems Center Speeds that Led to Cloud ComputingLANs and the Cloud Cost Reduction vs. Reliability Networking DevelopmentsInternet and the Cloud Open Source Server Software Increased Processing SpeedsWeb Services, Browsers, and the Cloud Open Source Database Software Managed Service Provider Model to CloudThin Client Open Source Applications Software Computing and Software as a ServiceAdvances in Networking and Processing Open Source System Management (SaaS)Speeds that Led to Cloud Computing Software Single Purpose Architectures Migrate toNetworking Developments Open Source Load-Balancing Software Multipurpose ArchitecturesIncreased Processing Speeds The Hypervisor Data Center VirtualizationManaged Service Provider Model to Cloud Virtualization as the "Operating System" CollaborationComputing and Software as a Service Virtualization with a Host Operating The Cloud as a Reach Extender(SaaS) System The Cloud as a Communication EnablerSingle Purpose Architectures Migrate to Virtualization Infections on Virtualized The Cloud as an Employee EnablerMultipurpose Architectures Environments Service-Oriented Architecture (SOA)Data Center Virtualization Type 1 Virtualized Environment Evolving from SOA to the CloudCollaboration Type 2 Virtualized Environment Capacity: Limited PerformanceThe Cloud as a Reach Extender Virtualization Environments Availability: Communications Failure andThe Cloud as a Communication Enabler Microsoft Virtualization Performance IssuesThe Cloud as an Employee Enabler Sun xVM VirtualBox Security: Newer Security Protocols ProvideService-Oriented Architecture (SOA) Linux/UNIX Virtualization More ProtectionEvolving from SOA to the Cloud VMware Products What's Next in Cloud Computing Capacity: Limited Performance Data Center and Cloud Infrastructure Using Industry and International StandardsAvailability: Communications Failure and Products Independent ComponentsPerformance Issues End-User and Desktop Products Message BaseSecurity: Newer Security Protocols Provide IBM Virtualization Location IndependenceMore Protection Using VMware to see a Virtualized Server Communication Requirements for CloudWhat's Next in Cloud Computing Environment ImplementationUsing Industry and International Standards What It Is Public InternetIndependent Components Permissive Federation Private InternetMessage Base Verified Federation Routing to the DatacenterLocation Independence Encrypted Federation Switching within the Data CenterCommunication Requirements for Cloud Trusted Federation BandwidthImplementation Using XMPP in the Federated Tools Used to Measure NetworkPublic Internet Environment PerformancePrivate Internet Presence in the Cloud Using the Protocol Analyzer to MeasureRouting to the Datacenter What It Is BandwidthSwitching within the Data Center Presence Protocols Using Ping and Traceroute to MeasureBandwidth Leveraging Presence Network PerformanceTools Used to Measure Network Presence Enabled SecurityPerformance The Future of Presence SSLUsing the Protocol Analyzer to Measure The Interrelation of Identity, Presence, VPNBandwidth and Location in the Cloud OverheadUsing Ping and Traceroute to Measure Identity Management Storage Options for Cloud ComputingNetwork Performance What It Is Storage Capacity

Page 166: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Security Future of Identity in the Cloud Data Protection and PartitioningSSL Privacy and Its Relation to Cloud-Based NASVPN Information Systems SANOverhead Personal Information CASStorage Options for Cloud Computing Privacy-Related Issues RedundancyStorage Capacity Finding Your Private Information ReplicationData Protection and Partitioning What It Is MultisitingNAS Open Cloud Consortium Working Groups Backup and RecoverySAN Project Matsu Server Software Environments thatCAS Project Comet Support Cloud ComputingRedundancy HPC in the Cloud Server CapacityReplication The Open Cloud Testbed VirtualizationMultisiting The Open Science Data Cloud ClusteringBackup and Recovery Intercloud Testbed ExpansionServer Software Environments that Support Reporting on an Open Cloud Consortium Server FunctionsCloud Computing Working Group ApplicationServer Capacity Distributed Management Task Force WebVirtualization (DMTF) DatabaseClustering What It Is? Vendor Approaches to Cloud ComputingExpansion DMTK Working Groups Associated with Role of Open Source Software in DataServer Functions Cloud Computing CenterApplication Standards for Application Developers Cost Reduction vs. ReliabilityWeb Protocols Open Source Server SoftwareDatabase Scripting Languages Open Source Database SoftwareVendor Approaches to Cloud Computing Content Formatting Standards and Open Source Applications SoftwareRole of Open Source Software in Data Languages Open Source System ManagementCenter Standards for Security in the Cloud SoftwareCost Reduction vs. Reliability Confidentiality, Integrity, Availability Open Source Load-Balancing Software Open Source Server Software Authentication, Authorization, The HypervisorOpen Source Database Software Accountability Virtualization as the "Operating System"Open Source Applications Software Regulations for Privacy Virtualization with a Host OperatingOpen Source System Management Software Security Protocols SystemOpen Source Load-Balancing Software Establishing a Baseline for Cloud Virtualization Infections on VirtualizedThe Hypervisor Performance EnvironmentsVirtualization as the "Operating System" Best Practices for Selecting a Vendor Type 1 Virtualized EnvironmentVirtualization with a Host Operating System and Implementing Cloud-Based Type 2 Virtualized EnvironmentVirtualization Infections on Virtualized Applications Virtualization EnvironmentsEnvironments Choosing the Right Vendor Microsoft VirtualizationType 1 Virtualized Environment Implementing Cloud-Based Applications Sun xVM VirtualBoxType 2 Virtualized Environment Citrix Linux/UNIX VirtualizationVirtualization Environments Windows Remote Desktop VMware ProductsMicrosoft Virtualization Vnc Data Center and Cloud InfrastructureSun xVM VirtualBox Web Browsers ProductsLinux/UNIX Virtualization Server Extensions End-User and Desktop ProductsVMware Products Thin Clients IBM VirtualizationData Center and Cloud Infrastructure Smart Phones, Pads, Pods, etc. Using VMware to see a Virtualized ServerProducts Virtual Terminal Security Strengths and Environment End-User and Desktop Products Weaknesses What It IsIBM Virtualization Strengths Permissive FederationUsing VMware to see a Virtualized Server Weaknesses Verified FederationEnvironment iPhone Encrypted FederationWhat It Is Android Trusted FederationPermissive Federation BlackBerry Using XMPP in the Federated EnvironmentVerified Federation Windows Mobile Presence in the CloudEncrypted Federation Ubuntu Mobile Internet Device What It IsTrusted Federation Mobile Platform Virtualization Presence ProtocolsUsing XMPP in the Federated Environment Kernel-Based Virtual Machine Leveraging PresencePresence in the Cloud VMware Mobile Virtualization Platform Presence EnabledWhat It Is Collaboration Applications for Mobile The Future of PresencePresence Protocols Platforms The Interrelation of Identity, Presence, andLeveraging Presence Text Messaging Location in the CloudPresence Enabled iPhone Applications Identity ManagementThe Future of Presence BlackBerry Applications What It IsThe Interrelation of Identity, Presence, and Droid Applications Future of Identity in the CloudLocation in the Cloud Privacy and Its Relation to Cloud-BasedIdentity Management Information Systems

Page 167: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

What It Is line Personal InformationFuture of Identity in the Cloud Cloud Computing Defined Privacy-Related IssuesPrivacy and Its Relation to Cloud-Based Cloud Computing Architecture Finding Your Private Information Information Systems Cloud Computing Terms What It IsPersonal Information Communication-as-a-Service (CaaS) Open Cloud Consortium Working GroupsPrivacy-Related Issues Infrastructure-as-a-Service (IaaS) Project MatsuFinding Your Private Information Monitoring-as-a-Service (MaaS) Project CometWhat It Is Software-as-a-Service (SaaS) HPC in the CloudOpen Cloud Consortium Working Groups Platform-as-a-Service (PaaS) The Open Cloud TestbedProject Matsu Benefits and Limitations of Cloud The Open Science Data CloudProject Comet Computing Intercloud TestbedHPC in the Cloud Benefits Reporting on an Open Cloud ConsortiumThe Open Cloud Testbed Limitations Working GroupThe Open Science Data Cloud Cloud Computing Case Studies Distributed Management Task ForceIntercloud Testbed How Companies Are Using Cloud (DMTF)Reporting on an Open Cloud Consortium Computing What It Is?Working Group Implementing Applications and Services DMTK Working Groups Associated withDistributed Management Task Force in the Cloud Cloud Computing(DMTF) Using Your Company's Services vs. the Standards for Application DevelopersWhat It Is? Cloud Provider ProtocolsDMTK Working Groups Associated with A Cloud Service Provider Introduced Scripting LanguagesCloud Computing Cloud Computing Risks and Issues Content Formatting Standards andStandards for Application Developers Products and Services Provided by Cloud LanguagesProtocols Computing Companies Standards for Security in the CloudScripting Languages Operational Confidentiality, Integrity, AvailabilityContent Formatting Standards and Economic Authentication, Authorization,Languages Staffing AccountabilityStandards for Security in the Cloud Should Your Company Invest in Cloud Regulations for PrivacyConfidentiality, Integrity, Availability Computing? Security ProtocolsAuthentication, Authorization, Accountability What Should Not be Moved to the Cloud Establishing a Baseline for CloudRegulations for Privacy Virtualization in Mainframe Architectures PerformanceSecurity Protocols and Operating Systems Best Practices for Selecting a Vendor andEstablishing a Baseline for Cloud LANs and the Cloud Implementing Cloud-Based ApplicationsPerformance Internet and the Cloud Choosing the Right VendorBest Practices for Selecting a Vendor and Web Services, Browsers, and the Cloud Implementing Cloud-Based Applications Implementing Cloud-Based Applications Thin Client CitrixChoosing the Right Vendor Advances in Networking and Processing Windows Remote DesktopImplementing Cloud-Based Applications Speeds that Led to Cloud Computing VncCitrix Networking Developments Web BrowsersWindows Remote Desktop Increased Processing Speeds Server ExtensionsVnc Managed Service Provider Model to Thin ClientsWeb Browsers Cloud Computing and Software as a Smart Phones, Pads, Pods, etc.Server Extensions Service (SaaS) Virtual Terminal Security Strengths andThin Clients Single Purpose Architectures Migrate to WeaknessesSmart Phones, Pads, Pods, etc. Multipurpose Architectures StrengthsVirtual Terminal Security Strengths and Data Center Virtualization Weaknesses Weaknesses Collaboration iPhoneStrengths The Cloud as a Reach Extender AndroidWeaknesses The Cloud as a Communication Enabler BlackBerryiPhone The Cloud as an Employee Enabler Windows MobileAndroid Service-Oriented Architecture (SOA) Ubuntu Mobile Internet DeviceBlackBerry Evolving from SOA to the Cloud Mobile Platform VirtualizationWindows Mobile Capacity: Limited Performance Kernel-Based Virtual MachineUbuntu Mobile Internet Device Availability: Communications Failure and VMware Mobile Virtualization PlatformMobile Platform Virtualization Performance Issues Collaboration Applications for MobileKernel-Based Virtual Machine Security: Newer Security Protocols PlatformsVMware Mobile Virtualization Platform Provide More Protection Text MessagingCollaboration Applications for Mobile What's Next in Cloud Computing iPhone ApplicationsPlatforms Using Industry and International BlackBerry ApplicationsText Messaging Standards Droid Applications iPhone Applications Independent ComponentsBlackBerry Applications Message BaseDroid Applications Location Independence line

Communication Requirements for Cloud Cloud Computing DefinedImplementation Cloud Computing Architecture

line Public Internet Cloud Computing Terms

Page 168: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud Computing Defined Private Internet Communication-as-a-Service (CaaS)Cloud Computing Architecture Routing to the Datacenter Infrastructure-as-a-Service (IaaS)Cloud Computing Terms Switching within the Data Center Monitoring-as-a-Service (MaaS)Communication-as-a-Service (CaaS) Bandwidth Software-as-a-Service (SaaS)Infrastructure-as-a-Service (IaaS) Tools Used to Measure Network Platform-as-a-Service (PaaS)Monitoring-as-a-Service (MaaS) Performance Benefits and Limitations of CloudSoftware-as-a-Service (SaaS) Using the Protocol Analyzer to Measure ComputingPlatform-as-a-Service (PaaS) Bandwidth BenefitsBenefits and Limitations of Cloud Computing Using Ping and Traceroute to Measure LimitationsBenefits Network Performance Cloud Computing Case StudiesLimitations Security How Companies Are Using CloudCloud Computing Case Studies SSL ComputingHow Companies Are Using Cloud VPN Implementing Applications and Services inComputing Overhead the CloudImplementing Applications and Services in Storage Options for Cloud Computing Using Your Company's Services vs. thethe Cloud Storage Capacity Cloud ProviderUsing Your Company's Services vs. the Data Protection and Partitioning A Cloud Service Provider IntroducedCloud Provider NAS Cloud Computing Risks and Issues A Cloud Service Provider Introduced SAN Products and Services Provided by CloudCloud Computing Risks and Issues CAS Computing Companies Products and Services Provided by Cloud Redundancy OperationalComputing Companies Replication EconomicOperational Multisiting StaffingEconomic Backup and Recovery Should Your Company Invest in CloudStaffing Server Software Environments that Computing?Should Your Company Invest in Cloud Support Cloud Computing What Should Not be Moved to the Cloud Computing? Server Capacity Virtualization in Mainframe ArchitecturesWhat Should Not be Moved to the Cloud Virtualization and Operating SystemsVirtualization in Mainframe Architectures Clustering LANs and the Cloudand Operating Systems Expansion Internet and the CloudLANs and the Cloud Server Functions Web Services, Browsers, and the CloudInternet and the Cloud Application Thin ClientWeb Services, Browsers, and the Cloud Web Advances in Networking and ProcessingThin Client Database Speeds that Led to Cloud ComputingAdvances in Networking and Processing Vendor Approaches to Cloud Computing Networking DevelopmentsSpeeds that Led to Cloud Computing Role of Open Source Software in Data Increased Processing SpeedsNetworking Developments Center Managed Service Provider Model to CloudIncreased Processing Speeds Cost Reduction vs. Reliability Computing and Software as a ServiceManaged Service Provider Model to Cloud Open Source Server Software (SaaS)Computing and Software as a Service Open Source Database Software Single Purpose Architectures Migrate to(SaaS) Open Source Applications Software Multipurpose ArchitecturesSingle Purpose Architectures Migrate to Open Source System Management Data Center VirtualizationMultipurpose Architectures Software CollaborationData Center Virtualization Open Source Load-Balancing Software The Cloud as a Reach ExtenderCollaboration The Hypervisor The Cloud as a Communication EnablerThe Cloud as a Reach Extender Virtualization as the "Operating System" The Cloud as an Employee EnablerThe Cloud as a Communication Enabler Virtualization with a Host Operating Service-Oriented Architecture (SOA)The Cloud as an Employee Enabler System Evolving from SOA to the CloudService-Oriented Architecture (SOA) Virtualization Infections on Virtualized Capacity: Limited PerformanceEvolving from SOA to the Cloud Environments Availability: Communications Failure andCapacity: Limited Performance Type 1 Virtualized Environment Performance IssuesAvailability: Communications Failure and Type 2 Virtualized Environment Security: Newer Security Protocols ProvidePerformance Issues Virtualization Environments More ProtectionSecurity: Newer Security Protocols Provide Microsoft Virtualization What's Next in Cloud Computing More Protection Sun xVM VirtualBox Using Industry and International StandardsWhat's Next in Cloud Computing Linux/UNIX Virtualization Independent ComponentsUsing Industry and International Standards VMware Products Message BaseIndependent Components Data Center and Cloud Infrastructure Location IndependenceMessage Base Products Communication Requirements for CloudLocation Independence End-User and Desktop Products ImplementationCommunication Requirements for Cloud IBM Virtualization Public InternetImplementation Using VMware to see a Virtualized Server Private InternetPublic Internet Environment Routing to the DatacenterPrivate Internet What It Is Switching within the Data CenterRouting to the Datacenter Permissive Federation BandwidthSwitching within the Data Center Verified Federation Tools Used to Measure Network

Page 169: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Bandwidth Encrypted Federation PerformanceTools Used to Measure Network Trusted Federation Using the Protocol Analyzer to MeasurePerformance Using XMPP in the Federated BandwidthUsing the Protocol Analyzer to Measure Environment Using Ping and Traceroute to MeasureBandwidth Presence in the Cloud Network PerformanceUsing Ping and Traceroute to Measure What It Is SecurityNetwork Performance Presence Protocols SSLSecurity Leveraging Presence VPNSSL Presence Enabled OverheadVPN The Future of Presence Storage Options for Cloud ComputingOverhead The Interrelation of Identity, Presence, Storage CapacityStorage Options for Cloud Computing and Location in the Cloud Data Protection and PartitioningStorage Capacity Identity Management NASData Protection and Partitioning What It Is SANNAS Future of Identity in the Cloud CASSAN Privacy and Its Relation to Cloud-Based RedundancyCAS Information Systems ReplicationRedundancy Personal Information MultisitingReplication Privacy-Related Issues Backup and RecoveryMultisiting Finding Your Private Information Server Software Environments thatBackup and Recovery What It Is Support Cloud ComputingServer Software Environments that Support Open Cloud Consortium Working Groups Server CapacityCloud Computing Project Matsu VirtualizationServer Capacity Project Comet ClusteringVirtualization HPC in the Cloud ExpansionClustering The Open Cloud Testbed Server FunctionsExpansion The Open Science Data Cloud ApplicationServer Functions Intercloud Testbed WebApplication Reporting on an Open Cloud Consortium DatabaseWeb Working Group Vendor Approaches to Cloud ComputingDatabase Distributed Management Task Force Role of Open Source Software in DataVendor Approaches to Cloud Computing (DMTF) CenterRole of Open Source Software in Data What It Is? Cost Reduction vs. ReliabilityCenter DMTK Working Groups Associated with Open Source Server SoftwareCost Reduction vs. Reliability Cloud Computing Open Source Database SoftwareOpen Source Server Software Standards for Application Developers Open Source Applications SoftwareOpen Source Database Software Protocols Open Source System ManagementOpen Source Applications Software Scripting Languages SoftwareOpen Source System Management Software Content Formatting Standards and Open Source Load-Balancing Software Open Source Load-Balancing Software Languages The HypervisorThe Hypervisor Standards for Security in the Cloud Virtualization as the "Operating System"Virtualization as the "Operating System" Confidentiality, Integrity, Availability Virtualization with a Host OperatingVirtualization with a Host Operating System Authentication, Authorization, SystemVirtualization Infections on Virtualized Accountability Virtualization Infections on VirtualizedEnvironments Regulations for Privacy EnvironmentsType 1 Virtualized Environment Security Protocols Type 1 Virtualized EnvironmentType 2 Virtualized Environment Establishing a Baseline for Cloud Type 2 Virtualized EnvironmentVirtualization Environments Performance Virtualization EnvironmentsMicrosoft Virtualization Best Practices for Selecting a Vendor Microsoft VirtualizationSun xVM VirtualBox and Implementing Cloud-Based Sun xVM VirtualBoxLinux/UNIX Virtualization Applications Linux/UNIX VirtualizationVMware Products Choosing the Right Vendor VMware ProductsData Center and Cloud Infrastructure Implementing Cloud-Based Applications Data Center and Cloud InfrastructureProducts Citrix ProductsEnd-User and Desktop Products Windows Remote Desktop End-User and Desktop ProductsIBM Virtualization Vnc IBM VirtualizationUsing VMware to see a Virtualized Server Web Browsers Using VMware to see a Virtualized ServerEnvironment Server Extensions Environment What It Is Thin Clients What It IsPermissive Federation Smart Phones, Pads, Pods, etc. Permissive FederationVerified Federation Virtual Terminal Security Strengths and Verified FederationEncrypted Federation Weaknesses Encrypted FederationTrusted Federation Strengths Trusted FederationUsing XMPP in the Federated Environment Weaknesses Using XMPP in the Federated EnvironmentPresence in the Cloud iPhone Presence in the CloudWhat It Is Android What It Is

Page 170: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Presence Protocols BlackBerry Presence ProtocolsLeveraging Presence Windows Mobile Leveraging PresencePresence Enabled Ubuntu Mobile Internet Device Presence EnabledThe Future of Presence Mobile Platform Virtualization The Future of PresenceThe Interrelation of Identity, Presence, and Kernel-Based Virtual Machine The Interrelation of Identity, Presence, andLocation in the Cloud VMware Mobile Virtualization Platform Location in the CloudIdentity Management Collaboration Applications for Mobile Identity ManagementWhat It Is Platforms What It IsFuture of Identity in the Cloud Text Messaging Future of Identity in the CloudPrivacy and Its Relation to Cloud-Based iPhone Applications Privacy and Its Relation to Cloud-BasedInformation Systems BlackBerry Applications Information SystemsPersonal Information Droid Applications Personal InformationPrivacy-Related Issues Privacy-Related IssuesFinding Your Private Information Finding Your Private Information What It Is line What It IsOpen Cloud Consortium Working Groups Cloud Computing Defined Open Cloud Consortium Working GroupsProject Matsu Cloud Computing Architecture Project MatsuProject Comet Cloud Computing Terms Project CometHPC in the Cloud Communication-as-a-Service (CaaS) HPC in the CloudThe Open Cloud Testbed Infrastructure-as-a-Service (IaaS) The Open Cloud TestbedThe Open Science Data Cloud Monitoring-as-a-Service (MaaS) The Open Science Data CloudIntercloud Testbed Software-as-a-Service (SaaS) Intercloud TestbedReporting on an Open Cloud Consortium Platform-as-a-Service (PaaS) Reporting on an Open Cloud ConsortiumWorking Group Benefits and Limitations of Cloud Working GroupDistributed Management Task Force Computing Distributed Management Task Force(DMTF) Benefits (DMTF)What It Is? Limitations What It Is?DMTK Working Groups Associated with Cloud Computing Case Studies DMTK Working Groups Associated withCloud Computing How Companies Are Using Cloud Cloud ComputingStandards for Application Developers Computing Standards for Application DevelopersProtocols Implementing Applications and Services ProtocolsScripting Languages in the Cloud Scripting LanguagesContent Formatting Standards and Using Your Company's Services vs. the Content Formatting Standards andLanguages Cloud Provider LanguagesStandards for Security in the Cloud A Cloud Service Provider Introduced Standards for Security in the CloudConfidentiality, Integrity, Availability Cloud Computing Risks and Issues Confidentiality, Integrity, AvailabilityAuthentication, Authorization, Accountability Products and Services Provided by Cloud Authentication, Authorization,Regulations for Privacy Computing Companies AccountabilitySecurity Protocols Operational Regulations for PrivacyEstablishing a Baseline for Cloud Economic Security ProtocolsPerformance Staffing Establishing a Baseline for CloudBest Practices for Selecting a Vendor and Should Your Company Invest in Cloud PerformanceImplementing Cloud-Based Applications Computing? Best Practices for Selecting a Vendor andChoosing the Right Vendor What Should Not be Moved to the Cloud Implementing Cloud-Based ApplicationsImplementing Cloud-Based Applications Virtualization in Mainframe Architectures Choosing the Right VendorCitrix and Operating Systems Implementing Cloud-Based Applications Windows Remote Desktop LANs and the Cloud CitrixVnc Internet and the Cloud Windows Remote DesktopWeb Browsers Web Services, Browsers, and the Cloud VncServer Extensions Thin Client Web BrowsersThin Clients Advances in Networking and Processing Server ExtensionsSmart Phones, Pads, Pods, etc. Speeds that Led to Cloud Computing Thin ClientsVirtual Terminal Security Strengths and Networking Developments Smart Phones, Pads, Pods, etc.Weaknesses Increased Processing Speeds Virtual Terminal Security Strengths andStrengths Managed Service Provider Model to WeaknessesWeaknesses Cloud Computing and Software as a StrengthsiPhone Service (SaaS) Weaknesses Android Single Purpose Architectures Migrate to iPhoneBlackBerry Multipurpose Architectures AndroidWindows Mobile Data Center Virtualization BlackBerryUbuntu Mobile Internet Device Collaboration Windows MobileMobile Platform Virtualization The Cloud as a Reach Extender Ubuntu Mobile Internet DeviceKernel-Based Virtual Machine The Cloud as a Communication Enabler Mobile Platform VirtualizationVMware Mobile Virtualization Platform The Cloud as an Employee Enabler Kernel-Based Virtual MachineCollaboration Applications for Mobile Service-Oriented Architecture (SOA) VMware Mobile Virtualization PlatformPlatforms Evolving from SOA to the Cloud Collaboration Applications for Mobile

Page 171: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Text Messaging Capacity: Limited Performance PlatformsiPhone Applications Availability: Communications Failure and Text MessagingBlackBerry Applications Performance Issues iPhone ApplicationsDroid Applications Security: Newer Security Protocols BlackBerry Applications

Provide More Protection Droid Applications What's Next in Cloud Computing

line Using Industry and InternationalCloud Computing Defined Standards lineCloud Computing Architecture Independent Components Cloud Computing DefinedCloud Computing Terms Message Base Cloud Computing ArchitectureCommunication-as-a-Service (CaaS) Location Independence Cloud Computing TermsInfrastructure-as-a-Service (IaaS) Communication Requirements for Cloud Communication-as-a-Service (CaaS)Monitoring-as-a-Service (MaaS) Implementation Infrastructure-as-a-Service (IaaS)Software-as-a-Service (SaaS) Public Internet Monitoring-as-a-Service (MaaS)Platform-as-a-Service (PaaS) Private Internet Software-as-a-Service (SaaS)Benefits and Limitations of Cloud Computing Routing to the Datacenter Platform-as-a-Service (PaaS)Benefits Switching within the Data Center Benefits and Limitations of CloudLimitations Bandwidth ComputingCloud Computing Case Studies Tools Used to Measure Network BenefitsHow Companies Are Using Cloud Performance LimitationsComputing Using the Protocol Analyzer to Measure Cloud Computing Case StudiesImplementing Applications and Services in Bandwidth How Companies Are Using Cloudthe Cloud Using Ping and Traceroute to Measure ComputingUsing Your Company's Services vs. the Network Performance Implementing Applications and Services inCloud Provider Security the CloudA Cloud Service Provider Introduced SSL Using Your Company's Services vs. theCloud Computing Risks and Issues VPN Cloud ProviderProducts and Services Provided by Cloud Overhead A Cloud Service Provider IntroducedComputing Companies Storage Options for Cloud Computing Cloud Computing Risks and Issues Operational Storage Capacity Products and Services Provided by CloudEconomic Data Protection and Partitioning Computing Companies Staffing NAS OperationalShould Your Company Invest in Cloud SAN EconomicComputing? CAS StaffingWhat Should Not be Moved to the Cloud Redundancy Should Your Company Invest in CloudVirtualization in Mainframe Architectures Replication Computing?and Operating Systems Multisiting What Should Not be Moved to the Cloud LANs and the Cloud Backup and Recovery Virtualization in Mainframe ArchitecturesInternet and the Cloud Server Software Environments that and Operating SystemsWeb Services, Browsers, and the Cloud Support Cloud Computing LANs and the CloudThin Client Server Capacity Internet and the CloudAdvances in Networking and Processing Virtualization Web Services, Browsers, and the CloudSpeeds that Led to Cloud Computing Clustering Thin ClientNetworking Developments Expansion Advances in Networking and ProcessingIncreased Processing Speeds Server Functions Speeds that Led to Cloud ComputingManaged Service Provider Model to Cloud Application Networking DevelopmentsComputing and Software as a Service Web Increased Processing Speeds(SaaS) Database Managed Service Provider Model to CloudSingle Purpose Architectures Migrate to Vendor Approaches to Cloud Computing Computing and Software as a ServiceMultipurpose Architectures Role of Open Source Software in Data (SaaS)Data Center Virtualization Center Single Purpose Architectures Migrate toCollaboration Cost Reduction vs. Reliability Multipurpose ArchitecturesThe Cloud as a Reach Extender Open Source Server Software Data Center VirtualizationThe Cloud as a Communication Enabler Open Source Database Software CollaborationThe Cloud as an Employee Enabler Open Source Applications Software The Cloud as a Reach ExtenderService-Oriented Architecture (SOA) Open Source System Management The Cloud as a Communication EnablerEvolving from SOA to the Cloud Software The Cloud as an Employee EnablerCapacity: Limited Performance Open Source Load-Balancing Software Service-Oriented Architecture (SOA)Availability: Communications Failure and The Hypervisor Evolving from SOA to the CloudPerformance Issues Virtualization as the "Operating System" Capacity: Limited PerformanceSecurity: Newer Security Protocols Provide Virtualization with a Host Operating Availability: Communications Failure andMore Protection System Performance IssuesWhat's Next in Cloud Computing Virtualization Infections on Virtualized Security: Newer Security Protocols ProvideUsing Industry and International Standards Environments More ProtectionIndependent Components Type 1 Virtualized Environment What's Next in Cloud Computing Message Base Type 2 Virtualized Environment Using Industry and International Standards

Page 172: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Location Independence Virtualization Environments Independent ComponentsCommunication Requirements for Cloud Microsoft Virtualization Message BaseImplementation Sun xVM VirtualBox Location IndependencePublic Internet Linux/UNIX Virtualization Communication Requirements for CloudPrivate Internet VMware Products ImplementationRouting to the Datacenter Data Center and Cloud Infrastructure Public InternetSwitching within the Data Center Products Private InternetBandwidth End-User and Desktop Products Routing to the DatacenterTools Used to Measure Network IBM Virtualization Switching within the Data CenterPerformance Using VMware to see a Virtualized Server BandwidthUsing the Protocol Analyzer to Measure Environment Tools Used to Measure NetworkBandwidth What It Is PerformanceUsing Ping and Traceroute to Measure Permissive Federation Using the Protocol Analyzer to MeasureNetwork Performance Verified Federation BandwidthSecurity Encrypted Federation Using Ping and Traceroute to MeasureSSL Trusted Federation Network PerformanceVPN Using XMPP in the Federated SecurityOverhead Environment SSLStorage Options for Cloud Computing Presence in the Cloud VPNStorage Capacity What It Is OverheadData Protection and Partitioning Presence Protocols Storage Options for Cloud ComputingNAS Leveraging Presence Storage CapacitySAN Presence Enabled Data Protection and PartitioningCAS The Future of Presence NASRedundancy The Interrelation of Identity, Presence, SANReplication and Location in the Cloud CASMultisiting Identity Management RedundancyBackup and Recovery What It Is ReplicationServer Software Environments that Support Future of Identity in the Cloud MultisitingCloud Computing Privacy and Its Relation to Cloud-Based Backup and RecoveryServer Capacity Information Systems Server Software Environments thatVirtualization Personal Information Support Cloud ComputingClustering Privacy-Related Issues Server CapacityExpansion Finding Your Private Information VirtualizationServer Functions What It Is ClusteringApplication Open Cloud Consortium Working Groups ExpansionWeb Project Matsu Server FunctionsDatabase Project Comet ApplicationVendor Approaches to Cloud Computing HPC in the Cloud WebRole of Open Source Software in Data The Open Cloud Testbed DatabaseCenter The Open Science Data Cloud Vendor Approaches to Cloud ComputingCost Reduction vs. Reliability Intercloud Testbed Role of Open Source Software in DataOpen Source Server Software Reporting on an Open Cloud Consortium CenterOpen Source Database Software Working Group Cost Reduction vs. ReliabilityOpen Source Applications Software Distributed Management Task Force Open Source Server SoftwareOpen Source System Management Software (DMTF) Open Source Database SoftwareOpen Source Load-Balancing Software What It Is? Open Source Applications SoftwareThe Hypervisor DMTK Working Groups Associated with Open Source System ManagementVirtualization as the "Operating System" Cloud Computing SoftwareVirtualization with a Host Operating System Standards for Application Developers Open Source Load-Balancing Software Virtualization Infections on Virtualized Protocols The HypervisorEnvironments Scripting Languages Virtualization as the "Operating System"Type 1 Virtualized Environment Content Formatting Standards and Virtualization with a Host OperatingType 2 Virtualized Environment Languages SystemVirtualization Environments Standards for Security in the Cloud Virtualization Infections on VirtualizedMicrosoft Virtualization Confidentiality, Integrity, Availability EnvironmentsSun xVM VirtualBox Authentication, Authorization, Type 1 Virtualized EnvironmentLinux/UNIX Virtualization Accountability Type 2 Virtualized EnvironmentVMware Products Regulations for Privacy Virtualization EnvironmentsData Center and Cloud Infrastructure Security Protocols Microsoft VirtualizationProducts Establishing a Baseline for Cloud Sun xVM VirtualBoxEnd-User and Desktop Products Performance Linux/UNIX VirtualizationIBM Virtualization Best Practices for Selecting a Vendor VMware ProductsUsing VMware to see a Virtualized Server and Implementing Cloud-Based Data Center and Cloud InfrastructureEnvironment Applications ProductsWhat It Is Choosing the Right Vendor End-User and Desktop Products

Page 173: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Permissive Federation Implementing Cloud-Based Applications IBM VirtualizationVerified Federation Citrix Using VMware to see a Virtualized ServerEncrypted Federation Windows Remote Desktop Environment Trusted Federation Vnc What It IsUsing XMPP in the Federated Environment Web Browsers Permissive FederationPresence in the Cloud Server Extensions Verified FederationWhat It Is Thin Clients Encrypted FederationPresence Protocols Smart Phones, Pads, Pods, etc. Trusted FederationLeveraging Presence Virtual Terminal Security Strengths and Using XMPP in the Federated EnvironmentPresence Enabled Weaknesses Presence in the CloudThe Future of Presence Strengths What It IsThe Interrelation of Identity, Presence, and Weaknesses Presence ProtocolsLocation in the Cloud iPhone Leveraging PresenceIdentity Management Android Presence EnabledWhat It Is BlackBerry The Future of PresenceFuture of Identity in the Cloud Windows Mobile The Interrelation of Identity, Presence, andPrivacy and Its Relation to Cloud-Based Ubuntu Mobile Internet Device Location in the CloudInformation Systems Mobile Platform Virtualization Identity ManagementPersonal Information Kernel-Based Virtual Machine What It IsPrivacy-Related Issues VMware Mobile Virtualization Platform Future of Identity in the CloudFinding Your Private Information Collaboration Applications for Mobile Privacy and Its Relation to Cloud-BasedWhat It Is Platforms Information SystemsOpen Cloud Consortium Working Groups Text Messaging Personal InformationProject Matsu iPhone Applications Privacy-Related IssuesProject Comet BlackBerry Applications Finding Your Private Information HPC in the Cloud Droid Applications What It IsThe Open Cloud Testbed Open Cloud Consortium Working GroupsThe Open Science Data Cloud Project MatsuIntercloud Testbed line Project CometReporting on an Open Cloud Consortium Cloud Computing Defined HPC in the CloudWorking Group Cloud Computing Architecture The Open Cloud TestbedDistributed Management Task Force Cloud Computing Terms The Open Science Data Cloud(DMTF) Communication-as-a-Service (CaaS) Intercloud TestbedWhat It Is? Infrastructure-as-a-Service (IaaS) Reporting on an Open Cloud ConsortiumDMTK Working Groups Associated with Monitoring-as-a-Service (MaaS) Working GroupCloud Computing Software-as-a-Service (SaaS) Distributed Management Task ForceStandards for Application Developers Platform-as-a-Service (PaaS) (DMTF)Protocols Benefits and Limitations of Cloud What It Is?Scripting Languages Computing DMTK Working Groups Associated withContent Formatting Standards and Benefits Cloud ComputingLanguages Limitations Standards for Application DevelopersStandards for Security in the Cloud Cloud Computing Case Studies ProtocolsConfidentiality, Integrity, Availability How Companies Are Using Cloud Scripting LanguagesAuthentication, Authorization, Accountability Computing Content Formatting Standards andRegulations for Privacy Implementing Applications and Services LanguagesSecurity Protocols in the Cloud Standards for Security in the CloudEstablishing a Baseline for Cloud Using Your Company's Services vs. the Confidentiality, Integrity, AvailabilityPerformance Cloud Provider Authentication, Authorization,Best Practices for Selecting a Vendor and A Cloud Service Provider Introduced AccountabilityImplementing Cloud-Based Applications Cloud Computing Risks and Issues Regulations for PrivacyChoosing the Right Vendor Products and Services Provided by Cloud Security ProtocolsImplementing Cloud-Based Applications Computing Companies Establishing a Baseline for CloudCitrix Operational PerformanceWindows Remote Desktop Economic Best Practices for Selecting a Vendor andVnc Staffing Implementing Cloud-Based ApplicationsWeb Browsers Should Your Company Invest in Cloud Choosing the Right VendorServer Extensions Computing? Implementing Cloud-Based Applications Thin Clients What Should Not be Moved to the Cloud CitrixSmart Phones, Pads, Pods, etc. Virtualization in Mainframe Architectures Windows Remote DesktopVirtual Terminal Security Strengths and and Operating Systems VncWeaknesses LANs and the Cloud Web BrowsersStrengths Internet and the Cloud Server ExtensionsWeaknesses Web Services, Browsers, and the Cloud Thin ClientsiPhone Thin Client Smart Phones, Pads, Pods, etc.Android Advances in Networking and Processing Virtual Terminal Security Strengths andBlackBerry Speeds that Led to Cloud Computing Weaknesses

Page 174: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Windows Mobile Networking Developments StrengthsUbuntu Mobile Internet Device Increased Processing Speeds Weaknesses Mobile Platform Virtualization Managed Service Provider Model to iPhoneKernel-Based Virtual Machine Cloud Computing and Software as a AndroidVMware Mobile Virtualization Platform Service (SaaS) BlackBerryCollaboration Applications for Mobile Single Purpose Architectures Migrate to Windows MobilePlatforms Multipurpose Architectures Ubuntu Mobile Internet DeviceText Messaging Data Center Virtualization Mobile Platform VirtualizationiPhone Applications Collaboration Kernel-Based Virtual MachineBlackBerry Applications The Cloud as a Reach Extender VMware Mobile Virtualization PlatformDroid Applications The Cloud as a Communication Enabler Collaboration Applications for Mobile

The Cloud as an Employee Enabler PlatformsService-Oriented Architecture (SOA) Text Messaging

line Evolving from SOA to the Cloud iPhone ApplicationsCloud Computing Defined Capacity: Limited Performance BlackBerry ApplicationsCloud Computing Architecture Availability: Communications Failure and Droid Applications Cloud Computing Terms Performance IssuesCommunication-as-a-Service (CaaS) Security: Newer Security ProtocolsInfrastructure-as-a-Service (IaaS) Provide More Protection lineMonitoring-as-a-Service (MaaS) What's Next in Cloud Computing Cloud Computing DefinedSoftware-as-a-Service (SaaS) Using Industry and International Cloud Computing ArchitecturePlatform-as-a-Service (PaaS) Standards Cloud Computing TermsBenefits and Limitations of Cloud Computing Independent Components Communication-as-a-Service (CaaS)Benefits Message Base Infrastructure-as-a-Service (IaaS)Limitations Location Independence Monitoring-as-a-Service (MaaS)Cloud Computing Case Studies Communication Requirements for Cloud Software-as-a-Service (SaaS)How Companies Are Using Cloud Implementation Platform-as-a-Service (PaaS)Computing Public Internet Benefits and Limitations of CloudImplementing Applications and Services in Private Internet Computingthe Cloud Routing to the Datacenter BenefitsUsing Your Company's Services vs. the Switching within the Data Center LimitationsCloud Provider Bandwidth Cloud Computing Case StudiesA Cloud Service Provider Introduced Tools Used to Measure Network How Companies Are Using CloudCloud Computing Risks and Issues Performance ComputingProducts and Services Provided by Cloud Using the Protocol Analyzer to Measure Implementing Applications and Services inComputing Companies Bandwidth the CloudOperational Using Ping and Traceroute to Measure Using Your Company's Services vs. theEconomic Network Performance Cloud ProviderStaffing Security A Cloud Service Provider IntroducedShould Your Company Invest in Cloud SSL Cloud Computing Risks and Issues Computing? VPN Products and Services Provided by CloudWhat Should Not be Moved to the Cloud Overhead Computing Companies Virtualization in Mainframe Architectures Storage Options for Cloud Computing Operationaland Operating Systems Storage Capacity EconomicLANs and the Cloud Data Protection and Partitioning StaffingInternet and the Cloud NAS Should Your Company Invest in CloudWeb Services, Browsers, and the Cloud SAN Computing?Thin Client CAS What Should Not be Moved to the Cloud Advances in Networking and Processing Redundancy Virtualization in Mainframe ArchitecturesSpeeds that Led to Cloud Computing Replication and Operating SystemsNetworking Developments Multisiting LANs and the CloudIncreased Processing Speeds Backup and Recovery Internet and the CloudManaged Service Provider Model to Cloud Server Software Environments that Web Services, Browsers, and the CloudComputing and Software as a Service Support Cloud Computing Thin Client(SaaS) Server Capacity Advances in Networking and ProcessingSingle Purpose Architectures Migrate to Virtualization Speeds that Led to Cloud ComputingMultipurpose Architectures Clustering Networking DevelopmentsData Center Virtualization Expansion Increased Processing SpeedsCollaboration Server Functions Managed Service Provider Model to CloudThe Cloud as a Reach Extender Application Computing and Software as a ServiceThe Cloud as a Communication Enabler Web (SaaS)The Cloud as an Employee Enabler Database Single Purpose Architectures Migrate toService-Oriented Architecture (SOA) Vendor Approaches to Cloud Computing Multipurpose ArchitecturesEvolving from SOA to the Cloud Role of Open Source Software in Data Data Center VirtualizationCapacity: Limited Performance Center CollaborationAvailability: Communications Failure and Cost Reduction vs. Reliability The Cloud as a Reach Extender

Page 175: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Performance Issues Open Source Server Software The Cloud as a Communication EnablerSecurity: Newer Security Protocols Provide Open Source Database Software The Cloud as an Employee EnablerMore Protection Open Source Applications Software Service-Oriented Architecture (SOA)What's Next in Cloud Computing Open Source System Management Evolving from SOA to the CloudUsing Industry and International Standards Software Capacity: Limited PerformanceIndependent Components Open Source Load-Balancing Software Availability: Communications Failure andMessage Base The Hypervisor Performance IssuesLocation Independence Virtualization as the "Operating System" Security: Newer Security Protocols ProvideCommunication Requirements for Cloud Virtualization with a Host Operating More ProtectionImplementation System What's Next in Cloud Computing Public Internet Virtualization Infections on Virtualized Using Industry and International StandardsPrivate Internet Environments Independent ComponentsRouting to the Datacenter Type 1 Virtualized Environment Message BaseSwitching within the Data Center Type 2 Virtualized Environment Location IndependenceBandwidth Virtualization Environments Communication Requirements for CloudTools Used to Measure Network Microsoft Virtualization ImplementationPerformance Sun xVM VirtualBox Public InternetUsing the Protocol Analyzer to Measure Linux/UNIX Virtualization Private InternetBandwidth VMware Products Routing to the DatacenterUsing Ping and Traceroute to Measure Data Center and Cloud Infrastructure Switching within the Data CenterNetwork Performance Products BandwidthSecurity End-User and Desktop Products Tools Used to Measure NetworkSSL IBM Virtualization PerformanceVPN Using VMware to see a Virtualized Server Using the Protocol Analyzer to MeasureOverhead Environment BandwidthStorage Options for Cloud Computing What It Is Using Ping and Traceroute to MeasureStorage Capacity Permissive Federation Network PerformanceData Protection and Partitioning Verified Federation SecurityNAS Encrypted Federation SSLSAN Trusted Federation VPNCAS Using XMPP in the Federated OverheadRedundancy Environment Storage Options for Cloud ComputingReplication Presence in the Cloud Storage CapacityMultisiting What It Is Data Protection and PartitioningBackup and Recovery Presence Protocols NASServer Software Environments that Support Leveraging Presence SANCloud Computing Presence Enabled CASServer Capacity The Future of Presence RedundancyVirtualization The Interrelation of Identity, Presence, ReplicationClustering and Location in the Cloud MultisitingExpansion Identity Management Backup and RecoveryServer Functions What It Is Server Software Environments thatApplication Future of Identity in the Cloud Support Cloud ComputingWeb Privacy and Its Relation to Cloud-Based Server CapacityDatabase Information Systems VirtualizationVendor Approaches to Cloud Computing Personal Information ClusteringRole of Open Source Software in Data Privacy-Related Issues ExpansionCenter Finding Your Private Information Server FunctionsCost Reduction vs. Reliability What It Is ApplicationOpen Source Server Software Open Cloud Consortium Working Groups WebOpen Source Database Software Project Matsu DatabaseOpen Source Applications Software Project Comet Vendor Approaches to Cloud ComputingOpen Source System Management Software HPC in the Cloud Role of Open Source Software in DataOpen Source Load-Balancing Software The Open Cloud Testbed CenterThe Hypervisor The Open Science Data Cloud Cost Reduction vs. ReliabilityVirtualization as the "Operating System" Intercloud Testbed Open Source Server SoftwareVirtualization with a Host Operating System Reporting on an Open Cloud Consortium Open Source Database SoftwareVirtualization Infections on Virtualized Working Group Open Source Applications SoftwareEnvironments Distributed Management Task Force Open Source System ManagementType 1 Virtualized Environment (DMTF) SoftwareType 2 Virtualized Environment What It Is? Open Source Load-Balancing Software Virtualization Environments DMTK Working Groups Associated with The HypervisorMicrosoft Virtualization Cloud Computing Virtualization as the "Operating System"Sun xVM VirtualBox Standards for Application Developers Virtualization with a Host OperatingLinux/UNIX Virtualization Protocols SystemVMware Products Scripting Languages Virtualization Infections on Virtualized

Page 176: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Data Center and Cloud Infrastructure Content Formatting Standards and EnvironmentsProducts Languages Type 1 Virtualized EnvironmentEnd-User and Desktop Products Standards for Security in the Cloud Type 2 Virtualized EnvironmentIBM Virtualization Confidentiality, Integrity, Availability Virtualization EnvironmentsUsing VMware to see a Virtualized Server Authentication, Authorization, Microsoft VirtualizationEnvironment Accountability Sun xVM VirtualBoxWhat It Is Regulations for Privacy Linux/UNIX VirtualizationPermissive Federation Security Protocols VMware ProductsVerified Federation Establishing a Baseline for Cloud Data Center and Cloud InfrastructureEncrypted Federation Performance ProductsTrusted Federation Best Practices for Selecting a Vendor End-User and Desktop ProductsUsing XMPP in the Federated Environment and Implementing Cloud-Based IBM VirtualizationPresence in the Cloud Applications Using VMware to see a Virtualized ServerWhat It Is Choosing the Right Vendor Environment Presence Protocols Implementing Cloud-Based Applications What It IsLeveraging Presence Citrix Permissive FederationPresence Enabled Windows Remote Desktop Verified FederationThe Future of Presence Vnc Encrypted FederationThe Interrelation of Identity, Presence, and Web Browsers Trusted FederationLocation in the Cloud Server Extensions Using XMPP in the Federated EnvironmentIdentity Management Thin Clients Presence in the CloudWhat It Is Smart Phones, Pads, Pods, etc. What It IsFuture of Identity in the Cloud Virtual Terminal Security Strengths and Presence ProtocolsPrivacy and Its Relation to Cloud-Based Weaknesses Leveraging PresenceInformation Systems Strengths Presence EnabledPersonal Information Weaknesses The Future of PresencePrivacy-Related Issues iPhone The Interrelation of Identity, Presence, andFinding Your Private Information Android Location in the CloudWhat It Is BlackBerry Identity ManagementOpen Cloud Consortium Working Groups Windows Mobile What It IsProject Matsu Ubuntu Mobile Internet Device Future of Identity in the CloudProject Comet Mobile Platform Virtualization Privacy and Its Relation to Cloud-BasedHPC in the Cloud Kernel-Based Virtual Machine Information SystemsThe Open Cloud Testbed VMware Mobile Virtualization Platform Personal InformationThe Open Science Data Cloud Collaboration Applications for Mobile Privacy-Related IssuesIntercloud Testbed Platforms Finding Your Private Information Reporting on an Open Cloud Consortium Text Messaging What It IsWorking Group iPhone Applications Open Cloud Consortium Working GroupsDistributed Management Task Force BlackBerry Applications Project Matsu(DMTF) Droid Applications Project CometWhat It Is? HPC in the CloudDMTK Working Groups Associated with The Open Cloud TestbedCloud Computing line The Open Science Data CloudStandards for Application Developers Cloud Computing Defined Intercloud TestbedProtocols Cloud Computing Architecture Reporting on an Open Cloud ConsortiumScripting Languages Cloud Computing Terms Working GroupContent Formatting Standards and Communication-as-a-Service (CaaS) Distributed Management Task ForceLanguages Infrastructure-as-a-Service (IaaS) (DMTF)Standards for Security in the Cloud Monitoring-as-a-Service (MaaS) What It Is?Confidentiality, Integrity, Availability Software-as-a-Service (SaaS) DMTK Working Groups Associated withAuthentication, Authorization, Accountability Platform-as-a-Service (PaaS) Cloud ComputingRegulations for Privacy Benefits and Limitations of Cloud Standards for Application DevelopersSecurity Protocols Computing ProtocolsEstablishing a Baseline for Cloud Benefits Scripting LanguagesPerformance Limitations Content Formatting Standards andBest Practices for Selecting a Vendor and Cloud Computing Case Studies LanguagesImplementing Cloud-Based Applications How Companies Are Using Cloud Standards for Security in the CloudChoosing the Right Vendor Computing Confidentiality, Integrity, AvailabilityImplementing Cloud-Based Applications Implementing Applications and Services Authentication, Authorization,Citrix in the Cloud AccountabilityWindows Remote Desktop Using Your Company's Services vs. the Regulations for PrivacyVnc Cloud Provider Security ProtocolsWeb Browsers A Cloud Service Provider Introduced Establishing a Baseline for CloudServer Extensions Cloud Computing Risks and Issues PerformanceThin Clients Products and Services Provided by Cloud Best Practices for Selecting a Vendor andSmart Phones, Pads, Pods, etc. Computing Companies Implementing Cloud-Based Applications

Page 177: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtual Terminal Security Strengths and Operational Choosing the Right VendorWeaknesses Economic Implementing Cloud-Based Applications Strengths Staffing CitrixWeaknesses Should Your Company Invest in Cloud Windows Remote DesktopiPhone Computing? VncAndroid What Should Not be Moved to the Cloud Web BrowsersBlackBerry Virtualization in Mainframe Architectures Server ExtensionsWindows Mobile and Operating Systems Thin ClientsUbuntu Mobile Internet Device LANs and the Cloud Smart Phones, Pads, Pods, etc.Mobile Platform Virtualization Internet and the Cloud Virtual Terminal Security Strengths andKernel-Based Virtual Machine Web Services, Browsers, and the Cloud WeaknessesVMware Mobile Virtualization Platform Thin Client StrengthsCollaboration Applications for Mobile Advances in Networking and Processing Weaknesses Platforms Speeds that Led to Cloud Computing iPhoneText Messaging Networking Developments AndroidiPhone Applications Increased Processing Speeds BlackBerryBlackBerry Applications Managed Service Provider Model to Windows MobileDroid Applications Cloud Computing and Software as a Ubuntu Mobile Internet Device

Service (SaaS) Mobile Platform VirtualizationSingle Purpose Architectures Migrate to Kernel-Based Virtual MachineMultipurpose Architectures VMware Mobile Virtualization PlatformData Center Virtualization Collaboration Applications for MobileCollaboration PlatformsThe Cloud as a Reach Extender Text MessagingThe Cloud as a Communication Enabler iPhone ApplicationsThe Cloud as an Employee Enabler BlackBerry ApplicationsService-Oriented Architecture (SOA) Droid Applications Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure and linePerformance Issues Cloud Computing DefinedSecurity: Newer Security Protocols Cloud Computing ArchitectureProvide More Protection Cloud Computing TermsWhat's Next in Cloud Computing Communication-as-a-Service (CaaS)Using Industry and International Infrastructure-as-a-Service (IaaS)Standards Monitoring-as-a-Service (MaaS)Independent Components Software-as-a-Service (SaaS)Message Base Platform-as-a-Service (PaaS)Location Independence Benefits and Limitations of CloudCommunication Requirements for Cloud ComputingImplementation BenefitsPublic Internet LimitationsPrivate Internet Cloud Computing Case StudiesRouting to the Datacenter How Companies Are Using CloudSwitching within the Data Center ComputingBandwidth Implementing Applications and Services inTools Used to Measure Network the CloudPerformance Using Your Company's Services vs. theUsing the Protocol Analyzer to Measure Cloud ProviderBandwidth A Cloud Service Provider IntroducedUsing Ping and Traceroute to Measure Cloud Computing Risks and Issues Network Performance Products and Services Provided by CloudSecurity Computing Companies SSL OperationalVPN EconomicOverhead StaffingStorage Options for Cloud Computing Should Your Company Invest in CloudStorage Capacity Computing?Data Protection and Partitioning What Should Not be Moved to the Cloud NAS Virtualization in Mainframe ArchitecturesSAN and Operating SystemsCAS LANs and the CloudRedundancy Internet and the CloudReplication Web Services, Browsers, and the CloudMultisiting Thin ClientBackup and Recovery Advances in Networking and Processing

Page 178: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Server Software Environments that Speeds that Led to Cloud ComputingSupport Cloud Computing Networking DevelopmentsServer Capacity Increased Processing SpeedsVirtualization Managed Service Provider Model to CloudClustering Computing and Software as a ServiceExpansion (SaaS)Server Functions Single Purpose Architectures Migrate toApplication Multipurpose ArchitecturesWeb Data Center VirtualizationDatabase CollaborationVendor Approaches to Cloud Computing The Cloud as a Reach ExtenderRole of Open Source Software in Data The Cloud as a Communication EnablerCenter The Cloud as an Employee EnablerCost Reduction vs. Reliability Service-Oriented Architecture (SOA)Open Source Server Software Evolving from SOA to the CloudOpen Source Database Software Capacity: Limited PerformanceOpen Source Applications Software Availability: Communications Failure andOpen Source System Management Performance IssuesSoftware Security: Newer Security Protocols ProvideOpen Source Load-Balancing Software More ProtectionThe Hypervisor What's Next in Cloud Computing Virtualization as the "Operating System" Using Industry and International StandardsVirtualization with a Host Operating Independent ComponentsSystem Message BaseVirtualization Infections on Virtualized Location IndependenceEnvironments Communication Requirements for CloudType 1 Virtualized Environment ImplementationType 2 Virtualized Environment Public InternetVirtualization Environments Private InternetMicrosoft Virtualization Routing to the DatacenterSun xVM VirtualBox Switching within the Data CenterLinux/UNIX Virtualization BandwidthVMware Products Tools Used to Measure NetworkData Center and Cloud Infrastructure PerformanceProducts Using the Protocol Analyzer to MeasureEnd-User and Desktop Products BandwidthIBM Virtualization Using Ping and Traceroute to MeasureUsing VMware to see a Virtualized Server Network PerformanceEnvironment SecurityWhat It Is SSLPermissive Federation VPNVerified Federation OverheadEncrypted Federation Storage Options for Cloud ComputingTrusted Federation Storage CapacityUsing XMPP in the Federated Data Protection and PartitioningEnvironment NASPresence in the Cloud SANWhat It Is CASPresence Protocols RedundancyLeveraging Presence ReplicationPresence Enabled MultisitingThe Future of Presence Backup and RecoveryThe Interrelation of Identity, Presence, Server Software Environments thatand Location in the Cloud Support Cloud ComputingIdentity Management Server CapacityWhat It Is VirtualizationFuture of Identity in the Cloud ClusteringPrivacy and Its Relation to Cloud-Based ExpansionInformation Systems Server FunctionsPersonal Information ApplicationPrivacy-Related Issues WebFinding Your Private Information DatabaseWhat It Is Vendor Approaches to Cloud ComputingOpen Cloud Consortium Working Groups Role of Open Source Software in DataProject Matsu CenterProject Comet Cost Reduction vs. Reliability

Page 179: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

HPC in the Cloud Open Source Server SoftwareThe Open Cloud Testbed Open Source Database SoftwareThe Open Science Data Cloud Open Source Applications SoftwareIntercloud Testbed Open Source System ManagementReporting on an Open Cloud Consortium SoftwareWorking Group Open Source Load-Balancing Software Distributed Management Task Force The Hypervisor(DMTF) Virtualization as the "Operating System"What It Is? Virtualization with a Host OperatingDMTK Working Groups Associated with SystemCloud Computing Virtualization Infections on VirtualizedStandards for Application Developers EnvironmentsProtocols Type 1 Virtualized EnvironmentScripting Languages Type 2 Virtualized EnvironmentContent Formatting Standards and Virtualization EnvironmentsLanguages Microsoft VirtualizationStandards for Security in the Cloud Sun xVM VirtualBoxConfidentiality, Integrity, Availability Linux/UNIX VirtualizationAuthentication, Authorization, VMware ProductsAccountability Data Center and Cloud InfrastructureRegulations for Privacy ProductsSecurity Protocols End-User and Desktop ProductsEstablishing a Baseline for Cloud IBM VirtualizationPerformance Using VMware to see a Virtualized ServerBest Practices for Selecting a Vendor Environment and Implementing Cloud-Based What It IsApplications Permissive FederationChoosing the Right Vendor Verified FederationImplementing Cloud-Based Applications Encrypted FederationCitrix Trusted FederationWindows Remote Desktop Using XMPP in the Federated EnvironmentVnc Presence in the CloudWeb Browsers What It IsServer Extensions Presence ProtocolsThin Clients Leveraging PresenceSmart Phones, Pads, Pods, etc. Presence EnabledVirtual Terminal Security Strengths and The Future of PresenceWeaknesses The Interrelation of Identity, Presence, andStrengths Location in the CloudWeaknesses Identity ManagementiPhone What It IsAndroid Future of Identity in the CloudBlackBerry Privacy and Its Relation to Cloud-BasedWindows Mobile Information SystemsUbuntu Mobile Internet Device Personal InformationMobile Platform Virtualization Privacy-Related IssuesKernel-Based Virtual Machine Finding Your Private Information VMware Mobile Virtualization Platform What It IsCollaboration Applications for Mobile Open Cloud Consortium Working GroupsPlatforms Project MatsuText Messaging Project CometiPhone Applications HPC in the CloudBlackBerry Applications The Open Cloud TestbedDroid Applications The Open Science Data Cloud

Intercloud TestbedReporting on an Open Cloud Consortium

line Working GroupCloud Computing Defined Distributed Management Task ForceCloud Computing Architecture (DMTF)Cloud Computing Terms What It Is?Communication-as-a-Service (CaaS) DMTK Working Groups Associated withInfrastructure-as-a-Service (IaaS) Cloud ComputingMonitoring-as-a-Service (MaaS) Standards for Application DevelopersSoftware-as-a-Service (SaaS) ProtocolsPlatform-as-a-Service (PaaS) Scripting LanguagesBenefits and Limitations of Cloud Content Formatting Standards and

Page 180: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Computing LanguagesBenefits Standards for Security in the CloudLimitations Confidentiality, Integrity, AvailabilityCloud Computing Case Studies Authentication, Authorization,How Companies Are Using Cloud AccountabilityComputing Regulations for PrivacyImplementing Applications and Services Security Protocolsin the Cloud Establishing a Baseline for CloudUsing Your Company's Services vs. the PerformanceCloud Provider Best Practices for Selecting a Vendor andA Cloud Service Provider Introduced Implementing Cloud-Based ApplicationsCloud Computing Risks and Issues Choosing the Right VendorProducts and Services Provided by Cloud Implementing Cloud-Based Applications Computing Companies CitrixOperational Windows Remote DesktopEconomic VncStaffing Web BrowsersShould Your Company Invest in Cloud Server ExtensionsComputing? Thin ClientsWhat Should Not be Moved to the Cloud Smart Phones, Pads, Pods, etc.Virtualization in Mainframe Architectures Virtual Terminal Security Strengths andand Operating Systems WeaknessesLANs and the Cloud StrengthsInternet and the Cloud Weaknesses Web Services, Browsers, and the Cloud iPhoneThin Client AndroidAdvances in Networking and Processing BlackBerrySpeeds that Led to Cloud Computing Windows MobileNetworking Developments Ubuntu Mobile Internet DeviceIncreased Processing Speeds Mobile Platform VirtualizationManaged Service Provider Model to Kernel-Based Virtual MachineCloud Computing and Software as a VMware Mobile Virtualization PlatformService (SaaS) Collaboration Applications for MobileSingle Purpose Architectures Migrate to PlatformsMultipurpose Architectures Text MessagingData Center Virtualization iPhone ApplicationsCollaboration BlackBerry ApplicationsThe Cloud as a Reach Extender Droid Applications The Cloud as a Communication EnablerThe Cloud as an Employee EnablerService-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More ProtectionWhat's Next in Cloud Computing Using Industry and InternationalStandardsIndependent ComponentsMessage BaseLocation IndependenceCommunication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork Performance

Page 181: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

SecuritySSLVPNOverheadStorage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisitingBackup and RecoveryServer Software Environments thatSupport Cloud ComputingServer CapacityVirtualizationClusteringExpansionServer FunctionsApplicationWebDatabaseVendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software The HypervisorVirtualization as the "Operating System"Virtualization with a Host OperatingSystemVirtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized EnvironmentVirtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop ProductsIBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment What It IsPermissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironmentPresence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of Presence

Page 182: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Interrelation of Identity, Presence,and Location in the CloudIdentity ManagementWhat It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information What It IsOpen Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking GroupDistributed Management Task Force(DMTF)What It Is?DMTK Working Groups Associated withCloud ComputingStandards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications CitrixWindows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses iPhoneAndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatformsText MessagingiPhone Applications

Page 183: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

BlackBerry ApplicationsDroid Applications

lineCloud Computing DefinedCloud Computing ArchitectureCloud Computing TermsCommunication-as-a-Service (CaaS)Infrastructure-as-a-Service (IaaS)Monitoring-as-a-Service (MaaS)Software-as-a-Service (SaaS)Platform-as-a-Service (PaaS)Benefits and Limitations of CloudComputingBenefitsLimitationsCloud Computing Case StudiesHow Companies Are Using CloudComputingImplementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider IntroducedCloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies OperationalEconomicStaffingShould Your Company Invest in CloudComputing?What Should Not be Moved to the Cloud Virtualization in Mainframe Architecturesand Operating SystemsLANs and the CloudInternet and the CloudWeb Services, Browsers, and the CloudThin ClientAdvances in Networking and ProcessingSpeeds that Led to Cloud ComputingNetworking DevelopmentsIncreased Processing SpeedsManaged Service Provider Model toCloud Computing and Software as aService (SaaS)Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center VirtualizationCollaborationThe Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee EnablerService-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More ProtectionWhat's Next in Cloud Computing Using Industry and InternationalStandardsIndependent ComponentsMessage Base

Page 184: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Location IndependenceCommunication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork PerformanceSecuritySSLVPNOverheadStorage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisitingBackup and RecoveryServer Software Environments thatSupport Cloud ComputingServer CapacityVirtualizationClusteringExpansionServer FunctionsApplicationWebDatabaseVendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software The HypervisorVirtualization as the "Operating System"Virtualization with a Host OperatingSystemVirtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized EnvironmentVirtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop ProductsIBM VirtualizationUsing VMware to see a Virtualized Server

Page 185: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Environment What It IsPermissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironmentPresence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the CloudIdentity ManagementWhat It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information What It IsOpen Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking GroupDistributed Management Task Force(DMTF)What It Is?DMTK Working Groups Associated withCloud ComputingStandards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications CitrixWindows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknesses

Page 186: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

StrengthsWeaknesses iPhoneAndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry ApplicationsDroid Applications

lineCloud Computing DefinedCloud Computing ArchitectureCloud Computing TermsCommunication-as-a-Service (CaaS)Infrastructure-as-a-Service (IaaS)Monitoring-as-a-Service (MaaS)Software-as-a-Service (SaaS)Platform-as-a-Service (PaaS)Benefits and Limitations of CloudComputingBenefitsLimitationsCloud Computing Case StudiesHow Companies Are Using CloudComputingImplementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider IntroducedCloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies OperationalEconomicStaffingShould Your Company Invest in CloudComputing?What Should Not be Moved to the Cloud Virtualization in Mainframe Architecturesand Operating SystemsLANs and the CloudInternet and the CloudWeb Services, Browsers, and the CloudThin ClientAdvances in Networking and ProcessingSpeeds that Led to Cloud ComputingNetworking DevelopmentsIncreased Processing SpeedsManaged Service Provider Model toCloud Computing and Software as aService (SaaS)Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center VirtualizationCollaborationThe Cloud as a Reach Extender

Page 187: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

The Cloud as a Communication EnablerThe Cloud as an Employee EnablerService-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More ProtectionWhat's Next in Cloud Computing Using Industry and InternationalStandardsIndependent ComponentsMessage BaseLocation IndependenceCommunication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork PerformanceSecuritySSLVPNOverheadStorage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisitingBackup and RecoveryServer Software Environments thatSupport Cloud ComputingServer CapacityVirtualizationClusteringExpansionServer FunctionsApplicationWebDatabaseVendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software The HypervisorVirtualization as the "Operating System"Virtualization with a Host OperatingSystem

Page 188: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Virtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized EnvironmentVirtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop ProductsIBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment What It IsPermissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironmentPresence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the CloudIdentity ManagementWhat It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information What It IsOpen Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking GroupDistributed Management Task Force(DMTF)What It Is?DMTK Working Groups Associated withCloud ComputingStandards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformance

Page 189: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Best Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications CitrixWindows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses iPhoneAndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry ApplicationsDroid Applications

lineCloud Computing DefinedCloud Computing ArchitectureCloud Computing TermsCommunication-as-a-Service (CaaS)Infrastructure-as-a-Service (IaaS)Monitoring-as-a-Service (MaaS)Software-as-a-Service (SaaS)Platform-as-a-Service (PaaS)Benefits and Limitations of CloudComputingBenefitsLimitationsCloud Computing Case StudiesHow Companies Are Using CloudComputingImplementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider IntroducedCloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies OperationalEconomicStaffingShould Your Company Invest in CloudComputing?What Should Not be Moved to the Cloud Virtualization in Mainframe Architecturesand Operating SystemsLANs and the CloudInternet and the Cloud

Page 190: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Web Services, Browsers, and the CloudThin ClientAdvances in Networking and ProcessingSpeeds that Led to Cloud ComputingNetworking DevelopmentsIncreased Processing SpeedsManaged Service Provider Model toCloud Computing and Software as aService (SaaS)Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center VirtualizationCollaborationThe Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee EnablerService-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More ProtectionWhat's Next in Cloud Computing Using Industry and InternationalStandardsIndependent ComponentsMessage BaseLocation IndependenceCommunication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork PerformanceSecuritySSLVPNOverheadStorage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisitingBackup and RecoveryServer Software Environments thatSupport Cloud ComputingServer CapacityVirtualizationClusteringExpansionServer FunctionsApplicationWebDatabase

Page 191: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Vendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software The HypervisorVirtualization as the "Operating System"Virtualization with a Host OperatingSystemVirtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized EnvironmentVirtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop ProductsIBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment What It IsPermissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironmentPresence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the CloudIdentity ManagementWhat It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information What It IsOpen Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking GroupDistributed Management Task Force(DMTF)What It Is?DMTK Working Groups Associated with

Page 192: Cloud Computing Essentials · Cloud Computing Essentials ... gk3210

GK3210 www.globalknowledge.com/en-ae/ [email protected] 00 971 4 446 4987

Cloud ComputingStandards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications CitrixWindows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses iPhoneAndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry ApplicationsDroid Applications

Further Information:

For More information, or to book your course, please call us on 00 971 4 446 4987

[email protected]

www.globalknowledge.com/en-ae/

Global Knowledge, Dubai Knowledge Village, Block 2A,First Floor, Office F68, Dubai, UAE


Recommended