Chat with us, powered by LiveChat Select the case from chapter 8 and complete the written exercise. Case 8-3 Hyper-V (Jamsa page 115) Review case 8-3 and complete the exercise. Provide a minimum of 2 references to s - Writeedu

Select the case from chapter 8 and complete the written exercise. Case 8-3 Hyper-V (Jamsa page 115) Review case 8-3 and complete the exercise. Provide a minimum of 2 references to s

 

 Research Paper Requirements:

  • Paper length: 2 pages
  • APA

Part 1: Hypervisors (1 page)

Select the case from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security (1 page)

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support.

World
Headquarters

Jones
&
Bartlett
Learning

5
Wall
Street

Burlington,
MA
01803

978-443-5000

[email protected]

www.jblearning.com

Jones
&
Bartlett
Learning
books
and
products
are
avail- able
through
most
bookstores
and
online
booksellers.
To contact
Jones
&
Bartlett
Learning
directly,
call
800-832- 0034,
fax
978-443-8000,
or
visit
our
website, www.jblearning.com.

Substantial
discounts
on
bulk
quantities
of
Jones
& Bartlett
Learning
publications
are
available
to
corpora- tions,
professional
associations,
and
other
qualified
orga- nizations.
For
details
and
specific
discount
information, contact
the
special
sales
department
at
Jones
&
Bartlett Learning
via
the
above
contact
information
or
send
an email
to
[email protected]

Copyright
©
2013
by
Jones
&
Bartlett
Learning,
LLC,
an Ascend
Learning
Company

All
rights
reserved.
No
part
of
the
material
protected
by this
copyright
may
be
reproduced
or
utilized
in
any
form, electronic
or
mechanical,
including
photocopying, recording,
or
by
any
information
storage
and
retrieval system,
without
written
permission
from
the
copyright owner.
Microsoft,
HealthVault,
Windows
Live,
Bing, Hotmail,
MSN,
and
SkyDrive
are
either
registered
trade- marks
or
trademarks
of
Microsoft
Corporation
in
the United
States
and/or
other
countries.
Additional
photo- graphic
and
illustration
credits
appear
on
page
321
which constitutes
a
continuation
of
the
copyright
page.

This
publication
is
designed
to
provide
accurate
and
au- thoritative
information
in
regard
to
the
subject
matter covered.
It
is
sold
with
the
understanding
that
the
pub- lisher
is
not
engaged
in
rendering
legal,
accounting,
or

other
professional
service.
If
legal
advice
or
other
expert assistance
is
required,
the
service
of
a
competent
profes- sional
person
should
be
sought.

Cloud
Computing
is
an
independent
publication
and
has not
been
authorized,
sponsored,
or
otherwise
approved by
the
owners
of
the
trademarks
or
service
marks
refer- enced
in
this
product.

Production
Credits

Chief
Executive
Officer:
Ty
Field

President:
James
Homer

SVP,
Editor-in-Chief:
Michael
Johnson

SVP,
Chief
Technology
Officer:
Dean
Fossella

SVP,
Chief
Marketing
Officer:
Alison
M.
Pendergast

SVP,
Curriculum
Solutions:
Christopher
Will

VP,
Design
and
Production:
Anne
Spencer

Editorial
Management:
High
Stakes
Writing,
LLC,
Editor and
Publisher:
Lawrence
J.
Goodrich

Copy
Editor,
HSW:
Ruth
Walker

Reprints
and
Special
Projects
Manager:
Susan
Schultz

Production
Editor:
Keith
Henry

Senior
Marketing
Manager:
Andrea
DeFronzo

VP,
Business
Development:
Todd
Giorza

Marketing
Manager:
Lindsay
White

VP,
Manufacturing
and
Inventory
Control:
Therese Connell

Manufacturing
and
Inventory
Control
Supervisor:
Amy Bacus

Composition:
Cenveo
Publisher
Services

Cover
Design:
Kristin
E.
Parker

Rights
&
Photo
Research
Manager:
Katherine
Crighton

Rights
&
Photo
Research
Assistant:
Lian
Bruno

Cover
Image:
©
majeczka/ShutterStock,
Inc.

Chapter
Opener
Image:
©
Risto
Viita/ShutterStock,
Inc.

Printing
and
Binding:
Edwards
Brothers
Malloy

Cover
Printing:
Edwards
Brothers
Malloy

Library
of
Congress
Cataloging­in­Publication Data

Jamsa,
Kris
A.

Cloud
computing
/
Kris
Jamsa.—1st
ed.

   p.
cm.

Includes
index.

ISBN
978-1-4496-4739-1

1.
Cloud
computing.
I.
Title.

QA76.585.J36
2012

004.6782—dc23

2011051300

6048

Printed
in
the
United
States
of
America

16 15 14 13 12   10 9 8 7 6 5 4 3 2 1

To
Ashton,

May
all
your
clouds
have
a
silver
lining.

Brief
Contents

Preface

Chapter
1


Introducing
Cloud
Computing

Chapter
2


Software
as
a
Service
(SaaS)

Chapter
3


Platform
as
a
Service
(PaaS)

Chapter
4


Infrastructure
as
a
Service
(IaaS)

Chapter
5


Identity
as
a
Service
(IDaaS)

Chapter
6


Data
Storage
in
the
Cloud

Chapter
7


Collaboration
in
the
Cloud

Chapter
8


Virtualization

Chapter
9


Securing
the
Cloud

Chapter
10

Disaster
Recovery
and
Business
Con­ tinuity
and
the
Cloud

Chapter
11

Service­Oriented
Architecture

Chapter
12

Managing
the
Cloud

Chapter
13

Migrating
to
the
Cloud

Chapter
14

Mobile
Cloud
Computing

Chapter
15

Governing
the
Cloud

Chapter
16

Evaluating
the
Cloud’s
Business
Im­ pact
and
Economics

Chapter
17

Designing
Cloud­Based
Solutions

Chapter
18

Coding
Cloud­Based
Applications

Chapter
19

Application
Scalability

Chapter
20

The
Future
of
the
Cloud

Glossary
of
Key
Terms

Index

Credits

Contents

Preface

Chapter
1


Introducing
Cloud
Computing

Web
2.0
and
the
Cloud

Distinguishing
Cloud
Types

Cloud
Deployment
Models

Cloud
Service
Models

Exploring
Uses
of
the
Cloud

Introducing
Scalability

Introducing
Virtualization

Collecting
Processing
Power
Through
Grid Computing

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
2


Software
as
a
Service
(SaaS)

Getting
Started
with
SaaS

Understanding
the
Multitenant
Nature
of
SaaS Solutions

Understanding
OpenSaaS
Solutions

Understanding
Mashups

Understanding
Service­Oriented
Architecture (SOA)

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
3


Platform
as
a
Service
(PaaS)

IT
Evolution
Leading
to
the
Cloud

Benefits
of
PaaS
Solutions

Disadvantages
of
PaaS
Solutions

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
4


Infrastructure
as
a
Service
(IaaS)

Understanding
IaaS

Improving
Performance
Through
Load Balancing

Taking
a
Closer
Look
at
Load
Balancing

System
and
Storage
Redundancy

Utilizing
Cloud­Based
NAS
Devices

Advantages
of
IaaS
Solutions

Server
Types
Within
an
IaaS
Solution

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
5


Identity
as
a
Service
(IDaaS)

Understanding
Single
Sign­On
(SSO)

Understanding
How
SSO
Works

Understanding
Federated
Identity
Management

Understanding
Account
Provisioning

Understanding
OpenID

Mobile
ID
Management

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
6


Data
Storage
in
the
Cloud

Examining
the
Evolution
of
Network
Storage

Understanding
Cloud­Based
Data
Storage

Advantages
and
Disadvantages
of
Cloud­Based Data
Storage

Getting
Past
the
Fear
of
Cloud­Based
Data

Cloud­Based
Backup
Systems

Understanding
File
Systems

Industry­Specific
Cloud­Based
Data
Storage

Cloud­Based
Database
Solutions

Cloud­Based
Block
Storage

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
7


Collaboration
in
the
Cloud

Collaborating
in
the
Clouds

Questions
to
Ask
About
Collaborative
Tools

Web­Based
Collaboration
Began
with
Web
Mail

Instant
Messaging
Isn’t
What
It
Used
to
Be

Cloud­Based
Phone
and
Fax
Systems

Revisiting
File
Sharing

Editing
Shared
Files
Within
the
Cloud

Collaborating
via
Web
Logs
(Blogs)

Collaborative
Meetings
in
the
Cloud

Virtual
Presentations
and
Lectures

Using
Social
Media
for
Collaboration

Using
Cloud­Based
Calendar
Management

Using
Streaming
Video
Content
to
Collaborate

Cloud­Based
TV
Content

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
8


Virtualization

Understanding
Virtualization

The
History
of
Virtualization

Leveraging
Blade
Servers

Server
Virtualization

Desktop
Virtualization

Desktop
Solutions
on
Demand

Virtual
Networks

Data
Storage
Virtualization

Not
All
Applications
Are
Well
Suited
for Virtualization

Why
Virtualize?

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
9


Securing
the
Cloud

General
Security
Advantages
of
Cloud­Based Solutions

Introducing
Business
Continuity
and
Disaster Recovery

Understanding
Data
Storage
Wiping

Understanding
Distributed
Denial­of­Service
(DDoS) Attacks

Packet
Sniffing

Man­in­the­Middle
Attack

Monitoring
Device
Screens

Malicious
Employees

Hypervisor
Attack

Guest­Hopping
Attack

SQL­Injection
Attack

Physical
Security

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
10


Disaster
Recovery
and
Business Continuity
and
the
Cloud

Understanding
the
Threats

Threat:
Disk
Failure

Threat:
Power
Failure
or
Disruption

Threat:
Computer
Viruses

Threat:
Fire

Threat:
Floods

Threat:
Disgruntled
Employees

Threat:
Lost
Equipment

Threat:
Desktop
Failure

Threat:
Server
Failure

Threat:
Network
Failure

Threat:
Database
System
Failure

Threat:
Phone
System
Failure

Understanding
Service­Level
Agreements

Measuring
Business
Impact:
The
Essence
of
Risk Mitigation

Disaster
Recovery
Plan
Template

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
11


Service­Oriented
Architecture

Understanding
Service­Oriented
Architecture

Web
Services
Are
Not
Web
Pages

Many
Companies
Provide
Web
Services

Discovering
Web
Services

Understanding
Web
Service
Performance

Web
Service
and
Reuse

Scaling
Web
Services

Web
Services
and
Loose
Coupling

Treating
a
Web
Service
as
a
Black
Box

Web
Service
Interoperability

Web
Service
Description
Language

Governing
Web
Services

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
12


Managing
the
Cloud

Know
Your
Service­Level
Agreement

Ensure
and
Audit
System
Backups

Know
Your
System’s
Data
Flow

Beware
of
Vendor
Lock­In

Source­Code
Escrow

Determine
Technical
Support
and
Help
Desk Procedures

Determine
Training
Procedures

Know
the
Provider’s
Security
Policies
and Procedures

Define
the
Data
Privacy
Requirements

Know
Specifics
About
the
Economics
of
the Cloud
and
Return
on
Investment

Monitor
Capacity
Planning
and
Scaling Capabilities

Monitor
Audit­Log
Use

Solution
Testing
and
Validation

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
13


Migrating
to
the
Cloud

Define
the
System
Goals
and
Requirements

Protect
Your
Existing
Data

Use
an
Experienced
Cloud
Consultant

Know
Your
Application’s
Current
Characteristics

Remember
Vendor
Lock­In

Define
Your
Training
Requirements

Establish
a
Realistic
Deployment
Schedule

Review
the
Budget
Factors

Identify
IT
Governance
Issues

Understanding
Cloud
Bursting

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
14


Mobile
Cloud
Computing

The
Evolution
of
Mobile
Computing

Understanding
the
G
in
3G
and
4G

The
Mobile
Cloud
Ecosystem

Introducing
the
Mobile
Players

Pages,
Apps,
and
Widgets

Revisiting
the
Role
of
HTML

Mobile
Development
Considerations

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
15


Governing
the
Cloud

Understanding
Corporate
Governance

Understanding
Business
Strategy

Measure
What
Is
Important

Inspect
What
You
Expect

Understanding
Internal
Controls

Extending
Governance
to
Information Technology

Cloud
Computing
Governance

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
16


Evaluating
the
Cloud’s
Business
Im­ pact
and
Economics

Business
Economics

Total
Cost
of
Ownership

Economies
of
Scale

Capital
Expenditures

Operational
Expenses

Return
on
Investment

Profit
Margins

Moore’s
Law
and
the
Cloud

Understanding
Right­Sizing

Defining
a
Large
Data
Center

Other
Economic
Key
Performance
Indicators

Marketing
the
Cloud

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
17


Designing
Cloud­Based
Solutions

Revisit
the
System
Requirements

When
to
Select
a
Development
Environment

Design
Is
a
Give­and­Take
Process

Designing
for
Accessibility

Designing
for
Audit

Designing
for
Availability

Designing
for
Backup

Designing
for
Existing
and
Future
Capacity

Designing
for
Configuration
Management

Designing
for
Deployment

Designing
for
Disaster
Recovery

Designing
for
the
Environment
(Green
Computing)

Designing
for
Interoperability

Designing
for
Maintainability

Designing
for
Performance

Designing
for
Price

Designing
for
Privacy

Designing
for
Portability

Designing
for
Recovery

Designing
for
Reliability

Designing
for
Response
Time

Designing
for
Robustness

Designing
for
Security

Designing
for
Testability

Designing
for
Usability

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
18


Coding
Cloud­Based
Applications

Creating
a
Mashup
Using
Yahoo!
Pipes

Creating
a
Simple
Yahoo!
Pipe

Using
Google
App
Engine

Creating
a
Hello,
World!
Application
with
Google
App Engine

Downloading
the
Google
App
Engine
Software
Develop­ ment
Kit

Deploying
a
Simple
Google
App
Engine
Example

Creating
a
More
Advanced
Google
App
Engine Application

Creating
a
Windows
Azure
“Hello,
World!” Application

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
19


Application
Scalability

Reviewing
the
Load­Balancing
Process

Designing
for
Scalability

Scaling
Up,
Scaling
Out,
or
Both

Minimize
Objects
on
Key
Pages

Selecting
Measurement
Points

Analyze
Your
Database
Operations

Evaluate
Your
System’s
Data
Logging
Requirements

Revisit
Your
Service­Level
Agreement

Capacity
Planning
Versus
Scalability

Scalability
and
Diminishing
Returns

Performance
Tuning

Complication
Is
the
Enemy
of
Scalability

Chapter
Summary

Key
Terms

Chapter
Review

Chapter
20


The
Future
of
the
Cloud

How
the
Cloud
Will
Change
Operating
Systems

Location­Aware
Applications

Intelligent
Fabrics,
Paints,
and
More

The
Future
of
Cloud
TV

Future
of
Cloud­Based
Smart
Devices

Cloud
and
Mobile

How
HTML5
Will
Drive
Mobile
Applications

Faster
Time
to
Market
for
Software
Applications

Home­Based
Cloud
Computing

Chapter
Summary

Key
Terms

Chapter
Review

Glossary
of
Key
Terms

Index

Credits

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now