contents
foreword
preface
acknowledgments
about this book
- 1 What is cloud computing?
- 1.1 Five main principles that define cloud computing
- 1.2 Benefits that can be garnered from moving to the cloud
- 1.3 Evolution of IT leading to cloud computing
- 1.4 Classifying cloud layers: different types for different uses
- 1.5 Summary
- 2 Understanding cloud computing classifications
- 2.1 The technological underpinnings of cloud computing
- 2.2 Understanding the different classifications of clouds
- 2.3 Matching cloud providers to your needs
- 2.5 Summary
- 3 The business case for cloud computing
- 3.1 The economics of cloud computing
- 3.2 Where does the cloud make sense?
- 3.3 Where does the cloud not make sense?
- 3.4 Zero-capital startups
- 3.5 Small and medium businesses
- 3.6 Cloud computing in the enterprise
- 3.7 Summary
- 4 Security and the private cloud
- 4.1 Information security in the public cloud
- 4.2 Rationale for a private cloud
- 4.3 A virtual private cloud
- 4.4 Private clouds in practice
- 4.5 The long-term viability of private clouds
- 4.6 Summary
- 5 Designing and architecting for cloud scale
- 5.1 High-scale application patterns that fit the cloud best
- 5.2 Designing and architecting for internet scale: sharding
- 5.3 Designing for on-demand capacity: cloudbursting
- 5.4 Designing for exponentially expanding storage
- 5.5 Summary
- 6 Achieving high reliability at cloud scale
- 6.1 SOA as a precursor to the cloud
- 6.2 Distributed high-performance cloud reliability
- 6.3 Summary
- 7 Testing, deployment, and operations in the cloud
- 7.1 Typical software deployments
- 7.2 The cloud to the rescue
- 7.3 The power of parallelization
- 7.4 Summary
- 8 Practical considerations
- 8.1 Choosing a cloud vendor
- 8.2 Public cloud providers and SLAs
- 8.3 Measuring cloud operations
- 8.4 Summary
- 9 Cloud 9: the future of the cloud
- 9.1 The most significant transformation IT has ever undergone
- 9.2 Ten predictions about how the cloud will evolve
- 9.3 Ten predictions about how application development will evolve
- 9.4 Summary
appendix Information security refresher
index