The cloud conference stream
The Cloud Conference stream featured presentations on architecting for cloud and cloud security, and included a panel discussion on the considerations that must be made when choosing a cloud solution.
In the first session of the morning, we had two presentations on architecting for cloud. Both considered TOGAF as the architectural context. The first, from Stuart Boardman of Getronics, explored the conceptual difference that cloud makes to enterprise architecture, and the challenge of communicating an architecture vision and discussing the issues with stakeholders in the subsequent TOGAF phases.
The second, from Serge Thorn of Architecting the Enterprise, looked at the considerations in each TOGAF phase, but in a more specific way. The two presentations showed different approaches to similar subject matter, which proved a very stimulating combination.
This session was followed by a presentation from Steve Else of EA Principals in which he shared several use cases related to cloud computing. Using these, he discussed solution architecture considerations, and put forward the lessons learned and some recommendations for more successful planning, decision-making, and execution.
We then had the first of the day's security-related presentations. It was given by Omkhar Arasaratnam of IBM and Stuart Boardman of Getronics. It summarized the purpose and scope of the Security for the Cloud and SOA project that is being conducted in The Open Group as a joint project of The Open Group's Cloud Computing Work Group, the SOA Work Group, and Security Forum. Omkhar and Stuart described the usage scenarios that the project team is studying to guide its thinking, the concepts that it is developing, and the conclusions that it has reached so far.
The first session of the afternoon was started by Ed Harrington of Architecting the Enterprise, who gave an interesting presentation on current U.S. Federal Government thinking on enterprise architecture, showing clearly the importance of cloud computing to U.S. Government plans.
The U.S. is a leader in the use of IT for government and administration, so we can expect that its conclusions - that cloud computing is already making its way into the government computing fabric, and that enterprise architecture, instantiated as SOA and properly governed, will provide the greatest possibility of success in its implementation - will have a global impact.
We then had a panel session, moderated by Dana Gardner with his usual insight and aplomb, that explored the considerations that must be made when choosing a cloud solution — custom or shrink-wrapped — and whether different forms of cloud computing are appropriate to different industry sectors.
The panelists represented different players in the cloud solutions market - customers, providers, and consultants - so that the topic was covered in depth and from a variety of viewpoints. They were Penelope Gordon of 1Plug Corp., Mark Skilton of Capgemini, Ed Harrington of Architecting the Enterprise, Tom Plunkett of Oracle, and TJ Virdi of the Boeing Co.
In the final session of the conference stream, we returned to the topic of cloud security. Paul Simmonds, a member of the Board of the Jericho Forum, gave an excellent presentation on de-risking the cloud through effective risk management, in which he explained the approach that the Jericho Forum has developed. The session was then concluded by Andres Kohn of Proofpoint, who addressed the question of whether data can be more secure in the cloud, considering public, private and hybrid cloud environment.
The CloudCamp was hosted by The Open Group but run as a separate event, facilitated by CloudCamp organizer Dave Nielsen. There were around 150-200 participants, including conference delegates and other people from the San Diego area who happened to be interested in the cloud.
Dave started by going through his definition of cloud computing. Perhaps he should have known better - starting a discussion on terminology and definitions can be a dangerous thing to do with an Open Group audience. He quickly got into a good-natured argument from which he eventually emerged a little bloodied, metaphorically speaking, but unbowed.
We then had eight "lightning talks". These were five-minute presentations covering a wide range of topics, including how to get started with cloud (Margaret Dawson, Hubspan), supplier/consumer relationship (Brian Loesgen, Microsoft), cloud-based geographical mapping (Ming-Hsiang Tsou, San Diego University), a patterns-based approach to cloud (Ken Klingensmith, IBM), efficient large-scale data processing (Alex Rasmussen, San Diego University), using desktop spare capacity as a cloud resource (Michael Krumpe, Intelligent Technology Integration), cost-effective large-scale data processing in the cloud (Patrick Salami, Temboo), and cloud-based voice and data communication (Chris Matthieu, Tropo).
The participants then split into groups to discuss topics proposed by volunteers. There were eight topics altogether. Some of these were simply explanations of particular products or services offered by the volunteers' companies. Others related to areas of general interest such as data security and access control, life-changing cloud applications, and success stories relating to "big data".
I joined the groups discussing cloud software development on Amazon Web Services (AWS) and Microsoft Azure. These sessions had excellent information content which would be valuable to anyone wishing to get started in - or who is already engaged in - software development on these platforms.
They also brought out two points of general interest. The first is that the dividing line between IaaS and PaaS can be very thin. AWS and Azure are, in theory, on opposite sides of this divide; in practice they provide the developer with broadly similar capabilities. The second point is that in practice your preferred programming language and software environment is likely to be the determining factor in your choice of cloud development platform.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more