Cloud Computing Essentials · GK3210 [email protected] 00 966 92000 9278

122
GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278 Cloud Computing Essentials Duration: 2 Days Course Code: GK3210 Overview: Explore the potential of cloud computing in this interactive course. Gain clarity about the rapidly developing world of cloud computing and discover its potential in this interactive four-day course. You will learn about the evolution of the cloud and how increases in processing power and bandwidth have made cloud computing possible today. You will also learn who's who in today's world of cloud computing and what products and services they offer. You will explore the financial benefits as well as the security risks, and you will gain a solid understanding of fundamental concepts, deployment, architecture, and design of the fast-growing field of cloud computing. Target Audience: Those interested in learning the essentials of cloud computing, including an IT manager who is determining whether or not to use cloud services, an implementer who needs to understand the cloud, or sales or marketing professionals who sell cloud services. Objectives: Essential elements of cloud computing Products used to implement the virtualization architecture Pros and cons of cloud computing Security and privacy issues with cloud computing Who's who in cloud computing and the product and services they Federation and presence offer Cloud computing standards and best practices The business case for going to the cloud Platforms and applications used by cloud computing end users How to build a cloud network How mobile devices can be used in the cloud Virtualization architecture Prerequisites: There are no prerequisites for this course. Follow-on-Courses: Data Center Infrastructure Management VMware vSphere: Install, Configure, Manage [V4.1] VMware View: Install, Configure, Manage [V4.5] Enterprise Virtualization Using Microsoft Hyper-V (M6422, M6331) DCASD - Data Center Application Services v2.0

Transcript of Cloud Computing Essentials · GK3210 [email protected] 00 966 92000 9278

Page 1: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Cloud Computing Essentials

Duration: 2 Days Course Code: GK3210

Overview:

Explore the potential of cloud computing in this interactive course. Gain clarity about the rapidly developing world of cloud computing anddiscover its potential in this interactive four-day course. You will learn about the evolution of the cloud and how increases in processing powerand bandwidth have made cloud computing possible today. You will also learn who's who in today's world of cloud computing and whatproducts and services they offer. You will explore the financial benefits as well as the security risks, and you will gain a solid understanding offundamental concepts, deployment, architecture, and design of the fast-growing field of cloud computing.

Target Audience:

Those interested in learning the essentials of cloud computing, including an IT manager who is determining whether or not to use cloudservices, an implementer who needs to understand the cloud, or sales or marketing professionals who sell cloud services.

Objectives:

Essential elements of cloud computing Products used to implement the virtualization architecture

Pros and cons of cloud computing Security and privacy issues with cloud computing

Who's who in cloud computing and the product and services they Federation and presenceoffer

Cloud computing standards and best practicesThe business case for going to the cloud

Platforms and applications used by cloud computing end usersHow to build a cloud network

How mobile devices can be used in the cloudVirtualization architecture

Prerequisites:

There are no prerequisites for this course.

Follow-on-Courses:Data Center Infrastructure Management VMware vSphere: Install, Configure, Manage [V4.1] VMware View: Install, Configure, Manage [V4.5] Enterprise Virtualization Using Microsoft Hyper-V (M6422, M6331) DCASD - Data Center Application Services v2.0

Page 2: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Page 3: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Content:

1. Introduction to Cloud Computingline line line

What is Cloud Computing? Cloud Computing Infrastructure Cloud Computing InfrastructureCloud Computing Defined Cloud Computing Terms Cloud Computing Terms

Benefits and Limitations of Cloud Benefits and Limitations of CloudComputing Computing

line Benefits BenefitsCloud Computing Infrastructure Limitations LimitationsCloud Computing Terms Cloud Computing Case Studies Cloud Computing Case StudiesBenefits and Limitations of Cloud Computing How Companies Are Using Cloud How Companies Are Using CloudBenefits Computing Computing Limitations Implementing Applications and Services Implementing Applications and Services inCloud Computing Case Studies in the Cloud the CloudHow Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services vs. theComputing Cloud Provider Cloud ProviderImplementing Applications and Services in A Cloud Service Provider Introduced A Cloud Service Provider Introducedthe Cloud Cloud Computing Risks and Issues Cloud Computing Risks and Issues Using Your Company's Services vs. the Products and Services Provided by Cloud Products and Services Provided by CloudCloud Provider Computing Companies Computing Companies A Cloud Service Provider Introduced Economic EconomicCloud Computing Risks and Issues Staffing StaffingProducts and Services Provided by Cloud Should Your Company Invest in Cloud Should Your Company Invest in CloudComputing Companies Computing? Computing? Economic What Should Not be Moved to the Cloud What Should Not be Moved to the Cloud Staffing LANs and the Cloud LANs and the Cloud Should Your Company Invest in Cloud Internet and the Cloud Internet and the Cloud Computing? Web Services, Browsers, and the Cloud Web Services, Browsers, and the Cloud What Should Not be Moved to the Cloud Thin Client Thin Client LANs and the Cloud Advances in Networking and Processing Advances in Networking and ProcessingInternet and the Cloud Speeds that Led to Cloud Computing Speeds that Led to Cloud Computing Web Services, Browsers, and the Cloud Networking Developments Networking DevelopmentsThin Client Increased Processing Speeds Increased Processing SpeedsAdvances in Networking and Processing Managed Service Provider Model to Managed Service Provider Model to CloudSpeeds that Led to Cloud Computing Cloud Computing and Software as a Computing and Software as a ServiceNetworking Developments Service (SaaS) (SaaS) Increased Processing Speeds Single Purpose Architectures Migrate to Single Purpose Architectures Migrate toManaged Service Provider Model to Cloud Multipurpose Architectures Multipurpose ArchitecturesComputing and Software as a Service Data Center Virtualization Data Center Virtualization(SaaS) Collaboration Collaboration Single Purpose Architectures Migrate to The Cloud as a Reach Extender The Cloud as a Reach ExtenderMultipurpose Architectures The Cloud as a Communication Enabler The Cloud as a Communication EnablerData Center Virtualization The Cloud as an Employee Enabler The Cloud as an Employee EnablerCollaboration Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA) The Cloud as a Reach Extender Evolving from SOA to the Cloud Evolving from SOA to the CloudThe Cloud as a Communication Enabler Capacity: Limited Performance Capacity: Limited PerformanceThe Cloud as an Employee Enabler Availability: Communications Failure and Availability: Communications Failure andService-Oriented Architecture (SOA) Performance Issues Performance IssuesEvolving from SOA to the Cloud Security: Newer Security Protocols Security: Newer Security Protocols ProvideCapacity: Limited Performance Provide More Protection More ProtectionAvailability: Communications Failure and What's Next in Cloud Computing What's Next in Cloud Computing Performance Issues Independent Components Independent ComponentsSecurity: Newer Security Protocols Provide Message Base Message BaseMore Protection Location Independence Location IndependenceWhat's Next in Cloud Computing Communication Requirements for Cloud Communication Requirements for CloudIndependent Components Implementation Implementation Message Base Public Internet Public InternetLocation Independence Private Internet Private InternetCommunication Requirements for Cloud Routing to the Datacenter Routing to the DatacenterImplementation Switching within the Data Center Switching within the Data CenterPublic Internet Bandwidth Bandwidth Private Internet Tools Used to Measure Network Tools Used to Measure NetworkRouting to the Datacenter Performance Performance Switching within the Data Center Using the Protocol Analyzer to Measure Using the Protocol Analyzer to MeasureBandwidth Bandwidth Bandwidth

Page 4: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Tools Used to Measure Network Using Ping and Traceroute to Measure Using Ping and Traceroute to MeasurePerformance Network Performance Network Performance Using the Protocol Analyzer to Measure Security SecurityBandwidth SSL SSLUsing Ping and Traceroute to Measure VPN VPN Network Performance Overhead Overhead Security Storage Options for Cloud Computing Storage Options for Cloud Computing SSL Storage Capacity Storage CapacityVPN Data Protection and Partitioning Data Protection and PartitioningOverhead NAS NASStorage Options for Cloud Computing SAN SANStorage Capacity CAS CASData Protection and Partitioning Redundancy RedundancyNAS Replication ReplicationSAN Multisiting Multisiting CAS Backup and Recovery Backup and Recovery Redundancy Server Software Environments that Server Software Environments thatReplication Support Cloud Computing Support Cloud Computing Multisiting Server Capacity Server CapacityBackup and Recovery Virtualization VirtualizationServer Software Environments that Support Clustering ClusteringCloud Computing Expansion ExpansionServer Capacity Server Functions Server FunctionsVirtualization Application ApplicationClustering Web Web Expansion Database Database Server Functions Vendor Approaches to Cloud Computing Vendor Approaches to Cloud Computing Application Role of Open Source Software in Data Role of Open Source Software in DataWeb Center Center Database Cost Reduction vs. Reliability Cost Reduction vs. ReliabilityVendor Approaches to Cloud Computing Open Source Server Software Open Source Server SoftwareRole of Open Source Software in Data Open Source Database Software Open Source Database SoftwareCenter Open Source Applications Software Open Source Applications SoftwareCost Reduction vs. Reliability Open Source System Management Open Source System ManagementOpen Source Server Software Software SoftwareOpen Source Database Software Open Source Load-Balancing Software Open Source Load-Balancing Software Open Source Applications Software Virtualization as the "Operating System" Virtualization as the "Operating System"Open Source System Management Software Virtualization with a Host Operating Virtualization with a Host OperatingOpen Source Load-Balancing Software System SystemVirtualization as the "Operating System" Virtualization Infections on Virtualized Virtualization Infections on VirtualizedVirtualization with a Host Operating System Environments Environments Virtualization Infections on Virtualized Type 1 Virtualized Environment Type 1 Virtualized EnvironmentEnvironments Type 2 Virtualized Environment Type 2 Virtualized EnvironmentType 1 Virtualized Environment Virtualization Environments Virtualization Environments Type 2 Virtualized Environment Microsoft Virtualization Microsoft VirtualizationVirtualization Environments Sun xVM VirtualBox Sun xVM VirtualBoxMicrosoft Virtualization Linux/UNIX Virtualization Linux/UNIX VirtualizationSun xVM VirtualBox VMware Products VMware ProductsLinux/UNIX Virtualization Data Center and Cloud Infrastructure Data Center and Cloud InfrastructureVMware Products Products ProductsData Center and Cloud Infrastructure End-User and Desktop Products End-User and Desktop Products Products IBM Virtualization IBM VirtualizationEnd-User and Desktop Products Using VMware to see a Virtualized Server Using VMware to see a Virtualized ServerIBM Virtualization Environment Environment Using VMware to see a Virtualized Server Permissive Federation Permissive FederationEnvironment Verified Federation Verified FederationPermissive Federation Encrypted Federation Encrypted FederationVerified Federation Trusted Federation Trusted FederationEncrypted Federation Using XMPP in the Federated Using XMPP in the Federated EnvironmentTrusted Federation Environment Presence in the Cloud Using XMPP in the Federated Environment Presence in the Cloud What It IsPresence in the Cloud What It Is Presence ProtocolsWhat It Is Presence Protocols Leveraging PresencePresence Protocols Leveraging Presence Presence EnabledLeveraging Presence Presence Enabled The Future of PresencePresence Enabled The Future of Presence The Interrelation of Identity, Presence, and

Page 5: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Future of Presence The Interrelation of Identity, Presence, Location in the CloudThe Interrelation of Identity, Presence, and and Location in the Cloud Identity Management Location in the Cloud Identity Management What It IsIdentity Management What It Is Future of Identity in the CloudWhat It Is Future of Identity in the Cloud Privacy and Its Relation to Cloud-BasedFuture of Identity in the Cloud Privacy and Its Relation to Cloud-Based Information Systems Privacy and Its Relation to Cloud-Based Information Systems Personal InformationInformation Systems Personal Information Privacy-Related IssuesPersonal Information Privacy-Related Issues Finding Your Private Information Privacy-Related Issues Finding Your Private Information Open Cloud Consortium Working GroupsFinding Your Private Information Open Cloud Consortium Working Groups Project MatsuOpen Cloud Consortium Working Groups Project Matsu Project CometProject Matsu Project Comet HPC in the CloudProject Comet HPC in the Cloud The Open Cloud TestbedHPC in the Cloud The Open Cloud Testbed The Open Science Data CloudThe Open Cloud Testbed The Open Science Data Cloud Intercloud Testbed The Open Science Data Cloud Intercloud Testbed Reporting on an Open Cloud ConsortiumIntercloud Testbed Reporting on an Open Cloud Consortium Working Group Reporting on an Open Cloud Consortium Working Group Distributed Management Task ForceWorking Group Distributed Management Task Force (DMTF) Distributed Management Task Force (DMTF) What It Is?(DMTF) What It Is? DMTK Working Groups Associated withWhat It Is? DMTK Working Groups Associated with Cloud ComputingDMTK Working Groups Associated with Cloud Computing Standards for Application Developers Cloud Computing Standards for Application Developers ProtocolsStandards for Application Developers Protocols Scripting LanguagesProtocols Scripting Languages Content Formatting Standards andScripting Languages Content Formatting Standards and LanguagesContent Formatting Standards and Languages Standards for Security in the Cloud Languages Standards for Security in the Cloud Confidentiality, Integrity, AvailabilityStandards for Security in the Cloud Confidentiality, Integrity, Availability Authentication, Authorization,Confidentiality, Integrity, Availability Authentication, Authorization, AccountabilityAuthentication, Authorization, Accountability Accountability Regulations for PrivacyRegulations for Privacy Regulations for Privacy Security ProtocolsSecurity Protocols Security Protocols Establishing a Baseline for CloudEstablishing a Baseline for Cloud Establishing a Baseline for Cloud Performance Performance Performance Best Practices for Selecting a Vendor andBest Practices for Selecting a Vendor and Best Practices for Selecting a Vendor Implementing Cloud-Based Applications Implementing Cloud-Based Applications and Implementing Cloud-Based Choosing the Right VendorChoosing the Right Vendor Applications Implementing Cloud-Based Applications Implementing Cloud-Based Applications Choosing the Right Vendor Windows Remote DesktopWindows Remote Desktop Implementing Cloud-Based Applications VncVnc Windows Remote Desktop Web BrowsersWeb Browsers Vnc Server ExtensionsServer Extensions Web Browsers Thin ClientsThin Clients Server Extensions Smart Phones, Pads, Pods, etc.Smart Phones, Pads, Pods, etc. Thin Clients Virtual Terminal Security Strengths andVirtual Terminal Security Strengths and Smart Phones, Pads, Pods, etc. Weaknesses Weaknesses Virtual Terminal Security Strengths and StrengthsStrengths Weaknesses Weaknesses Weaknesses Strengths AndroidAndroid Weaknesses BlackBerryBlackBerry Android Windows MobileWindows Mobile BlackBerry Ubuntu Mobile Internet DeviceUbuntu Mobile Internet Device Windows Mobile Mobile Platform Virtualization Mobile Platform Virtualization Ubuntu Mobile Internet Device Kernel-Based Virtual MachineKernel-Based Virtual Machine Mobile Platform Virtualization VMware Mobile Virtualization PlatformVMware Mobile Virtualization Platform Kernel-Based Virtual Machine Collaboration Applications for MobileCollaboration Applications for Mobile VMware Mobile Virtualization Platform Platforms Platforms Collaboration Applications for Mobile Text MessagingText Messaging Platforms iPhone ApplicationsiPhone Applications Text Messaging BlackBerry ApplicationsBlackBerry Applications iPhone Applications Droid Applications Droid Applications BlackBerry Applications

Droid Applications line

Page 6: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

line Cloud Computing InfrastructureCloud Computing Infrastructure line Cloud Computing TermsCloud Computing Terms Cloud Computing Infrastructure Benefits and Limitations of CloudBenefits and Limitations of Cloud Computing Cloud Computing Terms Computing Benefits Benefits and Limitations of Cloud BenefitsLimitations Computing LimitationsCloud Computing Case Studies Benefits Cloud Computing Case StudiesHow Companies Are Using Cloud Limitations How Companies Are Using CloudComputing Cloud Computing Case Studies Computing Implementing Applications and Services in How Companies Are Using Cloud Implementing Applications and Services inthe Cloud Computing the CloudUsing Your Company's Services vs. the Implementing Applications and Services Using Your Company's Services vs. theCloud Provider in the Cloud Cloud ProviderA Cloud Service Provider Introduced Using Your Company's Services vs. the A Cloud Service Provider IntroducedCloud Computing Risks and Issues Cloud Provider Cloud Computing Risks and Issues Products and Services Provided by Cloud A Cloud Service Provider Introduced Products and Services Provided by CloudComputing Companies Cloud Computing Risks and Issues Computing Companies Economic Products and Services Provided by Cloud EconomicStaffing Computing Companies StaffingShould Your Company Invest in Cloud Economic Should Your Company Invest in CloudComputing? Staffing Computing? What Should Not be Moved to the Cloud Should Your Company Invest in Cloud What Should Not be Moved to the Cloud LANs and the Cloud Computing? LANs and the Cloud Internet and the Cloud What Should Not be Moved to the Cloud Internet and the Cloud Web Services, Browsers, and the Cloud LANs and the Cloud Web Services, Browsers, and the Cloud Thin Client Internet and the Cloud Thin Client Advances in Networking and Processing Web Services, Browsers, and the Cloud Advances in Networking and ProcessingSpeeds that Led to Cloud Computing Thin Client Speeds that Led to Cloud Computing Networking Developments Advances in Networking and Processing Networking DevelopmentsIncreased Processing Speeds Speeds that Led to Cloud Computing Increased Processing SpeedsManaged Service Provider Model to Cloud Networking Developments Managed Service Provider Model to CloudComputing and Software as a Service Increased Processing Speeds Computing and Software as a Service(SaaS) Managed Service Provider Model to (SaaS) Single Purpose Architectures Migrate to Cloud Computing and Software as a Single Purpose Architectures Migrate toMultipurpose Architectures Service (SaaS) Multipurpose ArchitecturesData Center Virtualization Single Purpose Architectures Migrate to Data Center VirtualizationCollaboration Multipurpose Architectures Collaboration The Cloud as a Reach Extender Data Center Virtualization The Cloud as a Reach ExtenderThe Cloud as a Communication Enabler Collaboration The Cloud as a Communication EnablerThe Cloud as an Employee Enabler The Cloud as a Reach Extender The Cloud as an Employee EnablerService-Oriented Architecture (SOA) The Cloud as a Communication Enabler Service-Oriented Architecture (SOA) Evolving from SOA to the Cloud The Cloud as an Employee Enabler Evolving from SOA to the CloudCapacity: Limited Performance Service-Oriented Architecture (SOA) Capacity: Limited PerformanceAvailability: Communications Failure and Evolving from SOA to the Cloud Availability: Communications Failure andPerformance Issues Capacity: Limited Performance Performance IssuesSecurity: Newer Security Protocols Provide Availability: Communications Failure and Security: Newer Security Protocols ProvideMore Protection Performance Issues More ProtectionWhat's Next in Cloud Computing Security: Newer Security Protocols What's Next in Cloud Computing Independent Components Provide More Protection Independent ComponentsMessage Base What's Next in Cloud Computing Message BaseLocation Independence Independent Components Location IndependenceCommunication Requirements for Cloud Message Base Communication Requirements for CloudImplementation Location Independence Implementation Public Internet Communication Requirements for Cloud Public InternetPrivate Internet Implementation Private InternetRouting to the Datacenter Public Internet Routing to the DatacenterSwitching within the Data Center Private Internet Switching within the Data CenterBandwidth Routing to the Datacenter Bandwidth Tools Used to Measure Network Switching within the Data Center Tools Used to Measure NetworkPerformance Bandwidth Performance Using the Protocol Analyzer to Measure Tools Used to Measure Network Using the Protocol Analyzer to MeasureBandwidth Performance Bandwidth Using Ping and Traceroute to Measure Using the Protocol Analyzer to Measure Using Ping and Traceroute to MeasureNetwork Performance Bandwidth Network Performance Security Using Ping and Traceroute to Measure SecuritySSL Network Performance SSL

Page 7: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

VPN Security VPN Overhead SSL Overhead Storage Options for Cloud Computing VPN Storage Options for Cloud Computing Storage Capacity Overhead Storage CapacityData Protection and Partitioning Storage Options for Cloud Computing Data Protection and PartitioningNAS Storage Capacity NASSAN Data Protection and Partitioning SANCAS NAS CASRedundancy SAN RedundancyReplication CAS ReplicationMultisiting Redundancy Multisiting Backup and Recovery Replication Backup and Recovery Server Software Environments that Support Multisiting Server Software Environments thatCloud Computing Backup and Recovery Support Cloud Computing Server Capacity Server Software Environments that Server CapacityVirtualization Support Cloud Computing VirtualizationClustering Server Capacity ClusteringExpansion Virtualization ExpansionServer Functions Clustering Server FunctionsApplication Expansion ApplicationWeb Server Functions Web Database Application Database Vendor Approaches to Cloud Computing Web Vendor Approaches to Cloud Computing Role of Open Source Software in Data Database Role of Open Source Software in DataCenter Vendor Approaches to Cloud Computing Center Cost Reduction vs. Reliability Role of Open Source Software in Data Cost Reduction vs. ReliabilityOpen Source Server Software Center Open Source Server SoftwareOpen Source Database Software Cost Reduction vs. Reliability Open Source Database SoftwareOpen Source Applications Software Open Source Server Software Open Source Applications SoftwareOpen Source System Management Software Open Source Database Software Open Source System ManagementOpen Source Load-Balancing Software Open Source Applications Software SoftwareVirtualization as the "Operating System" Open Source System Management Open Source Load-Balancing Software Virtualization with a Host Operating System Software Virtualization as the "Operating System"Virtualization Infections on Virtualized Open Source Load-Balancing Software Virtualization with a Host OperatingEnvironments Virtualization as the "Operating System" SystemType 1 Virtualized Environment Virtualization with a Host Operating Virtualization Infections on VirtualizedType 2 Virtualized Environment System Environments Virtualization Environments Virtualization Infections on Virtualized Type 1 Virtualized EnvironmentMicrosoft Virtualization Environments Type 2 Virtualized EnvironmentSun xVM VirtualBox Type 1 Virtualized Environment Virtualization Environments Linux/UNIX Virtualization Type 2 Virtualized Environment Microsoft VirtualizationVMware Products Virtualization Environments Sun xVM VirtualBoxData Center and Cloud Infrastructure Microsoft Virtualization Linux/UNIX VirtualizationProducts Sun xVM VirtualBox VMware ProductsEnd-User and Desktop Products Linux/UNIX Virtualization Data Center and Cloud InfrastructureIBM Virtualization VMware Products ProductsUsing VMware to see a Virtualized Server Data Center and Cloud Infrastructure End-User and Desktop Products Environment Products IBM VirtualizationPermissive Federation End-User and Desktop Products Using VMware to see a Virtualized ServerVerified Federation IBM Virtualization Environment Encrypted Federation Using VMware to see a Virtualized Server Permissive FederationTrusted Federation Environment Verified FederationUsing XMPP in the Federated Environment Permissive Federation Encrypted FederationPresence in the Cloud Verified Federation Trusted FederationWhat It Is Encrypted Federation Using XMPP in the Federated EnvironmentPresence Protocols Trusted Federation Presence in the Cloud Leveraging Presence Using XMPP in the Federated What It IsPresence Enabled Environment Presence ProtocolsThe Future of Presence Presence in the Cloud Leveraging PresenceThe Interrelation of Identity, Presence, and What It Is Presence EnabledLocation in the Cloud Presence Protocols The Future of PresenceIdentity Management Leveraging Presence The Interrelation of Identity, Presence, andWhat It Is Presence Enabled Location in the CloudFuture of Identity in the Cloud The Future of Presence Identity Management Privacy and Its Relation to Cloud-Based The Interrelation of Identity, Presence, What It IsInformation Systems and Location in the Cloud Future of Identity in the Cloud

Page 8: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Personal Information Identity Management Privacy and Its Relation to Cloud-BasedPrivacy-Related Issues What It Is Information Systems Finding Your Private Information Future of Identity in the Cloud Personal InformationOpen Cloud Consortium Working Groups Privacy and Its Relation to Cloud-Based Privacy-Related IssuesProject Matsu Information Systems Finding Your Private Information Project Comet Personal Information Open Cloud Consortium Working GroupsHPC in the Cloud Privacy-Related Issues Project MatsuThe Open Cloud Testbed Finding Your Private Information Project CometThe Open Science Data Cloud Open Cloud Consortium Working Groups HPC in the CloudIntercloud Testbed Project Matsu The Open Cloud TestbedReporting on an Open Cloud Consortium Project Comet The Open Science Data CloudWorking Group HPC in the Cloud Intercloud Testbed Distributed Management Task Force The Open Cloud Testbed Reporting on an Open Cloud Consortium(DMTF) The Open Science Data Cloud Working Group What It Is? Intercloud Testbed Distributed Management Task ForceDMTK Working Groups Associated with Reporting on an Open Cloud Consortium (DMTF) Cloud Computing Working Group What It Is?Standards for Application Developers Distributed Management Task Force DMTK Working Groups Associated withProtocols (DMTF) Cloud ComputingScripting Languages What It Is? Standards for Application Developers Content Formatting Standards and DMTK Working Groups Associated with ProtocolsLanguages Cloud Computing Scripting LanguagesStandards for Security in the Cloud Standards for Application Developers Content Formatting Standards andConfidentiality, Integrity, Availability Protocols LanguagesAuthentication, Authorization, Accountability Scripting Languages Standards for Security in the Cloud Regulations for Privacy Content Formatting Standards and Confidentiality, Integrity, AvailabilitySecurity Protocols Languages Authentication, Authorization,Establishing a Baseline for Cloud Standards for Security in the Cloud AccountabilityPerformance Confidentiality, Integrity, Availability Regulations for PrivacyBest Practices for Selecting a Vendor and Authentication, Authorization, Security ProtocolsImplementing Cloud-Based Applications Accountability Establishing a Baseline for CloudChoosing the Right Vendor Regulations for Privacy Performance Implementing Cloud-Based Applications Security Protocols Best Practices for Selecting a Vendor andWindows Remote Desktop Establishing a Baseline for Cloud Implementing Cloud-Based Applications Vnc Performance Choosing the Right VendorWeb Browsers Best Practices for Selecting a Vendor Implementing Cloud-Based Applications Server Extensions and Implementing Cloud-Based Windows Remote DesktopThin Clients Applications VncSmart Phones, Pads, Pods, etc. Choosing the Right Vendor Web BrowsersVirtual Terminal Security Strengths and Implementing Cloud-Based Applications Server ExtensionsWeaknesses Windows Remote Desktop Thin ClientsStrengths Vnc Smart Phones, Pads, Pods, etc.Weaknesses Web Browsers Virtual Terminal Security Strengths andAndroid Server Extensions Weaknesses BlackBerry Thin Clients StrengthsWindows Mobile Smart Phones, Pads, Pods, etc. Weaknesses Ubuntu Mobile Internet Device Virtual Terminal Security Strengths and AndroidMobile Platform Virtualization Weaknesses BlackBerryKernel-Based Virtual Machine Strengths Windows MobileVMware Mobile Virtualization Platform Weaknesses Ubuntu Mobile Internet DeviceCollaboration Applications for Mobile Android Mobile Platform Virtualization Platforms BlackBerry Kernel-Based Virtual MachineText Messaging Windows Mobile VMware Mobile Virtualization PlatformiPhone Applications Ubuntu Mobile Internet Device Collaboration Applications for MobileBlackBerry Applications Mobile Platform Virtualization Platforms Droid Applications Kernel-Based Virtual Machine Text Messaging

VMware Mobile Virtualization Platform iPhone ApplicationsCollaboration Applications for Mobile BlackBerry Applications

line Platforms Droid Applications Cloud Computing Infrastructure Text MessagingCloud Computing Terms iPhone ApplicationsBenefits and Limitations of Cloud Computing BlackBerry Applications lineBenefits Droid Applications Cloud Computing InfrastructureLimitations Cloud Computing TermsCloud Computing Case Studies Benefits and Limitations of CloudHow Companies Are Using Cloud line Computing

Page 9: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Computing Cloud Computing Infrastructure BenefitsImplementing Applications and Services in Cloud Computing Terms Limitationsthe Cloud Benefits and Limitations of Cloud Cloud Computing Case StudiesUsing Your Company's Services vs. the Computing How Companies Are Using CloudCloud Provider Benefits Computing A Cloud Service Provider Introduced Limitations Implementing Applications and Services inCloud Computing Risks and Issues Cloud Computing Case Studies the CloudProducts and Services Provided by Cloud How Companies Are Using Cloud Using Your Company's Services vs. theComputing Companies Computing Cloud ProviderEconomic Implementing Applications and Services A Cloud Service Provider IntroducedStaffing in the Cloud Cloud Computing Risks and Issues Should Your Company Invest in Cloud Using Your Company's Services vs. the Products and Services Provided by CloudComputing? Cloud Provider Computing Companies What Should Not be Moved to the Cloud A Cloud Service Provider Introduced EconomicLANs and the Cloud Cloud Computing Risks and Issues StaffingInternet and the Cloud Products and Services Provided by Cloud Should Your Company Invest in CloudWeb Services, Browsers, and the Cloud Computing Companies Computing? Thin Client Economic What Should Not be Moved to the Cloud Advances in Networking and Processing Staffing LANs and the Cloud Speeds that Led to Cloud Computing Should Your Company Invest in Cloud Internet and the Cloud Networking Developments Computing? Web Services, Browsers, and the Cloud Increased Processing Speeds What Should Not be Moved to the Cloud Thin Client Managed Service Provider Model to Cloud LANs and the Cloud Advances in Networking and ProcessingComputing and Software as a Service Internet and the Cloud Speeds that Led to Cloud Computing (SaaS) Web Services, Browsers, and the Cloud Networking DevelopmentsSingle Purpose Architectures Migrate to Thin Client Increased Processing SpeedsMultipurpose Architectures Advances in Networking and Processing Managed Service Provider Model to CloudData Center Virtualization Speeds that Led to Cloud Computing Computing and Software as a ServiceCollaboration Networking Developments (SaaS) The Cloud as a Reach Extender Increased Processing Speeds Single Purpose Architectures Migrate toThe Cloud as a Communication Enabler Managed Service Provider Model to Multipurpose ArchitecturesThe Cloud as an Employee Enabler Cloud Computing and Software as a Data Center VirtualizationService-Oriented Architecture (SOA) Service (SaaS) Collaboration Evolving from SOA to the Cloud Single Purpose Architectures Migrate to The Cloud as a Reach ExtenderCapacity: Limited Performance Multipurpose Architectures The Cloud as a Communication EnablerAvailability: Communications Failure and Data Center Virtualization The Cloud as an Employee EnablerPerformance Issues Collaboration Service-Oriented Architecture (SOA) Security: Newer Security Protocols Provide The Cloud as a Reach Extender Evolving from SOA to the CloudMore Protection The Cloud as a Communication Enabler Capacity: Limited PerformanceWhat's Next in Cloud Computing The Cloud as an Employee Enabler Availability: Communications Failure andIndependent Components Service-Oriented Architecture (SOA) Performance IssuesMessage Base Evolving from SOA to the Cloud Security: Newer Security Protocols ProvideLocation Independence Capacity: Limited Performance More ProtectionCommunication Requirements for Cloud Availability: Communications Failure and What's Next in Cloud Computing Implementation Performance Issues Independent ComponentsPublic Internet Security: Newer Security Protocols Message BasePrivate Internet Provide More Protection Location IndependenceRouting to the Datacenter What's Next in Cloud Computing Communication Requirements for CloudSwitching within the Data Center Independent Components Implementation Bandwidth Message Base Public InternetTools Used to Measure Network Location Independence Private InternetPerformance Communication Requirements for Cloud Routing to the DatacenterUsing the Protocol Analyzer to Measure Implementation Switching within the Data CenterBandwidth Public Internet Bandwidth Using Ping and Traceroute to Measure Private Internet Tools Used to Measure NetworkNetwork Performance Routing to the Datacenter Performance Security Switching within the Data Center Using the Protocol Analyzer to MeasureSSL Bandwidth Bandwidth VPN Tools Used to Measure Network Using Ping and Traceroute to MeasureOverhead Performance Network Performance Storage Options for Cloud Computing Using the Protocol Analyzer to Measure SecurityStorage Capacity Bandwidth SSLData Protection and Partitioning Using Ping and Traceroute to Measure VPN NAS Network Performance Overhead SAN Security Storage Options for Cloud Computing CAS SSL Storage Capacity

Page 10: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Redundancy VPN Data Protection and PartitioningReplication Overhead NASMultisiting Storage Options for Cloud Computing SANBackup and Recovery Storage Capacity CASServer Software Environments that Support Data Protection and Partitioning RedundancyCloud Computing NAS ReplicationServer Capacity SAN Multisiting Virtualization CAS Backup and Recovery Clustering Redundancy Server Software Environments thatExpansion Replication Support Cloud Computing Server Functions Multisiting Server CapacityApplication Backup and Recovery VirtualizationWeb Server Software Environments that ClusteringDatabase Support Cloud Computing ExpansionVendor Approaches to Cloud Computing Server Capacity Server FunctionsRole of Open Source Software in Data Virtualization ApplicationCenter Clustering Web Cost Reduction vs. Reliability Expansion Database Open Source Server Software Server Functions Vendor Approaches to Cloud Computing Open Source Database Software Application Role of Open Source Software in DataOpen Source Applications Software Web Center Open Source System Management Software Database Cost Reduction vs. ReliabilityOpen Source Load-Balancing Software Vendor Approaches to Cloud Computing Open Source Server SoftwareVirtualization as the "Operating System" Role of Open Source Software in Data Open Source Database SoftwareVirtualization with a Host Operating System Center Open Source Applications SoftwareVirtualization Infections on Virtualized Cost Reduction vs. Reliability Open Source System ManagementEnvironments Open Source Server Software SoftwareType 1 Virtualized Environment Open Source Database Software Open Source Load-Balancing Software Type 2 Virtualized Environment Open Source Applications Software Virtualization as the "Operating System"Virtualization Environments Open Source System Management Virtualization with a Host OperatingMicrosoft Virtualization Software SystemSun xVM VirtualBox Open Source Load-Balancing Software Virtualization Infections on VirtualizedLinux/UNIX Virtualization Virtualization as the "Operating System" Environments VMware Products Virtualization with a Host Operating Type 1 Virtualized EnvironmentData Center and Cloud Infrastructure System Type 2 Virtualized EnvironmentProducts Virtualization Infections on Virtualized Virtualization Environments End-User and Desktop Products Environments Microsoft VirtualizationIBM Virtualization Type 1 Virtualized Environment Sun xVM VirtualBoxUsing VMware to see a Virtualized Server Type 2 Virtualized Environment Linux/UNIX VirtualizationEnvironment Virtualization Environments VMware ProductsPermissive Federation Microsoft Virtualization Data Center and Cloud InfrastructureVerified Federation Sun xVM VirtualBox ProductsEncrypted Federation Linux/UNIX Virtualization End-User and Desktop Products Trusted Federation VMware Products IBM VirtualizationUsing XMPP in the Federated Environment Data Center and Cloud Infrastructure Using VMware to see a Virtualized ServerPresence in the Cloud Products Environment What It Is End-User and Desktop Products Permissive FederationPresence Protocols IBM Virtualization Verified FederationLeveraging Presence Using VMware to see a Virtualized Server Encrypted FederationPresence Enabled Environment Trusted FederationThe Future of Presence Permissive Federation Using XMPP in the Federated EnvironmentThe Interrelation of Identity, Presence, and Verified Federation Presence in the Cloud Location in the Cloud Encrypted Federation What It IsIdentity Management Trusted Federation Presence ProtocolsWhat It Is Using XMPP in the Federated Leveraging PresenceFuture of Identity in the Cloud Environment Presence EnabledPrivacy and Its Relation to Cloud-Based Presence in the Cloud The Future of PresenceInformation Systems What It Is The Interrelation of Identity, Presence, andPersonal Information Presence Protocols Location in the CloudPrivacy-Related Issues Leveraging Presence Identity Management Finding Your Private Information Presence Enabled What It IsOpen Cloud Consortium Working Groups The Future of Presence Future of Identity in the CloudProject Matsu The Interrelation of Identity, Presence, Privacy and Its Relation to Cloud-BasedProject Comet and Location in the Cloud Information Systems HPC in the Cloud Identity Management Personal InformationThe Open Cloud Testbed What It Is Privacy-Related Issues

Page 11: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Open Science Data Cloud Future of Identity in the Cloud Finding Your Private Information Intercloud Testbed Privacy and Its Relation to Cloud-Based Open Cloud Consortium Working GroupsReporting on an Open Cloud Consortium Information Systems Project MatsuWorking Group Personal Information Project CometDistributed Management Task Force Privacy-Related Issues HPC in the Cloud(DMTF) Finding Your Private Information The Open Cloud TestbedWhat It Is? Open Cloud Consortium Working Groups The Open Science Data CloudDMTK Working Groups Associated with Project Matsu Intercloud Testbed Cloud Computing Project Comet Reporting on an Open Cloud ConsortiumStandards for Application Developers HPC in the Cloud Working Group Protocols The Open Cloud Testbed Distributed Management Task ForceScripting Languages The Open Science Data Cloud (DMTF) Content Formatting Standards and Intercloud Testbed What It Is?Languages Reporting on an Open Cloud Consortium DMTK Working Groups Associated withStandards for Security in the Cloud Working Group Cloud ComputingConfidentiality, Integrity, Availability Distributed Management Task Force Standards for Application Developers Authentication, Authorization, Accountability (DMTF) ProtocolsRegulations for Privacy What It Is? Scripting LanguagesSecurity Protocols DMTK Working Groups Associated with Content Formatting Standards andEstablishing a Baseline for Cloud Cloud Computing LanguagesPerformance Standards for Application Developers Standards for Security in the Cloud Best Practices for Selecting a Vendor and Protocols Confidentiality, Integrity, AvailabilityImplementing Cloud-Based Applications Scripting Languages Authentication, Authorization,Choosing the Right Vendor Content Formatting Standards and AccountabilityImplementing Cloud-Based Applications Languages Regulations for PrivacyWindows Remote Desktop Standards for Security in the Cloud Security ProtocolsVnc Confidentiality, Integrity, Availability Establishing a Baseline for CloudWeb Browsers Authentication, Authorization, Performance Server Extensions Accountability Best Practices for Selecting a Vendor andThin Clients Regulations for Privacy Implementing Cloud-Based Applications Smart Phones, Pads, Pods, etc. Security Protocols Choosing the Right VendorVirtual Terminal Security Strengths and Establishing a Baseline for Cloud Implementing Cloud-Based Applications Weaknesses Performance Windows Remote DesktopStrengths Best Practices for Selecting a Vendor VncWeaknesses and Implementing Cloud-Based Web BrowsersAndroid Applications Server ExtensionsBlackBerry Choosing the Right Vendor Thin ClientsWindows Mobile Implementing Cloud-Based Applications Smart Phones, Pads, Pods, etc.Ubuntu Mobile Internet Device Windows Remote Desktop Virtual Terminal Security Strengths andMobile Platform Virtualization Vnc Weaknesses Kernel-Based Virtual Machine Web Browsers StrengthsVMware Mobile Virtualization Platform Server Extensions Weaknesses Collaboration Applications for Mobile Thin Clients AndroidPlatforms Smart Phones, Pads, Pods, etc. BlackBerryText Messaging Virtual Terminal Security Strengths and Windows MobileiPhone Applications Weaknesses Ubuntu Mobile Internet DeviceBlackBerry Applications Strengths Mobile Platform Virtualization Droid Applications Weaknesses Kernel-Based Virtual Machine

Android VMware Mobile Virtualization PlatformBlackBerry Collaboration Applications for Mobile

line Windows Mobile Platforms Cloud Computing Infrastructure Ubuntu Mobile Internet Device Text MessagingCloud Computing Terms Mobile Platform Virtualization iPhone ApplicationsBenefits and Limitations of Cloud Computing Kernel-Based Virtual Machine BlackBerry ApplicationsBenefits VMware Mobile Virtualization Platform Droid Applications Limitations Collaboration Applications for MobileCloud Computing Case Studies Platforms 8. Cloud Computing Standards and BestHow Companies Are Using Cloud Text Messaging PracticesComputing iPhone Applications lineImplementing Applications and Services in BlackBerry Applications Open Cloud Consortium the Cloud Droid Applications What It IsUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider Introduced line lineCloud Computing Risks and Issues Cloud Computing Infrastructure Cloud Computing InfrastructureProducts and Services Provided by Cloud Cloud Computing Terms Cloud Computing Terms

Page 12: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Computing Companies Benefits and Limitations of Cloud Benefits and Limitations of CloudEconomic Computing Computing Staffing Benefits BenefitsShould Your Company Invest in Cloud Limitations LimitationsComputing? Cloud Computing Case Studies Cloud Computing Case StudiesWhat Should Not be Moved to the Cloud How Companies Are Using Cloud How Companies Are Using CloudLANs and the Cloud Computing Computing Internet and the Cloud Implementing Applications and Services Implementing Applications and Services inWeb Services, Browsers, and the Cloud in the Cloud the CloudThin Client Using Your Company's Services vs. the Using Your Company's Services vs. theAdvances in Networking and Processing Cloud Provider Cloud ProviderSpeeds that Led to Cloud Computing A Cloud Service Provider Introduced A Cloud Service Provider IntroducedNetworking Developments Cloud Computing Risks and Issues Cloud Computing Risks and Issues Increased Processing Speeds Products and Services Provided by Cloud Products and Services Provided by CloudManaged Service Provider Model to Cloud Computing Companies Computing Companies Computing and Software as a Service Economic Economic(SaaS) Staffing StaffingSingle Purpose Architectures Migrate to Should Your Company Invest in Cloud Should Your Company Invest in CloudMultipurpose Architectures Computing? Computing? Data Center Virtualization What Should Not be Moved to the Cloud What Should Not be Moved to the Cloud Collaboration LANs and the Cloud LANs and the Cloud The Cloud as a Reach Extender Internet and the Cloud Internet and the Cloud The Cloud as a Communication Enabler Web Services, Browsers, and the Cloud Web Services, Browsers, and the Cloud The Cloud as an Employee Enabler Thin Client Thin Client Service-Oriented Architecture (SOA) Advances in Networking and Processing Advances in Networking and ProcessingEvolving from SOA to the Cloud Speeds that Led to Cloud Computing Speeds that Led to Cloud Computing Capacity: Limited Performance Networking Developments Networking DevelopmentsAvailability: Communications Failure and Increased Processing Speeds Increased Processing SpeedsPerformance Issues Managed Service Provider Model to Managed Service Provider Model to CloudSecurity: Newer Security Protocols Provide Cloud Computing and Software as a Computing and Software as a ServiceMore Protection Service (SaaS) (SaaS) What's Next in Cloud Computing Single Purpose Architectures Migrate to Single Purpose Architectures Migrate toIndependent Components Multipurpose Architectures Multipurpose ArchitecturesMessage Base Data Center Virtualization Data Center VirtualizationLocation Independence Collaboration Collaboration Communication Requirements for Cloud The Cloud as a Reach Extender The Cloud as a Reach ExtenderImplementation The Cloud as a Communication Enabler The Cloud as a Communication EnablerPublic Internet The Cloud as an Employee Enabler The Cloud as an Employee EnablerPrivate Internet Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA) Routing to the Datacenter Evolving from SOA to the Cloud Evolving from SOA to the CloudSwitching within the Data Center Capacity: Limited Performance Capacity: Limited PerformanceBandwidth Availability: Communications Failure and Availability: Communications Failure andTools Used to Measure Network Performance Issues Performance IssuesPerformance Security: Newer Security Protocols Security: Newer Security Protocols ProvideUsing the Protocol Analyzer to Measure Provide More Protection More ProtectionBandwidth What's Next in Cloud Computing What's Next in Cloud Computing Using Ping and Traceroute to Measure Independent Components Independent ComponentsNetwork Performance Message Base Message BaseSecurity Location Independence Location IndependenceSSL Communication Requirements for Cloud Communication Requirements for CloudVPN Implementation Implementation Overhead Public Internet Public InternetStorage Options for Cloud Computing Private Internet Private InternetStorage Capacity Routing to the Datacenter Routing to the DatacenterData Protection and Partitioning Switching within the Data Center Switching within the Data CenterNAS Bandwidth Bandwidth SAN Tools Used to Measure Network Tools Used to Measure NetworkCAS Performance Performance Redundancy Using the Protocol Analyzer to Measure Using the Protocol Analyzer to MeasureReplication Bandwidth Bandwidth Multisiting Using Ping and Traceroute to Measure Using Ping and Traceroute to MeasureBackup and Recovery Network Performance Network Performance Server Software Environments that Support Security SecurityCloud Computing SSL SSLServer Capacity VPN VPN Virtualization Overhead Overhead

Page 13: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Clustering Storage Options for Cloud Computing Storage Options for Cloud Computing Expansion Storage Capacity Storage CapacityServer Functions Data Protection and Partitioning Data Protection and PartitioningApplication NAS NASWeb SAN SANDatabase CAS CASVendor Approaches to Cloud Computing Redundancy RedundancyRole of Open Source Software in Data Replication ReplicationCenter Multisiting Multisiting Cost Reduction vs. Reliability Backup and Recovery Backup and Recovery Open Source Server Software Server Software Environments that Server Software Environments thatOpen Source Database Software Support Cloud Computing Support Cloud Computing Open Source Applications Software Server Capacity Server CapacityOpen Source System Management Software Virtualization VirtualizationOpen Source Load-Balancing Software Clustering ClusteringVirtualization as the "Operating System" Expansion ExpansionVirtualization with a Host Operating System Server Functions Server FunctionsVirtualization Infections on Virtualized Application ApplicationEnvironments Web Web Type 1 Virtualized Environment Database Database Type 2 Virtualized Environment Vendor Approaches to Cloud Computing Vendor Approaches to Cloud Computing Virtualization Environments Role of Open Source Software in Data Role of Open Source Software in DataMicrosoft Virtualization Center Center Sun xVM VirtualBox Cost Reduction vs. Reliability Cost Reduction vs. ReliabilityLinux/UNIX Virtualization Open Source Server Software Open Source Server SoftwareVMware Products Open Source Database Software Open Source Database SoftwareData Center and Cloud Infrastructure Open Source Applications Software Open Source Applications SoftwareProducts Open Source System Management Open Source System ManagementEnd-User and Desktop Products Software SoftwareIBM Virtualization Open Source Load-Balancing Software Open Source Load-Balancing Software Using VMware to see a Virtualized Server Virtualization as the "Operating System" Virtualization as the "Operating System"Environment Virtualization with a Host Operating Virtualization with a Host OperatingPermissive Federation System SystemVerified Federation Virtualization Infections on Virtualized Virtualization Infections on VirtualizedEncrypted Federation Environments Environments Trusted Federation Type 1 Virtualized Environment Type 1 Virtualized EnvironmentUsing XMPP in the Federated Environment Type 2 Virtualized Environment Type 2 Virtualized EnvironmentPresence in the Cloud Virtualization Environments Virtualization Environments What It Is Microsoft Virtualization Microsoft VirtualizationPresence Protocols Sun xVM VirtualBox Sun xVM VirtualBoxLeveraging Presence Linux/UNIX Virtualization Linux/UNIX VirtualizationPresence Enabled VMware Products VMware ProductsThe Future of Presence Data Center and Cloud Infrastructure Data Center and Cloud InfrastructureThe Interrelation of Identity, Presence, and Products ProductsLocation in the Cloud End-User and Desktop Products End-User and Desktop Products Identity Management IBM Virtualization IBM VirtualizationWhat It Is Using VMware to see a Virtualized Server Using VMware to see a Virtualized ServerFuture of Identity in the Cloud Environment Environment Privacy and Its Relation to Cloud-Based Permissive Federation Permissive FederationInformation Systems Verified Federation Verified FederationPersonal Information Encrypted Federation Encrypted FederationPrivacy-Related Issues Trusted Federation Trusted FederationFinding Your Private Information Using XMPP in the Federated Using XMPP in the Federated EnvironmentOpen Cloud Consortium Working Groups Environment Presence in the Cloud Project Matsu Presence in the Cloud What It IsProject Comet What It Is Presence ProtocolsHPC in the Cloud Presence Protocols Leveraging PresenceThe Open Cloud Testbed Leveraging Presence Presence EnabledThe Open Science Data Cloud Presence Enabled The Future of PresenceIntercloud Testbed The Future of Presence The Interrelation of Identity, Presence, andReporting on an Open Cloud Consortium The Interrelation of Identity, Presence, Location in the CloudWorking Group and Location in the Cloud Identity Management Distributed Management Task Force Identity Management What It Is(DMTF) What It Is Future of Identity in the CloudWhat It Is? Future of Identity in the Cloud Privacy and Its Relation to Cloud-BasedDMTK Working Groups Associated with Privacy and Its Relation to Cloud-Based Information Systems

Page 14: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Cloud Computing Information Systems Personal InformationStandards for Application Developers Personal Information Privacy-Related IssuesProtocols Privacy-Related Issues Finding Your Private Information Scripting Languages Finding Your Private Information Open Cloud Consortium Working GroupsContent Formatting Standards and Open Cloud Consortium Working Groups Project MatsuLanguages Project Matsu Project CometStandards for Security in the Cloud Project Comet HPC in the CloudConfidentiality, Integrity, Availability HPC in the Cloud The Open Cloud TestbedAuthentication, Authorization, Accountability The Open Cloud Testbed The Open Science Data CloudRegulations for Privacy The Open Science Data Cloud Intercloud Testbed Security Protocols Intercloud Testbed Reporting on an Open Cloud ConsortiumEstablishing a Baseline for Cloud Reporting on an Open Cloud Consortium Working Group Performance Working Group Distributed Management Task ForceBest Practices for Selecting a Vendor and Distributed Management Task Force (DMTF) Implementing Cloud-Based Applications (DMTF) What It Is?Choosing the Right Vendor What It Is? DMTK Working Groups Associated withImplementing Cloud-Based Applications DMTK Working Groups Associated with Cloud ComputingWindows Remote Desktop Cloud Computing Standards for Application Developers Vnc Standards for Application Developers ProtocolsWeb Browsers Protocols Scripting LanguagesServer Extensions Scripting Languages Content Formatting Standards andThin Clients Content Formatting Standards and LanguagesSmart Phones, Pads, Pods, etc. Languages Standards for Security in the Cloud Virtual Terminal Security Strengths and Standards for Security in the Cloud Confidentiality, Integrity, AvailabilityWeaknesses Confidentiality, Integrity, Availability Authentication, Authorization,Strengths Authentication, Authorization, AccountabilityWeaknesses Accountability Regulations for PrivacyAndroid Regulations for Privacy Security ProtocolsBlackBerry Security Protocols Establishing a Baseline for CloudWindows Mobile Establishing a Baseline for Cloud Performance Ubuntu Mobile Internet Device Performance Best Practices for Selecting a Vendor andMobile Platform Virtualization Best Practices for Selecting a Vendor Implementing Cloud-Based Applications Kernel-Based Virtual Machine and Implementing Cloud-Based Choosing the Right VendorVMware Mobile Virtualization Platform Applications Implementing Cloud-Based Applications Collaboration Applications for Mobile Choosing the Right Vendor Windows Remote DesktopPlatforms Implementing Cloud-Based Applications VncText Messaging Windows Remote Desktop Web BrowsersiPhone Applications Vnc Server ExtensionsBlackBerry Applications Web Browsers Thin ClientsDroid Applications Server Extensions Smart Phones, Pads, Pods, etc.

Thin Clients Virtual Terminal Security Strengths andSmart Phones, Pads, Pods, etc. Weaknesses

line Virtual Terminal Security Strengths and StrengthsCloud Computing Infrastructure Weaknesses Weaknesses Cloud Computing Terms Strengths AndroidBenefits and Limitations of Cloud Computing Weaknesses BlackBerryBenefits Android Windows MobileLimitations BlackBerry Ubuntu Mobile Internet DeviceCloud Computing Case Studies Windows Mobile Mobile Platform Virtualization How Companies Are Using Cloud Ubuntu Mobile Internet Device Kernel-Based Virtual MachineComputing Mobile Platform Virtualization VMware Mobile Virtualization PlatformImplementing Applications and Services in Kernel-Based Virtual Machine Collaboration Applications for Mobilethe Cloud VMware Mobile Virtualization Platform Platforms Using Your Company's Services vs. the Collaboration Applications for Mobile Text MessagingCloud Provider Platforms iPhone ApplicationsA Cloud Service Provider Introduced Text Messaging BlackBerry ApplicationsCloud Computing Risks and Issues iPhone Applications Droid Applications Products and Services Provided by Cloud BlackBerry ApplicationsComputing Companies Droid Applications Economic lineStaffing Cloud Computing InfrastructureShould Your Company Invest in Cloud line Cloud Computing TermsComputing? Cloud Computing Infrastructure Benefits and Limitations of CloudWhat Should Not be Moved to the Cloud Cloud Computing Terms Computing LANs and the Cloud Benefits and Limitations of Cloud BenefitsInternet and the Cloud Computing Limitations

Page 15: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Web Services, Browsers, and the Cloud Benefits Cloud Computing Case StudiesThin Client Limitations How Companies Are Using CloudAdvances in Networking and Processing Cloud Computing Case Studies Computing Speeds that Led to Cloud Computing How Companies Are Using Cloud Implementing Applications and Services inNetworking Developments Computing the CloudIncreased Processing Speeds Implementing Applications and Services Using Your Company's Services vs. theManaged Service Provider Model to Cloud in the Cloud Cloud ProviderComputing and Software as a Service Using Your Company's Services vs. the A Cloud Service Provider Introduced(SaaS) Cloud Provider Cloud Computing Risks and Issues Single Purpose Architectures Migrate to A Cloud Service Provider Introduced Products and Services Provided by CloudMultipurpose Architectures Cloud Computing Risks and Issues Computing Companies Data Center Virtualization Products and Services Provided by Cloud EconomicCollaboration Computing Companies StaffingThe Cloud as a Reach Extender Economic Should Your Company Invest in CloudThe Cloud as a Communication Enabler Staffing Computing? The Cloud as an Employee Enabler Should Your Company Invest in Cloud What Should Not be Moved to the Cloud Service-Oriented Architecture (SOA) Computing? LANs and the Cloud Evolving from SOA to the Cloud What Should Not be Moved to the Cloud Internet and the Cloud Capacity: Limited Performance LANs and the Cloud Web Services, Browsers, and the Cloud Availability: Communications Failure and Internet and the Cloud Thin Client Performance Issues Web Services, Browsers, and the Cloud Advances in Networking and ProcessingSecurity: Newer Security Protocols Provide Thin Client Speeds that Led to Cloud Computing More Protection Advances in Networking and Processing Networking DevelopmentsWhat's Next in Cloud Computing Speeds that Led to Cloud Computing Increased Processing SpeedsIndependent Components Networking Developments Managed Service Provider Model to CloudMessage Base Increased Processing Speeds Computing and Software as a ServiceLocation Independence Managed Service Provider Model to (SaaS) Communication Requirements for Cloud Cloud Computing and Software as a Single Purpose Architectures Migrate toImplementation Service (SaaS) Multipurpose ArchitecturesPublic Internet Single Purpose Architectures Migrate to Data Center VirtualizationPrivate Internet Multipurpose Architectures Collaboration Routing to the Datacenter Data Center Virtualization The Cloud as a Reach ExtenderSwitching within the Data Center Collaboration The Cloud as a Communication EnablerBandwidth The Cloud as a Reach Extender The Cloud as an Employee EnablerTools Used to Measure Network The Cloud as a Communication Enabler Service-Oriented Architecture (SOA) Performance The Cloud as an Employee Enabler Evolving from SOA to the CloudUsing the Protocol Analyzer to Measure Service-Oriented Architecture (SOA) Capacity: Limited PerformanceBandwidth Evolving from SOA to the Cloud Availability: Communications Failure andUsing Ping and Traceroute to Measure Capacity: Limited Performance Performance IssuesNetwork Performance Availability: Communications Failure and Security: Newer Security Protocols ProvideSecurity Performance Issues More ProtectionSSL Security: Newer Security Protocols What's Next in Cloud Computing VPN Provide More Protection Independent ComponentsOverhead What's Next in Cloud Computing Message BaseStorage Options for Cloud Computing Independent Components Location IndependenceStorage Capacity Message Base Communication Requirements for CloudData Protection and Partitioning Location Independence Implementation NAS Communication Requirements for Cloud Public InternetSAN Implementation Private InternetCAS Public Internet Routing to the DatacenterRedundancy Private Internet Switching within the Data CenterReplication Routing to the Datacenter Bandwidth Multisiting Switching within the Data Center Tools Used to Measure NetworkBackup and Recovery Bandwidth Performance Server Software Environments that Support Tools Used to Measure Network Using the Protocol Analyzer to MeasureCloud Computing Performance Bandwidth Server Capacity Using the Protocol Analyzer to Measure Using Ping and Traceroute to MeasureVirtualization Bandwidth Network Performance Clustering Using Ping and Traceroute to Measure SecurityExpansion Network Performance SSLServer Functions Security VPN Application SSL Overhead Web VPN Storage Options for Cloud Computing Database Overhead Storage CapacityVendor Approaches to Cloud Computing Storage Options for Cloud Computing Data Protection and PartitioningRole of Open Source Software in Data Storage Capacity NAS

Page 16: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Center Data Protection and Partitioning SANCost Reduction vs. Reliability NAS CASOpen Source Server Software SAN RedundancyOpen Source Database Software CAS ReplicationOpen Source Applications Software Redundancy Multisiting Open Source System Management Software Replication Backup and Recovery Open Source Load-Balancing Software Multisiting Server Software Environments thatVirtualization as the "Operating System" Backup and Recovery Support Cloud Computing Virtualization with a Host Operating System Server Software Environments that Server CapacityVirtualization Infections on Virtualized Support Cloud Computing VirtualizationEnvironments Server Capacity ClusteringType 1 Virtualized Environment Virtualization ExpansionType 2 Virtualized Environment Clustering Server FunctionsVirtualization Environments Expansion ApplicationMicrosoft Virtualization Server Functions Web Sun xVM VirtualBox Application Database Linux/UNIX Virtualization Web Vendor Approaches to Cloud Computing VMware Products Database Role of Open Source Software in DataData Center and Cloud Infrastructure Vendor Approaches to Cloud Computing Center Products Role of Open Source Software in Data Cost Reduction vs. ReliabilityEnd-User and Desktop Products Center Open Source Server SoftwareIBM Virtualization Cost Reduction vs. Reliability Open Source Database SoftwareUsing VMware to see a Virtualized Server Open Source Server Software Open Source Applications SoftwareEnvironment Open Source Database Software Open Source System ManagementPermissive Federation Open Source Applications Software SoftwareVerified Federation Open Source System Management Open Source Load-Balancing Software Encrypted Federation Software Virtualization as the "Operating System"Trusted Federation Open Source Load-Balancing Software Virtualization with a Host OperatingUsing XMPP in the Federated Environment Virtualization as the "Operating System" SystemPresence in the Cloud Virtualization with a Host Operating Virtualization Infections on VirtualizedWhat It Is System Environments Presence Protocols Virtualization Infections on Virtualized Type 1 Virtualized EnvironmentLeveraging Presence Environments Type 2 Virtualized EnvironmentPresence Enabled Type 1 Virtualized Environment Virtualization Environments The Future of Presence Type 2 Virtualized Environment Microsoft VirtualizationThe Interrelation of Identity, Presence, and Virtualization Environments Sun xVM VirtualBoxLocation in the Cloud Microsoft Virtualization Linux/UNIX VirtualizationIdentity Management Sun xVM VirtualBox VMware ProductsWhat It Is Linux/UNIX Virtualization Data Center and Cloud InfrastructureFuture of Identity in the Cloud VMware Products ProductsPrivacy and Its Relation to Cloud-Based Data Center and Cloud Infrastructure End-User and Desktop Products Information Systems Products IBM VirtualizationPersonal Information End-User and Desktop Products Using VMware to see a Virtualized ServerPrivacy-Related Issues IBM Virtualization Environment Finding Your Private Information Using VMware to see a Virtualized Server Permissive FederationOpen Cloud Consortium Working Groups Environment Verified FederationProject Matsu Permissive Federation Encrypted FederationProject Comet Verified Federation Trusted FederationHPC in the Cloud Encrypted Federation Using XMPP in the Federated EnvironmentThe Open Cloud Testbed Trusted Federation Presence in the Cloud The Open Science Data Cloud Using XMPP in the Federated What It IsIntercloud Testbed Environment Presence ProtocolsReporting on an Open Cloud Consortium Presence in the Cloud Leveraging PresenceWorking Group What It Is Presence EnabledDistributed Management Task Force Presence Protocols The Future of Presence(DMTF) Leveraging Presence The Interrelation of Identity, Presence, andWhat It Is? Presence Enabled Location in the CloudDMTK Working Groups Associated with The Future of Presence Identity Management Cloud Computing The Interrelation of Identity, Presence, What It IsStandards for Application Developers and Location in the Cloud Future of Identity in the CloudProtocols Identity Management Privacy and Its Relation to Cloud-BasedScripting Languages What It Is Information Systems Content Formatting Standards and Future of Identity in the Cloud Personal InformationLanguages Privacy and Its Relation to Cloud-Based Privacy-Related IssuesStandards for Security in the Cloud Information Systems Finding Your Private Information Confidentiality, Integrity, Availability Personal Information Open Cloud Consortium Working Groups

Page 17: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Authentication, Authorization, Accountability Privacy-Related Issues Project MatsuRegulations for Privacy Finding Your Private Information Project CometSecurity Protocols Open Cloud Consortium Working Groups HPC in the CloudEstablishing a Baseline for Cloud Project Matsu The Open Cloud TestbedPerformance Project Comet The Open Science Data CloudBest Practices for Selecting a Vendor and HPC in the Cloud Intercloud Testbed Implementing Cloud-Based Applications The Open Cloud Testbed Reporting on an Open Cloud ConsortiumChoosing the Right Vendor The Open Science Data Cloud Working Group Implementing Cloud-Based Applications Intercloud Testbed Distributed Management Task ForceWindows Remote Desktop Reporting on an Open Cloud Consortium (DMTF) Vnc Working Group What It Is?Web Browsers Distributed Management Task Force DMTK Working Groups Associated withServer Extensions (DMTF) Cloud ComputingThin Clients What It Is? Standards for Application Developers Smart Phones, Pads, Pods, etc. DMTK Working Groups Associated with ProtocolsVirtual Terminal Security Strengths and Cloud Computing Scripting LanguagesWeaknesses Standards for Application Developers Content Formatting Standards andStrengths Protocols LanguagesWeaknesses Scripting Languages Standards for Security in the Cloud Android Content Formatting Standards and Confidentiality, Integrity, AvailabilityBlackBerry Languages Authentication, Authorization,Windows Mobile Standards for Security in the Cloud AccountabilityUbuntu Mobile Internet Device Confidentiality, Integrity, Availability Regulations for PrivacyMobile Platform Virtualization Authentication, Authorization, Security ProtocolsKernel-Based Virtual Machine Accountability Establishing a Baseline for CloudVMware Mobile Virtualization Platform Regulations for Privacy Performance Collaboration Applications for Mobile Security Protocols Best Practices for Selecting a Vendor andPlatforms Establishing a Baseline for Cloud Implementing Cloud-Based Applications Text Messaging Performance Choosing the Right VendoriPhone Applications Best Practices for Selecting a Vendor Implementing Cloud-Based Applications BlackBerry Applications and Implementing Cloud-Based Windows Remote DesktopDroid Applications Applications Vnc

Choosing the Right Vendor Web BrowsersImplementing Cloud-Based Applications Server Extensions

line Windows Remote Desktop Thin ClientsCloud Computing Infrastructure Vnc Smart Phones, Pads, Pods, etc.Cloud Computing Terms Web Browsers Virtual Terminal Security Strengths andBenefits and Limitations of Cloud Computing Server Extensions Weaknesses Benefits Thin Clients StrengthsLimitations Smart Phones, Pads, Pods, etc. Weaknesses Cloud Computing Case Studies Virtual Terminal Security Strengths and AndroidHow Companies Are Using Cloud Weaknesses BlackBerryComputing Strengths Windows MobileImplementing Applications and Services in Weaknesses Ubuntu Mobile Internet Devicethe Cloud Android Mobile Platform Virtualization Using Your Company's Services vs. the BlackBerry Kernel-Based Virtual MachineCloud Provider Windows Mobile VMware Mobile Virtualization PlatformA Cloud Service Provider Introduced Ubuntu Mobile Internet Device Collaboration Applications for MobileCloud Computing Risks and Issues Mobile Platform Virtualization Platforms Products and Services Provided by Cloud Kernel-Based Virtual Machine Text MessagingComputing Companies VMware Mobile Virtualization Platform iPhone ApplicationsEconomic Collaboration Applications for Mobile BlackBerry ApplicationsStaffing Platforms Droid Applications Should Your Company Invest in Cloud Text MessagingComputing? iPhone ApplicationsWhat Should Not be Moved to the Cloud BlackBerry Applications lineLANs and the Cloud Droid Applications Cloud Computing InfrastructureInternet and the Cloud Cloud Computing TermsWeb Services, Browsers, and the Cloud Benefits and Limitations of CloudThin Client line Computing Advances in Networking and Processing Cloud Computing Infrastructure BenefitsSpeeds that Led to Cloud Computing Cloud Computing Terms LimitationsNetworking Developments Benefits and Limitations of Cloud Cloud Computing Case StudiesIncreased Processing Speeds Computing How Companies Are Using CloudManaged Service Provider Model to Cloud Benefits Computing Computing and Software as a Service Limitations Implementing Applications and Services in

Page 18: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

(SaaS) Cloud Computing Case Studies the CloudSingle Purpose Architectures Migrate to How Companies Are Using Cloud Using Your Company's Services vs. theMultipurpose Architectures Computing Cloud ProviderData Center Virtualization Implementing Applications and Services A Cloud Service Provider IntroducedCollaboration in the Cloud Cloud Computing Risks and Issues The Cloud as a Reach Extender Using Your Company's Services vs. the Products and Services Provided by CloudThe Cloud as a Communication Enabler Cloud Provider Computing Companies The Cloud as an Employee Enabler A Cloud Service Provider Introduced EconomicService-Oriented Architecture (SOA) Cloud Computing Risks and Issues StaffingEvolving from SOA to the Cloud Products and Services Provided by Cloud Should Your Company Invest in CloudCapacity: Limited Performance Computing Companies Computing? Availability: Communications Failure and Economic What Should Not be Moved to the Cloud Performance Issues Staffing LANs and the Cloud Security: Newer Security Protocols Provide Should Your Company Invest in Cloud Internet and the Cloud More Protection Computing? Web Services, Browsers, and the Cloud What's Next in Cloud Computing What Should Not be Moved to the Cloud Thin Client Independent Components LANs and the Cloud Advances in Networking and ProcessingMessage Base Internet and the Cloud Speeds that Led to Cloud Computing Location Independence Web Services, Browsers, and the Cloud Networking DevelopmentsCommunication Requirements for Cloud Thin Client Increased Processing SpeedsImplementation Advances in Networking and Processing Managed Service Provider Model to CloudPublic Internet Speeds that Led to Cloud Computing Computing and Software as a ServicePrivate Internet Networking Developments (SaaS) Routing to the Datacenter Increased Processing Speeds Single Purpose Architectures Migrate toSwitching within the Data Center Managed Service Provider Model to Multipurpose ArchitecturesBandwidth Cloud Computing and Software as a Data Center VirtualizationTools Used to Measure Network Service (SaaS) Collaboration Performance Single Purpose Architectures Migrate to The Cloud as a Reach ExtenderUsing the Protocol Analyzer to Measure Multipurpose Architectures The Cloud as a Communication EnablerBandwidth Data Center Virtualization The Cloud as an Employee EnablerUsing Ping and Traceroute to Measure Collaboration Service-Oriented Architecture (SOA) Network Performance The Cloud as a Reach Extender Evolving from SOA to the CloudSecurity The Cloud as a Communication Enabler Capacity: Limited PerformanceSSL The Cloud as an Employee Enabler Availability: Communications Failure andVPN Service-Oriented Architecture (SOA) Performance IssuesOverhead Evolving from SOA to the Cloud Security: Newer Security Protocols ProvideStorage Options for Cloud Computing Capacity: Limited Performance More ProtectionStorage Capacity Availability: Communications Failure and What's Next in Cloud Computing Data Protection and Partitioning Performance Issues Independent ComponentsNAS Security: Newer Security Protocols Message BaseSAN Provide More Protection Location IndependenceCAS What's Next in Cloud Computing Communication Requirements for CloudRedundancy Independent Components Implementation Replication Message Base Public InternetMultisiting Location Independence Private InternetBackup and Recovery Communication Requirements for Cloud Routing to the DatacenterServer Software Environments that Support Implementation Switching within the Data CenterCloud Computing Public Internet Bandwidth Server Capacity Private Internet Tools Used to Measure NetworkVirtualization Routing to the Datacenter Performance Clustering Switching within the Data Center Using the Protocol Analyzer to MeasureExpansion Bandwidth Bandwidth Server Functions Tools Used to Measure Network Using Ping and Traceroute to MeasureApplication Performance Network Performance Web Using the Protocol Analyzer to Measure SecurityDatabase Bandwidth SSLVendor Approaches to Cloud Computing Using Ping and Traceroute to Measure VPN Role of Open Source Software in Data Network Performance Overhead Center Security Storage Options for Cloud Computing Cost Reduction vs. Reliability SSL Storage CapacityOpen Source Server Software VPN Data Protection and PartitioningOpen Source Database Software Overhead NASOpen Source Applications Software Storage Options for Cloud Computing SANOpen Source System Management Software Storage Capacity CASOpen Source Load-Balancing Software Data Protection and Partitioning RedundancyVirtualization as the "Operating System" NAS Replication

Page 19: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtualization with a Host Operating System SAN Multisiting Virtualization Infections on Virtualized CAS Backup and Recovery Environments Redundancy Server Software Environments thatType 1 Virtualized Environment Replication Support Cloud Computing Type 2 Virtualized Environment Multisiting Server CapacityVirtualization Environments Backup and Recovery VirtualizationMicrosoft Virtualization Server Software Environments that ClusteringSun xVM VirtualBox Support Cloud Computing ExpansionLinux/UNIX Virtualization Server Capacity Server FunctionsVMware Products Virtualization ApplicationData Center and Cloud Infrastructure Clustering Web Products Expansion Database End-User and Desktop Products Server Functions Vendor Approaches to Cloud Computing IBM Virtualization Application Role of Open Source Software in DataUsing VMware to see a Virtualized Server Web Center Environment Database Cost Reduction vs. ReliabilityPermissive Federation Vendor Approaches to Cloud Computing Open Source Server SoftwareVerified Federation Role of Open Source Software in Data Open Source Database SoftwareEncrypted Federation Center Open Source Applications SoftwareTrusted Federation Cost Reduction vs. Reliability Open Source System ManagementUsing XMPP in the Federated Environment Open Source Server Software SoftwarePresence in the Cloud Open Source Database Software Open Source Load-Balancing Software What It Is Open Source Applications Software Virtualization as the "Operating System"Presence Protocols Open Source System Management Virtualization with a Host OperatingLeveraging Presence Software SystemPresence Enabled Open Source Load-Balancing Software Virtualization Infections on VirtualizedThe Future of Presence Virtualization as the "Operating System" Environments The Interrelation of Identity, Presence, and Virtualization with a Host Operating Type 1 Virtualized EnvironmentLocation in the Cloud System Type 2 Virtualized EnvironmentIdentity Management Virtualization Infections on Virtualized Virtualization Environments What It Is Environments Microsoft VirtualizationFuture of Identity in the Cloud Type 1 Virtualized Environment Sun xVM VirtualBoxPrivacy and Its Relation to Cloud-Based Type 2 Virtualized Environment Linux/UNIX VirtualizationInformation Systems Virtualization Environments VMware ProductsPersonal Information Microsoft Virtualization Data Center and Cloud InfrastructurePrivacy-Related Issues Sun xVM VirtualBox ProductsFinding Your Private Information Linux/UNIX Virtualization End-User and Desktop Products Open Cloud Consortium Working Groups VMware Products IBM VirtualizationProject Matsu Data Center and Cloud Infrastructure Using VMware to see a Virtualized ServerProject Comet Products Environment HPC in the Cloud End-User and Desktop Products Permissive FederationThe Open Cloud Testbed IBM Virtualization Verified FederationThe Open Science Data Cloud Using VMware to see a Virtualized Server Encrypted FederationIntercloud Testbed Environment Trusted FederationReporting on an Open Cloud Consortium Permissive Federation Using XMPP in the Federated EnvironmentWorking Group Verified Federation Presence in the Cloud Distributed Management Task Force Encrypted Federation What It Is(DMTF) Trusted Federation Presence ProtocolsWhat It Is? Using XMPP in the Federated Leveraging PresenceDMTK Working Groups Associated with Environment Presence EnabledCloud Computing Presence in the Cloud The Future of PresenceStandards for Application Developers What It Is The Interrelation of Identity, Presence, andProtocols Presence Protocols Location in the CloudScripting Languages Leveraging Presence Identity Management Content Formatting Standards and Presence Enabled What It IsLanguages The Future of Presence Future of Identity in the CloudStandards for Security in the Cloud The Interrelation of Identity, Presence, Privacy and Its Relation to Cloud-BasedConfidentiality, Integrity, Availability and Location in the Cloud Information Systems Authentication, Authorization, Accountability Identity Management Personal InformationRegulations for Privacy What It Is Privacy-Related IssuesSecurity Protocols Future of Identity in the Cloud Finding Your Private Information Establishing a Baseline for Cloud Privacy and Its Relation to Cloud-Based Open Cloud Consortium Working GroupsPerformance Information Systems Project MatsuBest Practices for Selecting a Vendor and Personal Information Project CometImplementing Cloud-Based Applications Privacy-Related Issues HPC in the CloudChoosing the Right Vendor Finding Your Private Information The Open Cloud Testbed

Page 20: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Implementing Cloud-Based Applications Open Cloud Consortium Working Groups The Open Science Data CloudWindows Remote Desktop Project Matsu Intercloud Testbed Vnc Project Comet Reporting on an Open Cloud ConsortiumWeb Browsers HPC in the Cloud Working Group Server Extensions The Open Cloud Testbed Distributed Management Task ForceThin Clients The Open Science Data Cloud (DMTF) Smart Phones, Pads, Pods, etc. Intercloud Testbed What It Is?Virtual Terminal Security Strengths and Reporting on an Open Cloud Consortium DMTK Working Groups Associated withWeaknesses Working Group Cloud ComputingStrengths Distributed Management Task Force Standards for Application Developers Weaknesses (DMTF) ProtocolsAndroid What It Is? Scripting LanguagesBlackBerry DMTK Working Groups Associated with Content Formatting Standards andWindows Mobile Cloud Computing LanguagesUbuntu Mobile Internet Device Standards for Application Developers Standards for Security in the Cloud Mobile Platform Virtualization Protocols Confidentiality, Integrity, AvailabilityKernel-Based Virtual Machine Scripting Languages Authentication, Authorization,VMware Mobile Virtualization Platform Content Formatting Standards and AccountabilityCollaboration Applications for Mobile Languages Regulations for PrivacyPlatforms Standards for Security in the Cloud Security ProtocolsText Messaging Confidentiality, Integrity, Availability Establishing a Baseline for CloudiPhone Applications Authentication, Authorization, Performance BlackBerry Applications Accountability Best Practices for Selecting a Vendor andDroid Applications Regulations for Privacy Implementing Cloud-Based Applications

Security Protocols Choosing the Right VendorEstablishing a Baseline for Cloud Implementing Cloud-Based Applications

line Performance Windows Remote DesktopCloud Computing Infrastructure Best Practices for Selecting a Vendor VncCloud Computing Terms and Implementing Cloud-Based Web BrowsersBenefits and Limitations of Cloud Computing Applications Server ExtensionsBenefits Choosing the Right Vendor Thin ClientsLimitations Implementing Cloud-Based Applications Smart Phones, Pads, Pods, etc.Cloud Computing Case Studies Windows Remote Desktop Virtual Terminal Security Strengths andHow Companies Are Using Cloud Vnc Weaknesses Computing Web Browsers StrengthsImplementing Applications and Services in Server Extensions Weaknesses the Cloud Thin Clients AndroidUsing Your Company's Services vs. the Smart Phones, Pads, Pods, etc. BlackBerryCloud Provider Virtual Terminal Security Strengths and Windows MobileA Cloud Service Provider Introduced Weaknesses Ubuntu Mobile Internet DeviceCloud Computing Risks and Issues Strengths Mobile Platform Virtualization Products and Services Provided by Cloud Weaknesses Kernel-Based Virtual MachineComputing Companies Android VMware Mobile Virtualization PlatformEconomic BlackBerry Collaboration Applications for MobileStaffing Windows Mobile Platforms Should Your Company Invest in Cloud Ubuntu Mobile Internet Device Text MessagingComputing? Mobile Platform Virtualization iPhone ApplicationsWhat Should Not be Moved to the Cloud Kernel-Based Virtual Machine BlackBerry ApplicationsLANs and the Cloud VMware Mobile Virtualization Platform Droid Applications Internet and the Cloud Collaboration Applications for MobileWeb Services, Browsers, and the Cloud Platforms Thin Client Text Messaging lineAdvances in Networking and Processing iPhone Applications Cloud Computing InfrastructureSpeeds that Led to Cloud Computing BlackBerry Applications Cloud Computing TermsNetworking Developments Droid Applications Benefits and Limitations of CloudIncreased Processing Speeds Computing Managed Service Provider Model to Cloud BenefitsComputing and Software as a Service line Limitations(SaaS) Cloud Computing Infrastructure Cloud Computing Case StudiesSingle Purpose Architectures Migrate to Cloud Computing Terms How Companies Are Using CloudMultipurpose Architectures Benefits and Limitations of Cloud Computing Data Center Virtualization Computing Implementing Applications and Services inCollaboration Benefits the CloudThe Cloud as a Reach Extender Limitations Using Your Company's Services vs. theThe Cloud as a Communication Enabler Cloud Computing Case Studies Cloud ProviderThe Cloud as an Employee Enabler How Companies Are Using Cloud A Cloud Service Provider Introduced

Page 21: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Service-Oriented Architecture (SOA) Computing Cloud Computing Risks and Issues Evolving from SOA to the Cloud Implementing Applications and Services Products and Services Provided by CloudCapacity: Limited Performance in the Cloud Computing Companies Availability: Communications Failure and Using Your Company's Services vs. the EconomicPerformance Issues Cloud Provider StaffingSecurity: Newer Security Protocols Provide A Cloud Service Provider Introduced Should Your Company Invest in CloudMore Protection Cloud Computing Risks and Issues Computing? What's Next in Cloud Computing Products and Services Provided by Cloud What Should Not be Moved to the Cloud Independent Components Computing Companies LANs and the Cloud Message Base Economic Internet and the Cloud Location Independence Staffing Web Services, Browsers, and the Cloud Communication Requirements for Cloud Should Your Company Invest in Cloud Thin Client Implementation Computing? Advances in Networking and ProcessingPublic Internet What Should Not be Moved to the Cloud Speeds that Led to Cloud Computing Private Internet LANs and the Cloud Networking DevelopmentsRouting to the Datacenter Internet and the Cloud Increased Processing SpeedsSwitching within the Data Center Web Services, Browsers, and the Cloud Managed Service Provider Model to CloudBandwidth Thin Client Computing and Software as a ServiceTools Used to Measure Network Advances in Networking and Processing (SaaS) Performance Speeds that Led to Cloud Computing Single Purpose Architectures Migrate toUsing the Protocol Analyzer to Measure Networking Developments Multipurpose ArchitecturesBandwidth Increased Processing Speeds Data Center VirtualizationUsing Ping and Traceroute to Measure Managed Service Provider Model to Collaboration Network Performance Cloud Computing and Software as a The Cloud as a Reach ExtenderSecurity Service (SaaS) The Cloud as a Communication EnablerSSL Single Purpose Architectures Migrate to The Cloud as an Employee EnablerVPN Multipurpose Architectures Service-Oriented Architecture (SOA) Overhead Data Center Virtualization Evolving from SOA to the CloudStorage Options for Cloud Computing Collaboration Capacity: Limited PerformanceStorage Capacity The Cloud as a Reach Extender Availability: Communications Failure andData Protection and Partitioning The Cloud as a Communication Enabler Performance IssuesNAS The Cloud as an Employee Enabler Security: Newer Security Protocols ProvideSAN Service-Oriented Architecture (SOA) More ProtectionCAS Evolving from SOA to the Cloud What's Next in Cloud Computing Redundancy Capacity: Limited Performance Independent ComponentsReplication Availability: Communications Failure and Message BaseMultisiting Performance Issues Location IndependenceBackup and Recovery Security: Newer Security Protocols Communication Requirements for CloudServer Software Environments that Support Provide More Protection Implementation Cloud Computing What's Next in Cloud Computing Public InternetServer Capacity Independent Components Private InternetVirtualization Message Base Routing to the DatacenterClustering Location Independence Switching within the Data CenterExpansion Communication Requirements for Cloud Bandwidth Server Functions Implementation Tools Used to Measure NetworkApplication Public Internet Performance Web Private Internet Using the Protocol Analyzer to MeasureDatabase Routing to the Datacenter Bandwidth Vendor Approaches to Cloud Computing Switching within the Data Center Using Ping and Traceroute to MeasureRole of Open Source Software in Data Bandwidth Network Performance Center Tools Used to Measure Network SecurityCost Reduction vs. Reliability Performance SSLOpen Source Server Software Using the Protocol Analyzer to Measure VPN Open Source Database Software Bandwidth Overhead Open Source Applications Software Using Ping and Traceroute to Measure Storage Options for Cloud Computing Open Source System Management Software Network Performance Storage CapacityOpen Source Load-Balancing Software Security Data Protection and PartitioningVirtualization as the "Operating System" SSL NASVirtualization with a Host Operating System VPN SANVirtualization Infections on Virtualized Overhead CASEnvironments Storage Options for Cloud Computing RedundancyType 1 Virtualized Environment Storage Capacity ReplicationType 2 Virtualized Environment Data Protection and Partitioning Multisiting Virtualization Environments NAS Backup and Recovery Microsoft Virtualization SAN Server Software Environments thatSun xVM VirtualBox CAS Support Cloud Computing

Page 22: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Linux/UNIX Virtualization Redundancy Server CapacityVMware Products Replication VirtualizationData Center and Cloud Infrastructure Multisiting ClusteringProducts Backup and Recovery ExpansionEnd-User and Desktop Products Server Software Environments that Server FunctionsIBM Virtualization Support Cloud Computing ApplicationUsing VMware to see a Virtualized Server Server Capacity Web Environment Virtualization Database Permissive Federation Clustering Vendor Approaches to Cloud Computing Verified Federation Expansion Role of Open Source Software in DataEncrypted Federation Server Functions Center Trusted Federation Application Cost Reduction vs. ReliabilityUsing XMPP in the Federated Environment Web Open Source Server SoftwarePresence in the Cloud Database Open Source Database SoftwareWhat It Is Vendor Approaches to Cloud Computing Open Source Applications SoftwarePresence Protocols Role of Open Source Software in Data Open Source System ManagementLeveraging Presence Center SoftwarePresence Enabled Cost Reduction vs. Reliability Open Source Load-Balancing Software The Future of Presence Open Source Server Software Virtualization as the "Operating System"The Interrelation of Identity, Presence, and Open Source Database Software Virtualization with a Host OperatingLocation in the Cloud Open Source Applications Software SystemIdentity Management Open Source System Management Virtualization Infections on VirtualizedWhat It Is Software Environments Future of Identity in the Cloud Open Source Load-Balancing Software Type 1 Virtualized EnvironmentPrivacy and Its Relation to Cloud-Based Virtualization as the "Operating System" Type 2 Virtualized EnvironmentInformation Systems Virtualization with a Host Operating Virtualization Environments Personal Information System Microsoft VirtualizationPrivacy-Related Issues Virtualization Infections on Virtualized Sun xVM VirtualBoxFinding Your Private Information Environments Linux/UNIX VirtualizationOpen Cloud Consortium Working Groups Type 1 Virtualized Environment VMware ProductsProject Matsu Type 2 Virtualized Environment Data Center and Cloud InfrastructureProject Comet Virtualization Environments ProductsHPC in the Cloud Microsoft Virtualization End-User and Desktop Products The Open Cloud Testbed Sun xVM VirtualBox IBM VirtualizationThe Open Science Data Cloud Linux/UNIX Virtualization Using VMware to see a Virtualized ServerIntercloud Testbed VMware Products Environment Reporting on an Open Cloud Consortium Data Center and Cloud Infrastructure Permissive FederationWorking Group Products Verified FederationDistributed Management Task Force End-User and Desktop Products Encrypted Federation(DMTF) IBM Virtualization Trusted FederationWhat It Is? Using VMware to see a Virtualized Server Using XMPP in the Federated EnvironmentDMTK Working Groups Associated with Environment Presence in the Cloud Cloud Computing Permissive Federation What It IsStandards for Application Developers Verified Federation Presence ProtocolsProtocols Encrypted Federation Leveraging PresenceScripting Languages Trusted Federation Presence EnabledContent Formatting Standards and Using XMPP in the Federated The Future of PresenceLanguages Environment The Interrelation of Identity, Presence, andStandards for Security in the Cloud Presence in the Cloud Location in the CloudConfidentiality, Integrity, Availability What It Is Identity Management Authentication, Authorization, Accountability Presence Protocols What It IsRegulations for Privacy Leveraging Presence Future of Identity in the CloudSecurity Protocols Presence Enabled Privacy and Its Relation to Cloud-BasedEstablishing a Baseline for Cloud The Future of Presence Information Systems Performance The Interrelation of Identity, Presence, Personal InformationBest Practices for Selecting a Vendor and and Location in the Cloud Privacy-Related IssuesImplementing Cloud-Based Applications Identity Management Finding Your Private Information Choosing the Right Vendor What It Is Open Cloud Consortium Working GroupsImplementing Cloud-Based Applications Future of Identity in the Cloud Project MatsuWindows Remote Desktop Privacy and Its Relation to Cloud-Based Project CometVnc Information Systems HPC in the CloudWeb Browsers Personal Information The Open Cloud TestbedServer Extensions Privacy-Related Issues The Open Science Data CloudThin Clients Finding Your Private Information Intercloud Testbed Smart Phones, Pads, Pods, etc. Open Cloud Consortium Working Groups Reporting on an Open Cloud ConsortiumVirtual Terminal Security Strengths and Project Matsu Working Group

Page 23: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Weaknesses Project Comet Distributed Management Task ForceStrengths HPC in the Cloud (DMTF) Weaknesses The Open Cloud Testbed What It Is?Android The Open Science Data Cloud DMTK Working Groups Associated withBlackBerry Intercloud Testbed Cloud ComputingWindows Mobile Reporting on an Open Cloud Consortium Standards for Application Developers Ubuntu Mobile Internet Device Working Group ProtocolsMobile Platform Virtualization Distributed Management Task Force Scripting LanguagesKernel-Based Virtual Machine (DMTF) Content Formatting Standards andVMware Mobile Virtualization Platform What It Is? LanguagesCollaboration Applications for Mobile DMTK Working Groups Associated with Standards for Security in the Cloud Platforms Cloud Computing Confidentiality, Integrity, AvailabilityText Messaging Standards for Application Developers Authentication, Authorization,iPhone Applications Protocols AccountabilityBlackBerry Applications Scripting Languages Regulations for PrivacyDroid Applications Content Formatting Standards and Security Protocols

Languages Establishing a Baseline for CloudStandards for Security in the Cloud Performance

line Confidentiality, Integrity, Availability Best Practices for Selecting a Vendor andCloud Computing Infrastructure Authentication, Authorization, Implementing Cloud-Based Applications Cloud Computing Terms Accountability Choosing the Right VendorBenefits and Limitations of Cloud Computing Regulations for Privacy Implementing Cloud-Based Applications Benefits Security Protocols Windows Remote DesktopLimitations Establishing a Baseline for Cloud VncCloud Computing Case Studies Performance Web BrowsersHow Companies Are Using Cloud Best Practices for Selecting a Vendor Server ExtensionsComputing and Implementing Cloud-Based Thin ClientsImplementing Applications and Services in Applications Smart Phones, Pads, Pods, etc.the Cloud Choosing the Right Vendor Virtual Terminal Security Strengths andUsing Your Company's Services vs. the Implementing Cloud-Based Applications Weaknesses Cloud Provider Windows Remote Desktop StrengthsA Cloud Service Provider Introduced Vnc Weaknesses Cloud Computing Risks and Issues Web Browsers AndroidProducts and Services Provided by Cloud Server Extensions BlackBerryComputing Companies Thin Clients Windows MobileEconomic Smart Phones, Pads, Pods, etc. Ubuntu Mobile Internet DeviceStaffing Virtual Terminal Security Strengths and Mobile Platform Virtualization Should Your Company Invest in Cloud Weaknesses Kernel-Based Virtual MachineComputing? Strengths VMware Mobile Virtualization PlatformWhat Should Not be Moved to the Cloud Weaknesses Collaboration Applications for MobileLANs and the Cloud Android Platforms Internet and the Cloud BlackBerry Text MessagingWeb Services, Browsers, and the Cloud Windows Mobile iPhone ApplicationsThin Client Ubuntu Mobile Internet Device BlackBerry ApplicationsAdvances in Networking and Processing Mobile Platform Virtualization Droid Applications Speeds that Led to Cloud Computing Kernel-Based Virtual MachineNetworking Developments VMware Mobile Virtualization PlatformIncreased Processing Speeds Collaboration Applications for Mobile lineManaged Service Provider Model to Cloud Platforms Cloud Computing InfrastructureComputing and Software as a Service Text Messaging Cloud Computing Terms(SaaS) iPhone Applications Benefits and Limitations of CloudSingle Purpose Architectures Migrate to BlackBerry Applications Computing Multipurpose Architectures Droid Applications BenefitsData Center Virtualization LimitationsCollaboration Cloud Computing Case StudiesThe Cloud as a Reach Extender line How Companies Are Using CloudThe Cloud as a Communication Enabler Cloud Computing Infrastructure Computing The Cloud as an Employee Enabler Cloud Computing Terms Implementing Applications and Services inService-Oriented Architecture (SOA) Benefits and Limitations of Cloud the CloudEvolving from SOA to the Cloud Computing Using Your Company's Services vs. theCapacity: Limited Performance Benefits Cloud ProviderAvailability: Communications Failure and Limitations A Cloud Service Provider IntroducedPerformance Issues Cloud Computing Case Studies Cloud Computing Risks and Issues Security: Newer Security Protocols Provide How Companies Are Using Cloud Products and Services Provided by CloudMore Protection Computing Computing Companies What's Next in Cloud Computing Implementing Applications and Services Economic

Page 24: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Independent Components in the Cloud StaffingMessage Base Using Your Company's Services vs. the Should Your Company Invest in CloudLocation Independence Cloud Provider Computing? Communication Requirements for Cloud A Cloud Service Provider Introduced What Should Not be Moved to the Cloud Implementation Cloud Computing Risks and Issues LANs and the Cloud Public Internet Products and Services Provided by Cloud Internet and the Cloud Private Internet Computing Companies Web Services, Browsers, and the Cloud Routing to the Datacenter Economic Thin Client Switching within the Data Center Staffing Advances in Networking and ProcessingBandwidth Should Your Company Invest in Cloud Speeds that Led to Cloud Computing Tools Used to Measure Network Computing? Networking DevelopmentsPerformance What Should Not be Moved to the Cloud Increased Processing SpeedsUsing the Protocol Analyzer to Measure LANs and the Cloud Managed Service Provider Model to CloudBandwidth Internet and the Cloud Computing and Software as a ServiceUsing Ping and Traceroute to Measure Web Services, Browsers, and the Cloud (SaaS) Network Performance Thin Client Single Purpose Architectures Migrate toSecurity Advances in Networking and Processing Multipurpose ArchitecturesSSL Speeds that Led to Cloud Computing Data Center VirtualizationVPN Networking Developments Collaboration Overhead Increased Processing Speeds The Cloud as a Reach ExtenderStorage Options for Cloud Computing Managed Service Provider Model to The Cloud as a Communication EnablerStorage Capacity Cloud Computing and Software as a The Cloud as an Employee EnablerData Protection and Partitioning Service (SaaS) Service-Oriented Architecture (SOA) NAS Single Purpose Architectures Migrate to Evolving from SOA to the CloudSAN Multipurpose Architectures Capacity: Limited PerformanceCAS Data Center Virtualization Availability: Communications Failure andRedundancy Collaboration Performance IssuesReplication The Cloud as a Reach Extender Security: Newer Security Protocols ProvideMultisiting The Cloud as a Communication Enabler More ProtectionBackup and Recovery The Cloud as an Employee Enabler What's Next in Cloud Computing Server Software Environments that Support Service-Oriented Architecture (SOA) Independent ComponentsCloud Computing Evolving from SOA to the Cloud Message BaseServer Capacity Capacity: Limited Performance Location IndependenceVirtualization Availability: Communications Failure and Communication Requirements for CloudClustering Performance Issues Implementation Expansion Security: Newer Security Protocols Public InternetServer Functions Provide More Protection Private InternetApplication What's Next in Cloud Computing Routing to the DatacenterWeb Independent Components Switching within the Data CenterDatabase Message Base Bandwidth Vendor Approaches to Cloud Computing Location Independence Tools Used to Measure NetworkRole of Open Source Software in Data Communication Requirements for Cloud Performance Center Implementation Using the Protocol Analyzer to MeasureCost Reduction vs. Reliability Public Internet Bandwidth Open Source Server Software Private Internet Using Ping and Traceroute to MeasureOpen Source Database Software Routing to the Datacenter Network Performance Open Source Applications Software Switching within the Data Center SecurityOpen Source System Management Software Bandwidth SSLOpen Source Load-Balancing Software Tools Used to Measure Network VPN Virtualization as the "Operating System" Performance Overhead Virtualization with a Host Operating System Using the Protocol Analyzer to Measure Storage Options for Cloud Computing Virtualization Infections on Virtualized Bandwidth Storage CapacityEnvironments Using Ping and Traceroute to Measure Data Protection and PartitioningType 1 Virtualized Environment Network Performance NASType 2 Virtualized Environment Security SANVirtualization Environments SSL CASMicrosoft Virtualization VPN RedundancySun xVM VirtualBox Overhead ReplicationLinux/UNIX Virtualization Storage Options for Cloud Computing Multisiting VMware Products Storage Capacity Backup and Recovery Data Center and Cloud Infrastructure Data Protection and Partitioning Server Software Environments thatProducts NAS Support Cloud Computing End-User and Desktop Products SAN Server CapacityIBM Virtualization CAS VirtualizationUsing VMware to see a Virtualized Server Redundancy ClusteringEnvironment Replication Expansion

Page 25: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Permissive Federation Multisiting Server FunctionsVerified Federation Backup and Recovery ApplicationEncrypted Federation Server Software Environments that Web Trusted Federation Support Cloud Computing Database Using XMPP in the Federated Environment Server Capacity Vendor Approaches to Cloud Computing Presence in the Cloud Virtualization Role of Open Source Software in DataWhat It Is Clustering Center Presence Protocols Expansion Cost Reduction vs. ReliabilityLeveraging Presence Server Functions Open Source Server SoftwarePresence Enabled Application Open Source Database SoftwareThe Future of Presence Web Open Source Applications SoftwareThe Interrelation of Identity, Presence, and Database Open Source System ManagementLocation in the Cloud Vendor Approaches to Cloud Computing SoftwareIdentity Management Role of Open Source Software in Data Open Source Load-Balancing Software What It Is Center Virtualization as the "Operating System"Future of Identity in the Cloud Cost Reduction vs. Reliability Virtualization with a Host OperatingPrivacy and Its Relation to Cloud-Based Open Source Server Software SystemInformation Systems Open Source Database Software Virtualization Infections on VirtualizedPersonal Information Open Source Applications Software Environments Privacy-Related Issues Open Source System Management Type 1 Virtualized EnvironmentFinding Your Private Information Software Type 2 Virtualized EnvironmentOpen Cloud Consortium Working Groups Open Source Load-Balancing Software Virtualization Environments Project Matsu Virtualization as the "Operating System" Microsoft VirtualizationProject Comet Virtualization with a Host Operating Sun xVM VirtualBoxHPC in the Cloud System Linux/UNIX VirtualizationThe Open Cloud Testbed Virtualization Infections on Virtualized VMware ProductsThe Open Science Data Cloud Environments Data Center and Cloud InfrastructureIntercloud Testbed Type 1 Virtualized Environment ProductsReporting on an Open Cloud Consortium Type 2 Virtualized Environment End-User and Desktop Products Working Group Virtualization Environments IBM VirtualizationDistributed Management Task Force Microsoft Virtualization Using VMware to see a Virtualized Server(DMTF) Sun xVM VirtualBox Environment What It Is? Linux/UNIX Virtualization Permissive FederationDMTK Working Groups Associated with VMware Products Verified FederationCloud Computing Data Center and Cloud Infrastructure Encrypted FederationStandards for Application Developers Products Trusted FederationProtocols End-User and Desktop Products Using XMPP in the Federated EnvironmentScripting Languages IBM Virtualization Presence in the Cloud Content Formatting Standards and Using VMware to see a Virtualized Server What It IsLanguages Environment Presence ProtocolsStandards for Security in the Cloud Permissive Federation Leveraging PresenceConfidentiality, Integrity, Availability Verified Federation Presence EnabledAuthentication, Authorization, Accountability Encrypted Federation The Future of PresenceRegulations for Privacy Trusted Federation The Interrelation of Identity, Presence, andSecurity Protocols Using XMPP in the Federated Location in the CloudEstablishing a Baseline for Cloud Environment Identity Management Performance Presence in the Cloud What It IsBest Practices for Selecting a Vendor and What It Is Future of Identity in the CloudImplementing Cloud-Based Applications Presence Protocols Privacy and Its Relation to Cloud-BasedChoosing the Right Vendor Leveraging Presence Information Systems Implementing Cloud-Based Applications Presence Enabled Personal InformationWindows Remote Desktop The Future of Presence Privacy-Related IssuesVnc The Interrelation of Identity, Presence, Finding Your Private Information Web Browsers and Location in the Cloud Open Cloud Consortium Working GroupsServer Extensions Identity Management Project MatsuThin Clients What It Is Project CometSmart Phones, Pads, Pods, etc. Future of Identity in the Cloud HPC in the CloudVirtual Terminal Security Strengths and Privacy and Its Relation to Cloud-Based The Open Cloud TestbedWeaknesses Information Systems The Open Science Data CloudStrengths Personal Information Intercloud Testbed Weaknesses Privacy-Related Issues Reporting on an Open Cloud ConsortiumAndroid Finding Your Private Information Working Group BlackBerry Open Cloud Consortium Working Groups Distributed Management Task ForceWindows Mobile Project Matsu (DMTF) Ubuntu Mobile Internet Device Project Comet What It Is?Mobile Platform Virtualization HPC in the Cloud DMTK Working Groups Associated with

Page 26: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Kernel-Based Virtual Machine The Open Cloud Testbed Cloud ComputingVMware Mobile Virtualization Platform The Open Science Data Cloud Standards for Application Developers Collaboration Applications for Mobile Intercloud Testbed ProtocolsPlatforms Reporting on an Open Cloud Consortium Scripting LanguagesText Messaging Working Group Content Formatting Standards andiPhone Applications Distributed Management Task Force LanguagesBlackBerry Applications (DMTF) Standards for Security in the Cloud Droid Applications What It Is? Confidentiality, Integrity, Availability

DMTK Working Groups Associated with Authentication, Authorization,Cloud Computing Accountability

line Standards for Application Developers Regulations for PrivacyCloud Computing Infrastructure Protocols Security ProtocolsCloud Computing Terms Scripting Languages Establishing a Baseline for CloudBenefits and Limitations of Cloud Computing Content Formatting Standards and Performance Benefits Languages Best Practices for Selecting a Vendor andLimitations Standards for Security in the Cloud Implementing Cloud-Based Applications Cloud Computing Case Studies Confidentiality, Integrity, Availability Choosing the Right VendorHow Companies Are Using Cloud Authentication, Authorization, Implementing Cloud-Based Applications Computing Accountability Windows Remote DesktopImplementing Applications and Services in Regulations for Privacy Vncthe Cloud Security Protocols Web BrowsersUsing Your Company's Services vs. the Establishing a Baseline for Cloud Server ExtensionsCloud Provider Performance Thin ClientsA Cloud Service Provider Introduced Best Practices for Selecting a Vendor Smart Phones, Pads, Pods, etc.Cloud Computing Risks and Issues and Implementing Cloud-Based Virtual Terminal Security Strengths andProducts and Services Provided by Cloud Applications Weaknesses Computing Companies Choosing the Right Vendor StrengthsEconomic Implementing Cloud-Based Applications Weaknesses Staffing Windows Remote Desktop AndroidShould Your Company Invest in Cloud Vnc BlackBerryComputing? Web Browsers Windows MobileWhat Should Not be Moved to the Cloud Server Extensions Ubuntu Mobile Internet DeviceLANs and the Cloud Thin Clients Mobile Platform Virtualization Internet and the Cloud Smart Phones, Pads, Pods, etc. Kernel-Based Virtual MachineWeb Services, Browsers, and the Cloud Virtual Terminal Security Strengths and VMware Mobile Virtualization PlatformThin Client Weaknesses Collaboration Applications for MobileAdvances in Networking and Processing Strengths Platforms Speeds that Led to Cloud Computing Weaknesses Text MessagingNetworking Developments Android iPhone ApplicationsIncreased Processing Speeds BlackBerry BlackBerry ApplicationsManaged Service Provider Model to Cloud Windows Mobile Droid Applications Computing and Software as a Service Ubuntu Mobile Internet Device(SaaS) Mobile Platform Virtualization Single Purpose Architectures Migrate to Kernel-Based Virtual Machine lineMultipurpose Architectures VMware Mobile Virtualization Platform Cloud Computing InfrastructureData Center Virtualization Collaboration Applications for Mobile Cloud Computing TermsCollaboration Platforms Benefits and Limitations of CloudThe Cloud as a Reach Extender Text Messaging Computing The Cloud as a Communication Enabler iPhone Applications BenefitsThe Cloud as an Employee Enabler BlackBerry Applications LimitationsService-Oriented Architecture (SOA) Droid Applications Cloud Computing Case StudiesEvolving from SOA to the Cloud How Companies Are Using CloudCapacity: Limited Performance Computing Availability: Communications Failure and line Implementing Applications and Services inPerformance Issues Cloud Computing Infrastructure the CloudSecurity: Newer Security Protocols Provide Cloud Computing Terms Using Your Company's Services vs. theMore Protection Benefits and Limitations of Cloud Cloud ProviderWhat's Next in Cloud Computing Computing A Cloud Service Provider IntroducedIndependent Components Benefits Cloud Computing Risks and Issues Message Base Limitations Products and Services Provided by CloudLocation Independence Cloud Computing Case Studies Computing Companies Communication Requirements for Cloud How Companies Are Using Cloud EconomicImplementation Computing StaffingPublic Internet Implementing Applications and Services Should Your Company Invest in CloudPrivate Internet in the Cloud Computing? Routing to the Datacenter Using Your Company's Services vs. the What Should Not be Moved to the Cloud

Page 27: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Switching within the Data Center Cloud Provider LANs and the Cloud Bandwidth A Cloud Service Provider Introduced Internet and the Cloud Tools Used to Measure Network Cloud Computing Risks and Issues Web Services, Browsers, and the Cloud Performance Products and Services Provided by Cloud Thin Client Using the Protocol Analyzer to Measure Computing Companies Advances in Networking and ProcessingBandwidth Economic Speeds that Led to Cloud Computing Using Ping and Traceroute to Measure Staffing Networking DevelopmentsNetwork Performance Should Your Company Invest in Cloud Increased Processing SpeedsSecurity Computing? Managed Service Provider Model to CloudSSL What Should Not be Moved to the Cloud Computing and Software as a ServiceVPN LANs and the Cloud (SaaS) Overhead Internet and the Cloud Single Purpose Architectures Migrate toStorage Options for Cloud Computing Web Services, Browsers, and the Cloud Multipurpose ArchitecturesStorage Capacity Thin Client Data Center VirtualizationData Protection and Partitioning Advances in Networking and Processing Collaboration NAS Speeds that Led to Cloud Computing The Cloud as a Reach ExtenderSAN Networking Developments The Cloud as a Communication EnablerCAS Increased Processing Speeds The Cloud as an Employee EnablerRedundancy Managed Service Provider Model to Service-Oriented Architecture (SOA) Replication Cloud Computing and Software as a Evolving from SOA to the CloudMultisiting Service (SaaS) Capacity: Limited PerformanceBackup and Recovery Single Purpose Architectures Migrate to Availability: Communications Failure andServer Software Environments that Support Multipurpose Architectures Performance IssuesCloud Computing Data Center Virtualization Security: Newer Security Protocols ProvideServer Capacity Collaboration More ProtectionVirtualization The Cloud as a Reach Extender What's Next in Cloud Computing Clustering The Cloud as a Communication Enabler Independent ComponentsExpansion The Cloud as an Employee Enabler Message BaseServer Functions Service-Oriented Architecture (SOA) Location IndependenceApplication Evolving from SOA to the Cloud Communication Requirements for CloudWeb Capacity: Limited Performance Implementation Database Availability: Communications Failure and Public InternetVendor Approaches to Cloud Computing Performance Issues Private InternetRole of Open Source Software in Data Security: Newer Security Protocols Routing to the DatacenterCenter Provide More Protection Switching within the Data CenterCost Reduction vs. Reliability What's Next in Cloud Computing Bandwidth Open Source Server Software Independent Components Tools Used to Measure NetworkOpen Source Database Software Message Base Performance Open Source Applications Software Location Independence Using the Protocol Analyzer to MeasureOpen Source System Management Software Communication Requirements for Cloud Bandwidth Open Source Load-Balancing Software Implementation Using Ping and Traceroute to MeasureVirtualization as the "Operating System" Public Internet Network Performance Virtualization with a Host Operating System Private Internet SecurityVirtualization Infections on Virtualized Routing to the Datacenter SSLEnvironments Switching within the Data Center VPN Type 1 Virtualized Environment Bandwidth Overhead Type 2 Virtualized Environment Tools Used to Measure Network Storage Options for Cloud Computing Virtualization Environments Performance Storage CapacityMicrosoft Virtualization Using the Protocol Analyzer to Measure Data Protection and PartitioningSun xVM VirtualBox Bandwidth NASLinux/UNIX Virtualization Using Ping and Traceroute to Measure SANVMware Products Network Performance CASData Center and Cloud Infrastructure Security RedundancyProducts SSL ReplicationEnd-User and Desktop Products VPN Multisiting IBM Virtualization Overhead Backup and Recovery Using VMware to see a Virtualized Server Storage Options for Cloud Computing Server Software Environments thatEnvironment Storage Capacity Support Cloud Computing Permissive Federation Data Protection and Partitioning Server CapacityVerified Federation NAS VirtualizationEncrypted Federation SAN ClusteringTrusted Federation CAS ExpansionUsing XMPP in the Federated Environment Redundancy Server FunctionsPresence in the Cloud Replication ApplicationWhat It Is Multisiting Web Presence Protocols Backup and Recovery Database

Page 28: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Leveraging Presence Server Software Environments that Vendor Approaches to Cloud Computing Presence Enabled Support Cloud Computing Role of Open Source Software in DataThe Future of Presence Server Capacity Center The Interrelation of Identity, Presence, and Virtualization Cost Reduction vs. ReliabilityLocation in the Cloud Clustering Open Source Server SoftwareIdentity Management Expansion Open Source Database SoftwareWhat It Is Server Functions Open Source Applications SoftwareFuture of Identity in the Cloud Application Open Source System ManagementPrivacy and Its Relation to Cloud-Based Web SoftwareInformation Systems Database Open Source Load-Balancing Software Personal Information Vendor Approaches to Cloud Computing Virtualization as the "Operating System"Privacy-Related Issues Role of Open Source Software in Data Virtualization with a Host OperatingFinding Your Private Information Center SystemOpen Cloud Consortium Working Groups Cost Reduction vs. Reliability Virtualization Infections on VirtualizedProject Matsu Open Source Server Software Environments Project Comet Open Source Database Software Type 1 Virtualized EnvironmentHPC in the Cloud Open Source Applications Software Type 2 Virtualized EnvironmentThe Open Cloud Testbed Open Source System Management Virtualization Environments The Open Science Data Cloud Software Microsoft VirtualizationIntercloud Testbed Open Source Load-Balancing Software Sun xVM VirtualBoxReporting on an Open Cloud Consortium Virtualization as the "Operating System" Linux/UNIX VirtualizationWorking Group Virtualization with a Host Operating VMware ProductsDistributed Management Task Force System Data Center and Cloud Infrastructure(DMTF) Virtualization Infections on Virtualized ProductsWhat It Is? Environments End-User and Desktop Products DMTK Working Groups Associated with Type 1 Virtualized Environment IBM VirtualizationCloud Computing Type 2 Virtualized Environment Using VMware to see a Virtualized ServerStandards for Application Developers Virtualization Environments Environment Protocols Microsoft Virtualization Permissive FederationScripting Languages Sun xVM VirtualBox Verified FederationContent Formatting Standards and Linux/UNIX Virtualization Encrypted FederationLanguages VMware Products Trusted FederationStandards for Security in the Cloud Data Center and Cloud Infrastructure Using XMPP in the Federated EnvironmentConfidentiality, Integrity, Availability Products Presence in the Cloud Authentication, Authorization, Accountability End-User and Desktop Products What It IsRegulations for Privacy IBM Virtualization Presence ProtocolsSecurity Protocols Using VMware to see a Virtualized Server Leveraging PresenceEstablishing a Baseline for Cloud Environment Presence EnabledPerformance Permissive Federation The Future of PresenceBest Practices for Selecting a Vendor and Verified Federation The Interrelation of Identity, Presence, andImplementing Cloud-Based Applications Encrypted Federation Location in the CloudChoosing the Right Vendor Trusted Federation Identity Management Implementing Cloud-Based Applications Using XMPP in the Federated What It IsWindows Remote Desktop Environment Future of Identity in the CloudVnc Presence in the Cloud Privacy and Its Relation to Cloud-BasedWeb Browsers What It Is Information Systems Server Extensions Presence Protocols Personal InformationThin Clients Leveraging Presence Privacy-Related IssuesSmart Phones, Pads, Pods, etc. Presence Enabled Finding Your Private Information Virtual Terminal Security Strengths and The Future of Presence Open Cloud Consortium Working GroupsWeaknesses The Interrelation of Identity, Presence, Project MatsuStrengths and Location in the Cloud Project CometWeaknesses Identity Management HPC in the CloudAndroid What It Is The Open Cloud TestbedBlackBerry Future of Identity in the Cloud The Open Science Data CloudWindows Mobile Privacy and Its Relation to Cloud-Based Intercloud Testbed Ubuntu Mobile Internet Device Information Systems Reporting on an Open Cloud ConsortiumMobile Platform Virtualization Personal Information Working Group Kernel-Based Virtual Machine Privacy-Related Issues Distributed Management Task ForceVMware Mobile Virtualization Platform Finding Your Private Information (DMTF) Collaboration Applications for Mobile Open Cloud Consortium Working Groups What It Is?Platforms Project Matsu DMTK Working Groups Associated withText Messaging Project Comet Cloud ComputingiPhone Applications HPC in the Cloud Standards for Application Developers BlackBerry Applications The Open Cloud Testbed ProtocolsDroid Applications The Open Science Data Cloud Scripting Languages

Page 29: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Intercloud Testbed Content Formatting Standards and2. Who's Who in Today's Cloud Reporting on an Open Cloud Consortium Languagesline Working Group Standards for Security in the Cloud

Cloud Computing Companies Distributed Management Task Force Confidentiality, Integrity, Availability(DMTF) Authentication, Authorization,What It Is? Accountability

line DMTK Working Groups Associated with Regulations for PrivacyCloud Computing Infrastructure Cloud Computing Security ProtocolsCloud Computing Terms Standards for Application Developers Establishing a Baseline for CloudBenefits and Limitations of Cloud Computing Protocols Performance Benefits Scripting Languages Best Practices for Selecting a Vendor andLimitations Content Formatting Standards and Implementing Cloud-Based Applications Cloud Computing Case Studies Languages Choosing the Right VendorHow Companies Are Using Cloud Standards for Security in the Cloud Implementing Cloud-Based Applications Computing Confidentiality, Integrity, Availability Windows Remote DesktopImplementing Applications and Services in Authentication, Authorization, Vncthe Cloud Accountability Web BrowsersUsing Your Company's Services vs. the Regulations for Privacy Server ExtensionsCloud Provider Security Protocols Thin ClientsA Cloud Service Provider Introduced Establishing a Baseline for Cloud Smart Phones, Pads, Pods, etc.Cloud Computing Risks and Issues Performance Virtual Terminal Security Strengths andProducts and Services Provided by Cloud Best Practices for Selecting a Vendor Weaknesses Computing Companies and Implementing Cloud-Based StrengthsEconomic Applications Weaknesses Staffing Choosing the Right Vendor AndroidShould Your Company Invest in Cloud Implementing Cloud-Based Applications BlackBerryComputing? Windows Remote Desktop Windows MobileWhat Should Not be Moved to the Cloud Vnc Ubuntu Mobile Internet DeviceLANs and the Cloud Web Browsers Mobile Platform Virtualization Internet and the Cloud Server Extensions Kernel-Based Virtual MachineWeb Services, Browsers, and the Cloud Thin Clients VMware Mobile Virtualization PlatformThin Client Smart Phones, Pads, Pods, etc. Collaboration Applications for MobileAdvances in Networking and Processing Virtual Terminal Security Strengths and Platforms Speeds that Led to Cloud Computing Weaknesses Text MessagingNetworking Developments Strengths iPhone ApplicationsIncreased Processing Speeds Weaknesses BlackBerry ApplicationsManaged Service Provider Model to Cloud Android Droid Applications Computing and Software as a Service BlackBerry(SaaS) Windows MobileSingle Purpose Architectures Migrate to Ubuntu Mobile Internet Device lineMultipurpose Architectures Mobile Platform Virtualization Cloud Computing InfrastructureData Center Virtualization Kernel-Based Virtual Machine Cloud Computing TermsCollaboration VMware Mobile Virtualization Platform Benefits and Limitations of CloudThe Cloud as a Reach Extender Collaboration Applications for Mobile Computing The Cloud as a Communication Enabler Platforms BenefitsThe Cloud as an Employee Enabler Text Messaging LimitationsService-Oriented Architecture (SOA) iPhone Applications Cloud Computing Case StudiesEvolving from SOA to the Cloud BlackBerry Applications How Companies Are Using CloudCapacity: Limited Performance Droid Applications Computing Availability: Communications Failure and Implementing Applications and Services inPerformance Issues the CloudSecurity: Newer Security Protocols Provide line Using Your Company's Services vs. theMore Protection Cloud Computing Infrastructure Cloud ProviderWhat's Next in Cloud Computing Cloud Computing Terms A Cloud Service Provider IntroducedIndependent Components Benefits and Limitations of Cloud Cloud Computing Risks and Issues Message Base Computing Products and Services Provided by CloudLocation Independence Benefits Computing Companies Communication Requirements for Cloud Limitations EconomicImplementation Cloud Computing Case Studies StaffingPublic Internet How Companies Are Using Cloud Should Your Company Invest in CloudPrivate Internet Computing Computing? Routing to the Datacenter Implementing Applications and Services What Should Not be Moved to the Cloud Switching within the Data Center in the Cloud LANs and the Cloud Bandwidth Using Your Company's Services vs. the Internet and the Cloud Tools Used to Measure Network Cloud Provider Web Services, Browsers, and the Cloud Performance A Cloud Service Provider Introduced Thin Client

Page 30: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Using the Protocol Analyzer to Measure Cloud Computing Risks and Issues Advances in Networking and ProcessingBandwidth Products and Services Provided by Cloud Speeds that Led to Cloud Computing Using Ping and Traceroute to Measure Computing Companies Networking DevelopmentsNetwork Performance Economic Increased Processing SpeedsSecurity Staffing Managed Service Provider Model to CloudSSL Should Your Company Invest in Cloud Computing and Software as a ServiceVPN Computing? (SaaS) Overhead What Should Not be Moved to the Cloud Single Purpose Architectures Migrate toStorage Options for Cloud Computing LANs and the Cloud Multipurpose ArchitecturesStorage Capacity Internet and the Cloud Data Center VirtualizationData Protection and Partitioning Web Services, Browsers, and the Cloud Collaboration NAS Thin Client The Cloud as a Reach ExtenderSAN Advances in Networking and Processing The Cloud as a Communication EnablerCAS Speeds that Led to Cloud Computing The Cloud as an Employee EnablerRedundancy Networking Developments Service-Oriented Architecture (SOA) Replication Increased Processing Speeds Evolving from SOA to the CloudMultisiting Managed Service Provider Model to Capacity: Limited PerformanceBackup and Recovery Cloud Computing and Software as a Availability: Communications Failure andServer Software Environments that Support Service (SaaS) Performance IssuesCloud Computing Single Purpose Architectures Migrate to Security: Newer Security Protocols ProvideServer Capacity Multipurpose Architectures More ProtectionVirtualization Data Center Virtualization What's Next in Cloud Computing Clustering Collaboration Independent ComponentsExpansion The Cloud as a Reach Extender Message BaseServer Functions The Cloud as a Communication Enabler Location IndependenceApplication The Cloud as an Employee Enabler Communication Requirements for CloudWeb Service-Oriented Architecture (SOA) Implementation Database Evolving from SOA to the Cloud Public InternetVendor Approaches to Cloud Computing Capacity: Limited Performance Private InternetRole of Open Source Software in Data Availability: Communications Failure and Routing to the DatacenterCenter Performance Issues Switching within the Data CenterCost Reduction vs. Reliability Security: Newer Security Protocols Bandwidth Open Source Server Software Provide More Protection Tools Used to Measure NetworkOpen Source Database Software What's Next in Cloud Computing Performance Open Source Applications Software Independent Components Using the Protocol Analyzer to MeasureOpen Source System Management Software Message Base Bandwidth Open Source Load-Balancing Software Location Independence Using Ping and Traceroute to MeasureVirtualization as the "Operating System" Communication Requirements for Cloud Network Performance Virtualization with a Host Operating System Implementation SecurityVirtualization Infections on Virtualized Public Internet SSLEnvironments Private Internet VPN Type 1 Virtualized Environment Routing to the Datacenter Overhead Type 2 Virtualized Environment Switching within the Data Center Storage Options for Cloud Computing Virtualization Environments Bandwidth Storage CapacityMicrosoft Virtualization Tools Used to Measure Network Data Protection and PartitioningSun xVM VirtualBox Performance NASLinux/UNIX Virtualization Using the Protocol Analyzer to Measure SANVMware Products Bandwidth CASData Center and Cloud Infrastructure Using Ping and Traceroute to Measure RedundancyProducts Network Performance ReplicationEnd-User and Desktop Products Security Multisiting IBM Virtualization SSL Backup and Recovery Using VMware to see a Virtualized Server VPN Server Software Environments thatEnvironment Overhead Support Cloud Computing Permissive Federation Storage Options for Cloud Computing Server CapacityVerified Federation Storage Capacity VirtualizationEncrypted Federation Data Protection and Partitioning ClusteringTrusted Federation NAS ExpansionUsing XMPP in the Federated Environment SAN Server FunctionsPresence in the Cloud CAS ApplicationWhat It Is Redundancy Web Presence Protocols Replication Database Leveraging Presence Multisiting Vendor Approaches to Cloud Computing Presence Enabled Backup and Recovery Role of Open Source Software in DataThe Future of Presence Server Software Environments that Center The Interrelation of Identity, Presence, and Support Cloud Computing Cost Reduction vs. Reliability

Page 31: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Location in the Cloud Server Capacity Open Source Server SoftwareIdentity Management Virtualization Open Source Database SoftwareWhat It Is Clustering Open Source Applications SoftwareFuture of Identity in the Cloud Expansion Open Source System ManagementPrivacy and Its Relation to Cloud-Based Server Functions SoftwareInformation Systems Application Open Source Load-Balancing Software Personal Information Web Virtualization as the "Operating System"Privacy-Related Issues Database Virtualization with a Host OperatingFinding Your Private Information Vendor Approaches to Cloud Computing SystemOpen Cloud Consortium Working Groups Role of Open Source Software in Data Virtualization Infections on VirtualizedProject Matsu Center Environments Project Comet Cost Reduction vs. Reliability Type 1 Virtualized EnvironmentHPC in the Cloud Open Source Server Software Type 2 Virtualized EnvironmentThe Open Cloud Testbed Open Source Database Software Virtualization Environments The Open Science Data Cloud Open Source Applications Software Microsoft VirtualizationIntercloud Testbed Open Source System Management Sun xVM VirtualBoxReporting on an Open Cloud Consortium Software Linux/UNIX VirtualizationWorking Group Open Source Load-Balancing Software VMware ProductsDistributed Management Task Force Virtualization as the "Operating System" Data Center and Cloud Infrastructure(DMTF) Virtualization with a Host Operating ProductsWhat It Is? System End-User and Desktop Products DMTK Working Groups Associated with Virtualization Infections on Virtualized IBM VirtualizationCloud Computing Environments Using VMware to see a Virtualized ServerStandards for Application Developers Type 1 Virtualized Environment Environment Protocols Type 2 Virtualized Environment Permissive FederationScripting Languages Virtualization Environments Verified FederationContent Formatting Standards and Microsoft Virtualization Encrypted FederationLanguages Sun xVM VirtualBox Trusted FederationStandards for Security in the Cloud Linux/UNIX Virtualization Using XMPP in the Federated EnvironmentConfidentiality, Integrity, Availability VMware Products Presence in the Cloud Authentication, Authorization, Accountability Data Center and Cloud Infrastructure What It IsRegulations for Privacy Products Presence ProtocolsSecurity Protocols End-User and Desktop Products Leveraging PresenceEstablishing a Baseline for Cloud IBM Virtualization Presence EnabledPerformance Using VMware to see a Virtualized Server The Future of PresenceBest Practices for Selecting a Vendor and Environment The Interrelation of Identity, Presence, andImplementing Cloud-Based Applications Permissive Federation Location in the CloudChoosing the Right Vendor Verified Federation Identity Management Implementing Cloud-Based Applications Encrypted Federation What It IsWindows Remote Desktop Trusted Federation Future of Identity in the CloudVnc Using XMPP in the Federated Privacy and Its Relation to Cloud-BasedWeb Browsers Environment Information Systems Server Extensions Presence in the Cloud Personal InformationThin Clients What It Is Privacy-Related IssuesSmart Phones, Pads, Pods, etc. Presence Protocols Finding Your Private Information Virtual Terminal Security Strengths and Leveraging Presence Open Cloud Consortium Working GroupsWeaknesses Presence Enabled Project MatsuStrengths The Future of Presence Project CometWeaknesses The Interrelation of Identity, Presence, HPC in the CloudAndroid and Location in the Cloud The Open Cloud TestbedBlackBerry Identity Management The Open Science Data CloudWindows Mobile What It Is Intercloud Testbed Ubuntu Mobile Internet Device Future of Identity in the Cloud Reporting on an Open Cloud ConsortiumMobile Platform Virtualization Privacy and Its Relation to Cloud-Based Working Group Kernel-Based Virtual Machine Information Systems Distributed Management Task ForceVMware Mobile Virtualization Platform Personal Information (DMTF) Collaboration Applications for Mobile Privacy-Related Issues What It Is?Platforms Finding Your Private Information DMTK Working Groups Associated withText Messaging Open Cloud Consortium Working Groups Cloud ComputingiPhone Applications Project Matsu Standards for Application Developers BlackBerry Applications Project Comet ProtocolsDroid Applications HPC in the Cloud Scripting Languages

The Open Cloud Testbed Content Formatting Standards and3. The Business Case for Going to the Cloud The Open Science Data Cloud Languagesline Intercloud Testbed Standards for Security in the Cloud

Benefits of Cloud Computing Reporting on an Open Cloud Consortium Confidentiality, Integrity, Availability

Page 32: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Operational Working Group Authentication, Authorization,Distributed Management Task Force Accountability(DMTF) Regulations for Privacy

line What It Is? Security ProtocolsCloud Computing Infrastructure DMTK Working Groups Associated with Establishing a Baseline for CloudCloud Computing Terms Cloud Computing Performance Benefits and Limitations of Cloud Computing Standards for Application Developers Best Practices for Selecting a Vendor andBenefits Protocols Implementing Cloud-Based Applications Limitations Scripting Languages Choosing the Right VendorCloud Computing Case Studies Content Formatting Standards and Implementing Cloud-Based Applications How Companies Are Using Cloud Languages Windows Remote DesktopComputing Standards for Security in the Cloud VncImplementing Applications and Services in Confidentiality, Integrity, Availability Web Browsersthe Cloud Authentication, Authorization, Server ExtensionsUsing Your Company's Services vs. the Accountability Thin ClientsCloud Provider Regulations for Privacy Smart Phones, Pads, Pods, etc.A Cloud Service Provider Introduced Security Protocols Virtual Terminal Security Strengths andCloud Computing Risks and Issues Establishing a Baseline for Cloud Weaknesses Products and Services Provided by Cloud Performance StrengthsComputing Companies Best Practices for Selecting a Vendor Weaknesses Economic and Implementing Cloud-Based AndroidStaffing Applications BlackBerryShould Your Company Invest in Cloud Choosing the Right Vendor Windows MobileComputing? Implementing Cloud-Based Applications Ubuntu Mobile Internet DeviceWhat Should Not be Moved to the Cloud Windows Remote Desktop Mobile Platform Virtualization LANs and the Cloud Vnc Kernel-Based Virtual MachineInternet and the Cloud Web Browsers VMware Mobile Virtualization PlatformWeb Services, Browsers, and the Cloud Server Extensions Collaboration Applications for MobileThin Client Thin Clients Platforms Advances in Networking and Processing Smart Phones, Pads, Pods, etc. Text MessagingSpeeds that Led to Cloud Computing Virtual Terminal Security Strengths and iPhone ApplicationsNetworking Developments Weaknesses BlackBerry ApplicationsIncreased Processing Speeds Strengths Droid Applications Managed Service Provider Model to Cloud Weaknesses Computing and Software as a Service Android(SaaS) BlackBerry lineSingle Purpose Architectures Migrate to Windows Mobile Cloud Computing InfrastructureMultipurpose Architectures Ubuntu Mobile Internet Device Cloud Computing TermsData Center Virtualization Mobile Platform Virtualization Benefits and Limitations of CloudCollaboration Kernel-Based Virtual Machine Computing The Cloud as a Reach Extender VMware Mobile Virtualization Platform BenefitsThe Cloud as a Communication Enabler Collaboration Applications for Mobile LimitationsThe Cloud as an Employee Enabler Platforms Cloud Computing Case StudiesService-Oriented Architecture (SOA) Text Messaging How Companies Are Using CloudEvolving from SOA to the Cloud iPhone Applications Computing Capacity: Limited Performance BlackBerry Applications Implementing Applications and Services inAvailability: Communications Failure and Droid Applications the CloudPerformance Issues Using Your Company's Services vs. theSecurity: Newer Security Protocols Provide Cloud ProviderMore Protection line A Cloud Service Provider IntroducedWhat's Next in Cloud Computing Cloud Computing Infrastructure Cloud Computing Risks and Issues Independent Components Cloud Computing Terms Products and Services Provided by CloudMessage Base Benefits and Limitations of Cloud Computing Companies Location Independence Computing EconomicCommunication Requirements for Cloud Benefits StaffingImplementation Limitations Should Your Company Invest in CloudPublic Internet Cloud Computing Case Studies Computing? Private Internet How Companies Are Using Cloud What Should Not be Moved to the Cloud Routing to the Datacenter Computing LANs and the Cloud Switching within the Data Center Implementing Applications and Services Internet and the Cloud Bandwidth in the Cloud Web Services, Browsers, and the Cloud Tools Used to Measure Network Using Your Company's Services vs. the Thin Client Performance Cloud Provider Advances in Networking and ProcessingUsing the Protocol Analyzer to Measure A Cloud Service Provider Introduced Speeds that Led to Cloud Computing Bandwidth Cloud Computing Risks and Issues Networking DevelopmentsUsing Ping and Traceroute to Measure Products and Services Provided by Cloud Increased Processing Speeds

Page 33: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Network Performance Computing Companies Managed Service Provider Model to CloudSecurity Economic Computing and Software as a ServiceSSL Staffing (SaaS) VPN Should Your Company Invest in Cloud Single Purpose Architectures Migrate toOverhead Computing? Multipurpose ArchitecturesStorage Options for Cloud Computing What Should Not be Moved to the Cloud Data Center VirtualizationStorage Capacity LANs and the Cloud Collaboration Data Protection and Partitioning Internet and the Cloud The Cloud as a Reach ExtenderNAS Web Services, Browsers, and the Cloud The Cloud as a Communication EnablerSAN Thin Client The Cloud as an Employee EnablerCAS Advances in Networking and Processing Service-Oriented Architecture (SOA) Redundancy Speeds that Led to Cloud Computing Evolving from SOA to the CloudReplication Networking Developments Capacity: Limited PerformanceMultisiting Increased Processing Speeds Availability: Communications Failure andBackup and Recovery Managed Service Provider Model to Performance IssuesServer Software Environments that Support Cloud Computing and Software as a Security: Newer Security Protocols ProvideCloud Computing Service (SaaS) More ProtectionServer Capacity Single Purpose Architectures Migrate to What's Next in Cloud Computing Virtualization Multipurpose Architectures Independent ComponentsClustering Data Center Virtualization Message BaseExpansion Collaboration Location IndependenceServer Functions The Cloud as a Reach Extender Communication Requirements for CloudApplication The Cloud as a Communication Enabler Implementation Web The Cloud as an Employee Enabler Public InternetDatabase Service-Oriented Architecture (SOA) Private InternetVendor Approaches to Cloud Computing Evolving from SOA to the Cloud Routing to the DatacenterRole of Open Source Software in Data Capacity: Limited Performance Switching within the Data CenterCenter Availability: Communications Failure and Bandwidth Cost Reduction vs. Reliability Performance Issues Tools Used to Measure NetworkOpen Source Server Software Security: Newer Security Protocols Performance Open Source Database Software Provide More Protection Using the Protocol Analyzer to MeasureOpen Source Applications Software What's Next in Cloud Computing Bandwidth Open Source System Management Software Independent Components Using Ping and Traceroute to MeasureOpen Source Load-Balancing Software Message Base Network Performance Virtualization as the "Operating System" Location Independence SecurityVirtualization with a Host Operating System Communication Requirements for Cloud SSLVirtualization Infections on Virtualized Implementation VPN Environments Public Internet Overhead Type 1 Virtualized Environment Private Internet Storage Options for Cloud Computing Type 2 Virtualized Environment Routing to the Datacenter Storage CapacityVirtualization Environments Switching within the Data Center Data Protection and PartitioningMicrosoft Virtualization Bandwidth NASSun xVM VirtualBox Tools Used to Measure Network SANLinux/UNIX Virtualization Performance CASVMware Products Using the Protocol Analyzer to Measure RedundancyData Center and Cloud Infrastructure Bandwidth ReplicationProducts Using Ping and Traceroute to Measure Multisiting End-User and Desktop Products Network Performance Backup and Recovery IBM Virtualization Security Server Software Environments thatUsing VMware to see a Virtualized Server SSL Support Cloud Computing Environment VPN Server CapacityPermissive Federation Overhead VirtualizationVerified Federation Storage Options for Cloud Computing ClusteringEncrypted Federation Storage Capacity ExpansionTrusted Federation Data Protection and Partitioning Server FunctionsUsing XMPP in the Federated Environment NAS ApplicationPresence in the Cloud SAN Web What It Is CAS Database Presence Protocols Redundancy Vendor Approaches to Cloud Computing Leveraging Presence Replication Role of Open Source Software in DataPresence Enabled Multisiting Center The Future of Presence Backup and Recovery Cost Reduction vs. ReliabilityThe Interrelation of Identity, Presence, and Server Software Environments that Open Source Server SoftwareLocation in the Cloud Support Cloud Computing Open Source Database SoftwareIdentity Management Server Capacity Open Source Applications SoftwareWhat It Is Virtualization Open Source System Management

Page 34: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Future of Identity in the Cloud Clustering SoftwarePrivacy and Its Relation to Cloud-Based Expansion Open Source Load-Balancing Software Information Systems Server Functions Virtualization as the "Operating System"Personal Information Application Virtualization with a Host OperatingPrivacy-Related Issues Web SystemFinding Your Private Information Database Virtualization Infections on VirtualizedOpen Cloud Consortium Working Groups Vendor Approaches to Cloud Computing Environments Project Matsu Role of Open Source Software in Data Type 1 Virtualized EnvironmentProject Comet Center Type 2 Virtualized EnvironmentHPC in the Cloud Cost Reduction vs. Reliability Virtualization Environments The Open Cloud Testbed Open Source Server Software Microsoft VirtualizationThe Open Science Data Cloud Open Source Database Software Sun xVM VirtualBoxIntercloud Testbed Open Source Applications Software Linux/UNIX VirtualizationReporting on an Open Cloud Consortium Open Source System Management VMware ProductsWorking Group Software Data Center and Cloud InfrastructureDistributed Management Task Force Open Source Load-Balancing Software Products(DMTF) Virtualization as the "Operating System" End-User and Desktop Products What It Is? Virtualization with a Host Operating IBM VirtualizationDMTK Working Groups Associated with System Using VMware to see a Virtualized ServerCloud Computing Virtualization Infections on Virtualized Environment Standards for Application Developers Environments Permissive FederationProtocols Type 1 Virtualized Environment Verified FederationScripting Languages Type 2 Virtualized Environment Encrypted FederationContent Formatting Standards and Virtualization Environments Trusted FederationLanguages Microsoft Virtualization Using XMPP in the Federated EnvironmentStandards for Security in the Cloud Sun xVM VirtualBox Presence in the Cloud Confidentiality, Integrity, Availability Linux/UNIX Virtualization What It IsAuthentication, Authorization, Accountability VMware Products Presence ProtocolsRegulations for Privacy Data Center and Cloud Infrastructure Leveraging PresenceSecurity Protocols Products Presence EnabledEstablishing a Baseline for Cloud End-User and Desktop Products The Future of PresencePerformance IBM Virtualization The Interrelation of Identity, Presence, andBest Practices for Selecting a Vendor and Using VMware to see a Virtualized Server Location in the CloudImplementing Cloud-Based Applications Environment Identity Management Choosing the Right Vendor Permissive Federation What It IsImplementing Cloud-Based Applications Verified Federation Future of Identity in the CloudWindows Remote Desktop Encrypted Federation Privacy and Its Relation to Cloud-BasedVnc Trusted Federation Information Systems Web Browsers Using XMPP in the Federated Personal InformationServer Extensions Environment Privacy-Related IssuesThin Clients Presence in the Cloud Finding Your Private Information Smart Phones, Pads, Pods, etc. What It Is Open Cloud Consortium Working GroupsVirtual Terminal Security Strengths and Presence Protocols Project MatsuWeaknesses Leveraging Presence Project CometStrengths Presence Enabled HPC in the CloudWeaknesses The Future of Presence The Open Cloud TestbedAndroid The Interrelation of Identity, Presence, The Open Science Data CloudBlackBerry and Location in the Cloud Intercloud Testbed Windows Mobile Identity Management Reporting on an Open Cloud ConsortiumUbuntu Mobile Internet Device What It Is Working Group Mobile Platform Virtualization Future of Identity in the Cloud Distributed Management Task ForceKernel-Based Virtual Machine Privacy and Its Relation to Cloud-Based (DMTF) VMware Mobile Virtualization Platform Information Systems What It Is?Collaboration Applications for Mobile Personal Information DMTK Working Groups Associated withPlatforms Privacy-Related Issues Cloud ComputingText Messaging Finding Your Private Information Standards for Application Developers iPhone Applications Open Cloud Consortium Working Groups ProtocolsBlackBerry Applications Project Matsu Scripting LanguagesDroid Applications Project Comet Content Formatting Standards and

HPC in the Cloud LanguagesThe Open Cloud Testbed Standards for Security in the Cloud

line The Open Science Data Cloud Confidentiality, Integrity, AvailabilityCloud Computing Infrastructure Intercloud Testbed Authentication, Authorization,Cloud Computing Terms Reporting on an Open Cloud Consortium AccountabilityBenefits and Limitations of Cloud Computing Working Group Regulations for PrivacyBenefits Distributed Management Task Force Security Protocols

Page 35: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Limitations (DMTF) Establishing a Baseline for CloudCloud Computing Case Studies What It Is? Performance How Companies Are Using Cloud DMTK Working Groups Associated with Best Practices for Selecting a Vendor andComputing Cloud Computing Implementing Cloud-Based Applications Implementing Applications and Services in Standards for Application Developers Choosing the Right Vendorthe Cloud Protocols Implementing Cloud-Based Applications Using Your Company's Services vs. the Scripting Languages Windows Remote DesktopCloud Provider Content Formatting Standards and VncA Cloud Service Provider Introduced Languages Web BrowsersCloud Computing Risks and Issues Standards for Security in the Cloud Server ExtensionsProducts and Services Provided by Cloud Confidentiality, Integrity, Availability Thin ClientsComputing Companies Authentication, Authorization, Smart Phones, Pads, Pods, etc.Economic Accountability Virtual Terminal Security Strengths andStaffing Regulations for Privacy Weaknesses Should Your Company Invest in Cloud Security Protocols StrengthsComputing? Establishing a Baseline for Cloud Weaknesses What Should Not be Moved to the Cloud Performance AndroidLANs and the Cloud Best Practices for Selecting a Vendor BlackBerryInternet and the Cloud and Implementing Cloud-Based Windows MobileWeb Services, Browsers, and the Cloud Applications Ubuntu Mobile Internet DeviceThin Client Choosing the Right Vendor Mobile Platform Virtualization Advances in Networking and Processing Implementing Cloud-Based Applications Kernel-Based Virtual MachineSpeeds that Led to Cloud Computing Windows Remote Desktop VMware Mobile Virtualization PlatformNetworking Developments Vnc Collaboration Applications for MobileIncreased Processing Speeds Web Browsers Platforms Managed Service Provider Model to Cloud Server Extensions Text MessagingComputing and Software as a Service Thin Clients iPhone Applications(SaaS) Smart Phones, Pads, Pods, etc. BlackBerry ApplicationsSingle Purpose Architectures Migrate to Virtual Terminal Security Strengths and Droid Applications Multipurpose Architectures Weaknesses Data Center Virtualization StrengthsCollaboration Weaknesses lineThe Cloud as a Reach Extender Android Cloud Computing InfrastructureThe Cloud as a Communication Enabler BlackBerry Cloud Computing TermsThe Cloud as an Employee Enabler Windows Mobile Benefits and Limitations of CloudService-Oriented Architecture (SOA) Ubuntu Mobile Internet Device Computing Evolving from SOA to the Cloud Mobile Platform Virtualization BenefitsCapacity: Limited Performance Kernel-Based Virtual Machine LimitationsAvailability: Communications Failure and VMware Mobile Virtualization Platform Cloud Computing Case StudiesPerformance Issues Collaboration Applications for Mobile How Companies Are Using CloudSecurity: Newer Security Protocols Provide Platforms Computing More Protection Text Messaging Implementing Applications and Services inWhat's Next in Cloud Computing iPhone Applications the CloudIndependent Components BlackBerry Applications Using Your Company's Services vs. theMessage Base Droid Applications Cloud ProviderLocation Independence A Cloud Service Provider IntroducedCommunication Requirements for Cloud Cloud Computing Risks and Issues Implementation line Products and Services Provided by CloudPublic Internet Cloud Computing Infrastructure Computing Companies Private Internet Cloud Computing Terms EconomicRouting to the Datacenter Benefits and Limitations of Cloud StaffingSwitching within the Data Center Computing Should Your Company Invest in CloudBandwidth Benefits Computing? Tools Used to Measure Network Limitations What Should Not be Moved to the Cloud Performance Cloud Computing Case Studies LANs and the Cloud Using the Protocol Analyzer to Measure How Companies Are Using Cloud Internet and the Cloud Bandwidth Computing Web Services, Browsers, and the Cloud Using Ping and Traceroute to Measure Implementing Applications and Services Thin Client Network Performance in the Cloud Advances in Networking and ProcessingSecurity Using Your Company's Services vs. the Speeds that Led to Cloud Computing SSL Cloud Provider Networking DevelopmentsVPN A Cloud Service Provider Introduced Increased Processing SpeedsOverhead Cloud Computing Risks and Issues Managed Service Provider Model to CloudStorage Options for Cloud Computing Products and Services Provided by Cloud Computing and Software as a ServiceStorage Capacity Computing Companies (SaaS) Data Protection and Partitioning Economic Single Purpose Architectures Migrate to

Page 36: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

NAS Staffing Multipurpose ArchitecturesSAN Should Your Company Invest in Cloud Data Center VirtualizationCAS Computing? Collaboration Redundancy What Should Not be Moved to the Cloud The Cloud as a Reach ExtenderReplication LANs and the Cloud The Cloud as a Communication EnablerMultisiting Internet and the Cloud The Cloud as an Employee EnablerBackup and Recovery Web Services, Browsers, and the Cloud Service-Oriented Architecture (SOA) Server Software Environments that Support Thin Client Evolving from SOA to the CloudCloud Computing Advances in Networking and Processing Capacity: Limited PerformanceServer Capacity Speeds that Led to Cloud Computing Availability: Communications Failure andVirtualization Networking Developments Performance IssuesClustering Increased Processing Speeds Security: Newer Security Protocols ProvideExpansion Managed Service Provider Model to More ProtectionServer Functions Cloud Computing and Software as a What's Next in Cloud Computing Application Service (SaaS) Independent ComponentsWeb Single Purpose Architectures Migrate to Message BaseDatabase Multipurpose Architectures Location IndependenceVendor Approaches to Cloud Computing Data Center Virtualization Communication Requirements for CloudRole of Open Source Software in Data Collaboration Implementation Center The Cloud as a Reach Extender Public InternetCost Reduction vs. Reliability The Cloud as a Communication Enabler Private InternetOpen Source Server Software The Cloud as an Employee Enabler Routing to the DatacenterOpen Source Database Software Service-Oriented Architecture (SOA) Switching within the Data CenterOpen Source Applications Software Evolving from SOA to the Cloud Bandwidth Open Source System Management Software Capacity: Limited Performance Tools Used to Measure NetworkOpen Source Load-Balancing Software Availability: Communications Failure and Performance Virtualization as the "Operating System" Performance Issues Using the Protocol Analyzer to MeasureVirtualization with a Host Operating System Security: Newer Security Protocols Bandwidth Virtualization Infections on Virtualized Provide More Protection Using Ping and Traceroute to MeasureEnvironments What's Next in Cloud Computing Network Performance Type 1 Virtualized Environment Independent Components SecurityType 2 Virtualized Environment Message Base SSLVirtualization Environments Location Independence VPN Microsoft Virtualization Communication Requirements for Cloud Overhead Sun xVM VirtualBox Implementation Storage Options for Cloud Computing Linux/UNIX Virtualization Public Internet Storage CapacityVMware Products Private Internet Data Protection and PartitioningData Center and Cloud Infrastructure Routing to the Datacenter NASProducts Switching within the Data Center SANEnd-User and Desktop Products Bandwidth CASIBM Virtualization Tools Used to Measure Network RedundancyUsing VMware to see a Virtualized Server Performance ReplicationEnvironment Using the Protocol Analyzer to Measure Multisiting Permissive Federation Bandwidth Backup and Recovery Verified Federation Using Ping and Traceroute to Measure Server Software Environments thatEncrypted Federation Network Performance Support Cloud Computing Trusted Federation Security Server CapacityUsing XMPP in the Federated Environment SSL VirtualizationPresence in the Cloud VPN ClusteringWhat It Is Overhead ExpansionPresence Protocols Storage Options for Cloud Computing Server FunctionsLeveraging Presence Storage Capacity ApplicationPresence Enabled Data Protection and Partitioning Web The Future of Presence NAS Database The Interrelation of Identity, Presence, and SAN Vendor Approaches to Cloud Computing Location in the Cloud CAS Role of Open Source Software in DataIdentity Management Redundancy Center What It Is Replication Cost Reduction vs. ReliabilityFuture of Identity in the Cloud Multisiting Open Source Server SoftwarePrivacy and Its Relation to Cloud-Based Backup and Recovery Open Source Database SoftwareInformation Systems Server Software Environments that Open Source Applications SoftwarePersonal Information Support Cloud Computing Open Source System ManagementPrivacy-Related Issues Server Capacity SoftwareFinding Your Private Information Virtualization Open Source Load-Balancing Software Open Cloud Consortium Working Groups Clustering Virtualization as the "Operating System"Project Matsu Expansion Virtualization with a Host Operating

Page 37: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Project Comet Server Functions SystemHPC in the Cloud Application Virtualization Infections on VirtualizedThe Open Cloud Testbed Web Environments The Open Science Data Cloud Database Type 1 Virtualized EnvironmentIntercloud Testbed Vendor Approaches to Cloud Computing Type 2 Virtualized EnvironmentReporting on an Open Cloud Consortium Role of Open Source Software in Data Virtualization Environments Working Group Center Microsoft VirtualizationDistributed Management Task Force Cost Reduction vs. Reliability Sun xVM VirtualBox(DMTF) Open Source Server Software Linux/UNIX VirtualizationWhat It Is? Open Source Database Software VMware ProductsDMTK Working Groups Associated with Open Source Applications Software Data Center and Cloud InfrastructureCloud Computing Open Source System Management ProductsStandards for Application Developers Software End-User and Desktop Products Protocols Open Source Load-Balancing Software IBM VirtualizationScripting Languages Virtualization as the "Operating System" Using VMware to see a Virtualized ServerContent Formatting Standards and Virtualization with a Host Operating Environment Languages System Permissive FederationStandards for Security in the Cloud Virtualization Infections on Virtualized Verified FederationConfidentiality, Integrity, Availability Environments Encrypted FederationAuthentication, Authorization, Accountability Type 1 Virtualized Environment Trusted FederationRegulations for Privacy Type 2 Virtualized Environment Using XMPP in the Federated EnvironmentSecurity Protocols Virtualization Environments Presence in the Cloud Establishing a Baseline for Cloud Microsoft Virtualization What It IsPerformance Sun xVM VirtualBox Presence ProtocolsBest Practices for Selecting a Vendor and Linux/UNIX Virtualization Leveraging PresenceImplementing Cloud-Based Applications VMware Products Presence EnabledChoosing the Right Vendor Data Center and Cloud Infrastructure The Future of PresenceImplementing Cloud-Based Applications Products The Interrelation of Identity, Presence, andWindows Remote Desktop End-User and Desktop Products Location in the CloudVnc IBM Virtualization Identity Management Web Browsers Using VMware to see a Virtualized Server What It IsServer Extensions Environment Future of Identity in the CloudThin Clients Permissive Federation Privacy and Its Relation to Cloud-BasedSmart Phones, Pads, Pods, etc. Verified Federation Information Systems Virtual Terminal Security Strengths and Encrypted Federation Personal InformationWeaknesses Trusted Federation Privacy-Related IssuesStrengths Using XMPP in the Federated Finding Your Private Information Weaknesses Environment Open Cloud Consortium Working GroupsAndroid Presence in the Cloud Project MatsuBlackBerry What It Is Project CometWindows Mobile Presence Protocols HPC in the CloudUbuntu Mobile Internet Device Leveraging Presence The Open Cloud TestbedMobile Platform Virtualization Presence Enabled The Open Science Data CloudKernel-Based Virtual Machine The Future of Presence Intercloud Testbed VMware Mobile Virtualization Platform The Interrelation of Identity, Presence, Reporting on an Open Cloud ConsortiumCollaboration Applications for Mobile and Location in the Cloud Working Group Platforms Identity Management Distributed Management Task ForceText Messaging What It Is (DMTF) iPhone Applications Future of Identity in the Cloud What It Is?BlackBerry Applications Privacy and Its Relation to Cloud-Based DMTK Working Groups Associated withDroid Applications Information Systems Cloud Computing

Personal Information Standards for Application Developers Privacy-Related Issues Protocols

line Finding Your Private Information Scripting LanguagesCloud Computing Infrastructure Open Cloud Consortium Working Groups Content Formatting Standards andCloud Computing Terms Project Matsu LanguagesBenefits and Limitations of Cloud Computing Project Comet Standards for Security in the Cloud Benefits HPC in the Cloud Confidentiality, Integrity, AvailabilityLimitations The Open Cloud Testbed Authentication, Authorization,Cloud Computing Case Studies The Open Science Data Cloud AccountabilityHow Companies Are Using Cloud Intercloud Testbed Regulations for PrivacyComputing Reporting on an Open Cloud Consortium Security ProtocolsImplementing Applications and Services in Working Group Establishing a Baseline for Cloudthe Cloud Distributed Management Task Force Performance Using Your Company's Services vs. the (DMTF) Best Practices for Selecting a Vendor andCloud Provider What It Is? Implementing Cloud-Based Applications

Page 38: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

A Cloud Service Provider Introduced DMTK Working Groups Associated with Choosing the Right VendorCloud Computing Risks and Issues Cloud Computing Implementing Cloud-Based Applications Products and Services Provided by Cloud Standards for Application Developers Windows Remote DesktopComputing Companies Protocols VncEconomic Scripting Languages Web BrowsersStaffing Content Formatting Standards and Server ExtensionsShould Your Company Invest in Cloud Languages Thin ClientsComputing? Standards for Security in the Cloud Smart Phones, Pads, Pods, etc.What Should Not be Moved to the Cloud Confidentiality, Integrity, Availability Virtual Terminal Security Strengths andLANs and the Cloud Authentication, Authorization, Weaknesses Internet and the Cloud Accountability StrengthsWeb Services, Browsers, and the Cloud Regulations for Privacy Weaknesses Thin Client Security Protocols AndroidAdvances in Networking and Processing Establishing a Baseline for Cloud BlackBerrySpeeds that Led to Cloud Computing Performance Windows MobileNetworking Developments Best Practices for Selecting a Vendor Ubuntu Mobile Internet DeviceIncreased Processing Speeds and Implementing Cloud-Based Mobile Platform Virtualization Managed Service Provider Model to Cloud Applications Kernel-Based Virtual MachineComputing and Software as a Service Choosing the Right Vendor VMware Mobile Virtualization Platform(SaaS) Implementing Cloud-Based Applications Collaboration Applications for MobileSingle Purpose Architectures Migrate to Windows Remote Desktop Platforms Multipurpose Architectures Vnc Text MessagingData Center Virtualization Web Browsers iPhone ApplicationsCollaboration Server Extensions BlackBerry ApplicationsThe Cloud as a Reach Extender Thin Clients Droid Applications The Cloud as a Communication Enabler Smart Phones, Pads, Pods, etc.The Cloud as an Employee Enabler Virtual Terminal Security Strengths andService-Oriented Architecture (SOA) Weaknesses lineEvolving from SOA to the Cloud Strengths Cloud Computing InfrastructureCapacity: Limited Performance Weaknesses Cloud Computing TermsAvailability: Communications Failure and Android Benefits and Limitations of CloudPerformance Issues BlackBerry Computing Security: Newer Security Protocols Provide Windows Mobile BenefitsMore Protection Ubuntu Mobile Internet Device LimitationsWhat's Next in Cloud Computing Mobile Platform Virtualization Cloud Computing Case StudiesIndependent Components Kernel-Based Virtual Machine How Companies Are Using CloudMessage Base VMware Mobile Virtualization Platform Computing Location Independence Collaboration Applications for Mobile Implementing Applications and Services inCommunication Requirements for Cloud Platforms the CloudImplementation Text Messaging Using Your Company's Services vs. thePublic Internet iPhone Applications Cloud ProviderPrivate Internet BlackBerry Applications A Cloud Service Provider IntroducedRouting to the Datacenter Droid Applications Cloud Computing Risks and Issues Switching within the Data Center Products and Services Provided by CloudBandwidth Computing Companies Tools Used to Measure Network line EconomicPerformance Cloud Computing Infrastructure StaffingUsing the Protocol Analyzer to Measure Cloud Computing Terms Should Your Company Invest in CloudBandwidth Benefits and Limitations of Cloud Computing? Using Ping and Traceroute to Measure Computing What Should Not be Moved to the Cloud Network Performance Benefits LANs and the Cloud Security Limitations Internet and the Cloud SSL Cloud Computing Case Studies Web Services, Browsers, and the Cloud VPN How Companies Are Using Cloud Thin Client Overhead Computing Advances in Networking and ProcessingStorage Options for Cloud Computing Implementing Applications and Services Speeds that Led to Cloud Computing Storage Capacity in the Cloud Networking DevelopmentsData Protection and Partitioning Using Your Company's Services vs. the Increased Processing SpeedsNAS Cloud Provider Managed Service Provider Model to CloudSAN A Cloud Service Provider Introduced Computing and Software as a ServiceCAS Cloud Computing Risks and Issues (SaaS) Redundancy Products and Services Provided by Cloud Single Purpose Architectures Migrate toReplication Computing Companies Multipurpose ArchitecturesMultisiting Economic Data Center VirtualizationBackup and Recovery Staffing Collaboration Server Software Environments that Support Should Your Company Invest in Cloud The Cloud as a Reach Extender

Page 39: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Cloud Computing Computing? The Cloud as a Communication EnablerServer Capacity What Should Not be Moved to the Cloud The Cloud as an Employee EnablerVirtualization LANs and the Cloud Service-Oriented Architecture (SOA) Clustering Internet and the Cloud Evolving from SOA to the CloudExpansion Web Services, Browsers, and the Cloud Capacity: Limited PerformanceServer Functions Thin Client Availability: Communications Failure andApplication Advances in Networking and Processing Performance IssuesWeb Speeds that Led to Cloud Computing Security: Newer Security Protocols ProvideDatabase Networking Developments More ProtectionVendor Approaches to Cloud Computing Increased Processing Speeds What's Next in Cloud Computing Role of Open Source Software in Data Managed Service Provider Model to Independent ComponentsCenter Cloud Computing and Software as a Message BaseCost Reduction vs. Reliability Service (SaaS) Location IndependenceOpen Source Server Software Single Purpose Architectures Migrate to Communication Requirements for CloudOpen Source Database Software Multipurpose Architectures Implementation Open Source Applications Software Data Center Virtualization Public InternetOpen Source System Management Software Collaboration Private InternetOpen Source Load-Balancing Software The Cloud as a Reach Extender Routing to the DatacenterVirtualization as the "Operating System" The Cloud as a Communication Enabler Switching within the Data CenterVirtualization with a Host Operating System The Cloud as an Employee Enabler Bandwidth Virtualization Infections on Virtualized Service-Oriented Architecture (SOA) Tools Used to Measure NetworkEnvironments Evolving from SOA to the Cloud Performance Type 1 Virtualized Environment Capacity: Limited Performance Using the Protocol Analyzer to MeasureType 2 Virtualized Environment Availability: Communications Failure and Bandwidth Virtualization Environments Performance Issues Using Ping and Traceroute to MeasureMicrosoft Virtualization Security: Newer Security Protocols Network Performance Sun xVM VirtualBox Provide More Protection SecurityLinux/UNIX Virtualization What's Next in Cloud Computing SSLVMware Products Independent Components VPN Data Center and Cloud Infrastructure Message Base Overhead Products Location Independence Storage Options for Cloud Computing End-User and Desktop Products Communication Requirements for Cloud Storage CapacityIBM Virtualization Implementation Data Protection and PartitioningUsing VMware to see a Virtualized Server Public Internet NASEnvironment Private Internet SANPermissive Federation Routing to the Datacenter CASVerified Federation Switching within the Data Center RedundancyEncrypted Federation Bandwidth ReplicationTrusted Federation Tools Used to Measure Network Multisiting Using XMPP in the Federated Environment Performance Backup and Recovery Presence in the Cloud Using the Protocol Analyzer to Measure Server Software Environments thatWhat It Is Bandwidth Support Cloud Computing Presence Protocols Using Ping and Traceroute to Measure Server CapacityLeveraging Presence Network Performance VirtualizationPresence Enabled Security ClusteringThe Future of Presence SSL ExpansionThe Interrelation of Identity, Presence, and VPN Server FunctionsLocation in the Cloud Overhead ApplicationIdentity Management Storage Options for Cloud Computing Web What It Is Storage Capacity Database Future of Identity in the Cloud Data Protection and Partitioning Vendor Approaches to Cloud Computing Privacy and Its Relation to Cloud-Based NAS Role of Open Source Software in DataInformation Systems SAN Center Personal Information CAS Cost Reduction vs. ReliabilityPrivacy-Related Issues Redundancy Open Source Server SoftwareFinding Your Private Information Replication Open Source Database SoftwareOpen Cloud Consortium Working Groups Multisiting Open Source Applications SoftwareProject Matsu Backup and Recovery Open Source System ManagementProject Comet Server Software Environments that SoftwareHPC in the Cloud Support Cloud Computing Open Source Load-Balancing Software The Open Cloud Testbed Server Capacity Virtualization as the "Operating System"The Open Science Data Cloud Virtualization Virtualization with a Host OperatingIntercloud Testbed Clustering SystemReporting on an Open Cloud Consortium Expansion Virtualization Infections on VirtualizedWorking Group Server Functions Environments Distributed Management Task Force Application Type 1 Virtualized Environment

Page 40: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

(DMTF) Web Type 2 Virtualized EnvironmentWhat It Is? Database Virtualization Environments DMTK Working Groups Associated with Vendor Approaches to Cloud Computing Microsoft VirtualizationCloud Computing Role of Open Source Software in Data Sun xVM VirtualBoxStandards for Application Developers Center Linux/UNIX VirtualizationProtocols Cost Reduction vs. Reliability VMware ProductsScripting Languages Open Source Server Software Data Center and Cloud InfrastructureContent Formatting Standards and Open Source Database Software ProductsLanguages Open Source Applications Software End-User and Desktop Products Standards for Security in the Cloud Open Source System Management IBM VirtualizationConfidentiality, Integrity, Availability Software Using VMware to see a Virtualized ServerAuthentication, Authorization, Accountability Open Source Load-Balancing Software Environment Regulations for Privacy Virtualization as the "Operating System" Permissive FederationSecurity Protocols Virtualization with a Host Operating Verified FederationEstablishing a Baseline for Cloud System Encrypted FederationPerformance Virtualization Infections on Virtualized Trusted FederationBest Practices for Selecting a Vendor and Environments Using XMPP in the Federated EnvironmentImplementing Cloud-Based Applications Type 1 Virtualized Environment Presence in the Cloud Choosing the Right Vendor Type 2 Virtualized Environment What It IsImplementing Cloud-Based Applications Virtualization Environments Presence ProtocolsWindows Remote Desktop Microsoft Virtualization Leveraging PresenceVnc Sun xVM VirtualBox Presence EnabledWeb Browsers Linux/UNIX Virtualization The Future of PresenceServer Extensions VMware Products The Interrelation of Identity, Presence, andThin Clients Data Center and Cloud Infrastructure Location in the CloudSmart Phones, Pads, Pods, etc. Products Identity Management Virtual Terminal Security Strengths and End-User and Desktop Products What It IsWeaknesses IBM Virtualization Future of Identity in the CloudStrengths Using VMware to see a Virtualized Server Privacy and Its Relation to Cloud-BasedWeaknesses Environment Information Systems Android Permissive Federation Personal InformationBlackBerry Verified Federation Privacy-Related IssuesWindows Mobile Encrypted Federation Finding Your Private Information Ubuntu Mobile Internet Device Trusted Federation Open Cloud Consortium Working GroupsMobile Platform Virtualization Using XMPP in the Federated Project MatsuKernel-Based Virtual Machine Environment Project CometVMware Mobile Virtualization Platform Presence in the Cloud HPC in the CloudCollaboration Applications for Mobile What It Is The Open Cloud TestbedPlatforms Presence Protocols The Open Science Data CloudText Messaging Leveraging Presence Intercloud Testbed iPhone Applications Presence Enabled Reporting on an Open Cloud ConsortiumBlackBerry Applications The Future of Presence Working Group Droid Applications The Interrelation of Identity, Presence, Distributed Management Task Force

and Location in the Cloud (DMTF) 4. The Evolution of Cloud Computing Identity Management What It Is?line What It Is DMTK Working Groups Associated with

Early Mainframe Environment Future of Identity in the Cloud Cloud ComputingVirtualization in Mainframe Architectures Privacy and Its Relation to Cloud-Based Standards for Application Developers and Operating Systems Information Systems Protocols

Personal Information Scripting LanguagesPrivacy-Related Issues Content Formatting Standards and

line Finding Your Private Information LanguagesCloud Computing Infrastructure Open Cloud Consortium Working Groups Standards for Security in the Cloud Cloud Computing Terms Project Matsu Confidentiality, Integrity, AvailabilityBenefits and Limitations of Cloud Computing Project Comet Authentication, Authorization,Benefits HPC in the Cloud AccountabilityLimitations The Open Cloud Testbed Regulations for PrivacyCloud Computing Case Studies The Open Science Data Cloud Security ProtocolsHow Companies Are Using Cloud Intercloud Testbed Establishing a Baseline for CloudComputing Reporting on an Open Cloud Consortium Performance Implementing Applications and Services in Working Group Best Practices for Selecting a Vendor andthe Cloud Distributed Management Task Force Implementing Cloud-Based Applications Using Your Company's Services vs. the (DMTF) Choosing the Right VendorCloud Provider What It Is? Implementing Cloud-Based Applications A Cloud Service Provider Introduced DMTK Working Groups Associated with Windows Remote DesktopCloud Computing Risks and Issues Cloud Computing Vnc

Page 41: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Products and Services Provided by Cloud Standards for Application Developers Web BrowsersComputing Companies Protocols Server ExtensionsEconomic Scripting Languages Thin ClientsStaffing Content Formatting Standards and Smart Phones, Pads, Pods, etc.Should Your Company Invest in Cloud Languages Virtual Terminal Security Strengths andComputing? Standards for Security in the Cloud Weaknesses What Should Not be Moved to the Cloud Confidentiality, Integrity, Availability StrengthsLANs and the Cloud Authentication, Authorization, Weaknesses Internet and the Cloud Accountability AndroidWeb Services, Browsers, and the Cloud Regulations for Privacy BlackBerryThin Client Security Protocols Windows MobileAdvances in Networking and Processing Establishing a Baseline for Cloud Ubuntu Mobile Internet DeviceSpeeds that Led to Cloud Computing Performance Mobile Platform Virtualization Networking Developments Best Practices for Selecting a Vendor Kernel-Based Virtual MachineIncreased Processing Speeds and Implementing Cloud-Based VMware Mobile Virtualization PlatformManaged Service Provider Model to Cloud Applications Collaboration Applications for MobileComputing and Software as a Service Choosing the Right Vendor Platforms (SaaS) Implementing Cloud-Based Applications Text MessagingSingle Purpose Architectures Migrate to Windows Remote Desktop iPhone ApplicationsMultipurpose Architectures Vnc BlackBerry ApplicationsData Center Virtualization Web Browsers Droid Applications Collaboration Server ExtensionsThe Cloud as a Reach Extender Thin ClientsThe Cloud as a Communication Enabler Smart Phones, Pads, Pods, etc. lineThe Cloud as an Employee Enabler Virtual Terminal Security Strengths and Cloud Computing InfrastructureService-Oriented Architecture (SOA) Weaknesses Cloud Computing TermsEvolving from SOA to the Cloud Strengths Benefits and Limitations of CloudCapacity: Limited Performance Weaknesses Computing Availability: Communications Failure and Android BenefitsPerformance Issues BlackBerry LimitationsSecurity: Newer Security Protocols Provide Windows Mobile Cloud Computing Case StudiesMore Protection Ubuntu Mobile Internet Device How Companies Are Using CloudWhat's Next in Cloud Computing Mobile Platform Virtualization Computing Independent Components Kernel-Based Virtual Machine Implementing Applications and Services inMessage Base VMware Mobile Virtualization Platform the CloudLocation Independence Collaboration Applications for Mobile Using Your Company's Services vs. theCommunication Requirements for Cloud Platforms Cloud ProviderImplementation Text Messaging A Cloud Service Provider IntroducedPublic Internet iPhone Applications Cloud Computing Risks and Issues Private Internet BlackBerry Applications Products and Services Provided by CloudRouting to the Datacenter Droid Applications Computing Companies Switching within the Data Center EconomicBandwidth StaffingTools Used to Measure Network line Should Your Company Invest in CloudPerformance Cloud Computing Infrastructure Computing? Using the Protocol Analyzer to Measure Cloud Computing Terms What Should Not be Moved to the Cloud Bandwidth Benefits and Limitations of Cloud LANs and the Cloud Using Ping and Traceroute to Measure Computing Internet and the Cloud Network Performance Benefits Web Services, Browsers, and the Cloud Security Limitations Thin Client SSL Cloud Computing Case Studies Advances in Networking and ProcessingVPN How Companies Are Using Cloud Speeds that Led to Cloud Computing Overhead Computing Networking DevelopmentsStorage Options for Cloud Computing Implementing Applications and Services Increased Processing SpeedsStorage Capacity in the Cloud Managed Service Provider Model to CloudData Protection and Partitioning Using Your Company's Services vs. the Computing and Software as a ServiceNAS Cloud Provider (SaaS) SAN A Cloud Service Provider Introduced Single Purpose Architectures Migrate toCAS Cloud Computing Risks and Issues Multipurpose ArchitecturesRedundancy Products and Services Provided by Cloud Data Center VirtualizationReplication Computing Companies Collaboration Multisiting Economic The Cloud as a Reach ExtenderBackup and Recovery Staffing The Cloud as a Communication EnablerServer Software Environments that Support Should Your Company Invest in Cloud The Cloud as an Employee EnablerCloud Computing Computing? Service-Oriented Architecture (SOA) Server Capacity What Should Not be Moved to the Cloud Evolving from SOA to the Cloud

Page 42: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtualization LANs and the Cloud Capacity: Limited PerformanceClustering Internet and the Cloud Availability: Communications Failure andExpansion Web Services, Browsers, and the Cloud Performance IssuesServer Functions Thin Client Security: Newer Security Protocols ProvideApplication Advances in Networking and Processing More ProtectionWeb Speeds that Led to Cloud Computing What's Next in Cloud Computing Database Networking Developments Independent ComponentsVendor Approaches to Cloud Computing Increased Processing Speeds Message BaseRole of Open Source Software in Data Managed Service Provider Model to Location IndependenceCenter Cloud Computing and Software as a Communication Requirements for CloudCost Reduction vs. Reliability Service (SaaS) Implementation Open Source Server Software Single Purpose Architectures Migrate to Public InternetOpen Source Database Software Multipurpose Architectures Private InternetOpen Source Applications Software Data Center Virtualization Routing to the DatacenterOpen Source System Management Software Collaboration Switching within the Data CenterOpen Source Load-Balancing Software The Cloud as a Reach Extender Bandwidth Virtualization as the "Operating System" The Cloud as a Communication Enabler Tools Used to Measure NetworkVirtualization with a Host Operating System The Cloud as an Employee Enabler Performance Virtualization Infections on Virtualized Service-Oriented Architecture (SOA) Using the Protocol Analyzer to MeasureEnvironments Evolving from SOA to the Cloud Bandwidth Type 1 Virtualized Environment Capacity: Limited Performance Using Ping and Traceroute to MeasureType 2 Virtualized Environment Availability: Communications Failure and Network Performance Virtualization Environments Performance Issues SecurityMicrosoft Virtualization Security: Newer Security Protocols SSLSun xVM VirtualBox Provide More Protection VPN Linux/UNIX Virtualization What's Next in Cloud Computing Overhead VMware Products Independent Components Storage Options for Cloud Computing Data Center and Cloud Infrastructure Message Base Storage CapacityProducts Location Independence Data Protection and PartitioningEnd-User and Desktop Products Communication Requirements for Cloud NASIBM Virtualization Implementation SANUsing VMware to see a Virtualized Server Public Internet CASEnvironment Private Internet RedundancyPermissive Federation Routing to the Datacenter ReplicationVerified Federation Switching within the Data Center Multisiting Encrypted Federation Bandwidth Backup and Recovery Trusted Federation Tools Used to Measure Network Server Software Environments thatUsing XMPP in the Federated Environment Performance Support Cloud Computing Presence in the Cloud Using the Protocol Analyzer to Measure Server CapacityWhat It Is Bandwidth VirtualizationPresence Protocols Using Ping and Traceroute to Measure ClusteringLeveraging Presence Network Performance ExpansionPresence Enabled Security Server FunctionsThe Future of Presence SSL ApplicationThe Interrelation of Identity, Presence, and VPN Web Location in the Cloud Overhead Database Identity Management Storage Options for Cloud Computing Vendor Approaches to Cloud Computing What It Is Storage Capacity Role of Open Source Software in DataFuture of Identity in the Cloud Data Protection and Partitioning Center Privacy and Its Relation to Cloud-Based NAS Cost Reduction vs. ReliabilityInformation Systems SAN Open Source Server SoftwarePersonal Information CAS Open Source Database SoftwarePrivacy-Related Issues Redundancy Open Source Applications SoftwareFinding Your Private Information Replication Open Source System ManagementOpen Cloud Consortium Working Groups Multisiting SoftwareProject Matsu Backup and Recovery Open Source Load-Balancing Software Project Comet Server Software Environments that Virtualization as the "Operating System"HPC in the Cloud Support Cloud Computing Virtualization with a Host OperatingThe Open Cloud Testbed Server Capacity SystemThe Open Science Data Cloud Virtualization Virtualization Infections on VirtualizedIntercloud Testbed Clustering Environments Reporting on an Open Cloud Consortium Expansion Type 1 Virtualized EnvironmentWorking Group Server Functions Type 2 Virtualized EnvironmentDistributed Management Task Force Application Virtualization Environments (DMTF) Web Microsoft VirtualizationWhat It Is? Database Sun xVM VirtualBox

Page 43: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

DMTK Working Groups Associated with Vendor Approaches to Cloud Computing Linux/UNIX VirtualizationCloud Computing Role of Open Source Software in Data VMware ProductsStandards for Application Developers Center Data Center and Cloud InfrastructureProtocols Cost Reduction vs. Reliability ProductsScripting Languages Open Source Server Software End-User and Desktop Products Content Formatting Standards and Open Source Database Software IBM VirtualizationLanguages Open Source Applications Software Using VMware to see a Virtualized ServerStandards for Security in the Cloud Open Source System Management Environment Confidentiality, Integrity, Availability Software Permissive FederationAuthentication, Authorization, Accountability Open Source Load-Balancing Software Verified FederationRegulations for Privacy Virtualization as the "Operating System" Encrypted FederationSecurity Protocols Virtualization with a Host Operating Trusted FederationEstablishing a Baseline for Cloud System Using XMPP in the Federated EnvironmentPerformance Virtualization Infections on Virtualized Presence in the Cloud Best Practices for Selecting a Vendor and Environments What It IsImplementing Cloud-Based Applications Type 1 Virtualized Environment Presence ProtocolsChoosing the Right Vendor Type 2 Virtualized Environment Leveraging PresenceImplementing Cloud-Based Applications Virtualization Environments Presence EnabledWindows Remote Desktop Microsoft Virtualization The Future of PresenceVnc Sun xVM VirtualBox The Interrelation of Identity, Presence, andWeb Browsers Linux/UNIX Virtualization Location in the CloudServer Extensions VMware Products Identity Management Thin Clients Data Center and Cloud Infrastructure What It IsSmart Phones, Pads, Pods, etc. Products Future of Identity in the CloudVirtual Terminal Security Strengths and End-User and Desktop Products Privacy and Its Relation to Cloud-BasedWeaknesses IBM Virtualization Information Systems Strengths Using VMware to see a Virtualized Server Personal InformationWeaknesses Environment Privacy-Related IssuesAndroid Permissive Federation Finding Your Private Information BlackBerry Verified Federation Open Cloud Consortium Working GroupsWindows Mobile Encrypted Federation Project MatsuUbuntu Mobile Internet Device Trusted Federation Project CometMobile Platform Virtualization Using XMPP in the Federated HPC in the CloudKernel-Based Virtual Machine Environment The Open Cloud TestbedVMware Mobile Virtualization Platform Presence in the Cloud The Open Science Data CloudCollaboration Applications for Mobile What It Is Intercloud Testbed Platforms Presence Protocols Reporting on an Open Cloud ConsortiumText Messaging Leveraging Presence Working Group iPhone Applications Presence Enabled Distributed Management Task ForceBlackBerry Applications The Future of Presence (DMTF) Droid Applications The Interrelation of Identity, Presence, What It Is?

and Location in the Cloud DMTK Working Groups Associated withIdentity Management Cloud Computing

line What It Is Standards for Application Developers Cloud Computing Infrastructure Future of Identity in the Cloud ProtocolsCloud Computing Terms Privacy and Its Relation to Cloud-Based Scripting LanguagesBenefits and Limitations of Cloud Computing Information Systems Content Formatting Standards andBenefits Personal Information LanguagesLimitations Privacy-Related Issues Standards for Security in the Cloud Cloud Computing Case Studies Finding Your Private Information Confidentiality, Integrity, AvailabilityHow Companies Are Using Cloud Open Cloud Consortium Working Groups Authentication, Authorization,Computing Project Matsu AccountabilityImplementing Applications and Services in Project Comet Regulations for Privacythe Cloud HPC in the Cloud Security ProtocolsUsing Your Company's Services vs. the The Open Cloud Testbed Establishing a Baseline for CloudCloud Provider The Open Science Data Cloud Performance A Cloud Service Provider Introduced Intercloud Testbed Best Practices for Selecting a Vendor andCloud Computing Risks and Issues Reporting on an Open Cloud Consortium Implementing Cloud-Based Applications Products and Services Provided by Cloud Working Group Choosing the Right VendorComputing Companies Distributed Management Task Force Implementing Cloud-Based Applications Economic (DMTF) Windows Remote DesktopStaffing What It Is? VncShould Your Company Invest in Cloud DMTK Working Groups Associated with Web BrowsersComputing? Cloud Computing Server ExtensionsWhat Should Not be Moved to the Cloud Standards for Application Developers Thin ClientsLANs and the Cloud Protocols Smart Phones, Pads, Pods, etc.

Page 44: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Internet and the Cloud Scripting Languages Virtual Terminal Security Strengths andWeb Services, Browsers, and the Cloud Content Formatting Standards and Weaknesses Thin Client Languages StrengthsAdvances in Networking and Processing Standards for Security in the Cloud Weaknesses Speeds that Led to Cloud Computing Confidentiality, Integrity, Availability AndroidNetworking Developments Authentication, Authorization, BlackBerryIncreased Processing Speeds Accountability Windows MobileManaged Service Provider Model to Cloud Regulations for Privacy Ubuntu Mobile Internet DeviceComputing and Software as a Service Security Protocols Mobile Platform Virtualization (SaaS) Establishing a Baseline for Cloud Kernel-Based Virtual MachineSingle Purpose Architectures Migrate to Performance VMware Mobile Virtualization PlatformMultipurpose Architectures Best Practices for Selecting a Vendor Collaboration Applications for MobileData Center Virtualization and Implementing Cloud-Based Platforms Collaboration Applications Text MessagingThe Cloud as a Reach Extender Choosing the Right Vendor iPhone ApplicationsThe Cloud as a Communication Enabler Implementing Cloud-Based Applications BlackBerry ApplicationsThe Cloud as an Employee Enabler Windows Remote Desktop Droid Applications Service-Oriented Architecture (SOA) VncEvolving from SOA to the Cloud Web BrowsersCapacity: Limited Performance Server Extensions lineAvailability: Communications Failure and Thin Clients Cloud Computing InfrastructurePerformance Issues Smart Phones, Pads, Pods, etc. Cloud Computing TermsSecurity: Newer Security Protocols Provide Virtual Terminal Security Strengths and Benefits and Limitations of CloudMore Protection Weaknesses Computing What's Next in Cloud Computing Strengths BenefitsIndependent Components Weaknesses LimitationsMessage Base Android Cloud Computing Case StudiesLocation Independence BlackBerry How Companies Are Using CloudCommunication Requirements for Cloud Windows Mobile Computing Implementation Ubuntu Mobile Internet Device Implementing Applications and Services inPublic Internet Mobile Platform Virtualization the CloudPrivate Internet Kernel-Based Virtual Machine Using Your Company's Services vs. theRouting to the Datacenter VMware Mobile Virtualization Platform Cloud ProviderSwitching within the Data Center Collaboration Applications for Mobile A Cloud Service Provider IntroducedBandwidth Platforms Cloud Computing Risks and Issues Tools Used to Measure Network Text Messaging Products and Services Provided by CloudPerformance iPhone Applications Computing Companies Using the Protocol Analyzer to Measure BlackBerry Applications EconomicBandwidth Droid Applications StaffingUsing Ping and Traceroute to Measure Should Your Company Invest in CloudNetwork Performance Computing? Security line What Should Not be Moved to the Cloud SSL Cloud Computing Infrastructure LANs and the Cloud VPN Cloud Computing Terms Internet and the Cloud Overhead Benefits and Limitations of Cloud Web Services, Browsers, and the Cloud Storage Options for Cloud Computing Computing Thin Client Storage Capacity Benefits Advances in Networking and ProcessingData Protection and Partitioning Limitations Speeds that Led to Cloud Computing NAS Cloud Computing Case Studies Networking DevelopmentsSAN How Companies Are Using Cloud Increased Processing SpeedsCAS Computing Managed Service Provider Model to CloudRedundancy Implementing Applications and Services Computing and Software as a ServiceReplication in the Cloud (SaaS) Multisiting Using Your Company's Services vs. the Single Purpose Architectures Migrate toBackup and Recovery Cloud Provider Multipurpose ArchitecturesServer Software Environments that Support A Cloud Service Provider Introduced Data Center VirtualizationCloud Computing Cloud Computing Risks and Issues Collaboration Server Capacity Products and Services Provided by Cloud The Cloud as a Reach ExtenderVirtualization Computing Companies The Cloud as a Communication EnablerClustering Economic The Cloud as an Employee EnablerExpansion Staffing Service-Oriented Architecture (SOA) Server Functions Should Your Company Invest in Cloud Evolving from SOA to the CloudApplication Computing? Capacity: Limited PerformanceWeb What Should Not be Moved to the Cloud Availability: Communications Failure andDatabase LANs and the Cloud Performance IssuesVendor Approaches to Cloud Computing Internet and the Cloud Security: Newer Security Protocols Provide

Page 45: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Role of Open Source Software in Data Web Services, Browsers, and the Cloud More ProtectionCenter Thin Client What's Next in Cloud Computing Cost Reduction vs. Reliability Advances in Networking and Processing Independent ComponentsOpen Source Server Software Speeds that Led to Cloud Computing Message BaseOpen Source Database Software Networking Developments Location IndependenceOpen Source Applications Software Increased Processing Speeds Communication Requirements for CloudOpen Source System Management Software Managed Service Provider Model to Implementation Open Source Load-Balancing Software Cloud Computing and Software as a Public InternetVirtualization as the "Operating System" Service (SaaS) Private InternetVirtualization with a Host Operating System Single Purpose Architectures Migrate to Routing to the DatacenterVirtualization Infections on Virtualized Multipurpose Architectures Switching within the Data CenterEnvironments Data Center Virtualization Bandwidth Type 1 Virtualized Environment Collaboration Tools Used to Measure NetworkType 2 Virtualized Environment The Cloud as a Reach Extender Performance Virtualization Environments The Cloud as a Communication Enabler Using the Protocol Analyzer to MeasureMicrosoft Virtualization The Cloud as an Employee Enabler Bandwidth Sun xVM VirtualBox Service-Oriented Architecture (SOA) Using Ping and Traceroute to MeasureLinux/UNIX Virtualization Evolving from SOA to the Cloud Network Performance VMware Products Capacity: Limited Performance SecurityData Center and Cloud Infrastructure Availability: Communications Failure and SSLProducts Performance Issues VPN End-User and Desktop Products Security: Newer Security Protocols Overhead IBM Virtualization Provide More Protection Storage Options for Cloud Computing Using VMware to see a Virtualized Server What's Next in Cloud Computing Storage CapacityEnvironment Independent Components Data Protection and PartitioningPermissive Federation Message Base NASVerified Federation Location Independence SANEncrypted Federation Communication Requirements for Cloud CASTrusted Federation Implementation RedundancyUsing XMPP in the Federated Environment Public Internet ReplicationPresence in the Cloud Private Internet Multisiting What It Is Routing to the Datacenter Backup and Recovery Presence Protocols Switching within the Data Center Server Software Environments thatLeveraging Presence Bandwidth Support Cloud Computing Presence Enabled Tools Used to Measure Network Server CapacityThe Future of Presence Performance VirtualizationThe Interrelation of Identity, Presence, and Using the Protocol Analyzer to Measure ClusteringLocation in the Cloud Bandwidth ExpansionIdentity Management Using Ping and Traceroute to Measure Server FunctionsWhat It Is Network Performance ApplicationFuture of Identity in the Cloud Security Web Privacy and Its Relation to Cloud-Based SSL Database Information Systems VPN Vendor Approaches to Cloud Computing Personal Information Overhead Role of Open Source Software in DataPrivacy-Related Issues Storage Options for Cloud Computing Center Finding Your Private Information Storage Capacity Cost Reduction vs. ReliabilityOpen Cloud Consortium Working Groups Data Protection and Partitioning Open Source Server SoftwareProject Matsu NAS Open Source Database SoftwareProject Comet SAN Open Source Applications SoftwareHPC in the Cloud CAS Open Source System ManagementThe Open Cloud Testbed Redundancy SoftwareThe Open Science Data Cloud Replication Open Source Load-Balancing Software Intercloud Testbed Multisiting Virtualization as the "Operating System"Reporting on an Open Cloud Consortium Backup and Recovery Virtualization with a Host OperatingWorking Group Server Software Environments that SystemDistributed Management Task Force Support Cloud Computing Virtualization Infections on Virtualized(DMTF) Server Capacity Environments What It Is? Virtualization Type 1 Virtualized EnvironmentDMTK Working Groups Associated with Clustering Type 2 Virtualized EnvironmentCloud Computing Expansion Virtualization Environments Standards for Application Developers Server Functions Microsoft VirtualizationProtocols Application Sun xVM VirtualBoxScripting Languages Web Linux/UNIX VirtualizationContent Formatting Standards and Database VMware ProductsLanguages Vendor Approaches to Cloud Computing Data Center and Cloud InfrastructureStandards for Security in the Cloud Role of Open Source Software in Data Products

Page 46: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Confidentiality, Integrity, Availability Center End-User and Desktop Products Authentication, Authorization, Accountability Cost Reduction vs. Reliability IBM VirtualizationRegulations for Privacy Open Source Server Software Using VMware to see a Virtualized ServerSecurity Protocols Open Source Database Software Environment Establishing a Baseline for Cloud Open Source Applications Software Permissive FederationPerformance Open Source System Management Verified FederationBest Practices for Selecting a Vendor and Software Encrypted FederationImplementing Cloud-Based Applications Open Source Load-Balancing Software Trusted FederationChoosing the Right Vendor Virtualization as the "Operating System" Using XMPP in the Federated EnvironmentImplementing Cloud-Based Applications Virtualization with a Host Operating Presence in the Cloud Windows Remote Desktop System What It IsVnc Virtualization Infections on Virtualized Presence ProtocolsWeb Browsers Environments Leveraging PresenceServer Extensions Type 1 Virtualized Environment Presence EnabledThin Clients Type 2 Virtualized Environment The Future of PresenceSmart Phones, Pads, Pods, etc. Virtualization Environments The Interrelation of Identity, Presence, andVirtual Terminal Security Strengths and Microsoft Virtualization Location in the CloudWeaknesses Sun xVM VirtualBox Identity Management Strengths Linux/UNIX Virtualization What It IsWeaknesses VMware Products Future of Identity in the CloudAndroid Data Center and Cloud Infrastructure Privacy and Its Relation to Cloud-BasedBlackBerry Products Information Systems Windows Mobile End-User and Desktop Products Personal InformationUbuntu Mobile Internet Device IBM Virtualization Privacy-Related IssuesMobile Platform Virtualization Using VMware to see a Virtualized Server Finding Your Private Information Kernel-Based Virtual Machine Environment Open Cloud Consortium Working GroupsVMware Mobile Virtualization Platform Permissive Federation Project MatsuCollaboration Applications for Mobile Verified Federation Project CometPlatforms Encrypted Federation HPC in the CloudText Messaging Trusted Federation The Open Cloud TestbediPhone Applications Using XMPP in the Federated The Open Science Data CloudBlackBerry Applications Environment Intercloud Testbed Droid Applications Presence in the Cloud Reporting on an Open Cloud Consortium

What It Is Working Group Presence Protocols Distributed Management Task Force

line Leveraging Presence (DMTF) Cloud Computing Infrastructure Presence Enabled What It Is?Cloud Computing Terms The Future of Presence DMTK Working Groups Associated withBenefits and Limitations of Cloud Computing The Interrelation of Identity, Presence, Cloud ComputingBenefits and Location in the Cloud Standards for Application Developers Limitations Identity Management ProtocolsCloud Computing Case Studies What It Is Scripting LanguagesHow Companies Are Using Cloud Future of Identity in the Cloud Content Formatting Standards andComputing Privacy and Its Relation to Cloud-Based LanguagesImplementing Applications and Services in Information Systems Standards for Security in the Cloud the Cloud Personal Information Confidentiality, Integrity, AvailabilityUsing Your Company's Services vs. the Privacy-Related Issues Authentication, Authorization,Cloud Provider Finding Your Private Information AccountabilityA Cloud Service Provider Introduced Open Cloud Consortium Working Groups Regulations for PrivacyCloud Computing Risks and Issues Project Matsu Security ProtocolsProducts and Services Provided by Cloud Project Comet Establishing a Baseline for CloudComputing Companies HPC in the Cloud Performance Economic The Open Cloud Testbed Best Practices for Selecting a Vendor andStaffing The Open Science Data Cloud Implementing Cloud-Based Applications Should Your Company Invest in Cloud Intercloud Testbed Choosing the Right VendorComputing? Reporting on an Open Cloud Consortium Implementing Cloud-Based Applications What Should Not be Moved to the Cloud Working Group Windows Remote DesktopLANs and the Cloud Distributed Management Task Force VncInternet and the Cloud (DMTF) Web BrowsersWeb Services, Browsers, and the Cloud What It Is? Server ExtensionsThin Client DMTK Working Groups Associated with Thin ClientsAdvances in Networking and Processing Cloud Computing Smart Phones, Pads, Pods, etc.Speeds that Led to Cloud Computing Standards for Application Developers Virtual Terminal Security Strengths andNetworking Developments Protocols Weaknesses Increased Processing Speeds Scripting Languages StrengthsManaged Service Provider Model to Cloud Content Formatting Standards and Weaknesses

Page 47: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Computing and Software as a Service Languages Android(SaaS) Standards for Security in the Cloud BlackBerrySingle Purpose Architectures Migrate to Confidentiality, Integrity, Availability Windows MobileMultipurpose Architectures Authentication, Authorization, Ubuntu Mobile Internet DeviceData Center Virtualization Accountability Mobile Platform Virtualization Collaboration Regulations for Privacy Kernel-Based Virtual MachineThe Cloud as a Reach Extender Security Protocols VMware Mobile Virtualization PlatformThe Cloud as a Communication Enabler Establishing a Baseline for Cloud Collaboration Applications for MobileThe Cloud as an Employee Enabler Performance Platforms Service-Oriented Architecture (SOA) Best Practices for Selecting a Vendor Text MessagingEvolving from SOA to the Cloud and Implementing Cloud-Based iPhone ApplicationsCapacity: Limited Performance Applications BlackBerry ApplicationsAvailability: Communications Failure and Choosing the Right Vendor Droid Applications Performance Issues Implementing Cloud-Based Applications Security: Newer Security Protocols Provide Windows Remote DesktopMore Protection Vnc lineWhat's Next in Cloud Computing Web Browsers Cloud Computing InfrastructureIndependent Components Server Extensions Cloud Computing TermsMessage Base Thin Clients Benefits and Limitations of CloudLocation Independence Smart Phones, Pads, Pods, etc. Computing Communication Requirements for Cloud Virtual Terminal Security Strengths and BenefitsImplementation Weaknesses LimitationsPublic Internet Strengths Cloud Computing Case StudiesPrivate Internet Weaknesses How Companies Are Using CloudRouting to the Datacenter Android Computing Switching within the Data Center BlackBerry Implementing Applications and Services inBandwidth Windows Mobile the CloudTools Used to Measure Network Ubuntu Mobile Internet Device Using Your Company's Services vs. thePerformance Mobile Platform Virtualization Cloud ProviderUsing the Protocol Analyzer to Measure Kernel-Based Virtual Machine A Cloud Service Provider IntroducedBandwidth VMware Mobile Virtualization Platform Cloud Computing Risks and Issues Using Ping and Traceroute to Measure Collaboration Applications for Mobile Products and Services Provided by CloudNetwork Performance Platforms Computing Companies Security Text Messaging EconomicSSL iPhone Applications StaffingVPN BlackBerry Applications Should Your Company Invest in CloudOverhead Droid Applications Computing? Storage Options for Cloud Computing What Should Not be Moved to the Cloud Storage Capacity LANs and the Cloud Data Protection and Partitioning line Internet and the Cloud NAS Cloud Computing Infrastructure Web Services, Browsers, and the Cloud SAN Cloud Computing Terms Thin Client CAS Benefits and Limitations of Cloud Advances in Networking and ProcessingRedundancy Computing Speeds that Led to Cloud Computing Replication Benefits Networking DevelopmentsMultisiting Limitations Increased Processing SpeedsBackup and Recovery Cloud Computing Case Studies Managed Service Provider Model to CloudServer Software Environments that Support How Companies Are Using Cloud Computing and Software as a ServiceCloud Computing Computing (SaaS) Server Capacity Implementing Applications and Services Single Purpose Architectures Migrate toVirtualization in the Cloud Multipurpose ArchitecturesClustering Using Your Company's Services vs. the Data Center VirtualizationExpansion Cloud Provider Collaboration Server Functions A Cloud Service Provider Introduced The Cloud as a Reach ExtenderApplication Cloud Computing Risks and Issues The Cloud as a Communication EnablerWeb Products and Services Provided by Cloud The Cloud as an Employee EnablerDatabase Computing Companies Service-Oriented Architecture (SOA) Vendor Approaches to Cloud Computing Economic Evolving from SOA to the CloudRole of Open Source Software in Data Staffing Capacity: Limited PerformanceCenter Should Your Company Invest in Cloud Availability: Communications Failure andCost Reduction vs. Reliability Computing? Performance IssuesOpen Source Server Software What Should Not be Moved to the Cloud Security: Newer Security Protocols ProvideOpen Source Database Software LANs and the Cloud More ProtectionOpen Source Applications Software Internet and the Cloud What's Next in Cloud Computing Open Source System Management Software Web Services, Browsers, and the Cloud Independent ComponentsOpen Source Load-Balancing Software Thin Client Message Base

Page 48: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtualization as the "Operating System" Advances in Networking and Processing Location IndependenceVirtualization with a Host Operating System Speeds that Led to Cloud Computing Communication Requirements for CloudVirtualization Infections on Virtualized Networking Developments Implementation Environments Increased Processing Speeds Public InternetType 1 Virtualized Environment Managed Service Provider Model to Private InternetType 2 Virtualized Environment Cloud Computing and Software as a Routing to the DatacenterVirtualization Environments Service (SaaS) Switching within the Data CenterMicrosoft Virtualization Single Purpose Architectures Migrate to Bandwidth Sun xVM VirtualBox Multipurpose Architectures Tools Used to Measure NetworkLinux/UNIX Virtualization Data Center Virtualization Performance VMware Products Collaboration Using the Protocol Analyzer to MeasureData Center and Cloud Infrastructure The Cloud as a Reach Extender Bandwidth Products The Cloud as a Communication Enabler Using Ping and Traceroute to MeasureEnd-User and Desktop Products The Cloud as an Employee Enabler Network Performance IBM Virtualization Service-Oriented Architecture (SOA) SecurityUsing VMware to see a Virtualized Server Evolving from SOA to the Cloud SSLEnvironment Capacity: Limited Performance VPN Permissive Federation Availability: Communications Failure and Overhead Verified Federation Performance Issues Storage Options for Cloud Computing Encrypted Federation Security: Newer Security Protocols Storage CapacityTrusted Federation Provide More Protection Data Protection and PartitioningUsing XMPP in the Federated Environment What's Next in Cloud Computing NASPresence in the Cloud Independent Components SANWhat It Is Message Base CASPresence Protocols Location Independence RedundancyLeveraging Presence Communication Requirements for Cloud ReplicationPresence Enabled Implementation Multisiting The Future of Presence Public Internet Backup and Recovery The Interrelation of Identity, Presence, and Private Internet Server Software Environments thatLocation in the Cloud Routing to the Datacenter Support Cloud Computing Identity Management Switching within the Data Center Server CapacityWhat It Is Bandwidth VirtualizationFuture of Identity in the Cloud Tools Used to Measure Network ClusteringPrivacy and Its Relation to Cloud-Based Performance ExpansionInformation Systems Using the Protocol Analyzer to Measure Server FunctionsPersonal Information Bandwidth ApplicationPrivacy-Related Issues Using Ping and Traceroute to Measure Web Finding Your Private Information Network Performance Database Open Cloud Consortium Working Groups Security Vendor Approaches to Cloud Computing Project Matsu SSL Role of Open Source Software in DataProject Comet VPN Center HPC in the Cloud Overhead Cost Reduction vs. ReliabilityThe Open Cloud Testbed Storage Options for Cloud Computing Open Source Server SoftwareThe Open Science Data Cloud Storage Capacity Open Source Database SoftwareIntercloud Testbed Data Protection and Partitioning Open Source Applications SoftwareReporting on an Open Cloud Consortium NAS Open Source System ManagementWorking Group SAN SoftwareDistributed Management Task Force CAS Open Source Load-Balancing Software (DMTF) Redundancy Virtualization as the "Operating System"What It Is? Replication Virtualization with a Host OperatingDMTK Working Groups Associated with Multisiting SystemCloud Computing Backup and Recovery Virtualization Infections on VirtualizedStandards for Application Developers Server Software Environments that Environments Protocols Support Cloud Computing Type 1 Virtualized EnvironmentScripting Languages Server Capacity Type 2 Virtualized EnvironmentContent Formatting Standards and Virtualization Virtualization Environments Languages Clustering Microsoft VirtualizationStandards for Security in the Cloud Expansion Sun xVM VirtualBoxConfidentiality, Integrity, Availability Server Functions Linux/UNIX VirtualizationAuthentication, Authorization, Accountability Application VMware ProductsRegulations for Privacy Web Data Center and Cloud InfrastructureSecurity Protocols Database ProductsEstablishing a Baseline for Cloud Vendor Approaches to Cloud Computing End-User and Desktop Products Performance Role of Open Source Software in Data IBM VirtualizationBest Practices for Selecting a Vendor and Center Using VMware to see a Virtualized ServerImplementing Cloud-Based Applications Cost Reduction vs. Reliability Environment

Page 49: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Choosing the Right Vendor Open Source Server Software Permissive FederationImplementing Cloud-Based Applications Open Source Database Software Verified FederationWindows Remote Desktop Open Source Applications Software Encrypted FederationVnc Open Source System Management Trusted FederationWeb Browsers Software Using XMPP in the Federated EnvironmentServer Extensions Open Source Load-Balancing Software Presence in the Cloud Thin Clients Virtualization as the "Operating System" What It IsSmart Phones, Pads, Pods, etc. Virtualization with a Host Operating Presence ProtocolsVirtual Terminal Security Strengths and System Leveraging PresenceWeaknesses Virtualization Infections on Virtualized Presence EnabledStrengths Environments The Future of PresenceWeaknesses Type 1 Virtualized Environment The Interrelation of Identity, Presence, andAndroid Type 2 Virtualized Environment Location in the CloudBlackBerry Virtualization Environments Identity Management Windows Mobile Microsoft Virtualization What It IsUbuntu Mobile Internet Device Sun xVM VirtualBox Future of Identity in the CloudMobile Platform Virtualization Linux/UNIX Virtualization Privacy and Its Relation to Cloud-BasedKernel-Based Virtual Machine VMware Products Information Systems VMware Mobile Virtualization Platform Data Center and Cloud Infrastructure Personal InformationCollaboration Applications for Mobile Products Privacy-Related IssuesPlatforms End-User and Desktop Products Finding Your Private Information Text Messaging IBM Virtualization Open Cloud Consortium Working GroupsiPhone Applications Using VMware to see a Virtualized Server Project MatsuBlackBerry Applications Environment Project CometDroid Applications Permissive Federation HPC in the Cloud

Verified Federation The Open Cloud TestbedEncrypted Federation The Open Science Data Cloud

line Trusted Federation Intercloud Testbed Cloud Computing Infrastructure Using XMPP in the Federated Reporting on an Open Cloud ConsortiumCloud Computing Terms Environment Working Group Benefits and Limitations of Cloud Computing Presence in the Cloud Distributed Management Task ForceBenefits What It Is (DMTF) Limitations Presence Protocols What It Is?Cloud Computing Case Studies Leveraging Presence DMTK Working Groups Associated withHow Companies Are Using Cloud Presence Enabled Cloud ComputingComputing The Future of Presence Standards for Application Developers Implementing Applications and Services in The Interrelation of Identity, Presence, Protocolsthe Cloud and Location in the Cloud Scripting LanguagesUsing Your Company's Services vs. the Identity Management Content Formatting Standards andCloud Provider What It Is LanguagesA Cloud Service Provider Introduced Future of Identity in the Cloud Standards for Security in the Cloud Cloud Computing Risks and Issues Privacy and Its Relation to Cloud-Based Confidentiality, Integrity, AvailabilityProducts and Services Provided by Cloud Information Systems Authentication, Authorization,Computing Companies Personal Information AccountabilityEconomic Privacy-Related Issues Regulations for PrivacyStaffing Finding Your Private Information Security ProtocolsShould Your Company Invest in Cloud Open Cloud Consortium Working Groups Establishing a Baseline for CloudComputing? Project Matsu Performance What Should Not be Moved to the Cloud Project Comet Best Practices for Selecting a Vendor andLANs and the Cloud HPC in the Cloud Implementing Cloud-Based Applications Internet and the Cloud The Open Cloud Testbed Choosing the Right VendorWeb Services, Browsers, and the Cloud The Open Science Data Cloud Implementing Cloud-Based Applications Thin Client Intercloud Testbed Windows Remote DesktopAdvances in Networking and Processing Reporting on an Open Cloud Consortium VncSpeeds that Led to Cloud Computing Working Group Web BrowsersNetworking Developments Distributed Management Task Force Server ExtensionsIncreased Processing Speeds (DMTF) Thin ClientsManaged Service Provider Model to Cloud What It Is? Smart Phones, Pads, Pods, etc.Computing and Software as a Service DMTK Working Groups Associated with Virtual Terminal Security Strengths and(SaaS) Cloud Computing Weaknesses Single Purpose Architectures Migrate to Standards for Application Developers StrengthsMultipurpose Architectures Protocols Weaknesses Data Center Virtualization Scripting Languages AndroidCollaboration Content Formatting Standards and BlackBerryThe Cloud as a Reach Extender Languages Windows MobileThe Cloud as a Communication Enabler Standards for Security in the Cloud Ubuntu Mobile Internet Device

Page 50: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Cloud as an Employee Enabler Confidentiality, Integrity, Availability Mobile Platform Virtualization Service-Oriented Architecture (SOA) Authentication, Authorization, Kernel-Based Virtual MachineEvolving from SOA to the Cloud Accountability VMware Mobile Virtualization PlatformCapacity: Limited Performance Regulations for Privacy Collaboration Applications for MobileAvailability: Communications Failure and Security Protocols Platforms Performance Issues Establishing a Baseline for Cloud Text MessagingSecurity: Newer Security Protocols Provide Performance iPhone ApplicationsMore Protection Best Practices for Selecting a Vendor BlackBerry ApplicationsWhat's Next in Cloud Computing and Implementing Cloud-Based Droid Applications Independent Components Applications Message Base Choosing the Right VendorLocation Independence Implementing Cloud-Based Applications lineCommunication Requirements for Cloud Windows Remote Desktop Cloud Computing InfrastructureImplementation Vnc Cloud Computing TermsPublic Internet Web Browsers Benefits and Limitations of CloudPrivate Internet Server Extensions Computing Routing to the Datacenter Thin Clients BenefitsSwitching within the Data Center Smart Phones, Pads, Pods, etc. LimitationsBandwidth Virtual Terminal Security Strengths and Cloud Computing Case StudiesTools Used to Measure Network Weaknesses How Companies Are Using CloudPerformance Strengths Computing Using the Protocol Analyzer to Measure Weaknesses Implementing Applications and Services inBandwidth Android the CloudUsing Ping and Traceroute to Measure BlackBerry Using Your Company's Services vs. theNetwork Performance Windows Mobile Cloud ProviderSecurity Ubuntu Mobile Internet Device A Cloud Service Provider IntroducedSSL Mobile Platform Virtualization Cloud Computing Risks and Issues VPN Kernel-Based Virtual Machine Products and Services Provided by CloudOverhead VMware Mobile Virtualization Platform Computing Companies Storage Options for Cloud Computing Collaboration Applications for Mobile EconomicStorage Capacity Platforms StaffingData Protection and Partitioning Text Messaging Should Your Company Invest in CloudNAS iPhone Applications Computing? SAN BlackBerry Applications What Should Not be Moved to the Cloud CAS Droid Applications LANs and the Cloud Redundancy Internet and the Cloud Replication 6. Virtualization Web Services, Browsers, and the Cloud Multisiting line Thin Client Backup and Recovery Student Virtualization Architectures Advances in Networking and ProcessingServer Software Environments that Support The Hypervisor Speeds that Led to Cloud Computing Cloud Computing Networking DevelopmentsServer Capacity Increased Processing SpeedsVirtualization line Managed Service Provider Model to CloudClustering Cloud Computing Infrastructure Computing and Software as a ServiceExpansion Cloud Computing Terms (SaaS) Server Functions Benefits and Limitations of Cloud Single Purpose Architectures Migrate toApplication Computing Multipurpose ArchitecturesWeb Benefits Data Center VirtualizationDatabase Limitations Collaboration Vendor Approaches to Cloud Computing Cloud Computing Case Studies The Cloud as a Reach ExtenderRole of Open Source Software in Data How Companies Are Using Cloud The Cloud as a Communication EnablerCenter Computing The Cloud as an Employee EnablerCost Reduction vs. Reliability Implementing Applications and Services Service-Oriented Architecture (SOA) Open Source Server Software in the Cloud Evolving from SOA to the CloudOpen Source Database Software Using Your Company's Services vs. the Capacity: Limited PerformanceOpen Source Applications Software Cloud Provider Availability: Communications Failure andOpen Source System Management Software A Cloud Service Provider Introduced Performance IssuesOpen Source Load-Balancing Software Cloud Computing Risks and Issues Security: Newer Security Protocols ProvideVirtualization as the "Operating System" Products and Services Provided by Cloud More ProtectionVirtualization with a Host Operating System Computing Companies What's Next in Cloud Computing Virtualization Infections on Virtualized Economic Independent ComponentsEnvironments Staffing Message BaseType 1 Virtualized Environment Should Your Company Invest in Cloud Location IndependenceType 2 Virtualized Environment Computing? Communication Requirements for CloudVirtualization Environments What Should Not be Moved to the Cloud Implementation Microsoft Virtualization LANs and the Cloud Public Internet

Page 51: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Sun xVM VirtualBox Internet and the Cloud Private InternetLinux/UNIX Virtualization Web Services, Browsers, and the Cloud Routing to the DatacenterVMware Products Thin Client Switching within the Data CenterData Center and Cloud Infrastructure Advances in Networking and Processing Bandwidth Products Speeds that Led to Cloud Computing Tools Used to Measure NetworkEnd-User and Desktop Products Networking Developments Performance IBM Virtualization Increased Processing Speeds Using the Protocol Analyzer to MeasureUsing VMware to see a Virtualized Server Managed Service Provider Model to Bandwidth Environment Cloud Computing and Software as a Using Ping and Traceroute to MeasurePermissive Federation Service (SaaS) Network Performance Verified Federation Single Purpose Architectures Migrate to SecurityEncrypted Federation Multipurpose Architectures SSLTrusted Federation Data Center Virtualization VPN Using XMPP in the Federated Environment Collaboration Overhead Presence in the Cloud The Cloud as a Reach Extender Storage Options for Cloud Computing What It Is The Cloud as a Communication Enabler Storage CapacityPresence Protocols The Cloud as an Employee Enabler Data Protection and PartitioningLeveraging Presence Service-Oriented Architecture (SOA) NASPresence Enabled Evolving from SOA to the Cloud SANThe Future of Presence Capacity: Limited Performance CASThe Interrelation of Identity, Presence, and Availability: Communications Failure and RedundancyLocation in the Cloud Performance Issues ReplicationIdentity Management Security: Newer Security Protocols Multisiting What It Is Provide More Protection Backup and Recovery Future of Identity in the Cloud What's Next in Cloud Computing Server Software Environments thatPrivacy and Its Relation to Cloud-Based Independent Components Support Cloud Computing Information Systems Message Base Server CapacityPersonal Information Location Independence VirtualizationPrivacy-Related Issues Communication Requirements for Cloud ClusteringFinding Your Private Information Implementation ExpansionOpen Cloud Consortium Working Groups Public Internet Server FunctionsProject Matsu Private Internet ApplicationProject Comet Routing to the Datacenter Web HPC in the Cloud Switching within the Data Center Database The Open Cloud Testbed Bandwidth Vendor Approaches to Cloud Computing The Open Science Data Cloud Tools Used to Measure Network Role of Open Source Software in DataIntercloud Testbed Performance Center Reporting on an Open Cloud Consortium Using the Protocol Analyzer to Measure Cost Reduction vs. ReliabilityWorking Group Bandwidth Open Source Server SoftwareDistributed Management Task Force Using Ping and Traceroute to Measure Open Source Database Software(DMTF) Network Performance Open Source Applications SoftwareWhat It Is? Security Open Source System ManagementDMTK Working Groups Associated with SSL SoftwareCloud Computing VPN Open Source Load-Balancing Software Standards for Application Developers Overhead Virtualization as the "Operating System"Protocols Storage Options for Cloud Computing Virtualization with a Host OperatingScripting Languages Storage Capacity SystemContent Formatting Standards and Data Protection and Partitioning Virtualization Infections on VirtualizedLanguages NAS Environments Standards for Security in the Cloud SAN Type 1 Virtualized EnvironmentConfidentiality, Integrity, Availability CAS Type 2 Virtualized EnvironmentAuthentication, Authorization, Accountability Redundancy Virtualization Environments Regulations for Privacy Replication Microsoft VirtualizationSecurity Protocols Multisiting Sun xVM VirtualBoxEstablishing a Baseline for Cloud Backup and Recovery Linux/UNIX VirtualizationPerformance Server Software Environments that VMware ProductsBest Practices for Selecting a Vendor and Support Cloud Computing Data Center and Cloud InfrastructureImplementing Cloud-Based Applications Server Capacity ProductsChoosing the Right Vendor Virtualization End-User and Desktop Products Implementing Cloud-Based Applications Clustering IBM VirtualizationWindows Remote Desktop Expansion Using VMware to see a Virtualized ServerVnc Server Functions Environment Web Browsers Application Permissive FederationServer Extensions Web Verified FederationThin Clients Database Encrypted FederationSmart Phones, Pads, Pods, etc. Vendor Approaches to Cloud Computing Trusted Federation

Page 52: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtual Terminal Security Strengths and Role of Open Source Software in Data Using XMPP in the Federated EnvironmentWeaknesses Center Presence in the Cloud Strengths Cost Reduction vs. Reliability What It IsWeaknesses Open Source Server Software Presence ProtocolsAndroid Open Source Database Software Leveraging PresenceBlackBerry Open Source Applications Software Presence EnabledWindows Mobile Open Source System Management The Future of PresenceUbuntu Mobile Internet Device Software The Interrelation of Identity, Presence, andMobile Platform Virtualization Open Source Load-Balancing Software Location in the CloudKernel-Based Virtual Machine Virtualization as the "Operating System" Identity Management VMware Mobile Virtualization Platform Virtualization with a Host Operating What It IsCollaboration Applications for Mobile System Future of Identity in the CloudPlatforms Virtualization Infections on Virtualized Privacy and Its Relation to Cloud-BasedText Messaging Environments Information Systems iPhone Applications Type 1 Virtualized Environment Personal InformationBlackBerry Applications Type 2 Virtualized Environment Privacy-Related IssuesDroid Applications Virtualization Environments Finding Your Private Information

Microsoft Virtualization Open Cloud Consortium Working GroupsSun xVM VirtualBox Project Matsu

line Linux/UNIX Virtualization Project CometCloud Computing Infrastructure VMware Products HPC in the CloudCloud Computing Terms Data Center and Cloud Infrastructure The Open Cloud TestbedBenefits and Limitations of Cloud Computing Products The Open Science Data CloudBenefits End-User and Desktop Products Intercloud Testbed Limitations IBM Virtualization Reporting on an Open Cloud ConsortiumCloud Computing Case Studies Using VMware to see a Virtualized Server Working Group How Companies Are Using Cloud Environment Distributed Management Task ForceComputing Permissive Federation (DMTF) Implementing Applications and Services in Verified Federation What It Is?the Cloud Encrypted Federation DMTK Working Groups Associated withUsing Your Company's Services vs. the Trusted Federation Cloud ComputingCloud Provider Using XMPP in the Federated Standards for Application Developers A Cloud Service Provider Introduced Environment ProtocolsCloud Computing Risks and Issues Presence in the Cloud Scripting LanguagesProducts and Services Provided by Cloud What It Is Content Formatting Standards andComputing Companies Presence Protocols LanguagesEconomic Leveraging Presence Standards for Security in the Cloud Staffing Presence Enabled Confidentiality, Integrity, AvailabilityShould Your Company Invest in Cloud The Future of Presence Authentication, Authorization,Computing? The Interrelation of Identity, Presence, AccountabilityWhat Should Not be Moved to the Cloud and Location in the Cloud Regulations for PrivacyLANs and the Cloud Identity Management Security ProtocolsInternet and the Cloud What It Is Establishing a Baseline for CloudWeb Services, Browsers, and the Cloud Future of Identity in the Cloud Performance Thin Client Privacy and Its Relation to Cloud-Based Best Practices for Selecting a Vendor andAdvances in Networking and Processing Information Systems Implementing Cloud-Based Applications Speeds that Led to Cloud Computing Personal Information Choosing the Right VendorNetworking Developments Privacy-Related Issues Implementing Cloud-Based Applications Increased Processing Speeds Finding Your Private Information Windows Remote DesktopManaged Service Provider Model to Cloud Open Cloud Consortium Working Groups VncComputing and Software as a Service Project Matsu Web Browsers(SaaS) Project Comet Server ExtensionsSingle Purpose Architectures Migrate to HPC in the Cloud Thin ClientsMultipurpose Architectures The Open Cloud Testbed Smart Phones, Pads, Pods, etc.Data Center Virtualization The Open Science Data Cloud Virtual Terminal Security Strengths andCollaboration Intercloud Testbed Weaknesses The Cloud as a Reach Extender Reporting on an Open Cloud Consortium StrengthsThe Cloud as a Communication Enabler Working Group Weaknesses The Cloud as an Employee Enabler Distributed Management Task Force AndroidService-Oriented Architecture (SOA) (DMTF) BlackBerryEvolving from SOA to the Cloud What It Is? Windows MobileCapacity: Limited Performance DMTK Working Groups Associated with Ubuntu Mobile Internet DeviceAvailability: Communications Failure and Cloud Computing Mobile Platform Virtualization Performance Issues Standards for Application Developers Kernel-Based Virtual MachineSecurity: Newer Security Protocols Provide Protocols VMware Mobile Virtualization PlatformMore Protection Scripting Languages Collaboration Applications for Mobile

Page 53: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

What's Next in Cloud Computing Content Formatting Standards and Platforms Independent Components Languages Text MessagingMessage Base Standards for Security in the Cloud iPhone ApplicationsLocation Independence Confidentiality, Integrity, Availability BlackBerry ApplicationsCommunication Requirements for Cloud Authentication, Authorization, Droid Applications Implementation AccountabilityPublic Internet Regulations for PrivacyPrivate Internet Security Protocols lineRouting to the Datacenter Establishing a Baseline for Cloud Cloud Computing InfrastructureSwitching within the Data Center Performance Cloud Computing TermsBandwidth Best Practices for Selecting a Vendor Benefits and Limitations of CloudTools Used to Measure Network and Implementing Cloud-Based Computing Performance Applications BenefitsUsing the Protocol Analyzer to Measure Choosing the Right Vendor LimitationsBandwidth Implementing Cloud-Based Applications Cloud Computing Case StudiesUsing Ping and Traceroute to Measure Windows Remote Desktop How Companies Are Using CloudNetwork Performance Vnc Computing Security Web Browsers Implementing Applications and Services inSSL Server Extensions the CloudVPN Thin Clients Using Your Company's Services vs. theOverhead Smart Phones, Pads, Pods, etc. Cloud ProviderStorage Options for Cloud Computing Virtual Terminal Security Strengths and A Cloud Service Provider IntroducedStorage Capacity Weaknesses Cloud Computing Risks and Issues Data Protection and Partitioning Strengths Products and Services Provided by CloudNAS Weaknesses Computing Companies SAN Android EconomicCAS BlackBerry StaffingRedundancy Windows Mobile Should Your Company Invest in CloudReplication Ubuntu Mobile Internet Device Computing? Multisiting Mobile Platform Virtualization What Should Not be Moved to the Cloud Backup and Recovery Kernel-Based Virtual Machine LANs and the Cloud Server Software Environments that Support VMware Mobile Virtualization Platform Internet and the Cloud Cloud Computing Collaboration Applications for Mobile Web Services, Browsers, and the Cloud Server Capacity Platforms Thin Client Virtualization Text Messaging Advances in Networking and ProcessingClustering iPhone Applications Speeds that Led to Cloud Computing Expansion BlackBerry Applications Networking DevelopmentsServer Functions Droid Applications Increased Processing SpeedsApplication Managed Service Provider Model to CloudWeb Computing and Software as a ServiceDatabase line (SaaS) Vendor Approaches to Cloud Computing Cloud Computing Infrastructure Single Purpose Architectures Migrate toRole of Open Source Software in Data Cloud Computing Terms Multipurpose ArchitecturesCenter Benefits and Limitations of Cloud Data Center VirtualizationCost Reduction vs. Reliability Computing Collaboration Open Source Server Software Benefits The Cloud as a Reach ExtenderOpen Source Database Software Limitations The Cloud as a Communication EnablerOpen Source Applications Software Cloud Computing Case Studies The Cloud as an Employee EnablerOpen Source System Management Software How Companies Are Using Cloud Service-Oriented Architecture (SOA) Open Source Load-Balancing Software Computing Evolving from SOA to the CloudVirtualization as the "Operating System" Implementing Applications and Services Capacity: Limited PerformanceVirtualization with a Host Operating System in the Cloud Availability: Communications Failure andVirtualization Infections on Virtualized Using Your Company's Services vs. the Performance IssuesEnvironments Cloud Provider Security: Newer Security Protocols ProvideType 1 Virtualized Environment A Cloud Service Provider Introduced More ProtectionType 2 Virtualized Environment Cloud Computing Risks and Issues What's Next in Cloud Computing Virtualization Environments Products and Services Provided by Cloud Independent ComponentsMicrosoft Virtualization Computing Companies Message BaseSun xVM VirtualBox Economic Location IndependenceLinux/UNIX Virtualization Staffing Communication Requirements for CloudVMware Products Should Your Company Invest in Cloud Implementation Data Center and Cloud Infrastructure Computing? Public InternetProducts What Should Not be Moved to the Cloud Private InternetEnd-User and Desktop Products LANs and the Cloud Routing to the DatacenterIBM Virtualization Internet and the Cloud Switching within the Data CenterUsing VMware to see a Virtualized Server Web Services, Browsers, and the Cloud Bandwidth

Page 54: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Environment Thin Client Tools Used to Measure NetworkPermissive Federation Advances in Networking and Processing Performance Verified Federation Speeds that Led to Cloud Computing Using the Protocol Analyzer to MeasureEncrypted Federation Networking Developments Bandwidth Trusted Federation Increased Processing Speeds Using Ping and Traceroute to MeasureUsing XMPP in the Federated Environment Managed Service Provider Model to Network Performance Presence in the Cloud Cloud Computing and Software as a SecurityWhat It Is Service (SaaS) SSLPresence Protocols Single Purpose Architectures Migrate to VPN Leveraging Presence Multipurpose Architectures Overhead Presence Enabled Data Center Virtualization Storage Options for Cloud Computing The Future of Presence Collaboration Storage CapacityThe Interrelation of Identity, Presence, and The Cloud as a Reach Extender Data Protection and PartitioningLocation in the Cloud The Cloud as a Communication Enabler NASIdentity Management The Cloud as an Employee Enabler SANWhat It Is Service-Oriented Architecture (SOA) CASFuture of Identity in the Cloud Evolving from SOA to the Cloud RedundancyPrivacy and Its Relation to Cloud-Based Capacity: Limited Performance ReplicationInformation Systems Availability: Communications Failure and Multisiting Personal Information Performance Issues Backup and Recovery Privacy-Related Issues Security: Newer Security Protocols Server Software Environments thatFinding Your Private Information Provide More Protection Support Cloud Computing Open Cloud Consortium Working Groups What's Next in Cloud Computing Server CapacityProject Matsu Independent Components VirtualizationProject Comet Message Base ClusteringHPC in the Cloud Location Independence ExpansionThe Open Cloud Testbed Communication Requirements for Cloud Server FunctionsThe Open Science Data Cloud Implementation ApplicationIntercloud Testbed Public Internet Web Reporting on an Open Cloud Consortium Private Internet Database Working Group Routing to the Datacenter Vendor Approaches to Cloud Computing Distributed Management Task Force Switching within the Data Center Role of Open Source Software in Data(DMTF) Bandwidth Center What It Is? Tools Used to Measure Network Cost Reduction vs. ReliabilityDMTK Working Groups Associated with Performance Open Source Server SoftwareCloud Computing Using the Protocol Analyzer to Measure Open Source Database SoftwareStandards for Application Developers Bandwidth Open Source Applications SoftwareProtocols Using Ping and Traceroute to Measure Open Source System ManagementScripting Languages Network Performance SoftwareContent Formatting Standards and Security Open Source Load-Balancing Software Languages SSL Virtualization as the "Operating System"Standards for Security in the Cloud VPN Virtualization with a Host OperatingConfidentiality, Integrity, Availability Overhead SystemAuthentication, Authorization, Accountability Storage Options for Cloud Computing Virtualization Infections on VirtualizedRegulations for Privacy Storage Capacity Environments Security Protocols Data Protection and Partitioning Type 1 Virtualized EnvironmentEstablishing a Baseline for Cloud NAS Type 2 Virtualized EnvironmentPerformance SAN Virtualization Environments Best Practices for Selecting a Vendor and CAS Microsoft VirtualizationImplementing Cloud-Based Applications Redundancy Sun xVM VirtualBoxChoosing the Right Vendor Replication Linux/UNIX VirtualizationImplementing Cloud-Based Applications Multisiting VMware ProductsWindows Remote Desktop Backup and Recovery Data Center and Cloud InfrastructureVnc Server Software Environments that ProductsWeb Browsers Support Cloud Computing End-User and Desktop Products Server Extensions Server Capacity IBM VirtualizationThin Clients Virtualization Using VMware to see a Virtualized ServerSmart Phones, Pads, Pods, etc. Clustering Environment Virtual Terminal Security Strengths and Expansion Permissive FederationWeaknesses Server Functions Verified FederationStrengths Application Encrypted FederationWeaknesses Web Trusted FederationAndroid Database Using XMPP in the Federated EnvironmentBlackBerry Vendor Approaches to Cloud Computing Presence in the Cloud Windows Mobile Role of Open Source Software in Data What It IsUbuntu Mobile Internet Device Center Presence Protocols

Page 55: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Mobile Platform Virtualization Cost Reduction vs. Reliability Leveraging PresenceKernel-Based Virtual Machine Open Source Server Software Presence EnabledVMware Mobile Virtualization Platform Open Source Database Software The Future of PresenceCollaboration Applications for Mobile Open Source Applications Software The Interrelation of Identity, Presence, andPlatforms Open Source System Management Location in the CloudText Messaging Software Identity Management iPhone Applications Open Source Load-Balancing Software What It IsBlackBerry Applications Virtualization as the "Operating System" Future of Identity in the CloudDroid Applications Virtualization with a Host Operating Privacy and Its Relation to Cloud-Based

System Information Systems Virtualization Infections on Virtualized Personal Information

line Environments Privacy-Related IssuesCloud Computing Infrastructure Type 1 Virtualized Environment Finding Your Private Information Cloud Computing Terms Type 2 Virtualized Environment Open Cloud Consortium Working GroupsBenefits and Limitations of Cloud Computing Virtualization Environments Project MatsuBenefits Microsoft Virtualization Project CometLimitations Sun xVM VirtualBox HPC in the CloudCloud Computing Case Studies Linux/UNIX Virtualization The Open Cloud TestbedHow Companies Are Using Cloud VMware Products The Open Science Data CloudComputing Data Center and Cloud Infrastructure Intercloud Testbed Implementing Applications and Services in Products Reporting on an Open Cloud Consortiumthe Cloud End-User and Desktop Products Working Group Using Your Company's Services vs. the IBM Virtualization Distributed Management Task ForceCloud Provider Using VMware to see a Virtualized Server (DMTF) A Cloud Service Provider Introduced Environment What It Is?Cloud Computing Risks and Issues Permissive Federation DMTK Working Groups Associated withProducts and Services Provided by Cloud Verified Federation Cloud ComputingComputing Companies Encrypted Federation Standards for Application Developers Economic Trusted Federation ProtocolsStaffing Using XMPP in the Federated Scripting LanguagesShould Your Company Invest in Cloud Environment Content Formatting Standards andComputing? Presence in the Cloud LanguagesWhat Should Not be Moved to the Cloud What It Is Standards for Security in the Cloud LANs and the Cloud Presence Protocols Confidentiality, Integrity, AvailabilityInternet and the Cloud Leveraging Presence Authentication, Authorization,Web Services, Browsers, and the Cloud Presence Enabled AccountabilityThin Client The Future of Presence Regulations for PrivacyAdvances in Networking and Processing The Interrelation of Identity, Presence, Security ProtocolsSpeeds that Led to Cloud Computing and Location in the Cloud Establishing a Baseline for CloudNetworking Developments Identity Management Performance Increased Processing Speeds What It Is Best Practices for Selecting a Vendor andManaged Service Provider Model to Cloud Future of Identity in the Cloud Implementing Cloud-Based Applications Computing and Software as a Service Privacy and Its Relation to Cloud-Based Choosing the Right Vendor(SaaS) Information Systems Implementing Cloud-Based Applications Single Purpose Architectures Migrate to Personal Information Windows Remote DesktopMultipurpose Architectures Privacy-Related Issues VncData Center Virtualization Finding Your Private Information Web BrowsersCollaboration Open Cloud Consortium Working Groups Server ExtensionsThe Cloud as a Reach Extender Project Matsu Thin ClientsThe Cloud as a Communication Enabler Project Comet Smart Phones, Pads, Pods, etc.The Cloud as an Employee Enabler HPC in the Cloud Virtual Terminal Security Strengths andService-Oriented Architecture (SOA) The Open Cloud Testbed Weaknesses Evolving from SOA to the Cloud The Open Science Data Cloud StrengthsCapacity: Limited Performance Intercloud Testbed Weaknesses Availability: Communications Failure and Reporting on an Open Cloud Consortium AndroidPerformance Issues Working Group BlackBerrySecurity: Newer Security Protocols Provide Distributed Management Task Force Windows MobileMore Protection (DMTF) Ubuntu Mobile Internet DeviceWhat's Next in Cloud Computing What It Is? Mobile Platform Virtualization Independent Components DMTK Working Groups Associated with Kernel-Based Virtual MachineMessage Base Cloud Computing VMware Mobile Virtualization PlatformLocation Independence Standards for Application Developers Collaboration Applications for MobileCommunication Requirements for Cloud Protocols Platforms Implementation Scripting Languages Text MessagingPublic Internet Content Formatting Standards and iPhone ApplicationsPrivate Internet Languages BlackBerry Applications

Page 56: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Routing to the Datacenter Standards for Security in the Cloud Droid Applications Switching within the Data Center Confidentiality, Integrity, AvailabilityBandwidth Authentication, Authorization,Tools Used to Measure Network Accountability linePerformance Regulations for Privacy Cloud Computing InfrastructureUsing the Protocol Analyzer to Measure Security Protocols Cloud Computing TermsBandwidth Establishing a Baseline for Cloud Benefits and Limitations of CloudUsing Ping and Traceroute to Measure Performance Computing Network Performance Best Practices for Selecting a Vendor BenefitsSecurity and Implementing Cloud-Based LimitationsSSL Applications Cloud Computing Case StudiesVPN Choosing the Right Vendor How Companies Are Using CloudOverhead Implementing Cloud-Based Applications Computing Storage Options for Cloud Computing Windows Remote Desktop Implementing Applications and Services inStorage Capacity Vnc the CloudData Protection and Partitioning Web Browsers Using Your Company's Services vs. theNAS Server Extensions Cloud ProviderSAN Thin Clients A Cloud Service Provider IntroducedCAS Smart Phones, Pads, Pods, etc. Cloud Computing Risks and Issues Redundancy Virtual Terminal Security Strengths and Products and Services Provided by CloudReplication Weaknesses Computing Companies Multisiting Strengths EconomicBackup and Recovery Weaknesses StaffingServer Software Environments that Support Android Should Your Company Invest in CloudCloud Computing BlackBerry Computing? Server Capacity Windows Mobile What Should Not be Moved to the Cloud Virtualization Ubuntu Mobile Internet Device LANs and the Cloud Clustering Mobile Platform Virtualization Internet and the Cloud Expansion Kernel-Based Virtual Machine Web Services, Browsers, and the Cloud Server Functions VMware Mobile Virtualization Platform Thin Client Application Collaboration Applications for Mobile Advances in Networking and ProcessingWeb Platforms Speeds that Led to Cloud Computing Database Text Messaging Networking DevelopmentsVendor Approaches to Cloud Computing iPhone Applications Increased Processing SpeedsRole of Open Source Software in Data BlackBerry Applications Managed Service Provider Model to CloudCenter Droid Applications Computing and Software as a ServiceCost Reduction vs. Reliability (SaaS) Open Source Server Software Single Purpose Architectures Migrate toOpen Source Database Software line Multipurpose ArchitecturesOpen Source Applications Software Cloud Computing Infrastructure Data Center VirtualizationOpen Source System Management Software Cloud Computing Terms Collaboration Open Source Load-Balancing Software Benefits and Limitations of Cloud The Cloud as a Reach ExtenderVirtualization as the "Operating System" Computing The Cloud as a Communication EnablerVirtualization with a Host Operating System Benefits The Cloud as an Employee EnablerVirtualization Infections on Virtualized Limitations Service-Oriented Architecture (SOA) Environments Cloud Computing Case Studies Evolving from SOA to the CloudType 1 Virtualized Environment How Companies Are Using Cloud Capacity: Limited PerformanceType 2 Virtualized Environment Computing Availability: Communications Failure andVirtualization Environments Implementing Applications and Services Performance IssuesMicrosoft Virtualization in the Cloud Security: Newer Security Protocols ProvideSun xVM VirtualBox Using Your Company's Services vs. the More ProtectionLinux/UNIX Virtualization Cloud Provider What's Next in Cloud Computing VMware Products A Cloud Service Provider Introduced Independent ComponentsData Center and Cloud Infrastructure Cloud Computing Risks and Issues Message BaseProducts Products and Services Provided by Cloud Location IndependenceEnd-User and Desktop Products Computing Companies Communication Requirements for CloudIBM Virtualization Economic Implementation Using VMware to see a Virtualized Server Staffing Public InternetEnvironment Should Your Company Invest in Cloud Private InternetPermissive Federation Computing? Routing to the DatacenterVerified Federation What Should Not be Moved to the Cloud Switching within the Data CenterEncrypted Federation LANs and the Cloud Bandwidth Trusted Federation Internet and the Cloud Tools Used to Measure NetworkUsing XMPP in the Federated Environment Web Services, Browsers, and the Cloud Performance Presence in the Cloud Thin Client Using the Protocol Analyzer to MeasureWhat It Is Advances in Networking and Processing Bandwidth

Page 57: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Presence Protocols Speeds that Led to Cloud Computing Using Ping and Traceroute to MeasureLeveraging Presence Networking Developments Network Performance Presence Enabled Increased Processing Speeds SecurityThe Future of Presence Managed Service Provider Model to SSLThe Interrelation of Identity, Presence, and Cloud Computing and Software as a VPN Location in the Cloud Service (SaaS) Overhead Identity Management Single Purpose Architectures Migrate to Storage Options for Cloud Computing What It Is Multipurpose Architectures Storage CapacityFuture of Identity in the Cloud Data Center Virtualization Data Protection and PartitioningPrivacy and Its Relation to Cloud-Based Collaboration NASInformation Systems The Cloud as a Reach Extender SANPersonal Information The Cloud as a Communication Enabler CASPrivacy-Related Issues The Cloud as an Employee Enabler RedundancyFinding Your Private Information Service-Oriented Architecture (SOA) ReplicationOpen Cloud Consortium Working Groups Evolving from SOA to the Cloud Multisiting Project Matsu Capacity: Limited Performance Backup and Recovery Project Comet Availability: Communications Failure and Server Software Environments thatHPC in the Cloud Performance Issues Support Cloud Computing The Open Cloud Testbed Security: Newer Security Protocols Server CapacityThe Open Science Data Cloud Provide More Protection VirtualizationIntercloud Testbed What's Next in Cloud Computing ClusteringReporting on an Open Cloud Consortium Independent Components ExpansionWorking Group Message Base Server FunctionsDistributed Management Task Force Location Independence Application(DMTF) Communication Requirements for Cloud Web What It Is? Implementation Database DMTK Working Groups Associated with Public Internet Vendor Approaches to Cloud Computing Cloud Computing Private Internet Role of Open Source Software in DataStandards for Application Developers Routing to the Datacenter Center Protocols Switching within the Data Center Cost Reduction vs. ReliabilityScripting Languages Bandwidth Open Source Server SoftwareContent Formatting Standards and Tools Used to Measure Network Open Source Database SoftwareLanguages Performance Open Source Applications SoftwareStandards for Security in the Cloud Using the Protocol Analyzer to Measure Open Source System ManagementConfidentiality, Integrity, Availability Bandwidth SoftwareAuthentication, Authorization, Accountability Using Ping and Traceroute to Measure Open Source Load-Balancing Software Regulations for Privacy Network Performance Virtualization as the "Operating System"Security Protocols Security Virtualization with a Host OperatingEstablishing a Baseline for Cloud SSL SystemPerformance VPN Virtualization Infections on VirtualizedBest Practices for Selecting a Vendor and Overhead Environments Implementing Cloud-Based Applications Storage Options for Cloud Computing Type 1 Virtualized EnvironmentChoosing the Right Vendor Storage Capacity Type 2 Virtualized EnvironmentImplementing Cloud-Based Applications Data Protection and Partitioning Virtualization Environments Windows Remote Desktop NAS Microsoft VirtualizationVnc SAN Sun xVM VirtualBoxWeb Browsers CAS Linux/UNIX VirtualizationServer Extensions Redundancy VMware ProductsThin Clients Replication Data Center and Cloud InfrastructureSmart Phones, Pads, Pods, etc. Multisiting ProductsVirtual Terminal Security Strengths and Backup and Recovery End-User and Desktop Products Weaknesses Server Software Environments that IBM VirtualizationStrengths Support Cloud Computing Using VMware to see a Virtualized ServerWeaknesses Server Capacity Environment Android Virtualization Permissive FederationBlackBerry Clustering Verified FederationWindows Mobile Expansion Encrypted FederationUbuntu Mobile Internet Device Server Functions Trusted FederationMobile Platform Virtualization Application Using XMPP in the Federated EnvironmentKernel-Based Virtual Machine Web Presence in the Cloud VMware Mobile Virtualization Platform Database What It IsCollaboration Applications for Mobile Vendor Approaches to Cloud Computing Presence ProtocolsPlatforms Role of Open Source Software in Data Leveraging PresenceText Messaging Center Presence EnablediPhone Applications Cost Reduction vs. Reliability The Future of PresenceBlackBerry Applications Open Source Server Software The Interrelation of Identity, Presence, and

Page 58: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Droid Applications Open Source Database Software Location in the CloudOpen Source Applications Software Identity Management Open Source System Management What It Is

line Software Future of Identity in the CloudCloud Computing Infrastructure Open Source Load-Balancing Software Privacy and Its Relation to Cloud-BasedCloud Computing Terms Virtualization as the "Operating System" Information Systems Benefits and Limitations of Cloud Computing Virtualization with a Host Operating Personal InformationBenefits System Privacy-Related IssuesLimitations Virtualization Infections on Virtualized Finding Your Private Information Cloud Computing Case Studies Environments Open Cloud Consortium Working GroupsHow Companies Are Using Cloud Type 1 Virtualized Environment Project MatsuComputing Type 2 Virtualized Environment Project CometImplementing Applications and Services in Virtualization Environments HPC in the Cloudthe Cloud Microsoft Virtualization The Open Cloud TestbedUsing Your Company's Services vs. the Sun xVM VirtualBox The Open Science Data CloudCloud Provider Linux/UNIX Virtualization Intercloud Testbed A Cloud Service Provider Introduced VMware Products Reporting on an Open Cloud ConsortiumCloud Computing Risks and Issues Data Center and Cloud Infrastructure Working Group Products and Services Provided by Cloud Products Distributed Management Task ForceComputing Companies End-User and Desktop Products (DMTF) Economic IBM Virtualization What It Is?Staffing Using VMware to see a Virtualized Server DMTK Working Groups Associated withShould Your Company Invest in Cloud Environment Cloud ComputingComputing? Permissive Federation Standards for Application Developers What Should Not be Moved to the Cloud Verified Federation ProtocolsLANs and the Cloud Encrypted Federation Scripting LanguagesInternet and the Cloud Trusted Federation Content Formatting Standards andWeb Services, Browsers, and the Cloud Using XMPP in the Federated LanguagesThin Client Environment Standards for Security in the Cloud Advances in Networking and Processing Presence in the Cloud Confidentiality, Integrity, AvailabilitySpeeds that Led to Cloud Computing What It Is Authentication, Authorization,Networking Developments Presence Protocols AccountabilityIncreased Processing Speeds Leveraging Presence Regulations for PrivacyManaged Service Provider Model to Cloud Presence Enabled Security ProtocolsComputing and Software as a Service The Future of Presence Establishing a Baseline for Cloud(SaaS) The Interrelation of Identity, Presence, Performance Single Purpose Architectures Migrate to and Location in the Cloud Best Practices for Selecting a Vendor andMultipurpose Architectures Identity Management Implementing Cloud-Based Applications Data Center Virtualization What It Is Choosing the Right VendorCollaboration Future of Identity in the Cloud Implementing Cloud-Based Applications The Cloud as a Reach Extender Privacy and Its Relation to Cloud-Based Windows Remote DesktopThe Cloud as a Communication Enabler Information Systems VncThe Cloud as an Employee Enabler Personal Information Web BrowsersService-Oriented Architecture (SOA) Privacy-Related Issues Server ExtensionsEvolving from SOA to the Cloud Finding Your Private Information Thin ClientsCapacity: Limited Performance Open Cloud Consortium Working Groups Smart Phones, Pads, Pods, etc.Availability: Communications Failure and Project Matsu Virtual Terminal Security Strengths andPerformance Issues Project Comet Weaknesses Security: Newer Security Protocols Provide HPC in the Cloud StrengthsMore Protection The Open Cloud Testbed Weaknesses What's Next in Cloud Computing The Open Science Data Cloud AndroidIndependent Components Intercloud Testbed BlackBerryMessage Base Reporting on an Open Cloud Consortium Windows MobileLocation Independence Working Group Ubuntu Mobile Internet DeviceCommunication Requirements for Cloud Distributed Management Task Force Mobile Platform Virtualization Implementation (DMTF) Kernel-Based Virtual MachinePublic Internet What It Is? VMware Mobile Virtualization PlatformPrivate Internet DMTK Working Groups Associated with Collaboration Applications for MobileRouting to the Datacenter Cloud Computing Platforms Switching within the Data Center Standards for Application Developers Text MessagingBandwidth Protocols iPhone ApplicationsTools Used to Measure Network Scripting Languages BlackBerry ApplicationsPerformance Content Formatting Standards and Droid Applications Using the Protocol Analyzer to Measure LanguagesBandwidth Standards for Security in the Cloud Using Ping and Traceroute to Measure Confidentiality, Integrity, Availability line

Page 59: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Network Performance Authentication, Authorization, Cloud Computing InfrastructureSecurity Accountability Cloud Computing TermsSSL Regulations for Privacy Benefits and Limitations of CloudVPN Security Protocols Computing Overhead Establishing a Baseline for Cloud BenefitsStorage Options for Cloud Computing Performance LimitationsStorage Capacity Best Practices for Selecting a Vendor Cloud Computing Case StudiesData Protection and Partitioning and Implementing Cloud-Based How Companies Are Using CloudNAS Applications Computing SAN Choosing the Right Vendor Implementing Applications and Services inCAS Implementing Cloud-Based Applications the CloudRedundancy Windows Remote Desktop Using Your Company's Services vs. theReplication Vnc Cloud ProviderMultisiting Web Browsers A Cloud Service Provider IntroducedBackup and Recovery Server Extensions Cloud Computing Risks and Issues Server Software Environments that Support Thin Clients Products and Services Provided by CloudCloud Computing Smart Phones, Pads, Pods, etc. Computing Companies Server Capacity Virtual Terminal Security Strengths and EconomicVirtualization Weaknesses StaffingClustering Strengths Should Your Company Invest in CloudExpansion Weaknesses Computing? Server Functions Android What Should Not be Moved to the Cloud Application BlackBerry LANs and the Cloud Web Windows Mobile Internet and the Cloud Database Ubuntu Mobile Internet Device Web Services, Browsers, and the Cloud Vendor Approaches to Cloud Computing Mobile Platform Virtualization Thin Client Role of Open Source Software in Data Kernel-Based Virtual Machine Advances in Networking and ProcessingCenter VMware Mobile Virtualization Platform Speeds that Led to Cloud Computing Cost Reduction vs. Reliability Collaboration Applications for Mobile Networking DevelopmentsOpen Source Server Software Platforms Increased Processing SpeedsOpen Source Database Software Text Messaging Managed Service Provider Model to CloudOpen Source Applications Software iPhone Applications Computing and Software as a ServiceOpen Source System Management Software BlackBerry Applications (SaaS) Open Source Load-Balancing Software Droid Applications Single Purpose Architectures Migrate toVirtualization as the "Operating System" Multipurpose ArchitecturesVirtualization with a Host Operating System Data Center VirtualizationVirtualization Infections on Virtualized line Collaboration Environments Cloud Computing Infrastructure The Cloud as a Reach ExtenderType 1 Virtualized Environment Cloud Computing Terms The Cloud as a Communication EnablerType 2 Virtualized Environment Benefits and Limitations of Cloud The Cloud as an Employee EnablerVirtualization Environments Computing Service-Oriented Architecture (SOA) Microsoft Virtualization Benefits Evolving from SOA to the CloudSun xVM VirtualBox Limitations Capacity: Limited PerformanceLinux/UNIX Virtualization Cloud Computing Case Studies Availability: Communications Failure andVMware Products How Companies Are Using Cloud Performance IssuesData Center and Cloud Infrastructure Computing Security: Newer Security Protocols ProvideProducts Implementing Applications and Services More ProtectionEnd-User and Desktop Products in the Cloud What's Next in Cloud Computing IBM Virtualization Using Your Company's Services vs. the Independent ComponentsUsing VMware to see a Virtualized Server Cloud Provider Message BaseEnvironment A Cloud Service Provider Introduced Location IndependencePermissive Federation Cloud Computing Risks and Issues Communication Requirements for CloudVerified Federation Products and Services Provided by Cloud Implementation Encrypted Federation Computing Companies Public InternetTrusted Federation Economic Private InternetUsing XMPP in the Federated Environment Staffing Routing to the DatacenterPresence in the Cloud Should Your Company Invest in Cloud Switching within the Data CenterWhat It Is Computing? Bandwidth Presence Protocols What Should Not be Moved to the Cloud Tools Used to Measure NetworkLeveraging Presence LANs and the Cloud Performance Presence Enabled Internet and the Cloud Using the Protocol Analyzer to MeasureThe Future of Presence Web Services, Browsers, and the Cloud Bandwidth The Interrelation of Identity, Presence, and Thin Client Using Ping and Traceroute to MeasureLocation in the Cloud Advances in Networking and Processing Network Performance Identity Management Speeds that Led to Cloud Computing SecurityWhat It Is Networking Developments SSL

Page 60: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Future of Identity in the Cloud Increased Processing Speeds VPN Privacy and Its Relation to Cloud-Based Managed Service Provider Model to Overhead Information Systems Cloud Computing and Software as a Storage Options for Cloud Computing Personal Information Service (SaaS) Storage CapacityPrivacy-Related Issues Single Purpose Architectures Migrate to Data Protection and PartitioningFinding Your Private Information Multipurpose Architectures NASOpen Cloud Consortium Working Groups Data Center Virtualization SANProject Matsu Collaboration CASProject Comet The Cloud as a Reach Extender RedundancyHPC in the Cloud The Cloud as a Communication Enabler ReplicationThe Open Cloud Testbed The Cloud as an Employee Enabler Multisiting The Open Science Data Cloud Service-Oriented Architecture (SOA) Backup and Recovery Intercloud Testbed Evolving from SOA to the Cloud Server Software Environments thatReporting on an Open Cloud Consortium Capacity: Limited Performance Support Cloud Computing Working Group Availability: Communications Failure and Server CapacityDistributed Management Task Force Performance Issues Virtualization(DMTF) Security: Newer Security Protocols ClusteringWhat It Is? Provide More Protection ExpansionDMTK Working Groups Associated with What's Next in Cloud Computing Server FunctionsCloud Computing Independent Components ApplicationStandards for Application Developers Message Base Web Protocols Location Independence Database Scripting Languages Communication Requirements for Cloud Vendor Approaches to Cloud Computing Content Formatting Standards and Implementation Role of Open Source Software in DataLanguages Public Internet Center Standards for Security in the Cloud Private Internet Cost Reduction vs. ReliabilityConfidentiality, Integrity, Availability Routing to the Datacenter Open Source Server SoftwareAuthentication, Authorization, Accountability Switching within the Data Center Open Source Database SoftwareRegulations for Privacy Bandwidth Open Source Applications SoftwareSecurity Protocols Tools Used to Measure Network Open Source System ManagementEstablishing a Baseline for Cloud Performance SoftwarePerformance Using the Protocol Analyzer to Measure Open Source Load-Balancing Software Best Practices for Selecting a Vendor and Bandwidth Virtualization as the "Operating System"Implementing Cloud-Based Applications Using Ping and Traceroute to Measure Virtualization with a Host OperatingChoosing the Right Vendor Network Performance SystemImplementing Cloud-Based Applications Security Virtualization Infections on VirtualizedWindows Remote Desktop SSL Environments Vnc VPN Type 1 Virtualized EnvironmentWeb Browsers Overhead Type 2 Virtualized EnvironmentServer Extensions Storage Options for Cloud Computing Virtualization Environments Thin Clients Storage Capacity Microsoft VirtualizationSmart Phones, Pads, Pods, etc. Data Protection and Partitioning Sun xVM VirtualBoxVirtual Terminal Security Strengths and NAS Linux/UNIX VirtualizationWeaknesses SAN VMware ProductsStrengths CAS Data Center and Cloud InfrastructureWeaknesses Redundancy ProductsAndroid Replication End-User and Desktop Products BlackBerry Multisiting IBM VirtualizationWindows Mobile Backup and Recovery Using VMware to see a Virtualized ServerUbuntu Mobile Internet Device Server Software Environments that Environment Mobile Platform Virtualization Support Cloud Computing Permissive FederationKernel-Based Virtual Machine Server Capacity Verified FederationVMware Mobile Virtualization Platform Virtualization Encrypted FederationCollaboration Applications for Mobile Clustering Trusted FederationPlatforms Expansion Using XMPP in the Federated EnvironmentText Messaging Server Functions Presence in the Cloud iPhone Applications Application What It IsBlackBerry Applications Web Presence ProtocolsDroid Applications Database Leveraging Presence

Vendor Approaches to Cloud Computing Presence EnabledRole of Open Source Software in Data The Future of Presence

line Center The Interrelation of Identity, Presence, andCloud Computing Infrastructure Cost Reduction vs. Reliability Location in the CloudCloud Computing Terms Open Source Server Software Identity Management Benefits and Limitations of Cloud Computing Open Source Database Software What It IsBenefits Open Source Applications Software Future of Identity in the Cloud

Page 61: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Limitations Open Source System Management Privacy and Its Relation to Cloud-BasedCloud Computing Case Studies Software Information Systems How Companies Are Using Cloud Open Source Load-Balancing Software Personal InformationComputing Virtualization as the "Operating System" Privacy-Related IssuesImplementing Applications and Services in Virtualization with a Host Operating Finding Your Private Information the Cloud System Open Cloud Consortium Working GroupsUsing Your Company's Services vs. the Virtualization Infections on Virtualized Project MatsuCloud Provider Environments Project CometA Cloud Service Provider Introduced Type 1 Virtualized Environment HPC in the CloudCloud Computing Risks and Issues Type 2 Virtualized Environment The Open Cloud TestbedProducts and Services Provided by Cloud Virtualization Environments The Open Science Data CloudComputing Companies Microsoft Virtualization Intercloud Testbed Economic Sun xVM VirtualBox Reporting on an Open Cloud ConsortiumStaffing Linux/UNIX Virtualization Working Group Should Your Company Invest in Cloud VMware Products Distributed Management Task ForceComputing? Data Center and Cloud Infrastructure (DMTF) What Should Not be Moved to the Cloud Products What It Is?LANs and the Cloud End-User and Desktop Products DMTK Working Groups Associated withInternet and the Cloud IBM Virtualization Cloud ComputingWeb Services, Browsers, and the Cloud Using VMware to see a Virtualized Server Standards for Application Developers Thin Client Environment ProtocolsAdvances in Networking and Processing Permissive Federation Scripting LanguagesSpeeds that Led to Cloud Computing Verified Federation Content Formatting Standards andNetworking Developments Encrypted Federation LanguagesIncreased Processing Speeds Trusted Federation Standards for Security in the Cloud Managed Service Provider Model to Cloud Using XMPP in the Federated Confidentiality, Integrity, AvailabilityComputing and Software as a Service Environment Authentication, Authorization,(SaaS) Presence in the Cloud AccountabilitySingle Purpose Architectures Migrate to What It Is Regulations for PrivacyMultipurpose Architectures Presence Protocols Security ProtocolsData Center Virtualization Leveraging Presence Establishing a Baseline for CloudCollaboration Presence Enabled Performance The Cloud as a Reach Extender The Future of Presence Best Practices for Selecting a Vendor andThe Cloud as a Communication Enabler The Interrelation of Identity, Presence, Implementing Cloud-Based Applications The Cloud as an Employee Enabler and Location in the Cloud Choosing the Right VendorService-Oriented Architecture (SOA) Identity Management Implementing Cloud-Based Applications Evolving from SOA to the Cloud What It Is Windows Remote DesktopCapacity: Limited Performance Future of Identity in the Cloud VncAvailability: Communications Failure and Privacy and Its Relation to Cloud-Based Web BrowsersPerformance Issues Information Systems Server ExtensionsSecurity: Newer Security Protocols Provide Personal Information Thin ClientsMore Protection Privacy-Related Issues Smart Phones, Pads, Pods, etc.What's Next in Cloud Computing Finding Your Private Information Virtual Terminal Security Strengths andIndependent Components Open Cloud Consortium Working Groups Weaknesses Message Base Project Matsu StrengthsLocation Independence Project Comet Weaknesses Communication Requirements for Cloud HPC in the Cloud AndroidImplementation The Open Cloud Testbed BlackBerryPublic Internet The Open Science Data Cloud Windows MobilePrivate Internet Intercloud Testbed Ubuntu Mobile Internet DeviceRouting to the Datacenter Reporting on an Open Cloud Consortium Mobile Platform Virtualization Switching within the Data Center Working Group Kernel-Based Virtual MachineBandwidth Distributed Management Task Force VMware Mobile Virtualization PlatformTools Used to Measure Network (DMTF) Collaboration Applications for MobilePerformance What It Is? Platforms Using the Protocol Analyzer to Measure DMTK Working Groups Associated with Text MessagingBandwidth Cloud Computing iPhone ApplicationsUsing Ping and Traceroute to Measure Standards for Application Developers BlackBerry ApplicationsNetwork Performance Protocols Droid Applications Security Scripting LanguagesSSL Content Formatting Standards and 9. End-User Access to Cloud ComputingVPN Languages lineOverhead Standards for Security in the Cloud Cloud Access Methods Available to EndStorage Options for Cloud Computing Confidentiality, Integrity, Availability Users Storage Capacity Authentication, Authorization, CitrixData Protection and Partitioning Accountability

Page 62: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

NAS Regulations for PrivacySAN Security Protocols lineCAS Establishing a Baseline for Cloud Cloud Computing InfrastructureRedundancy Performance Cloud Computing TermsReplication Best Practices for Selecting a Vendor Benefits and Limitations of CloudMultisiting and Implementing Cloud-Based Computing Backup and Recovery Applications BenefitsServer Software Environments that Support Choosing the Right Vendor LimitationsCloud Computing Implementing Cloud-Based Applications Cloud Computing Case StudiesServer Capacity Windows Remote Desktop How Companies Are Using CloudVirtualization Vnc Computing Clustering Web Browsers Implementing Applications and Services inExpansion Server Extensions the CloudServer Functions Thin Clients Using Your Company's Services vs. theApplication Smart Phones, Pads, Pods, etc. Cloud ProviderWeb Virtual Terminal Security Strengths and A Cloud Service Provider IntroducedDatabase Weaknesses Cloud Computing Risks and Issues Vendor Approaches to Cloud Computing Strengths Products and Services Provided by CloudRole of Open Source Software in Data Weaknesses Computing Companies Center Android EconomicCost Reduction vs. Reliability BlackBerry StaffingOpen Source Server Software Windows Mobile Should Your Company Invest in CloudOpen Source Database Software Ubuntu Mobile Internet Device Computing? Open Source Applications Software Mobile Platform Virtualization What Should Not be Moved to the Cloud Open Source System Management Software Kernel-Based Virtual Machine LANs and the Cloud Open Source Load-Balancing Software VMware Mobile Virtualization Platform Internet and the Cloud Virtualization as the "Operating System" Collaboration Applications for Mobile Web Services, Browsers, and the Cloud Virtualization with a Host Operating System Platforms Thin Client Virtualization Infections on Virtualized Text Messaging Advances in Networking and ProcessingEnvironments iPhone Applications Speeds that Led to Cloud Computing Type 1 Virtualized Environment BlackBerry Applications Networking DevelopmentsType 2 Virtualized Environment Droid Applications Increased Processing SpeedsVirtualization Environments Managed Service Provider Model to CloudMicrosoft Virtualization Computing and Software as a ServiceSun xVM VirtualBox line (SaaS) Linux/UNIX Virtualization Cloud Computing Infrastructure Single Purpose Architectures Migrate toVMware Products Cloud Computing Terms Multipurpose ArchitecturesData Center and Cloud Infrastructure Benefits and Limitations of Cloud Data Center VirtualizationProducts Computing Collaboration End-User and Desktop Products Benefits The Cloud as a Reach ExtenderIBM Virtualization Limitations The Cloud as a Communication EnablerUsing VMware to see a Virtualized Server Cloud Computing Case Studies The Cloud as an Employee EnablerEnvironment How Companies Are Using Cloud Service-Oriented Architecture (SOA) Permissive Federation Computing Evolving from SOA to the CloudVerified Federation Implementing Applications and Services Capacity: Limited PerformanceEncrypted Federation in the Cloud Availability: Communications Failure andTrusted Federation Using Your Company's Services vs. the Performance IssuesUsing XMPP in the Federated Environment Cloud Provider Security: Newer Security Protocols ProvidePresence in the Cloud A Cloud Service Provider Introduced More ProtectionWhat It Is Cloud Computing Risks and Issues What's Next in Cloud Computing Presence Protocols Products and Services Provided by Cloud Independent ComponentsLeveraging Presence Computing Companies Message BasePresence Enabled Economic Location IndependenceThe Future of Presence Staffing Communication Requirements for CloudThe Interrelation of Identity, Presence, and Should Your Company Invest in Cloud Implementation Location in the Cloud Computing? Public InternetIdentity Management What Should Not be Moved to the Cloud Private InternetWhat It Is LANs and the Cloud Routing to the DatacenterFuture of Identity in the Cloud Internet and the Cloud Switching within the Data CenterPrivacy and Its Relation to Cloud-Based Web Services, Browsers, and the Cloud Bandwidth Information Systems Thin Client Tools Used to Measure NetworkPersonal Information Advances in Networking and Processing Performance Privacy-Related Issues Speeds that Led to Cloud Computing Using the Protocol Analyzer to MeasureFinding Your Private Information Networking Developments Bandwidth Open Cloud Consortium Working Groups Increased Processing Speeds Using Ping and Traceroute to MeasureProject Matsu Managed Service Provider Model to Network Performance

Page 63: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Project Comet Cloud Computing and Software as a SecurityHPC in the Cloud Service (SaaS) SSLThe Open Cloud Testbed Single Purpose Architectures Migrate to VPN The Open Science Data Cloud Multipurpose Architectures Overhead Intercloud Testbed Data Center Virtualization Storage Options for Cloud Computing Reporting on an Open Cloud Consortium Collaboration Storage CapacityWorking Group The Cloud as a Reach Extender Data Protection and PartitioningDistributed Management Task Force The Cloud as a Communication Enabler NAS(DMTF) The Cloud as an Employee Enabler SANWhat It Is? Service-Oriented Architecture (SOA) CASDMTK Working Groups Associated with Evolving from SOA to the Cloud RedundancyCloud Computing Capacity: Limited Performance ReplicationStandards for Application Developers Availability: Communications Failure and Multisiting Protocols Performance Issues Backup and Recovery Scripting Languages Security: Newer Security Protocols Server Software Environments thatContent Formatting Standards and Provide More Protection Support Cloud Computing Languages What's Next in Cloud Computing Server CapacityStandards for Security in the Cloud Independent Components VirtualizationConfidentiality, Integrity, Availability Message Base ClusteringAuthentication, Authorization, Accountability Location Independence ExpansionRegulations for Privacy Communication Requirements for Cloud Server FunctionsSecurity Protocols Implementation ApplicationEstablishing a Baseline for Cloud Public Internet Web Performance Private Internet Database Best Practices for Selecting a Vendor and Routing to the Datacenter Vendor Approaches to Cloud Computing Implementing Cloud-Based Applications Switching within the Data Center Role of Open Source Software in DataChoosing the Right Vendor Bandwidth Center Implementing Cloud-Based Applications Tools Used to Measure Network Cost Reduction vs. ReliabilityWindows Remote Desktop Performance Open Source Server SoftwareVnc Using the Protocol Analyzer to Measure Open Source Database SoftwareWeb Browsers Bandwidth Open Source Applications SoftwareServer Extensions Using Ping and Traceroute to Measure Open Source System ManagementThin Clients Network Performance SoftwareSmart Phones, Pads, Pods, etc. Security Open Source Load-Balancing Software Virtual Terminal Security Strengths and SSL Virtualization as the "Operating System"Weaknesses VPN Virtualization with a Host OperatingStrengths Overhead SystemWeaknesses Storage Options for Cloud Computing Virtualization Infections on VirtualizedAndroid Storage Capacity Environments BlackBerry Data Protection and Partitioning Type 1 Virtualized EnvironmentWindows Mobile NAS Type 2 Virtualized EnvironmentUbuntu Mobile Internet Device SAN Virtualization Environments Mobile Platform Virtualization CAS Microsoft VirtualizationKernel-Based Virtual Machine Redundancy Sun xVM VirtualBoxVMware Mobile Virtualization Platform Replication Linux/UNIX VirtualizationCollaboration Applications for Mobile Multisiting VMware ProductsPlatforms Backup and Recovery Data Center and Cloud InfrastructureText Messaging Server Software Environments that ProductsiPhone Applications Support Cloud Computing End-User and Desktop Products BlackBerry Applications Server Capacity IBM VirtualizationDroid Applications Virtualization Using VMware to see a Virtualized Server

Clustering Environment Expansion Permissive Federation

line Server Functions Verified FederationCloud Computing Infrastructure Application Encrypted FederationCloud Computing Terms Web Trusted FederationBenefits and Limitations of Cloud Computing Database Using XMPP in the Federated EnvironmentBenefits Vendor Approaches to Cloud Computing Presence in the Cloud Limitations Role of Open Source Software in Data What It IsCloud Computing Case Studies Center Presence ProtocolsHow Companies Are Using Cloud Cost Reduction vs. Reliability Leveraging PresenceComputing Open Source Server Software Presence EnabledImplementing Applications and Services in Open Source Database Software The Future of Presencethe Cloud Open Source Applications Software The Interrelation of Identity, Presence, andUsing Your Company's Services vs. the Open Source System Management Location in the CloudCloud Provider Software Identity Management

Page 64: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

A Cloud Service Provider Introduced Open Source Load-Balancing Software What It IsCloud Computing Risks and Issues Virtualization as the "Operating System" Future of Identity in the CloudProducts and Services Provided by Cloud Virtualization with a Host Operating Privacy and Its Relation to Cloud-BasedComputing Companies System Information Systems Economic Virtualization Infections on Virtualized Personal InformationStaffing Environments Privacy-Related IssuesShould Your Company Invest in Cloud Type 1 Virtualized Environment Finding Your Private Information Computing? Type 2 Virtualized Environment Open Cloud Consortium Working GroupsWhat Should Not be Moved to the Cloud Virtualization Environments Project MatsuLANs and the Cloud Microsoft Virtualization Project CometInternet and the Cloud Sun xVM VirtualBox HPC in the CloudWeb Services, Browsers, and the Cloud Linux/UNIX Virtualization The Open Cloud TestbedThin Client VMware Products The Open Science Data CloudAdvances in Networking and Processing Data Center and Cloud Infrastructure Intercloud Testbed Speeds that Led to Cloud Computing Products Reporting on an Open Cloud ConsortiumNetworking Developments End-User and Desktop Products Working Group Increased Processing Speeds IBM Virtualization Distributed Management Task ForceManaged Service Provider Model to Cloud Using VMware to see a Virtualized Server (DMTF) Computing and Software as a Service Environment What It Is?(SaaS) Permissive Federation DMTK Working Groups Associated withSingle Purpose Architectures Migrate to Verified Federation Cloud ComputingMultipurpose Architectures Encrypted Federation Standards for Application Developers Data Center Virtualization Trusted Federation ProtocolsCollaboration Using XMPP in the Federated Scripting LanguagesThe Cloud as a Reach Extender Environment Content Formatting Standards andThe Cloud as a Communication Enabler Presence in the Cloud LanguagesThe Cloud as an Employee Enabler What It Is Standards for Security in the Cloud Service-Oriented Architecture (SOA) Presence Protocols Confidentiality, Integrity, AvailabilityEvolving from SOA to the Cloud Leveraging Presence Authentication, Authorization,Capacity: Limited Performance Presence Enabled AccountabilityAvailability: Communications Failure and The Future of Presence Regulations for PrivacyPerformance Issues The Interrelation of Identity, Presence, Security ProtocolsSecurity: Newer Security Protocols Provide and Location in the Cloud Establishing a Baseline for CloudMore Protection Identity Management Performance What's Next in Cloud Computing What It Is Best Practices for Selecting a Vendor andIndependent Components Future of Identity in the Cloud Implementing Cloud-Based Applications Message Base Privacy and Its Relation to Cloud-Based Choosing the Right VendorLocation Independence Information Systems Implementing Cloud-Based Applications Communication Requirements for Cloud Personal Information Windows Remote DesktopImplementation Privacy-Related Issues VncPublic Internet Finding Your Private Information Web BrowsersPrivate Internet Open Cloud Consortium Working Groups Server ExtensionsRouting to the Datacenter Project Matsu Thin ClientsSwitching within the Data Center Project Comet Smart Phones, Pads, Pods, etc.Bandwidth HPC in the Cloud Virtual Terminal Security Strengths andTools Used to Measure Network The Open Cloud Testbed Weaknesses Performance The Open Science Data Cloud StrengthsUsing the Protocol Analyzer to Measure Intercloud Testbed Weaknesses Bandwidth Reporting on an Open Cloud Consortium AndroidUsing Ping and Traceroute to Measure Working Group BlackBerryNetwork Performance Distributed Management Task Force Windows MobileSecurity (DMTF) Ubuntu Mobile Internet DeviceSSL What It Is? Mobile Platform Virtualization VPN DMTK Working Groups Associated with Kernel-Based Virtual MachineOverhead Cloud Computing VMware Mobile Virtualization PlatformStorage Options for Cloud Computing Standards for Application Developers Collaboration Applications for MobileStorage Capacity Protocols Platforms Data Protection and Partitioning Scripting Languages Text MessagingNAS Content Formatting Standards and iPhone ApplicationsSAN Languages BlackBerry ApplicationsCAS Standards for Security in the Cloud Droid Applications Redundancy Confidentiality, Integrity, AvailabilityReplication Authentication, Authorization,Multisiting Accountability lineBackup and Recovery Regulations for Privacy Cloud Computing InfrastructureServer Software Environments that Support Security Protocols Cloud Computing Terms

Page 65: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Cloud Computing Establishing a Baseline for Cloud Benefits and Limitations of CloudServer Capacity Performance Computing Virtualization Best Practices for Selecting a Vendor BenefitsClustering and Implementing Cloud-Based LimitationsExpansion Applications Cloud Computing Case StudiesServer Functions Choosing the Right Vendor How Companies Are Using CloudApplication Implementing Cloud-Based Applications Computing Web Windows Remote Desktop Implementing Applications and Services inDatabase Vnc the CloudVendor Approaches to Cloud Computing Web Browsers Using Your Company's Services vs. theRole of Open Source Software in Data Server Extensions Cloud ProviderCenter Thin Clients A Cloud Service Provider IntroducedCost Reduction vs. Reliability Smart Phones, Pads, Pods, etc. Cloud Computing Risks and Issues Open Source Server Software Virtual Terminal Security Strengths and Products and Services Provided by CloudOpen Source Database Software Weaknesses Computing Companies Open Source Applications Software Strengths EconomicOpen Source System Management Software Weaknesses StaffingOpen Source Load-Balancing Software Android Should Your Company Invest in CloudVirtualization as the "Operating System" BlackBerry Computing? Virtualization with a Host Operating System Windows Mobile What Should Not be Moved to the Cloud Virtualization Infections on Virtualized Ubuntu Mobile Internet Device LANs and the Cloud Environments Mobile Platform Virtualization Internet and the Cloud Type 1 Virtualized Environment Kernel-Based Virtual Machine Web Services, Browsers, and the Cloud Type 2 Virtualized Environment VMware Mobile Virtualization Platform Thin Client Virtualization Environments Collaboration Applications for Mobile Advances in Networking and ProcessingMicrosoft Virtualization Platforms Speeds that Led to Cloud Computing Sun xVM VirtualBox Text Messaging Networking DevelopmentsLinux/UNIX Virtualization iPhone Applications Increased Processing SpeedsVMware Products BlackBerry Applications Managed Service Provider Model to CloudData Center and Cloud Infrastructure Droid Applications Computing and Software as a ServiceProducts (SaaS) End-User and Desktop Products Single Purpose Architectures Migrate toIBM Virtualization line Multipurpose ArchitecturesUsing VMware to see a Virtualized Server Cloud Computing Infrastructure Data Center VirtualizationEnvironment Cloud Computing Terms Collaboration Permissive Federation Benefits and Limitations of Cloud The Cloud as a Reach ExtenderVerified Federation Computing The Cloud as a Communication EnablerEncrypted Federation Benefits The Cloud as an Employee EnablerTrusted Federation Limitations Service-Oriented Architecture (SOA) Using XMPP in the Federated Environment Cloud Computing Case Studies Evolving from SOA to the CloudPresence in the Cloud How Companies Are Using Cloud Capacity: Limited PerformanceWhat It Is Computing Availability: Communications Failure andPresence Protocols Implementing Applications and Services Performance IssuesLeveraging Presence in the Cloud Security: Newer Security Protocols ProvidePresence Enabled Using Your Company's Services vs. the More ProtectionThe Future of Presence Cloud Provider What's Next in Cloud Computing The Interrelation of Identity, Presence, and A Cloud Service Provider Introduced Independent ComponentsLocation in the Cloud Cloud Computing Risks and Issues Message BaseIdentity Management Products and Services Provided by Cloud Location IndependenceWhat It Is Computing Companies Communication Requirements for CloudFuture of Identity in the Cloud Economic Implementation Privacy and Its Relation to Cloud-Based Staffing Public InternetInformation Systems Should Your Company Invest in Cloud Private InternetPersonal Information Computing? Routing to the DatacenterPrivacy-Related Issues What Should Not be Moved to the Cloud Switching within the Data CenterFinding Your Private Information LANs and the Cloud Bandwidth Open Cloud Consortium Working Groups Internet and the Cloud Tools Used to Measure NetworkProject Matsu Web Services, Browsers, and the Cloud Performance Project Comet Thin Client Using the Protocol Analyzer to MeasureHPC in the Cloud Advances in Networking and Processing Bandwidth The Open Cloud Testbed Speeds that Led to Cloud Computing Using Ping and Traceroute to MeasureThe Open Science Data Cloud Networking Developments Network Performance Intercloud Testbed Increased Processing Speeds SecurityReporting on an Open Cloud Consortium Managed Service Provider Model to SSLWorking Group Cloud Computing and Software as a VPN Distributed Management Task Force Service (SaaS) Overhead

Page 66: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

(DMTF) Single Purpose Architectures Migrate to Storage Options for Cloud Computing What It Is? Multipurpose Architectures Storage CapacityDMTK Working Groups Associated with Data Center Virtualization Data Protection and PartitioningCloud Computing Collaboration NASStandards for Application Developers The Cloud as a Reach Extender SANProtocols The Cloud as a Communication Enabler CASScripting Languages The Cloud as an Employee Enabler RedundancyContent Formatting Standards and Service-Oriented Architecture (SOA) ReplicationLanguages Evolving from SOA to the Cloud Multisiting Standards for Security in the Cloud Capacity: Limited Performance Backup and Recovery Confidentiality, Integrity, Availability Availability: Communications Failure and Server Software Environments thatAuthentication, Authorization, Accountability Performance Issues Support Cloud Computing Regulations for Privacy Security: Newer Security Protocols Server CapacitySecurity Protocols Provide More Protection VirtualizationEstablishing a Baseline for Cloud What's Next in Cloud Computing ClusteringPerformance Independent Components ExpansionBest Practices for Selecting a Vendor and Message Base Server FunctionsImplementing Cloud-Based Applications Location Independence ApplicationChoosing the Right Vendor Communication Requirements for Cloud Web Implementing Cloud-Based Applications Implementation Database Windows Remote Desktop Public Internet Vendor Approaches to Cloud Computing Vnc Private Internet Role of Open Source Software in DataWeb Browsers Routing to the Datacenter Center Server Extensions Switching within the Data Center Cost Reduction vs. ReliabilityThin Clients Bandwidth Open Source Server SoftwareSmart Phones, Pads, Pods, etc. Tools Used to Measure Network Open Source Database SoftwareVirtual Terminal Security Strengths and Performance Open Source Applications SoftwareWeaknesses Using the Protocol Analyzer to Measure Open Source System ManagementStrengths Bandwidth SoftwareWeaknesses Using Ping and Traceroute to Measure Open Source Load-Balancing Software Android Network Performance Virtualization as the "Operating System"BlackBerry Security Virtualization with a Host OperatingWindows Mobile SSL SystemUbuntu Mobile Internet Device VPN Virtualization Infections on VirtualizedMobile Platform Virtualization Overhead Environments Kernel-Based Virtual Machine Storage Options for Cloud Computing Type 1 Virtualized EnvironmentVMware Mobile Virtualization Platform Storage Capacity Type 2 Virtualized EnvironmentCollaboration Applications for Mobile Data Protection and Partitioning Virtualization Environments Platforms NAS Microsoft VirtualizationText Messaging SAN Sun xVM VirtualBoxiPhone Applications CAS Linux/UNIX VirtualizationBlackBerry Applications Redundancy VMware ProductsDroid Applications Replication Data Center and Cloud Infrastructure

Multisiting ProductsBackup and Recovery End-User and Desktop Products

line Server Software Environments that IBM VirtualizationCloud Computing Infrastructure Support Cloud Computing Using VMware to see a Virtualized ServerCloud Computing Terms Server Capacity Environment Benefits and Limitations of Cloud Computing Virtualization Permissive FederationBenefits Clustering Verified FederationLimitations Expansion Encrypted FederationCloud Computing Case Studies Server Functions Trusted FederationHow Companies Are Using Cloud Application Using XMPP in the Federated EnvironmentComputing Web Presence in the Cloud Implementing Applications and Services in Database What It Isthe Cloud Vendor Approaches to Cloud Computing Presence ProtocolsUsing Your Company's Services vs. the Role of Open Source Software in Data Leveraging PresenceCloud Provider Center Presence EnabledA Cloud Service Provider Introduced Cost Reduction vs. Reliability The Future of PresenceCloud Computing Risks and Issues Open Source Server Software The Interrelation of Identity, Presence, andProducts and Services Provided by Cloud Open Source Database Software Location in the CloudComputing Companies Open Source Applications Software Identity Management Economic Open Source System Management What It IsStaffing Software Future of Identity in the CloudShould Your Company Invest in Cloud Open Source Load-Balancing Software Privacy and Its Relation to Cloud-BasedComputing? Virtualization as the "Operating System" Information Systems

Page 67: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

What Should Not be Moved to the Cloud Virtualization with a Host Operating Personal InformationLANs and the Cloud System Privacy-Related IssuesInternet and the Cloud Virtualization Infections on Virtualized Finding Your Private Information Web Services, Browsers, and the Cloud Environments Open Cloud Consortium Working GroupsThin Client Type 1 Virtualized Environment Project MatsuAdvances in Networking and Processing Type 2 Virtualized Environment Project CometSpeeds that Led to Cloud Computing Virtualization Environments HPC in the CloudNetworking Developments Microsoft Virtualization The Open Cloud TestbedIncreased Processing Speeds Sun xVM VirtualBox The Open Science Data CloudManaged Service Provider Model to Cloud Linux/UNIX Virtualization Intercloud Testbed Computing and Software as a Service VMware Products Reporting on an Open Cloud Consortium(SaaS) Data Center and Cloud Infrastructure Working Group Single Purpose Architectures Migrate to Products Distributed Management Task ForceMultipurpose Architectures End-User and Desktop Products (DMTF) Data Center Virtualization IBM Virtualization What It Is?Collaboration Using VMware to see a Virtualized Server DMTK Working Groups Associated withThe Cloud as a Reach Extender Environment Cloud ComputingThe Cloud as a Communication Enabler Permissive Federation Standards for Application Developers The Cloud as an Employee Enabler Verified Federation ProtocolsService-Oriented Architecture (SOA) Encrypted Federation Scripting LanguagesEvolving from SOA to the Cloud Trusted Federation Content Formatting Standards andCapacity: Limited Performance Using XMPP in the Federated LanguagesAvailability: Communications Failure and Environment Standards for Security in the Cloud Performance Issues Presence in the Cloud Confidentiality, Integrity, AvailabilitySecurity: Newer Security Protocols Provide What It Is Authentication, Authorization,More Protection Presence Protocols AccountabilityWhat's Next in Cloud Computing Leveraging Presence Regulations for PrivacyIndependent Components Presence Enabled Security ProtocolsMessage Base The Future of Presence Establishing a Baseline for CloudLocation Independence The Interrelation of Identity, Presence, Performance Communication Requirements for Cloud and Location in the Cloud Best Practices for Selecting a Vendor andImplementation Identity Management Implementing Cloud-Based Applications Public Internet What It Is Choosing the Right VendorPrivate Internet Future of Identity in the Cloud Implementing Cloud-Based Applications Routing to the Datacenter Privacy and Its Relation to Cloud-Based Windows Remote DesktopSwitching within the Data Center Information Systems VncBandwidth Personal Information Web BrowsersTools Used to Measure Network Privacy-Related Issues Server ExtensionsPerformance Finding Your Private Information Thin ClientsUsing the Protocol Analyzer to Measure Open Cloud Consortium Working Groups Smart Phones, Pads, Pods, etc.Bandwidth Project Matsu Virtual Terminal Security Strengths andUsing Ping and Traceroute to Measure Project Comet Weaknesses Network Performance HPC in the Cloud StrengthsSecurity The Open Cloud Testbed Weaknesses SSL The Open Science Data Cloud AndroidVPN Intercloud Testbed BlackBerryOverhead Reporting on an Open Cloud Consortium Windows MobileStorage Options for Cloud Computing Working Group Ubuntu Mobile Internet DeviceStorage Capacity Distributed Management Task Force Mobile Platform Virtualization Data Protection and Partitioning (DMTF) Kernel-Based Virtual MachineNAS What It Is? VMware Mobile Virtualization PlatformSAN DMTK Working Groups Associated with Collaboration Applications for MobileCAS Cloud Computing Platforms Redundancy Standards for Application Developers Text MessagingReplication Protocols iPhone ApplicationsMultisiting Scripting Languages BlackBerry ApplicationsBackup and Recovery Content Formatting Standards and Droid Applications Server Software Environments that Support LanguagesCloud Computing Standards for Security in the Cloud Server Capacity Confidentiality, Integrity, Availability lineVirtualization Authentication, Authorization, Cloud Computing InfrastructureClustering Accountability Cloud Computing TermsExpansion Regulations for Privacy Benefits and Limitations of CloudServer Functions Security Protocols Computing Application Establishing a Baseline for Cloud BenefitsWeb Performance Limitations

Page 68: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Database Best Practices for Selecting a Vendor Cloud Computing Case StudiesVendor Approaches to Cloud Computing and Implementing Cloud-Based How Companies Are Using CloudRole of Open Source Software in Data Applications Computing Center Choosing the Right Vendor Implementing Applications and Services inCost Reduction vs. Reliability Implementing Cloud-Based Applications the CloudOpen Source Server Software Windows Remote Desktop Using Your Company's Services vs. theOpen Source Database Software Vnc Cloud ProviderOpen Source Applications Software Web Browsers A Cloud Service Provider IntroducedOpen Source System Management Software Server Extensions Cloud Computing Risks and Issues Open Source Load-Balancing Software Thin Clients Products and Services Provided by CloudVirtualization as the "Operating System" Smart Phones, Pads, Pods, etc. Computing Companies Virtualization with a Host Operating System Virtual Terminal Security Strengths and EconomicVirtualization Infections on Virtualized Weaknesses StaffingEnvironments Strengths Should Your Company Invest in CloudType 1 Virtualized Environment Weaknesses Computing? Type 2 Virtualized Environment Android What Should Not be Moved to the Cloud Virtualization Environments BlackBerry LANs and the Cloud Microsoft Virtualization Windows Mobile Internet and the Cloud Sun xVM VirtualBox Ubuntu Mobile Internet Device Web Services, Browsers, and the Cloud Linux/UNIX Virtualization Mobile Platform Virtualization Thin Client VMware Products Kernel-Based Virtual Machine Advances in Networking and ProcessingData Center and Cloud Infrastructure VMware Mobile Virtualization Platform Speeds that Led to Cloud Computing Products Collaboration Applications for Mobile Networking DevelopmentsEnd-User and Desktop Products Platforms Increased Processing SpeedsIBM Virtualization Text Messaging Managed Service Provider Model to CloudUsing VMware to see a Virtualized Server iPhone Applications Computing and Software as a ServiceEnvironment BlackBerry Applications (SaaS) Permissive Federation Droid Applications Single Purpose Architectures Migrate toVerified Federation Multipurpose ArchitecturesEncrypted Federation Data Center VirtualizationTrusted Federation line Collaboration Using XMPP in the Federated Environment Cloud Computing Infrastructure The Cloud as a Reach ExtenderPresence in the Cloud Cloud Computing Terms The Cloud as a Communication EnablerWhat It Is Benefits and Limitations of Cloud The Cloud as an Employee EnablerPresence Protocols Computing Service-Oriented Architecture (SOA) Leveraging Presence Benefits Evolving from SOA to the CloudPresence Enabled Limitations Capacity: Limited PerformanceThe Future of Presence Cloud Computing Case Studies Availability: Communications Failure andThe Interrelation of Identity, Presence, and How Companies Are Using Cloud Performance IssuesLocation in the Cloud Computing Security: Newer Security Protocols ProvideIdentity Management Implementing Applications and Services More ProtectionWhat It Is in the Cloud What's Next in Cloud Computing Future of Identity in the Cloud Using Your Company's Services vs. the Independent ComponentsPrivacy and Its Relation to Cloud-Based Cloud Provider Message BaseInformation Systems A Cloud Service Provider Introduced Location IndependencePersonal Information Cloud Computing Risks and Issues Communication Requirements for CloudPrivacy-Related Issues Products and Services Provided by Cloud Implementation Finding Your Private Information Computing Companies Public InternetOpen Cloud Consortium Working Groups Economic Private InternetProject Matsu Staffing Routing to the DatacenterProject Comet Should Your Company Invest in Cloud Switching within the Data CenterHPC in the Cloud Computing? Bandwidth The Open Cloud Testbed What Should Not be Moved to the Cloud Tools Used to Measure NetworkThe Open Science Data Cloud LANs and the Cloud Performance Intercloud Testbed Internet and the Cloud Using the Protocol Analyzer to MeasureReporting on an Open Cloud Consortium Web Services, Browsers, and the Cloud Bandwidth Working Group Thin Client Using Ping and Traceroute to MeasureDistributed Management Task Force Advances in Networking and Processing Network Performance (DMTF) Speeds that Led to Cloud Computing SecurityWhat It Is? Networking Developments SSLDMTK Working Groups Associated with Increased Processing Speeds VPN Cloud Computing Managed Service Provider Model to Overhead Standards for Application Developers Cloud Computing and Software as a Storage Options for Cloud Computing Protocols Service (SaaS) Storage CapacityScripting Languages Single Purpose Architectures Migrate to Data Protection and PartitioningContent Formatting Standards and Multipurpose Architectures NAS

Page 69: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Languages Data Center Virtualization SANStandards for Security in the Cloud Collaboration CASConfidentiality, Integrity, Availability The Cloud as a Reach Extender RedundancyAuthentication, Authorization, Accountability The Cloud as a Communication Enabler ReplicationRegulations for Privacy The Cloud as an Employee Enabler Multisiting Security Protocols Service-Oriented Architecture (SOA) Backup and Recovery Establishing a Baseline for Cloud Evolving from SOA to the Cloud Server Software Environments thatPerformance Capacity: Limited Performance Support Cloud Computing Best Practices for Selecting a Vendor and Availability: Communications Failure and Server CapacityImplementing Cloud-Based Applications Performance Issues VirtualizationChoosing the Right Vendor Security: Newer Security Protocols ClusteringImplementing Cloud-Based Applications Provide More Protection ExpansionWindows Remote Desktop What's Next in Cloud Computing Server FunctionsVnc Independent Components ApplicationWeb Browsers Message Base Web Server Extensions Location Independence Database Thin Clients Communication Requirements for Cloud Vendor Approaches to Cloud Computing Smart Phones, Pads, Pods, etc. Implementation Role of Open Source Software in DataVirtual Terminal Security Strengths and Public Internet Center Weaknesses Private Internet Cost Reduction vs. ReliabilityStrengths Routing to the Datacenter Open Source Server SoftwareWeaknesses Switching within the Data Center Open Source Database SoftwareAndroid Bandwidth Open Source Applications SoftwareBlackBerry Tools Used to Measure Network Open Source System ManagementWindows Mobile Performance SoftwareUbuntu Mobile Internet Device Using the Protocol Analyzer to Measure Open Source Load-Balancing Software Mobile Platform Virtualization Bandwidth Virtualization as the "Operating System"Kernel-Based Virtual Machine Using Ping and Traceroute to Measure Virtualization with a Host OperatingVMware Mobile Virtualization Platform Network Performance SystemCollaboration Applications for Mobile Security Virtualization Infections on VirtualizedPlatforms SSL Environments Text Messaging VPN Type 1 Virtualized EnvironmentiPhone Applications Overhead Type 2 Virtualized EnvironmentBlackBerry Applications Storage Options for Cloud Computing Virtualization Environments Droid Applications Storage Capacity Microsoft Virtualization

Data Protection and Partitioning Sun xVM VirtualBoxNAS Linux/UNIX Virtualization

line SAN VMware ProductsCloud Computing Infrastructure CAS Data Center and Cloud InfrastructureCloud Computing Terms Redundancy ProductsBenefits and Limitations of Cloud Computing Replication End-User and Desktop Products Benefits Multisiting IBM VirtualizationLimitations Backup and Recovery Using VMware to see a Virtualized ServerCloud Computing Case Studies Server Software Environments that Environment How Companies Are Using Cloud Support Cloud Computing Permissive FederationComputing Server Capacity Verified FederationImplementing Applications and Services in Virtualization Encrypted Federationthe Cloud Clustering Trusted FederationUsing Your Company's Services vs. the Expansion Using XMPP in the Federated EnvironmentCloud Provider Server Functions Presence in the Cloud A Cloud Service Provider Introduced Application What It IsCloud Computing Risks and Issues Web Presence ProtocolsProducts and Services Provided by Cloud Database Leveraging PresenceComputing Companies Vendor Approaches to Cloud Computing Presence EnabledEconomic Role of Open Source Software in Data The Future of PresenceStaffing Center The Interrelation of Identity, Presence, andShould Your Company Invest in Cloud Cost Reduction vs. Reliability Location in the CloudComputing? Open Source Server Software Identity Management What Should Not be Moved to the Cloud Open Source Database Software What It IsLANs and the Cloud Open Source Applications Software Future of Identity in the CloudInternet and the Cloud Open Source System Management Privacy and Its Relation to Cloud-BasedWeb Services, Browsers, and the Cloud Software Information Systems Thin Client Open Source Load-Balancing Software Personal InformationAdvances in Networking and Processing Virtualization as the "Operating System" Privacy-Related IssuesSpeeds that Led to Cloud Computing Virtualization with a Host Operating Finding Your Private Information Networking Developments System Open Cloud Consortium Working Groups

Page 70: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Increased Processing Speeds Virtualization Infections on Virtualized Project MatsuManaged Service Provider Model to Cloud Environments Project CometComputing and Software as a Service Type 1 Virtualized Environment HPC in the Cloud(SaaS) Type 2 Virtualized Environment The Open Cloud TestbedSingle Purpose Architectures Migrate to Virtualization Environments The Open Science Data CloudMultipurpose Architectures Microsoft Virtualization Intercloud Testbed Data Center Virtualization Sun xVM VirtualBox Reporting on an Open Cloud ConsortiumCollaboration Linux/UNIX Virtualization Working Group The Cloud as a Reach Extender VMware Products Distributed Management Task ForceThe Cloud as a Communication Enabler Data Center and Cloud Infrastructure (DMTF) The Cloud as an Employee Enabler Products What It Is?Service-Oriented Architecture (SOA) End-User and Desktop Products DMTK Working Groups Associated withEvolving from SOA to the Cloud IBM Virtualization Cloud ComputingCapacity: Limited Performance Using VMware to see a Virtualized Server Standards for Application Developers Availability: Communications Failure and Environment ProtocolsPerformance Issues Permissive Federation Scripting LanguagesSecurity: Newer Security Protocols Provide Verified Federation Content Formatting Standards andMore Protection Encrypted Federation LanguagesWhat's Next in Cloud Computing Trusted Federation Standards for Security in the Cloud Independent Components Using XMPP in the Federated Confidentiality, Integrity, AvailabilityMessage Base Environment Authentication, Authorization,Location Independence Presence in the Cloud AccountabilityCommunication Requirements for Cloud What It Is Regulations for PrivacyImplementation Presence Protocols Security ProtocolsPublic Internet Leveraging Presence Establishing a Baseline for CloudPrivate Internet Presence Enabled Performance Routing to the Datacenter The Future of Presence Best Practices for Selecting a Vendor andSwitching within the Data Center The Interrelation of Identity, Presence, Implementing Cloud-Based Applications Bandwidth and Location in the Cloud Choosing the Right VendorTools Used to Measure Network Identity Management Implementing Cloud-Based Applications Performance What It Is Windows Remote DesktopUsing the Protocol Analyzer to Measure Future of Identity in the Cloud VncBandwidth Privacy and Its Relation to Cloud-Based Web BrowsersUsing Ping and Traceroute to Measure Information Systems Server ExtensionsNetwork Performance Personal Information Thin ClientsSecurity Privacy-Related Issues Smart Phones, Pads, Pods, etc.SSL Finding Your Private Information Virtual Terminal Security Strengths andVPN Open Cloud Consortium Working Groups Weaknesses Overhead Project Matsu StrengthsStorage Options for Cloud Computing Project Comet Weaknesses Storage Capacity HPC in the Cloud AndroidData Protection and Partitioning The Open Cloud Testbed BlackBerryNAS The Open Science Data Cloud Windows MobileSAN Intercloud Testbed Ubuntu Mobile Internet DeviceCAS Reporting on an Open Cloud Consortium Mobile Platform Virtualization Redundancy Working Group Kernel-Based Virtual MachineReplication Distributed Management Task Force VMware Mobile Virtualization PlatformMultisiting (DMTF) Collaboration Applications for MobileBackup and Recovery What It Is? Platforms Server Software Environments that Support DMTK Working Groups Associated with Text MessagingCloud Computing Cloud Computing iPhone ApplicationsServer Capacity Standards for Application Developers BlackBerry ApplicationsVirtualization Protocols Droid Applications Clustering Scripting LanguagesExpansion Content Formatting Standards andServer Functions Languages lineApplication Standards for Security in the Cloud Cloud Computing InfrastructureWeb Confidentiality, Integrity, Availability Cloud Computing TermsDatabase Authentication, Authorization, Benefits and Limitations of CloudVendor Approaches to Cloud Computing Accountability Computing Role of Open Source Software in Data Regulations for Privacy BenefitsCenter Security Protocols LimitationsCost Reduction vs. Reliability Establishing a Baseline for Cloud Cloud Computing Case StudiesOpen Source Server Software Performance How Companies Are Using CloudOpen Source Database Software Best Practices for Selecting a Vendor Computing Open Source Applications Software and Implementing Cloud-Based Implementing Applications and Services in

Page 71: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Open Source System Management Software Applications the CloudOpen Source Load-Balancing Software Choosing the Right Vendor Using Your Company's Services vs. theVirtualization as the "Operating System" Implementing Cloud-Based Applications Cloud ProviderVirtualization with a Host Operating System Windows Remote Desktop A Cloud Service Provider IntroducedVirtualization Infections on Virtualized Vnc Cloud Computing Risks and Issues Environments Web Browsers Products and Services Provided by CloudType 1 Virtualized Environment Server Extensions Computing Companies Type 2 Virtualized Environment Thin Clients EconomicVirtualization Environments Smart Phones, Pads, Pods, etc. StaffingMicrosoft Virtualization Virtual Terminal Security Strengths and Should Your Company Invest in CloudSun xVM VirtualBox Weaknesses Computing? Linux/UNIX Virtualization Strengths What Should Not be Moved to the Cloud VMware Products Weaknesses LANs and the Cloud Data Center and Cloud Infrastructure Android Internet and the Cloud Products BlackBerry Web Services, Browsers, and the Cloud End-User and Desktop Products Windows Mobile Thin Client IBM Virtualization Ubuntu Mobile Internet Device Advances in Networking and ProcessingUsing VMware to see a Virtualized Server Mobile Platform Virtualization Speeds that Led to Cloud Computing Environment Kernel-Based Virtual Machine Networking DevelopmentsPermissive Federation VMware Mobile Virtualization Platform Increased Processing SpeedsVerified Federation Collaboration Applications for Mobile Managed Service Provider Model to CloudEncrypted Federation Platforms Computing and Software as a ServiceTrusted Federation Text Messaging (SaaS) Using XMPP in the Federated Environment iPhone Applications Single Purpose Architectures Migrate toPresence in the Cloud BlackBerry Applications Multipurpose ArchitecturesWhat It Is Droid Applications Data Center VirtualizationPresence Protocols Collaboration Leveraging Presence The Cloud as a Reach ExtenderPresence Enabled line The Cloud as a Communication EnablerThe Future of Presence Cloud Computing Infrastructure The Cloud as an Employee EnablerThe Interrelation of Identity, Presence, and Cloud Computing Terms Service-Oriented Architecture (SOA) Location in the Cloud Benefits and Limitations of Cloud Evolving from SOA to the CloudIdentity Management Computing Capacity: Limited PerformanceWhat It Is Benefits Availability: Communications Failure andFuture of Identity in the Cloud Limitations Performance IssuesPrivacy and Its Relation to Cloud-Based Cloud Computing Case Studies Security: Newer Security Protocols ProvideInformation Systems How Companies Are Using Cloud More ProtectionPersonal Information Computing What's Next in Cloud Computing Privacy-Related Issues Implementing Applications and Services Independent ComponentsFinding Your Private Information in the Cloud Message BaseOpen Cloud Consortium Working Groups Using Your Company's Services vs. the Location IndependenceProject Matsu Cloud Provider Communication Requirements for CloudProject Comet A Cloud Service Provider Introduced Implementation HPC in the Cloud Cloud Computing Risks and Issues Public InternetThe Open Cloud Testbed Products and Services Provided by Cloud Private InternetThe Open Science Data Cloud Computing Companies Routing to the DatacenterIntercloud Testbed Economic Switching within the Data CenterReporting on an Open Cloud Consortium Staffing Bandwidth Working Group Should Your Company Invest in Cloud Tools Used to Measure NetworkDistributed Management Task Force Computing? Performance (DMTF) What Should Not be Moved to the Cloud Using the Protocol Analyzer to MeasureWhat It Is? LANs and the Cloud Bandwidth DMTK Working Groups Associated with Internet and the Cloud Using Ping and Traceroute to MeasureCloud Computing Web Services, Browsers, and the Cloud Network Performance Standards for Application Developers Thin Client SecurityProtocols Advances in Networking and Processing SSLScripting Languages Speeds that Led to Cloud Computing VPN Content Formatting Standards and Networking Developments Overhead Languages Increased Processing Speeds Storage Options for Cloud Computing Standards for Security in the Cloud Managed Service Provider Model to Storage CapacityConfidentiality, Integrity, Availability Cloud Computing and Software as a Data Protection and PartitioningAuthentication, Authorization, Accountability Service (SaaS) NASRegulations for Privacy Single Purpose Architectures Migrate to SANSecurity Protocols Multipurpose Architectures CASEstablishing a Baseline for Cloud Data Center Virtualization RedundancyPerformance Collaboration Replication

Page 72: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Best Practices for Selecting a Vendor and The Cloud as a Reach Extender Multisiting Implementing Cloud-Based Applications The Cloud as a Communication Enabler Backup and Recovery Choosing the Right Vendor The Cloud as an Employee Enabler Server Software Environments thatImplementing Cloud-Based Applications Service-Oriented Architecture (SOA) Support Cloud Computing Windows Remote Desktop Evolving from SOA to the Cloud Server CapacityVnc Capacity: Limited Performance VirtualizationWeb Browsers Availability: Communications Failure and ClusteringServer Extensions Performance Issues ExpansionThin Clients Security: Newer Security Protocols Server FunctionsSmart Phones, Pads, Pods, etc. Provide More Protection ApplicationVirtual Terminal Security Strengths and What's Next in Cloud Computing Web Weaknesses Independent Components Database Strengths Message Base Vendor Approaches to Cloud Computing Weaknesses Location Independence Role of Open Source Software in DataAndroid Communication Requirements for Cloud Center BlackBerry Implementation Cost Reduction vs. ReliabilityWindows Mobile Public Internet Open Source Server SoftwareUbuntu Mobile Internet Device Private Internet Open Source Database SoftwareMobile Platform Virtualization Routing to the Datacenter Open Source Applications SoftwareKernel-Based Virtual Machine Switching within the Data Center Open Source System ManagementVMware Mobile Virtualization Platform Bandwidth SoftwareCollaboration Applications for Mobile Tools Used to Measure Network Open Source Load-Balancing Software Platforms Performance Virtualization as the "Operating System"Text Messaging Using the Protocol Analyzer to Measure Virtualization with a Host OperatingiPhone Applications Bandwidth SystemBlackBerry Applications Using Ping and Traceroute to Measure Virtualization Infections on VirtualizedDroid Applications Network Performance Environments

Security Type 1 Virtualized EnvironmentSSL Type 2 Virtualized Environment

line VPN Virtualization Environments Cloud Computing Infrastructure Overhead Microsoft VirtualizationCloud Computing Terms Storage Options for Cloud Computing Sun xVM VirtualBoxBenefits and Limitations of Cloud Computing Storage Capacity Linux/UNIX VirtualizationBenefits Data Protection and Partitioning VMware ProductsLimitations NAS Data Center and Cloud InfrastructureCloud Computing Case Studies SAN ProductsHow Companies Are Using Cloud CAS End-User and Desktop Products Computing Redundancy IBM VirtualizationImplementing Applications and Services in Replication Using VMware to see a Virtualized Serverthe Cloud Multisiting Environment Using Your Company's Services vs. the Backup and Recovery Permissive FederationCloud Provider Server Software Environments that Verified FederationA Cloud Service Provider Introduced Support Cloud Computing Encrypted FederationCloud Computing Risks and Issues Server Capacity Trusted FederationProducts and Services Provided by Cloud Virtualization Using XMPP in the Federated EnvironmentComputing Companies Clustering Presence in the Cloud Economic Expansion What It IsStaffing Server Functions Presence ProtocolsShould Your Company Invest in Cloud Application Leveraging PresenceComputing? Web Presence EnabledWhat Should Not be Moved to the Cloud Database The Future of PresenceLANs and the Cloud Vendor Approaches to Cloud Computing The Interrelation of Identity, Presence, andInternet and the Cloud Role of Open Source Software in Data Location in the CloudWeb Services, Browsers, and the Cloud Center Identity Management Thin Client Cost Reduction vs. Reliability What It IsAdvances in Networking and Processing Open Source Server Software Future of Identity in the CloudSpeeds that Led to Cloud Computing Open Source Database Software Privacy and Its Relation to Cloud-BasedNetworking Developments Open Source Applications Software Information Systems Increased Processing Speeds Open Source System Management Personal InformationManaged Service Provider Model to Cloud Software Privacy-Related IssuesComputing and Software as a Service Open Source Load-Balancing Software Finding Your Private Information (SaaS) Virtualization as the "Operating System" Open Cloud Consortium Working GroupsSingle Purpose Architectures Migrate to Virtualization with a Host Operating Project MatsuMultipurpose Architectures System Project CometData Center Virtualization Virtualization Infections on Virtualized HPC in the CloudCollaboration Environments The Open Cloud Testbed

Page 73: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Cloud as a Reach Extender Type 1 Virtualized Environment The Open Science Data CloudThe Cloud as a Communication Enabler Type 2 Virtualized Environment Intercloud Testbed The Cloud as an Employee Enabler Virtualization Environments Reporting on an Open Cloud ConsortiumService-Oriented Architecture (SOA) Microsoft Virtualization Working Group Evolving from SOA to the Cloud Sun xVM VirtualBox Distributed Management Task ForceCapacity: Limited Performance Linux/UNIX Virtualization (DMTF) Availability: Communications Failure and VMware Products What It Is?Performance Issues Data Center and Cloud Infrastructure DMTK Working Groups Associated withSecurity: Newer Security Protocols Provide Products Cloud ComputingMore Protection End-User and Desktop Products Standards for Application Developers What's Next in Cloud Computing IBM Virtualization ProtocolsIndependent Components Using VMware to see a Virtualized Server Scripting LanguagesMessage Base Environment Content Formatting Standards andLocation Independence Permissive Federation LanguagesCommunication Requirements for Cloud Verified Federation Standards for Security in the Cloud Implementation Encrypted Federation Confidentiality, Integrity, AvailabilityPublic Internet Trusted Federation Authentication, Authorization,Private Internet Using XMPP in the Federated AccountabilityRouting to the Datacenter Environment Regulations for PrivacySwitching within the Data Center Presence in the Cloud Security ProtocolsBandwidth What It Is Establishing a Baseline for CloudTools Used to Measure Network Presence Protocols Performance Performance Leveraging Presence Best Practices for Selecting a Vendor andUsing the Protocol Analyzer to Measure Presence Enabled Implementing Cloud-Based Applications Bandwidth The Future of Presence Choosing the Right VendorUsing Ping and Traceroute to Measure The Interrelation of Identity, Presence, Implementing Cloud-Based Applications Network Performance and Location in the Cloud Windows Remote DesktopSecurity Identity Management VncSSL What It Is Web BrowsersVPN Future of Identity in the Cloud Server ExtensionsOverhead Privacy and Its Relation to Cloud-Based Thin ClientsStorage Options for Cloud Computing Information Systems Smart Phones, Pads, Pods, etc.Storage Capacity Personal Information Virtual Terminal Security Strengths andData Protection and Partitioning Privacy-Related Issues Weaknesses NAS Finding Your Private Information StrengthsSAN Open Cloud Consortium Working Groups Weaknesses CAS Project Matsu AndroidRedundancy Project Comet BlackBerryReplication HPC in the Cloud Windows MobileMultisiting The Open Cloud Testbed Ubuntu Mobile Internet DeviceBackup and Recovery The Open Science Data Cloud Mobile Platform Virtualization Server Software Environments that Support Intercloud Testbed Kernel-Based Virtual MachineCloud Computing Reporting on an Open Cloud Consortium VMware Mobile Virtualization PlatformServer Capacity Working Group Collaboration Applications for MobileVirtualization Distributed Management Task Force Platforms Clustering (DMTF) Text MessagingExpansion What It Is? iPhone ApplicationsServer Functions DMTK Working Groups Associated with BlackBerry ApplicationsApplication Cloud Computing Droid Applications Web Standards for Application Developers Database ProtocolsVendor Approaches to Cloud Computing Scripting Languages lineRole of Open Source Software in Data Content Formatting Standards and Cloud Computing InfrastructureCenter Languages Cloud Computing TermsCost Reduction vs. Reliability Standards for Security in the Cloud Benefits and Limitations of CloudOpen Source Server Software Confidentiality, Integrity, Availability Computing Open Source Database Software Authentication, Authorization, BenefitsOpen Source Applications Software Accountability LimitationsOpen Source System Management Software Regulations for Privacy Cloud Computing Case StudiesOpen Source Load-Balancing Software Security Protocols How Companies Are Using CloudVirtualization as the "Operating System" Establishing a Baseline for Cloud Computing Virtualization with a Host Operating System Performance Implementing Applications and Services inVirtualization Infections on Virtualized Best Practices for Selecting a Vendor the CloudEnvironments and Implementing Cloud-Based Using Your Company's Services vs. theType 1 Virtualized Environment Applications Cloud ProviderType 2 Virtualized Environment Choosing the Right Vendor A Cloud Service Provider Introduced

Page 74: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtualization Environments Implementing Cloud-Based Applications Cloud Computing Risks and Issues Microsoft Virtualization Windows Remote Desktop Products and Services Provided by CloudSun xVM VirtualBox Vnc Computing Companies Linux/UNIX Virtualization Web Browsers EconomicVMware Products Server Extensions StaffingData Center and Cloud Infrastructure Thin Clients Should Your Company Invest in CloudProducts Smart Phones, Pads, Pods, etc. Computing? End-User and Desktop Products Virtual Terminal Security Strengths and What Should Not be Moved to the Cloud IBM Virtualization Weaknesses LANs and the Cloud Using VMware to see a Virtualized Server Strengths Internet and the Cloud Environment Weaknesses Web Services, Browsers, and the Cloud Permissive Federation Android Thin Client Verified Federation BlackBerry Advances in Networking and ProcessingEncrypted Federation Windows Mobile Speeds that Led to Cloud Computing Trusted Federation Ubuntu Mobile Internet Device Networking DevelopmentsUsing XMPP in the Federated Environment Mobile Platform Virtualization Increased Processing SpeedsPresence in the Cloud Kernel-Based Virtual Machine Managed Service Provider Model to CloudWhat It Is VMware Mobile Virtualization Platform Computing and Software as a ServicePresence Protocols Collaboration Applications for Mobile (SaaS) Leveraging Presence Platforms Single Purpose Architectures Migrate toPresence Enabled Text Messaging Multipurpose ArchitecturesThe Future of Presence iPhone Applications Data Center VirtualizationThe Interrelation of Identity, Presence, and BlackBerry Applications Collaboration Location in the Cloud Droid Applications The Cloud as a Reach ExtenderIdentity Management The Cloud as a Communication EnablerWhat It Is The Cloud as an Employee EnablerFuture of Identity in the Cloud line Service-Oriented Architecture (SOA) Privacy and Its Relation to Cloud-Based Cloud Computing Infrastructure Evolving from SOA to the CloudInformation Systems Cloud Computing Terms Capacity: Limited PerformancePersonal Information Benefits and Limitations of Cloud Availability: Communications Failure andPrivacy-Related Issues Computing Performance IssuesFinding Your Private Information Benefits Security: Newer Security Protocols ProvideOpen Cloud Consortium Working Groups Limitations More ProtectionProject Matsu Cloud Computing Case Studies What's Next in Cloud Computing Project Comet How Companies Are Using Cloud Independent ComponentsHPC in the Cloud Computing Message BaseThe Open Cloud Testbed Implementing Applications and Services Location IndependenceThe Open Science Data Cloud in the Cloud Communication Requirements for CloudIntercloud Testbed Using Your Company's Services vs. the Implementation Reporting on an Open Cloud Consortium Cloud Provider Public InternetWorking Group A Cloud Service Provider Introduced Private InternetDistributed Management Task Force Cloud Computing Risks and Issues Routing to the Datacenter(DMTF) Products and Services Provided by Cloud Switching within the Data CenterWhat It Is? Computing Companies Bandwidth DMTK Working Groups Associated with Economic Tools Used to Measure NetworkCloud Computing Staffing Performance Standards for Application Developers Should Your Company Invest in Cloud Using the Protocol Analyzer to MeasureProtocols Computing? Bandwidth Scripting Languages What Should Not be Moved to the Cloud Using Ping and Traceroute to MeasureContent Formatting Standards and LANs and the Cloud Network Performance Languages Internet and the Cloud SecurityStandards for Security in the Cloud Web Services, Browsers, and the Cloud SSLConfidentiality, Integrity, Availability Thin Client VPN Authentication, Authorization, Accountability Advances in Networking and Processing Overhead Regulations for Privacy Speeds that Led to Cloud Computing Storage Options for Cloud Computing Security Protocols Networking Developments Storage CapacityEstablishing a Baseline for Cloud Increased Processing Speeds Data Protection and PartitioningPerformance Managed Service Provider Model to NASBest Practices for Selecting a Vendor and Cloud Computing and Software as a SANImplementing Cloud-Based Applications Service (SaaS) CASChoosing the Right Vendor Single Purpose Architectures Migrate to RedundancyImplementing Cloud-Based Applications Multipurpose Architectures ReplicationWindows Remote Desktop Data Center Virtualization Multisiting Vnc Collaboration Backup and Recovery Web Browsers The Cloud as a Reach Extender Server Software Environments thatServer Extensions The Cloud as a Communication Enabler Support Cloud Computing

Page 75: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Thin Clients The Cloud as an Employee Enabler Server CapacitySmart Phones, Pads, Pods, etc. Service-Oriented Architecture (SOA) VirtualizationVirtual Terminal Security Strengths and Evolving from SOA to the Cloud ClusteringWeaknesses Capacity: Limited Performance ExpansionStrengths Availability: Communications Failure and Server FunctionsWeaknesses Performance Issues ApplicationAndroid Security: Newer Security Protocols Web BlackBerry Provide More Protection Database Windows Mobile What's Next in Cloud Computing Vendor Approaches to Cloud Computing Ubuntu Mobile Internet Device Independent Components Role of Open Source Software in DataMobile Platform Virtualization Message Base Center Kernel-Based Virtual Machine Location Independence Cost Reduction vs. ReliabilityVMware Mobile Virtualization Platform Communication Requirements for Cloud Open Source Server SoftwareCollaboration Applications for Mobile Implementation Open Source Database SoftwarePlatforms Public Internet Open Source Applications SoftwareText Messaging Private Internet Open Source System ManagementiPhone Applications Routing to the Datacenter SoftwareBlackBerry Applications Switching within the Data Center Open Source Load-Balancing Software Droid Applications Bandwidth Virtualization as the "Operating System"

Tools Used to Measure Network Virtualization with a Host Operating5. Building Cloud Networks Performance Systemline Using the Protocol Analyzer to Measure Virtualization Infections on Virtualized

Designing and Implementing a Data Bandwidth Environments Center-Based Cloud Using Ping and Traceroute to Measure Type 1 Virtualized EnvironmentUsing Industry and International Standards Network Performance Type 2 Virtualized Environment

Security Virtualization Environments SSL Microsoft Virtualization

line VPN Sun xVM VirtualBoxCloud Computing Infrastructure Overhead Linux/UNIX VirtualizationCloud Computing Terms Storage Options for Cloud Computing VMware ProductsBenefits and Limitations of Cloud Computing Storage Capacity Data Center and Cloud InfrastructureBenefits Data Protection and Partitioning ProductsLimitations NAS End-User and Desktop Products Cloud Computing Case Studies SAN IBM VirtualizationHow Companies Are Using Cloud CAS Using VMware to see a Virtualized ServerComputing Redundancy Environment Implementing Applications and Services in Replication Permissive Federationthe Cloud Multisiting Verified FederationUsing Your Company's Services vs. the Backup and Recovery Encrypted FederationCloud Provider Server Software Environments that Trusted FederationA Cloud Service Provider Introduced Support Cloud Computing Using XMPP in the Federated EnvironmentCloud Computing Risks and Issues Server Capacity Presence in the Cloud Products and Services Provided by Cloud Virtualization What It IsComputing Companies Clustering Presence ProtocolsEconomic Expansion Leveraging PresenceStaffing Server Functions Presence EnabledShould Your Company Invest in Cloud Application The Future of PresenceComputing? Web The Interrelation of Identity, Presence, andWhat Should Not be Moved to the Cloud Database Location in the CloudLANs and the Cloud Vendor Approaches to Cloud Computing Identity Management Internet and the Cloud Role of Open Source Software in Data What It IsWeb Services, Browsers, and the Cloud Center Future of Identity in the CloudThin Client Cost Reduction vs. Reliability Privacy and Its Relation to Cloud-BasedAdvances in Networking and Processing Open Source Server Software Information Systems Speeds that Led to Cloud Computing Open Source Database Software Personal InformationNetworking Developments Open Source Applications Software Privacy-Related IssuesIncreased Processing Speeds Open Source System Management Finding Your Private Information Managed Service Provider Model to Cloud Software Open Cloud Consortium Working GroupsComputing and Software as a Service Open Source Load-Balancing Software Project Matsu(SaaS) Virtualization as the "Operating System" Project CometSingle Purpose Architectures Migrate to Virtualization with a Host Operating HPC in the CloudMultipurpose Architectures System The Open Cloud TestbedData Center Virtualization Virtualization Infections on Virtualized The Open Science Data CloudCollaboration Environments Intercloud Testbed The Cloud as a Reach Extender Type 1 Virtualized Environment Reporting on an Open Cloud ConsortiumThe Cloud as a Communication Enabler Type 2 Virtualized Environment Working Group

Page 76: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Cloud as an Employee Enabler Virtualization Environments Distributed Management Task ForceService-Oriented Architecture (SOA) Microsoft Virtualization (DMTF) Evolving from SOA to the Cloud Sun xVM VirtualBox What It Is?Capacity: Limited Performance Linux/UNIX Virtualization DMTK Working Groups Associated withAvailability: Communications Failure and VMware Products Cloud ComputingPerformance Issues Data Center and Cloud Infrastructure Standards for Application Developers Security: Newer Security Protocols Provide Products ProtocolsMore Protection End-User and Desktop Products Scripting LanguagesWhat's Next in Cloud Computing IBM Virtualization Content Formatting Standards andIndependent Components Using VMware to see a Virtualized Server LanguagesMessage Base Environment Standards for Security in the Cloud Location Independence Permissive Federation Confidentiality, Integrity, AvailabilityCommunication Requirements for Cloud Verified Federation Authentication, Authorization,Implementation Encrypted Federation AccountabilityPublic Internet Trusted Federation Regulations for PrivacyPrivate Internet Using XMPP in the Federated Security ProtocolsRouting to the Datacenter Environment Establishing a Baseline for CloudSwitching within the Data Center Presence in the Cloud Performance Bandwidth What It Is Best Practices for Selecting a Vendor andTools Used to Measure Network Presence Protocols Implementing Cloud-Based Applications Performance Leveraging Presence Choosing the Right VendorUsing the Protocol Analyzer to Measure Presence Enabled Implementing Cloud-Based Applications Bandwidth The Future of Presence Windows Remote DesktopUsing Ping and Traceroute to Measure The Interrelation of Identity, Presence, VncNetwork Performance and Location in the Cloud Web BrowsersSecurity Identity Management Server ExtensionsSSL What It Is Thin ClientsVPN Future of Identity in the Cloud Smart Phones, Pads, Pods, etc.Overhead Privacy and Its Relation to Cloud-Based Virtual Terminal Security Strengths andStorage Options for Cloud Computing Information Systems Weaknesses Storage Capacity Personal Information StrengthsData Protection and Partitioning Privacy-Related Issues Weaknesses NAS Finding Your Private Information AndroidSAN Open Cloud Consortium Working Groups BlackBerryCAS Project Matsu Windows MobileRedundancy Project Comet Ubuntu Mobile Internet DeviceReplication HPC in the Cloud Mobile Platform Virtualization Multisiting The Open Cloud Testbed Kernel-Based Virtual MachineBackup and Recovery The Open Science Data Cloud VMware Mobile Virtualization PlatformServer Software Environments that Support Intercloud Testbed Collaboration Applications for MobileCloud Computing Reporting on an Open Cloud Consortium Platforms Server Capacity Working Group Text MessagingVirtualization Distributed Management Task Force iPhone ApplicationsClustering (DMTF) BlackBerry ApplicationsExpansion What It Is? Droid Applications Server Functions DMTK Working Groups Associated withApplication Cloud ComputingWeb Standards for Application Developers lineDatabase Protocols Cloud Computing InfrastructureVendor Approaches to Cloud Computing Scripting Languages Cloud Computing TermsRole of Open Source Software in Data Content Formatting Standards and Benefits and Limitations of CloudCenter Languages Computing Cost Reduction vs. Reliability Standards for Security in the Cloud BenefitsOpen Source Server Software Confidentiality, Integrity, Availability LimitationsOpen Source Database Software Authentication, Authorization, Cloud Computing Case StudiesOpen Source Applications Software Accountability How Companies Are Using CloudOpen Source System Management Software Regulations for Privacy Computing Open Source Load-Balancing Software Security Protocols Implementing Applications and Services inVirtualization as the "Operating System" Establishing a Baseline for Cloud the CloudVirtualization with a Host Operating System Performance Using Your Company's Services vs. theVirtualization Infections on Virtualized Best Practices for Selecting a Vendor Cloud ProviderEnvironments and Implementing Cloud-Based A Cloud Service Provider IntroducedType 1 Virtualized Environment Applications Cloud Computing Risks and Issues Type 2 Virtualized Environment Choosing the Right Vendor Products and Services Provided by CloudVirtualization Environments Implementing Cloud-Based Applications Computing Companies Microsoft Virtualization Windows Remote Desktop Economic

Page 77: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Sun xVM VirtualBox Vnc StaffingLinux/UNIX Virtualization Web Browsers Should Your Company Invest in CloudVMware Products Server Extensions Computing? Data Center and Cloud Infrastructure Thin Clients What Should Not be Moved to the Cloud Products Smart Phones, Pads, Pods, etc. LANs and the Cloud End-User and Desktop Products Virtual Terminal Security Strengths and Internet and the Cloud IBM Virtualization Weaknesses Web Services, Browsers, and the Cloud Using VMware to see a Virtualized Server Strengths Thin Client Environment Weaknesses Advances in Networking and ProcessingPermissive Federation Android Speeds that Led to Cloud Computing Verified Federation BlackBerry Networking DevelopmentsEncrypted Federation Windows Mobile Increased Processing SpeedsTrusted Federation Ubuntu Mobile Internet Device Managed Service Provider Model to CloudUsing XMPP in the Federated Environment Mobile Platform Virtualization Computing and Software as a ServicePresence in the Cloud Kernel-Based Virtual Machine (SaaS) What It Is VMware Mobile Virtualization Platform Single Purpose Architectures Migrate toPresence Protocols Collaboration Applications for Mobile Multipurpose ArchitecturesLeveraging Presence Platforms Data Center VirtualizationPresence Enabled Text Messaging Collaboration The Future of Presence iPhone Applications The Cloud as a Reach ExtenderThe Interrelation of Identity, Presence, and BlackBerry Applications The Cloud as a Communication EnablerLocation in the Cloud Droid Applications The Cloud as an Employee EnablerIdentity Management Service-Oriented Architecture (SOA) What It Is Evolving from SOA to the CloudFuture of Identity in the Cloud line Capacity: Limited PerformancePrivacy and Its Relation to Cloud-Based Cloud Computing Infrastructure Availability: Communications Failure andInformation Systems Cloud Computing Terms Performance IssuesPersonal Information Benefits and Limitations of Cloud Security: Newer Security Protocols ProvidePrivacy-Related Issues Computing More ProtectionFinding Your Private Information Benefits What's Next in Cloud Computing Open Cloud Consortium Working Groups Limitations Independent ComponentsProject Matsu Cloud Computing Case Studies Message BaseProject Comet How Companies Are Using Cloud Location IndependenceHPC in the Cloud Computing Communication Requirements for CloudThe Open Cloud Testbed Implementing Applications and Services Implementation The Open Science Data Cloud in the Cloud Public InternetIntercloud Testbed Using Your Company's Services vs. the Private InternetReporting on an Open Cloud Consortium Cloud Provider Routing to the DatacenterWorking Group A Cloud Service Provider Introduced Switching within the Data CenterDistributed Management Task Force Cloud Computing Risks and Issues Bandwidth (DMTF) Products and Services Provided by Cloud Tools Used to Measure NetworkWhat It Is? Computing Companies Performance DMTK Working Groups Associated with Economic Using the Protocol Analyzer to MeasureCloud Computing Staffing Bandwidth Standards for Application Developers Should Your Company Invest in Cloud Using Ping and Traceroute to MeasureProtocols Computing? Network Performance Scripting Languages What Should Not be Moved to the Cloud SecurityContent Formatting Standards and LANs and the Cloud SSLLanguages Internet and the Cloud VPN Standards for Security in the Cloud Web Services, Browsers, and the Cloud Overhead Confidentiality, Integrity, Availability Thin Client Storage Options for Cloud Computing Authentication, Authorization, Accountability Advances in Networking and Processing Storage CapacityRegulations for Privacy Speeds that Led to Cloud Computing Data Protection and PartitioningSecurity Protocols Networking Developments NASEstablishing a Baseline for Cloud Increased Processing Speeds SANPerformance Managed Service Provider Model to CASBest Practices for Selecting a Vendor and Cloud Computing and Software as a RedundancyImplementing Cloud-Based Applications Service (SaaS) ReplicationChoosing the Right Vendor Single Purpose Architectures Migrate to Multisiting Implementing Cloud-Based Applications Multipurpose Architectures Backup and Recovery Windows Remote Desktop Data Center Virtualization Server Software Environments thatVnc Collaboration Support Cloud Computing Web Browsers The Cloud as a Reach Extender Server CapacityServer Extensions The Cloud as a Communication Enabler VirtualizationThin Clients The Cloud as an Employee Enabler ClusteringSmart Phones, Pads, Pods, etc. Service-Oriented Architecture (SOA) Expansion

Page 78: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtual Terminal Security Strengths and Evolving from SOA to the Cloud Server FunctionsWeaknesses Capacity: Limited Performance ApplicationStrengths Availability: Communications Failure and Web Weaknesses Performance Issues Database Android Security: Newer Security Protocols Vendor Approaches to Cloud Computing BlackBerry Provide More Protection Role of Open Source Software in DataWindows Mobile What's Next in Cloud Computing Center Ubuntu Mobile Internet Device Independent Components Cost Reduction vs. ReliabilityMobile Platform Virtualization Message Base Open Source Server SoftwareKernel-Based Virtual Machine Location Independence Open Source Database SoftwareVMware Mobile Virtualization Platform Communication Requirements for Cloud Open Source Applications SoftwareCollaboration Applications for Mobile Implementation Open Source System ManagementPlatforms Public Internet SoftwareText Messaging Private Internet Open Source Load-Balancing Software iPhone Applications Routing to the Datacenter Virtualization as the "Operating System"BlackBerry Applications Switching within the Data Center Virtualization with a Host OperatingDroid Applications Bandwidth System

Tools Used to Measure Network Virtualization Infections on VirtualizedPerformance Environments

line Using the Protocol Analyzer to Measure Type 1 Virtualized EnvironmentCloud Computing Infrastructure Bandwidth Type 2 Virtualized EnvironmentCloud Computing Terms Using Ping and Traceroute to Measure Virtualization Environments Benefits and Limitations of Cloud Computing Network Performance Microsoft VirtualizationBenefits Security Sun xVM VirtualBoxLimitations SSL Linux/UNIX VirtualizationCloud Computing Case Studies VPN VMware ProductsHow Companies Are Using Cloud Overhead Data Center and Cloud InfrastructureComputing Storage Options for Cloud Computing ProductsImplementing Applications and Services in Storage Capacity End-User and Desktop Products the Cloud Data Protection and Partitioning IBM VirtualizationUsing Your Company's Services vs. the NAS Using VMware to see a Virtualized ServerCloud Provider SAN Environment A Cloud Service Provider Introduced CAS Permissive FederationCloud Computing Risks and Issues Redundancy Verified FederationProducts and Services Provided by Cloud Replication Encrypted FederationComputing Companies Multisiting Trusted FederationEconomic Backup and Recovery Using XMPP in the Federated EnvironmentStaffing Server Software Environments that Presence in the Cloud Should Your Company Invest in Cloud Support Cloud Computing What It IsComputing? Server Capacity Presence ProtocolsWhat Should Not be Moved to the Cloud Virtualization Leveraging PresenceLANs and the Cloud Clustering Presence EnabledInternet and the Cloud Expansion The Future of PresenceWeb Services, Browsers, and the Cloud Server Functions The Interrelation of Identity, Presence, andThin Client Application Location in the CloudAdvances in Networking and Processing Web Identity Management Speeds that Led to Cloud Computing Database What It IsNetworking Developments Vendor Approaches to Cloud Computing Future of Identity in the CloudIncreased Processing Speeds Role of Open Source Software in Data Privacy and Its Relation to Cloud-BasedManaged Service Provider Model to Cloud Center Information Systems Computing and Software as a Service Cost Reduction vs. Reliability Personal Information(SaaS) Open Source Server Software Privacy-Related IssuesSingle Purpose Architectures Migrate to Open Source Database Software Finding Your Private Information Multipurpose Architectures Open Source Applications Software Open Cloud Consortium Working GroupsData Center Virtualization Open Source System Management Project MatsuCollaboration Software Project CometThe Cloud as a Reach Extender Open Source Load-Balancing Software HPC in the CloudThe Cloud as a Communication Enabler Virtualization as the "Operating System" The Open Cloud TestbedThe Cloud as an Employee Enabler Virtualization with a Host Operating The Open Science Data CloudService-Oriented Architecture (SOA) System Intercloud Testbed Evolving from SOA to the Cloud Virtualization Infections on Virtualized Reporting on an Open Cloud ConsortiumCapacity: Limited Performance Environments Working Group Availability: Communications Failure and Type 1 Virtualized Environment Distributed Management Task ForcePerformance Issues Type 2 Virtualized Environment (DMTF) Security: Newer Security Protocols Provide Virtualization Environments What It Is?More Protection Microsoft Virtualization DMTK Working Groups Associated with

Page 79: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

What's Next in Cloud Computing Sun xVM VirtualBox Cloud ComputingIndependent Components Linux/UNIX Virtualization Standards for Application Developers Message Base VMware Products ProtocolsLocation Independence Data Center and Cloud Infrastructure Scripting LanguagesCommunication Requirements for Cloud Products Content Formatting Standards andImplementation End-User and Desktop Products LanguagesPublic Internet IBM Virtualization Standards for Security in the Cloud Private Internet Using VMware to see a Virtualized Server Confidentiality, Integrity, AvailabilityRouting to the Datacenter Environment Authentication, Authorization,Switching within the Data Center Permissive Federation AccountabilityBandwidth Verified Federation Regulations for PrivacyTools Used to Measure Network Encrypted Federation Security ProtocolsPerformance Trusted Federation Establishing a Baseline for CloudUsing the Protocol Analyzer to Measure Using XMPP in the Federated Performance Bandwidth Environment Best Practices for Selecting a Vendor andUsing Ping and Traceroute to Measure Presence in the Cloud Implementing Cloud-Based Applications Network Performance What It Is Choosing the Right VendorSecurity Presence Protocols Implementing Cloud-Based Applications SSL Leveraging Presence Windows Remote DesktopVPN Presence Enabled VncOverhead The Future of Presence Web BrowsersStorage Options for Cloud Computing The Interrelation of Identity, Presence, Server ExtensionsStorage Capacity and Location in the Cloud Thin ClientsData Protection and Partitioning Identity Management Smart Phones, Pads, Pods, etc.NAS What It Is Virtual Terminal Security Strengths andSAN Future of Identity in the Cloud Weaknesses CAS Privacy and Its Relation to Cloud-Based StrengthsRedundancy Information Systems Weaknesses Replication Personal Information AndroidMultisiting Privacy-Related Issues BlackBerryBackup and Recovery Finding Your Private Information Windows MobileServer Software Environments that Support Open Cloud Consortium Working Groups Ubuntu Mobile Internet DeviceCloud Computing Project Matsu Mobile Platform Virtualization Server Capacity Project Comet Kernel-Based Virtual MachineVirtualization HPC in the Cloud VMware Mobile Virtualization PlatformClustering The Open Cloud Testbed Collaboration Applications for MobileExpansion The Open Science Data Cloud Platforms Server Functions Intercloud Testbed Text MessagingApplication Reporting on an Open Cloud Consortium iPhone ApplicationsWeb Working Group BlackBerry ApplicationsDatabase Distributed Management Task Force Droid Applications Vendor Approaches to Cloud Computing (DMTF) Role of Open Source Software in Data What It Is?Center DMTK Working Groups Associated with lineCost Reduction vs. Reliability Cloud Computing Cloud Computing InfrastructureOpen Source Server Software Standards for Application Developers Cloud Computing TermsOpen Source Database Software Protocols Benefits and Limitations of CloudOpen Source Applications Software Scripting Languages Computing Open Source System Management Software Content Formatting Standards and BenefitsOpen Source Load-Balancing Software Languages LimitationsVirtualization as the "Operating System" Standards for Security in the Cloud Cloud Computing Case StudiesVirtualization with a Host Operating System Confidentiality, Integrity, Availability How Companies Are Using CloudVirtualization Infections on Virtualized Authentication, Authorization, Computing Environments Accountability Implementing Applications and Services inType 1 Virtualized Environment Regulations for Privacy the CloudType 2 Virtualized Environment Security Protocols Using Your Company's Services vs. theVirtualization Environments Establishing a Baseline for Cloud Cloud ProviderMicrosoft Virtualization Performance A Cloud Service Provider IntroducedSun xVM VirtualBox Best Practices for Selecting a Vendor Cloud Computing Risks and Issues Linux/UNIX Virtualization and Implementing Cloud-Based Products and Services Provided by CloudVMware Products Applications Computing Companies Data Center and Cloud Infrastructure Choosing the Right Vendor EconomicProducts Implementing Cloud-Based Applications StaffingEnd-User and Desktop Products Windows Remote Desktop Should Your Company Invest in CloudIBM Virtualization Vnc Computing? Using VMware to see a Virtualized Server Web Browsers What Should Not be Moved to the Cloud

Page 80: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Environment Server Extensions LANs and the Cloud Permissive Federation Thin Clients Internet and the Cloud Verified Federation Smart Phones, Pads, Pods, etc. Web Services, Browsers, and the Cloud Encrypted Federation Virtual Terminal Security Strengths and Thin Client Trusted Federation Weaknesses Advances in Networking and ProcessingUsing XMPP in the Federated Environment Strengths Speeds that Led to Cloud Computing Presence in the Cloud Weaknesses Networking DevelopmentsWhat It Is Android Increased Processing SpeedsPresence Protocols BlackBerry Managed Service Provider Model to CloudLeveraging Presence Windows Mobile Computing and Software as a ServicePresence Enabled Ubuntu Mobile Internet Device (SaaS) The Future of Presence Mobile Platform Virtualization Single Purpose Architectures Migrate toThe Interrelation of Identity, Presence, and Kernel-Based Virtual Machine Multipurpose ArchitecturesLocation in the Cloud VMware Mobile Virtualization Platform Data Center VirtualizationIdentity Management Collaboration Applications for Mobile Collaboration What It Is Platforms The Cloud as a Reach ExtenderFuture of Identity in the Cloud Text Messaging The Cloud as a Communication EnablerPrivacy and Its Relation to Cloud-Based iPhone Applications The Cloud as an Employee EnablerInformation Systems BlackBerry Applications Service-Oriented Architecture (SOA) Personal Information Droid Applications Evolving from SOA to the CloudPrivacy-Related Issues Capacity: Limited PerformanceFinding Your Private Information Availability: Communications Failure andOpen Cloud Consortium Working Groups line Performance IssuesProject Matsu Cloud Computing Infrastructure Security: Newer Security Protocols ProvideProject Comet Cloud Computing Terms More ProtectionHPC in the Cloud Benefits and Limitations of Cloud What's Next in Cloud Computing The Open Cloud Testbed Computing Independent ComponentsThe Open Science Data Cloud Benefits Message BaseIntercloud Testbed Limitations Location IndependenceReporting on an Open Cloud Consortium Cloud Computing Case Studies Communication Requirements for CloudWorking Group How Companies Are Using Cloud Implementation Distributed Management Task Force Computing Public Internet(DMTF) Implementing Applications and Services Private InternetWhat It Is? in the Cloud Routing to the DatacenterDMTK Working Groups Associated with Using Your Company's Services vs. the Switching within the Data CenterCloud Computing Cloud Provider Bandwidth Standards for Application Developers A Cloud Service Provider Introduced Tools Used to Measure NetworkProtocols Cloud Computing Risks and Issues Performance Scripting Languages Products and Services Provided by Cloud Using the Protocol Analyzer to MeasureContent Formatting Standards and Computing Companies Bandwidth Languages Economic Using Ping and Traceroute to MeasureStandards for Security in the Cloud Staffing Network Performance Confidentiality, Integrity, Availability Should Your Company Invest in Cloud SecurityAuthentication, Authorization, Accountability Computing? SSLRegulations for Privacy What Should Not be Moved to the Cloud VPN Security Protocols LANs and the Cloud Overhead Establishing a Baseline for Cloud Internet and the Cloud Storage Options for Cloud Computing Performance Web Services, Browsers, and the Cloud Storage CapacityBest Practices for Selecting a Vendor and Thin Client Data Protection and PartitioningImplementing Cloud-Based Applications Advances in Networking and Processing NASChoosing the Right Vendor Speeds that Led to Cloud Computing SANImplementing Cloud-Based Applications Networking Developments CASWindows Remote Desktop Increased Processing Speeds RedundancyVnc Managed Service Provider Model to ReplicationWeb Browsers Cloud Computing and Software as a Multisiting Server Extensions Service (SaaS) Backup and Recovery Thin Clients Single Purpose Architectures Migrate to Server Software Environments thatSmart Phones, Pads, Pods, etc. Multipurpose Architectures Support Cloud Computing Virtual Terminal Security Strengths and Data Center Virtualization Server CapacityWeaknesses Collaboration VirtualizationStrengths The Cloud as a Reach Extender ClusteringWeaknesses The Cloud as a Communication Enabler ExpansionAndroid The Cloud as an Employee Enabler Server FunctionsBlackBerry Service-Oriented Architecture (SOA) ApplicationWindows Mobile Evolving from SOA to the Cloud Web Ubuntu Mobile Internet Device Capacity: Limited Performance Database

Page 81: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Mobile Platform Virtualization Availability: Communications Failure and Vendor Approaches to Cloud Computing Kernel-Based Virtual Machine Performance Issues Role of Open Source Software in DataVMware Mobile Virtualization Platform Security: Newer Security Protocols Center Collaboration Applications for Mobile Provide More Protection Cost Reduction vs. ReliabilityPlatforms What's Next in Cloud Computing Open Source Server SoftwareText Messaging Independent Components Open Source Database SoftwareiPhone Applications Message Base Open Source Applications SoftwareBlackBerry Applications Location Independence Open Source System ManagementDroid Applications Communication Requirements for Cloud Software

Implementation Open Source Load-Balancing Software Public Internet Virtualization as the "Operating System"

line Private Internet Virtualization with a Host OperatingCloud Computing Infrastructure Routing to the Datacenter SystemCloud Computing Terms Switching within the Data Center Virtualization Infections on VirtualizedBenefits and Limitations of Cloud Computing Bandwidth Environments Benefits Tools Used to Measure Network Type 1 Virtualized EnvironmentLimitations Performance Type 2 Virtualized EnvironmentCloud Computing Case Studies Using the Protocol Analyzer to Measure Virtualization Environments How Companies Are Using Cloud Bandwidth Microsoft VirtualizationComputing Using Ping and Traceroute to Measure Sun xVM VirtualBoxImplementing Applications and Services in Network Performance Linux/UNIX Virtualizationthe Cloud Security VMware ProductsUsing Your Company's Services vs. the SSL Data Center and Cloud InfrastructureCloud Provider VPN ProductsA Cloud Service Provider Introduced Overhead End-User and Desktop Products Cloud Computing Risks and Issues Storage Options for Cloud Computing IBM VirtualizationProducts and Services Provided by Cloud Storage Capacity Using VMware to see a Virtualized ServerComputing Companies Data Protection and Partitioning Environment Economic NAS Permissive FederationStaffing SAN Verified FederationShould Your Company Invest in Cloud CAS Encrypted FederationComputing? Redundancy Trusted FederationWhat Should Not be Moved to the Cloud Replication Using XMPP in the Federated EnvironmentLANs and the Cloud Multisiting Presence in the Cloud Internet and the Cloud Backup and Recovery What It IsWeb Services, Browsers, and the Cloud Server Software Environments that Presence ProtocolsThin Client Support Cloud Computing Leveraging PresenceAdvances in Networking and Processing Server Capacity Presence EnabledSpeeds that Led to Cloud Computing Virtualization The Future of PresenceNetworking Developments Clustering The Interrelation of Identity, Presence, andIncreased Processing Speeds Expansion Location in the CloudManaged Service Provider Model to Cloud Server Functions Identity Management Computing and Software as a Service Application What It Is(SaaS) Web Future of Identity in the CloudSingle Purpose Architectures Migrate to Database Privacy and Its Relation to Cloud-BasedMultipurpose Architectures Vendor Approaches to Cloud Computing Information Systems Data Center Virtualization Role of Open Source Software in Data Personal InformationCollaboration Center Privacy-Related IssuesThe Cloud as a Reach Extender Cost Reduction vs. Reliability Finding Your Private Information The Cloud as a Communication Enabler Open Source Server Software Open Cloud Consortium Working GroupsThe Cloud as an Employee Enabler Open Source Database Software Project MatsuService-Oriented Architecture (SOA) Open Source Applications Software Project CometEvolving from SOA to the Cloud Open Source System Management HPC in the CloudCapacity: Limited Performance Software The Open Cloud TestbedAvailability: Communications Failure and Open Source Load-Balancing Software The Open Science Data CloudPerformance Issues Virtualization as the "Operating System" Intercloud Testbed Security: Newer Security Protocols Provide Virtualization with a Host Operating Reporting on an Open Cloud ConsortiumMore Protection System Working Group What's Next in Cloud Computing Virtualization Infections on Virtualized Distributed Management Task ForceIndependent Components Environments (DMTF) Message Base Type 1 Virtualized Environment What It Is?Location Independence Type 2 Virtualized Environment DMTK Working Groups Associated withCommunication Requirements for Cloud Virtualization Environments Cloud ComputingImplementation Microsoft Virtualization Standards for Application Developers Public Internet Sun xVM VirtualBox ProtocolsPrivate Internet Linux/UNIX Virtualization Scripting Languages

Page 82: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Routing to the Datacenter VMware Products Content Formatting Standards andSwitching within the Data Center Data Center and Cloud Infrastructure LanguagesBandwidth Products Standards for Security in the Cloud Tools Used to Measure Network End-User and Desktop Products Confidentiality, Integrity, AvailabilityPerformance IBM Virtualization Authentication, Authorization,Using the Protocol Analyzer to Measure Using VMware to see a Virtualized Server AccountabilityBandwidth Environment Regulations for PrivacyUsing Ping and Traceroute to Measure Permissive Federation Security ProtocolsNetwork Performance Verified Federation Establishing a Baseline for CloudSecurity Encrypted Federation Performance SSL Trusted Federation Best Practices for Selecting a Vendor andVPN Using XMPP in the Federated Implementing Cloud-Based Applications Overhead Environment Choosing the Right VendorStorage Options for Cloud Computing Presence in the Cloud Implementing Cloud-Based Applications Storage Capacity What It Is Windows Remote DesktopData Protection and Partitioning Presence Protocols VncNAS Leveraging Presence Web BrowsersSAN Presence Enabled Server ExtensionsCAS The Future of Presence Thin ClientsRedundancy The Interrelation of Identity, Presence, Smart Phones, Pads, Pods, etc.Replication and Location in the Cloud Virtual Terminal Security Strengths andMultisiting Identity Management Weaknesses Backup and Recovery What It Is StrengthsServer Software Environments that Support Future of Identity in the Cloud Weaknesses Cloud Computing Privacy and Its Relation to Cloud-Based AndroidServer Capacity Information Systems BlackBerryVirtualization Personal Information Windows MobileClustering Privacy-Related Issues Ubuntu Mobile Internet DeviceExpansion Finding Your Private Information Mobile Platform Virtualization Server Functions Open Cloud Consortium Working Groups Kernel-Based Virtual MachineApplication Project Matsu VMware Mobile Virtualization PlatformWeb Project Comet Collaboration Applications for MobileDatabase HPC in the Cloud Platforms Vendor Approaches to Cloud Computing The Open Cloud Testbed Text MessagingRole of Open Source Software in Data The Open Science Data Cloud iPhone ApplicationsCenter Intercloud Testbed BlackBerry ApplicationsCost Reduction vs. Reliability Reporting on an Open Cloud Consortium Droid Applications Open Source Server Software Working Group Open Source Database Software Distributed Management Task ForceOpen Source Applications Software (DMTF) lineOpen Source System Management Software What It Is? Cloud Computing InfrastructureOpen Source Load-Balancing Software DMTK Working Groups Associated with Cloud Computing TermsVirtualization as the "Operating System" Cloud Computing Benefits and Limitations of CloudVirtualization with a Host Operating System Standards for Application Developers Computing Virtualization Infections on Virtualized Protocols BenefitsEnvironments Scripting Languages LimitationsType 1 Virtualized Environment Content Formatting Standards and Cloud Computing Case StudiesType 2 Virtualized Environment Languages How Companies Are Using CloudVirtualization Environments Standards for Security in the Cloud Computing Microsoft Virtualization Confidentiality, Integrity, Availability Implementing Applications and Services inSun xVM VirtualBox Authentication, Authorization, the CloudLinux/UNIX Virtualization Accountability Using Your Company's Services vs. theVMware Products Regulations for Privacy Cloud ProviderData Center and Cloud Infrastructure Security Protocols A Cloud Service Provider IntroducedProducts Establishing a Baseline for Cloud Cloud Computing Risks and Issues End-User and Desktop Products Performance Products and Services Provided by CloudIBM Virtualization Best Practices for Selecting a Vendor Computing Companies Using VMware to see a Virtualized Server and Implementing Cloud-Based EconomicEnvironment Applications StaffingPermissive Federation Choosing the Right Vendor Should Your Company Invest in CloudVerified Federation Implementing Cloud-Based Applications Computing? Encrypted Federation Windows Remote Desktop What Should Not be Moved to the Cloud Trusted Federation Vnc LANs and the Cloud Using XMPP in the Federated Environment Web Browsers Internet and the Cloud Presence in the Cloud Server Extensions Web Services, Browsers, and the Cloud What It Is Thin Clients Thin Client

Page 83: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Presence Protocols Smart Phones, Pads, Pods, etc. Advances in Networking and ProcessingLeveraging Presence Virtual Terminal Security Strengths and Speeds that Led to Cloud Computing Presence Enabled Weaknesses Networking DevelopmentsThe Future of Presence Strengths Increased Processing SpeedsThe Interrelation of Identity, Presence, and Weaknesses Managed Service Provider Model to CloudLocation in the Cloud Android Computing and Software as a ServiceIdentity Management BlackBerry (SaaS) What It Is Windows Mobile Single Purpose Architectures Migrate toFuture of Identity in the Cloud Ubuntu Mobile Internet Device Multipurpose ArchitecturesPrivacy and Its Relation to Cloud-Based Mobile Platform Virtualization Data Center VirtualizationInformation Systems Kernel-Based Virtual Machine Collaboration Personal Information VMware Mobile Virtualization Platform The Cloud as a Reach ExtenderPrivacy-Related Issues Collaboration Applications for Mobile The Cloud as a Communication EnablerFinding Your Private Information Platforms The Cloud as an Employee EnablerOpen Cloud Consortium Working Groups Text Messaging Service-Oriented Architecture (SOA) Project Matsu iPhone Applications Evolving from SOA to the CloudProject Comet BlackBerry Applications Capacity: Limited PerformanceHPC in the Cloud Droid Applications Availability: Communications Failure andThe Open Cloud Testbed Performance IssuesThe Open Science Data Cloud 7. Federation, Presence, Security, and Security: Newer Security Protocols ProvideIntercloud Testbed Privacy in the Cloud More ProtectionReporting on an Open Cloud Consortium line What's Next in Cloud Computing Working Group Federation in the Cloud Independent ComponentsDistributed Management Task Force What It Is Message Base(DMTF) Location IndependenceWhat It Is? Communication Requirements for CloudDMTK Working Groups Associated with line Implementation Cloud Computing Cloud Computing Infrastructure Public InternetStandards for Application Developers Cloud Computing Terms Private InternetProtocols Benefits and Limitations of Cloud Routing to the DatacenterScripting Languages Computing Switching within the Data CenterContent Formatting Standards and Benefits Bandwidth Languages Limitations Tools Used to Measure NetworkStandards for Security in the Cloud Cloud Computing Case Studies Performance Confidentiality, Integrity, Availability How Companies Are Using Cloud Using the Protocol Analyzer to MeasureAuthentication, Authorization, Accountability Computing Bandwidth Regulations for Privacy Implementing Applications and Services Using Ping and Traceroute to MeasureSecurity Protocols in the Cloud Network Performance Establishing a Baseline for Cloud Using Your Company's Services vs. the SecurityPerformance Cloud Provider SSLBest Practices for Selecting a Vendor and A Cloud Service Provider Introduced VPN Implementing Cloud-Based Applications Cloud Computing Risks and Issues Overhead Choosing the Right Vendor Products and Services Provided by Cloud Storage Options for Cloud Computing Implementing Cloud-Based Applications Computing Companies Storage CapacityWindows Remote Desktop Economic Data Protection and PartitioningVnc Staffing NASWeb Browsers Should Your Company Invest in Cloud SANServer Extensions Computing? CASThin Clients What Should Not be Moved to the Cloud RedundancySmart Phones, Pads, Pods, etc. LANs and the Cloud ReplicationVirtual Terminal Security Strengths and Internet and the Cloud Multisiting Weaknesses Web Services, Browsers, and the Cloud Backup and Recovery Strengths Thin Client Server Software Environments thatWeaknesses Advances in Networking and Processing Support Cloud Computing Android Speeds that Led to Cloud Computing Server CapacityBlackBerry Networking Developments VirtualizationWindows Mobile Increased Processing Speeds ClusteringUbuntu Mobile Internet Device Managed Service Provider Model to ExpansionMobile Platform Virtualization Cloud Computing and Software as a Server FunctionsKernel-Based Virtual Machine Service (SaaS) ApplicationVMware Mobile Virtualization Platform Single Purpose Architectures Migrate to Web Collaboration Applications for Mobile Multipurpose Architectures Database Platforms Data Center Virtualization Vendor Approaches to Cloud Computing Text Messaging Collaboration Role of Open Source Software in DataiPhone Applications The Cloud as a Reach Extender Center BlackBerry Applications The Cloud as a Communication Enabler Cost Reduction vs. Reliability

Page 84: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Droid Applications The Cloud as an Employee Enabler Open Source Server SoftwareService-Oriented Architecture (SOA) Open Source Database SoftwareEvolving from SOA to the Cloud Open Source Applications Software

line Capacity: Limited Performance Open Source System ManagementCloud Computing Infrastructure Availability: Communications Failure and SoftwareCloud Computing Terms Performance Issues Open Source Load-Balancing Software Benefits and Limitations of Cloud Computing Security: Newer Security Protocols Virtualization as the "Operating System"Benefits Provide More Protection Virtualization with a Host OperatingLimitations What's Next in Cloud Computing SystemCloud Computing Case Studies Independent Components Virtualization Infections on VirtualizedHow Companies Are Using Cloud Message Base Environments Computing Location Independence Type 1 Virtualized EnvironmentImplementing Applications and Services in Communication Requirements for Cloud Type 2 Virtualized Environmentthe Cloud Implementation Virtualization Environments Using Your Company's Services vs. the Public Internet Microsoft VirtualizationCloud Provider Private Internet Sun xVM VirtualBoxA Cloud Service Provider Introduced Routing to the Datacenter Linux/UNIX VirtualizationCloud Computing Risks and Issues Switching within the Data Center VMware ProductsProducts and Services Provided by Cloud Bandwidth Data Center and Cloud InfrastructureComputing Companies Tools Used to Measure Network ProductsEconomic Performance End-User and Desktop Products Staffing Using the Protocol Analyzer to Measure IBM VirtualizationShould Your Company Invest in Cloud Bandwidth Using VMware to see a Virtualized ServerComputing? Using Ping and Traceroute to Measure Environment What Should Not be Moved to the Cloud Network Performance Permissive FederationLANs and the Cloud Security Verified FederationInternet and the Cloud SSL Encrypted FederationWeb Services, Browsers, and the Cloud VPN Trusted FederationThin Client Overhead Using XMPP in the Federated EnvironmentAdvances in Networking and Processing Storage Options for Cloud Computing Presence in the Cloud Speeds that Led to Cloud Computing Storage Capacity What It IsNetworking Developments Data Protection and Partitioning Presence ProtocolsIncreased Processing Speeds NAS Leveraging PresenceManaged Service Provider Model to Cloud SAN Presence EnabledComputing and Software as a Service CAS The Future of Presence(SaaS) Redundancy The Interrelation of Identity, Presence, andSingle Purpose Architectures Migrate to Replication Location in the CloudMultipurpose Architectures Multisiting Identity Management Data Center Virtualization Backup and Recovery What It IsCollaboration Server Software Environments that Future of Identity in the CloudThe Cloud as a Reach Extender Support Cloud Computing Privacy and Its Relation to Cloud-BasedThe Cloud as a Communication Enabler Server Capacity Information Systems The Cloud as an Employee Enabler Virtualization Personal InformationService-Oriented Architecture (SOA) Clustering Privacy-Related IssuesEvolving from SOA to the Cloud Expansion Finding Your Private Information Capacity: Limited Performance Server Functions Open Cloud Consortium Working GroupsAvailability: Communications Failure and Application Project MatsuPerformance Issues Web Project CometSecurity: Newer Security Protocols Provide Database HPC in the CloudMore Protection Vendor Approaches to Cloud Computing The Open Cloud TestbedWhat's Next in Cloud Computing Role of Open Source Software in Data The Open Science Data CloudIndependent Components Center Intercloud Testbed Message Base Cost Reduction vs. Reliability Reporting on an Open Cloud ConsortiumLocation Independence Open Source Server Software Working Group Communication Requirements for Cloud Open Source Database Software Distributed Management Task ForceImplementation Open Source Applications Software (DMTF) Public Internet Open Source System Management What It Is?Private Internet Software DMTK Working Groups Associated withRouting to the Datacenter Open Source Load-Balancing Software Cloud ComputingSwitching within the Data Center Virtualization as the "Operating System" Standards for Application Developers Bandwidth Virtualization with a Host Operating ProtocolsTools Used to Measure Network System Scripting LanguagesPerformance Virtualization Infections on Virtualized Content Formatting Standards andUsing the Protocol Analyzer to Measure Environments LanguagesBandwidth Type 1 Virtualized Environment Standards for Security in the Cloud Using Ping and Traceroute to Measure Type 2 Virtualized Environment Confidentiality, Integrity, Availability

Page 85: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Network Performance Virtualization Environments Authentication, Authorization,Security Microsoft Virtualization AccountabilitySSL Sun xVM VirtualBox Regulations for PrivacyVPN Linux/UNIX Virtualization Security ProtocolsOverhead VMware Products Establishing a Baseline for CloudStorage Options for Cloud Computing Data Center and Cloud Infrastructure Performance Storage Capacity Products Best Practices for Selecting a Vendor andData Protection and Partitioning End-User and Desktop Products Implementing Cloud-Based Applications NAS IBM Virtualization Choosing the Right VendorSAN Using VMware to see a Virtualized Server Implementing Cloud-Based Applications CAS Environment Windows Remote DesktopRedundancy Permissive Federation VncReplication Verified Federation Web BrowsersMultisiting Encrypted Federation Server ExtensionsBackup and Recovery Trusted Federation Thin ClientsServer Software Environments that Support Using XMPP in the Federated Smart Phones, Pads, Pods, etc.Cloud Computing Environment Virtual Terminal Security Strengths andServer Capacity Presence in the Cloud Weaknesses Virtualization What It Is StrengthsClustering Presence Protocols Weaknesses Expansion Leveraging Presence AndroidServer Functions Presence Enabled BlackBerryApplication The Future of Presence Windows MobileWeb The Interrelation of Identity, Presence, Ubuntu Mobile Internet DeviceDatabase and Location in the Cloud Mobile Platform Virtualization Vendor Approaches to Cloud Computing Identity Management Kernel-Based Virtual MachineRole of Open Source Software in Data What It Is VMware Mobile Virtualization PlatformCenter Future of Identity in the Cloud Collaboration Applications for MobileCost Reduction vs. Reliability Privacy and Its Relation to Cloud-Based Platforms Open Source Server Software Information Systems Text MessagingOpen Source Database Software Personal Information iPhone ApplicationsOpen Source Applications Software Privacy-Related Issues BlackBerry ApplicationsOpen Source System Management Software Finding Your Private Information Droid Applications Open Source Load-Balancing Software Open Cloud Consortium Working GroupsVirtualization as the "Operating System" Project Matsu 10. Mobility and the CloudVirtualization with a Host Operating System Project Comet lineVirtualization Infections on Virtualized HPC in the Cloud Mobile Operating Systems forEnvironments The Open Cloud Testbed Smartphones Type 1 Virtualized Environment The Open Science Data Cloud iPhoneType 2 Virtualized Environment Intercloud Testbed Virtualization Environments Reporting on an Open Cloud ConsortiumMicrosoft Virtualization Working Group lineSun xVM VirtualBox Distributed Management Task Force Cloud Computing InfrastructureLinux/UNIX Virtualization (DMTF) Cloud Computing TermsVMware Products What It Is? Benefits and Limitations of CloudData Center and Cloud Infrastructure DMTK Working Groups Associated with Computing Products Cloud Computing BenefitsEnd-User and Desktop Products Standards for Application Developers LimitationsIBM Virtualization Protocols Cloud Computing Case StudiesUsing VMware to see a Virtualized Server Scripting Languages How Companies Are Using CloudEnvironment Content Formatting Standards and Computing Permissive Federation Languages Implementing Applications and Services inVerified Federation Standards for Security in the Cloud the CloudEncrypted Federation Confidentiality, Integrity, Availability Using Your Company's Services vs. theTrusted Federation Authentication, Authorization, Cloud ProviderUsing XMPP in the Federated Environment Accountability A Cloud Service Provider IntroducedPresence in the Cloud Regulations for Privacy Cloud Computing Risks and Issues What It Is Security Protocols Products and Services Provided by CloudPresence Protocols Establishing a Baseline for Cloud Computing Companies Leveraging Presence Performance EconomicPresence Enabled Best Practices for Selecting a Vendor StaffingThe Future of Presence and Implementing Cloud-Based Should Your Company Invest in CloudThe Interrelation of Identity, Presence, and Applications Computing? Location in the Cloud Choosing the Right Vendor What Should Not be Moved to the Cloud Identity Management Implementing Cloud-Based Applications LANs and the Cloud What It Is Windows Remote Desktop Internet and the Cloud

Page 86: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Future of Identity in the Cloud Vnc Web Services, Browsers, and the Cloud Privacy and Its Relation to Cloud-Based Web Browsers Thin Client Information Systems Server Extensions Advances in Networking and ProcessingPersonal Information Thin Clients Speeds that Led to Cloud Computing Privacy-Related Issues Smart Phones, Pads, Pods, etc. Networking DevelopmentsFinding Your Private Information Virtual Terminal Security Strengths and Increased Processing SpeedsOpen Cloud Consortium Working Groups Weaknesses Managed Service Provider Model to CloudProject Matsu Strengths Computing and Software as a ServiceProject Comet Weaknesses (SaaS) HPC in the Cloud Android Single Purpose Architectures Migrate toThe Open Cloud Testbed BlackBerry Multipurpose ArchitecturesThe Open Science Data Cloud Windows Mobile Data Center VirtualizationIntercloud Testbed Ubuntu Mobile Internet Device Collaboration Reporting on an Open Cloud Consortium Mobile Platform Virtualization The Cloud as a Reach ExtenderWorking Group Kernel-Based Virtual Machine The Cloud as a Communication EnablerDistributed Management Task Force VMware Mobile Virtualization Platform The Cloud as an Employee Enabler(DMTF) Collaboration Applications for Mobile Service-Oriented Architecture (SOA) What It Is? Platforms Evolving from SOA to the CloudDMTK Working Groups Associated with Text Messaging Capacity: Limited PerformanceCloud Computing iPhone Applications Availability: Communications Failure andStandards for Application Developers BlackBerry Applications Performance IssuesProtocols Droid Applications Security: Newer Security Protocols ProvideScripting Languages More ProtectionContent Formatting Standards and What's Next in Cloud Computing Languages line Independent ComponentsStandards for Security in the Cloud Cloud Computing Infrastructure Message BaseConfidentiality, Integrity, Availability Cloud Computing Terms Location IndependenceAuthentication, Authorization, Accountability Benefits and Limitations of Cloud Communication Requirements for CloudRegulations for Privacy Computing Implementation Security Protocols Benefits Public InternetEstablishing a Baseline for Cloud Limitations Private InternetPerformance Cloud Computing Case Studies Routing to the DatacenterBest Practices for Selecting a Vendor and How Companies Are Using Cloud Switching within the Data CenterImplementing Cloud-Based Applications Computing Bandwidth Choosing the Right Vendor Implementing Applications and Services Tools Used to Measure NetworkImplementing Cloud-Based Applications in the Cloud Performance Windows Remote Desktop Using Your Company's Services vs. the Using the Protocol Analyzer to MeasureVnc Cloud Provider Bandwidth Web Browsers A Cloud Service Provider Introduced Using Ping and Traceroute to MeasureServer Extensions Cloud Computing Risks and Issues Network Performance Thin Clients Products and Services Provided by Cloud SecuritySmart Phones, Pads, Pods, etc. Computing Companies SSLVirtual Terminal Security Strengths and Economic VPN Weaknesses Staffing Overhead Strengths Should Your Company Invest in Cloud Storage Options for Cloud Computing Weaknesses Computing? Storage CapacityAndroid What Should Not be Moved to the Cloud Data Protection and PartitioningBlackBerry LANs and the Cloud NASWindows Mobile Internet and the Cloud SANUbuntu Mobile Internet Device Web Services, Browsers, and the Cloud CASMobile Platform Virtualization Thin Client RedundancyKernel-Based Virtual Machine Advances in Networking and Processing ReplicationVMware Mobile Virtualization Platform Speeds that Led to Cloud Computing Multisiting Collaboration Applications for Mobile Networking Developments Backup and Recovery Platforms Increased Processing Speeds Server Software Environments thatText Messaging Managed Service Provider Model to Support Cloud Computing iPhone Applications Cloud Computing and Software as a Server CapacityBlackBerry Applications Service (SaaS) VirtualizationDroid Applications Single Purpose Architectures Migrate to Clustering

Multipurpose Architectures ExpansionData Center Virtualization Server Functions

line Collaboration ApplicationCloud Computing Infrastructure The Cloud as a Reach Extender Web Cloud Computing Terms The Cloud as a Communication Enabler Database Benefits and Limitations of Cloud Computing The Cloud as an Employee Enabler Vendor Approaches to Cloud Computing Benefits Service-Oriented Architecture (SOA) Role of Open Source Software in Data

Page 87: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Limitations Evolving from SOA to the Cloud Center Cloud Computing Case Studies Capacity: Limited Performance Cost Reduction vs. ReliabilityHow Companies Are Using Cloud Availability: Communications Failure and Open Source Server SoftwareComputing Performance Issues Open Source Database SoftwareImplementing Applications and Services in Security: Newer Security Protocols Open Source Applications Softwarethe Cloud Provide More Protection Open Source System ManagementUsing Your Company's Services vs. the What's Next in Cloud Computing SoftwareCloud Provider Independent Components Open Source Load-Balancing Software A Cloud Service Provider Introduced Message Base Virtualization as the "Operating System"Cloud Computing Risks and Issues Location Independence Virtualization with a Host OperatingProducts and Services Provided by Cloud Communication Requirements for Cloud SystemComputing Companies Implementation Virtualization Infections on VirtualizedEconomic Public Internet Environments Staffing Private Internet Type 1 Virtualized EnvironmentShould Your Company Invest in Cloud Routing to the Datacenter Type 2 Virtualized EnvironmentComputing? Switching within the Data Center Virtualization Environments What Should Not be Moved to the Cloud Bandwidth Microsoft VirtualizationLANs and the Cloud Tools Used to Measure Network Sun xVM VirtualBoxInternet and the Cloud Performance Linux/UNIX VirtualizationWeb Services, Browsers, and the Cloud Using the Protocol Analyzer to Measure VMware ProductsThin Client Bandwidth Data Center and Cloud InfrastructureAdvances in Networking and Processing Using Ping and Traceroute to Measure ProductsSpeeds that Led to Cloud Computing Network Performance End-User and Desktop Products Networking Developments Security IBM VirtualizationIncreased Processing Speeds SSL Using VMware to see a Virtualized ServerManaged Service Provider Model to Cloud VPN Environment Computing and Software as a Service Overhead Permissive Federation(SaaS) Storage Options for Cloud Computing Verified FederationSingle Purpose Architectures Migrate to Storage Capacity Encrypted FederationMultipurpose Architectures Data Protection and Partitioning Trusted FederationData Center Virtualization NAS Using XMPP in the Federated EnvironmentCollaboration SAN Presence in the Cloud The Cloud as a Reach Extender CAS What It IsThe Cloud as a Communication Enabler Redundancy Presence ProtocolsThe Cloud as an Employee Enabler Replication Leveraging PresenceService-Oriented Architecture (SOA) Multisiting Presence EnabledEvolving from SOA to the Cloud Backup and Recovery The Future of PresenceCapacity: Limited Performance Server Software Environments that The Interrelation of Identity, Presence, andAvailability: Communications Failure and Support Cloud Computing Location in the CloudPerformance Issues Server Capacity Identity Management Security: Newer Security Protocols Provide Virtualization What It IsMore Protection Clustering Future of Identity in the CloudWhat's Next in Cloud Computing Expansion Privacy and Its Relation to Cloud-BasedIndependent Components Server Functions Information Systems Message Base Application Personal InformationLocation Independence Web Privacy-Related IssuesCommunication Requirements for Cloud Database Finding Your Private Information Implementation Vendor Approaches to Cloud Computing Open Cloud Consortium Working GroupsPublic Internet Role of Open Source Software in Data Project MatsuPrivate Internet Center Project CometRouting to the Datacenter Cost Reduction vs. Reliability HPC in the CloudSwitching within the Data Center Open Source Server Software The Open Cloud TestbedBandwidth Open Source Database Software The Open Science Data CloudTools Used to Measure Network Open Source Applications Software Intercloud Testbed Performance Open Source System Management Reporting on an Open Cloud ConsortiumUsing the Protocol Analyzer to Measure Software Working Group Bandwidth Open Source Load-Balancing Software Distributed Management Task ForceUsing Ping and Traceroute to Measure Virtualization as the "Operating System" (DMTF) Network Performance Virtualization with a Host Operating What It Is?Security System DMTK Working Groups Associated withSSL Virtualization Infections on Virtualized Cloud ComputingVPN Environments Standards for Application Developers Overhead Type 1 Virtualized Environment ProtocolsStorage Options for Cloud Computing Type 2 Virtualized Environment Scripting LanguagesStorage Capacity Virtualization Environments Content Formatting Standards andData Protection and Partitioning Microsoft Virtualization Languages

Page 88: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

NAS Sun xVM VirtualBox Standards for Security in the Cloud SAN Linux/UNIX Virtualization Confidentiality, Integrity, AvailabilityCAS VMware Products Authentication, Authorization,Redundancy Data Center and Cloud Infrastructure AccountabilityReplication Products Regulations for PrivacyMultisiting End-User and Desktop Products Security ProtocolsBackup and Recovery IBM Virtualization Establishing a Baseline for CloudServer Software Environments that Support Using VMware to see a Virtualized Server Performance Cloud Computing Environment Best Practices for Selecting a Vendor andServer Capacity Permissive Federation Implementing Cloud-Based Applications Virtualization Verified Federation Choosing the Right VendorClustering Encrypted Federation Implementing Cloud-Based Applications Expansion Trusted Federation Windows Remote DesktopServer Functions Using XMPP in the Federated VncApplication Environment Web BrowsersWeb Presence in the Cloud Server ExtensionsDatabase What It Is Thin ClientsVendor Approaches to Cloud Computing Presence Protocols Smart Phones, Pads, Pods, etc.Role of Open Source Software in Data Leveraging Presence Virtual Terminal Security Strengths andCenter Presence Enabled Weaknesses Cost Reduction vs. Reliability The Future of Presence StrengthsOpen Source Server Software The Interrelation of Identity, Presence, Weaknesses Open Source Database Software and Location in the Cloud AndroidOpen Source Applications Software Identity Management BlackBerryOpen Source System Management Software What It Is Windows MobileOpen Source Load-Balancing Software Future of Identity in the Cloud Ubuntu Mobile Internet DeviceVirtualization as the "Operating System" Privacy and Its Relation to Cloud-Based Mobile Platform Virtualization Virtualization with a Host Operating System Information Systems Kernel-Based Virtual MachineVirtualization Infections on Virtualized Personal Information VMware Mobile Virtualization PlatformEnvironments Privacy-Related Issues Collaboration Applications for MobileType 1 Virtualized Environment Finding Your Private Information Platforms Type 2 Virtualized Environment Open Cloud Consortium Working Groups Text MessagingVirtualization Environments Project Matsu iPhone ApplicationsMicrosoft Virtualization Project Comet BlackBerry ApplicationsSun xVM VirtualBox HPC in the Cloud Droid Applications Linux/UNIX Virtualization The Open Cloud TestbedVMware Products The Open Science Data CloudData Center and Cloud Infrastructure Intercloud Testbed lineProducts Reporting on an Open Cloud Consortium Cloud Computing InfrastructureEnd-User and Desktop Products Working Group Cloud Computing TermsIBM Virtualization Distributed Management Task Force Benefits and Limitations of CloudUsing VMware to see a Virtualized Server (DMTF) Computing Environment What It Is? BenefitsPermissive Federation DMTK Working Groups Associated with LimitationsVerified Federation Cloud Computing Cloud Computing Case StudiesEncrypted Federation Standards for Application Developers How Companies Are Using CloudTrusted Federation Protocols Computing Using XMPP in the Federated Environment Scripting Languages Implementing Applications and Services inPresence in the Cloud Content Formatting Standards and the CloudWhat It Is Languages Using Your Company's Services vs. thePresence Protocols Standards for Security in the Cloud Cloud ProviderLeveraging Presence Confidentiality, Integrity, Availability A Cloud Service Provider IntroducedPresence Enabled Authentication, Authorization, Cloud Computing Risks and Issues The Future of Presence Accountability Products and Services Provided by CloudThe Interrelation of Identity, Presence, and Regulations for Privacy Computing Companies Location in the Cloud Security Protocols EconomicIdentity Management Establishing a Baseline for Cloud StaffingWhat It Is Performance Should Your Company Invest in CloudFuture of Identity in the Cloud Best Practices for Selecting a Vendor Computing? Privacy and Its Relation to Cloud-Based and Implementing Cloud-Based What Should Not be Moved to the Cloud Information Systems Applications LANs and the Cloud Personal Information Choosing the Right Vendor Internet and the Cloud Privacy-Related Issues Implementing Cloud-Based Applications Web Services, Browsers, and the Cloud Finding Your Private Information Windows Remote Desktop Thin Client Open Cloud Consortium Working Groups Vnc Advances in Networking and ProcessingProject Matsu Web Browsers Speeds that Led to Cloud Computing

Page 89: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Project Comet Server Extensions Networking DevelopmentsHPC in the Cloud Thin Clients Increased Processing SpeedsThe Open Cloud Testbed Smart Phones, Pads, Pods, etc. Managed Service Provider Model to CloudThe Open Science Data Cloud Virtual Terminal Security Strengths and Computing and Software as a ServiceIntercloud Testbed Weaknesses (SaaS) Reporting on an Open Cloud Consortium Strengths Single Purpose Architectures Migrate toWorking Group Weaknesses Multipurpose ArchitecturesDistributed Management Task Force Android Data Center Virtualization(DMTF) BlackBerry Collaboration What It Is? Windows Mobile The Cloud as a Reach ExtenderDMTK Working Groups Associated with Ubuntu Mobile Internet Device The Cloud as a Communication EnablerCloud Computing Mobile Platform Virtualization The Cloud as an Employee EnablerStandards for Application Developers Kernel-Based Virtual Machine Service-Oriented Architecture (SOA) Protocols VMware Mobile Virtualization Platform Evolving from SOA to the CloudScripting Languages Collaboration Applications for Mobile Capacity: Limited PerformanceContent Formatting Standards and Platforms Availability: Communications Failure andLanguages Text Messaging Performance IssuesStandards for Security in the Cloud iPhone Applications Security: Newer Security Protocols ProvideConfidentiality, Integrity, Availability BlackBerry Applications More ProtectionAuthentication, Authorization, Accountability Droid Applications What's Next in Cloud Computing Regulations for Privacy Independent ComponentsSecurity Protocols Message BaseEstablishing a Baseline for Cloud line Location IndependencePerformance Cloud Computing Infrastructure Communication Requirements for CloudBest Practices for Selecting a Vendor and Cloud Computing Terms Implementation Implementing Cloud-Based Applications Benefits and Limitations of Cloud Public InternetChoosing the Right Vendor Computing Private InternetImplementing Cloud-Based Applications Benefits Routing to the DatacenterWindows Remote Desktop Limitations Switching within the Data CenterVnc Cloud Computing Case Studies Bandwidth Web Browsers How Companies Are Using Cloud Tools Used to Measure NetworkServer Extensions Computing Performance Thin Clients Implementing Applications and Services Using the Protocol Analyzer to MeasureSmart Phones, Pads, Pods, etc. in the Cloud Bandwidth Virtual Terminal Security Strengths and Using Your Company's Services vs. the Using Ping and Traceroute to MeasureWeaknesses Cloud Provider Network Performance Strengths A Cloud Service Provider Introduced SecurityWeaknesses Cloud Computing Risks and Issues SSLAndroid Products and Services Provided by Cloud VPN BlackBerry Computing Companies Overhead Windows Mobile Economic Storage Options for Cloud Computing Ubuntu Mobile Internet Device Staffing Storage CapacityMobile Platform Virtualization Should Your Company Invest in Cloud Data Protection and PartitioningKernel-Based Virtual Machine Computing? NASVMware Mobile Virtualization Platform What Should Not be Moved to the Cloud SANCollaboration Applications for Mobile LANs and the Cloud CASPlatforms Internet and the Cloud RedundancyText Messaging Web Services, Browsers, and the Cloud ReplicationiPhone Applications Thin Client Multisiting BlackBerry Applications Advances in Networking and Processing Backup and Recovery Droid Applications Speeds that Led to Cloud Computing Server Software Environments that

Networking Developments Support Cloud Computing Increased Processing Speeds Server Capacity

line Managed Service Provider Model to VirtualizationCloud Computing Infrastructure Cloud Computing and Software as a ClusteringCloud Computing Terms Service (SaaS) ExpansionBenefits and Limitations of Cloud Computing Single Purpose Architectures Migrate to Server FunctionsBenefits Multipurpose Architectures ApplicationLimitations Data Center Virtualization Web Cloud Computing Case Studies Collaboration Database How Companies Are Using Cloud The Cloud as a Reach Extender Vendor Approaches to Cloud Computing Computing The Cloud as a Communication Enabler Role of Open Source Software in DataImplementing Applications and Services in The Cloud as an Employee Enabler Center the Cloud Service-Oriented Architecture (SOA) Cost Reduction vs. ReliabilityUsing Your Company's Services vs. the Evolving from SOA to the Cloud Open Source Server SoftwareCloud Provider Capacity: Limited Performance Open Source Database Software

Page 90: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

A Cloud Service Provider Introduced Availability: Communications Failure and Open Source Applications SoftwareCloud Computing Risks and Issues Performance Issues Open Source System ManagementProducts and Services Provided by Cloud Security: Newer Security Protocols SoftwareComputing Companies Provide More Protection Open Source Load-Balancing Software Economic What's Next in Cloud Computing Virtualization as the "Operating System"Staffing Independent Components Virtualization with a Host OperatingShould Your Company Invest in Cloud Message Base SystemComputing? Location Independence Virtualization Infections on VirtualizedWhat Should Not be Moved to the Cloud Communication Requirements for Cloud Environments LANs and the Cloud Implementation Type 1 Virtualized EnvironmentInternet and the Cloud Public Internet Type 2 Virtualized EnvironmentWeb Services, Browsers, and the Cloud Private Internet Virtualization Environments Thin Client Routing to the Datacenter Microsoft VirtualizationAdvances in Networking and Processing Switching within the Data Center Sun xVM VirtualBoxSpeeds that Led to Cloud Computing Bandwidth Linux/UNIX VirtualizationNetworking Developments Tools Used to Measure Network VMware ProductsIncreased Processing Speeds Performance Data Center and Cloud InfrastructureManaged Service Provider Model to Cloud Using the Protocol Analyzer to Measure ProductsComputing and Software as a Service Bandwidth End-User and Desktop Products (SaaS) Using Ping and Traceroute to Measure IBM VirtualizationSingle Purpose Architectures Migrate to Network Performance Using VMware to see a Virtualized ServerMultipurpose Architectures Security Environment Data Center Virtualization SSL Permissive FederationCollaboration VPN Verified FederationThe Cloud as a Reach Extender Overhead Encrypted FederationThe Cloud as a Communication Enabler Storage Options for Cloud Computing Trusted FederationThe Cloud as an Employee Enabler Storage Capacity Using XMPP in the Federated EnvironmentService-Oriented Architecture (SOA) Data Protection and Partitioning Presence in the Cloud Evolving from SOA to the Cloud NAS What It IsCapacity: Limited Performance SAN Presence ProtocolsAvailability: Communications Failure and CAS Leveraging PresencePerformance Issues Redundancy Presence EnabledSecurity: Newer Security Protocols Provide Replication The Future of PresenceMore Protection Multisiting The Interrelation of Identity, Presence, andWhat's Next in Cloud Computing Backup and Recovery Location in the CloudIndependent Components Server Software Environments that Identity Management Message Base Support Cloud Computing What It IsLocation Independence Server Capacity Future of Identity in the CloudCommunication Requirements for Cloud Virtualization Privacy and Its Relation to Cloud-BasedImplementation Clustering Information Systems Public Internet Expansion Personal InformationPrivate Internet Server Functions Privacy-Related IssuesRouting to the Datacenter Application Finding Your Private Information Switching within the Data Center Web Open Cloud Consortium Working GroupsBandwidth Database Project MatsuTools Used to Measure Network Vendor Approaches to Cloud Computing Project CometPerformance Role of Open Source Software in Data HPC in the CloudUsing the Protocol Analyzer to Measure Center The Open Cloud TestbedBandwidth Cost Reduction vs. Reliability The Open Science Data CloudUsing Ping and Traceroute to Measure Open Source Server Software Intercloud Testbed Network Performance Open Source Database Software Reporting on an Open Cloud ConsortiumSecurity Open Source Applications Software Working Group SSL Open Source System Management Distributed Management Task ForceVPN Software (DMTF) Overhead Open Source Load-Balancing Software What It Is?Storage Options for Cloud Computing Virtualization as the "Operating System" DMTK Working Groups Associated withStorage Capacity Virtualization with a Host Operating Cloud ComputingData Protection and Partitioning System Standards for Application Developers NAS Virtualization Infections on Virtualized ProtocolsSAN Environments Scripting LanguagesCAS Type 1 Virtualized Environment Content Formatting Standards andRedundancy Type 2 Virtualized Environment LanguagesReplication Virtualization Environments Standards for Security in the Cloud Multisiting Microsoft Virtualization Confidentiality, Integrity, AvailabilityBackup and Recovery Sun xVM VirtualBox Authentication, Authorization,Server Software Environments that Support Linux/UNIX Virtualization Accountability

Page 91: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Cloud Computing VMware Products Regulations for PrivacyServer Capacity Data Center and Cloud Infrastructure Security ProtocolsVirtualization Products Establishing a Baseline for CloudClustering End-User and Desktop Products Performance Expansion IBM Virtualization Best Practices for Selecting a Vendor andServer Functions Using VMware to see a Virtualized Server Implementing Cloud-Based Applications Application Environment Choosing the Right VendorWeb Permissive Federation Implementing Cloud-Based Applications Database Verified Federation Windows Remote DesktopVendor Approaches to Cloud Computing Encrypted Federation VncRole of Open Source Software in Data Trusted Federation Web BrowsersCenter Using XMPP in the Federated Server ExtensionsCost Reduction vs. Reliability Environment Thin ClientsOpen Source Server Software Presence in the Cloud Smart Phones, Pads, Pods, etc.Open Source Database Software What It Is Virtual Terminal Security Strengths andOpen Source Applications Software Presence Protocols Weaknesses Open Source System Management Software Leveraging Presence StrengthsOpen Source Load-Balancing Software Presence Enabled Weaknesses Virtualization as the "Operating System" The Future of Presence AndroidVirtualization with a Host Operating System The Interrelation of Identity, Presence, BlackBerryVirtualization Infections on Virtualized and Location in the Cloud Windows MobileEnvironments Identity Management Ubuntu Mobile Internet DeviceType 1 Virtualized Environment What It Is Mobile Platform Virtualization Type 2 Virtualized Environment Future of Identity in the Cloud Kernel-Based Virtual MachineVirtualization Environments Privacy and Its Relation to Cloud-Based VMware Mobile Virtualization PlatformMicrosoft Virtualization Information Systems Collaboration Applications for MobileSun xVM VirtualBox Personal Information Platforms Linux/UNIX Virtualization Privacy-Related Issues Text MessagingVMware Products Finding Your Private Information iPhone ApplicationsData Center and Cloud Infrastructure Open Cloud Consortium Working Groups BlackBerry ApplicationsProducts Project Matsu Droid Applications End-User and Desktop Products Project CometIBM Virtualization HPC in the CloudUsing VMware to see a Virtualized Server The Open Cloud Testbed lineEnvironment The Open Science Data Cloud Cloud Computing InfrastructurePermissive Federation Intercloud Testbed Cloud Computing TermsVerified Federation Reporting on an Open Cloud Consortium Benefits and Limitations of CloudEncrypted Federation Working Group Computing Trusted Federation Distributed Management Task Force BenefitsUsing XMPP in the Federated Environment (DMTF) LimitationsPresence in the Cloud What It Is? Cloud Computing Case StudiesWhat It Is DMTK Working Groups Associated with How Companies Are Using CloudPresence Protocols Cloud Computing Computing Leveraging Presence Standards for Application Developers Implementing Applications and Services inPresence Enabled Protocols the CloudThe Future of Presence Scripting Languages Using Your Company's Services vs. theThe Interrelation of Identity, Presence, and Content Formatting Standards and Cloud ProviderLocation in the Cloud Languages A Cloud Service Provider IntroducedIdentity Management Standards for Security in the Cloud Cloud Computing Risks and Issues What It Is Confidentiality, Integrity, Availability Products and Services Provided by CloudFuture of Identity in the Cloud Authentication, Authorization, Computing Companies Privacy and Its Relation to Cloud-Based Accountability EconomicInformation Systems Regulations for Privacy StaffingPersonal Information Security Protocols Should Your Company Invest in CloudPrivacy-Related Issues Establishing a Baseline for Cloud Computing? Finding Your Private Information Performance What Should Not be Moved to the Cloud Open Cloud Consortium Working Groups Best Practices for Selecting a Vendor LANs and the Cloud Project Matsu and Implementing Cloud-Based Internet and the Cloud Project Comet Applications Web Services, Browsers, and the Cloud HPC in the Cloud Choosing the Right Vendor Thin Client The Open Cloud Testbed Implementing Cloud-Based Applications Advances in Networking and ProcessingThe Open Science Data Cloud Windows Remote Desktop Speeds that Led to Cloud Computing Intercloud Testbed Vnc Networking DevelopmentsReporting on an Open Cloud Consortium Web Browsers Increased Processing SpeedsWorking Group Server Extensions Managed Service Provider Model to CloudDistributed Management Task Force Thin Clients Computing and Software as a Service

Page 92: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

(DMTF) Smart Phones, Pads, Pods, etc. (SaaS) What It Is? Virtual Terminal Security Strengths and Single Purpose Architectures Migrate toDMTK Working Groups Associated with Weaknesses Multipurpose ArchitecturesCloud Computing Strengths Data Center VirtualizationStandards for Application Developers Weaknesses Collaboration Protocols Android The Cloud as a Reach ExtenderScripting Languages BlackBerry The Cloud as a Communication EnablerContent Formatting Standards and Windows Mobile The Cloud as an Employee EnablerLanguages Ubuntu Mobile Internet Device Service-Oriented Architecture (SOA) Standards for Security in the Cloud Mobile Platform Virtualization Evolving from SOA to the CloudConfidentiality, Integrity, Availability Kernel-Based Virtual Machine Capacity: Limited PerformanceAuthentication, Authorization, Accountability VMware Mobile Virtualization Platform Availability: Communications Failure andRegulations for Privacy Collaboration Applications for Mobile Performance IssuesSecurity Protocols Platforms Security: Newer Security Protocols ProvideEstablishing a Baseline for Cloud Text Messaging More ProtectionPerformance iPhone Applications What's Next in Cloud Computing Best Practices for Selecting a Vendor and BlackBerry Applications Independent ComponentsImplementing Cloud-Based Applications Droid Applications Message BaseChoosing the Right Vendor Location IndependenceImplementing Cloud-Based Applications Communication Requirements for CloudWindows Remote Desktop line Implementation Vnc Cloud Computing Infrastructure Public InternetWeb Browsers Cloud Computing Terms Private InternetServer Extensions Benefits and Limitations of Cloud Routing to the DatacenterThin Clients Computing Switching within the Data CenterSmart Phones, Pads, Pods, etc. Benefits Bandwidth Virtual Terminal Security Strengths and Limitations Tools Used to Measure NetworkWeaknesses Cloud Computing Case Studies Performance Strengths How Companies Are Using Cloud Using the Protocol Analyzer to MeasureWeaknesses Computing Bandwidth Android Implementing Applications and Services Using Ping and Traceroute to MeasureBlackBerry in the Cloud Network Performance Windows Mobile Using Your Company's Services vs. the SecurityUbuntu Mobile Internet Device Cloud Provider SSLMobile Platform Virtualization A Cloud Service Provider Introduced VPN Kernel-Based Virtual Machine Cloud Computing Risks and Issues Overhead VMware Mobile Virtualization Platform Products and Services Provided by Cloud Storage Options for Cloud Computing Collaboration Applications for Mobile Computing Companies Storage CapacityPlatforms Economic Data Protection and PartitioningText Messaging Staffing NASiPhone Applications Should Your Company Invest in Cloud SANBlackBerry Applications Computing? CASDroid Applications What Should Not be Moved to the Cloud Redundancy

LANs and the Cloud ReplicationInternet and the Cloud Multisiting

line Web Services, Browsers, and the Cloud Backup and Recovery Cloud Computing Infrastructure Thin Client Server Software Environments thatCloud Computing Terms Advances in Networking and Processing Support Cloud Computing Benefits and Limitations of Cloud Computing Speeds that Led to Cloud Computing Server CapacityBenefits Networking Developments VirtualizationLimitations Increased Processing Speeds ClusteringCloud Computing Case Studies Managed Service Provider Model to ExpansionHow Companies Are Using Cloud Cloud Computing and Software as a Server FunctionsComputing Service (SaaS) ApplicationImplementing Applications and Services in Single Purpose Architectures Migrate to Web the Cloud Multipurpose Architectures Database Using Your Company's Services vs. the Data Center Virtualization Vendor Approaches to Cloud Computing Cloud Provider Collaboration Role of Open Source Software in DataA Cloud Service Provider Introduced The Cloud as a Reach Extender Center Cloud Computing Risks and Issues The Cloud as a Communication Enabler Cost Reduction vs. ReliabilityProducts and Services Provided by Cloud The Cloud as an Employee Enabler Open Source Server SoftwareComputing Companies Service-Oriented Architecture (SOA) Open Source Database SoftwareEconomic Evolving from SOA to the Cloud Open Source Applications SoftwareStaffing Capacity: Limited Performance Open Source System ManagementShould Your Company Invest in Cloud Availability: Communications Failure and SoftwareComputing? Performance Issues Open Source Load-Balancing Software

Page 93: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

What Should Not be Moved to the Cloud Security: Newer Security Protocols Virtualization as the "Operating System"LANs and the Cloud Provide More Protection Virtualization with a Host OperatingInternet and the Cloud What's Next in Cloud Computing SystemWeb Services, Browsers, and the Cloud Independent Components Virtualization Infections on VirtualizedThin Client Message Base Environments Advances in Networking and Processing Location Independence Type 1 Virtualized EnvironmentSpeeds that Led to Cloud Computing Communication Requirements for Cloud Type 2 Virtualized EnvironmentNetworking Developments Implementation Virtualization Environments Increased Processing Speeds Public Internet Microsoft VirtualizationManaged Service Provider Model to Cloud Private Internet Sun xVM VirtualBoxComputing and Software as a Service Routing to the Datacenter Linux/UNIX Virtualization(SaaS) Switching within the Data Center VMware ProductsSingle Purpose Architectures Migrate to Bandwidth Data Center and Cloud InfrastructureMultipurpose Architectures Tools Used to Measure Network ProductsData Center Virtualization Performance End-User and Desktop Products Collaboration Using the Protocol Analyzer to Measure IBM VirtualizationThe Cloud as a Reach Extender Bandwidth Using VMware to see a Virtualized ServerThe Cloud as a Communication Enabler Using Ping and Traceroute to Measure Environment The Cloud as an Employee Enabler Network Performance Permissive FederationService-Oriented Architecture (SOA) Security Verified FederationEvolving from SOA to the Cloud SSL Encrypted FederationCapacity: Limited Performance VPN Trusted FederationAvailability: Communications Failure and Overhead Using XMPP in the Federated EnvironmentPerformance Issues Storage Options for Cloud Computing Presence in the Cloud Security: Newer Security Protocols Provide Storage Capacity What It IsMore Protection Data Protection and Partitioning Presence ProtocolsWhat's Next in Cloud Computing NAS Leveraging PresenceIndependent Components SAN Presence EnabledMessage Base CAS The Future of PresenceLocation Independence Redundancy The Interrelation of Identity, Presence, andCommunication Requirements for Cloud Replication Location in the CloudImplementation Multisiting Identity Management Public Internet Backup and Recovery What It IsPrivate Internet Server Software Environments that Future of Identity in the CloudRouting to the Datacenter Support Cloud Computing Privacy and Its Relation to Cloud-BasedSwitching within the Data Center Server Capacity Information Systems Bandwidth Virtualization Personal InformationTools Used to Measure Network Clustering Privacy-Related IssuesPerformance Expansion Finding Your Private Information Using the Protocol Analyzer to Measure Server Functions Open Cloud Consortium Working GroupsBandwidth Application Project MatsuUsing Ping and Traceroute to Measure Web Project CometNetwork Performance Database HPC in the CloudSecurity Vendor Approaches to Cloud Computing The Open Cloud TestbedSSL Role of Open Source Software in Data The Open Science Data CloudVPN Center Intercloud Testbed Overhead Cost Reduction vs. Reliability Reporting on an Open Cloud ConsortiumStorage Options for Cloud Computing Open Source Server Software Working Group Storage Capacity Open Source Database Software Distributed Management Task ForceData Protection and Partitioning Open Source Applications Software (DMTF) NAS Open Source System Management What It Is?SAN Software DMTK Working Groups Associated withCAS Open Source Load-Balancing Software Cloud ComputingRedundancy Virtualization as the "Operating System" Standards for Application Developers Replication Virtualization with a Host Operating ProtocolsMultisiting System Scripting LanguagesBackup and Recovery Virtualization Infections on Virtualized Content Formatting Standards andServer Software Environments that Support Environments LanguagesCloud Computing Type 1 Virtualized Environment Standards for Security in the Cloud Server Capacity Type 2 Virtualized Environment Confidentiality, Integrity, AvailabilityVirtualization Virtualization Environments Authentication, Authorization,Clustering Microsoft Virtualization AccountabilityExpansion Sun xVM VirtualBox Regulations for PrivacyServer Functions Linux/UNIX Virtualization Security ProtocolsApplication VMware Products Establishing a Baseline for CloudWeb Data Center and Cloud Infrastructure Performance

Page 94: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Database Products Best Practices for Selecting a Vendor andVendor Approaches to Cloud Computing End-User and Desktop Products Implementing Cloud-Based Applications Role of Open Source Software in Data IBM Virtualization Choosing the Right VendorCenter Using VMware to see a Virtualized Server Implementing Cloud-Based Applications Cost Reduction vs. Reliability Environment Windows Remote DesktopOpen Source Server Software Permissive Federation VncOpen Source Database Software Verified Federation Web BrowsersOpen Source Applications Software Encrypted Federation Server ExtensionsOpen Source System Management Software Trusted Federation Thin ClientsOpen Source Load-Balancing Software Using XMPP in the Federated Smart Phones, Pads, Pods, etc.Virtualization as the "Operating System" Environment Virtual Terminal Security Strengths andVirtualization with a Host Operating System Presence in the Cloud Weaknesses Virtualization Infections on Virtualized What It Is StrengthsEnvironments Presence Protocols Weaknesses Type 1 Virtualized Environment Leveraging Presence AndroidType 2 Virtualized Environment Presence Enabled BlackBerryVirtualization Environments The Future of Presence Windows MobileMicrosoft Virtualization The Interrelation of Identity, Presence, Ubuntu Mobile Internet DeviceSun xVM VirtualBox and Location in the Cloud Mobile Platform Virtualization Linux/UNIX Virtualization Identity Management Kernel-Based Virtual MachineVMware Products What It Is VMware Mobile Virtualization PlatformData Center and Cloud Infrastructure Future of Identity in the Cloud Collaboration Applications for MobileProducts Privacy and Its Relation to Cloud-Based Platforms End-User and Desktop Products Information Systems Text MessagingIBM Virtualization Personal Information iPhone ApplicationsUsing VMware to see a Virtualized Server Privacy-Related Issues BlackBerry ApplicationsEnvironment Finding Your Private Information Droid Applications Permissive Federation Open Cloud Consortium Working GroupsVerified Federation Project MatsuEncrypted Federation Project Comet lineTrusted Federation HPC in the Cloud Cloud Computing InfrastructureUsing XMPP in the Federated Environment The Open Cloud Testbed Cloud Computing TermsPresence in the Cloud The Open Science Data Cloud Benefits and Limitations of CloudWhat It Is Intercloud Testbed Computing Presence Protocols Reporting on an Open Cloud Consortium BenefitsLeveraging Presence Working Group LimitationsPresence Enabled Distributed Management Task Force Cloud Computing Case StudiesThe Future of Presence (DMTF) How Companies Are Using CloudThe Interrelation of Identity, Presence, and What It Is? Computing Location in the Cloud DMTK Working Groups Associated with Implementing Applications and Services inIdentity Management Cloud Computing the CloudWhat It Is Standards for Application Developers Using Your Company's Services vs. theFuture of Identity in the Cloud Protocols Cloud ProviderPrivacy and Its Relation to Cloud-Based Scripting Languages A Cloud Service Provider IntroducedInformation Systems Content Formatting Standards and Cloud Computing Risks and Issues Personal Information Languages Products and Services Provided by CloudPrivacy-Related Issues Standards for Security in the Cloud Computing Companies Finding Your Private Information Confidentiality, Integrity, Availability EconomicOpen Cloud Consortium Working Groups Authentication, Authorization, StaffingProject Matsu Accountability Should Your Company Invest in CloudProject Comet Regulations for Privacy Computing? HPC in the Cloud Security Protocols What Should Not be Moved to the Cloud The Open Cloud Testbed Establishing a Baseline for Cloud LANs and the Cloud The Open Science Data Cloud Performance Internet and the Cloud Intercloud Testbed Best Practices for Selecting a Vendor Web Services, Browsers, and the Cloud Reporting on an Open Cloud Consortium and Implementing Cloud-Based Thin Client Working Group Applications Advances in Networking and ProcessingDistributed Management Task Force Choosing the Right Vendor Speeds that Led to Cloud Computing (DMTF) Implementing Cloud-Based Applications Networking DevelopmentsWhat It Is? Windows Remote Desktop Increased Processing SpeedsDMTK Working Groups Associated with Vnc Managed Service Provider Model to CloudCloud Computing Web Browsers Computing and Software as a ServiceStandards for Application Developers Server Extensions (SaaS) Protocols Thin Clients Single Purpose Architectures Migrate toScripting Languages Smart Phones, Pads, Pods, etc. Multipurpose ArchitecturesContent Formatting Standards and Virtual Terminal Security Strengths and Data Center Virtualization

Page 95: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Languages Weaknesses Collaboration Standards for Security in the Cloud Strengths The Cloud as a Reach ExtenderConfidentiality, Integrity, Availability Weaknesses The Cloud as a Communication EnablerAuthentication, Authorization, Accountability Android The Cloud as an Employee EnablerRegulations for Privacy BlackBerry Service-Oriented Architecture (SOA) Security Protocols Windows Mobile Evolving from SOA to the CloudEstablishing a Baseline for Cloud Ubuntu Mobile Internet Device Capacity: Limited PerformancePerformance Mobile Platform Virtualization Availability: Communications Failure andBest Practices for Selecting a Vendor and Kernel-Based Virtual Machine Performance IssuesImplementing Cloud-Based Applications VMware Mobile Virtualization Platform Security: Newer Security Protocols ProvideChoosing the Right Vendor Collaboration Applications for Mobile More ProtectionImplementing Cloud-Based Applications Platforms What's Next in Cloud Computing Windows Remote Desktop Text Messaging Independent ComponentsVnc iPhone Applications Message BaseWeb Browsers BlackBerry Applications Location IndependenceServer Extensions Droid Applications Communication Requirements for CloudThin Clients Implementation Smart Phones, Pads, Pods, etc. Public InternetVirtual Terminal Security Strengths and line Private InternetWeaknesses Cloud Computing Infrastructure Routing to the DatacenterStrengths Cloud Computing Terms Switching within the Data CenterWeaknesses Benefits and Limitations of Cloud Bandwidth Android Computing Tools Used to Measure NetworkBlackBerry Benefits Performance Windows Mobile Limitations Using the Protocol Analyzer to MeasureUbuntu Mobile Internet Device Cloud Computing Case Studies Bandwidth Mobile Platform Virtualization How Companies Are Using Cloud Using Ping and Traceroute to MeasureKernel-Based Virtual Machine Computing Network Performance VMware Mobile Virtualization Platform Implementing Applications and Services SecurityCollaboration Applications for Mobile in the Cloud SSLPlatforms Using Your Company's Services vs. the VPN Text Messaging Cloud Provider Overhead iPhone Applications A Cloud Service Provider Introduced Storage Options for Cloud Computing BlackBerry Applications Cloud Computing Risks and Issues Storage CapacityDroid Applications Products and Services Provided by Cloud Data Protection and Partitioning

Computing Companies NASEconomic SAN

line Staffing CASCloud Computing Infrastructure Should Your Company Invest in Cloud RedundancyCloud Computing Terms Computing? ReplicationBenefits and Limitations of Cloud Computing What Should Not be Moved to the Cloud Multisiting Benefits LANs and the Cloud Backup and Recovery Limitations Internet and the Cloud Server Software Environments thatCloud Computing Case Studies Web Services, Browsers, and the Cloud Support Cloud Computing How Companies Are Using Cloud Thin Client Server CapacityComputing Advances in Networking and Processing VirtualizationImplementing Applications and Services in Speeds that Led to Cloud Computing Clusteringthe Cloud Networking Developments ExpansionUsing Your Company's Services vs. the Increased Processing Speeds Server FunctionsCloud Provider Managed Service Provider Model to ApplicationA Cloud Service Provider Introduced Cloud Computing and Software as a Web Cloud Computing Risks and Issues Service (SaaS) Database Products and Services Provided by Cloud Single Purpose Architectures Migrate to Vendor Approaches to Cloud Computing Computing Companies Multipurpose Architectures Role of Open Source Software in DataEconomic Data Center Virtualization Center Staffing Collaboration Cost Reduction vs. ReliabilityShould Your Company Invest in Cloud The Cloud as a Reach Extender Open Source Server SoftwareComputing? The Cloud as a Communication Enabler Open Source Database SoftwareWhat Should Not be Moved to the Cloud The Cloud as an Employee Enabler Open Source Applications SoftwareLANs and the Cloud Service-Oriented Architecture (SOA) Open Source System ManagementInternet and the Cloud Evolving from SOA to the Cloud SoftwareWeb Services, Browsers, and the Cloud Capacity: Limited Performance Open Source Load-Balancing Software Thin Client Availability: Communications Failure and Virtualization as the "Operating System"Advances in Networking and Processing Performance Issues Virtualization with a Host OperatingSpeeds that Led to Cloud Computing Security: Newer Security Protocols SystemNetworking Developments Provide More Protection Virtualization Infections on Virtualized

Page 96: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Increased Processing Speeds What's Next in Cloud Computing Environments Managed Service Provider Model to Cloud Independent Components Type 1 Virtualized EnvironmentComputing and Software as a Service Message Base Type 2 Virtualized Environment(SaaS) Location Independence Virtualization Environments Single Purpose Architectures Migrate to Communication Requirements for Cloud Microsoft VirtualizationMultipurpose Architectures Implementation Sun xVM VirtualBoxData Center Virtualization Public Internet Linux/UNIX VirtualizationCollaboration Private Internet VMware ProductsThe Cloud as a Reach Extender Routing to the Datacenter Data Center and Cloud InfrastructureThe Cloud as a Communication Enabler Switching within the Data Center ProductsThe Cloud as an Employee Enabler Bandwidth End-User and Desktop Products Service-Oriented Architecture (SOA) Tools Used to Measure Network IBM VirtualizationEvolving from SOA to the Cloud Performance Using VMware to see a Virtualized ServerCapacity: Limited Performance Using the Protocol Analyzer to Measure Environment Availability: Communications Failure and Bandwidth Permissive FederationPerformance Issues Using Ping and Traceroute to Measure Verified FederationSecurity: Newer Security Protocols Provide Network Performance Encrypted FederationMore Protection Security Trusted FederationWhat's Next in Cloud Computing SSL Using XMPP in the Federated EnvironmentIndependent Components VPN Presence in the Cloud Message Base Overhead What It IsLocation Independence Storage Options for Cloud Computing Presence ProtocolsCommunication Requirements for Cloud Storage Capacity Leveraging PresenceImplementation Data Protection and Partitioning Presence EnabledPublic Internet NAS The Future of PresencePrivate Internet SAN The Interrelation of Identity, Presence, andRouting to the Datacenter CAS Location in the CloudSwitching within the Data Center Redundancy Identity Management Bandwidth Replication What It IsTools Used to Measure Network Multisiting Future of Identity in the CloudPerformance Backup and Recovery Privacy and Its Relation to Cloud-BasedUsing the Protocol Analyzer to Measure Server Software Environments that Information Systems Bandwidth Support Cloud Computing Personal InformationUsing Ping and Traceroute to Measure Server Capacity Privacy-Related IssuesNetwork Performance Virtualization Finding Your Private Information Security Clustering Open Cloud Consortium Working GroupsSSL Expansion Project MatsuVPN Server Functions Project CometOverhead Application HPC in the CloudStorage Options for Cloud Computing Web The Open Cloud TestbedStorage Capacity Database The Open Science Data CloudData Protection and Partitioning Vendor Approaches to Cloud Computing Intercloud Testbed NAS Role of Open Source Software in Data Reporting on an Open Cloud ConsortiumSAN Center Working Group CAS Cost Reduction vs. Reliability Distributed Management Task ForceRedundancy Open Source Server Software (DMTF) Replication Open Source Database Software What It Is?Multisiting Open Source Applications Software DMTK Working Groups Associated withBackup and Recovery Open Source System Management Cloud ComputingServer Software Environments that Support Software Standards for Application Developers Cloud Computing Open Source Load-Balancing Software ProtocolsServer Capacity Virtualization as the "Operating System" Scripting LanguagesVirtualization Virtualization with a Host Operating Content Formatting Standards andClustering System LanguagesExpansion Virtualization Infections on Virtualized Standards for Security in the Cloud Server Functions Environments Confidentiality, Integrity, AvailabilityApplication Type 1 Virtualized Environment Authentication, Authorization,Web Type 2 Virtualized Environment AccountabilityDatabase Virtualization Environments Regulations for PrivacyVendor Approaches to Cloud Computing Microsoft Virtualization Security ProtocolsRole of Open Source Software in Data Sun xVM VirtualBox Establishing a Baseline for CloudCenter Linux/UNIX Virtualization Performance Cost Reduction vs. Reliability VMware Products Best Practices for Selecting a Vendor andOpen Source Server Software Data Center and Cloud Infrastructure Implementing Cloud-Based Applications Open Source Database Software Products Choosing the Right VendorOpen Source Applications Software End-User and Desktop Products Implementing Cloud-Based Applications

Page 97: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Open Source System Management Software IBM Virtualization Windows Remote DesktopOpen Source Load-Balancing Software Using VMware to see a Virtualized Server VncVirtualization as the "Operating System" Environment Web BrowsersVirtualization with a Host Operating System Permissive Federation Server ExtensionsVirtualization Infections on Virtualized Verified Federation Thin ClientsEnvironments Encrypted Federation Smart Phones, Pads, Pods, etc.Type 1 Virtualized Environment Trusted Federation Virtual Terminal Security Strengths andType 2 Virtualized Environment Using XMPP in the Federated Weaknesses Virtualization Environments Environment StrengthsMicrosoft Virtualization Presence in the Cloud Weaknesses Sun xVM VirtualBox What It Is AndroidLinux/UNIX Virtualization Presence Protocols BlackBerryVMware Products Leveraging Presence Windows MobileData Center and Cloud Infrastructure Presence Enabled Ubuntu Mobile Internet DeviceProducts The Future of Presence Mobile Platform Virtualization End-User and Desktop Products The Interrelation of Identity, Presence, Kernel-Based Virtual MachineIBM Virtualization and Location in the Cloud VMware Mobile Virtualization PlatformUsing VMware to see a Virtualized Server Identity Management Collaboration Applications for MobileEnvironment What It Is Platforms Permissive Federation Future of Identity in the Cloud Text MessagingVerified Federation Privacy and Its Relation to Cloud-Based iPhone ApplicationsEncrypted Federation Information Systems BlackBerry ApplicationsTrusted Federation Personal Information Droid Applications Using XMPP in the Federated Environment Privacy-Related IssuesPresence in the Cloud Finding Your Private Information What It Is Open Cloud Consortium Working Groups linePresence Protocols Project Matsu Cloud Computing InfrastructureLeveraging Presence Project Comet Cloud Computing TermsPresence Enabled HPC in the Cloud Benefits and Limitations of CloudThe Future of Presence The Open Cloud Testbed Computing The Interrelation of Identity, Presence, and The Open Science Data Cloud BenefitsLocation in the Cloud Intercloud Testbed LimitationsIdentity Management Reporting on an Open Cloud Consortium Cloud Computing Case StudiesWhat It Is Working Group How Companies Are Using CloudFuture of Identity in the Cloud Distributed Management Task Force Computing Privacy and Its Relation to Cloud-Based (DMTF) Implementing Applications and Services inInformation Systems What It Is? the CloudPersonal Information DMTK Working Groups Associated with Using Your Company's Services vs. thePrivacy-Related Issues Cloud Computing Cloud ProviderFinding Your Private Information Standards for Application Developers A Cloud Service Provider IntroducedOpen Cloud Consortium Working Groups Protocols Cloud Computing Risks and Issues Project Matsu Scripting Languages Products and Services Provided by CloudProject Comet Content Formatting Standards and Computing Companies HPC in the Cloud Languages EconomicThe Open Cloud Testbed Standards for Security in the Cloud StaffingThe Open Science Data Cloud Confidentiality, Integrity, Availability Should Your Company Invest in CloudIntercloud Testbed Authentication, Authorization, Computing? Reporting on an Open Cloud Consortium Accountability What Should Not be Moved to the Cloud Working Group Regulations for Privacy LANs and the Cloud Distributed Management Task Force Security Protocols Internet and the Cloud (DMTF) Establishing a Baseline for Cloud Web Services, Browsers, and the Cloud What It Is? Performance Thin Client DMTK Working Groups Associated with Best Practices for Selecting a Vendor Advances in Networking and ProcessingCloud Computing and Implementing Cloud-Based Speeds that Led to Cloud Computing Standards for Application Developers Applications Networking DevelopmentsProtocols Choosing the Right Vendor Increased Processing SpeedsScripting Languages Implementing Cloud-Based Applications Managed Service Provider Model to CloudContent Formatting Standards and Windows Remote Desktop Computing and Software as a ServiceLanguages Vnc (SaaS) Standards for Security in the Cloud Web Browsers Single Purpose Architectures Migrate toConfidentiality, Integrity, Availability Server Extensions Multipurpose ArchitecturesAuthentication, Authorization, Accountability Thin Clients Data Center VirtualizationRegulations for Privacy Smart Phones, Pads, Pods, etc. Collaboration Security Protocols Virtual Terminal Security Strengths and The Cloud as a Reach ExtenderEstablishing a Baseline for Cloud Weaknesses The Cloud as a Communication EnablerPerformance Strengths The Cloud as an Employee Enabler

Page 98: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Best Practices for Selecting a Vendor and Weaknesses Service-Oriented Architecture (SOA) Implementing Cloud-Based Applications Android Evolving from SOA to the CloudChoosing the Right Vendor BlackBerry Capacity: Limited PerformanceImplementing Cloud-Based Applications Windows Mobile Availability: Communications Failure andWindows Remote Desktop Ubuntu Mobile Internet Device Performance IssuesVnc Mobile Platform Virtualization Security: Newer Security Protocols ProvideWeb Browsers Kernel-Based Virtual Machine More ProtectionServer Extensions VMware Mobile Virtualization Platform What's Next in Cloud Computing Thin Clients Collaboration Applications for Mobile Independent ComponentsSmart Phones, Pads, Pods, etc. Platforms Message BaseVirtual Terminal Security Strengths and Text Messaging Location IndependenceWeaknesses iPhone Applications Communication Requirements for CloudStrengths BlackBerry Applications Implementation Weaknesses Droid Applications Public InternetAndroid Private InternetBlackBerry Routing to the DatacenterWindows Mobile line Switching within the Data CenterUbuntu Mobile Internet Device Cloud Computing Infrastructure Bandwidth Mobile Platform Virtualization Cloud Computing Terms Tools Used to Measure NetworkKernel-Based Virtual Machine Benefits and Limitations of Cloud Performance VMware Mobile Virtualization Platform Computing Using the Protocol Analyzer to MeasureCollaboration Applications for Mobile Benefits Bandwidth Platforms Limitations Using Ping and Traceroute to MeasureText Messaging Cloud Computing Case Studies Network Performance iPhone Applications How Companies Are Using Cloud SecurityBlackBerry Applications Computing SSLDroid Applications Implementing Applications and Services VPN

in the Cloud Overhead Using Your Company's Services vs. the Storage Options for Cloud Computing

line Cloud Provider Storage CapacityCloud Computing Infrastructure A Cloud Service Provider Introduced Data Protection and PartitioningCloud Computing Terms Cloud Computing Risks and Issues NASBenefits and Limitations of Cloud Computing Products and Services Provided by Cloud SANBenefits Computing Companies CASLimitations Economic RedundancyCloud Computing Case Studies Staffing ReplicationHow Companies Are Using Cloud Should Your Company Invest in Cloud Multisiting Computing Computing? Backup and Recovery Implementing Applications and Services in What Should Not be Moved to the Cloud Server Software Environments thatthe Cloud LANs and the Cloud Support Cloud Computing Using Your Company's Services vs. the Internet and the Cloud Server CapacityCloud Provider Web Services, Browsers, and the Cloud VirtualizationA Cloud Service Provider Introduced Thin Client ClusteringCloud Computing Risks and Issues Advances in Networking and Processing ExpansionProducts and Services Provided by Cloud Speeds that Led to Cloud Computing Server FunctionsComputing Companies Networking Developments ApplicationEconomic Increased Processing Speeds Web Staffing Managed Service Provider Model to Database Should Your Company Invest in Cloud Cloud Computing and Software as a Vendor Approaches to Cloud Computing Computing? Service (SaaS) Role of Open Source Software in DataWhat Should Not be Moved to the Cloud Single Purpose Architectures Migrate to Center LANs and the Cloud Multipurpose Architectures Cost Reduction vs. ReliabilityInternet and the Cloud Data Center Virtualization Open Source Server SoftwareWeb Services, Browsers, and the Cloud Collaboration Open Source Database SoftwareThin Client The Cloud as a Reach Extender Open Source Applications SoftwareAdvances in Networking and Processing The Cloud as a Communication Enabler Open Source System ManagementSpeeds that Led to Cloud Computing The Cloud as an Employee Enabler SoftwareNetworking Developments Service-Oriented Architecture (SOA) Open Source Load-Balancing Software Increased Processing Speeds Evolving from SOA to the Cloud Virtualization as the "Operating System"Managed Service Provider Model to Cloud Capacity: Limited Performance Virtualization with a Host OperatingComputing and Software as a Service Availability: Communications Failure and System(SaaS) Performance Issues Virtualization Infections on VirtualizedSingle Purpose Architectures Migrate to Security: Newer Security Protocols Environments Multipurpose Architectures Provide More Protection Type 1 Virtualized EnvironmentData Center Virtualization What's Next in Cloud Computing Type 2 Virtualized EnvironmentCollaboration Independent Components Virtualization Environments

Page 99: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Cloud as a Reach Extender Message Base Microsoft VirtualizationThe Cloud as a Communication Enabler Location Independence Sun xVM VirtualBoxThe Cloud as an Employee Enabler Communication Requirements for Cloud Linux/UNIX VirtualizationService-Oriented Architecture (SOA) Implementation VMware ProductsEvolving from SOA to the Cloud Public Internet Data Center and Cloud InfrastructureCapacity: Limited Performance Private Internet ProductsAvailability: Communications Failure and Routing to the Datacenter End-User and Desktop Products Performance Issues Switching within the Data Center IBM VirtualizationSecurity: Newer Security Protocols Provide Bandwidth Using VMware to see a Virtualized ServerMore Protection Tools Used to Measure Network Environment What's Next in Cloud Computing Performance Permissive FederationIndependent Components Using the Protocol Analyzer to Measure Verified FederationMessage Base Bandwidth Encrypted FederationLocation Independence Using Ping and Traceroute to Measure Trusted FederationCommunication Requirements for Cloud Network Performance Using XMPP in the Federated EnvironmentImplementation Security Presence in the Cloud Public Internet SSL What It IsPrivate Internet VPN Presence ProtocolsRouting to the Datacenter Overhead Leveraging PresenceSwitching within the Data Center Storage Options for Cloud Computing Presence EnabledBandwidth Storage Capacity The Future of PresenceTools Used to Measure Network Data Protection and Partitioning The Interrelation of Identity, Presence, andPerformance NAS Location in the CloudUsing the Protocol Analyzer to Measure SAN Identity Management Bandwidth CAS What It IsUsing Ping and Traceroute to Measure Redundancy Future of Identity in the CloudNetwork Performance Replication Privacy and Its Relation to Cloud-BasedSecurity Multisiting Information Systems SSL Backup and Recovery Personal InformationVPN Server Software Environments that Privacy-Related IssuesOverhead Support Cloud Computing Finding Your Private Information Storage Options for Cloud Computing Server Capacity Open Cloud Consortium Working GroupsStorage Capacity Virtualization Project MatsuData Protection and Partitioning Clustering Project CometNAS Expansion HPC in the CloudSAN Server Functions The Open Cloud TestbedCAS Application The Open Science Data CloudRedundancy Web Intercloud Testbed Replication Database Reporting on an Open Cloud ConsortiumMultisiting Vendor Approaches to Cloud Computing Working Group Backup and Recovery Role of Open Source Software in Data Distributed Management Task ForceServer Software Environments that Support Center (DMTF) Cloud Computing Cost Reduction vs. Reliability What It Is?Server Capacity Open Source Server Software DMTK Working Groups Associated withVirtualization Open Source Database Software Cloud ComputingClustering Open Source Applications Software Standards for Application Developers Expansion Open Source System Management ProtocolsServer Functions Software Scripting LanguagesApplication Open Source Load-Balancing Software Content Formatting Standards andWeb Virtualization as the "Operating System" LanguagesDatabase Virtualization with a Host Operating Standards for Security in the Cloud Vendor Approaches to Cloud Computing System Confidentiality, Integrity, AvailabilityRole of Open Source Software in Data Virtualization Infections on Virtualized Authentication, Authorization,Center Environments AccountabilityCost Reduction vs. Reliability Type 1 Virtualized Environment Regulations for PrivacyOpen Source Server Software Type 2 Virtualized Environment Security ProtocolsOpen Source Database Software Virtualization Environments Establishing a Baseline for CloudOpen Source Applications Software Microsoft Virtualization Performance Open Source System Management Software Sun xVM VirtualBox Best Practices for Selecting a Vendor andOpen Source Load-Balancing Software Linux/UNIX Virtualization Implementing Cloud-Based Applications Virtualization as the "Operating System" VMware Products Choosing the Right VendorVirtualization with a Host Operating System Data Center and Cloud Infrastructure Implementing Cloud-Based Applications Virtualization Infections on Virtualized Products Windows Remote DesktopEnvironments End-User and Desktop Products VncType 1 Virtualized Environment IBM Virtualization Web BrowsersType 2 Virtualized Environment Using VMware to see a Virtualized Server Server Extensions

Page 100: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Virtualization Environments Environment Thin ClientsMicrosoft Virtualization Permissive Federation Smart Phones, Pads, Pods, etc.Sun xVM VirtualBox Verified Federation Virtual Terminal Security Strengths andLinux/UNIX Virtualization Encrypted Federation Weaknesses VMware Products Trusted Federation StrengthsData Center and Cloud Infrastructure Using XMPP in the Federated Weaknesses Products Environment AndroidEnd-User and Desktop Products Presence in the Cloud BlackBerryIBM Virtualization What It Is Windows MobileUsing VMware to see a Virtualized Server Presence Protocols Ubuntu Mobile Internet DeviceEnvironment Leveraging Presence Mobile Platform Virtualization Permissive Federation Presence Enabled Kernel-Based Virtual MachineVerified Federation The Future of Presence VMware Mobile Virtualization PlatformEncrypted Federation The Interrelation of Identity, Presence, Collaboration Applications for MobileTrusted Federation and Location in the Cloud Platforms Using XMPP in the Federated Environment Identity Management Text MessagingPresence in the Cloud What It Is iPhone ApplicationsWhat It Is Future of Identity in the Cloud BlackBerry ApplicationsPresence Protocols Privacy and Its Relation to Cloud-Based Droid Applications Leveraging Presence Information Systems Presence Enabled Personal InformationThe Future of Presence Privacy-Related Issues lineThe Interrelation of Identity, Presence, and Finding Your Private Information Cloud Computing InfrastructureLocation in the Cloud Open Cloud Consortium Working Groups Cloud Computing TermsIdentity Management Project Matsu Benefits and Limitations of CloudWhat It Is Project Comet Computing Future of Identity in the Cloud HPC in the Cloud BenefitsPrivacy and Its Relation to Cloud-Based The Open Cloud Testbed LimitationsInformation Systems The Open Science Data Cloud Cloud Computing Case StudiesPersonal Information Intercloud Testbed How Companies Are Using CloudPrivacy-Related Issues Reporting on an Open Cloud Consortium Computing Finding Your Private Information Working Group Implementing Applications and Services inOpen Cloud Consortium Working Groups Distributed Management Task Force the CloudProject Matsu (DMTF) Using Your Company's Services vs. theProject Comet What It Is? Cloud ProviderHPC in the Cloud DMTK Working Groups Associated with A Cloud Service Provider IntroducedThe Open Cloud Testbed Cloud Computing Cloud Computing Risks and Issues The Open Science Data Cloud Standards for Application Developers Products and Services Provided by CloudIntercloud Testbed Protocols Computing Companies Reporting on an Open Cloud Consortium Scripting Languages EconomicWorking Group Content Formatting Standards and StaffingDistributed Management Task Force Languages Should Your Company Invest in Cloud(DMTF) Standards for Security in the Cloud Computing? What It Is? Confidentiality, Integrity, Availability What Should Not be Moved to the Cloud DMTK Working Groups Associated with Authentication, Authorization, LANs and the Cloud Cloud Computing Accountability Internet and the Cloud Standards for Application Developers Regulations for Privacy Web Services, Browsers, and the Cloud Protocols Security Protocols Thin Client Scripting Languages Establishing a Baseline for Cloud Advances in Networking and ProcessingContent Formatting Standards and Performance Speeds that Led to Cloud Computing Languages Best Practices for Selecting a Vendor Networking DevelopmentsStandards for Security in the Cloud and Implementing Cloud-Based Increased Processing SpeedsConfidentiality, Integrity, Availability Applications Managed Service Provider Model to CloudAuthentication, Authorization, Accountability Choosing the Right Vendor Computing and Software as a ServiceRegulations for Privacy Implementing Cloud-Based Applications (SaaS) Security Protocols Windows Remote Desktop Single Purpose Architectures Migrate toEstablishing a Baseline for Cloud Vnc Multipurpose ArchitecturesPerformance Web Browsers Data Center VirtualizationBest Practices for Selecting a Vendor and Server Extensions Collaboration Implementing Cloud-Based Applications Thin Clients The Cloud as a Reach ExtenderChoosing the Right Vendor Smart Phones, Pads, Pods, etc. The Cloud as a Communication EnablerImplementing Cloud-Based Applications Virtual Terminal Security Strengths and The Cloud as an Employee EnablerWindows Remote Desktop Weaknesses Service-Oriented Architecture (SOA) Vnc Strengths Evolving from SOA to the CloudWeb Browsers Weaknesses Capacity: Limited PerformanceServer Extensions Android Availability: Communications Failure and

Page 101: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Thin Clients BlackBerry Performance IssuesSmart Phones, Pads, Pods, etc. Windows Mobile Security: Newer Security Protocols ProvideVirtual Terminal Security Strengths and Ubuntu Mobile Internet Device More ProtectionWeaknesses Mobile Platform Virtualization What's Next in Cloud Computing Strengths Kernel-Based Virtual Machine Independent ComponentsWeaknesses VMware Mobile Virtualization Platform Message BaseAndroid Collaboration Applications for Mobile Location IndependenceBlackBerry Platforms Communication Requirements for CloudWindows Mobile Text Messaging Implementation Ubuntu Mobile Internet Device iPhone Applications Public InternetMobile Platform Virtualization BlackBerry Applications Private InternetKernel-Based Virtual Machine Droid Applications Routing to the DatacenterVMware Mobile Virtualization Platform Switching within the Data CenterCollaboration Applications for Mobile Bandwidth Platforms line Tools Used to Measure NetworkText Messaging Cloud Computing Infrastructure Performance iPhone Applications Cloud Computing Terms Using the Protocol Analyzer to MeasureBlackBerry Applications Benefits and Limitations of Cloud Bandwidth Droid Applications Computing Using Ping and Traceroute to Measure

Benefits Network Performance Limitations Security

line Cloud Computing Case Studies SSLCloud Computing Infrastructure How Companies Are Using Cloud VPN Cloud Computing Terms Computing Overhead Benefits and Limitations of Cloud Computing Implementing Applications and Services Storage Options for Cloud Computing Benefits in the Cloud Storage CapacityLimitations Using Your Company's Services vs. the Data Protection and PartitioningCloud Computing Case Studies Cloud Provider NASHow Companies Are Using Cloud A Cloud Service Provider Introduced SANComputing Cloud Computing Risks and Issues CASImplementing Applications and Services in Products and Services Provided by Cloud Redundancythe Cloud Computing Companies ReplicationUsing Your Company's Services vs. the Economic Multisiting Cloud Provider Staffing Backup and Recovery A Cloud Service Provider Introduced Should Your Company Invest in Cloud Server Software Environments thatCloud Computing Risks and Issues Computing? Support Cloud Computing Products and Services Provided by Cloud What Should Not be Moved to the Cloud Server CapacityComputing Companies LANs and the Cloud VirtualizationEconomic Internet and the Cloud ClusteringStaffing Web Services, Browsers, and the Cloud ExpansionShould Your Company Invest in Cloud Thin Client Server FunctionsComputing? Advances in Networking and Processing ApplicationWhat Should Not be Moved to the Cloud Speeds that Led to Cloud Computing Web LANs and the Cloud Networking Developments Database Internet and the Cloud Increased Processing Speeds Vendor Approaches to Cloud Computing Web Services, Browsers, and the Cloud Managed Service Provider Model to Role of Open Source Software in DataThin Client Cloud Computing and Software as a Center Advances in Networking and Processing Service (SaaS) Cost Reduction vs. ReliabilitySpeeds that Led to Cloud Computing Single Purpose Architectures Migrate to Open Source Server SoftwareNetworking Developments Multipurpose Architectures Open Source Database SoftwareIncreased Processing Speeds Data Center Virtualization Open Source Applications SoftwareManaged Service Provider Model to Cloud Collaboration Open Source System ManagementComputing and Software as a Service The Cloud as a Reach Extender Software(SaaS) The Cloud as a Communication Enabler Open Source Load-Balancing Software Single Purpose Architectures Migrate to The Cloud as an Employee Enabler Virtualization as the "Operating System"Multipurpose Architectures Service-Oriented Architecture (SOA) Virtualization with a Host OperatingData Center Virtualization Evolving from SOA to the Cloud SystemCollaboration Capacity: Limited Performance Virtualization Infections on VirtualizedThe Cloud as a Reach Extender Availability: Communications Failure and Environments The Cloud as a Communication Enabler Performance Issues Type 1 Virtualized EnvironmentThe Cloud as an Employee Enabler Security: Newer Security Protocols Type 2 Virtualized EnvironmentService-Oriented Architecture (SOA) Provide More Protection Virtualization Environments Evolving from SOA to the Cloud What's Next in Cloud Computing Microsoft VirtualizationCapacity: Limited Performance Independent Components Sun xVM VirtualBoxAvailability: Communications Failure and Message Base Linux/UNIX VirtualizationPerformance Issues Location Independence VMware Products

Page 102: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Security: Newer Security Protocols Provide Communication Requirements for Cloud Data Center and Cloud InfrastructureMore Protection Implementation ProductsWhat's Next in Cloud Computing Public Internet End-User and Desktop Products Independent Components Private Internet IBM VirtualizationMessage Base Routing to the Datacenter Using VMware to see a Virtualized ServerLocation Independence Switching within the Data Center Environment Communication Requirements for Cloud Bandwidth Permissive FederationImplementation Tools Used to Measure Network Verified FederationPublic Internet Performance Encrypted FederationPrivate Internet Using the Protocol Analyzer to Measure Trusted FederationRouting to the Datacenter Bandwidth Using XMPP in the Federated EnvironmentSwitching within the Data Center Using Ping and Traceroute to Measure Presence in the Cloud Bandwidth Network Performance What It IsTools Used to Measure Network Security Presence ProtocolsPerformance SSL Leveraging PresenceUsing the Protocol Analyzer to Measure VPN Presence EnabledBandwidth Overhead The Future of PresenceUsing Ping and Traceroute to Measure Storage Options for Cloud Computing The Interrelation of Identity, Presence, andNetwork Performance Storage Capacity Location in the CloudSecurity Data Protection and Partitioning Identity Management SSL NAS What It IsVPN SAN Future of Identity in the CloudOverhead CAS Privacy and Its Relation to Cloud-BasedStorage Options for Cloud Computing Redundancy Information Systems Storage Capacity Replication Personal InformationData Protection and Partitioning Multisiting Privacy-Related IssuesNAS Backup and Recovery Finding Your Private Information SAN Server Software Environments that Open Cloud Consortium Working GroupsCAS Support Cloud Computing Project MatsuRedundancy Server Capacity Project CometReplication Virtualization HPC in the CloudMultisiting Clustering The Open Cloud TestbedBackup and Recovery Expansion The Open Science Data CloudServer Software Environments that Support Server Functions Intercloud Testbed Cloud Computing Application Reporting on an Open Cloud ConsortiumServer Capacity Web Working Group Virtualization Database Distributed Management Task ForceClustering Vendor Approaches to Cloud Computing (DMTF) Expansion Role of Open Source Software in Data What It Is?Server Functions Center DMTK Working Groups Associated withApplication Cost Reduction vs. Reliability Cloud ComputingWeb Open Source Server Software Standards for Application Developers Database Open Source Database Software ProtocolsVendor Approaches to Cloud Computing Open Source Applications Software Scripting LanguagesRole of Open Source Software in Data Open Source System Management Content Formatting Standards andCenter Software LanguagesCost Reduction vs. Reliability Open Source Load-Balancing Software Standards for Security in the Cloud Open Source Server Software Virtualization as the "Operating System" Confidentiality, Integrity, AvailabilityOpen Source Database Software Virtualization with a Host Operating Authentication, Authorization,Open Source Applications Software System AccountabilityOpen Source System Management Software Virtualization Infections on Virtualized Regulations for PrivacyOpen Source Load-Balancing Software Environments Security ProtocolsVirtualization as the "Operating System" Type 1 Virtualized Environment Establishing a Baseline for CloudVirtualization with a Host Operating System Type 2 Virtualized Environment Performance Virtualization Infections on Virtualized Virtualization Environments Best Practices for Selecting a Vendor andEnvironments Microsoft Virtualization Implementing Cloud-Based Applications Type 1 Virtualized Environment Sun xVM VirtualBox Choosing the Right VendorType 2 Virtualized Environment Linux/UNIX Virtualization Implementing Cloud-Based Applications Virtualization Environments VMware Products Windows Remote DesktopMicrosoft Virtualization Data Center and Cloud Infrastructure VncSun xVM VirtualBox Products Web BrowsersLinux/UNIX Virtualization End-User and Desktop Products Server ExtensionsVMware Products IBM Virtualization Thin ClientsData Center and Cloud Infrastructure Using VMware to see a Virtualized Server Smart Phones, Pads, Pods, etc.Products Environment Virtual Terminal Security Strengths andEnd-User and Desktop Products Permissive Federation Weaknesses

Page 103: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

IBM Virtualization Verified Federation StrengthsUsing VMware to see a Virtualized Server Encrypted Federation Weaknesses Environment Trusted Federation AndroidPermissive Federation Using XMPP in the Federated BlackBerryVerified Federation Environment Windows MobileEncrypted Federation Presence in the Cloud Ubuntu Mobile Internet DeviceTrusted Federation What It Is Mobile Platform Virtualization Using XMPP in the Federated Environment Presence Protocols Kernel-Based Virtual MachinePresence in the Cloud Leveraging Presence VMware Mobile Virtualization PlatformWhat It Is Presence Enabled Collaboration Applications for MobilePresence Protocols The Future of Presence Platforms Leveraging Presence The Interrelation of Identity, Presence, Text MessagingPresence Enabled and Location in the Cloud iPhone ApplicationsThe Future of Presence Identity Management BlackBerry ApplicationsThe Interrelation of Identity, Presence, and What It Is Droid Applications Location in the Cloud Future of Identity in the CloudIdentity Management Privacy and Its Relation to Cloud-BasedWhat It Is Information Systems lineFuture of Identity in the Cloud Personal Information Cloud Computing InfrastructurePrivacy and Its Relation to Cloud-Based Privacy-Related Issues Cloud Computing TermsInformation Systems Finding Your Private Information Benefits and Limitations of CloudPersonal Information Open Cloud Consortium Working Groups Computing Privacy-Related Issues Project Matsu BenefitsFinding Your Private Information Project Comet LimitationsOpen Cloud Consortium Working Groups HPC in the Cloud Cloud Computing Case StudiesProject Matsu The Open Cloud Testbed How Companies Are Using CloudProject Comet The Open Science Data Cloud Computing HPC in the Cloud Intercloud Testbed Implementing Applications and Services inThe Open Cloud Testbed Reporting on an Open Cloud Consortium the CloudThe Open Science Data Cloud Working Group Using Your Company's Services vs. theIntercloud Testbed Distributed Management Task Force Cloud ProviderReporting on an Open Cloud Consortium (DMTF) A Cloud Service Provider IntroducedWorking Group What It Is? Cloud Computing Risks and Issues Distributed Management Task Force DMTK Working Groups Associated with Products and Services Provided by Cloud(DMTF) Cloud Computing Computing Companies What It Is? Standards for Application Developers EconomicDMTK Working Groups Associated with Protocols StaffingCloud Computing Scripting Languages Should Your Company Invest in CloudStandards for Application Developers Content Formatting Standards and Computing? Protocols Languages What Should Not be Moved to the Cloud Scripting Languages Standards for Security in the Cloud LANs and the Cloud Content Formatting Standards and Confidentiality, Integrity, Availability Internet and the Cloud Languages Authentication, Authorization, Web Services, Browsers, and the Cloud Standards for Security in the Cloud Accountability Thin Client Confidentiality, Integrity, Availability Regulations for Privacy Advances in Networking and ProcessingAuthentication, Authorization, Accountability Security Protocols Speeds that Led to Cloud Computing Regulations for Privacy Establishing a Baseline for Cloud Networking DevelopmentsSecurity Protocols Performance Increased Processing SpeedsEstablishing a Baseline for Cloud Best Practices for Selecting a Vendor Managed Service Provider Model to CloudPerformance and Implementing Cloud-Based Computing and Software as a ServiceBest Practices for Selecting a Vendor and Applications (SaaS) Implementing Cloud-Based Applications Choosing the Right Vendor Single Purpose Architectures Migrate toChoosing the Right Vendor Implementing Cloud-Based Applications Multipurpose ArchitecturesImplementing Cloud-Based Applications Windows Remote Desktop Data Center VirtualizationWindows Remote Desktop Vnc Collaboration Vnc Web Browsers The Cloud as a Reach ExtenderWeb Browsers Server Extensions The Cloud as a Communication EnablerServer Extensions Thin Clients The Cloud as an Employee EnablerThin Clients Smart Phones, Pads, Pods, etc. Service-Oriented Architecture (SOA) Smart Phones, Pads, Pods, etc. Virtual Terminal Security Strengths and Evolving from SOA to the CloudVirtual Terminal Security Strengths and Weaknesses Capacity: Limited PerformanceWeaknesses Strengths Availability: Communications Failure andStrengths Weaknesses Performance IssuesWeaknesses Android Security: Newer Security Protocols ProvideAndroid BlackBerry More ProtectionBlackBerry Windows Mobile What's Next in Cloud Computing

Page 104: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Windows Mobile Ubuntu Mobile Internet Device Independent ComponentsUbuntu Mobile Internet Device Mobile Platform Virtualization Message BaseMobile Platform Virtualization Kernel-Based Virtual Machine Location IndependenceKernel-Based Virtual Machine VMware Mobile Virtualization Platform Communication Requirements for CloudVMware Mobile Virtualization Platform Collaboration Applications for Mobile Implementation Collaboration Applications for Mobile Platforms Public InternetPlatforms Text Messaging Private InternetText Messaging iPhone Applications Routing to the DatacenteriPhone Applications BlackBerry Applications Switching within the Data CenterBlackBerry Applications Droid Applications Bandwidth Droid Applications Tools Used to Measure Network

Performance line Using the Protocol Analyzer to Measure

line Cloud Computing Infrastructure Bandwidth Cloud Computing Infrastructure Cloud Computing Terms Using Ping and Traceroute to MeasureCloud Computing Terms Benefits and Limitations of Cloud Network Performance Benefits and Limitations of Cloud Computing Computing SecurityBenefits Benefits SSLLimitations Limitations VPN Cloud Computing Case Studies Cloud Computing Case Studies Overhead How Companies Are Using Cloud How Companies Are Using Cloud Storage Options for Cloud Computing Computing Computing Storage CapacityImplementing Applications and Services in Implementing Applications and Services Data Protection and Partitioningthe Cloud in the Cloud NASUsing Your Company's Services vs. the Using Your Company's Services vs. the SANCloud Provider Cloud Provider CASA Cloud Service Provider Introduced A Cloud Service Provider Introduced RedundancyCloud Computing Risks and Issues Cloud Computing Risks and Issues ReplicationProducts and Services Provided by Cloud Products and Services Provided by Cloud Multisiting Computing Companies Computing Companies Backup and Recovery Economic Economic Server Software Environments thatStaffing Staffing Support Cloud Computing Should Your Company Invest in Cloud Should Your Company Invest in Cloud Server CapacityComputing? Computing? VirtualizationWhat Should Not be Moved to the Cloud What Should Not be Moved to the Cloud ClusteringLANs and the Cloud LANs and the Cloud ExpansionInternet and the Cloud Internet and the Cloud Server FunctionsWeb Services, Browsers, and the Cloud Web Services, Browsers, and the Cloud ApplicationThin Client Thin Client Web Advances in Networking and Processing Advances in Networking and Processing Database Speeds that Led to Cloud Computing Speeds that Led to Cloud Computing Vendor Approaches to Cloud Computing Networking Developments Networking Developments Role of Open Source Software in DataIncreased Processing Speeds Increased Processing Speeds Center Managed Service Provider Model to Cloud Managed Service Provider Model to Cost Reduction vs. ReliabilityComputing and Software as a Service Cloud Computing and Software as a Open Source Server Software(SaaS) Service (SaaS) Open Source Database SoftwareSingle Purpose Architectures Migrate to Single Purpose Architectures Migrate to Open Source Applications SoftwareMultipurpose Architectures Multipurpose Architectures Open Source System ManagementData Center Virtualization Data Center Virtualization SoftwareCollaboration Collaboration Open Source Load-Balancing Software The Cloud as a Reach Extender The Cloud as a Reach Extender Virtualization as the "Operating System"The Cloud as a Communication Enabler The Cloud as a Communication Enabler Virtualization with a Host OperatingThe Cloud as an Employee Enabler The Cloud as an Employee Enabler SystemService-Oriented Architecture (SOA) Service-Oriented Architecture (SOA) Virtualization Infections on VirtualizedEvolving from SOA to the Cloud Evolving from SOA to the Cloud Environments Capacity: Limited Performance Capacity: Limited Performance Type 1 Virtualized EnvironmentAvailability: Communications Failure and Availability: Communications Failure and Type 2 Virtualized EnvironmentPerformance Issues Performance Issues Virtualization Environments Security: Newer Security Protocols Provide Security: Newer Security Protocols Microsoft VirtualizationMore Protection Provide More Protection Sun xVM VirtualBoxWhat's Next in Cloud Computing What's Next in Cloud Computing Linux/UNIX VirtualizationIndependent Components Independent Components VMware ProductsMessage Base Message Base Data Center and Cloud InfrastructureLocation Independence Location Independence ProductsCommunication Requirements for Cloud Communication Requirements for Cloud End-User and Desktop Products Implementation Implementation IBM Virtualization

Page 105: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Public Internet Public Internet Using VMware to see a Virtualized ServerPrivate Internet Private Internet Environment Routing to the Datacenter Routing to the Datacenter Permissive FederationSwitching within the Data Center Switching within the Data Center Verified FederationBandwidth Bandwidth Encrypted FederationTools Used to Measure Network Tools Used to Measure Network Trusted FederationPerformance Performance Using XMPP in the Federated EnvironmentUsing the Protocol Analyzer to Measure Using the Protocol Analyzer to Measure Presence in the Cloud Bandwidth Bandwidth What It IsUsing Ping and Traceroute to Measure Using Ping and Traceroute to Measure Presence ProtocolsNetwork Performance Network Performance Leveraging PresenceSecurity Security Presence EnabledSSL SSL The Future of PresenceVPN VPN The Interrelation of Identity, Presence, andOverhead Overhead Location in the CloudStorage Options for Cloud Computing Storage Options for Cloud Computing Identity Management Storage Capacity Storage Capacity What It IsData Protection and Partitioning Data Protection and Partitioning Future of Identity in the CloudNAS NAS Privacy and Its Relation to Cloud-BasedSAN SAN Information Systems CAS CAS Personal InformationRedundancy Redundancy Privacy-Related IssuesReplication Replication Finding Your Private Information Multisiting Multisiting Open Cloud Consortium Working GroupsBackup and Recovery Backup and Recovery Project MatsuServer Software Environments that Support Server Software Environments that Project CometCloud Computing Support Cloud Computing HPC in the CloudServer Capacity Server Capacity The Open Cloud TestbedVirtualization Virtualization The Open Science Data CloudClustering Clustering Intercloud Testbed Expansion Expansion Reporting on an Open Cloud ConsortiumServer Functions Server Functions Working Group Application Application Distributed Management Task ForceWeb Web (DMTF) Database Database What It Is?Vendor Approaches to Cloud Computing Vendor Approaches to Cloud Computing DMTK Working Groups Associated withRole of Open Source Software in Data Role of Open Source Software in Data Cloud ComputingCenter Center Standards for Application Developers Cost Reduction vs. Reliability Cost Reduction vs. Reliability ProtocolsOpen Source Server Software Open Source Server Software Scripting LanguagesOpen Source Database Software Open Source Database Software Content Formatting Standards andOpen Source Applications Software Open Source Applications Software LanguagesOpen Source System Management Software Open Source System Management Standards for Security in the Cloud Open Source Load-Balancing Software Software Confidentiality, Integrity, AvailabilityVirtualization as the "Operating System" Open Source Load-Balancing Software Authentication, Authorization,Virtualization with a Host Operating System Virtualization as the "Operating System" AccountabilityVirtualization Infections on Virtualized Virtualization with a Host Operating Regulations for PrivacyEnvironments System Security ProtocolsType 1 Virtualized Environment Virtualization Infections on Virtualized Establishing a Baseline for CloudType 2 Virtualized Environment Environments Performance Virtualization Environments Type 1 Virtualized Environment Best Practices for Selecting a Vendor andMicrosoft Virtualization Type 2 Virtualized Environment Implementing Cloud-Based Applications Sun xVM VirtualBox Virtualization Environments Choosing the Right VendorLinux/UNIX Virtualization Microsoft Virtualization Implementing Cloud-Based Applications VMware Products Sun xVM VirtualBox Windows Remote DesktopData Center and Cloud Infrastructure Linux/UNIX Virtualization VncProducts VMware Products Web BrowsersEnd-User and Desktop Products Data Center and Cloud Infrastructure Server ExtensionsIBM Virtualization Products Thin ClientsUsing VMware to see a Virtualized Server End-User and Desktop Products Smart Phones, Pads, Pods, etc.Environment IBM Virtualization Virtual Terminal Security Strengths andPermissive Federation Using VMware to see a Virtualized Server Weaknesses Verified Federation Environment StrengthsEncrypted Federation Permissive Federation Weaknesses Trusted Federation Verified Federation AndroidUsing XMPP in the Federated Environment Encrypted Federation BlackBerry

Page 106: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Presence in the Cloud Trusted Federation Windows MobileWhat It Is Using XMPP in the Federated Ubuntu Mobile Internet DevicePresence Protocols Environment Mobile Platform Virtualization Leveraging Presence Presence in the Cloud Kernel-Based Virtual MachinePresence Enabled What It Is VMware Mobile Virtualization PlatformThe Future of Presence Presence Protocols Collaboration Applications for MobileThe Interrelation of Identity, Presence, and Leveraging Presence Platforms Location in the Cloud Presence Enabled Text MessagingIdentity Management The Future of Presence iPhone ApplicationsWhat It Is The Interrelation of Identity, Presence, BlackBerry ApplicationsFuture of Identity in the Cloud and Location in the Cloud Droid Applications Privacy and Its Relation to Cloud-Based Identity Management Information Systems What It IsPersonal Information Future of Identity in the Cloud linePrivacy-Related Issues Privacy and Its Relation to Cloud-Based Cloud Computing InfrastructureFinding Your Private Information Information Systems Cloud Computing TermsOpen Cloud Consortium Working Groups Personal Information Benefits and Limitations of CloudProject Matsu Privacy-Related Issues Computing Project Comet Finding Your Private Information BenefitsHPC in the Cloud Open Cloud Consortium Working Groups LimitationsThe Open Cloud Testbed Project Matsu Cloud Computing Case StudiesThe Open Science Data Cloud Project Comet How Companies Are Using CloudIntercloud Testbed HPC in the Cloud Computing Reporting on an Open Cloud Consortium The Open Cloud Testbed Implementing Applications and Services inWorking Group The Open Science Data Cloud the CloudDistributed Management Task Force Intercloud Testbed Using Your Company's Services vs. the(DMTF) Reporting on an Open Cloud Consortium Cloud ProviderWhat It Is? Working Group A Cloud Service Provider IntroducedDMTK Working Groups Associated with Distributed Management Task Force Cloud Computing Risks and Issues Cloud Computing (DMTF) Products and Services Provided by CloudStandards for Application Developers What It Is? Computing Companies Protocols DMTK Working Groups Associated with EconomicScripting Languages Cloud Computing StaffingContent Formatting Standards and Standards for Application Developers Should Your Company Invest in CloudLanguages Protocols Computing? Standards for Security in the Cloud Scripting Languages What Should Not be Moved to the Cloud Confidentiality, Integrity, Availability Content Formatting Standards and LANs and the Cloud Authentication, Authorization, Accountability Languages Internet and the Cloud Regulations for Privacy Standards for Security in the Cloud Web Services, Browsers, and the Cloud Security Protocols Confidentiality, Integrity, Availability Thin Client Establishing a Baseline for Cloud Authentication, Authorization, Advances in Networking and ProcessingPerformance Accountability Speeds that Led to Cloud Computing Best Practices for Selecting a Vendor and Regulations for Privacy Networking DevelopmentsImplementing Cloud-Based Applications Security Protocols Increased Processing SpeedsChoosing the Right Vendor Establishing a Baseline for Cloud Managed Service Provider Model to CloudImplementing Cloud-Based Applications Performance Computing and Software as a ServiceWindows Remote Desktop Best Practices for Selecting a Vendor (SaaS) Vnc and Implementing Cloud-Based Single Purpose Architectures Migrate toWeb Browsers Applications Multipurpose ArchitecturesServer Extensions Choosing the Right Vendor Data Center VirtualizationThin Clients Implementing Cloud-Based Applications Collaboration Smart Phones, Pads, Pods, etc. Windows Remote Desktop The Cloud as a Reach ExtenderVirtual Terminal Security Strengths and Vnc The Cloud as a Communication EnablerWeaknesses Web Browsers The Cloud as an Employee EnablerStrengths Server Extensions Service-Oriented Architecture (SOA) Weaknesses Thin Clients Evolving from SOA to the CloudAndroid Smart Phones, Pads, Pods, etc. Capacity: Limited PerformanceBlackBerry Virtual Terminal Security Strengths and Availability: Communications Failure andWindows Mobile Weaknesses Performance IssuesUbuntu Mobile Internet Device Strengths Security: Newer Security Protocols ProvideMobile Platform Virtualization Weaknesses More ProtectionKernel-Based Virtual Machine Android What's Next in Cloud Computing VMware Mobile Virtualization Platform BlackBerry Independent ComponentsCollaboration Applications for Mobile Windows Mobile Message BasePlatforms Ubuntu Mobile Internet Device Location IndependenceText Messaging Mobile Platform Virtualization Communication Requirements for Cloud

Page 107: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

iPhone Applications Kernel-Based Virtual Machine Implementation BlackBerry Applications VMware Mobile Virtualization Platform Public InternetDroid Applications Collaboration Applications for Mobile Private Internet

Platforms Routing to the DatacenterText Messaging Switching within the Data Center

line iPhone Applications Bandwidth Cloud Computing Infrastructure BlackBerry Applications Tools Used to Measure NetworkCloud Computing Terms Droid Applications Performance Benefits and Limitations of Cloud Computing Using the Protocol Analyzer to MeasureBenefits Bandwidth Limitations line Using Ping and Traceroute to MeasureCloud Computing Case Studies Cloud Computing Infrastructure Network Performance How Companies Are Using Cloud Cloud Computing Terms SecurityComputing Benefits and Limitations of Cloud SSLImplementing Applications and Services in Computing VPN the Cloud Benefits Overhead Using Your Company's Services vs. the Limitations Storage Options for Cloud Computing Cloud Provider Cloud Computing Case Studies Storage CapacityA Cloud Service Provider Introduced How Companies Are Using Cloud Data Protection and PartitioningCloud Computing Risks and Issues Computing NASProducts and Services Provided by Cloud Implementing Applications and Services SANComputing Companies in the Cloud CASEconomic Using Your Company's Services vs. the RedundancyStaffing Cloud Provider ReplicationShould Your Company Invest in Cloud A Cloud Service Provider Introduced Multisiting Computing? Cloud Computing Risks and Issues Backup and Recovery What Should Not be Moved to the Cloud Products and Services Provided by Cloud Server Software Environments thatLANs and the Cloud Computing Companies Support Cloud Computing Internet and the Cloud Economic Server CapacityWeb Services, Browsers, and the Cloud Staffing VirtualizationThin Client Should Your Company Invest in Cloud ClusteringAdvances in Networking and Processing Computing? ExpansionSpeeds that Led to Cloud Computing What Should Not be Moved to the Cloud Server FunctionsNetworking Developments LANs and the Cloud ApplicationIncreased Processing Speeds Internet and the Cloud Web Managed Service Provider Model to Cloud Web Services, Browsers, and the Cloud Database Computing and Software as a Service Thin Client Vendor Approaches to Cloud Computing (SaaS) Advances in Networking and Processing Role of Open Source Software in DataSingle Purpose Architectures Migrate to Speeds that Led to Cloud Computing Center Multipurpose Architectures Networking Developments Cost Reduction vs. ReliabilityData Center Virtualization Increased Processing Speeds Open Source Server SoftwareCollaboration Managed Service Provider Model to Open Source Database SoftwareThe Cloud as a Reach Extender Cloud Computing and Software as a Open Source Applications SoftwareThe Cloud as a Communication Enabler Service (SaaS) Open Source System ManagementThe Cloud as an Employee Enabler Single Purpose Architectures Migrate to SoftwareService-Oriented Architecture (SOA) Multipurpose Architectures Open Source Load-Balancing Software Evolving from SOA to the Cloud Data Center Virtualization Virtualization as the "Operating System"Capacity: Limited Performance Collaboration Virtualization with a Host OperatingAvailability: Communications Failure and The Cloud as a Reach Extender SystemPerformance Issues The Cloud as a Communication Enabler Virtualization Infections on VirtualizedSecurity: Newer Security Protocols Provide The Cloud as an Employee Enabler Environments More Protection Service-Oriented Architecture (SOA) Type 1 Virtualized EnvironmentWhat's Next in Cloud Computing Evolving from SOA to the Cloud Type 2 Virtualized EnvironmentIndependent Components Capacity: Limited Performance Virtualization Environments Message Base Availability: Communications Failure and Microsoft VirtualizationLocation Independence Performance Issues Sun xVM VirtualBoxCommunication Requirements for Cloud Security: Newer Security Protocols Linux/UNIX VirtualizationImplementation Provide More Protection VMware ProductsPublic Internet What's Next in Cloud Computing Data Center and Cloud InfrastructurePrivate Internet Independent Components ProductsRouting to the Datacenter Message Base End-User and Desktop Products Switching within the Data Center Location Independence IBM VirtualizationBandwidth Communication Requirements for Cloud Using VMware to see a Virtualized ServerTools Used to Measure Network Implementation Environment Performance Public Internet Permissive FederationUsing the Protocol Analyzer to Measure Private Internet Verified Federation

Page 108: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Bandwidth Routing to the Datacenter Encrypted FederationUsing Ping and Traceroute to Measure Switching within the Data Center Trusted FederationNetwork Performance Bandwidth Using XMPP in the Federated EnvironmentSecurity Tools Used to Measure Network Presence in the Cloud SSL Performance What It IsVPN Using the Protocol Analyzer to Measure Presence ProtocolsOverhead Bandwidth Leveraging PresenceStorage Options for Cloud Computing Using Ping and Traceroute to Measure Presence EnabledStorage Capacity Network Performance The Future of PresenceData Protection and Partitioning Security The Interrelation of Identity, Presence, andNAS SSL Location in the CloudSAN VPN Identity Management CAS Overhead What It IsRedundancy Storage Options for Cloud Computing Future of Identity in the CloudReplication Storage Capacity Privacy and Its Relation to Cloud-BasedMultisiting Data Protection and Partitioning Information Systems Backup and Recovery NAS Personal InformationServer Software Environments that Support SAN Privacy-Related IssuesCloud Computing CAS Finding Your Private Information Server Capacity Redundancy Open Cloud Consortium Working GroupsVirtualization Replication Project MatsuClustering Multisiting Project CometExpansion Backup and Recovery HPC in the CloudServer Functions Server Software Environments that The Open Cloud TestbedApplication Support Cloud Computing The Open Science Data CloudWeb Server Capacity Intercloud Testbed Database Virtualization Reporting on an Open Cloud ConsortiumVendor Approaches to Cloud Computing Clustering Working Group Role of Open Source Software in Data Expansion Distributed Management Task ForceCenter Server Functions (DMTF) Cost Reduction vs. Reliability Application What It Is?Open Source Server Software Web DMTK Working Groups Associated withOpen Source Database Software Database Cloud ComputingOpen Source Applications Software Vendor Approaches to Cloud Computing Standards for Application Developers Open Source System Management Software Role of Open Source Software in Data ProtocolsOpen Source Load-Balancing Software Center Scripting LanguagesVirtualization as the "Operating System" Cost Reduction vs. Reliability Content Formatting Standards andVirtualization with a Host Operating System Open Source Server Software LanguagesVirtualization Infections on Virtualized Open Source Database Software Standards for Security in the Cloud Environments Open Source Applications Software Confidentiality, Integrity, AvailabilityType 1 Virtualized Environment Open Source System Management Authentication, Authorization,Type 2 Virtualized Environment Software AccountabilityVirtualization Environments Open Source Load-Balancing Software Regulations for PrivacyMicrosoft Virtualization Virtualization as the "Operating System" Security ProtocolsSun xVM VirtualBox Virtualization with a Host Operating Establishing a Baseline for CloudLinux/UNIX Virtualization System Performance VMware Products Virtualization Infections on Virtualized Best Practices for Selecting a Vendor andData Center and Cloud Infrastructure Environments Implementing Cloud-Based Applications Products Type 1 Virtualized Environment Choosing the Right VendorEnd-User and Desktop Products Type 2 Virtualized Environment Implementing Cloud-Based Applications IBM Virtualization Virtualization Environments Windows Remote DesktopUsing VMware to see a Virtualized Server Microsoft Virtualization VncEnvironment Sun xVM VirtualBox Web BrowsersPermissive Federation Linux/UNIX Virtualization Server ExtensionsVerified Federation VMware Products Thin ClientsEncrypted Federation Data Center and Cloud Infrastructure Smart Phones, Pads, Pods, etc.Trusted Federation Products Virtual Terminal Security Strengths andUsing XMPP in the Federated Environment End-User and Desktop Products Weaknesses Presence in the Cloud IBM Virtualization StrengthsWhat It Is Using VMware to see a Virtualized Server Weaknesses Presence Protocols Environment AndroidLeveraging Presence Permissive Federation BlackBerryPresence Enabled Verified Federation Windows MobileThe Future of Presence Encrypted Federation Ubuntu Mobile Internet DeviceThe Interrelation of Identity, Presence, and Trusted Federation Mobile Platform Virtualization Location in the Cloud Using XMPP in the Federated Kernel-Based Virtual Machine

Page 109: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Identity Management Environment VMware Mobile Virtualization PlatformWhat It Is Presence in the Cloud Collaboration Applications for MobileFuture of Identity in the Cloud What It Is Platforms Privacy and Its Relation to Cloud-Based Presence Protocols Text MessagingInformation Systems Leveraging Presence iPhone ApplicationsPersonal Information Presence Enabled BlackBerry ApplicationsPrivacy-Related Issues The Future of Presence Droid Applications Finding Your Private Information The Interrelation of Identity, Presence,Open Cloud Consortium Working Groups and Location in the CloudProject Matsu Identity Management lineProject Comet What It Is Cloud Computing InfrastructureHPC in the Cloud Future of Identity in the Cloud Cloud Computing TermsThe Open Cloud Testbed Privacy and Its Relation to Cloud-Based Benefits and Limitations of CloudThe Open Science Data Cloud Information Systems Computing Intercloud Testbed Personal Information BenefitsReporting on an Open Cloud Consortium Privacy-Related Issues LimitationsWorking Group Finding Your Private Information Cloud Computing Case StudiesDistributed Management Task Force Open Cloud Consortium Working Groups How Companies Are Using Cloud(DMTF) Project Matsu Computing What It Is? Project Comet Implementing Applications and Services inDMTK Working Groups Associated with HPC in the Cloud the CloudCloud Computing The Open Cloud Testbed Using Your Company's Services vs. theStandards for Application Developers The Open Science Data Cloud Cloud ProviderProtocols Intercloud Testbed A Cloud Service Provider IntroducedScripting Languages Reporting on an Open Cloud Consortium Cloud Computing Risks and Issues Content Formatting Standards and Working Group Products and Services Provided by CloudLanguages Distributed Management Task Force Computing Companies Standards for Security in the Cloud (DMTF) EconomicConfidentiality, Integrity, Availability What It Is? StaffingAuthentication, Authorization, Accountability DMTK Working Groups Associated with Should Your Company Invest in CloudRegulations for Privacy Cloud Computing Computing? Security Protocols Standards for Application Developers What Should Not be Moved to the Cloud Establishing a Baseline for Cloud Protocols LANs and the Cloud Performance Scripting Languages Internet and the Cloud Best Practices for Selecting a Vendor and Content Formatting Standards and Web Services, Browsers, and the Cloud Implementing Cloud-Based Applications Languages Thin Client Choosing the Right Vendor Standards for Security in the Cloud Advances in Networking and ProcessingImplementing Cloud-Based Applications Confidentiality, Integrity, Availability Speeds that Led to Cloud Computing Windows Remote Desktop Authentication, Authorization, Networking DevelopmentsVnc Accountability Increased Processing SpeedsWeb Browsers Regulations for Privacy Managed Service Provider Model to CloudServer Extensions Security Protocols Computing and Software as a ServiceThin Clients Establishing a Baseline for Cloud (SaaS) Smart Phones, Pads, Pods, etc. Performance Single Purpose Architectures Migrate toVirtual Terminal Security Strengths and Best Practices for Selecting a Vendor Multipurpose ArchitecturesWeaknesses and Implementing Cloud-Based Data Center VirtualizationStrengths Applications Collaboration Weaknesses Choosing the Right Vendor The Cloud as a Reach ExtenderAndroid Implementing Cloud-Based Applications The Cloud as a Communication EnablerBlackBerry Windows Remote Desktop The Cloud as an Employee EnablerWindows Mobile Vnc Service-Oriented Architecture (SOA) Ubuntu Mobile Internet Device Web Browsers Evolving from SOA to the CloudMobile Platform Virtualization Server Extensions Capacity: Limited PerformanceKernel-Based Virtual Machine Thin Clients Availability: Communications Failure andVMware Mobile Virtualization Platform Smart Phones, Pads, Pods, etc. Performance IssuesCollaboration Applications for Mobile Virtual Terminal Security Strengths and Security: Newer Security Protocols ProvidePlatforms Weaknesses More ProtectionText Messaging Strengths What's Next in Cloud Computing iPhone Applications Weaknesses Independent ComponentsBlackBerry Applications Android Message BaseDroid Applications BlackBerry Location Independence

Windows Mobile Communication Requirements for CloudUbuntu Mobile Internet Device Implementation Mobile Platform Virtualization Public InternetKernel-Based Virtual Machine Private InternetVMware Mobile Virtualization Platform Routing to the Datacenter

Page 110: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Collaboration Applications for Mobile Switching within the Data CenterPlatforms Bandwidth Text Messaging Tools Used to Measure NetworkiPhone Applications Performance BlackBerry Applications Using the Protocol Analyzer to MeasureDroid Applications Bandwidth

Using Ping and Traceroute to MeasureNetwork Performance

line SecurityCloud Computing Infrastructure SSLCloud Computing Terms VPN Benefits and Limitations of Cloud Overhead Computing Storage Options for Cloud Computing Benefits Storage CapacityLimitations Data Protection and PartitioningCloud Computing Case Studies NASHow Companies Are Using Cloud SANComputing CASImplementing Applications and Services Redundancyin the Cloud ReplicationUsing Your Company's Services vs. the Multisiting Cloud Provider Backup and Recovery A Cloud Service Provider Introduced Server Software Environments thatCloud Computing Risks and Issues Support Cloud Computing Products and Services Provided by Cloud Server CapacityComputing Companies VirtualizationEconomic ClusteringStaffing ExpansionShould Your Company Invest in Cloud Server FunctionsComputing? ApplicationWhat Should Not be Moved to the Cloud Web LANs and the Cloud Database Internet and the Cloud Vendor Approaches to Cloud Computing Web Services, Browsers, and the Cloud Role of Open Source Software in DataThin Client Center Advances in Networking and Processing Cost Reduction vs. ReliabilitySpeeds that Led to Cloud Computing Open Source Server SoftwareNetworking Developments Open Source Database SoftwareIncreased Processing Speeds Open Source Applications SoftwareManaged Service Provider Model to Open Source System ManagementCloud Computing and Software as a SoftwareService (SaaS) Open Source Load-Balancing Software Single Purpose Architectures Migrate to Virtualization as the "Operating System"Multipurpose Architectures Virtualization with a Host OperatingData Center Virtualization SystemCollaboration Virtualization Infections on VirtualizedThe Cloud as a Reach Extender Environments The Cloud as a Communication Enabler Type 1 Virtualized EnvironmentThe Cloud as an Employee Enabler Type 2 Virtualized EnvironmentService-Oriented Architecture (SOA) Virtualization Environments Evolving from SOA to the Cloud Microsoft VirtualizationCapacity: Limited Performance Sun xVM VirtualBoxAvailability: Communications Failure and Linux/UNIX VirtualizationPerformance Issues VMware ProductsSecurity: Newer Security Protocols Data Center and Cloud InfrastructureProvide More Protection ProductsWhat's Next in Cloud Computing End-User and Desktop Products Independent Components IBM VirtualizationMessage Base Using VMware to see a Virtualized ServerLocation Independence Environment Communication Requirements for Cloud Permissive FederationImplementation Verified FederationPublic Internet Encrypted FederationPrivate Internet Trusted FederationRouting to the Datacenter Using XMPP in the Federated EnvironmentSwitching within the Data Center Presence in the Cloud

Page 111: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Bandwidth What It IsTools Used to Measure Network Presence ProtocolsPerformance Leveraging PresenceUsing the Protocol Analyzer to Measure Presence EnabledBandwidth The Future of PresenceUsing Ping and Traceroute to Measure The Interrelation of Identity, Presence, andNetwork Performance Location in the CloudSecurity Identity Management SSL What It IsVPN Future of Identity in the CloudOverhead Privacy and Its Relation to Cloud-BasedStorage Options for Cloud Computing Information Systems Storage Capacity Personal InformationData Protection and Partitioning Privacy-Related IssuesNAS Finding Your Private Information SAN Open Cloud Consortium Working GroupsCAS Project MatsuRedundancy Project CometReplication HPC in the CloudMultisiting The Open Cloud TestbedBackup and Recovery The Open Science Data CloudServer Software Environments that Intercloud Testbed Support Cloud Computing Reporting on an Open Cloud ConsortiumServer Capacity Working Group Virtualization Distributed Management Task ForceClustering (DMTF) Expansion What It Is?Server Functions DMTK Working Groups Associated withApplication Cloud ComputingWeb Standards for Application Developers Database ProtocolsVendor Approaches to Cloud Computing Scripting LanguagesRole of Open Source Software in Data Content Formatting Standards andCenter LanguagesCost Reduction vs. Reliability Standards for Security in the Cloud Open Source Server Software Confidentiality, Integrity, AvailabilityOpen Source Database Software Authentication, Authorization,Open Source Applications Software AccountabilityOpen Source System Management Regulations for PrivacySoftware Security ProtocolsOpen Source Load-Balancing Software Establishing a Baseline for CloudVirtualization as the "Operating System" Performance Virtualization with a Host Operating Best Practices for Selecting a Vendor andSystem Implementing Cloud-Based Applications Virtualization Infections on Virtualized Choosing the Right VendorEnvironments Implementing Cloud-Based Applications Type 1 Virtualized Environment Windows Remote DesktopType 2 Virtualized Environment VncVirtualization Environments Web BrowsersMicrosoft Virtualization Server ExtensionsSun xVM VirtualBox Thin ClientsLinux/UNIX Virtualization Smart Phones, Pads, Pods, etc.VMware Products Virtual Terminal Security Strengths andData Center and Cloud Infrastructure Weaknesses Products StrengthsEnd-User and Desktop Products Weaknesses IBM Virtualization AndroidUsing VMware to see a Virtualized Server BlackBerryEnvironment Windows MobilePermissive Federation Ubuntu Mobile Internet DeviceVerified Federation Mobile Platform Virtualization Encrypted Federation Kernel-Based Virtual MachineTrusted Federation VMware Mobile Virtualization PlatformUsing XMPP in the Federated Collaboration Applications for MobileEnvironment Platforms Presence in the Cloud Text Messaging

Page 112: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

What It Is iPhone ApplicationsPresence Protocols BlackBerry ApplicationsLeveraging Presence Droid Applications Presence EnabledThe Future of PresenceThe Interrelation of Identity, Presence, lineand Location in the Cloud Cloud Computing InfrastructureIdentity Management Cloud Computing TermsWhat It Is Benefits and Limitations of CloudFuture of Identity in the Cloud Computing Privacy and Its Relation to Cloud-Based BenefitsInformation Systems LimitationsPersonal Information Cloud Computing Case StudiesPrivacy-Related Issues How Companies Are Using CloudFinding Your Private Information Computing Open Cloud Consortium Working Groups Implementing Applications and Services inProject Matsu the CloudProject Comet Using Your Company's Services vs. theHPC in the Cloud Cloud ProviderThe Open Cloud Testbed A Cloud Service Provider IntroducedThe Open Science Data Cloud Cloud Computing Risks and Issues Intercloud Testbed Products and Services Provided by CloudReporting on an Open Cloud Consortium Computing Companies Working Group EconomicDistributed Management Task Force Staffing(DMTF) Should Your Company Invest in CloudWhat It Is? Computing? DMTK Working Groups Associated with What Should Not be Moved to the Cloud Cloud Computing LANs and the Cloud Standards for Application Developers Internet and the Cloud Protocols Web Services, Browsers, and the Cloud Scripting Languages Thin Client Content Formatting Standards and Advances in Networking and ProcessingLanguages Speeds that Led to Cloud Computing Standards for Security in the Cloud Networking DevelopmentsConfidentiality, Integrity, Availability Increased Processing SpeedsAuthentication, Authorization, Managed Service Provider Model to CloudAccountability Computing and Software as a ServiceRegulations for Privacy (SaaS) Security Protocols Single Purpose Architectures Migrate toEstablishing a Baseline for Cloud Multipurpose ArchitecturesPerformance Data Center VirtualizationBest Practices for Selecting a Vendor Collaboration and Implementing Cloud-Based The Cloud as a Reach ExtenderApplications The Cloud as a Communication EnablerChoosing the Right Vendor The Cloud as an Employee EnablerImplementing Cloud-Based Applications Service-Oriented Architecture (SOA) Windows Remote Desktop Evolving from SOA to the CloudVnc Capacity: Limited PerformanceWeb Browsers Availability: Communications Failure andServer Extensions Performance IssuesThin Clients Security: Newer Security Protocols ProvideSmart Phones, Pads, Pods, etc. More ProtectionVirtual Terminal Security Strengths and What's Next in Cloud Computing Weaknesses Independent ComponentsStrengths Message BaseWeaknesses Location IndependenceAndroid Communication Requirements for CloudBlackBerry Implementation Windows Mobile Public InternetUbuntu Mobile Internet Device Private InternetMobile Platform Virtualization Routing to the DatacenterKernel-Based Virtual Machine Switching within the Data CenterVMware Mobile Virtualization Platform Bandwidth Collaboration Applications for Mobile Tools Used to Measure NetworkPlatforms Performance

Page 113: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Text Messaging Using the Protocol Analyzer to MeasureiPhone Applications Bandwidth BlackBerry Applications Using Ping and Traceroute to MeasureDroid Applications Network Performance

SecuritySSL

line VPN Cloud Computing Infrastructure Overhead Cloud Computing Terms Storage Options for Cloud Computing Benefits and Limitations of Cloud Storage CapacityComputing Data Protection and PartitioningBenefits NASLimitations SANCloud Computing Case Studies CASHow Companies Are Using Cloud RedundancyComputing ReplicationImplementing Applications and Services Multisiting in the Cloud Backup and Recovery Using Your Company's Services vs. the Server Software Environments thatCloud Provider Support Cloud Computing A Cloud Service Provider Introduced Server CapacityCloud Computing Risks and Issues VirtualizationProducts and Services Provided by Cloud ClusteringComputing Companies ExpansionEconomic Server FunctionsStaffing ApplicationShould Your Company Invest in Cloud Web Computing? Database What Should Not be Moved to the Cloud Vendor Approaches to Cloud Computing LANs and the Cloud Role of Open Source Software in DataInternet and the Cloud Center Web Services, Browsers, and the Cloud Cost Reduction vs. ReliabilityThin Client Open Source Server SoftwareAdvances in Networking and Processing Open Source Database SoftwareSpeeds that Led to Cloud Computing Open Source Applications SoftwareNetworking Developments Open Source System ManagementIncreased Processing Speeds SoftwareManaged Service Provider Model to Open Source Load-Balancing Software Cloud Computing and Software as a Virtualization as the "Operating System"Service (SaaS) Virtualization with a Host OperatingSingle Purpose Architectures Migrate to SystemMultipurpose Architectures Virtualization Infections on VirtualizedData Center Virtualization Environments Collaboration Type 1 Virtualized EnvironmentThe Cloud as a Reach Extender Type 2 Virtualized EnvironmentThe Cloud as a Communication Enabler Virtualization Environments The Cloud as an Employee Enabler Microsoft VirtualizationService-Oriented Architecture (SOA) Sun xVM VirtualBoxEvolving from SOA to the Cloud Linux/UNIX VirtualizationCapacity: Limited Performance VMware ProductsAvailability: Communications Failure and Data Center and Cloud InfrastructurePerformance Issues ProductsSecurity: Newer Security Protocols End-User and Desktop Products Provide More Protection IBM VirtualizationWhat's Next in Cloud Computing Using VMware to see a Virtualized ServerIndependent Components Environment Message Base Permissive FederationLocation Independence Verified FederationCommunication Requirements for Cloud Encrypted FederationImplementation Trusted FederationPublic Internet Using XMPP in the Federated EnvironmentPrivate Internet Presence in the Cloud Routing to the Datacenter What It IsSwitching within the Data Center Presence ProtocolsBandwidth Leveraging PresenceTools Used to Measure Network Presence Enabled

Page 114: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Performance The Future of PresenceUsing the Protocol Analyzer to Measure The Interrelation of Identity, Presence, andBandwidth Location in the CloudUsing Ping and Traceroute to Measure Identity Management Network Performance What It IsSecurity Future of Identity in the CloudSSL Privacy and Its Relation to Cloud-BasedVPN Information Systems Overhead Personal InformationStorage Options for Cloud Computing Privacy-Related IssuesStorage Capacity Finding Your Private Information Data Protection and Partitioning Open Cloud Consortium Working GroupsNAS Project MatsuSAN Project CometCAS HPC in the CloudRedundancy The Open Cloud TestbedReplication The Open Science Data CloudMultisiting Intercloud Testbed Backup and Recovery Reporting on an Open Cloud ConsortiumServer Software Environments that Working Group Support Cloud Computing Distributed Management Task ForceServer Capacity (DMTF) Virtualization What It Is?Clustering DMTK Working Groups Associated withExpansion Cloud ComputingServer Functions Standards for Application Developers Application ProtocolsWeb Scripting LanguagesDatabase Content Formatting Standards andVendor Approaches to Cloud Computing LanguagesRole of Open Source Software in Data Standards for Security in the Cloud Center Confidentiality, Integrity, AvailabilityCost Reduction vs. Reliability Authentication, Authorization,Open Source Server Software AccountabilityOpen Source Database Software Regulations for PrivacyOpen Source Applications Software Security ProtocolsOpen Source System Management Establishing a Baseline for CloudSoftware Performance Open Source Load-Balancing Software Best Practices for Selecting a Vendor andVirtualization as the "Operating System" Implementing Cloud-Based Applications Virtualization with a Host Operating Choosing the Right VendorSystem Implementing Cloud-Based Applications Virtualization Infections on Virtualized Windows Remote DesktopEnvironments VncType 1 Virtualized Environment Web BrowsersType 2 Virtualized Environment Server ExtensionsVirtualization Environments Thin ClientsMicrosoft Virtualization Smart Phones, Pads, Pods, etc.Sun xVM VirtualBox Virtual Terminal Security Strengths andLinux/UNIX Virtualization Weaknesses VMware Products StrengthsData Center and Cloud Infrastructure Weaknesses Products AndroidEnd-User and Desktop Products BlackBerryIBM Virtualization Windows MobileUsing VMware to see a Virtualized Server Ubuntu Mobile Internet DeviceEnvironment Mobile Platform Virtualization Permissive Federation Kernel-Based Virtual MachineVerified Federation VMware Mobile Virtualization PlatformEncrypted Federation Collaboration Applications for MobileTrusted Federation Platforms Using XMPP in the Federated Text MessagingEnvironment iPhone ApplicationsPresence in the Cloud BlackBerry ApplicationsWhat It Is Droid Applications Presence Protocols

Page 115: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Leveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the CloudIdentity Management What It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation Systems Personal InformationPrivacy-Related IssuesFinding Your Private Information Open Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud Testbed Reporting on an Open Cloud ConsortiumWorking Group Distributed Management Task Force(DMTF) What It Is?DMTK Working Groups Associated withCloud ComputingStandards for Application Developers ProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the Cloud Confidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformance Best Practices for Selecting a Vendorand Implementing Cloud-BasedApplications Choosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknesses StrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform Virtualization Kernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatforms Text MessagingiPhone Applications

Page 116: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

BlackBerry ApplicationsDroid Applications

lineCloud Computing InfrastructureCloud Computing TermsBenefits and Limitations of CloudComputing BenefitsLimitationsCloud Computing Case StudiesHow Companies Are Using CloudComputing Implementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider IntroducedCloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies EconomicStaffingShould Your Company Invest in CloudComputing? What Should Not be Moved to the Cloud LANs and the Cloud Internet and the Cloud Web Services, Browsers, and the Cloud Thin Client Advances in Networking and ProcessingSpeeds that Led to Cloud Computing Networking DevelopmentsIncreased Processing SpeedsManaged Service Provider Model toCloud Computing and Software as aService (SaaS) Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center VirtualizationCollaboration The Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee EnablerService-Oriented Architecture (SOA) Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More ProtectionWhat's Next in Cloud Computing Independent ComponentsMessage BaseLocation IndependenceCommunication Requirements for CloudImplementation Public InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidth Tools Used to Measure NetworkPerformance Using the Protocol Analyzer to Measure

Page 117: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Bandwidth Using Ping and Traceroute to MeasureNetwork Performance SecuritySSLVPN Overhead Storage Options for Cloud Computing Storage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisiting Backup and Recovery Server Software Environments thatSupport Cloud Computing Server CapacityVirtualizationClusteringExpansionServer FunctionsApplicationWeb Database Vendor Approaches to Cloud Computing Role of Open Source Software in DataCenter Cost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software Virtualization as the "Operating System"Virtualization with a Host OperatingSystemVirtualization Infections on VirtualizedEnvironments Type 1 Virtualized EnvironmentType 2 Virtualized EnvironmentVirtualization Environments Microsoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop Products IBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment Permissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironmentPresence in the Cloud What It IsPresence ProtocolsLeveraging PresencePresence Enabled

Page 118: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

The Future of PresenceThe Interrelation of Identity, Presence,and Location in the CloudIdentity Management What It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation Systems Personal InformationPrivacy-Related IssuesFinding Your Private Information Open Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud Testbed Reporting on an Open Cloud ConsortiumWorking Group Distributed Management Task Force(DMTF) What It Is?DMTK Working Groups Associated withCloud ComputingStandards for Application Developers ProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the Cloud Confidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformance Best Practices for Selecting a Vendorand Implementing Cloud-BasedApplications Choosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknesses StrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform Virtualization Kernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatforms Text MessagingiPhone ApplicationsBlackBerry ApplicationsDroid Applications

Page 119: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

lineCloud Computing InfrastructureCloud Computing TermsBenefits and Limitations of CloudComputing BenefitsLimitationsCloud Computing Case StudiesHow Companies Are Using CloudComputing Implementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider IntroducedCloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies EconomicStaffingShould Your Company Invest in CloudComputing? What Should Not be Moved to the Cloud LANs and the Cloud Internet and the Cloud Web Services, Browsers, and the Cloud Thin Client Advances in Networking and ProcessingSpeeds that Led to Cloud Computing Networking DevelopmentsIncreased Processing SpeedsManaged Service Provider Model toCloud Computing and Software as aService (SaaS) Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center VirtualizationCollaboration The Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee EnablerService-Oriented Architecture (SOA) Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More ProtectionWhat's Next in Cloud Computing Independent ComponentsMessage BaseLocation IndependenceCommunication Requirements for CloudImplementation Public InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidth Tools Used to Measure NetworkPerformance Using the Protocol Analyzer to MeasureBandwidth Using Ping and Traceroute to Measure

Page 120: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Network Performance SecuritySSLVPN Overhead Storage Options for Cloud Computing Storage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisiting Backup and Recovery Server Software Environments thatSupport Cloud Computing Server CapacityVirtualizationClusteringExpansionServer FunctionsApplicationWeb Database Vendor Approaches to Cloud Computing Role of Open Source Software in DataCenter Cost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software Virtualization as the "Operating System"Virtualization with a Host OperatingSystemVirtualization Infections on VirtualizedEnvironments Type 1 Virtualized EnvironmentType 2 Virtualized EnvironmentVirtualization Environments Microsoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop Products IBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment Permissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironmentPresence in the Cloud What It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,

Page 121: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

and Location in the CloudIdentity Management What It IsFuture of Identity in the CloudPrivacy and Its Relation to Cloud-BasedInformation Systems Personal InformationPrivacy-Related IssuesFinding Your Private Information Open Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud Testbed Reporting on an Open Cloud ConsortiumWorking Group Distributed Management Task Force(DMTF) What It Is?DMTK Working Groups Associated withCloud ComputingStandards for Application Developers ProtocolsScripting LanguagesContent Formatting Standards andLanguagesStandards for Security in the Cloud Confidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity ProtocolsEstablishing a Baseline for CloudPerformance Best Practices for Selecting a Vendorand Implementing Cloud-BasedApplications Choosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc.Virtual Terminal Security Strengths andWeaknesses StrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet DeviceMobile Platform Virtualization Kernel-Based Virtual MachineVMware Mobile Virtualization PlatformCollaboration Applications for MobilePlatforms Text MessagingiPhone ApplicationsBlackBerry ApplicationsDroid Applications

Page 122: Cloud Computing Essentials · GK3210  training@globalknowledge.com.sa 00 966 92000 9278

GK3210 www.globalknowledge.com/en-sa/ [email protected] 00 966 92000 9278

Further Information:

For More information, or to book your course, please call us on 00 966 92000 9278

[email protected]

www.globalknowledge.com/en-sa/

Global Knowledge - KSA, 393 Al-Uroubah Road, Al Worood, Riyadh 3140, Saudi Arabia