Acknowledgements |
|
vii | |
About the Editors |
|
ix | |
Contributors |
|
xi | |
Chapter 1 The Basics of Cloud Computing |
|
1 | (42) |
|
|
|
2 | (4) |
|
|
2 | (1) |
|
Drivers, Characteristics, and Benefits of Cloud Computing |
|
|
3 | (1) |
|
The Essential Characteristics of Cloud Computing |
|
|
4 | (1) |
|
The Advantages of Employing Cloud Services |
|
|
5 | (1) |
|
Contracting for Cloud Services |
|
|
6 | (5) |
|
|
6 | (2) |
|
|
6 | (1) |
|
|
7 | (1) |
|
SaaS-Software-as-a-Service |
|
|
8 | (1) |
|
Some Deployment Models for Offering Those Cloud Services |
|
|
9 | (5) |
|
Public Cloud Service Offerings |
|
|
9 | (1) |
|
Private Cloud Service Offerings |
|
|
10 | (1) |
|
|
11 | (1) |
|
Changing the Cost Incurred for Providing Data Processing |
|
|
11 | (1) |
|
The Required Cloud Computing Infrastructure |
|
|
12 | (2) |
|
Systems That Make the Cloud Work |
|
|
14 | (11) |
|
Vendor Virtualization Software |
|
|
14 | (1) |
|
Employing Automation, User Portals, and Racks of Commodity Components |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (2) |
|
The Cloud Data Center Management Portal |
|
|
18 | (1) |
|
Reducing Costs by Employing Inexpensive Commodity Equipment |
|
|
19 | (4) |
|
Virtualizing of All Aspects of the Cloud Data Center for Cost Effective Cloud Service Delivery |
|
|
23 | (2) |
|
Each Cloud Data Center Computer Has a Super Operating System: The Hypervisor |
|
|
25 | (15) |
|
|
25 | (1) |
|
Docker Containers: A Streamlined Alternative to VM Hypervisor Virtualization |
|
|
26 | (3) |
|
Virtualizing the Hypervisor's and Cloud Data Center's Networking |
|
|
29 | (3) |
|
Software Defined Network Connection with Cloud Data Centers |
|
|
32 | (1) |
|
Interconnecting VMs and Containers across Distant Data Centers |
|
|
33 | (4) |
|
|
37 | (1) |
|
Using Hadoop and MapReduce to Analyze Big Data across Multiple Processors |
|
|
38 | (2) |
|
Factors Contributing to Cost Effectiveness |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (2) |
Chapter 2 Carrier Role in Cloud Computing Connectivity |
|
43 | (20) |
|
|
The Evolved Packet Core Flat IP Network |
|
|
46 | (3) |
|
Metropolitan Backbone Networks-Rings and Mesh |
|
|
49 | (3) |
|
Metropolitan Carrier Ethernet |
|
|
52 | (1) |
|
Carrier Wide Area Backbone Networks |
|
|
53 | (5) |
|
|
58 | (2) |
|
Cloud Access Connection as a Service |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
62 | (1) |
Chapter 3 Healthcare Industry |
|
63 | (14) |
|
|
|
|
63 | (1) |
|
Brief Overview of Traditional Enterprise Computing Considerations |
|
|
64 | (1) |
|
Strategic Benefits of Cloud Computing |
|
|
65 | (1) |
|
Why Embrace a Cloud Computing Strategy? |
|
|
66 | (1) |
|
Limitations of Cloud Computing |
|
|
67 | (1) |
|
|
68 | (1) |
|
How Do Organizations Access Cloud-Based Solutions? |
|
|
69 | (2) |
|
Cloud Computing and Information Security Considerations in Healthcare |
|
|
71 | (1) |
|
External Cloud in Healthcare |
|
|
71 | (1) |
|
Internal Cloud in Healthcare |
|
|
72 | (1) |
|
|
73 | (2) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (2) |
Chapter 4 Manufacturing |
|
77 | (10) |
|
|
|
Introduction to Cloud Computing in Manufacturing |
|
|
77 | (1) |
|
History of Computing in Manufacturing |
|
|
78 | (1) |
|
|
78 | (2) |
|
Historically Slow Adoption |
|
|
80 | (1) |
|
|
81 | (1) |
|
Adoption Where It Makes Sense |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (2) |
Chapter 5 Cloud Marketing |
|
87 | (9) |
|
|
What is Marketing/Benefits? |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (2) |
|
|
90 | (4) |
|
|
91 | (1) |
|
|
92 | (2) |
|
Marketing Content Creation |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
Chapter 6 Government Agencies Making the Case for the Cloud in State Government |
|
96 | (9) |
|
|
|
97 | (1) |
|
Indiana's Current Landscape |
|
|
98 | (2) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
Chapter 7 The Internet of Things |
|
105 | (18) |
|
|
IoT as an Economic Disruptor |
|
|
106 | (1) |
|
Edge Technology: Embedded Systems and Connectivity |
|
|
107 | (1) |
|
|
107 | (1) |
|
Application Layer Protocols |
|
|
108 | (1) |
|
|
109 | (1) |
|
IoT Application Infrastructure and the Cloud |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
Hadoop Distributed File System |
|
|
116 | (1) |
|
Hadoop Distributed Processing: MapReduce, Spark, and Related Projects |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (4) |
Chapter 8 Customer Services |
|
123 | (12) |
|
|
|
124 | (4) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Agent Selection Process or Skills Based Routing |
|
|
127 | (1) |
|
Internal Communication Systems |
|
|
128 | (1) |
|
Knowledge-Base Management System |
|
|
128 | (1) |
|
Customer Incident Management System |
|
|
129 | (1) |
|
Internal Infrastructure Management System |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (3) |
|
|
133 | (2) |
Chapter 9 A Movement Toward SaaS and the Cloud The Evolution of IT Services in Higher Education |
|
135 | (10) |
|
|
|
|
|
|
|
|
|
135 | (2) |
|
Driver: Offering More Services at a Lower Cost |
|
|
137 | (3) |
|
Driver: Access Anytime, Anywhere, Perpetual Access |
|
|
140 | (1) |
|
Driver: Quickening Pace of Technology Development/Change Need for Agility. Inseparability of LMS Tools |
|
|
141 | (1) |
|
Driver: Clear Differentiation/Value in an Industry under Scrutiny |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
Chapter 10 Implementation and Benefits of Cloud Services in Higher Education |
|
145 | (16) |
|
|
|
145 | (1) |
|
Cloud Services Used in Higher Education |
|
|
146 | (7) |
|
Benefits of Cloud Services for Higher Education |
|
|
149 | (2) |
|
Risks of Cloud Services for Higher Education |
|
|
151 | (2) |
|
Considerations When Moving to Cloud Computing |
|
|
153 | (2) |
|
|
155 | (1) |
|
Helping Students Convert to the Cloud |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (4) |
Chapter 11 Cloud Use in Consulting Services |
|
161 | (8) |
|
|
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (3) |
Chapter 12 Publishing The Case for the Cloud in Publishing |
|
169 | (8) |
|
|
A Brief History of Virtualization |
|
|
170 | (1) |
|
|
171 | (1) |
|
Launch of the Public Cloud |
|
|
171 | (1) |
|
|
172 | (3) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Phase 2 - Partial Optimization |
|
|
174 | (1) |
|
Phase 3 - Full Optimization |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
Chapter 13 Telecommunications A Race for Survival: Cloud in the Mobile Carrier Industry |
|
177 | (14) |
|
|
Alice and Bob: The Future of Smart Devices and Environment |
|
|
178 | (1) |
|
The IoT: Connecting Anything, Anywhere, Anytime |
|
|
179 | (1) |
|
|
180 | (1) |
|
The U.S. Mobile Carrier Industry and the Race for Survival |
|
|
180 | (1) |
|
Network Functions Virtualization (NFV) |
|
|
181 | (1) |
|
Software Defined Networking |
|
|
181 | (1) |
|
|
182 | (1) |
|
Lessons from History: Symbian and Android |
|
|
182 | (1) |
|
The Tale of Two Strategies: AT&T vs. Verizon |
|
|
183 | (1) |
|
T-Mobile, Sprint, US Cellular, and DISH Network |
|
|
184 | (1) |
|
Survival of the Fittest: Stronger, Smarter, Slimmer, Simpler, Swagger Services |
|
|
185 | (1) |
|
|
186 | (5) |
Chapter 14 Call Centers Cloud Use in Call Centers |
|
191 | (4) |
|
|
Communication as a Service |
|
|
191 | (1) |
|
Cloud-Based Communications Platforms |
|
|
192 | (1) |
|
Cons and Skepticism of Cloud-Based Communications Platforms |
|
|
192 | (1) |
|
The Growth of Cloud-Based Communications Platforms |
|
|
193 | (1) |
|
The Future of Cloud-Based Communications Platforms |
|
|
194 | (1) |
|
|
194 | (1) |
Chapter 15 Security Strategies for Security in the Cloud |
|
195 | (16) |
|
|
Types of Cloud Security Controls |
|
|
196 | (1) |
|
|
197 | (1) |
|
Cloud Security: Application Programming Interfaces |
|
|
198 | (1) |
|
Cloud Security: System Vulnerabilities |
|
|
198 | (1) |
|
Cloud Security: The Human Factor |
|
|
198 | (1) |
|
Cloud Security: Advanced Persistent Threats |
|
|
199 | (1) |
|
|
199 | (2) |
|
Internal and External Security |
|
|
201 | (1) |
|
|
201 | (2) |
|
Purpose of Data Encryption |
|
|
201 | (1) |
|
Process of Data Encryption |
|
|
202 | (1) |
|
Hackers and Encrypted Packets |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
Social Engineering: Types of Attacks |
|
|
204 | (1) |
|
Computer-Based Social Engineering: Phishing |
|
|
205 | (1) |
|
Computer-Based Social Engineering: Baiting |
|
|
205 | (1) |
|
Computer-Based Social Engineering: Pretexting |
|
|
206 | (1) |
|
Computer-Based Social Engineering: Quid Pro Quo |
|
|
206 | (1) |
|
Human-Based Social Engineering: Impersonation |
|
|
207 | (1) |
|
Human-Based Social Engineering: Third Party and Other Methods |
|
|
207 | (1) |
|
Human-Based Social Engineering: Reverse Social Engineering |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (2) |
Chapter 16 Ontario Cloud Contact Savvy-Launching A Multi-Cloud Solution |
|
211 | (6) |
|
|
Ontario Systems and Contact Management |
|
|
211 | (1) |
|
|
212 | (1) |
|
Compliance and Load Optimized Instances |
|
|
212 | (1) |
|
Real-Time Transport Protocol-Bare Metal Solution |
|
|
213 | (1) |
|
|
213 | (1) |
|
Tying It All Together-Clients and Clouds |
|
|
213 | (1) |
|
Multi-Cloud-From Theory to Deployment |
|
|
214 | (1) |
|
Other Upsides for the Enterprise |
|
|
214 | (1) |
|
|
215 | (2) |
Index |
|
217 | |