Posts

What do you mean by disaster recovery? How recovery point objective differs from recovery time objective?

 Disaster recovery (DR)   Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events. DR allows an organization to maintain or quickly resume mission-critical functions following a disaster. A disaster can be anything that puts an organization's operations at risk, from a cyberattack to equipment failures to natural disasters. The goal with DR is for a business to continue operating as close to normal as possible. The disaster recovery process includes planning and testing and may involve a separate physical site for restoring operations. The recovery point objective (RPO) differs from the recovery time objective (RTO):- Recovery point objective (RPO) and recovery time objective (RTO) are two important measurements in disaster recovery and downtime. RPO is the maximum age of files that an organization must recover from backup storage for normal operations to resume after a disaster. The recovery point

What is the need for data center virtualization? What are the benefits of data center virtualization?

Data center virtualization  Data center virtualization is the process of designing, developing, and deploying a data center on virtualization and cloud computing technologies. It primarily enables virtualizing physical servers in a data center facility along with storage, networking, and other infrastructure devices and equipment. Data center virtualization usually produces a virtualized, cloud, and collocated virtual/cloud data center. Virtualization, Offering profound changes to the way data centers perform, virtualization makes sense on multiple levels.  The benefits of data center virtualization are as below: 1. Less heat buildup Millions of dollars have gone into the research and design of heat dissipation and control in the data center. But the cold, hard fact is, all of those servers generate heat. The only way around that? Use fewer servers. How do you manage that? Virtualization. Virtualize your servers and you're using less physical hardware. Use less physical hardware an

What are the Manages Service Providers (MSP)? Discuss the evolution of MSP Model to Cloud Computing.

Manages Service Providers (MSP)  A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. The MSP business model differs from other types of channel companies, such as value-added resellers (VARs), in numerous ways described below. MSPs charge for their services under a number of different pricing models. Typical approaches include per-device, per-user and all-inclusive pricing. 2nd part In the past, the concept of providing a service involved much more than inventing and designing the service, itself. The appropriate amount and quality of hardware were required for every company to not only build their service but have an adequate amount of space to hold and maintain the hardware for the life of each service, as well. Fortunately, that on-premise era is slowly but surely passing, leaving those rather dated companies still attempting to manage their own

What do you mean by Service Oriented Architecture (SOA)? How cloud services get benefitted by SOA?

 Service-oriented architecture (SOA)   Service-oriented architecture (SOA) is a software development model for distributed application components that incorporates discovery, access control, data mapping, and security features. Service-oriented architecture (SOA) is a software development model for distributed application components that incorporates discovery, access control, data mapping, and security features. The use of services provides major benefits: In contrast to the use of large applications, which tend to be “information silos” that cannot readily exchange information with each other, the use of finer-grained software services gives freer information flow within and between enterprises. Integrating major applications is often expensive. SOA can save integration costs. Organizing internal software as services makes it easier to expose its functionality externally. This leads to increased visibility that can have business value, for example, when a logistics company makes the

Explain the different types of implementing Network Intrusion Detection System in cloud.

Intrusion Detection System (IDS)  An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS)extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies. This article will elaborate on the configuration and functions that define the IDS deployment. Active and passive IDS An active Intrusion Detection System (IDS) is also known as Intrusion Detection and Prevention System (IDPS). The intrusion Detection and Prevention System (IDPS) is configured to automatically block suspected attacks without any intervention required by an operator. Intrusion Detection and Prevention System (IDPS) has the advantage of providing real-time corrective action in response to an attack. Network Intrusion detection systems (NIDS) and Host Intrusion detection systems (HI

”Virtualization is the key to cloud computing”, justify this statement with proper arguments. How hypervisor are used in cloud computing service?

Image
 Virtualization is one of the key components of the cloud computing paradigm, especially in infrastructure as a service model where the mentioned technology is essential to provide a large set of computing resources. Some experts even define cloud computing as simple as virtualized hardware and software plus advanced monitoring and resource management technologies. To say it straight and clear, without virtualization, cloud computing would leave the data unstable, uncontrolled, and unsafe. It is an important and probably an inseparable element of cloud computing services. Virtualization allows us to consolidate multiple physical components so that they can be managed in one place. With the help of virtualization, organizations have better visibility and also greater control of their infrastructure making security management simpler for the cloud. It is due to virtualization that cloud computing services are so cost-effective. Moreover, it is also responsible for the simplicity of deliv

Discuss about the planning needed for building the Service Oriented Architecture.

 A service-oriented architecture is essentially a collection of services. These services communicate with each other. The communication can involve either simple data passing or it could involve two or more services coordinating some activity. The reality in IT enterprises is that infrastructure is heterogeneous across operating systems, applications, system software, and application infrastructure. Some existing applications are used to run current business processes, so starting from scratch to build new infrastructure isn't an option. Enterprises should quickly respond to business changes with agility; leverage existing investments in applications and application infrastructure to address newer business requirements; support new channels of interactions with customers, partners, and suppliers; and feature an architecture that supports organic business. SOA with its loosely coupled nature allows enterprises to plug in new services or upgrade existing services in a granular fashio