Archive for August, 2010

Oracle Software Stack

Friday, August 20th, 2010

When we all think of “Software Stack” we think of open source cloud hosting software. It usually means a suite of operating system, utilities, and applications designed to deliver various services. For example, the LAMP (Linux, Apache, MySQL, Perl/PHP/Python) stack is what lies behind many Web sites, and the combination of Server 2008 R2, Microsoft Exchange, Windows 7 and Outlook is what powers many office e-mail systems.

Why do I bring this up?  I have a large suspision that Oracle is building it’s own Software Stack.  The chief corporate architect at Oracle, Edward Screven, said that Oracle wants to give companies access to a world where data centers have become “service centers.”

“This is about the full stack of management,” John Fowler, Oracle’s executive vice president of Systems, said during the Aug. 19 event. “We incorporate and include all these technologies onto the platform.”

“There is no other company on the planet that has the complete breadth of virtualization technologies that Oracle has,” Edward Screven, Oracle’s chief corporate architect, also said during the event.
More importantly… we’ve put all these pieces together.”

Oracle has always had their hands in many different computing areas: an operating system, Unbreakable Linux, Solaris, and with the acquisition of Sun, Java.  If any of you have noticed the similarity to all these recent acquisitions… They all amount to a pretty amazing cloud server platform.  Oracle recently announced four desktop virtualization options, including Oracle Virtual Desktop Infrastructure 3.2, Oracle Sun Ray Software 5, Oracle VM Virtual Box 3.2 and Sun Ray 3 Plus Client.

I’ll be the one to call it “Oracle Software Stack” will be one of the next platforms that Oracle releases.  It would be unbeatable. Cloud Linux on steroids.  All the companies out there would have a huge disadvantage. I’m very interested to try out the beta release of OracleVM 3.0.

“There’s an evolution happening in requirements and with the demands placed on virtualization technology… isolated virtualization solutions are not enough,” Screven said. “The goal is to deploy a full stack and be able to change the level of compute power applied to the stack dynamically .. [without] making management harder.”

I think it’s only a matter of time before Oracle takes over the market share from VMware and other companies in the cloud server services area. Next on the list… Oracle Software Stack


VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

LAN Security In A Cloud Server Environment

Thursday, August 19th, 2010

Cloud computing architecture has more or less the same structure with that of the traditional systems: it has this Front End section and a Back End section. The Front End is anything that uses the cloud services – it may be end users, clients, or applications. And, the Back End section is a network of servers with computer programs or applications and the data storage or database. (Dave, 2009)

The cloud server environment must set-up its authentication in the correct way. Authentication procedures separate the genuine clients and viruses, worms or attackers.  This could be done by authenticating any users who wants to gain access in the cloud services. Giving certificates or certifications to client’s account can strengthen the security of the cloud environment at its access/entry points.  Cloud server security must also be layered around the servers and the network as a whole and not individually.  Strict policies must be set up in the host’s networks to elevate the networks’ security. Continuous checking, monitoring and auditing on compliance on the policies must be conducted. Network policies include no response on certain websites. Using authorization procedure on certain objects in the network can increase the security level too.

Another layer for network security to manage is to deploy applications that can bring out malicious programs and attackers lurking around the network and kill them.  Strong anti-virus, spywares and other malicious item detectors must be set-up in the network.

Physical security is also a must over the application/job servers and the database servers. Cameras over the vicinity of servers or the data centers should be in place. Security controls for admin and staff in the environment is also a must. And finally, regular back-up must be done to ensure availability of data should worst events happen.
The cloud’s host and environment has so many stakeholders. The cloud’s host is built upon a network of servers and databases. The integrity of data and the quality of service the cloud provides, fairly stating, can be founded on the security the cloud’s host provides. Critical data are stored in the environment so it would be fair to at least deploy the necessary security over it.

Reference

1. Dave, P. (2009, June 31). SQL SERVER – Introduction to Cloud Computing. Retrieved July 4, 2010, from SQL Authority: http://blog.sqlauthority.com/2009/07/31/sql-server-introduction-to-cloud-computing/

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Verizon Cloud Computing Gets PCI Compliance

Thursday, August 19th, 2010

Verizon Business said on Wednesday that its Verizon Cloud Computing as a Service cloud computing offering is the first cloud-based solution to complete the PCI DSS audit for storing, processing and transmitting credit card information.  They say the certification may be a compelling reason for retailers and other organizations that process credit card data to move their critical payment applications to the cloud.

Verizon’s CaaS underwent a third-party examination of policies, procedures and technical systems, as well as an on-site assessment and system-wide vulnerability scan.  “Compliance with PCI DSS sets Verizon apart from other players in this space,” says Joseph S. Crawford, executive director, IT solutions, Verizon Business, quoted in the press release.  “As more enterprises look to cloud-enabled IT services, it is essential that we offer a secure environment for corporate applications. PCI compliance further underscores our ongoing commitment and investment in cloud computing.”

The PCI DSS standard was developed by the credit card industry to monitor the security standards and practices of a hosting organization and their systems that handle credit card transactions. The deadline for retailers handling transactions to demonstrate compliance with the standard passed last month, in July of 2010. Cloud servers need to have the same standards that normal dedicated servers have.  PCI cloud hosting servers are going to be crucial and part of the law in the next 6 months.  This is a very smart move by Verizon Business getting their cloud servers PCI compliant.

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Call us at 801.384.0032