Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Blue Box Blog, Lori MacVittie, Plutora Blog

Related Topics: Cloud Expo, Java, Microservices Journal, Virtualization, Security, Big Data Journal

Cloud Expo: Blog Feed Post

The Future of Cloud Is Hybrid... and Seamless

Right now, hybrid cloud models are disconnected and managed manually

It's probably no surprise that I have long advocated the position that hybrid cloud would eventually become "the standard" architecture with respect to, well, cloud computing. As the dev/ops crowd at Glue Con was recently reminded by the self-styled "most obnoxious man in cloud", Josh McKenty, you can only add to what exists in the data center. You can't simply rip and replace, forklifts are not allowed, and allowances must be made for how to integrate with existing systems no matter how onerous that might be. The future is, as he put it, open and closed, traditional and modern, automated and human.

I would add to that, it is both public and private, with respect to cloud.

Hybrid cloud models were inevitable for all these reasons and more. Suffice to say that there is unlikely to be a technology that will turn data centers into the green fields every starry-eyed young architect and engineer wishes they could be.

So if the question is no longer what cloud model will ultimately win the hearts and minds of the enterprise, the question must turn to other more tactical concerns, such as integrating the two models into a seamless, well-oiled machine.

hybrid-today Right now, hybrid cloud models are disconnected and managed manually. Oh, there are scripts and APIs, yes. But those are mainly concerned with provisioning and management. They aren't about actually using the cloud as the extension of the data center it was promised to be. They're still separate entities, for the most part, and treated as such. They're secondary and tertiary data centers. Stand-alone centers of computing that remain as disconnected operationally as they are physically.

They aren't a data center fabric, yet, even though the unicorn and rainbow goal of hybrid cloud is to achieve just that: distributed resources that act as a single, unified entity. Like a patchwork quilt, sewn from many different blocks but in the end, a single cohesive product. If not in topology, then in usage. Which is the point of many technologies today: abstraction. Abstraction enables the decoupling of interface from implementation, applications from networks, and control from data.

Doing so liberates applications (which is ultimate the reason for what we all do) from being bound to a given location, frees resources to meld with the broader data center fabric, and offers business greater freedom.

But it isn't just the applications that must be unchained from the data center jail. It is the numerous services within the network that support those applications that must also be set free. Security. Availability. Identity. Access. Performance. Applications are not islands, they are worlds unto themselves comprised of a variety of network and application services that must accompany them as they traverse these new, unfettered boundaries.

As Barrett Lyon, founder of Defense.Net put it so well in his recent blog, what we need is to seamlessly merge these environments without concern for their physical separation:

By having such a solid foundation, the next step is to seamlessly merge the DDoS defense network with F5’s hardware to create the world’s first true hybrid cloud. The vision is that customers can create their own local DDoS defense, and when volumetric attacks hit, at a specific point they’re “automatically” offloaded to the cloud.

 

Why Defense.Net and F5: The Hybrid Cloud

Barrett's proposal regarding a hybrid DDoS model carries with it shades of cloud bursting for applications, but goes a step further with the notion that hybrid cloud (at least for DDoS) should be seamless. And why shouldn't it?  The definition of cloud brokers includes this capability. To seamlessly automate the provisioning of services and applications based on some relevant criteria. For DDoS, certainly there is a consideration of bandwidth consumption. For applications, it may be demand and capacity. Or it might consider costs and location of the user.

The criteria are not so much the important point but rather it is the capability to achieve this functionality. To be able to seamlessly take advantage of a data center distributed across multiple environments, both on-premise and cloud, both public and private. We've seen the beginnings of these types of seamless integrations with cloud identity federation - the use of standards like SAML to promote access control over applications that reside beyond the corporate borders but within its overall perimeter.

Corporate borders are expanding. They must necessarily include all manner of cloud environments and they cannot continue to be disconnected operational islands. We need to consider that if the future is hybrid and composable, that we ought to be able to manage such a environment more seamlessly and with greater attention to architectures that not only accept that premise, but exploit it to the advantage of IT and the business.

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

Latest Stories
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and eas...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
Database apps on mobile devices shouldn't stop working when there's limited or no network connectivity. In his session at 16th Cloud Expo, Bradley Holt, a Developer Advocate for IBM Cloudant, will discuss how to bring data stored in a cloud database to the edge of the network (and back again), whenever an Internet connection is available. He will demonstrate techniques for replicating cloud databases with mobile devices in order to build offline-enabled mobile apps that can provide a better,...
This talk focuses on the application of DevOps fundamentals to include network infrastructure. It draws from real deployment case studies on the extension of today's paradigms to address the challenges of the network infrastructures' ability to seamlessly and cohesively integrate into agile workflows. In this session at DevOps Summit, Arista Networks will focus on configuration management using automation with a nod to future work necessary to include telemetry and ephemeral state information....
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
There are lots of challenges in IoT around secure, scalable and business friendly infrastructure for enterprises. For large corporations, IoT implementations are one of the top priorities of the decade. All industries are seeing a competitive need to sustain by investing in IoT initiatives. The value addition comes from improved customer service, innovative product and additional revenue streams. The data from these IP-connected devices can be leveraged for a variety of business applica...