Security is a Holistic Proposition

Gorka Sadowski

Subscribe to Gorka Sadowski: eMailAlertsEmail Alerts
Get Gorka Sadowski: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: Cloud Computing, Cloud Expo on Ulitzer, Cloud Computing Newswire, Cloud Backup and Recovery Journal, IT as a Service

Blog Post

Logs for Better Clouds - Part 3: On-Demand Rightsizing

This is the ultimate enabler for your business, because services are delivered at the exact level required

Cloud Computing on Ulitzer

Last time we saw the difficulty in Predictive Rightsizing, a frustrating exercize based on "guesstimation" aimed at predicting future SLA in an everchanging business environment...

So what's the answer?

The solution is a truly dynamic, elastic, real-time on-demand SLA with a provisioning that is transparent to the users.

Provided that you stay within some reasonable boundaries, you can use as many resources as you need, or as few as required, ramping up and slowing down resource usage, without having to provision SLA in advance of usage.

This is the ultimate enabler for your business, because services are delivered at the exact level required, whenever needed, and without preoccupation of advanced provisioning.

This is called "pay per use", or "usage-based cost".

You pay for every network packet sent, generated or consumed, or for every Virtual CPU cycles used or for every record updated, and only for that. Not more, not less.

We are now beyond the nature of provisioning.


Figure 3 - Cloud Provider with pay-per-use business model.

The difficulty in this approach is to obtain crystal-clear visibility in the usage metrics; which means to obtain, store and analyze all the supporting data in order to get a precise count from which to generate the usage bills. Which means visibility in every network packet or CPU cycle of bytes used.  Using a single tool. In a non-intrusive way. Easy to deploy, easy to use.  Etc. etc...  Don't worry we'll see more about associated constraints.

So how would a Cloud Provider gain such hindsight on what is happening and how much to charge a customer?

Using logs of course.

Next, we'll talk about other challenges that are slowing down adoption of public Cloud Providers, Conflict of Interest and the notion of Trust, and Reversability.

And of course we'll deep dive on Log Management Best Practices for Better Clouds.

(I'd love to hear back from you, so fee free to drop me a line at   gorkasadowski (at) gorkasadowski (dot) com )

More Stories By Gorka Sadowski

Gorka is a natural born entrepreneur with a deep understanding of Technology, IT Security and how these create value in the Marketplace. He is today offering innovative European startups the opportunity to benefit from the Silicon Valley ecosystem accelerators. Gorka spent the last 20 years initiating, building and growing businesses that provide technology solutions to the Industry. From General Manager Spain, Italy and Portugal for LogLogic, defining Next Generation Log Management and Security Forensics, to Director Unisys France, bringing Cloud Security service offerings to the market, from Director of Emerging Technologies at NetScreen, defining Next Generation Firewall, to Director of Performance Engineering at INS, removing WAN and Internet bottlenecks, Gorka has always been involved in innovative Technology and IT Security solutions, creating successful Business Units within established Groups and helping launch breakthrough startups such as KOLA Kids OnLine America, a social network for safe computing for children, SourceFire, a leading network security solution provider, or Ibixis, a boutique European business accelerator.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.