cloud computing essentialsstore.globalknowledge.net/course-overviews/dk/gk3210.pdf · how companies...

108
GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00 Cloud Computing Essentials Varighed: 4 Days Kursus Kode: GK3210 Beskrivelse: Explore the potential of cloud computing in this interactive course. Gain clarity about the rapidly developing world of cloud computing and discover its potential in this interactive three-day course. You will learn about the evolution of the cloud and how increases in processing power and bandwidth have made cloud computing possible today. You will also learn who's who in today's world of cloud computing and what products and services they offer. You will explore the financial benefits as well as the security risks, and you will gain a solid understanding of fundamental concepts, deployment, architecture, and design of the fast-growing field of cloud computing. Målgruppe: Those interested in learning the essentials of cloud computing, including an IT manager who is determining whether or not to use cloud services, an implementer who needs to understand the cloud, or sales or marketing professionals who sell cloud services Agenda: By the end of this course you will have learnt: Essential elements of cloud computing Products used to implement the virtualization architecture Pros and cons of cloud computing Security and privacy issues with cloud computing Who's who in cloud computing and the product and services they Federation and presence offer Cloud computing standards and best practices The business case for going to the cloud Platforms and applications used by cloud computing end users How to build a cloud network How mobile devices can be used in the cloud Virtualization architecture Forudsætninger: There are no prerequisites for this course.

Upload: others

Post on 15-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Computing Essentials

Varighed: 4 Days Kursus Kode: GK3210

Beskrivelse:

Explore the potential of cloud computing in this interactive course. Gain clarity about the rapidly developing world of cloud computing anddiscover its potential in this interactive three-day course. You will learn about the evolution of the cloud and how increases in processing powerand bandwidth have made cloud computing possible today. You will also learn who's who in today's world of cloud computing and whatproducts and services they offer. You will explore the financial benefits as well as the security risks, and you will gain a solid understanding offundamental concepts, deployment, architecture, and design of the fast-growing field of cloud computing.

Målgruppe:

Those interested in learning the essentials of cloud computing, including an IT manager who is determining whether or not to use cloudservices, an implementer who needs to understand the cloud, or sales or marketing professionals who sell cloud services

Agenda:

By the end of this course you will have learnt:

Essential elements of cloud computing Products used to implement the virtualization architecture

Pros and cons of cloud computing Security and privacy issues with cloud computing

Who's who in cloud computing and the product and services they Federation and presenceoffer

Cloud computing standards and best practicesThe business case for going to the cloud

Platforms and applications used by cloud computing end usersHow to build a cloud network

How mobile devices can be used in the cloudVirtualization architecture

Forudsætninger:

There are no prerequisites for this course.

Page 2: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Yderligere Kurser:Follow-On Courses

Data Center Infrastructure ManagementVMware vSphere: Install, Configure, Manage [V4.1]VMware View: Install, Configure, Manage [V4.5]Enterprise Virtualization Using Microsoft Hyper-V (M6422, M6331)DCASD - Data Center Application Services v2.0

Page 3: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Indhold:

1. Introduction to Cloud Computingline line line

What is Cloud Computing? Cloud Computing Infrastructure Cloud Computing InfrastructureCloud Computing Defined Cloud Computing Terms Cloud Computing Terms

Benefits and Limitations of Cloud Benefits and Limitations of CloudComputing Computing

line Benefits BenefitsCloud Computing Infrastructure Limitations LimitationsCloud Computing Terms Cloud Computing Case Studies Cloud Computing Case Studies Benefits and Limitations of Cloud Computing How Companies Are Using Cloud How Companies Are Using CloudBenefits Computing ComputingLimitations Implementing Applications and Services Implementing Applications and Services inCloud Computing Case Studies in the Cloud the CloudHow Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services vs. theComputing Cloud Provider Cloud ProviderImplementing Applications and Services in A Cloud Service Provider Introduced A Cloud Service Provider Introduced the Cloud Cloud Computing Risks and Issues Cloud Computing Risks and Issues Using Your Company's Services vs. the Products and Services Provided by Cloud Products and Services Provided by CloudCloud Provider Computing Companies Computing Companies A Cloud Service Provider Introduced Economic EconomicCloud Computing Risks and Issues Staffing Staffing Products and Services Provided by Cloud Should Your Company Invest in Cloud Should Your Company Invest in CloudComputing Companies Computing? Computing?Economic What Should Not be Moved to the Cloud What Should Not be Moved to the Cloud Staffing LANs and the Cloud LANs and the CloudShould Your Company Invest in Cloud Internet and the Cloud Internet and the CloudComputing? Web Services, Browsers, and the Cloud Web Services, Browsers, and the CloudWhat Should Not be Moved to the Cloud Thin Client Thin ClientLANs and the Cloud Advances in Networking and Processing Advances in Networking and ProcessingInternet and the Cloud Speeds that Led to Cloud Computing Speeds that Led to Cloud ComputingWeb Services, Browsers, and the Cloud Networking Developments Networking DevelopmentsThin Client Increased Processing Speeds Increased Processing Speeds Advances in Networking and Processing Managed Service Provider Model to Managed Service Provider Model to CloudSpeeds that Led to Cloud Computing Cloud Computing and Software as a Computing and Software as a ServiceNetworking Developments Service (SaaS) (SaaS)Increased Processing Speeds Single Purpose Architectures Migrate to Single Purpose Architectures Migrate toManaged Service Provider Model to Cloud Multipurpose Architectures Multipurpose ArchitecturesComputing and Software as a Service Data Center Virtualization Data Center Virtualization (SaaS) Collaboration CollaborationSingle Purpose Architectures Migrate to The Cloud as a Reach Extender The Cloud as a Reach ExtenderMultipurpose Architectures The Cloud as a Communication Enabler The Cloud as a Communication EnablerData Center Virtualization The Cloud as an Employee Enabler The Cloud as an Employee Enabler Collaboration Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA)The Cloud as a Reach Extender Evolving from SOA to the Cloud Evolving from SOA to the CloudThe Cloud as a Communication Enabler Capacity: Limited Performance Capacity: Limited PerformanceThe Cloud as an Employee Enabler Availability: Communications Failure and Availability: Communications Failure andService-Oriented Architecture (SOA) Performance Issues Performance IssuesEvolving from SOA to the Cloud Security: Newer Security Protocols Security: Newer Security Protocols ProvideCapacity: Limited Performance Provide More Protection More Protection Availability: Communications Failure and What's Next in Cloud Computing What's Next in Cloud Computing Performance Issues Independent Components Independent ComponentsSecurity: Newer Security Protocols Provide Message Base Message BaseMore Protection Location Independence Location Independence What's Next in Cloud Computing Communication Requirements for Cloud Communication Requirements for CloudIndependent Components Implementation ImplementationMessage Base Public Internet Public InternetLocation Independence Private Internet Private InternetCommunication Requirements for Cloud Routing to the Datacenter Routing to the DatacenterImplementation Switching within the Data Center Switching within the Data CenterPublic Internet Bandwidth BandwidthPrivate Internet Tools Used to Measure Network Tools Used to Measure NetworkRouting to the Datacenter Performance PerformanceSwitching within the Data Center Using the Protocol Analyzer to Measure Using the Protocol Analyzer to Measure

Page 4: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Bandwidth Bandwidth BandwidthTools Used to Measure Network Using Ping and Traceroute to Measure Using Ping and Traceroute to MeasurePerformance Network Performance Network Performance Using the Protocol Analyzer to Measure Security SecurityBandwidth SSL SSLUsing Ping and Traceroute to Measure VPN VPNNetwork Performance Overhead Overhead Security Storage Options for Cloud Computing Storage Options for Cloud ComputingSSL Storage Capacity Storage CapacityVPN Data Protection and Partitioning Data Protection and PartitioningOverhead NAS NASStorage Options for Cloud Computing SAN SANStorage Capacity CAS CASData Protection and Partitioning Redundancy RedundancyNAS Replication ReplicationSAN Multisiting Multisiting CAS Backup and Recovery Backup and Recovery Redundancy Server Software Environments that Server Software Environments thatReplication Support Cloud Computing Support Cloud ComputingMultisiting Server Capacity Server CapacityBackup and Recovery Virtualization VirtualizationServer Software Environments that Support Clustering ClusteringCloud Computing Expansion ExpansionServer Capacity Server Functions Server FunctionsVirtualization Application ApplicationClustering Web WebExpansion Database Database Server Functions Vendor Approaches to Cloud Computing Vendor Approaches to Cloud ComputingApplication Role of Open Source Software in Data Role of Open Source Software in DataWeb Center CenterDatabase Cost Reduction vs. Reliability Cost Reduction vs. ReliabilityVendor Approaches to Cloud Computing Open Source Server Software Open Source Server SoftwareRole of Open Source Software in Data Open Source Database Software Open Source Database SoftwareCenter Open Source Applications Software Open Source Applications SoftwareCost Reduction vs. Reliability Open Source System Management Open Source System ManagementOpen Source Server Software Software SoftwareOpen Source Database Software Open Source Load-Balancing Software Open Source Load-Balancing Software Open Source Applications Software Virtualization as the "Operating System" Virtualization as the "Operating System"Open Source System Management Software Virtualization with a Host Operating Virtualization with a Host OperatingOpen Source Load-Balancing Software System System Virtualization as the "Operating System" Virtualization Infections on Virtualized Virtualization Infections on VirtualizedVirtualization with a Host Operating System Environments EnvironmentsVirtualization Infections on Virtualized Type 1 Virtualized Environment Type 1 Virtualized EnvironmentEnvironments Type 2 Virtualized Environment Type 2 Virtualized Environment Type 1 Virtualized Environment Virtualization Environments Virtualization EnvironmentsType 2 Virtualized Environment Microsoft Virtualization Microsoft VirtualizationVirtualization Environments Sun xVM VirtualBox Sun xVM VirtualBoxMicrosoft Virtualization Linux/UNIX Virtualization Linux/UNIX VirtualizationSun xVM VirtualBox VMware Products VMware ProductsLinux/UNIX Virtualization Data Center and Cloud Infrastructure Data Center and Cloud InfrastructureVMware Products Products ProductsData Center and Cloud Infrastructure End-User and Desktop Products End-User and Desktop Products Products IBM Virtualization IBM VirtualizationEnd-User and Desktop Products Using VMware to see a Virtualized Server Using VMware to see a Virtualized ServerIBM Virtualization Environment Environment Using VMware to see a Virtualized Server Permissive Federation Permissive FederationEnvironment Verified Federation Verified FederationPermissive Federation Encrypted Federation Encrypted FederationVerified Federation Trusted Federation Trusted FederationEncrypted Federation Using XMPP in the Federated Using XMPP in the Federated EnvironmentTrusted Federation Environment Presence in the CloudUsing XMPP in the Federated Environment Presence in the Cloud What It IsPresence in the Cloud What It Is Presence ProtocolsWhat It Is Presence Protocols Leveraging PresencePresence Protocols Leveraging Presence Presence Enabled

Page 5: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Leveraging Presence Presence Enabled The Future of PresencePresence Enabled The Future of Presence The Interrelation of Identity, Presence, andThe Future of Presence The Interrelation of Identity, Presence, Location in the Cloud The Interrelation of Identity, Presence, and and Location in the Cloud Identity ManagementLocation in the Cloud Identity Management What It IsIdentity Management What It Is Future of Identity in the Cloud What It Is Future of Identity in the Cloud Privacy and Its Relation to Cloud-BasedFuture of Identity in the Cloud Privacy and Its Relation to Cloud-Based Information SystemsPrivacy and Its Relation to Cloud-Based Information Systems Personal InformationInformation Systems Personal Information Privacy-Related IssuesPersonal Information Privacy-Related Issues Finding Your Private Information Privacy-Related Issues Finding Your Private Information Open Cloud Consortium Working GroupsFinding Your Private Information Open Cloud Consortium Working Groups Project MatsuOpen Cloud Consortium Working Groups Project Matsu Project CometProject Matsu Project Comet HPC in the CloudProject Comet HPC in the Cloud The Open Cloud TestbedHPC in the Cloud The Open Cloud Testbed The Open Science Data CloudThe Open Cloud Testbed The Open Science Data Cloud Intercloud TestbedThe Open Science Data Cloud Intercloud Testbed Reporting on an Open Cloud ConsortiumIntercloud Testbed Reporting on an Open Cloud Consortium Working Group Reporting on an Open Cloud Consortium Working Group Distributed Management Task ForceWorking Group Distributed Management Task Force (DMTF)Distributed Management Task Force (DMTF) What It Is?(DMTF) What It Is? DMTK Working Groups Associated withWhat It Is? DMTK Working Groups Associated with Cloud Computing DMTK Working Groups Associated with Cloud Computing Standards for Application DevelopersCloud Computing Standards for Application Developers ProtocolsStandards for Application Developers Protocols Scripting LanguagesProtocols Scripting Languages Content Formatting Standards andScripting Languages Content Formatting Standards and Languages Content Formatting Standards and Languages Standards for Security in the CloudLanguages Standards for Security in the Cloud Confidentiality, Integrity, AvailabilityStandards for Security in the Cloud Confidentiality, Integrity, Availability Authentication, Authorization,Confidentiality, Integrity, Availability Authentication, Authorization, AccountabilityAuthentication, Authorization, Accountability Accountability Regulations for PrivacyRegulations for Privacy Regulations for Privacy Security Protocols Security Protocols Security Protocols Establishing a Baseline for CloudEstablishing a Baseline for Cloud Establishing a Baseline for Cloud PerformancePerformance Performance Best Practices for Selecting a Vendor andBest Practices for Selecting a Vendor and Best Practices for Selecting a Vendor Implementing Cloud-Based ApplicationsImplementing Cloud-Based Applications and Implementing Cloud-Based Choosing the Right VendorChoosing the Right Vendor Applications Implementing Cloud-Based Applications Implementing Cloud-Based Applications Choosing the Right Vendor Windows Remote DesktopWindows Remote Desktop Implementing Cloud-Based Applications VncVnc Windows Remote Desktop Web BrowsersWeb Browsers Vnc Server ExtensionsServer Extensions Web Browsers Thin ClientsThin Clients Server Extensions Smart Phones, Pads, Pods, etc. Smart Phones, Pads, Pods, etc. Thin Clients Virtual Terminal Security Strengths andVirtual Terminal Security Strengths and Smart Phones, Pads, Pods, etc. WeaknessesWeaknesses Virtual Terminal Security Strengths and StrengthsStrengths Weaknesses Weaknesses Weaknesses Strengths AndroidAndroid Weaknesses BlackBerryBlackBerry Android Windows MobileWindows Mobile BlackBerry Ubuntu Mobile Internet Device Ubuntu Mobile Internet Device Windows Mobile Mobile Platform VirtualizationMobile Platform Virtualization Ubuntu Mobile Internet Device Kernel-Based Virtual MachineKernel-Based Virtual Machine Mobile Platform Virtualization VMware Mobile Virtualization Platform VMware Mobile Virtualization Platform Kernel-Based Virtual Machine Collaboration Applications for MobileCollaboration Applications for Mobile VMware Mobile Virtualization Platform PlatformsPlatforms Collaboration Applications for Mobile Text MessagingText Messaging Platforms iPhone ApplicationsiPhone Applications Text Messaging BlackBerry ApplicationsBlackBerry Applications iPhone Applications

Page 6: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

BlackBerry Applications

lineline Cloud Computing Infrastructure

Cloud Computing Infrastructure line Cloud Computing Terms Cloud Computing Terms Cloud Computing Infrastructure Benefits and Limitations of CloudBenefits and Limitations of Cloud Computing Cloud Computing Terms ComputingBenefits Benefits and Limitations of Cloud BenefitsLimitations Computing LimitationsCloud Computing Case Studies Benefits Cloud Computing Case Studies How Companies Are Using Cloud Limitations How Companies Are Using CloudComputing Cloud Computing Case Studies ComputingImplementing Applications and Services in How Companies Are Using Cloud Implementing Applications and Services inthe Cloud Computing the CloudUsing Your Company's Services vs. the Implementing Applications and Services Using Your Company's Services vs. theCloud Provider in the Cloud Cloud ProviderA Cloud Service Provider Introduced Using Your Company's Services vs. the A Cloud Service Provider Introduced Cloud Computing Risks and Issues Cloud Provider Cloud Computing Risks and Issues Products and Services Provided by Cloud A Cloud Service Provider Introduced Products and Services Provided by CloudComputing Companies Cloud Computing Risks and Issues Computing Companies Economic Products and Services Provided by Cloud EconomicStaffing Computing Companies Staffing Should Your Company Invest in Cloud Economic Should Your Company Invest in CloudComputing? Staffing Computing?What Should Not be Moved to the Cloud Should Your Company Invest in Cloud What Should Not be Moved to the Cloud LANs and the Cloud Computing? LANs and the CloudInternet and the Cloud What Should Not be Moved to the Cloud Internet and the CloudWeb Services, Browsers, and the Cloud LANs and the Cloud Web Services, Browsers, and the CloudThin Client Internet and the Cloud Thin ClientAdvances in Networking and Processing Web Services, Browsers, and the Cloud Advances in Networking and ProcessingSpeeds that Led to Cloud Computing Thin Client Speeds that Led to Cloud ComputingNetworking Developments Advances in Networking and Processing Networking DevelopmentsIncreased Processing Speeds Speeds that Led to Cloud Computing Increased Processing Speeds Managed Service Provider Model to Cloud Networking Developments Managed Service Provider Model to CloudComputing and Software as a Service Increased Processing Speeds Computing and Software as a Service(SaaS) Managed Service Provider Model to (SaaS)Single Purpose Architectures Migrate to Cloud Computing and Software as a Single Purpose Architectures Migrate toMultipurpose Architectures Service (SaaS) Multipurpose ArchitecturesData Center Virtualization Single Purpose Architectures Migrate to Data Center Virtualization Collaboration Multipurpose Architectures CollaborationThe Cloud as a Reach Extender Data Center Virtualization The Cloud as a Reach ExtenderThe Cloud as a Communication Enabler Collaboration The Cloud as a Communication EnablerThe Cloud as an Employee Enabler The Cloud as a Reach Extender The Cloud as an Employee Enabler Service-Oriented Architecture (SOA) The Cloud as a Communication Enabler Service-Oriented Architecture (SOA)Evolving from SOA to the Cloud The Cloud as an Employee Enabler Evolving from SOA to the CloudCapacity: Limited Performance Service-Oriented Architecture (SOA) Capacity: Limited PerformanceAvailability: Communications Failure and Evolving from SOA to the Cloud Availability: Communications Failure andPerformance Issues Capacity: Limited Performance Performance IssuesSecurity: Newer Security Protocols Provide Availability: Communications Failure and Security: Newer Security Protocols ProvideMore Protection Performance Issues More Protection What's Next in Cloud Computing Security: Newer Security Protocols What's Next in Cloud Computing Independent Components Provide More Protection Independent ComponentsMessage Base What's Next in Cloud Computing Message BaseLocation Independence Independent Components Location Independence Communication Requirements for Cloud Message Base Communication Requirements for CloudImplementation Location Independence ImplementationPublic Internet Communication Requirements for Cloud Public InternetPrivate Internet Implementation Private InternetRouting to the Datacenter Public Internet Routing to the DatacenterSwitching within the Data Center Private Internet Switching within the Data CenterBandwidth Routing to the Datacenter BandwidthTools Used to Measure Network Switching within the Data Center Tools Used to Measure NetworkPerformance Bandwidth PerformanceUsing the Protocol Analyzer to Measure Tools Used to Measure Network Using the Protocol Analyzer to MeasureBandwidth Performance Bandwidth

Page 7: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Using Ping and Traceroute to Measure Using the Protocol Analyzer to Measure Using Ping and Traceroute to MeasureNetwork Performance Bandwidth Network Performance Security Using Ping and Traceroute to Measure SecuritySSL Network Performance SSLVPN Security VPNOverhead SSL Overhead Storage Options for Cloud Computing VPN Storage Options for Cloud ComputingStorage Capacity Overhead Storage CapacityData Protection and Partitioning Storage Options for Cloud Computing Data Protection and PartitioningNAS Storage Capacity NASSAN Data Protection and Partitioning SANCAS NAS CASRedundancy SAN RedundancyReplication CAS ReplicationMultisiting Redundancy Multisiting Backup and Recovery Replication Backup and Recovery Server Software Environments that Support Multisiting Server Software Environments thatCloud Computing Backup and Recovery Support Cloud ComputingServer Capacity Server Software Environments that Server CapacityVirtualization Support Cloud Computing VirtualizationClustering Server Capacity ClusteringExpansion Virtualization ExpansionServer Functions Clustering Server FunctionsApplication Expansion ApplicationWeb Server Functions WebDatabase Application Database Vendor Approaches to Cloud Computing Web Vendor Approaches to Cloud ComputingRole of Open Source Software in Data Database Role of Open Source Software in DataCenter Vendor Approaches to Cloud Computing CenterCost Reduction vs. Reliability Role of Open Source Software in Data Cost Reduction vs. ReliabilityOpen Source Server Software Center Open Source Server SoftwareOpen Source Database Software Cost Reduction vs. Reliability Open Source Database SoftwareOpen Source Applications Software Open Source Server Software Open Source Applications SoftwareOpen Source System Management Software Open Source Database Software Open Source System ManagementOpen Source Load-Balancing Software Open Source Applications Software SoftwareVirtualization as the "Operating System" Open Source System Management Open Source Load-Balancing Software Virtualization with a Host Operating System Software Virtualization as the "Operating System"Virtualization Infections on Virtualized Open Source Load-Balancing Software Virtualization with a Host OperatingEnvironments Virtualization as the "Operating System" System Type 1 Virtualized Environment Virtualization with a Host Operating Virtualization Infections on VirtualizedType 2 Virtualized Environment System EnvironmentsVirtualization Environments Virtualization Infections on Virtualized Type 1 Virtualized EnvironmentMicrosoft Virtualization Environments Type 2 Virtualized Environment Sun xVM VirtualBox Type 1 Virtualized Environment Virtualization EnvironmentsLinux/UNIX Virtualization Type 2 Virtualized Environment Microsoft VirtualizationVMware Products Virtualization Environments Sun xVM VirtualBoxData Center and Cloud Infrastructure Microsoft Virtualization Linux/UNIX VirtualizationProducts Sun xVM VirtualBox VMware ProductsEnd-User and Desktop Products Linux/UNIX Virtualization Data Center and Cloud InfrastructureIBM Virtualization VMware Products ProductsUsing VMware to see a Virtualized Server Data Center and Cloud Infrastructure End-User and Desktop Products Environment Products IBM VirtualizationPermissive Federation End-User and Desktop Products Using VMware to see a Virtualized ServerVerified Federation IBM Virtualization Environment Encrypted Federation Using VMware to see a Virtualized Server Permissive FederationTrusted Federation Environment Verified FederationUsing XMPP in the Federated Environment Permissive Federation Encrypted FederationPresence in the Cloud Verified Federation Trusted FederationWhat It Is Encrypted Federation Using XMPP in the Federated EnvironmentPresence Protocols Trusted Federation Presence in the CloudLeveraging Presence Using XMPP in the Federated What It IsPresence Enabled Environment Presence ProtocolsThe Future of Presence Presence in the Cloud Leveraging PresenceThe Interrelation of Identity, Presence, and What It Is Presence EnabledLocation in the Cloud Presence Protocols The Future of Presence

Page 8: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Identity Management Leveraging Presence The Interrelation of Identity, Presence, andWhat It Is Presence Enabled Location in the Cloud Future of Identity in the Cloud The Future of Presence Identity ManagementPrivacy and Its Relation to Cloud-Based The Interrelation of Identity, Presence, What It IsInformation Systems and Location in the Cloud Future of Identity in the Cloud Personal Information Identity Management Privacy and Its Relation to Cloud-BasedPrivacy-Related Issues What It Is Information SystemsFinding Your Private Information Future of Identity in the Cloud Personal InformationOpen Cloud Consortium Working Groups Privacy and Its Relation to Cloud-Based Privacy-Related IssuesProject Matsu Information Systems Finding Your Private Information Project Comet Personal Information Open Cloud Consortium Working GroupsHPC in the Cloud Privacy-Related Issues Project MatsuThe Open Cloud Testbed Finding Your Private Information Project CometThe Open Science Data Cloud Open Cloud Consortium Working Groups HPC in the CloudIntercloud Testbed Project Matsu The Open Cloud TestbedReporting on an Open Cloud Consortium Project Comet The Open Science Data CloudWorking Group HPC in the Cloud Intercloud TestbedDistributed Management Task Force The Open Cloud Testbed Reporting on an Open Cloud Consortium(DMTF) The Open Science Data Cloud Working Group What It Is? Intercloud Testbed Distributed Management Task ForceDMTK Working Groups Associated with Reporting on an Open Cloud Consortium (DMTF)Cloud Computing Working Group What It Is?Standards for Application Developers Distributed Management Task Force DMTK Working Groups Associated withProtocols (DMTF) Cloud Computing Scripting Languages What It Is? Standards for Application DevelopersContent Formatting Standards and DMTK Working Groups Associated with ProtocolsLanguages Cloud Computing Scripting LanguagesStandards for Security in the Cloud Standards for Application Developers Content Formatting Standards andConfidentiality, Integrity, Availability Protocols Languages Authentication, Authorization, Accountability Scripting Languages Standards for Security in the CloudRegulations for Privacy Content Formatting Standards and Confidentiality, Integrity, AvailabilitySecurity Protocols Languages Authentication, Authorization,Establishing a Baseline for Cloud Standards for Security in the Cloud AccountabilityPerformance Confidentiality, Integrity, Availability Regulations for PrivacyBest Practices for Selecting a Vendor and Authentication, Authorization, Security Protocols Implementing Cloud-Based Applications Accountability Establishing a Baseline for CloudChoosing the Right Vendor Regulations for Privacy PerformanceImplementing Cloud-Based Applications Security Protocols Best Practices for Selecting a Vendor andWindows Remote Desktop Establishing a Baseline for Cloud Implementing Cloud-Based ApplicationsVnc Performance Choosing the Right VendorWeb Browsers Best Practices for Selecting a Vendor Implementing Cloud-Based Applications Server Extensions and Implementing Cloud-Based Windows Remote DesktopThin Clients Applications VncSmart Phones, Pads, Pods, etc. Choosing the Right Vendor Web BrowsersVirtual Terminal Security Strengths and Implementing Cloud-Based Applications Server ExtensionsWeaknesses Windows Remote Desktop Thin ClientsStrengths Vnc Smart Phones, Pads, Pods, etc. Weaknesses Web Browsers Virtual Terminal Security Strengths andAndroid Server Extensions WeaknessesBlackBerry Thin Clients StrengthsWindows Mobile Smart Phones, Pads, Pods, etc. Weaknesses Ubuntu Mobile Internet Device Virtual Terminal Security Strengths and AndroidMobile Platform Virtualization Weaknesses BlackBerryKernel-Based Virtual Machine Strengths Windows MobileVMware Mobile Virtualization Platform Weaknesses Ubuntu Mobile Internet Device Collaboration Applications for Mobile Android Mobile Platform VirtualizationPlatforms BlackBerry Kernel-Based Virtual MachineText Messaging Windows Mobile VMware Mobile Virtualization Platform iPhone Applications Ubuntu Mobile Internet Device Collaboration Applications for MobileBlackBerry Applications Mobile Platform Virtualization Platforms

Kernel-Based Virtual Machine Text MessagingVMware Mobile Virtualization Platform iPhone ApplicationsCollaboration Applications for Mobile BlackBerry Applications

line PlatformsCloud Computing Infrastructure Text Messaging

Page 9: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Computing Terms iPhone Applications 8. Cloud Computing Standards and BestBenefits and Limitations of Cloud Computing BlackBerry Applications PracticesBenefits lineLimitations Open Cloud ConsortiumCloud Computing Case Studies What It IsHow Companies Are Using Cloud lineComputing Cloud Computing InfrastructureImplementing Applications and Services in Cloud Computing Terms linethe Cloud Benefits and Limitations of Cloud Cloud Computing InfrastructureUsing Your Company's Services vs. the Computing Cloud Computing Terms Cloud Provider Benefits Benefits and Limitations of CloudA Cloud Service Provider Introduced Limitations ComputingCloud Computing Risks and Issues Cloud Computing Case Studies BenefitsProducts and Services Provided by Cloud How Companies Are Using Cloud LimitationsComputing Companies Computing Cloud Computing Case Studies Economic Implementing Applications and Services How Companies Are Using CloudStaffing in the Cloud ComputingShould Your Company Invest in Cloud Using Your Company's Services vs. the Implementing Applications and Services inComputing? Cloud Provider the CloudWhat Should Not be Moved to the Cloud A Cloud Service Provider Introduced Using Your Company's Services vs. theLANs and the Cloud Cloud Computing Risks and Issues Cloud ProviderInternet and the Cloud Products and Services Provided by Cloud A Cloud Service Provider Introduced Web Services, Browsers, and the Cloud Computing Companies Cloud Computing Risks and Issues Thin Client Economic Products and Services Provided by CloudAdvances in Networking and Processing Staffing Computing Companies Speeds that Led to Cloud Computing Should Your Company Invest in Cloud EconomicNetworking Developments Computing? Staffing Increased Processing Speeds What Should Not be Moved to the Cloud Should Your Company Invest in CloudManaged Service Provider Model to Cloud LANs and the Cloud Computing?Computing and Software as a Service Internet and the Cloud What Should Not be Moved to the Cloud (SaaS) Web Services, Browsers, and the Cloud LANs and the CloudSingle Purpose Architectures Migrate to Thin Client Internet and the CloudMultipurpose Architectures Advances in Networking and Processing Web Services, Browsers, and the CloudData Center Virtualization Speeds that Led to Cloud Computing Thin ClientCollaboration Networking Developments Advances in Networking and ProcessingThe Cloud as a Reach Extender Increased Processing Speeds Speeds that Led to Cloud ComputingThe Cloud as a Communication Enabler Managed Service Provider Model to Networking DevelopmentsThe Cloud as an Employee Enabler Cloud Computing and Software as a Increased Processing Speeds Service-Oriented Architecture (SOA) Service (SaaS) Managed Service Provider Model to CloudEvolving from SOA to the Cloud Single Purpose Architectures Migrate to Computing and Software as a ServiceCapacity: Limited Performance Multipurpose Architectures (SaaS)Availability: Communications Failure and Data Center Virtualization Single Purpose Architectures Migrate toPerformance Issues Collaboration Multipurpose ArchitecturesSecurity: Newer Security Protocols Provide The Cloud as a Reach Extender Data Center Virtualization More Protection The Cloud as a Communication Enabler CollaborationWhat's Next in Cloud Computing The Cloud as an Employee Enabler The Cloud as a Reach ExtenderIndependent Components Service-Oriented Architecture (SOA) The Cloud as a Communication EnablerMessage Base Evolving from SOA to the Cloud The Cloud as an Employee Enabler Location Independence Capacity: Limited Performance Service-Oriented Architecture (SOA)Communication Requirements for Cloud Availability: Communications Failure and Evolving from SOA to the CloudImplementation Performance Issues Capacity: Limited PerformancePublic Internet Security: Newer Security Protocols Availability: Communications Failure andPrivate Internet Provide More Protection Performance IssuesRouting to the Datacenter What's Next in Cloud Computing Security: Newer Security Protocols ProvideSwitching within the Data Center Independent Components More Protection Bandwidth Message Base What's Next in Cloud Computing Tools Used to Measure Network Location Independence Independent ComponentsPerformance Communication Requirements for Cloud Message BaseUsing the Protocol Analyzer to Measure Implementation Location Independence Bandwidth Public Internet Communication Requirements for CloudUsing Ping and Traceroute to Measure Private Internet ImplementationNetwork Performance Routing to the Datacenter Public InternetSecurity Switching within the Data Center Private InternetSSL Bandwidth Routing to the DatacenterVPN Tools Used to Measure Network Switching within the Data Center

Page 10: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Overhead Performance BandwidthStorage Options for Cloud Computing Using the Protocol Analyzer to Measure Tools Used to Measure NetworkStorage Capacity Bandwidth PerformanceData Protection and Partitioning Using Ping and Traceroute to Measure Using the Protocol Analyzer to MeasureNAS Network Performance BandwidthSAN Security Using Ping and Traceroute to MeasureCAS SSL Network Performance Redundancy VPN SecurityReplication Overhead SSLMultisiting Storage Options for Cloud Computing VPNBackup and Recovery Storage Capacity Overhead Server Software Environments that Support Data Protection and Partitioning Storage Options for Cloud ComputingCloud Computing NAS Storage CapacityServer Capacity SAN Data Protection and PartitioningVirtualization CAS NASClustering Redundancy SANExpansion Replication CASServer Functions Multisiting RedundancyApplication Backup and Recovery ReplicationWeb Server Software Environments that Multisiting Database Support Cloud Computing Backup and Recovery Vendor Approaches to Cloud Computing Server Capacity Server Software Environments thatRole of Open Source Software in Data Virtualization Support Cloud ComputingCenter Clustering Server CapacityCost Reduction vs. Reliability Expansion VirtualizationOpen Source Server Software Server Functions ClusteringOpen Source Database Software Application ExpansionOpen Source Applications Software Web Server FunctionsOpen Source System Management Software Database ApplicationOpen Source Load-Balancing Software Vendor Approaches to Cloud Computing WebVirtualization as the "Operating System" Role of Open Source Software in Data Database Virtualization with a Host Operating System Center Vendor Approaches to Cloud ComputingVirtualization Infections on Virtualized Cost Reduction vs. Reliability Role of Open Source Software in DataEnvironments Open Source Server Software CenterType 1 Virtualized Environment Open Source Database Software Cost Reduction vs. ReliabilityType 2 Virtualized Environment Open Source Applications Software Open Source Server SoftwareVirtualization Environments Open Source System Management Open Source Database SoftwareMicrosoft Virtualization Software Open Source Applications SoftwareSun xVM VirtualBox Open Source Load-Balancing Software Open Source System ManagementLinux/UNIX Virtualization Virtualization as the "Operating System" SoftwareVMware Products Virtualization with a Host Operating Open Source Load-Balancing Software Data Center and Cloud Infrastructure System Virtualization as the "Operating System"Products Virtualization Infections on Virtualized Virtualization with a Host OperatingEnd-User and Desktop Products Environments System IBM Virtualization Type 1 Virtualized Environment Virtualization Infections on VirtualizedUsing VMware to see a Virtualized Server Type 2 Virtualized Environment EnvironmentsEnvironment Virtualization Environments Type 1 Virtualized EnvironmentPermissive Federation Microsoft Virtualization Type 2 Virtualized Environment Verified Federation Sun xVM VirtualBox Virtualization EnvironmentsEncrypted Federation Linux/UNIX Virtualization Microsoft VirtualizationTrusted Federation VMware Products Sun xVM VirtualBoxUsing XMPP in the Federated Environment Data Center and Cloud Infrastructure Linux/UNIX VirtualizationPresence in the Cloud Products VMware ProductsWhat It Is End-User and Desktop Products Data Center and Cloud InfrastructurePresence Protocols IBM Virtualization ProductsLeveraging Presence Using VMware to see a Virtualized Server End-User and Desktop Products Presence Enabled Environment IBM VirtualizationThe Future of Presence Permissive Federation Using VMware to see a Virtualized ServerThe Interrelation of Identity, Presence, and Verified Federation Environment Location in the Cloud Encrypted Federation Permissive FederationIdentity Management Trusted Federation Verified FederationWhat It Is Using XMPP in the Federated Encrypted FederationFuture of Identity in the Cloud Environment Trusted FederationPrivacy and Its Relation to Cloud-Based Presence in the Cloud Using XMPP in the Federated EnvironmentInformation Systems What It Is Presence in the Cloud

Page 11: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Personal Information Presence Protocols What It IsPrivacy-Related Issues Leveraging Presence Presence ProtocolsFinding Your Private Information Presence Enabled Leveraging PresenceOpen Cloud Consortium Working Groups The Future of Presence Presence EnabledProject Matsu The Interrelation of Identity, Presence, The Future of PresenceProject Comet and Location in the Cloud The Interrelation of Identity, Presence, andHPC in the Cloud Identity Management Location in the Cloud The Open Cloud Testbed What It Is Identity ManagementThe Open Science Data Cloud Future of Identity in the Cloud What It IsIntercloud Testbed Privacy and Its Relation to Cloud-Based Future of Identity in the Cloud Reporting on an Open Cloud Consortium Information Systems Privacy and Its Relation to Cloud-BasedWorking Group Personal Information Information SystemsDistributed Management Task Force Privacy-Related Issues Personal Information(DMTF) Finding Your Private Information Privacy-Related IssuesWhat It Is? Open Cloud Consortium Working Groups Finding Your Private Information DMTK Working Groups Associated with Project Matsu Open Cloud Consortium Working GroupsCloud Computing Project Comet Project MatsuStandards for Application Developers HPC in the Cloud Project CometProtocols The Open Cloud Testbed HPC in the CloudScripting Languages The Open Science Data Cloud The Open Cloud TestbedContent Formatting Standards and Intercloud Testbed The Open Science Data CloudLanguages Reporting on an Open Cloud Consortium Intercloud TestbedStandards for Security in the Cloud Working Group Reporting on an Open Cloud ConsortiumConfidentiality, Integrity, Availability Distributed Management Task Force Working Group Authentication, Authorization, Accountability (DMTF) Distributed Management Task ForceRegulations for Privacy What It Is? (DMTF)Security Protocols DMTK Working Groups Associated with What It Is?Establishing a Baseline for Cloud Cloud Computing DMTK Working Groups Associated withPerformance Standards for Application Developers Cloud Computing Best Practices for Selecting a Vendor and Protocols Standards for Application DevelopersImplementing Cloud-Based Applications Scripting Languages ProtocolsChoosing the Right Vendor Content Formatting Standards and Scripting LanguagesImplementing Cloud-Based Applications Languages Content Formatting Standards andWindows Remote Desktop Standards for Security in the Cloud Languages Vnc Confidentiality, Integrity, Availability Standards for Security in the CloudWeb Browsers Authentication, Authorization, Confidentiality, Integrity, AvailabilityServer Extensions Accountability Authentication, Authorization,Thin Clients Regulations for Privacy AccountabilitySmart Phones, Pads, Pods, etc. Security Protocols Regulations for PrivacyVirtual Terminal Security Strengths and Establishing a Baseline for Cloud Security Protocols Weaknesses Performance Establishing a Baseline for CloudStrengths Best Practices for Selecting a Vendor PerformanceWeaknesses and Implementing Cloud-Based Best Practices for Selecting a Vendor andAndroid Applications Implementing Cloud-Based ApplicationsBlackBerry Choosing the Right Vendor Choosing the Right VendorWindows Mobile Implementing Cloud-Based Applications Implementing Cloud-Based Applications Ubuntu Mobile Internet Device Windows Remote Desktop Windows Remote DesktopMobile Platform Virtualization Vnc VncKernel-Based Virtual Machine Web Browsers Web BrowsersVMware Mobile Virtualization Platform Server Extensions Server ExtensionsCollaboration Applications for Mobile Thin Clients Thin ClientsPlatforms Smart Phones, Pads, Pods, etc. Smart Phones, Pads, Pods, etc. Text Messaging Virtual Terminal Security Strengths and Virtual Terminal Security Strengths andiPhone Applications Weaknesses WeaknessesBlackBerry Applications Strengths Strengths

Weaknesses Weaknesses Android AndroidBlackBerry BlackBerry

line Windows Mobile Windows MobileCloud Computing Infrastructure Ubuntu Mobile Internet Device Ubuntu Mobile Internet Device Cloud Computing Terms Mobile Platform Virtualization Mobile Platform VirtualizationBenefits and Limitations of Cloud Computing Kernel-Based Virtual Machine Kernel-Based Virtual MachineBenefits VMware Mobile Virtualization Platform VMware Mobile Virtualization Platform Limitations Collaboration Applications for Mobile Collaboration Applications for MobileCloud Computing Case Studies Platforms Platforms

Page 12: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

How Companies Are Using Cloud Text Messaging Text MessagingComputing iPhone Applications iPhone ApplicationsImplementing Applications and Services in BlackBerry Applications BlackBerry Applicationsthe CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider Introduced line lineCloud Computing Risks and Issues Cloud Computing Infrastructure Cloud Computing InfrastructureProducts and Services Provided by Cloud Cloud Computing Terms Cloud Computing Terms Computing Companies Benefits and Limitations of Cloud Benefits and Limitations of CloudEconomic Computing ComputingStaffing Benefits BenefitsShould Your Company Invest in Cloud Limitations LimitationsComputing? Cloud Computing Case Studies Cloud Computing Case Studies What Should Not be Moved to the Cloud How Companies Are Using Cloud How Companies Are Using CloudLANs and the Cloud Computing ComputingInternet and the Cloud Implementing Applications and Services Implementing Applications and Services inWeb Services, Browsers, and the Cloud in the Cloud the CloudThin Client Using Your Company's Services vs. the Using Your Company's Services vs. theAdvances in Networking and Processing Cloud Provider Cloud ProviderSpeeds that Led to Cloud Computing A Cloud Service Provider Introduced A Cloud Service Provider Introduced Networking Developments Cloud Computing Risks and Issues Cloud Computing Risks and Issues Increased Processing Speeds Products and Services Provided by Cloud Products and Services Provided by CloudManaged Service Provider Model to Cloud Computing Companies Computing Companies Computing and Software as a Service Economic Economic(SaaS) Staffing Staffing Single Purpose Architectures Migrate to Should Your Company Invest in Cloud Should Your Company Invest in CloudMultipurpose Architectures Computing? Computing?Data Center Virtualization What Should Not be Moved to the Cloud What Should Not be Moved to the Cloud Collaboration LANs and the Cloud LANs and the CloudThe Cloud as a Reach Extender Internet and the Cloud Internet and the CloudThe Cloud as a Communication Enabler Web Services, Browsers, and the Cloud Web Services, Browsers, and the CloudThe Cloud as an Employee Enabler Thin Client Thin ClientService-Oriented Architecture (SOA) Advances in Networking and Processing Advances in Networking and ProcessingEvolving from SOA to the Cloud Speeds that Led to Cloud Computing Speeds that Led to Cloud ComputingCapacity: Limited Performance Networking Developments Networking DevelopmentsAvailability: Communications Failure and Increased Processing Speeds Increased Processing Speeds Performance Issues Managed Service Provider Model to Managed Service Provider Model to CloudSecurity: Newer Security Protocols Provide Cloud Computing and Software as a Computing and Software as a ServiceMore Protection Service (SaaS) (SaaS)What's Next in Cloud Computing Single Purpose Architectures Migrate to Single Purpose Architectures Migrate toIndependent Components Multipurpose Architectures Multipurpose ArchitecturesMessage Base Data Center Virtualization Data Center Virtualization Location Independence Collaboration CollaborationCommunication Requirements for Cloud The Cloud as a Reach Extender The Cloud as a Reach ExtenderImplementation The Cloud as a Communication Enabler The Cloud as a Communication EnablerPublic Internet The Cloud as an Employee Enabler The Cloud as an Employee Enabler Private Internet Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA)Routing to the Datacenter Evolving from SOA to the Cloud Evolving from SOA to the CloudSwitching within the Data Center Capacity: Limited Performance Capacity: Limited PerformanceBandwidth Availability: Communications Failure and Availability: Communications Failure andTools Used to Measure Network Performance Issues Performance IssuesPerformance Security: Newer Security Protocols Security: Newer Security Protocols ProvideUsing the Protocol Analyzer to Measure Provide More Protection More Protection Bandwidth What's Next in Cloud Computing What's Next in Cloud Computing Using Ping and Traceroute to Measure Independent Components Independent ComponentsNetwork Performance Message Base Message BaseSecurity Location Independence Location Independence SSL Communication Requirements for Cloud Communication Requirements for CloudVPN Implementation ImplementationOverhead Public Internet Public InternetStorage Options for Cloud Computing Private Internet Private InternetStorage Capacity Routing to the Datacenter Routing to the DatacenterData Protection and Partitioning Switching within the Data Center Switching within the Data CenterNAS Bandwidth Bandwidth

Page 13: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

SAN Tools Used to Measure Network Tools Used to Measure NetworkCAS Performance PerformanceRedundancy Using the Protocol Analyzer to Measure Using the Protocol Analyzer to MeasureReplication Bandwidth BandwidthMultisiting Using Ping and Traceroute to Measure Using Ping and Traceroute to MeasureBackup and Recovery Network Performance Network Performance Server Software Environments that Support Security SecurityCloud Computing SSL SSLServer Capacity VPN VPNVirtualization Overhead Overhead Clustering Storage Options for Cloud Computing Storage Options for Cloud ComputingExpansion Storage Capacity Storage CapacityServer Functions Data Protection and Partitioning Data Protection and PartitioningApplication NAS NASWeb SAN SANDatabase CAS CASVendor Approaches to Cloud Computing Redundancy RedundancyRole of Open Source Software in Data Replication ReplicationCenter Multisiting Multisiting Cost Reduction vs. Reliability Backup and Recovery Backup and Recovery Open Source Server Software Server Software Environments that Server Software Environments thatOpen Source Database Software Support Cloud Computing Support Cloud ComputingOpen Source Applications Software Server Capacity Server CapacityOpen Source System Management Software Virtualization VirtualizationOpen Source Load-Balancing Software Clustering ClusteringVirtualization as the "Operating System" Expansion ExpansionVirtualization with a Host Operating System Server Functions Server FunctionsVirtualization Infections on Virtualized Application ApplicationEnvironments Web WebType 1 Virtualized Environment Database Database Type 2 Virtualized Environment Vendor Approaches to Cloud Computing Vendor Approaches to Cloud ComputingVirtualization Environments Role of Open Source Software in Data Role of Open Source Software in DataMicrosoft Virtualization Center CenterSun xVM VirtualBox Cost Reduction vs. Reliability Cost Reduction vs. ReliabilityLinux/UNIX Virtualization Open Source Server Software Open Source Server SoftwareVMware Products Open Source Database Software Open Source Database SoftwareData Center and Cloud Infrastructure Open Source Applications Software Open Source Applications SoftwareProducts Open Source System Management Open Source System ManagementEnd-User and Desktop Products Software SoftwareIBM Virtualization Open Source Load-Balancing Software Open Source Load-Balancing Software Using VMware to see a Virtualized Server Virtualization as the "Operating System" Virtualization as the "Operating System"Environment Virtualization with a Host Operating Virtualization with a Host OperatingPermissive Federation System System Verified Federation Virtualization Infections on Virtualized Virtualization Infections on VirtualizedEncrypted Federation Environments EnvironmentsTrusted Federation Type 1 Virtualized Environment Type 1 Virtualized EnvironmentUsing XMPP in the Federated Environment Type 2 Virtualized Environment Type 2 Virtualized Environment Presence in the Cloud Virtualization Environments Virtualization EnvironmentsWhat It Is Microsoft Virtualization Microsoft VirtualizationPresence Protocols Sun xVM VirtualBox Sun xVM VirtualBoxLeveraging Presence Linux/UNIX Virtualization Linux/UNIX VirtualizationPresence Enabled VMware Products VMware ProductsThe Future of Presence Data Center and Cloud Infrastructure Data Center and Cloud InfrastructureThe Interrelation of Identity, Presence, and Products ProductsLocation in the Cloud End-User and Desktop Products End-User and Desktop Products Identity Management IBM Virtualization IBM VirtualizationWhat It Is Using VMware to see a Virtualized Server Using VMware to see a Virtualized ServerFuture of Identity in the Cloud Environment Environment Privacy and Its Relation to Cloud-Based Permissive Federation Permissive FederationInformation Systems Verified Federation Verified FederationPersonal Information Encrypted Federation Encrypted FederationPrivacy-Related Issues Trusted Federation Trusted FederationFinding Your Private Information Using XMPP in the Federated Using XMPP in the Federated EnvironmentOpen Cloud Consortium Working Groups Environment Presence in the CloudProject Matsu Presence in the Cloud What It Is

Page 14: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Project Comet What It Is Presence ProtocolsHPC in the Cloud Presence Protocols Leveraging PresenceThe Open Cloud Testbed Leveraging Presence Presence EnabledThe Open Science Data Cloud Presence Enabled The Future of PresenceIntercloud Testbed The Future of Presence The Interrelation of Identity, Presence, andReporting on an Open Cloud Consortium The Interrelation of Identity, Presence, Location in the Cloud Working Group and Location in the Cloud Identity ManagementDistributed Management Task Force Identity Management What It Is(DMTF) What It Is Future of Identity in the Cloud What It Is? Future of Identity in the Cloud Privacy and Its Relation to Cloud-BasedDMTK Working Groups Associated with Privacy and Its Relation to Cloud-Based Information SystemsCloud Computing Information Systems Personal InformationStandards for Application Developers Personal Information Privacy-Related IssuesProtocols Privacy-Related Issues Finding Your Private Information Scripting Languages Finding Your Private Information Open Cloud Consortium Working GroupsContent Formatting Standards and Open Cloud Consortium Working Groups Project MatsuLanguages Project Matsu Project CometStandards for Security in the Cloud Project Comet HPC in the CloudConfidentiality, Integrity, Availability HPC in the Cloud The Open Cloud TestbedAuthentication, Authorization, Accountability The Open Cloud Testbed The Open Science Data CloudRegulations for Privacy The Open Science Data Cloud Intercloud TestbedSecurity Protocols Intercloud Testbed Reporting on an Open Cloud ConsortiumEstablishing a Baseline for Cloud Reporting on an Open Cloud Consortium Working Group Performance Working Group Distributed Management Task ForceBest Practices for Selecting a Vendor and Distributed Management Task Force (DMTF)Implementing Cloud-Based Applications (DMTF) What It Is?Choosing the Right Vendor What It Is? DMTK Working Groups Associated withImplementing Cloud-Based Applications DMTK Working Groups Associated with Cloud Computing Windows Remote Desktop Cloud Computing Standards for Application DevelopersVnc Standards for Application Developers ProtocolsWeb Browsers Protocols Scripting LanguagesServer Extensions Scripting Languages Content Formatting Standards andThin Clients Content Formatting Standards and Languages Smart Phones, Pads, Pods, etc. Languages Standards for Security in the CloudVirtual Terminal Security Strengths and Standards for Security in the Cloud Confidentiality, Integrity, AvailabilityWeaknesses Confidentiality, Integrity, Availability Authentication, Authorization,Strengths Authentication, Authorization, AccountabilityWeaknesses Accountability Regulations for PrivacyAndroid Regulations for Privacy Security Protocols BlackBerry Security Protocols Establishing a Baseline for CloudWindows Mobile Establishing a Baseline for Cloud PerformanceUbuntu Mobile Internet Device Performance Best Practices for Selecting a Vendor andMobile Platform Virtualization Best Practices for Selecting a Vendor Implementing Cloud-Based ApplicationsKernel-Based Virtual Machine and Implementing Cloud-Based Choosing the Right VendorVMware Mobile Virtualization Platform Applications Implementing Cloud-Based Applications Collaboration Applications for Mobile Choosing the Right Vendor Windows Remote DesktopPlatforms Implementing Cloud-Based Applications VncText Messaging Windows Remote Desktop Web BrowsersiPhone Applications Vnc Server ExtensionsBlackBerry Applications Web Browsers Thin Clients

Server Extensions Smart Phones, Pads, Pods, etc. Thin Clients Virtual Terminal Security Strengths andSmart Phones, Pads, Pods, etc. Weaknesses

line Virtual Terminal Security Strengths and StrengthsCloud Computing Infrastructure Weaknesses Weaknesses Cloud Computing Terms Strengths AndroidBenefits and Limitations of Cloud Computing Weaknesses BlackBerryBenefits Android Windows MobileLimitations BlackBerry Ubuntu Mobile Internet Device Cloud Computing Case Studies Windows Mobile Mobile Platform VirtualizationHow Companies Are Using Cloud Ubuntu Mobile Internet Device Kernel-Based Virtual MachineComputing Mobile Platform Virtualization VMware Mobile Virtualization Platform Implementing Applications and Services in Kernel-Based Virtual Machine Collaboration Applications for Mobilethe Cloud VMware Mobile Virtualization Platform PlatformsUsing Your Company's Services vs. the Collaboration Applications for Mobile Text Messaging

Page 15: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Provider Platforms iPhone ApplicationsA Cloud Service Provider Introduced Text Messaging BlackBerry ApplicationsCloud Computing Risks and Issues iPhone ApplicationsProducts and Services Provided by Cloud BlackBerry ApplicationsComputing Companies Economic lineStaffing Cloud Computing InfrastructureShould Your Company Invest in Cloud line Cloud Computing Terms Computing? Cloud Computing Infrastructure Benefits and Limitations of CloudWhat Should Not be Moved to the Cloud Cloud Computing Terms ComputingLANs and the Cloud Benefits and Limitations of Cloud BenefitsInternet and the Cloud Computing LimitationsWeb Services, Browsers, and the Cloud Benefits Cloud Computing Case Studies Thin Client Limitations How Companies Are Using CloudAdvances in Networking and Processing Cloud Computing Case Studies ComputingSpeeds that Led to Cloud Computing How Companies Are Using Cloud Implementing Applications and Services inNetworking Developments Computing the CloudIncreased Processing Speeds Implementing Applications and Services Using Your Company's Services vs. theManaged Service Provider Model to Cloud in the Cloud Cloud ProviderComputing and Software as a Service Using Your Company's Services vs. the A Cloud Service Provider Introduced (SaaS) Cloud Provider Cloud Computing Risks and Issues Single Purpose Architectures Migrate to A Cloud Service Provider Introduced Products and Services Provided by CloudMultipurpose Architectures Cloud Computing Risks and Issues Computing Companies Data Center Virtualization Products and Services Provided by Cloud EconomicCollaboration Computing Companies Staffing The Cloud as a Reach Extender Economic Should Your Company Invest in CloudThe Cloud as a Communication Enabler Staffing Computing?The Cloud as an Employee Enabler Should Your Company Invest in Cloud What Should Not be Moved to the Cloud Service-Oriented Architecture (SOA) Computing? LANs and the CloudEvolving from SOA to the Cloud What Should Not be Moved to the Cloud Internet and the CloudCapacity: Limited Performance LANs and the Cloud Web Services, Browsers, and the CloudAvailability: Communications Failure and Internet and the Cloud Thin ClientPerformance Issues Web Services, Browsers, and the Cloud Advances in Networking and ProcessingSecurity: Newer Security Protocols Provide Thin Client Speeds that Led to Cloud ComputingMore Protection Advances in Networking and Processing Networking DevelopmentsWhat's Next in Cloud Computing Speeds that Led to Cloud Computing Increased Processing Speeds Independent Components Networking Developments Managed Service Provider Model to CloudMessage Base Increased Processing Speeds Computing and Software as a ServiceLocation Independence Managed Service Provider Model to (SaaS)Communication Requirements for Cloud Cloud Computing and Software as a Single Purpose Architectures Migrate toImplementation Service (SaaS) Multipurpose ArchitecturesPublic Internet Single Purpose Architectures Migrate to Data Center Virtualization Private Internet Multipurpose Architectures CollaborationRouting to the Datacenter Data Center Virtualization The Cloud as a Reach ExtenderSwitching within the Data Center Collaboration The Cloud as a Communication EnablerBandwidth The Cloud as a Reach Extender The Cloud as an Employee Enabler Tools Used to Measure Network The Cloud as a Communication Enabler Service-Oriented Architecture (SOA)Performance The Cloud as an Employee Enabler Evolving from SOA to the CloudUsing the Protocol Analyzer to Measure Service-Oriented Architecture (SOA) Capacity: Limited PerformanceBandwidth Evolving from SOA to the Cloud Availability: Communications Failure andUsing Ping and Traceroute to Measure Capacity: Limited Performance Performance IssuesNetwork Performance Availability: Communications Failure and Security: Newer Security Protocols ProvideSecurity Performance Issues More Protection SSL Security: Newer Security Protocols What's Next in Cloud Computing VPN Provide More Protection Independent ComponentsOverhead What's Next in Cloud Computing Message BaseStorage Options for Cloud Computing Independent Components Location Independence Storage Capacity Message Base Communication Requirements for CloudData Protection and Partitioning Location Independence ImplementationNAS Communication Requirements for Cloud Public InternetSAN Implementation Private InternetCAS Public Internet Routing to the DatacenterRedundancy Private Internet Switching within the Data CenterReplication Routing to the Datacenter BandwidthMultisiting Switching within the Data Center Tools Used to Measure Network

Page 16: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Backup and Recovery Bandwidth PerformanceServer Software Environments that Support Tools Used to Measure Network Using the Protocol Analyzer to MeasureCloud Computing Performance BandwidthServer Capacity Using the Protocol Analyzer to Measure Using Ping and Traceroute to MeasureVirtualization Bandwidth Network Performance Clustering Using Ping and Traceroute to Measure SecurityExpansion Network Performance SSLServer Functions Security VPNApplication SSL Overhead Web VPN Storage Options for Cloud ComputingDatabase Overhead Storage CapacityVendor Approaches to Cloud Computing Storage Options for Cloud Computing Data Protection and PartitioningRole of Open Source Software in Data Storage Capacity NASCenter Data Protection and Partitioning SANCost Reduction vs. Reliability NAS CASOpen Source Server Software SAN RedundancyOpen Source Database Software CAS ReplicationOpen Source Applications Software Redundancy Multisiting Open Source System Management Software Replication Backup and Recovery Open Source Load-Balancing Software Multisiting Server Software Environments thatVirtualization as the "Operating System" Backup and Recovery Support Cloud ComputingVirtualization with a Host Operating System Server Software Environments that Server CapacityVirtualization Infections on Virtualized Support Cloud Computing VirtualizationEnvironments Server Capacity ClusteringType 1 Virtualized Environment Virtualization ExpansionType 2 Virtualized Environment Clustering Server FunctionsVirtualization Environments Expansion ApplicationMicrosoft Virtualization Server Functions WebSun xVM VirtualBox Application Database Linux/UNIX Virtualization Web Vendor Approaches to Cloud ComputingVMware Products Database Role of Open Source Software in DataData Center and Cloud Infrastructure Vendor Approaches to Cloud Computing CenterProducts Role of Open Source Software in Data Cost Reduction vs. ReliabilityEnd-User and Desktop Products Center Open Source Server SoftwareIBM Virtualization Cost Reduction vs. Reliability Open Source Database SoftwareUsing VMware to see a Virtualized Server Open Source Server Software Open Source Applications SoftwareEnvironment Open Source Database Software Open Source System ManagementPermissive Federation Open Source Applications Software SoftwareVerified Federation Open Source System Management Open Source Load-Balancing Software Encrypted Federation Software Virtualization as the "Operating System"Trusted Federation Open Source Load-Balancing Software Virtualization with a Host OperatingUsing XMPP in the Federated Environment Virtualization as the "Operating System" System Presence in the Cloud Virtualization with a Host Operating Virtualization Infections on VirtualizedWhat It Is System EnvironmentsPresence Protocols Virtualization Infections on Virtualized Type 1 Virtualized EnvironmentLeveraging Presence Environments Type 2 Virtualized Environment Presence Enabled Type 1 Virtualized Environment Virtualization EnvironmentsThe Future of Presence Type 2 Virtualized Environment Microsoft VirtualizationThe Interrelation of Identity, Presence, and Virtualization Environments Sun xVM VirtualBoxLocation in the Cloud Microsoft Virtualization Linux/UNIX VirtualizationIdentity Management Sun xVM VirtualBox VMware ProductsWhat It Is Linux/UNIX Virtualization Data Center and Cloud InfrastructureFuture of Identity in the Cloud VMware Products ProductsPrivacy and Its Relation to Cloud-Based Data Center and Cloud Infrastructure End-User and Desktop Products Information Systems Products IBM VirtualizationPersonal Information End-User and Desktop Products Using VMware to see a Virtualized ServerPrivacy-Related Issues IBM Virtualization Environment Finding Your Private Information Using VMware to see a Virtualized Server Permissive FederationOpen Cloud Consortium Working Groups Environment Verified FederationProject Matsu Permissive Federation Encrypted FederationProject Comet Verified Federation Trusted FederationHPC in the Cloud Encrypted Federation Using XMPP in the Federated EnvironmentThe Open Cloud Testbed Trusted Federation Presence in the CloudThe Open Science Data Cloud Using XMPP in the Federated What It IsIntercloud Testbed Environment Presence Protocols

Page 17: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Reporting on an Open Cloud Consortium Presence in the Cloud Leveraging PresenceWorking Group What It Is Presence EnabledDistributed Management Task Force Presence Protocols The Future of Presence(DMTF) Leveraging Presence The Interrelation of Identity, Presence, andWhat It Is? Presence Enabled Location in the Cloud DMTK Working Groups Associated with The Future of Presence Identity ManagementCloud Computing The Interrelation of Identity, Presence, What It IsStandards for Application Developers and Location in the Cloud Future of Identity in the Cloud Protocols Identity Management Privacy and Its Relation to Cloud-BasedScripting Languages What It Is Information SystemsContent Formatting Standards and Future of Identity in the Cloud Personal InformationLanguages Privacy and Its Relation to Cloud-Based Privacy-Related IssuesStandards for Security in the Cloud Information Systems Finding Your Private Information Confidentiality, Integrity, Availability Personal Information Open Cloud Consortium Working GroupsAuthentication, Authorization, Accountability Privacy-Related Issues Project MatsuRegulations for Privacy Finding Your Private Information Project CometSecurity Protocols Open Cloud Consortium Working Groups HPC in the CloudEstablishing a Baseline for Cloud Project Matsu The Open Cloud TestbedPerformance Project Comet The Open Science Data CloudBest Practices for Selecting a Vendor and HPC in the Cloud Intercloud TestbedImplementing Cloud-Based Applications The Open Cloud Testbed Reporting on an Open Cloud ConsortiumChoosing the Right Vendor The Open Science Data Cloud Working Group Implementing Cloud-Based Applications Intercloud Testbed Distributed Management Task ForceWindows Remote Desktop Reporting on an Open Cloud Consortium (DMTF)Vnc Working Group What It Is?Web Browsers Distributed Management Task Force DMTK Working Groups Associated withServer Extensions (DMTF) Cloud Computing Thin Clients What It Is? Standards for Application DevelopersSmart Phones, Pads, Pods, etc. DMTK Working Groups Associated with ProtocolsVirtual Terminal Security Strengths and Cloud Computing Scripting LanguagesWeaknesses Standards for Application Developers Content Formatting Standards andStrengths Protocols Languages Weaknesses Scripting Languages Standards for Security in the CloudAndroid Content Formatting Standards and Confidentiality, Integrity, AvailabilityBlackBerry Languages Authentication, Authorization,Windows Mobile Standards for Security in the Cloud AccountabilityUbuntu Mobile Internet Device Confidentiality, Integrity, Availability Regulations for PrivacyMobile Platform Virtualization Authentication, Authorization, Security Protocols Kernel-Based Virtual Machine Accountability Establishing a Baseline for CloudVMware Mobile Virtualization Platform Regulations for Privacy PerformanceCollaboration Applications for Mobile Security Protocols Best Practices for Selecting a Vendor andPlatforms Establishing a Baseline for Cloud Implementing Cloud-Based ApplicationsText Messaging Performance Choosing the Right VendoriPhone Applications Best Practices for Selecting a Vendor Implementing Cloud-Based Applications BlackBerry Applications and Implementing Cloud-Based Windows Remote Desktop

Applications VncChoosing the Right Vendor Web BrowsersImplementing Cloud-Based Applications Server Extensions

line Windows Remote Desktop Thin ClientsCloud Computing Infrastructure Vnc Smart Phones, Pads, Pods, etc. Cloud Computing Terms Web Browsers Virtual Terminal Security Strengths andBenefits and Limitations of Cloud Computing Server Extensions WeaknessesBenefits Thin Clients StrengthsLimitations Smart Phones, Pads, Pods, etc. Weaknesses Cloud Computing Case Studies Virtual Terminal Security Strengths and AndroidHow Companies Are Using Cloud Weaknesses BlackBerryComputing Strengths Windows MobileImplementing Applications and Services in Weaknesses Ubuntu Mobile Internet Device the Cloud Android Mobile Platform VirtualizationUsing Your Company's Services vs. the BlackBerry Kernel-Based Virtual MachineCloud Provider Windows Mobile VMware Mobile Virtualization Platform A Cloud Service Provider Introduced Ubuntu Mobile Internet Device Collaboration Applications for MobileCloud Computing Risks and Issues Mobile Platform Virtualization PlatformsProducts and Services Provided by Cloud Kernel-Based Virtual Machine Text MessagingComputing Companies VMware Mobile Virtualization Platform iPhone Applications

Page 18: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Economic Collaboration Applications for Mobile BlackBerry ApplicationsStaffing PlatformsShould Your Company Invest in Cloud Text MessagingComputing? iPhone ApplicationsWhat Should Not be Moved to the Cloud BlackBerry Applications lineLANs and the Cloud Cloud Computing InfrastructureInternet and the Cloud Cloud Computing Terms Web Services, Browsers, and the Cloud Benefits and Limitations of CloudThin Client line ComputingAdvances in Networking and Processing Cloud Computing Infrastructure BenefitsSpeeds that Led to Cloud Computing Cloud Computing Terms LimitationsNetworking Developments Benefits and Limitations of Cloud Cloud Computing Case Studies Increased Processing Speeds Computing How Companies Are Using CloudManaged Service Provider Model to Cloud Benefits ComputingComputing and Software as a Service Limitations Implementing Applications and Services in(SaaS) Cloud Computing Case Studies the CloudSingle Purpose Architectures Migrate to How Companies Are Using Cloud Using Your Company's Services vs. theMultipurpose Architectures Computing Cloud ProviderData Center Virtualization Implementing Applications and Services A Cloud Service Provider Introduced Collaboration in the Cloud Cloud Computing Risks and Issues The Cloud as a Reach Extender Using Your Company's Services vs. the Products and Services Provided by CloudThe Cloud as a Communication Enabler Cloud Provider Computing Companies The Cloud as an Employee Enabler A Cloud Service Provider Introduced EconomicService-Oriented Architecture (SOA) Cloud Computing Risks and Issues Staffing Evolving from SOA to the Cloud Products and Services Provided by Cloud Should Your Company Invest in CloudCapacity: Limited Performance Computing Companies Computing?Availability: Communications Failure and Economic What Should Not be Moved to the Cloud Performance Issues Staffing LANs and the CloudSecurity: Newer Security Protocols Provide Should Your Company Invest in Cloud Internet and the CloudMore Protection Computing? Web Services, Browsers, and the CloudWhat's Next in Cloud Computing What Should Not be Moved to the Cloud Thin ClientIndependent Components LANs and the Cloud Advances in Networking and ProcessingMessage Base Internet and the Cloud Speeds that Led to Cloud ComputingLocation Independence Web Services, Browsers, and the Cloud Networking DevelopmentsCommunication Requirements for Cloud Thin Client Increased Processing Speeds Implementation Advances in Networking and Processing Managed Service Provider Model to CloudPublic Internet Speeds that Led to Cloud Computing Computing and Software as a ServicePrivate Internet Networking Developments (SaaS)Routing to the Datacenter Increased Processing Speeds Single Purpose Architectures Migrate toSwitching within the Data Center Managed Service Provider Model to Multipurpose ArchitecturesBandwidth Cloud Computing and Software as a Data Center Virtualization Tools Used to Measure Network Service (SaaS) CollaborationPerformance Single Purpose Architectures Migrate to The Cloud as a Reach ExtenderUsing the Protocol Analyzer to Measure Multipurpose Architectures The Cloud as a Communication EnablerBandwidth Data Center Virtualization The Cloud as an Employee Enabler Using Ping and Traceroute to Measure Collaboration Service-Oriented Architecture (SOA)Network Performance The Cloud as a Reach Extender Evolving from SOA to the CloudSecurity The Cloud as a Communication Enabler Capacity: Limited PerformanceSSL The Cloud as an Employee Enabler Availability: Communications Failure andVPN Service-Oriented Architecture (SOA) Performance IssuesOverhead Evolving from SOA to the Cloud Security: Newer Security Protocols ProvideStorage Options for Cloud Computing Capacity: Limited Performance More Protection Storage Capacity Availability: Communications Failure and What's Next in Cloud Computing Data Protection and Partitioning Performance Issues Independent ComponentsNAS Security: Newer Security Protocols Message BaseSAN Provide More Protection Location Independence CAS What's Next in Cloud Computing Communication Requirements for CloudRedundancy Independent Components ImplementationReplication Message Base Public InternetMultisiting Location Independence Private InternetBackup and Recovery Communication Requirements for Cloud Routing to the DatacenterServer Software Environments that Support Implementation Switching within the Data CenterCloud Computing Public Internet BandwidthServer Capacity Private Internet Tools Used to Measure NetworkVirtualization Routing to the Datacenter Performance

Page 19: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Clustering Switching within the Data Center Using the Protocol Analyzer to MeasureExpansion Bandwidth BandwidthServer Functions Tools Used to Measure Network Using Ping and Traceroute to MeasureApplication Performance Network Performance Web Using the Protocol Analyzer to Measure SecurityDatabase Bandwidth SSLVendor Approaches to Cloud Computing Using Ping and Traceroute to Measure VPNRole of Open Source Software in Data Network Performance Overhead Center Security Storage Options for Cloud ComputingCost Reduction vs. Reliability SSL Storage CapacityOpen Source Server Software VPN Data Protection and PartitioningOpen Source Database Software Overhead NASOpen Source Applications Software Storage Options for Cloud Computing SANOpen Source System Management Software Storage Capacity CASOpen Source Load-Balancing Software Data Protection and Partitioning RedundancyVirtualization as the "Operating System" NAS ReplicationVirtualization with a Host Operating System SAN Multisiting Virtualization Infections on Virtualized CAS Backup and Recovery Environments Redundancy Server Software Environments thatType 1 Virtualized Environment Replication Support Cloud ComputingType 2 Virtualized Environment Multisiting Server CapacityVirtualization Environments Backup and Recovery VirtualizationMicrosoft Virtualization Server Software Environments that ClusteringSun xVM VirtualBox Support Cloud Computing ExpansionLinux/UNIX Virtualization Server Capacity Server FunctionsVMware Products Virtualization ApplicationData Center and Cloud Infrastructure Clustering WebProducts Expansion Database End-User and Desktop Products Server Functions Vendor Approaches to Cloud ComputingIBM Virtualization Application Role of Open Source Software in DataUsing VMware to see a Virtualized Server Web CenterEnvironment Database Cost Reduction vs. ReliabilityPermissive Federation Vendor Approaches to Cloud Computing Open Source Server SoftwareVerified Federation Role of Open Source Software in Data Open Source Database SoftwareEncrypted Federation Center Open Source Applications SoftwareTrusted Federation Cost Reduction vs. Reliability Open Source System ManagementUsing XMPP in the Federated Environment Open Source Server Software SoftwarePresence in the Cloud Open Source Database Software Open Source Load-Balancing Software What It Is Open Source Applications Software Virtualization as the "Operating System"Presence Protocols Open Source System Management Virtualization with a Host OperatingLeveraging Presence Software System Presence Enabled Open Source Load-Balancing Software Virtualization Infections on VirtualizedThe Future of Presence Virtualization as the "Operating System" EnvironmentsThe Interrelation of Identity, Presence, and Virtualization with a Host Operating Type 1 Virtualized EnvironmentLocation in the Cloud System Type 2 Virtualized Environment Identity Management Virtualization Infections on Virtualized Virtualization EnvironmentsWhat It Is Environments Microsoft VirtualizationFuture of Identity in the Cloud Type 1 Virtualized Environment Sun xVM VirtualBoxPrivacy and Its Relation to Cloud-Based Type 2 Virtualized Environment Linux/UNIX VirtualizationInformation Systems Virtualization Environments VMware ProductsPersonal Information Microsoft Virtualization Data Center and Cloud InfrastructurePrivacy-Related Issues Sun xVM VirtualBox ProductsFinding Your Private Information Linux/UNIX Virtualization End-User and Desktop Products Open Cloud Consortium Working Groups VMware Products IBM VirtualizationProject Matsu Data Center and Cloud Infrastructure Using VMware to see a Virtualized ServerProject Comet Products Environment HPC in the Cloud End-User and Desktop Products Permissive FederationThe Open Cloud Testbed IBM Virtualization Verified FederationThe Open Science Data Cloud Using VMware to see a Virtualized Server Encrypted FederationIntercloud Testbed Environment Trusted FederationReporting on an Open Cloud Consortium Permissive Federation Using XMPP in the Federated EnvironmentWorking Group Verified Federation Presence in the CloudDistributed Management Task Force Encrypted Federation What It Is(DMTF) Trusted Federation Presence ProtocolsWhat It Is? Using XMPP in the Federated Leveraging Presence

Page 20: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

DMTK Working Groups Associated with Environment Presence EnabledCloud Computing Presence in the Cloud The Future of PresenceStandards for Application Developers What It Is The Interrelation of Identity, Presence, andProtocols Presence Protocols Location in the Cloud Scripting Languages Leveraging Presence Identity ManagementContent Formatting Standards and Presence Enabled What It IsLanguages The Future of Presence Future of Identity in the Cloud Standards for Security in the Cloud The Interrelation of Identity, Presence, Privacy and Its Relation to Cloud-BasedConfidentiality, Integrity, Availability and Location in the Cloud Information SystemsAuthentication, Authorization, Accountability Identity Management Personal InformationRegulations for Privacy What It Is Privacy-Related IssuesSecurity Protocols Future of Identity in the Cloud Finding Your Private Information Establishing a Baseline for Cloud Privacy and Its Relation to Cloud-Based Open Cloud Consortium Working GroupsPerformance Information Systems Project MatsuBest Practices for Selecting a Vendor and Personal Information Project CometImplementing Cloud-Based Applications Privacy-Related Issues HPC in the CloudChoosing the Right Vendor Finding Your Private Information The Open Cloud TestbedImplementing Cloud-Based Applications Open Cloud Consortium Working Groups The Open Science Data CloudWindows Remote Desktop Project Matsu Intercloud TestbedVnc Project Comet Reporting on an Open Cloud ConsortiumWeb Browsers HPC in the Cloud Working Group Server Extensions The Open Cloud Testbed Distributed Management Task ForceThin Clients The Open Science Data Cloud (DMTF)Smart Phones, Pads, Pods, etc. Intercloud Testbed What It Is?Virtual Terminal Security Strengths and Reporting on an Open Cloud Consortium DMTK Working Groups Associated withWeaknesses Working Group Cloud Computing Strengths Distributed Management Task Force Standards for Application DevelopersWeaknesses (DMTF) ProtocolsAndroid What It Is? Scripting LanguagesBlackBerry DMTK Working Groups Associated with Content Formatting Standards andWindows Mobile Cloud Computing Languages Ubuntu Mobile Internet Device Standards for Application Developers Standards for Security in the CloudMobile Platform Virtualization Protocols Confidentiality, Integrity, AvailabilityKernel-Based Virtual Machine Scripting Languages Authentication, Authorization,VMware Mobile Virtualization Platform Content Formatting Standards and AccountabilityCollaboration Applications for Mobile Languages Regulations for PrivacyPlatforms Standards for Security in the Cloud Security Protocols Text Messaging Confidentiality, Integrity, Availability Establishing a Baseline for CloudiPhone Applications Authentication, Authorization, PerformanceBlackBerry Applications Accountability Best Practices for Selecting a Vendor and

Regulations for Privacy Implementing Cloud-Based ApplicationsSecurity Protocols Choosing the Right Vendor

2. Who's Who in Today's Cloud Establishing a Baseline for Cloud Implementing Cloud-Based Applications line Performance Windows Remote Desktop

Cloud Computing Companies Best Practices for Selecting a Vendor Vncand Implementing Cloud-Based Web BrowsersApplications Server Extensions

line Choosing the Right Vendor Thin ClientsCloud Computing Infrastructure Implementing Cloud-Based Applications Smart Phones, Pads, Pods, etc. Cloud Computing Terms Windows Remote Desktop Virtual Terminal Security Strengths andBenefits and Limitations of Cloud Computing Vnc WeaknessesBenefits Web Browsers StrengthsLimitations Server Extensions Weaknesses Cloud Computing Case Studies Thin Clients AndroidHow Companies Are Using Cloud Smart Phones, Pads, Pods, etc. BlackBerryComputing Virtual Terminal Security Strengths and Windows MobileImplementing Applications and Services in Weaknesses Ubuntu Mobile Internet Device the Cloud Strengths Mobile Platform VirtualizationUsing Your Company's Services vs. the Weaknesses Kernel-Based Virtual MachineCloud Provider Android VMware Mobile Virtualization Platform A Cloud Service Provider Introduced BlackBerry Collaboration Applications for MobileCloud Computing Risks and Issues Windows Mobile PlatformsProducts and Services Provided by Cloud Ubuntu Mobile Internet Device Text MessagingComputing Companies Mobile Platform Virtualization iPhone ApplicationsEconomic Kernel-Based Virtual Machine BlackBerry Applications

Page 21: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Staffing VMware Mobile Virtualization Platform Should Your Company Invest in Cloud Collaboration Applications for MobileComputing? PlatformsWhat Should Not be Moved to the Cloud Text Messaging lineLANs and the Cloud iPhone Applications Cloud Computing InfrastructureInternet and the Cloud BlackBerry Applications Cloud Computing Terms Web Services, Browsers, and the Cloud Benefits and Limitations of CloudThin Client ComputingAdvances in Networking and Processing BenefitsSpeeds that Led to Cloud Computing line LimitationsNetworking Developments Cloud Computing Infrastructure Cloud Computing Case Studies Increased Processing Speeds Cloud Computing Terms How Companies Are Using CloudManaged Service Provider Model to Cloud Benefits and Limitations of Cloud ComputingComputing and Software as a Service Computing Implementing Applications and Services in(SaaS) Benefits the CloudSingle Purpose Architectures Migrate to Limitations Using Your Company's Services vs. theMultipurpose Architectures Cloud Computing Case Studies Cloud ProviderData Center Virtualization How Companies Are Using Cloud A Cloud Service Provider Introduced Collaboration Computing Cloud Computing Risks and Issues The Cloud as a Reach Extender Implementing Applications and Services Products and Services Provided by CloudThe Cloud as a Communication Enabler in the Cloud Computing Companies The Cloud as an Employee Enabler Using Your Company's Services vs. the EconomicService-Oriented Architecture (SOA) Cloud Provider Staffing Evolving from SOA to the Cloud A Cloud Service Provider Introduced Should Your Company Invest in CloudCapacity: Limited Performance Cloud Computing Risks and Issues Computing?Availability: Communications Failure and Products and Services Provided by Cloud What Should Not be Moved to the Cloud Performance Issues Computing Companies LANs and the CloudSecurity: Newer Security Protocols Provide Economic Internet and the CloudMore Protection Staffing Web Services, Browsers, and the CloudWhat's Next in Cloud Computing Should Your Company Invest in Cloud Thin ClientIndependent Components Computing? Advances in Networking and ProcessingMessage Base What Should Not be Moved to the Cloud Speeds that Led to Cloud ComputingLocation Independence LANs and the Cloud Networking DevelopmentsCommunication Requirements for Cloud Internet and the Cloud Increased Processing Speeds Implementation Web Services, Browsers, and the Cloud Managed Service Provider Model to CloudPublic Internet Thin Client Computing and Software as a ServicePrivate Internet Advances in Networking and Processing (SaaS)Routing to the Datacenter Speeds that Led to Cloud Computing Single Purpose Architectures Migrate toSwitching within the Data Center Networking Developments Multipurpose ArchitecturesBandwidth Increased Processing Speeds Data Center Virtualization Tools Used to Measure Network Managed Service Provider Model to CollaborationPerformance Cloud Computing and Software as a The Cloud as a Reach ExtenderUsing the Protocol Analyzer to Measure Service (SaaS) The Cloud as a Communication EnablerBandwidth Single Purpose Architectures Migrate to The Cloud as an Employee Enabler Using Ping and Traceroute to Measure Multipurpose Architectures Service-Oriented Architecture (SOA)Network Performance Data Center Virtualization Evolving from SOA to the CloudSecurity Collaboration Capacity: Limited PerformanceSSL The Cloud as a Reach Extender Availability: Communications Failure andVPN The Cloud as a Communication Enabler Performance IssuesOverhead The Cloud as an Employee Enabler Security: Newer Security Protocols ProvideStorage Options for Cloud Computing Service-Oriented Architecture (SOA) More Protection Storage Capacity Evolving from SOA to the Cloud What's Next in Cloud Computing Data Protection and Partitioning Capacity: Limited Performance Independent ComponentsNAS Availability: Communications Failure and Message BaseSAN Performance Issues Location Independence CAS Security: Newer Security Protocols Communication Requirements for CloudRedundancy Provide More Protection ImplementationReplication What's Next in Cloud Computing Public InternetMultisiting Independent Components Private InternetBackup and Recovery Message Base Routing to the DatacenterServer Software Environments that Support Location Independence Switching within the Data CenterCloud Computing Communication Requirements for Cloud BandwidthServer Capacity Implementation Tools Used to Measure NetworkVirtualization Public Internet PerformanceClustering Private Internet Using the Protocol Analyzer to Measure

Page 22: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Expansion Routing to the Datacenter BandwidthServer Functions Switching within the Data Center Using Ping and Traceroute to MeasureApplication Bandwidth Network Performance Web Tools Used to Measure Network SecurityDatabase Performance SSLVendor Approaches to Cloud Computing Using the Protocol Analyzer to Measure VPNRole of Open Source Software in Data Bandwidth Overhead Center Using Ping and Traceroute to Measure Storage Options for Cloud ComputingCost Reduction vs. Reliability Network Performance Storage CapacityOpen Source Server Software Security Data Protection and PartitioningOpen Source Database Software SSL NASOpen Source Applications Software VPN SANOpen Source System Management Software Overhead CASOpen Source Load-Balancing Software Storage Options for Cloud Computing RedundancyVirtualization as the "Operating System" Storage Capacity ReplicationVirtualization with a Host Operating System Data Protection and Partitioning Multisiting Virtualization Infections on Virtualized NAS Backup and Recovery Environments SAN Server Software Environments thatType 1 Virtualized Environment CAS Support Cloud ComputingType 2 Virtualized Environment Redundancy Server CapacityVirtualization Environments Replication VirtualizationMicrosoft Virtualization Multisiting ClusteringSun xVM VirtualBox Backup and Recovery ExpansionLinux/UNIX Virtualization Server Software Environments that Server FunctionsVMware Products Support Cloud Computing ApplicationData Center and Cloud Infrastructure Server Capacity WebProducts Virtualization Database End-User and Desktop Products Clustering Vendor Approaches to Cloud ComputingIBM Virtualization Expansion Role of Open Source Software in DataUsing VMware to see a Virtualized Server Server Functions CenterEnvironment Application Cost Reduction vs. ReliabilityPermissive Federation Web Open Source Server SoftwareVerified Federation Database Open Source Database SoftwareEncrypted Federation Vendor Approaches to Cloud Computing Open Source Applications SoftwareTrusted Federation Role of Open Source Software in Data Open Source System ManagementUsing XMPP in the Federated Environment Center SoftwarePresence in the Cloud Cost Reduction vs. Reliability Open Source Load-Balancing Software What It Is Open Source Server Software Virtualization as the "Operating System"Presence Protocols Open Source Database Software Virtualization with a Host OperatingLeveraging Presence Open Source Applications Software System Presence Enabled Open Source System Management Virtualization Infections on VirtualizedThe Future of Presence Software EnvironmentsThe Interrelation of Identity, Presence, and Open Source Load-Balancing Software Type 1 Virtualized EnvironmentLocation in the Cloud Virtualization as the "Operating System" Type 2 Virtualized Environment Identity Management Virtualization with a Host Operating Virtualization EnvironmentsWhat It Is System Microsoft VirtualizationFuture of Identity in the Cloud Virtualization Infections on Virtualized Sun xVM VirtualBoxPrivacy and Its Relation to Cloud-Based Environments Linux/UNIX VirtualizationInformation Systems Type 1 Virtualized Environment VMware ProductsPersonal Information Type 2 Virtualized Environment Data Center and Cloud InfrastructurePrivacy-Related Issues Virtualization Environments ProductsFinding Your Private Information Microsoft Virtualization End-User and Desktop Products Open Cloud Consortium Working Groups Sun xVM VirtualBox IBM VirtualizationProject Matsu Linux/UNIX Virtualization Using VMware to see a Virtualized ServerProject Comet VMware Products Environment HPC in the Cloud Data Center and Cloud Infrastructure Permissive FederationThe Open Cloud Testbed Products Verified FederationThe Open Science Data Cloud End-User and Desktop Products Encrypted FederationIntercloud Testbed IBM Virtualization Trusted FederationReporting on an Open Cloud Consortium Using VMware to see a Virtualized Server Using XMPP in the Federated EnvironmentWorking Group Environment Presence in the CloudDistributed Management Task Force Permissive Federation What It Is(DMTF) Verified Federation Presence ProtocolsWhat It Is? Encrypted Federation Leveraging PresenceDMTK Working Groups Associated with Trusted Federation Presence Enabled

Page 23: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Computing Using XMPP in the Federated The Future of PresenceStandards for Application Developers Environment The Interrelation of Identity, Presence, andProtocols Presence in the Cloud Location in the Cloud Scripting Languages What It Is Identity ManagementContent Formatting Standards and Presence Protocols What It IsLanguages Leveraging Presence Future of Identity in the Cloud Standards for Security in the Cloud Presence Enabled Privacy and Its Relation to Cloud-BasedConfidentiality, Integrity, Availability The Future of Presence Information SystemsAuthentication, Authorization, Accountability The Interrelation of Identity, Presence, Personal InformationRegulations for Privacy and Location in the Cloud Privacy-Related IssuesSecurity Protocols Identity Management Finding Your Private Information Establishing a Baseline for Cloud What It Is Open Cloud Consortium Working GroupsPerformance Future of Identity in the Cloud Project MatsuBest Practices for Selecting a Vendor and Privacy and Its Relation to Cloud-Based Project CometImplementing Cloud-Based Applications Information Systems HPC in the CloudChoosing the Right Vendor Personal Information The Open Cloud TestbedImplementing Cloud-Based Applications Privacy-Related Issues The Open Science Data CloudWindows Remote Desktop Finding Your Private Information Intercloud TestbedVnc Open Cloud Consortium Working Groups Reporting on an Open Cloud ConsortiumWeb Browsers Project Matsu Working Group Server Extensions Project Comet Distributed Management Task ForceThin Clients HPC in the Cloud (DMTF)Smart Phones, Pads, Pods, etc. The Open Cloud Testbed What It Is?Virtual Terminal Security Strengths and The Open Science Data Cloud DMTK Working Groups Associated withWeaknesses Intercloud Testbed Cloud Computing Strengths Reporting on an Open Cloud Consortium Standards for Application DevelopersWeaknesses Working Group ProtocolsAndroid Distributed Management Task Force Scripting LanguagesBlackBerry (DMTF) Content Formatting Standards andWindows Mobile What It Is? Languages Ubuntu Mobile Internet Device DMTK Working Groups Associated with Standards for Security in the CloudMobile Platform Virtualization Cloud Computing Confidentiality, Integrity, AvailabilityKernel-Based Virtual Machine Standards for Application Developers Authentication, Authorization,VMware Mobile Virtualization Platform Protocols AccountabilityCollaboration Applications for Mobile Scripting Languages Regulations for PrivacyPlatforms Content Formatting Standards and Security Protocols Text Messaging Languages Establishing a Baseline for CloudiPhone Applications Standards for Security in the Cloud PerformanceBlackBerry Applications Confidentiality, Integrity, Availability Best Practices for Selecting a Vendor and

Authentication, Authorization, Implementing Cloud-Based ApplicationsAccountability Choosing the Right Vendor

3. The Business Case for Going to the Cloud Regulations for Privacy Implementing Cloud-Based Applications line Security Protocols Windows Remote Desktop

Benefits of Cloud Computing Establishing a Baseline for Cloud VncOperational Performance Web Browsers

Best Practices for Selecting a Vendor Server Extensionsand Implementing Cloud-Based Thin Clients

line Applications Smart Phones, Pads, Pods, etc. Cloud Computing Infrastructure Choosing the Right Vendor Virtual Terminal Security Strengths andCloud Computing Terms Implementing Cloud-Based Applications WeaknessesBenefits and Limitations of Cloud Computing Windows Remote Desktop StrengthsBenefits Vnc Weaknesses Limitations Web Browsers AndroidCloud Computing Case Studies Server Extensions BlackBerryHow Companies Are Using Cloud Thin Clients Windows MobileComputing Smart Phones, Pads, Pods, etc. Ubuntu Mobile Internet Device Implementing Applications and Services in Virtual Terminal Security Strengths and Mobile Platform Virtualizationthe Cloud Weaknesses Kernel-Based Virtual MachineUsing Your Company's Services vs. the Strengths VMware Mobile Virtualization Platform Cloud Provider Weaknesses Collaboration Applications for MobileA Cloud Service Provider Introduced Android PlatformsCloud Computing Risks and Issues BlackBerry Text MessagingProducts and Services Provided by Cloud Windows Mobile iPhone ApplicationsComputing Companies Ubuntu Mobile Internet Device BlackBerry ApplicationsEconomic Mobile Platform Virtualization

Page 24: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Staffing Kernel-Based Virtual MachineShould Your Company Invest in Cloud VMware Mobile Virtualization Platform Computing? Collaboration Applications for Mobile lineWhat Should Not be Moved to the Cloud Platforms Cloud Computing InfrastructureLANs and the Cloud Text Messaging Cloud Computing Terms Internet and the Cloud iPhone Applications Benefits and Limitations of CloudWeb Services, Browsers, and the Cloud BlackBerry Applications ComputingThin Client BenefitsAdvances in Networking and Processing LimitationsSpeeds that Led to Cloud Computing Cloud Computing Case Studies Networking Developments line How Companies Are Using CloudIncreased Processing Speeds Cloud Computing Infrastructure ComputingManaged Service Provider Model to Cloud Cloud Computing Terms Implementing Applications and Services inComputing and Software as a Service Benefits and Limitations of Cloud the Cloud(SaaS) Computing Using Your Company's Services vs. theSingle Purpose Architectures Migrate to Benefits Cloud ProviderMultipurpose Architectures Limitations A Cloud Service Provider Introduced Data Center Virtualization Cloud Computing Case Studies Cloud Computing Risks and Issues Collaboration How Companies Are Using Cloud Products and Services Provided by CloudThe Cloud as a Reach Extender Computing Computing Companies The Cloud as a Communication Enabler Implementing Applications and Services EconomicThe Cloud as an Employee Enabler in the Cloud Staffing Service-Oriented Architecture (SOA) Using Your Company's Services vs. the Should Your Company Invest in CloudEvolving from SOA to the Cloud Cloud Provider Computing?Capacity: Limited Performance A Cloud Service Provider Introduced What Should Not be Moved to the Cloud Availability: Communications Failure and Cloud Computing Risks and Issues LANs and the CloudPerformance Issues Products and Services Provided by Cloud Internet and the CloudSecurity: Newer Security Protocols Provide Computing Companies Web Services, Browsers, and the CloudMore Protection Economic Thin ClientWhat's Next in Cloud Computing Staffing Advances in Networking and ProcessingIndependent Components Should Your Company Invest in Cloud Speeds that Led to Cloud ComputingMessage Base Computing? Networking DevelopmentsLocation Independence What Should Not be Moved to the Cloud Increased Processing Speeds Communication Requirements for Cloud LANs and the Cloud Managed Service Provider Model to CloudImplementation Internet and the Cloud Computing and Software as a ServicePublic Internet Web Services, Browsers, and the Cloud (SaaS)Private Internet Thin Client Single Purpose Architectures Migrate toRouting to the Datacenter Advances in Networking and Processing Multipurpose ArchitecturesSwitching within the Data Center Speeds that Led to Cloud Computing Data Center Virtualization Bandwidth Networking Developments CollaborationTools Used to Measure Network Increased Processing Speeds The Cloud as a Reach ExtenderPerformance Managed Service Provider Model to The Cloud as a Communication EnablerUsing the Protocol Analyzer to Measure Cloud Computing and Software as a The Cloud as an Employee Enabler Bandwidth Service (SaaS) Service-Oriented Architecture (SOA)Using Ping and Traceroute to Measure Single Purpose Architectures Migrate to Evolving from SOA to the CloudNetwork Performance Multipurpose Architectures Capacity: Limited PerformanceSecurity Data Center Virtualization Availability: Communications Failure andSSL Collaboration Performance IssuesVPN The Cloud as a Reach Extender Security: Newer Security Protocols ProvideOverhead The Cloud as a Communication Enabler More Protection Storage Options for Cloud Computing The Cloud as an Employee Enabler What's Next in Cloud Computing Storage Capacity Service-Oriented Architecture (SOA) Independent ComponentsData Protection and Partitioning Evolving from SOA to the Cloud Message BaseNAS Capacity: Limited Performance Location Independence SAN Availability: Communications Failure and Communication Requirements for CloudCAS Performance Issues ImplementationRedundancy Security: Newer Security Protocols Public InternetReplication Provide More Protection Private InternetMultisiting What's Next in Cloud Computing Routing to the DatacenterBackup and Recovery Independent Components Switching within the Data CenterServer Software Environments that Support Message Base BandwidthCloud Computing Location Independence Tools Used to Measure NetworkServer Capacity Communication Requirements for Cloud PerformanceVirtualization Implementation Using the Protocol Analyzer to MeasureClustering Public Internet Bandwidth

Page 25: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Expansion Private Internet Using Ping and Traceroute to MeasureServer Functions Routing to the Datacenter Network Performance Application Switching within the Data Center SecurityWeb Bandwidth SSLDatabase Tools Used to Measure Network VPNVendor Approaches to Cloud Computing Performance Overhead Role of Open Source Software in Data Using the Protocol Analyzer to Measure Storage Options for Cloud ComputingCenter Bandwidth Storage CapacityCost Reduction vs. Reliability Using Ping and Traceroute to Measure Data Protection and PartitioningOpen Source Server Software Network Performance NASOpen Source Database Software Security SANOpen Source Applications Software SSL CASOpen Source System Management Software VPN RedundancyOpen Source Load-Balancing Software Overhead ReplicationVirtualization as the "Operating System" Storage Options for Cloud Computing Multisiting Virtualization with a Host Operating System Storage Capacity Backup and Recovery Virtualization Infections on Virtualized Data Protection and Partitioning Server Software Environments thatEnvironments NAS Support Cloud ComputingType 1 Virtualized Environment SAN Server CapacityType 2 Virtualized Environment CAS VirtualizationVirtualization Environments Redundancy ClusteringMicrosoft Virtualization Replication ExpansionSun xVM VirtualBox Multisiting Server FunctionsLinux/UNIX Virtualization Backup and Recovery ApplicationVMware Products Server Software Environments that WebData Center and Cloud Infrastructure Support Cloud Computing Database Products Server Capacity Vendor Approaches to Cloud ComputingEnd-User and Desktop Products Virtualization Role of Open Source Software in DataIBM Virtualization Clustering CenterUsing VMware to see a Virtualized Server Expansion Cost Reduction vs. ReliabilityEnvironment Server Functions Open Source Server SoftwarePermissive Federation Application Open Source Database SoftwareVerified Federation Web Open Source Applications SoftwareEncrypted Federation Database Open Source System ManagementTrusted Federation Vendor Approaches to Cloud Computing SoftwareUsing XMPP in the Federated Environment Role of Open Source Software in Data Open Source Load-Balancing Software Presence in the Cloud Center Virtualization as the "Operating System"What It Is Cost Reduction vs. Reliability Virtualization with a Host OperatingPresence Protocols Open Source Server Software System Leveraging Presence Open Source Database Software Virtualization Infections on VirtualizedPresence Enabled Open Source Applications Software EnvironmentsThe Future of Presence Open Source System Management Type 1 Virtualized EnvironmentThe Interrelation of Identity, Presence, and Software Type 2 Virtualized Environment Location in the Cloud Open Source Load-Balancing Software Virtualization EnvironmentsIdentity Management Virtualization as the "Operating System" Microsoft VirtualizationWhat It Is Virtualization with a Host Operating Sun xVM VirtualBoxFuture of Identity in the Cloud System Linux/UNIX VirtualizationPrivacy and Its Relation to Cloud-Based Virtualization Infections on Virtualized VMware ProductsInformation Systems Environments Data Center and Cloud InfrastructurePersonal Information Type 1 Virtualized Environment ProductsPrivacy-Related Issues Type 2 Virtualized Environment End-User and Desktop Products Finding Your Private Information Virtualization Environments IBM VirtualizationOpen Cloud Consortium Working Groups Microsoft Virtualization Using VMware to see a Virtualized ServerProject Matsu Sun xVM VirtualBox Environment Project Comet Linux/UNIX Virtualization Permissive FederationHPC in the Cloud VMware Products Verified FederationThe Open Cloud Testbed Data Center and Cloud Infrastructure Encrypted FederationThe Open Science Data Cloud Products Trusted FederationIntercloud Testbed End-User and Desktop Products Using XMPP in the Federated EnvironmentReporting on an Open Cloud Consortium IBM Virtualization Presence in the CloudWorking Group Using VMware to see a Virtualized Server What It IsDistributed Management Task Force Environment Presence Protocols(DMTF) Permissive Federation Leveraging PresenceWhat It Is? Verified Federation Presence EnabledDMTK Working Groups Associated with Encrypted Federation The Future of Presence

Page 26: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Computing Trusted Federation The Interrelation of Identity, Presence, andStandards for Application Developers Using XMPP in the Federated Location in the Cloud Protocols Environment Identity ManagementScripting Languages Presence in the Cloud What It IsContent Formatting Standards and What It Is Future of Identity in the Cloud Languages Presence Protocols Privacy and Its Relation to Cloud-BasedStandards for Security in the Cloud Leveraging Presence Information SystemsConfidentiality, Integrity, Availability Presence Enabled Personal InformationAuthentication, Authorization, Accountability The Future of Presence Privacy-Related IssuesRegulations for Privacy The Interrelation of Identity, Presence, Finding Your Private Information Security Protocols and Location in the Cloud Open Cloud Consortium Working GroupsEstablishing a Baseline for Cloud Identity Management Project MatsuPerformance What It Is Project CometBest Practices for Selecting a Vendor and Future of Identity in the Cloud HPC in the CloudImplementing Cloud-Based Applications Privacy and Its Relation to Cloud-Based The Open Cloud TestbedChoosing the Right Vendor Information Systems The Open Science Data CloudImplementing Cloud-Based Applications Personal Information Intercloud TestbedWindows Remote Desktop Privacy-Related Issues Reporting on an Open Cloud ConsortiumVnc Finding Your Private Information Working Group Web Browsers Open Cloud Consortium Working Groups Distributed Management Task ForceServer Extensions Project Matsu (DMTF)Thin Clients Project Comet What It Is?Smart Phones, Pads, Pods, etc. HPC in the Cloud DMTK Working Groups Associated withVirtual Terminal Security Strengths and The Open Cloud Testbed Cloud Computing Weaknesses The Open Science Data Cloud Standards for Application DevelopersStrengths Intercloud Testbed ProtocolsWeaknesses Reporting on an Open Cloud Consortium Scripting LanguagesAndroid Working Group Content Formatting Standards andBlackBerry Distributed Management Task Force Languages Windows Mobile (DMTF) Standards for Security in the CloudUbuntu Mobile Internet Device What It Is? Confidentiality, Integrity, AvailabilityMobile Platform Virtualization DMTK Working Groups Associated with Authentication, Authorization,Kernel-Based Virtual Machine Cloud Computing AccountabilityVMware Mobile Virtualization Platform Standards for Application Developers Regulations for PrivacyCollaboration Applications for Mobile Protocols Security Protocols Platforms Scripting Languages Establishing a Baseline for CloudText Messaging Content Formatting Standards and PerformanceiPhone Applications Languages Best Practices for Selecting a Vendor andBlackBerry Applications Standards for Security in the Cloud Implementing Cloud-Based Applications

Confidentiality, Integrity, Availability Choosing the Right VendorAuthentication, Authorization, Implementing Cloud-Based Applications Accountability Windows Remote Desktop

line Regulations for Privacy VncCloud Computing Infrastructure Security Protocols Web BrowsersCloud Computing Terms Establishing a Baseline for Cloud Server ExtensionsBenefits and Limitations of Cloud Computing Performance Thin ClientsBenefits Best Practices for Selecting a Vendor Smart Phones, Pads, Pods, etc. Limitations and Implementing Cloud-Based Virtual Terminal Security Strengths andCloud Computing Case Studies Applications WeaknessesHow Companies Are Using Cloud Choosing the Right Vendor StrengthsComputing Implementing Cloud-Based Applications Weaknesses Implementing Applications and Services in Windows Remote Desktop Androidthe Cloud Vnc BlackBerryUsing Your Company's Services vs. the Web Browsers Windows MobileCloud Provider Server Extensions Ubuntu Mobile Internet Device A Cloud Service Provider Introduced Thin Clients Mobile Platform VirtualizationCloud Computing Risks and Issues Smart Phones, Pads, Pods, etc. Kernel-Based Virtual MachineProducts and Services Provided by Cloud Virtual Terminal Security Strengths and VMware Mobile Virtualization Platform Computing Companies Weaknesses Collaboration Applications for MobileEconomic Strengths PlatformsStaffing Weaknesses Text MessagingShould Your Company Invest in Cloud Android iPhone ApplicationsComputing? BlackBerry BlackBerry ApplicationsWhat Should Not be Moved to the Cloud Windows MobileLANs and the Cloud Ubuntu Mobile Internet Device

Page 27: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Internet and the Cloud Mobile Platform VirtualizationWeb Services, Browsers, and the Cloud Kernel-Based Virtual Machine lineThin Client VMware Mobile Virtualization Platform Cloud Computing InfrastructureAdvances in Networking and Processing Collaboration Applications for Mobile Cloud Computing Terms Speeds that Led to Cloud Computing Platforms Benefits and Limitations of CloudNetworking Developments Text Messaging ComputingIncreased Processing Speeds iPhone Applications BenefitsManaged Service Provider Model to Cloud BlackBerry Applications LimitationsComputing and Software as a Service Cloud Computing Case Studies (SaaS) How Companies Are Using CloudSingle Purpose Architectures Migrate to ComputingMultipurpose Architectures line Implementing Applications and Services inData Center Virtualization Cloud Computing Infrastructure the CloudCollaboration Cloud Computing Terms Using Your Company's Services vs. theThe Cloud as a Reach Extender Benefits and Limitations of Cloud Cloud ProviderThe Cloud as a Communication Enabler Computing A Cloud Service Provider Introduced The Cloud as an Employee Enabler Benefits Cloud Computing Risks and Issues Service-Oriented Architecture (SOA) Limitations Products and Services Provided by CloudEvolving from SOA to the Cloud Cloud Computing Case Studies Computing Companies Capacity: Limited Performance How Companies Are Using Cloud EconomicAvailability: Communications Failure and Computing Staffing Performance Issues Implementing Applications and Services Should Your Company Invest in CloudSecurity: Newer Security Protocols Provide in the Cloud Computing?More Protection Using Your Company's Services vs. the What Should Not be Moved to the Cloud What's Next in Cloud Computing Cloud Provider LANs and the CloudIndependent Components A Cloud Service Provider Introduced Internet and the CloudMessage Base Cloud Computing Risks and Issues Web Services, Browsers, and the CloudLocation Independence Products and Services Provided by Cloud Thin ClientCommunication Requirements for Cloud Computing Companies Advances in Networking and ProcessingImplementation Economic Speeds that Led to Cloud ComputingPublic Internet Staffing Networking DevelopmentsPrivate Internet Should Your Company Invest in Cloud Increased Processing Speeds Routing to the Datacenter Computing? Managed Service Provider Model to CloudSwitching within the Data Center What Should Not be Moved to the Cloud Computing and Software as a ServiceBandwidth LANs and the Cloud (SaaS)Tools Used to Measure Network Internet and the Cloud Single Purpose Architectures Migrate toPerformance Web Services, Browsers, and the Cloud Multipurpose ArchitecturesUsing the Protocol Analyzer to Measure Thin Client Data Center Virtualization Bandwidth Advances in Networking and Processing CollaborationUsing Ping and Traceroute to Measure Speeds that Led to Cloud Computing The Cloud as a Reach ExtenderNetwork Performance Networking Developments The Cloud as a Communication EnablerSecurity Increased Processing Speeds The Cloud as an Employee Enabler SSL Managed Service Provider Model to Service-Oriented Architecture (SOA)VPN Cloud Computing and Software as a Evolving from SOA to the CloudOverhead Service (SaaS) Capacity: Limited PerformanceStorage Options for Cloud Computing Single Purpose Architectures Migrate to Availability: Communications Failure andStorage Capacity Multipurpose Architectures Performance IssuesData Protection and Partitioning Data Center Virtualization Security: Newer Security Protocols ProvideNAS Collaboration More Protection SAN The Cloud as a Reach Extender What's Next in Cloud Computing CAS The Cloud as a Communication Enabler Independent ComponentsRedundancy The Cloud as an Employee Enabler Message BaseReplication Service-Oriented Architecture (SOA) Location Independence Multisiting Evolving from SOA to the Cloud Communication Requirements for CloudBackup and Recovery Capacity: Limited Performance ImplementationServer Software Environments that Support Availability: Communications Failure and Public InternetCloud Computing Performance Issues Private InternetServer Capacity Security: Newer Security Protocols Routing to the DatacenterVirtualization Provide More Protection Switching within the Data CenterClustering What's Next in Cloud Computing BandwidthExpansion Independent Components Tools Used to Measure NetworkServer Functions Message Base PerformanceApplication Location Independence Using the Protocol Analyzer to MeasureWeb Communication Requirements for Cloud BandwidthDatabase Implementation Using Ping and Traceroute to Measure

Page 28: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Vendor Approaches to Cloud Computing Public Internet Network Performance Role of Open Source Software in Data Private Internet SecurityCenter Routing to the Datacenter SSLCost Reduction vs. Reliability Switching within the Data Center VPNOpen Source Server Software Bandwidth Overhead Open Source Database Software Tools Used to Measure Network Storage Options for Cloud ComputingOpen Source Applications Software Performance Storage CapacityOpen Source System Management Software Using the Protocol Analyzer to Measure Data Protection and PartitioningOpen Source Load-Balancing Software Bandwidth NASVirtualization as the "Operating System" Using Ping and Traceroute to Measure SANVirtualization with a Host Operating System Network Performance CASVirtualization Infections on Virtualized Security RedundancyEnvironments SSL ReplicationType 1 Virtualized Environment VPN Multisiting Type 2 Virtualized Environment Overhead Backup and Recovery Virtualization Environments Storage Options for Cloud Computing Server Software Environments thatMicrosoft Virtualization Storage Capacity Support Cloud ComputingSun xVM VirtualBox Data Protection and Partitioning Server CapacityLinux/UNIX Virtualization NAS VirtualizationVMware Products SAN ClusteringData Center and Cloud Infrastructure CAS ExpansionProducts Redundancy Server FunctionsEnd-User and Desktop Products Replication ApplicationIBM Virtualization Multisiting WebUsing VMware to see a Virtualized Server Backup and Recovery Database Environment Server Software Environments that Vendor Approaches to Cloud ComputingPermissive Federation Support Cloud Computing Role of Open Source Software in DataVerified Federation Server Capacity CenterEncrypted Federation Virtualization Cost Reduction vs. ReliabilityTrusted Federation Clustering Open Source Server SoftwareUsing XMPP in the Federated Environment Expansion Open Source Database SoftwarePresence in the Cloud Server Functions Open Source Applications SoftwareWhat It Is Application Open Source System ManagementPresence Protocols Web SoftwareLeveraging Presence Database Open Source Load-Balancing Software Presence Enabled Vendor Approaches to Cloud Computing Virtualization as the "Operating System"The Future of Presence Role of Open Source Software in Data Virtualization with a Host OperatingThe Interrelation of Identity, Presence, and Center System Location in the Cloud Cost Reduction vs. Reliability Virtualization Infections on VirtualizedIdentity Management Open Source Server Software EnvironmentsWhat It Is Open Source Database Software Type 1 Virtualized EnvironmentFuture of Identity in the Cloud Open Source Applications Software Type 2 Virtualized Environment Privacy and Its Relation to Cloud-Based Open Source System Management Virtualization EnvironmentsInformation Systems Software Microsoft VirtualizationPersonal Information Open Source Load-Balancing Software Sun xVM VirtualBoxPrivacy-Related Issues Virtualization as the "Operating System" Linux/UNIX VirtualizationFinding Your Private Information Virtualization with a Host Operating VMware ProductsOpen Cloud Consortium Working Groups System Data Center and Cloud InfrastructureProject Matsu Virtualization Infections on Virtualized ProductsProject Comet Environments End-User and Desktop Products HPC in the Cloud Type 1 Virtualized Environment IBM VirtualizationThe Open Cloud Testbed Type 2 Virtualized Environment Using VMware to see a Virtualized ServerThe Open Science Data Cloud Virtualization Environments Environment Intercloud Testbed Microsoft Virtualization Permissive FederationReporting on an Open Cloud Consortium Sun xVM VirtualBox Verified FederationWorking Group Linux/UNIX Virtualization Encrypted FederationDistributed Management Task Force VMware Products Trusted Federation(DMTF) Data Center and Cloud Infrastructure Using XMPP in the Federated EnvironmentWhat It Is? Products Presence in the CloudDMTK Working Groups Associated with End-User and Desktop Products What It IsCloud Computing IBM Virtualization Presence ProtocolsStandards for Application Developers Using VMware to see a Virtualized Server Leveraging PresenceProtocols Environment Presence EnabledScripting Languages Permissive Federation The Future of PresenceContent Formatting Standards and Verified Federation The Interrelation of Identity, Presence, and

Page 29: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Languages Encrypted Federation Location in the Cloud Standards for Security in the Cloud Trusted Federation Identity ManagementConfidentiality, Integrity, Availability Using XMPP in the Federated What It IsAuthentication, Authorization, Accountability Environment Future of Identity in the Cloud Regulations for Privacy Presence in the Cloud Privacy and Its Relation to Cloud-BasedSecurity Protocols What It Is Information SystemsEstablishing a Baseline for Cloud Presence Protocols Personal InformationPerformance Leveraging Presence Privacy-Related IssuesBest Practices for Selecting a Vendor and Presence Enabled Finding Your Private Information Implementing Cloud-Based Applications The Future of Presence Open Cloud Consortium Working GroupsChoosing the Right Vendor The Interrelation of Identity, Presence, Project MatsuImplementing Cloud-Based Applications and Location in the Cloud Project CometWindows Remote Desktop Identity Management HPC in the CloudVnc What It Is The Open Cloud TestbedWeb Browsers Future of Identity in the Cloud The Open Science Data CloudServer Extensions Privacy and Its Relation to Cloud-Based Intercloud TestbedThin Clients Information Systems Reporting on an Open Cloud ConsortiumSmart Phones, Pads, Pods, etc. Personal Information Working Group Virtual Terminal Security Strengths and Privacy-Related Issues Distributed Management Task ForceWeaknesses Finding Your Private Information (DMTF)Strengths Open Cloud Consortium Working Groups What It Is?Weaknesses Project Matsu DMTK Working Groups Associated withAndroid Project Comet Cloud Computing BlackBerry HPC in the Cloud Standards for Application DevelopersWindows Mobile The Open Cloud Testbed ProtocolsUbuntu Mobile Internet Device The Open Science Data Cloud Scripting LanguagesMobile Platform Virtualization Intercloud Testbed Content Formatting Standards andKernel-Based Virtual Machine Reporting on an Open Cloud Consortium Languages VMware Mobile Virtualization Platform Working Group Standards for Security in the CloudCollaboration Applications for Mobile Distributed Management Task Force Confidentiality, Integrity, AvailabilityPlatforms (DMTF) Authentication, Authorization,Text Messaging What It Is? AccountabilityiPhone Applications DMTK Working Groups Associated with Regulations for PrivacyBlackBerry Applications Cloud Computing Security Protocols

Standards for Application Developers Establishing a Baseline for CloudProtocols Performance

4. The Evolution of Cloud Computing Scripting Languages Best Practices for Selecting a Vendor andline Content Formatting Standards and Implementing Cloud-Based Applications

Early Mainframe Environment Languages Choosing the Right VendorVirtualization in Mainframe Architectures Standards for Security in the Cloud Implementing Cloud-Based Applications and Operating Systems Confidentiality, Integrity, Availability Windows Remote Desktop

Authentication, Authorization, VncAccountability Web Browsers

line Regulations for Privacy Server ExtensionsCloud Computing Infrastructure Security Protocols Thin ClientsCloud Computing Terms Establishing a Baseline for Cloud Smart Phones, Pads, Pods, etc. Benefits and Limitations of Cloud Computing Performance Virtual Terminal Security Strengths andBenefits Best Practices for Selecting a Vendor WeaknessesLimitations and Implementing Cloud-Based StrengthsCloud Computing Case Studies Applications Weaknesses How Companies Are Using Cloud Choosing the Right Vendor AndroidComputing Implementing Cloud-Based Applications BlackBerryImplementing Applications and Services in Windows Remote Desktop Windows Mobilethe Cloud Vnc Ubuntu Mobile Internet Device Using Your Company's Services vs. the Web Browsers Mobile Platform VirtualizationCloud Provider Server Extensions Kernel-Based Virtual MachineA Cloud Service Provider Introduced Thin Clients VMware Mobile Virtualization Platform Cloud Computing Risks and Issues Smart Phones, Pads, Pods, etc. Collaboration Applications for MobileProducts and Services Provided by Cloud Virtual Terminal Security Strengths and PlatformsComputing Companies Weaknesses Text MessagingEconomic Strengths iPhone ApplicationsStaffing Weaknesses BlackBerry ApplicationsShould Your Company Invest in Cloud AndroidComputing? BlackBerryWhat Should Not be Moved to the Cloud Windows Mobile

Page 30: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

LANs and the Cloud Ubuntu Mobile Internet Device lineInternet and the Cloud Mobile Platform Virtualization Cloud Computing InfrastructureWeb Services, Browsers, and the Cloud Kernel-Based Virtual Machine Cloud Computing Terms Thin Client VMware Mobile Virtualization Platform Benefits and Limitations of CloudAdvances in Networking and Processing Collaboration Applications for Mobile ComputingSpeeds that Led to Cloud Computing Platforms BenefitsNetworking Developments Text Messaging LimitationsIncreased Processing Speeds iPhone Applications Cloud Computing Case Studies Managed Service Provider Model to Cloud BlackBerry Applications How Companies Are Using CloudComputing and Software as a Service Computing(SaaS) Implementing Applications and Services inSingle Purpose Architectures Migrate to the CloudMultipurpose Architectures line Using Your Company's Services vs. theData Center Virtualization Cloud Computing Infrastructure Cloud ProviderCollaboration Cloud Computing Terms A Cloud Service Provider Introduced The Cloud as a Reach Extender Benefits and Limitations of Cloud Cloud Computing Risks and Issues The Cloud as a Communication Enabler Computing Products and Services Provided by CloudThe Cloud as an Employee Enabler Benefits Computing Companies Service-Oriented Architecture (SOA) Limitations EconomicEvolving from SOA to the Cloud Cloud Computing Case Studies Staffing Capacity: Limited Performance How Companies Are Using Cloud Should Your Company Invest in CloudAvailability: Communications Failure and Computing Computing?Performance Issues Implementing Applications and Services What Should Not be Moved to the Cloud Security: Newer Security Protocols Provide in the Cloud LANs and the CloudMore Protection Using Your Company's Services vs. the Internet and the CloudWhat's Next in Cloud Computing Cloud Provider Web Services, Browsers, and the CloudIndependent Components A Cloud Service Provider Introduced Thin ClientMessage Base Cloud Computing Risks and Issues Advances in Networking and ProcessingLocation Independence Products and Services Provided by Cloud Speeds that Led to Cloud ComputingCommunication Requirements for Cloud Computing Companies Networking DevelopmentsImplementation Economic Increased Processing Speeds Public Internet Staffing Managed Service Provider Model to CloudPrivate Internet Should Your Company Invest in Cloud Computing and Software as a ServiceRouting to the Datacenter Computing? (SaaS)Switching within the Data Center What Should Not be Moved to the Cloud Single Purpose Architectures Migrate toBandwidth LANs and the Cloud Multipurpose ArchitecturesTools Used to Measure Network Internet and the Cloud Data Center Virtualization Performance Web Services, Browsers, and the Cloud CollaborationUsing the Protocol Analyzer to Measure Thin Client The Cloud as a Reach ExtenderBandwidth Advances in Networking and Processing The Cloud as a Communication EnablerUsing Ping and Traceroute to Measure Speeds that Led to Cloud Computing The Cloud as an Employee Enabler Network Performance Networking Developments Service-Oriented Architecture (SOA)Security Increased Processing Speeds Evolving from SOA to the CloudSSL Managed Service Provider Model to Capacity: Limited PerformanceVPN Cloud Computing and Software as a Availability: Communications Failure andOverhead Service (SaaS) Performance IssuesStorage Options for Cloud Computing Single Purpose Architectures Migrate to Security: Newer Security Protocols ProvideStorage Capacity Multipurpose Architectures More Protection Data Protection and Partitioning Data Center Virtualization What's Next in Cloud Computing NAS Collaboration Independent ComponentsSAN The Cloud as a Reach Extender Message BaseCAS The Cloud as a Communication Enabler Location Independence Redundancy The Cloud as an Employee Enabler Communication Requirements for CloudReplication Service-Oriented Architecture (SOA) ImplementationMultisiting Evolving from SOA to the Cloud Public InternetBackup and Recovery Capacity: Limited Performance Private InternetServer Software Environments that Support Availability: Communications Failure and Routing to the DatacenterCloud Computing Performance Issues Switching within the Data CenterServer Capacity Security: Newer Security Protocols BandwidthVirtualization Provide More Protection Tools Used to Measure NetworkClustering What's Next in Cloud Computing PerformanceExpansion Independent Components Using the Protocol Analyzer to MeasureServer Functions Message Base BandwidthApplication Location Independence Using Ping and Traceroute to MeasureWeb Communication Requirements for Cloud Network Performance

Page 31: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Database Implementation SecurityVendor Approaches to Cloud Computing Public Internet SSLRole of Open Source Software in Data Private Internet VPNCenter Routing to the Datacenter Overhead Cost Reduction vs. Reliability Switching within the Data Center Storage Options for Cloud ComputingOpen Source Server Software Bandwidth Storage CapacityOpen Source Database Software Tools Used to Measure Network Data Protection and PartitioningOpen Source Applications Software Performance NASOpen Source System Management Software Using the Protocol Analyzer to Measure SANOpen Source Load-Balancing Software Bandwidth CASVirtualization as the "Operating System" Using Ping and Traceroute to Measure RedundancyVirtualization with a Host Operating System Network Performance ReplicationVirtualization Infections on Virtualized Security Multisiting Environments SSL Backup and Recovery Type 1 Virtualized Environment VPN Server Software Environments thatType 2 Virtualized Environment Overhead Support Cloud ComputingVirtualization Environments Storage Options for Cloud Computing Server CapacityMicrosoft Virtualization Storage Capacity VirtualizationSun xVM VirtualBox Data Protection and Partitioning ClusteringLinux/UNIX Virtualization NAS ExpansionVMware Products SAN Server FunctionsData Center and Cloud Infrastructure CAS ApplicationProducts Redundancy WebEnd-User and Desktop Products Replication Database IBM Virtualization Multisiting Vendor Approaches to Cloud ComputingUsing VMware to see a Virtualized Server Backup and Recovery Role of Open Source Software in DataEnvironment Server Software Environments that CenterPermissive Federation Support Cloud Computing Cost Reduction vs. ReliabilityVerified Federation Server Capacity Open Source Server SoftwareEncrypted Federation Virtualization Open Source Database SoftwareTrusted Federation Clustering Open Source Applications SoftwareUsing XMPP in the Federated Environment Expansion Open Source System ManagementPresence in the Cloud Server Functions SoftwareWhat It Is Application Open Source Load-Balancing Software Presence Protocols Web Virtualization as the "Operating System"Leveraging Presence Database Virtualization with a Host OperatingPresence Enabled Vendor Approaches to Cloud Computing System The Future of Presence Role of Open Source Software in Data Virtualization Infections on VirtualizedThe Interrelation of Identity, Presence, and Center EnvironmentsLocation in the Cloud Cost Reduction vs. Reliability Type 1 Virtualized EnvironmentIdentity Management Open Source Server Software Type 2 Virtualized Environment What It Is Open Source Database Software Virtualization EnvironmentsFuture of Identity in the Cloud Open Source Applications Software Microsoft VirtualizationPrivacy and Its Relation to Cloud-Based Open Source System Management Sun xVM VirtualBoxInformation Systems Software Linux/UNIX VirtualizationPersonal Information Open Source Load-Balancing Software VMware ProductsPrivacy-Related Issues Virtualization as the "Operating System" Data Center and Cloud InfrastructureFinding Your Private Information Virtualization with a Host Operating ProductsOpen Cloud Consortium Working Groups System End-User and Desktop Products Project Matsu Virtualization Infections on Virtualized IBM VirtualizationProject Comet Environments Using VMware to see a Virtualized ServerHPC in the Cloud Type 1 Virtualized Environment Environment The Open Cloud Testbed Type 2 Virtualized Environment Permissive FederationThe Open Science Data Cloud Virtualization Environments Verified FederationIntercloud Testbed Microsoft Virtualization Encrypted FederationReporting on an Open Cloud Consortium Sun xVM VirtualBox Trusted FederationWorking Group Linux/UNIX Virtualization Using XMPP in the Federated EnvironmentDistributed Management Task Force VMware Products Presence in the Cloud(DMTF) Data Center and Cloud Infrastructure What It IsWhat It Is? Products Presence ProtocolsDMTK Working Groups Associated with End-User and Desktop Products Leveraging PresenceCloud Computing IBM Virtualization Presence EnabledStandards for Application Developers Using VMware to see a Virtualized Server The Future of PresenceProtocols Environment The Interrelation of Identity, Presence, andScripting Languages Permissive Federation Location in the Cloud

Page 32: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Content Formatting Standards and Verified Federation Identity ManagementLanguages Encrypted Federation What It IsStandards for Security in the Cloud Trusted Federation Future of Identity in the Cloud Confidentiality, Integrity, Availability Using XMPP in the Federated Privacy and Its Relation to Cloud-BasedAuthentication, Authorization, Accountability Environment Information SystemsRegulations for Privacy Presence in the Cloud Personal InformationSecurity Protocols What It Is Privacy-Related IssuesEstablishing a Baseline for Cloud Presence Protocols Finding Your Private Information Performance Leveraging Presence Open Cloud Consortium Working GroupsBest Practices for Selecting a Vendor and Presence Enabled Project MatsuImplementing Cloud-Based Applications The Future of Presence Project CometChoosing the Right Vendor The Interrelation of Identity, Presence, HPC in the CloudImplementing Cloud-Based Applications and Location in the Cloud The Open Cloud TestbedWindows Remote Desktop Identity Management The Open Science Data CloudVnc What It Is Intercloud TestbedWeb Browsers Future of Identity in the Cloud Reporting on an Open Cloud ConsortiumServer Extensions Privacy and Its Relation to Cloud-Based Working Group Thin Clients Information Systems Distributed Management Task ForceSmart Phones, Pads, Pods, etc. Personal Information (DMTF)Virtual Terminal Security Strengths and Privacy-Related Issues What It Is?Weaknesses Finding Your Private Information DMTK Working Groups Associated withStrengths Open Cloud Consortium Working Groups Cloud Computing Weaknesses Project Matsu Standards for Application DevelopersAndroid Project Comet ProtocolsBlackBerry HPC in the Cloud Scripting LanguagesWindows Mobile The Open Cloud Testbed Content Formatting Standards andUbuntu Mobile Internet Device The Open Science Data Cloud Languages Mobile Platform Virtualization Intercloud Testbed Standards for Security in the CloudKernel-Based Virtual Machine Reporting on an Open Cloud Consortium Confidentiality, Integrity, AvailabilityVMware Mobile Virtualization Platform Working Group Authentication, Authorization,Collaboration Applications for Mobile Distributed Management Task Force AccountabilityPlatforms (DMTF) Regulations for PrivacyText Messaging What It Is? Security Protocols iPhone Applications DMTK Working Groups Associated with Establishing a Baseline for CloudBlackBerry Applications Cloud Computing Performance

Standards for Application Developers Best Practices for Selecting a Vendor andProtocols Implementing Cloud-Based ApplicationsScripting Languages Choosing the Right Vendor

line Content Formatting Standards and Implementing Cloud-Based Applications Cloud Computing Infrastructure Languages Windows Remote DesktopCloud Computing Terms Standards for Security in the Cloud VncBenefits and Limitations of Cloud Computing Confidentiality, Integrity, Availability Web BrowsersBenefits Authentication, Authorization, Server ExtensionsLimitations Accountability Thin ClientsCloud Computing Case Studies Regulations for Privacy Smart Phones, Pads, Pods, etc. How Companies Are Using Cloud Security Protocols Virtual Terminal Security Strengths andComputing Establishing a Baseline for Cloud WeaknessesImplementing Applications and Services in Performance Strengthsthe Cloud Best Practices for Selecting a Vendor Weaknesses Using Your Company's Services vs. the and Implementing Cloud-Based AndroidCloud Provider Applications BlackBerryA Cloud Service Provider Introduced Choosing the Right Vendor Windows MobileCloud Computing Risks and Issues Implementing Cloud-Based Applications Ubuntu Mobile Internet Device Products and Services Provided by Cloud Windows Remote Desktop Mobile Platform VirtualizationComputing Companies Vnc Kernel-Based Virtual MachineEconomic Web Browsers VMware Mobile Virtualization Platform Staffing Server Extensions Collaboration Applications for MobileShould Your Company Invest in Cloud Thin Clients PlatformsComputing? Smart Phones, Pads, Pods, etc. Text MessagingWhat Should Not be Moved to the Cloud Virtual Terminal Security Strengths and iPhone ApplicationsLANs and the Cloud Weaknesses BlackBerry ApplicationsInternet and the Cloud StrengthsWeb Services, Browsers, and the Cloud Weaknesses Thin Client AndroidAdvances in Networking and Processing BlackBerry line

Page 33: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Speeds that Led to Cloud Computing Windows Mobile Cloud Computing InfrastructureNetworking Developments Ubuntu Mobile Internet Device Cloud Computing Terms Increased Processing Speeds Mobile Platform Virtualization Benefits and Limitations of CloudManaged Service Provider Model to Cloud Kernel-Based Virtual Machine ComputingComputing and Software as a Service VMware Mobile Virtualization Platform Benefits(SaaS) Collaboration Applications for Mobile LimitationsSingle Purpose Architectures Migrate to Platforms Cloud Computing Case Studies Multipurpose Architectures Text Messaging How Companies Are Using CloudData Center Virtualization iPhone Applications ComputingCollaboration BlackBerry Applications Implementing Applications and Services inThe Cloud as a Reach Extender the CloudThe Cloud as a Communication Enabler Using Your Company's Services vs. theThe Cloud as an Employee Enabler Cloud ProviderService-Oriented Architecture (SOA) line A Cloud Service Provider Introduced Evolving from SOA to the Cloud Cloud Computing Infrastructure Cloud Computing Risks and Issues Capacity: Limited Performance Cloud Computing Terms Products and Services Provided by CloudAvailability: Communications Failure and Benefits and Limitations of Cloud Computing Companies Performance Issues Computing EconomicSecurity: Newer Security Protocols Provide Benefits Staffing More Protection Limitations Should Your Company Invest in CloudWhat's Next in Cloud Computing Cloud Computing Case Studies Computing?Independent Components How Companies Are Using Cloud What Should Not be Moved to the Cloud Message Base Computing LANs and the CloudLocation Independence Implementing Applications and Services Internet and the CloudCommunication Requirements for Cloud in the Cloud Web Services, Browsers, and the CloudImplementation Using Your Company's Services vs. the Thin ClientPublic Internet Cloud Provider Advances in Networking and ProcessingPrivate Internet A Cloud Service Provider Introduced Speeds that Led to Cloud ComputingRouting to the Datacenter Cloud Computing Risks and Issues Networking DevelopmentsSwitching within the Data Center Products and Services Provided by Cloud Increased Processing Speeds Bandwidth Computing Companies Managed Service Provider Model to CloudTools Used to Measure Network Economic Computing and Software as a ServicePerformance Staffing (SaaS)Using the Protocol Analyzer to Measure Should Your Company Invest in Cloud Single Purpose Architectures Migrate toBandwidth Computing? Multipurpose ArchitecturesUsing Ping and Traceroute to Measure What Should Not be Moved to the Cloud Data Center Virtualization Network Performance LANs and the Cloud CollaborationSecurity Internet and the Cloud The Cloud as a Reach ExtenderSSL Web Services, Browsers, and the Cloud The Cloud as a Communication EnablerVPN Thin Client The Cloud as an Employee Enabler Overhead Advances in Networking and Processing Service-Oriented Architecture (SOA)Storage Options for Cloud Computing Speeds that Led to Cloud Computing Evolving from SOA to the CloudStorage Capacity Networking Developments Capacity: Limited PerformanceData Protection and Partitioning Increased Processing Speeds Availability: Communications Failure andNAS Managed Service Provider Model to Performance IssuesSAN Cloud Computing and Software as a Security: Newer Security Protocols ProvideCAS Service (SaaS) More Protection Redundancy Single Purpose Architectures Migrate to What's Next in Cloud Computing Replication Multipurpose Architectures Independent ComponentsMultisiting Data Center Virtualization Message BaseBackup and Recovery Collaboration Location Independence Server Software Environments that Support The Cloud as a Reach Extender Communication Requirements for CloudCloud Computing The Cloud as a Communication Enabler ImplementationServer Capacity The Cloud as an Employee Enabler Public InternetVirtualization Service-Oriented Architecture (SOA) Private InternetClustering Evolving from SOA to the Cloud Routing to the DatacenterExpansion Capacity: Limited Performance Switching within the Data CenterServer Functions Availability: Communications Failure and BandwidthApplication Performance Issues Tools Used to Measure NetworkWeb Security: Newer Security Protocols PerformanceDatabase Provide More Protection Using the Protocol Analyzer to MeasureVendor Approaches to Cloud Computing What's Next in Cloud Computing BandwidthRole of Open Source Software in Data Independent Components Using Ping and Traceroute to MeasureCenter Message Base Network Performance Cost Reduction vs. Reliability Location Independence Security

Page 34: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Open Source Server Software Communication Requirements for Cloud SSLOpen Source Database Software Implementation VPNOpen Source Applications Software Public Internet Overhead Open Source System Management Software Private Internet Storage Options for Cloud ComputingOpen Source Load-Balancing Software Routing to the Datacenter Storage CapacityVirtualization as the "Operating System" Switching within the Data Center Data Protection and PartitioningVirtualization with a Host Operating System Bandwidth NASVirtualization Infections on Virtualized Tools Used to Measure Network SANEnvironments Performance CASType 1 Virtualized Environment Using the Protocol Analyzer to Measure RedundancyType 2 Virtualized Environment Bandwidth ReplicationVirtualization Environments Using Ping and Traceroute to Measure Multisiting Microsoft Virtualization Network Performance Backup and Recovery Sun xVM VirtualBox Security Server Software Environments thatLinux/UNIX Virtualization SSL Support Cloud ComputingVMware Products VPN Server CapacityData Center and Cloud Infrastructure Overhead VirtualizationProducts Storage Options for Cloud Computing ClusteringEnd-User and Desktop Products Storage Capacity ExpansionIBM Virtualization Data Protection and Partitioning Server FunctionsUsing VMware to see a Virtualized Server NAS ApplicationEnvironment SAN WebPermissive Federation CAS Database Verified Federation Redundancy Vendor Approaches to Cloud ComputingEncrypted Federation Replication Role of Open Source Software in DataTrusted Federation Multisiting CenterUsing XMPP in the Federated Environment Backup and Recovery Cost Reduction vs. ReliabilityPresence in the Cloud Server Software Environments that Open Source Server SoftwareWhat It Is Support Cloud Computing Open Source Database SoftwarePresence Protocols Server Capacity Open Source Applications SoftwareLeveraging Presence Virtualization Open Source System ManagementPresence Enabled Clustering SoftwareThe Future of Presence Expansion Open Source Load-Balancing Software The Interrelation of Identity, Presence, and Server Functions Virtualization as the "Operating System"Location in the Cloud Application Virtualization with a Host OperatingIdentity Management Web System What It Is Database Virtualization Infections on VirtualizedFuture of Identity in the Cloud Vendor Approaches to Cloud Computing EnvironmentsPrivacy and Its Relation to Cloud-Based Role of Open Source Software in Data Type 1 Virtualized EnvironmentInformation Systems Center Type 2 Virtualized Environment Personal Information Cost Reduction vs. Reliability Virtualization EnvironmentsPrivacy-Related Issues Open Source Server Software Microsoft VirtualizationFinding Your Private Information Open Source Database Software Sun xVM VirtualBoxOpen Cloud Consortium Working Groups Open Source Applications Software Linux/UNIX VirtualizationProject Matsu Open Source System Management VMware ProductsProject Comet Software Data Center and Cloud InfrastructureHPC in the Cloud Open Source Load-Balancing Software ProductsThe Open Cloud Testbed Virtualization as the "Operating System" End-User and Desktop Products The Open Science Data Cloud Virtualization with a Host Operating IBM VirtualizationIntercloud Testbed System Using VMware to see a Virtualized ServerReporting on an Open Cloud Consortium Virtualization Infections on Virtualized Environment Working Group Environments Permissive FederationDistributed Management Task Force Type 1 Virtualized Environment Verified Federation(DMTF) Type 2 Virtualized Environment Encrypted FederationWhat It Is? Virtualization Environments Trusted FederationDMTK Working Groups Associated with Microsoft Virtualization Using XMPP in the Federated EnvironmentCloud Computing Sun xVM VirtualBox Presence in the CloudStandards for Application Developers Linux/UNIX Virtualization What It IsProtocols VMware Products Presence ProtocolsScripting Languages Data Center and Cloud Infrastructure Leveraging PresenceContent Formatting Standards and Products Presence EnabledLanguages End-User and Desktop Products The Future of PresenceStandards for Security in the Cloud IBM Virtualization The Interrelation of Identity, Presence, andConfidentiality, Integrity, Availability Using VMware to see a Virtualized Server Location in the Cloud Authentication, Authorization, Accountability Environment Identity Management

Page 35: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Regulations for Privacy Permissive Federation What It IsSecurity Protocols Verified Federation Future of Identity in the Cloud Establishing a Baseline for Cloud Encrypted Federation Privacy and Its Relation to Cloud-BasedPerformance Trusted Federation Information SystemsBest Practices for Selecting a Vendor and Using XMPP in the Federated Personal InformationImplementing Cloud-Based Applications Environment Privacy-Related IssuesChoosing the Right Vendor Presence in the Cloud Finding Your Private Information Implementing Cloud-Based Applications What It Is Open Cloud Consortium Working GroupsWindows Remote Desktop Presence Protocols Project MatsuVnc Leveraging Presence Project CometWeb Browsers Presence Enabled HPC in the CloudServer Extensions The Future of Presence The Open Cloud TestbedThin Clients The Interrelation of Identity, Presence, The Open Science Data CloudSmart Phones, Pads, Pods, etc. and Location in the Cloud Intercloud TestbedVirtual Terminal Security Strengths and Identity Management Reporting on an Open Cloud ConsortiumWeaknesses What It Is Working Group Strengths Future of Identity in the Cloud Distributed Management Task ForceWeaknesses Privacy and Its Relation to Cloud-Based (DMTF)Android Information Systems What It Is?BlackBerry Personal Information DMTK Working Groups Associated withWindows Mobile Privacy-Related Issues Cloud Computing Ubuntu Mobile Internet Device Finding Your Private Information Standards for Application DevelopersMobile Platform Virtualization Open Cloud Consortium Working Groups ProtocolsKernel-Based Virtual Machine Project Matsu Scripting LanguagesVMware Mobile Virtualization Platform Project Comet Content Formatting Standards andCollaboration Applications for Mobile HPC in the Cloud Languages Platforms The Open Cloud Testbed Standards for Security in the CloudText Messaging The Open Science Data Cloud Confidentiality, Integrity, AvailabilityiPhone Applications Intercloud Testbed Authentication, Authorization,BlackBerry Applications Reporting on an Open Cloud Consortium Accountability

Working Group Regulations for PrivacyDistributed Management Task Force Security Protocols (DMTF) Establishing a Baseline for Cloud

line What It Is? PerformanceCloud Computing Infrastructure DMTK Working Groups Associated with Best Practices for Selecting a Vendor andCloud Computing Terms Cloud Computing Implementing Cloud-Based ApplicationsBenefits and Limitations of Cloud Computing Standards for Application Developers Choosing the Right VendorBenefits Protocols Implementing Cloud-Based Applications Limitations Scripting Languages Windows Remote DesktopCloud Computing Case Studies Content Formatting Standards and VncHow Companies Are Using Cloud Languages Web BrowsersComputing Standards for Security in the Cloud Server ExtensionsImplementing Applications and Services in Confidentiality, Integrity, Availability Thin Clientsthe Cloud Authentication, Authorization, Smart Phones, Pads, Pods, etc. Using Your Company's Services vs. the Accountability Virtual Terminal Security Strengths andCloud Provider Regulations for Privacy WeaknessesA Cloud Service Provider Introduced Security Protocols StrengthsCloud Computing Risks and Issues Establishing a Baseline for Cloud Weaknesses Products and Services Provided by Cloud Performance AndroidComputing Companies Best Practices for Selecting a Vendor BlackBerryEconomic and Implementing Cloud-Based Windows MobileStaffing Applications Ubuntu Mobile Internet Device Should Your Company Invest in Cloud Choosing the Right Vendor Mobile Platform VirtualizationComputing? Implementing Cloud-Based Applications Kernel-Based Virtual MachineWhat Should Not be Moved to the Cloud Windows Remote Desktop VMware Mobile Virtualization Platform LANs and the Cloud Vnc Collaboration Applications for MobileInternet and the Cloud Web Browsers PlatformsWeb Services, Browsers, and the Cloud Server Extensions Text MessagingThin Client Thin Clients iPhone ApplicationsAdvances in Networking and Processing Smart Phones, Pads, Pods, etc. BlackBerry ApplicationsSpeeds that Led to Cloud Computing Virtual Terminal Security Strengths andNetworking Developments WeaknessesIncreased Processing Speeds StrengthsManaged Service Provider Model to Cloud Weaknesses lineComputing and Software as a Service Android Cloud Computing Infrastructure

Page 36: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

(SaaS) BlackBerry Cloud Computing Terms Single Purpose Architectures Migrate to Windows Mobile Benefits and Limitations of CloudMultipurpose Architectures Ubuntu Mobile Internet Device ComputingData Center Virtualization Mobile Platform Virtualization BenefitsCollaboration Kernel-Based Virtual Machine LimitationsThe Cloud as a Reach Extender VMware Mobile Virtualization Platform Cloud Computing Case Studies The Cloud as a Communication Enabler Collaboration Applications for Mobile How Companies Are Using CloudThe Cloud as an Employee Enabler Platforms ComputingService-Oriented Architecture (SOA) Text Messaging Implementing Applications and Services inEvolving from SOA to the Cloud iPhone Applications the CloudCapacity: Limited Performance BlackBerry Applications Using Your Company's Services vs. theAvailability: Communications Failure and Cloud ProviderPerformance Issues A Cloud Service Provider Introduced Security: Newer Security Protocols Provide Cloud Computing Risks and Issues More Protection line Products and Services Provided by CloudWhat's Next in Cloud Computing Cloud Computing Infrastructure Computing Companies Independent Components Cloud Computing Terms EconomicMessage Base Benefits and Limitations of Cloud Staffing Location Independence Computing Should Your Company Invest in CloudCommunication Requirements for Cloud Benefits Computing?Implementation Limitations What Should Not be Moved to the Cloud Public Internet Cloud Computing Case Studies LANs and the CloudPrivate Internet How Companies Are Using Cloud Internet and the CloudRouting to the Datacenter Computing Web Services, Browsers, and the CloudSwitching within the Data Center Implementing Applications and Services Thin ClientBandwidth in the Cloud Advances in Networking and ProcessingTools Used to Measure Network Using Your Company's Services vs. the Speeds that Led to Cloud ComputingPerformance Cloud Provider Networking DevelopmentsUsing the Protocol Analyzer to Measure A Cloud Service Provider Introduced Increased Processing Speeds Bandwidth Cloud Computing Risks and Issues Managed Service Provider Model to CloudUsing Ping and Traceroute to Measure Products and Services Provided by Cloud Computing and Software as a ServiceNetwork Performance Computing Companies (SaaS)Security Economic Single Purpose Architectures Migrate toSSL Staffing Multipurpose ArchitecturesVPN Should Your Company Invest in Cloud Data Center Virtualization Overhead Computing? CollaborationStorage Options for Cloud Computing What Should Not be Moved to the Cloud The Cloud as a Reach ExtenderStorage Capacity LANs and the Cloud The Cloud as a Communication EnablerData Protection and Partitioning Internet and the Cloud The Cloud as an Employee Enabler NAS Web Services, Browsers, and the Cloud Service-Oriented Architecture (SOA)SAN Thin Client Evolving from SOA to the CloudCAS Advances in Networking and Processing Capacity: Limited PerformanceRedundancy Speeds that Led to Cloud Computing Availability: Communications Failure andReplication Networking Developments Performance IssuesMultisiting Increased Processing Speeds Security: Newer Security Protocols ProvideBackup and Recovery Managed Service Provider Model to More Protection Server Software Environments that Support Cloud Computing and Software as a What's Next in Cloud Computing Cloud Computing Service (SaaS) Independent ComponentsServer Capacity Single Purpose Architectures Migrate to Message BaseVirtualization Multipurpose Architectures Location Independence Clustering Data Center Virtualization Communication Requirements for CloudExpansion Collaboration ImplementationServer Functions The Cloud as a Reach Extender Public InternetApplication The Cloud as a Communication Enabler Private InternetWeb The Cloud as an Employee Enabler Routing to the DatacenterDatabase Service-Oriented Architecture (SOA) Switching within the Data CenterVendor Approaches to Cloud Computing Evolving from SOA to the Cloud BandwidthRole of Open Source Software in Data Capacity: Limited Performance Tools Used to Measure NetworkCenter Availability: Communications Failure and PerformanceCost Reduction vs. Reliability Performance Issues Using the Protocol Analyzer to MeasureOpen Source Server Software Security: Newer Security Protocols BandwidthOpen Source Database Software Provide More Protection Using Ping and Traceroute to MeasureOpen Source Applications Software What's Next in Cloud Computing Network Performance Open Source System Management Software Independent Components SecurityOpen Source Load-Balancing Software Message Base SSL

Page 37: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Virtualization as the "Operating System" Location Independence VPNVirtualization with a Host Operating System Communication Requirements for Cloud Overhead Virtualization Infections on Virtualized Implementation Storage Options for Cloud ComputingEnvironments Public Internet Storage CapacityType 1 Virtualized Environment Private Internet Data Protection and PartitioningType 2 Virtualized Environment Routing to the Datacenter NASVirtualization Environments Switching within the Data Center SANMicrosoft Virtualization Bandwidth CASSun xVM VirtualBox Tools Used to Measure Network RedundancyLinux/UNIX Virtualization Performance ReplicationVMware Products Using the Protocol Analyzer to Measure Multisiting Data Center and Cloud Infrastructure Bandwidth Backup and Recovery Products Using Ping and Traceroute to Measure Server Software Environments thatEnd-User and Desktop Products Network Performance Support Cloud ComputingIBM Virtualization Security Server CapacityUsing VMware to see a Virtualized Server SSL VirtualizationEnvironment VPN ClusteringPermissive Federation Overhead ExpansionVerified Federation Storage Options for Cloud Computing Server FunctionsEncrypted Federation Storage Capacity ApplicationTrusted Federation Data Protection and Partitioning WebUsing XMPP in the Federated Environment NAS Database Presence in the Cloud SAN Vendor Approaches to Cloud ComputingWhat It Is CAS Role of Open Source Software in DataPresence Protocols Redundancy CenterLeveraging Presence Replication Cost Reduction vs. ReliabilityPresence Enabled Multisiting Open Source Server SoftwareThe Future of Presence Backup and Recovery Open Source Database SoftwareThe Interrelation of Identity, Presence, and Server Software Environments that Open Source Applications SoftwareLocation in the Cloud Support Cloud Computing Open Source System ManagementIdentity Management Server Capacity SoftwareWhat It Is Virtualization Open Source Load-Balancing Software Future of Identity in the Cloud Clustering Virtualization as the "Operating System"Privacy and Its Relation to Cloud-Based Expansion Virtualization with a Host OperatingInformation Systems Server Functions System Personal Information Application Virtualization Infections on VirtualizedPrivacy-Related Issues Web EnvironmentsFinding Your Private Information Database Type 1 Virtualized EnvironmentOpen Cloud Consortium Working Groups Vendor Approaches to Cloud Computing Type 2 Virtualized Environment Project Matsu Role of Open Source Software in Data Virtualization EnvironmentsProject Comet Center Microsoft VirtualizationHPC in the Cloud Cost Reduction vs. Reliability Sun xVM VirtualBoxThe Open Cloud Testbed Open Source Server Software Linux/UNIX VirtualizationThe Open Science Data Cloud Open Source Database Software VMware ProductsIntercloud Testbed Open Source Applications Software Data Center and Cloud InfrastructureReporting on an Open Cloud Consortium Open Source System Management ProductsWorking Group Software End-User and Desktop Products Distributed Management Task Force Open Source Load-Balancing Software IBM Virtualization(DMTF) Virtualization as the "Operating System" Using VMware to see a Virtualized ServerWhat It Is? Virtualization with a Host Operating Environment DMTK Working Groups Associated with System Permissive FederationCloud Computing Virtualization Infections on Virtualized Verified FederationStandards for Application Developers Environments Encrypted FederationProtocols Type 1 Virtualized Environment Trusted FederationScripting Languages Type 2 Virtualized Environment Using XMPP in the Federated EnvironmentContent Formatting Standards and Virtualization Environments Presence in the CloudLanguages Microsoft Virtualization What It IsStandards for Security in the Cloud Sun xVM VirtualBox Presence ProtocolsConfidentiality, Integrity, Availability Linux/UNIX Virtualization Leveraging PresenceAuthentication, Authorization, Accountability VMware Products Presence EnabledRegulations for Privacy Data Center and Cloud Infrastructure The Future of PresenceSecurity Protocols Products The Interrelation of Identity, Presence, andEstablishing a Baseline for Cloud End-User and Desktop Products Location in the Cloud Performance IBM Virtualization Identity ManagementBest Practices for Selecting a Vendor and Using VMware to see a Virtualized Server What It Is

Page 38: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Implementing Cloud-Based Applications Environment Future of Identity in the Cloud Choosing the Right Vendor Permissive Federation Privacy and Its Relation to Cloud-BasedImplementing Cloud-Based Applications Verified Federation Information SystemsWindows Remote Desktop Encrypted Federation Personal InformationVnc Trusted Federation Privacy-Related IssuesWeb Browsers Using XMPP in the Federated Finding Your Private Information Server Extensions Environment Open Cloud Consortium Working GroupsThin Clients Presence in the Cloud Project MatsuSmart Phones, Pads, Pods, etc. What It Is Project CometVirtual Terminal Security Strengths and Presence Protocols HPC in the CloudWeaknesses Leveraging Presence The Open Cloud TestbedStrengths Presence Enabled The Open Science Data CloudWeaknesses The Future of Presence Intercloud TestbedAndroid The Interrelation of Identity, Presence, Reporting on an Open Cloud ConsortiumBlackBerry and Location in the Cloud Working Group Windows Mobile Identity Management Distributed Management Task ForceUbuntu Mobile Internet Device What It Is (DMTF)Mobile Platform Virtualization Future of Identity in the Cloud What It Is?Kernel-Based Virtual Machine Privacy and Its Relation to Cloud-Based DMTK Working Groups Associated withVMware Mobile Virtualization Platform Information Systems Cloud Computing Collaboration Applications for Mobile Personal Information Standards for Application DevelopersPlatforms Privacy-Related Issues ProtocolsText Messaging Finding Your Private Information Scripting LanguagesiPhone Applications Open Cloud Consortium Working Groups Content Formatting Standards andBlackBerry Applications Project Matsu Languages

Project Comet Standards for Security in the CloudHPC in the Cloud Confidentiality, Integrity, AvailabilityThe Open Cloud Testbed Authentication, Authorization,

line The Open Science Data Cloud AccountabilityCloud Computing Infrastructure Intercloud Testbed Regulations for PrivacyCloud Computing Terms Reporting on an Open Cloud Consortium Security Protocols Benefits and Limitations of Cloud Computing Working Group Establishing a Baseline for CloudBenefits Distributed Management Task Force PerformanceLimitations (DMTF) Best Practices for Selecting a Vendor andCloud Computing Case Studies What It Is? Implementing Cloud-Based ApplicationsHow Companies Are Using Cloud DMTK Working Groups Associated with Choosing the Right VendorComputing Cloud Computing Implementing Cloud-Based Applications Implementing Applications and Services in Standards for Application Developers Windows Remote Desktopthe Cloud Protocols VncUsing Your Company's Services vs. the Scripting Languages Web BrowsersCloud Provider Content Formatting Standards and Server ExtensionsA Cloud Service Provider Introduced Languages Thin ClientsCloud Computing Risks and Issues Standards for Security in the Cloud Smart Phones, Pads, Pods, etc. Products and Services Provided by Cloud Confidentiality, Integrity, Availability Virtual Terminal Security Strengths andComputing Companies Authentication, Authorization, WeaknessesEconomic Accountability StrengthsStaffing Regulations for Privacy Weaknesses Should Your Company Invest in Cloud Security Protocols AndroidComputing? Establishing a Baseline for Cloud BlackBerryWhat Should Not be Moved to the Cloud Performance Windows MobileLANs and the Cloud Best Practices for Selecting a Vendor Ubuntu Mobile Internet Device Internet and the Cloud and Implementing Cloud-Based Mobile Platform VirtualizationWeb Services, Browsers, and the Cloud Applications Kernel-Based Virtual MachineThin Client Choosing the Right Vendor VMware Mobile Virtualization Platform Advances in Networking and Processing Implementing Cloud-Based Applications Collaboration Applications for MobileSpeeds that Led to Cloud Computing Windows Remote Desktop PlatformsNetworking Developments Vnc Text MessagingIncreased Processing Speeds Web Browsers iPhone ApplicationsManaged Service Provider Model to Cloud Server Extensions BlackBerry ApplicationsComputing and Software as a Service Thin Clients(SaaS) Smart Phones, Pads, Pods, etc. Single Purpose Architectures Migrate to Virtual Terminal Security Strengths andMultipurpose Architectures Weaknesses lineData Center Virtualization Strengths Cloud Computing InfrastructureCollaboration Weaknesses Cloud Computing Terms

Page 39: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

The Cloud as a Reach Extender Android Benefits and Limitations of CloudThe Cloud as a Communication Enabler BlackBerry ComputingThe Cloud as an Employee Enabler Windows Mobile BenefitsService-Oriented Architecture (SOA) Ubuntu Mobile Internet Device LimitationsEvolving from SOA to the Cloud Mobile Platform Virtualization Cloud Computing Case Studies Capacity: Limited Performance Kernel-Based Virtual Machine How Companies Are Using CloudAvailability: Communications Failure and VMware Mobile Virtualization Platform ComputingPerformance Issues Collaboration Applications for Mobile Implementing Applications and Services inSecurity: Newer Security Protocols Provide Platforms the CloudMore Protection Text Messaging Using Your Company's Services vs. theWhat's Next in Cloud Computing iPhone Applications Cloud ProviderIndependent Components BlackBerry Applications A Cloud Service Provider Introduced Message Base Cloud Computing Risks and Issues Location Independence Products and Services Provided by CloudCommunication Requirements for Cloud Computing Companies Implementation line EconomicPublic Internet Cloud Computing Infrastructure Staffing Private Internet Cloud Computing Terms Should Your Company Invest in CloudRouting to the Datacenter Benefits and Limitations of Cloud Computing?Switching within the Data Center Computing What Should Not be Moved to the Cloud Bandwidth Benefits LANs and the CloudTools Used to Measure Network Limitations Internet and the CloudPerformance Cloud Computing Case Studies Web Services, Browsers, and the CloudUsing the Protocol Analyzer to Measure How Companies Are Using Cloud Thin ClientBandwidth Computing Advances in Networking and ProcessingUsing Ping and Traceroute to Measure Implementing Applications and Services Speeds that Led to Cloud ComputingNetwork Performance in the Cloud Networking DevelopmentsSecurity Using Your Company's Services vs. the Increased Processing Speeds SSL Cloud Provider Managed Service Provider Model to CloudVPN A Cloud Service Provider Introduced Computing and Software as a ServiceOverhead Cloud Computing Risks and Issues (SaaS)Storage Options for Cloud Computing Products and Services Provided by Cloud Single Purpose Architectures Migrate toStorage Capacity Computing Companies Multipurpose ArchitecturesData Protection and Partitioning Economic Data Center Virtualization NAS Staffing CollaborationSAN Should Your Company Invest in Cloud The Cloud as a Reach ExtenderCAS Computing? The Cloud as a Communication EnablerRedundancy What Should Not be Moved to the Cloud The Cloud as an Employee Enabler Replication LANs and the Cloud Service-Oriented Architecture (SOA)Multisiting Internet and the Cloud Evolving from SOA to the CloudBackup and Recovery Web Services, Browsers, and the Cloud Capacity: Limited PerformanceServer Software Environments that Support Thin Client Availability: Communications Failure andCloud Computing Advances in Networking and Processing Performance IssuesServer Capacity Speeds that Led to Cloud Computing Security: Newer Security Protocols ProvideVirtualization Networking Developments More Protection Clustering Increased Processing Speeds What's Next in Cloud Computing Expansion Managed Service Provider Model to Independent ComponentsServer Functions Cloud Computing and Software as a Message BaseApplication Service (SaaS) Location Independence Web Single Purpose Architectures Migrate to Communication Requirements for CloudDatabase Multipurpose Architectures ImplementationVendor Approaches to Cloud Computing Data Center Virtualization Public InternetRole of Open Source Software in Data Collaboration Private InternetCenter The Cloud as a Reach Extender Routing to the DatacenterCost Reduction vs. Reliability The Cloud as a Communication Enabler Switching within the Data CenterOpen Source Server Software The Cloud as an Employee Enabler BandwidthOpen Source Database Software Service-Oriented Architecture (SOA) Tools Used to Measure NetworkOpen Source Applications Software Evolving from SOA to the Cloud PerformanceOpen Source System Management Software Capacity: Limited Performance Using the Protocol Analyzer to MeasureOpen Source Load-Balancing Software Availability: Communications Failure and BandwidthVirtualization as the "Operating System" Performance Issues Using Ping and Traceroute to MeasureVirtualization with a Host Operating System Security: Newer Security Protocols Network Performance Virtualization Infections on Virtualized Provide More Protection SecurityEnvironments What's Next in Cloud Computing SSLType 1 Virtualized Environment Independent Components VPN

Page 40: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Type 2 Virtualized Environment Message Base Overhead Virtualization Environments Location Independence Storage Options for Cloud ComputingMicrosoft Virtualization Communication Requirements for Cloud Storage CapacitySun xVM VirtualBox Implementation Data Protection and PartitioningLinux/UNIX Virtualization Public Internet NASVMware Products Private Internet SANData Center and Cloud Infrastructure Routing to the Datacenter CASProducts Switching within the Data Center RedundancyEnd-User and Desktop Products Bandwidth ReplicationIBM Virtualization Tools Used to Measure Network Multisiting Using VMware to see a Virtualized Server Performance Backup and Recovery Environment Using the Protocol Analyzer to Measure Server Software Environments thatPermissive Federation Bandwidth Support Cloud ComputingVerified Federation Using Ping and Traceroute to Measure Server CapacityEncrypted Federation Network Performance VirtualizationTrusted Federation Security ClusteringUsing XMPP in the Federated Environment SSL ExpansionPresence in the Cloud VPN Server FunctionsWhat It Is Overhead ApplicationPresence Protocols Storage Options for Cloud Computing WebLeveraging Presence Storage Capacity Database Presence Enabled Data Protection and Partitioning Vendor Approaches to Cloud ComputingThe Future of Presence NAS Role of Open Source Software in DataThe Interrelation of Identity, Presence, and SAN CenterLocation in the Cloud CAS Cost Reduction vs. ReliabilityIdentity Management Redundancy Open Source Server SoftwareWhat It Is Replication Open Source Database SoftwareFuture of Identity in the Cloud Multisiting Open Source Applications SoftwarePrivacy and Its Relation to Cloud-Based Backup and Recovery Open Source System ManagementInformation Systems Server Software Environments that SoftwarePersonal Information Support Cloud Computing Open Source Load-Balancing Software Privacy-Related Issues Server Capacity Virtualization as the "Operating System"Finding Your Private Information Virtualization Virtualization with a Host OperatingOpen Cloud Consortium Working Groups Clustering System Project Matsu Expansion Virtualization Infections on VirtualizedProject Comet Server Functions EnvironmentsHPC in the Cloud Application Type 1 Virtualized EnvironmentThe Open Cloud Testbed Web Type 2 Virtualized Environment The Open Science Data Cloud Database Virtualization EnvironmentsIntercloud Testbed Vendor Approaches to Cloud Computing Microsoft VirtualizationReporting on an Open Cloud Consortium Role of Open Source Software in Data Sun xVM VirtualBoxWorking Group Center Linux/UNIX VirtualizationDistributed Management Task Force Cost Reduction vs. Reliability VMware Products(DMTF) Open Source Server Software Data Center and Cloud InfrastructureWhat It Is? Open Source Database Software ProductsDMTK Working Groups Associated with Open Source Applications Software End-User and Desktop Products Cloud Computing Open Source System Management IBM VirtualizationStandards for Application Developers Software Using VMware to see a Virtualized ServerProtocols Open Source Load-Balancing Software Environment Scripting Languages Virtualization as the "Operating System" Permissive FederationContent Formatting Standards and Virtualization with a Host Operating Verified FederationLanguages System Encrypted FederationStandards for Security in the Cloud Virtualization Infections on Virtualized Trusted FederationConfidentiality, Integrity, Availability Environments Using XMPP in the Federated EnvironmentAuthentication, Authorization, Accountability Type 1 Virtualized Environment Presence in the CloudRegulations for Privacy Type 2 Virtualized Environment What It IsSecurity Protocols Virtualization Environments Presence ProtocolsEstablishing a Baseline for Cloud Microsoft Virtualization Leveraging PresencePerformance Sun xVM VirtualBox Presence EnabledBest Practices for Selecting a Vendor and Linux/UNIX Virtualization The Future of PresenceImplementing Cloud-Based Applications VMware Products The Interrelation of Identity, Presence, andChoosing the Right Vendor Data Center and Cloud Infrastructure Location in the Cloud Implementing Cloud-Based Applications Products Identity ManagementWindows Remote Desktop End-User and Desktop Products What It IsVnc IBM Virtualization Future of Identity in the Cloud

Page 41: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Web Browsers Using VMware to see a Virtualized Server Privacy and Its Relation to Cloud-BasedServer Extensions Environment Information SystemsThin Clients Permissive Federation Personal InformationSmart Phones, Pads, Pods, etc. Verified Federation Privacy-Related IssuesVirtual Terminal Security Strengths and Encrypted Federation Finding Your Private Information Weaknesses Trusted Federation Open Cloud Consortium Working GroupsStrengths Using XMPP in the Federated Project MatsuWeaknesses Environment Project CometAndroid Presence in the Cloud HPC in the CloudBlackBerry What It Is The Open Cloud TestbedWindows Mobile Presence Protocols The Open Science Data CloudUbuntu Mobile Internet Device Leveraging Presence Intercloud TestbedMobile Platform Virtualization Presence Enabled Reporting on an Open Cloud ConsortiumKernel-Based Virtual Machine The Future of Presence Working Group VMware Mobile Virtualization Platform The Interrelation of Identity, Presence, Distributed Management Task ForceCollaboration Applications for Mobile and Location in the Cloud (DMTF)Platforms Identity Management What It Is?Text Messaging What It Is DMTK Working Groups Associated withiPhone Applications Future of Identity in the Cloud Cloud Computing BlackBerry Applications Privacy and Its Relation to Cloud-Based Standards for Application Developers

Information Systems ProtocolsPersonal Information Scripting LanguagesPrivacy-Related Issues Content Formatting Standards and

line Finding Your Private Information Languages Cloud Computing Infrastructure Open Cloud Consortium Working Groups Standards for Security in the CloudCloud Computing Terms Project Matsu Confidentiality, Integrity, AvailabilityBenefits and Limitations of Cloud Computing Project Comet Authentication, Authorization,Benefits HPC in the Cloud AccountabilityLimitations The Open Cloud Testbed Regulations for PrivacyCloud Computing Case Studies The Open Science Data Cloud Security Protocols How Companies Are Using Cloud Intercloud Testbed Establishing a Baseline for CloudComputing Reporting on an Open Cloud Consortium PerformanceImplementing Applications and Services in Working Group Best Practices for Selecting a Vendor andthe Cloud Distributed Management Task Force Implementing Cloud-Based ApplicationsUsing Your Company's Services vs. the (DMTF) Choosing the Right VendorCloud Provider What It Is? Implementing Cloud-Based Applications A Cloud Service Provider Introduced DMTK Working Groups Associated with Windows Remote DesktopCloud Computing Risks and Issues Cloud Computing VncProducts and Services Provided by Cloud Standards for Application Developers Web BrowsersComputing Companies Protocols Server ExtensionsEconomic Scripting Languages Thin ClientsStaffing Content Formatting Standards and Smart Phones, Pads, Pods, etc. Should Your Company Invest in Cloud Languages Virtual Terminal Security Strengths andComputing? Standards for Security in the Cloud WeaknessesWhat Should Not be Moved to the Cloud Confidentiality, Integrity, Availability StrengthsLANs and the Cloud Authentication, Authorization, Weaknesses Internet and the Cloud Accountability AndroidWeb Services, Browsers, and the Cloud Regulations for Privacy BlackBerryThin Client Security Protocols Windows MobileAdvances in Networking and Processing Establishing a Baseline for Cloud Ubuntu Mobile Internet Device Speeds that Led to Cloud Computing Performance Mobile Platform VirtualizationNetworking Developments Best Practices for Selecting a Vendor Kernel-Based Virtual MachineIncreased Processing Speeds and Implementing Cloud-Based VMware Mobile Virtualization Platform Managed Service Provider Model to Cloud Applications Collaboration Applications for MobileComputing and Software as a Service Choosing the Right Vendor Platforms(SaaS) Implementing Cloud-Based Applications Text MessagingSingle Purpose Architectures Migrate to Windows Remote Desktop iPhone ApplicationsMultipurpose Architectures Vnc BlackBerry ApplicationsData Center Virtualization Web BrowsersCollaboration Server ExtensionsThe Cloud as a Reach Extender Thin ClientsThe Cloud as a Communication Enabler Smart Phones, Pads, Pods, etc. lineThe Cloud as an Employee Enabler Virtual Terminal Security Strengths and Cloud Computing InfrastructureService-Oriented Architecture (SOA) Weaknesses Cloud Computing Terms Evolving from SOA to the Cloud Strengths Benefits and Limitations of Cloud

Page 42: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Capacity: Limited Performance Weaknesses ComputingAvailability: Communications Failure and Android BenefitsPerformance Issues BlackBerry LimitationsSecurity: Newer Security Protocols Provide Windows Mobile Cloud Computing Case Studies More Protection Ubuntu Mobile Internet Device How Companies Are Using CloudWhat's Next in Cloud Computing Mobile Platform Virtualization ComputingIndependent Components Kernel-Based Virtual Machine Implementing Applications and Services inMessage Base VMware Mobile Virtualization Platform the CloudLocation Independence Collaboration Applications for Mobile Using Your Company's Services vs. theCommunication Requirements for Cloud Platforms Cloud ProviderImplementation Text Messaging A Cloud Service Provider Introduced Public Internet iPhone Applications Cloud Computing Risks and Issues Private Internet BlackBerry Applications Products and Services Provided by CloudRouting to the Datacenter Computing Companies Switching within the Data Center EconomicBandwidth Staffing Tools Used to Measure Network line Should Your Company Invest in CloudPerformance Cloud Computing Infrastructure Computing?Using the Protocol Analyzer to Measure Cloud Computing Terms What Should Not be Moved to the Cloud Bandwidth Benefits and Limitations of Cloud LANs and the CloudUsing Ping and Traceroute to Measure Computing Internet and the CloudNetwork Performance Benefits Web Services, Browsers, and the CloudSecurity Limitations Thin ClientSSL Cloud Computing Case Studies Advances in Networking and ProcessingVPN How Companies Are Using Cloud Speeds that Led to Cloud ComputingOverhead Computing Networking DevelopmentsStorage Options for Cloud Computing Implementing Applications and Services Increased Processing Speeds Storage Capacity in the Cloud Managed Service Provider Model to CloudData Protection and Partitioning Using Your Company's Services vs. the Computing and Software as a ServiceNAS Cloud Provider (SaaS)SAN A Cloud Service Provider Introduced Single Purpose Architectures Migrate toCAS Cloud Computing Risks and Issues Multipurpose ArchitecturesRedundancy Products and Services Provided by Cloud Data Center Virtualization Replication Computing Companies CollaborationMultisiting Economic The Cloud as a Reach ExtenderBackup and Recovery Staffing The Cloud as a Communication EnablerServer Software Environments that Support Should Your Company Invest in Cloud The Cloud as an Employee Enabler Cloud Computing Computing? Service-Oriented Architecture (SOA)Server Capacity What Should Not be Moved to the Cloud Evolving from SOA to the CloudVirtualization LANs and the Cloud Capacity: Limited PerformanceClustering Internet and the Cloud Availability: Communications Failure andExpansion Web Services, Browsers, and the Cloud Performance IssuesServer Functions Thin Client Security: Newer Security Protocols ProvideApplication Advances in Networking and Processing More Protection Web Speeds that Led to Cloud Computing What's Next in Cloud Computing Database Networking Developments Independent ComponentsVendor Approaches to Cloud Computing Increased Processing Speeds Message BaseRole of Open Source Software in Data Managed Service Provider Model to Location Independence Center Cloud Computing and Software as a Communication Requirements for CloudCost Reduction vs. Reliability Service (SaaS) ImplementationOpen Source Server Software Single Purpose Architectures Migrate to Public InternetOpen Source Database Software Multipurpose Architectures Private InternetOpen Source Applications Software Data Center Virtualization Routing to the DatacenterOpen Source System Management Software Collaboration Switching within the Data CenterOpen Source Load-Balancing Software The Cloud as a Reach Extender BandwidthVirtualization as the "Operating System" The Cloud as a Communication Enabler Tools Used to Measure NetworkVirtualization with a Host Operating System The Cloud as an Employee Enabler PerformanceVirtualization Infections on Virtualized Service-Oriented Architecture (SOA) Using the Protocol Analyzer to MeasureEnvironments Evolving from SOA to the Cloud BandwidthType 1 Virtualized Environment Capacity: Limited Performance Using Ping and Traceroute to MeasureType 2 Virtualized Environment Availability: Communications Failure and Network Performance Virtualization Environments Performance Issues SecurityMicrosoft Virtualization Security: Newer Security Protocols SSLSun xVM VirtualBox Provide More Protection VPNLinux/UNIX Virtualization What's Next in Cloud Computing Overhead

Page 43: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

VMware Products Independent Components Storage Options for Cloud ComputingData Center and Cloud Infrastructure Message Base Storage CapacityProducts Location Independence Data Protection and PartitioningEnd-User and Desktop Products Communication Requirements for Cloud NASIBM Virtualization Implementation SANUsing VMware to see a Virtualized Server Public Internet CASEnvironment Private Internet RedundancyPermissive Federation Routing to the Datacenter ReplicationVerified Federation Switching within the Data Center Multisiting Encrypted Federation Bandwidth Backup and Recovery Trusted Federation Tools Used to Measure Network Server Software Environments thatUsing XMPP in the Federated Environment Performance Support Cloud ComputingPresence in the Cloud Using the Protocol Analyzer to Measure Server CapacityWhat It Is Bandwidth VirtualizationPresence Protocols Using Ping and Traceroute to Measure ClusteringLeveraging Presence Network Performance ExpansionPresence Enabled Security Server FunctionsThe Future of Presence SSL ApplicationThe Interrelation of Identity, Presence, and VPN WebLocation in the Cloud Overhead Database Identity Management Storage Options for Cloud Computing Vendor Approaches to Cloud ComputingWhat It Is Storage Capacity Role of Open Source Software in DataFuture of Identity in the Cloud Data Protection and Partitioning CenterPrivacy and Its Relation to Cloud-Based NAS Cost Reduction vs. ReliabilityInformation Systems SAN Open Source Server SoftwarePersonal Information CAS Open Source Database SoftwarePrivacy-Related Issues Redundancy Open Source Applications SoftwareFinding Your Private Information Replication Open Source System ManagementOpen Cloud Consortium Working Groups Multisiting SoftwareProject Matsu Backup and Recovery Open Source Load-Balancing Software Project Comet Server Software Environments that Virtualization as the "Operating System"HPC in the Cloud Support Cloud Computing Virtualization with a Host OperatingThe Open Cloud Testbed Server Capacity System The Open Science Data Cloud Virtualization Virtualization Infections on VirtualizedIntercloud Testbed Clustering EnvironmentsReporting on an Open Cloud Consortium Expansion Type 1 Virtualized EnvironmentWorking Group Server Functions Type 2 Virtualized Environment Distributed Management Task Force Application Virtualization Environments(DMTF) Web Microsoft VirtualizationWhat It Is? Database Sun xVM VirtualBoxDMTK Working Groups Associated with Vendor Approaches to Cloud Computing Linux/UNIX VirtualizationCloud Computing Role of Open Source Software in Data VMware ProductsStandards for Application Developers Center Data Center and Cloud InfrastructureProtocols Cost Reduction vs. Reliability ProductsScripting Languages Open Source Server Software End-User and Desktop Products Content Formatting Standards and Open Source Database Software IBM VirtualizationLanguages Open Source Applications Software Using VMware to see a Virtualized ServerStandards for Security in the Cloud Open Source System Management Environment Confidentiality, Integrity, Availability Software Permissive FederationAuthentication, Authorization, Accountability Open Source Load-Balancing Software Verified FederationRegulations for Privacy Virtualization as the "Operating System" Encrypted FederationSecurity Protocols Virtualization with a Host Operating Trusted FederationEstablishing a Baseline for Cloud System Using XMPP in the Federated EnvironmentPerformance Virtualization Infections on Virtualized Presence in the CloudBest Practices for Selecting a Vendor and Environments What It IsImplementing Cloud-Based Applications Type 1 Virtualized Environment Presence ProtocolsChoosing the Right Vendor Type 2 Virtualized Environment Leveraging PresenceImplementing Cloud-Based Applications Virtualization Environments Presence EnabledWindows Remote Desktop Microsoft Virtualization The Future of PresenceVnc Sun xVM VirtualBox The Interrelation of Identity, Presence, andWeb Browsers Linux/UNIX Virtualization Location in the Cloud Server Extensions VMware Products Identity ManagementThin Clients Data Center and Cloud Infrastructure What It IsSmart Phones, Pads, Pods, etc. Products Future of Identity in the Cloud Virtual Terminal Security Strengths and End-User and Desktop Products Privacy and Its Relation to Cloud-Based

Page 44: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Weaknesses IBM Virtualization Information SystemsStrengths Using VMware to see a Virtualized Server Personal InformationWeaknesses Environment Privacy-Related IssuesAndroid Permissive Federation Finding Your Private Information BlackBerry Verified Federation Open Cloud Consortium Working GroupsWindows Mobile Encrypted Federation Project MatsuUbuntu Mobile Internet Device Trusted Federation Project CometMobile Platform Virtualization Using XMPP in the Federated HPC in the CloudKernel-Based Virtual Machine Environment The Open Cloud TestbedVMware Mobile Virtualization Platform Presence in the Cloud The Open Science Data CloudCollaboration Applications for Mobile What It Is Intercloud TestbedPlatforms Presence Protocols Reporting on an Open Cloud ConsortiumText Messaging Leveraging Presence Working Group iPhone Applications Presence Enabled Distributed Management Task ForceBlackBerry Applications The Future of Presence (DMTF)

The Interrelation of Identity, Presence, What It Is?and Location in the Cloud DMTK Working Groups Associated withIdentity Management Cloud Computing

line What It Is Standards for Application DevelopersCloud Computing Infrastructure Future of Identity in the Cloud ProtocolsCloud Computing Terms Privacy and Its Relation to Cloud-Based Scripting LanguagesBenefits and Limitations of Cloud Computing Information Systems Content Formatting Standards andBenefits Personal Information Languages Limitations Privacy-Related Issues Standards for Security in the CloudCloud Computing Case Studies Finding Your Private Information Confidentiality, Integrity, AvailabilityHow Companies Are Using Cloud Open Cloud Consortium Working Groups Authentication, Authorization,Computing Project Matsu AccountabilityImplementing Applications and Services in Project Comet Regulations for Privacythe Cloud HPC in the Cloud Security Protocols Using Your Company's Services vs. the The Open Cloud Testbed Establishing a Baseline for CloudCloud Provider The Open Science Data Cloud PerformanceA Cloud Service Provider Introduced Intercloud Testbed Best Practices for Selecting a Vendor andCloud Computing Risks and Issues Reporting on an Open Cloud Consortium Implementing Cloud-Based ApplicationsProducts and Services Provided by Cloud Working Group Choosing the Right VendorComputing Companies Distributed Management Task Force Implementing Cloud-Based Applications Economic (DMTF) Windows Remote DesktopStaffing What It Is? VncShould Your Company Invest in Cloud DMTK Working Groups Associated with Web BrowsersComputing? Cloud Computing Server ExtensionsWhat Should Not be Moved to the Cloud Standards for Application Developers Thin ClientsLANs and the Cloud Protocols Smart Phones, Pads, Pods, etc. Internet and the Cloud Scripting Languages Virtual Terminal Security Strengths andWeb Services, Browsers, and the Cloud Content Formatting Standards and WeaknessesThin Client Languages StrengthsAdvances in Networking and Processing Standards for Security in the Cloud Weaknesses Speeds that Led to Cloud Computing Confidentiality, Integrity, Availability AndroidNetworking Developments Authentication, Authorization, BlackBerryIncreased Processing Speeds Accountability Windows MobileManaged Service Provider Model to Cloud Regulations for Privacy Ubuntu Mobile Internet Device Computing and Software as a Service Security Protocols Mobile Platform Virtualization(SaaS) Establishing a Baseline for Cloud Kernel-Based Virtual MachineSingle Purpose Architectures Migrate to Performance VMware Mobile Virtualization Platform Multipurpose Architectures Best Practices for Selecting a Vendor Collaboration Applications for MobileData Center Virtualization and Implementing Cloud-Based PlatformsCollaboration Applications Text MessagingThe Cloud as a Reach Extender Choosing the Right Vendor iPhone ApplicationsThe Cloud as a Communication Enabler Implementing Cloud-Based Applications BlackBerry ApplicationsThe Cloud as an Employee Enabler Windows Remote DesktopService-Oriented Architecture (SOA) VncEvolving from SOA to the Cloud Web BrowsersCapacity: Limited Performance Server Extensions lineAvailability: Communications Failure and Thin Clients Cloud Computing InfrastructurePerformance Issues Smart Phones, Pads, Pods, etc. Cloud Computing Terms Security: Newer Security Protocols Provide Virtual Terminal Security Strengths and Benefits and Limitations of CloudMore Protection Weaknesses Computing

Page 45: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

What's Next in Cloud Computing Strengths BenefitsIndependent Components Weaknesses LimitationsMessage Base Android Cloud Computing Case Studies Location Independence BlackBerry How Companies Are Using CloudCommunication Requirements for Cloud Windows Mobile ComputingImplementation Ubuntu Mobile Internet Device Implementing Applications and Services inPublic Internet Mobile Platform Virtualization the CloudPrivate Internet Kernel-Based Virtual Machine Using Your Company's Services vs. theRouting to the Datacenter VMware Mobile Virtualization Platform Cloud ProviderSwitching within the Data Center Collaboration Applications for Mobile A Cloud Service Provider Introduced Bandwidth Platforms Cloud Computing Risks and Issues Tools Used to Measure Network Text Messaging Products and Services Provided by CloudPerformance iPhone Applications Computing Companies Using the Protocol Analyzer to Measure BlackBerry Applications EconomicBandwidth Staffing Using Ping and Traceroute to Measure Should Your Company Invest in CloudNetwork Performance Computing?Security line What Should Not be Moved to the Cloud SSL Cloud Computing Infrastructure LANs and the CloudVPN Cloud Computing Terms Internet and the CloudOverhead Benefits and Limitations of Cloud Web Services, Browsers, and the CloudStorage Options for Cloud Computing Computing Thin ClientStorage Capacity Benefits Advances in Networking and ProcessingData Protection and Partitioning Limitations Speeds that Led to Cloud ComputingNAS Cloud Computing Case Studies Networking DevelopmentsSAN How Companies Are Using Cloud Increased Processing Speeds CAS Computing Managed Service Provider Model to CloudRedundancy Implementing Applications and Services Computing and Software as a ServiceReplication in the Cloud (SaaS)Multisiting Using Your Company's Services vs. the Single Purpose Architectures Migrate toBackup and Recovery Cloud Provider Multipurpose ArchitecturesServer Software Environments that Support A Cloud Service Provider Introduced Data Center Virtualization Cloud Computing Cloud Computing Risks and Issues CollaborationServer Capacity Products and Services Provided by Cloud The Cloud as a Reach ExtenderVirtualization Computing Companies The Cloud as a Communication EnablerClustering Economic The Cloud as an Employee Enabler Expansion Staffing Service-Oriented Architecture (SOA)Server Functions Should Your Company Invest in Cloud Evolving from SOA to the CloudApplication Computing? Capacity: Limited PerformanceWeb What Should Not be Moved to the Cloud Availability: Communications Failure andDatabase LANs and the Cloud Performance IssuesVendor Approaches to Cloud Computing Internet and the Cloud Security: Newer Security Protocols ProvideRole of Open Source Software in Data Web Services, Browsers, and the Cloud More Protection Center Thin Client What's Next in Cloud Computing Cost Reduction vs. Reliability Advances in Networking and Processing Independent ComponentsOpen Source Server Software Speeds that Led to Cloud Computing Message BaseOpen Source Database Software Networking Developments Location Independence Open Source Applications Software Increased Processing Speeds Communication Requirements for CloudOpen Source System Management Software Managed Service Provider Model to ImplementationOpen Source Load-Balancing Software Cloud Computing and Software as a Public InternetVirtualization as the "Operating System" Service (SaaS) Private InternetVirtualization with a Host Operating System Single Purpose Architectures Migrate to Routing to the DatacenterVirtualization Infections on Virtualized Multipurpose Architectures Switching within the Data CenterEnvironments Data Center Virtualization BandwidthType 1 Virtualized Environment Collaboration Tools Used to Measure NetworkType 2 Virtualized Environment The Cloud as a Reach Extender PerformanceVirtualization Environments The Cloud as a Communication Enabler Using the Protocol Analyzer to MeasureMicrosoft Virtualization The Cloud as an Employee Enabler BandwidthSun xVM VirtualBox Service-Oriented Architecture (SOA) Using Ping and Traceroute to MeasureLinux/UNIX Virtualization Evolving from SOA to the Cloud Network Performance VMware Products Capacity: Limited Performance SecurityData Center and Cloud Infrastructure Availability: Communications Failure and SSLProducts Performance Issues VPNEnd-User and Desktop Products Security: Newer Security Protocols Overhead IBM Virtualization Provide More Protection Storage Options for Cloud Computing

Page 46: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Using VMware to see a Virtualized Server What's Next in Cloud Computing Storage CapacityEnvironment Independent Components Data Protection and PartitioningPermissive Federation Message Base NASVerified Federation Location Independence SANEncrypted Federation Communication Requirements for Cloud CASTrusted Federation Implementation RedundancyUsing XMPP in the Federated Environment Public Internet ReplicationPresence in the Cloud Private Internet Multisiting What It Is Routing to the Datacenter Backup and Recovery Presence Protocols Switching within the Data Center Server Software Environments thatLeveraging Presence Bandwidth Support Cloud ComputingPresence Enabled Tools Used to Measure Network Server CapacityThe Future of Presence Performance VirtualizationThe Interrelation of Identity, Presence, and Using the Protocol Analyzer to Measure ClusteringLocation in the Cloud Bandwidth ExpansionIdentity Management Using Ping and Traceroute to Measure Server FunctionsWhat It Is Network Performance ApplicationFuture of Identity in the Cloud Security WebPrivacy and Its Relation to Cloud-Based SSL Database Information Systems VPN Vendor Approaches to Cloud ComputingPersonal Information Overhead Role of Open Source Software in DataPrivacy-Related Issues Storage Options for Cloud Computing CenterFinding Your Private Information Storage Capacity Cost Reduction vs. ReliabilityOpen Cloud Consortium Working Groups Data Protection and Partitioning Open Source Server SoftwareProject Matsu NAS Open Source Database SoftwareProject Comet SAN Open Source Applications SoftwareHPC in the Cloud CAS Open Source System ManagementThe Open Cloud Testbed Redundancy SoftwareThe Open Science Data Cloud Replication Open Source Load-Balancing Software Intercloud Testbed Multisiting Virtualization as the "Operating System"Reporting on an Open Cloud Consortium Backup and Recovery Virtualization with a Host OperatingWorking Group Server Software Environments that System Distributed Management Task Force Support Cloud Computing Virtualization Infections on Virtualized(DMTF) Server Capacity EnvironmentsWhat It Is? Virtualization Type 1 Virtualized EnvironmentDMTK Working Groups Associated with Clustering Type 2 Virtualized Environment Cloud Computing Expansion Virtualization EnvironmentsStandards for Application Developers Server Functions Microsoft VirtualizationProtocols Application Sun xVM VirtualBoxScripting Languages Web Linux/UNIX VirtualizationContent Formatting Standards and Database VMware ProductsLanguages Vendor Approaches to Cloud Computing Data Center and Cloud InfrastructureStandards for Security in the Cloud Role of Open Source Software in Data ProductsConfidentiality, Integrity, Availability Center End-User and Desktop Products Authentication, Authorization, Accountability Cost Reduction vs. Reliability IBM VirtualizationRegulations for Privacy Open Source Server Software Using VMware to see a Virtualized ServerSecurity Protocols Open Source Database Software Environment Establishing a Baseline for Cloud Open Source Applications Software Permissive FederationPerformance Open Source System Management Verified FederationBest Practices for Selecting a Vendor and Software Encrypted FederationImplementing Cloud-Based Applications Open Source Load-Balancing Software Trusted FederationChoosing the Right Vendor Virtualization as the "Operating System" Using XMPP in the Federated EnvironmentImplementing Cloud-Based Applications Virtualization with a Host Operating Presence in the CloudWindows Remote Desktop System What It IsVnc Virtualization Infections on Virtualized Presence ProtocolsWeb Browsers Environments Leveraging PresenceServer Extensions Type 1 Virtualized Environment Presence EnabledThin Clients Type 2 Virtualized Environment The Future of PresenceSmart Phones, Pads, Pods, etc. Virtualization Environments The Interrelation of Identity, Presence, andVirtual Terminal Security Strengths and Microsoft Virtualization Location in the Cloud Weaknesses Sun xVM VirtualBox Identity ManagementStrengths Linux/UNIX Virtualization What It IsWeaknesses VMware Products Future of Identity in the Cloud Android Data Center and Cloud Infrastructure Privacy and Its Relation to Cloud-BasedBlackBerry Products Information Systems

Page 47: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Windows Mobile End-User and Desktop Products Personal InformationUbuntu Mobile Internet Device IBM Virtualization Privacy-Related IssuesMobile Platform Virtualization Using VMware to see a Virtualized Server Finding Your Private Information Kernel-Based Virtual Machine Environment Open Cloud Consortium Working GroupsVMware Mobile Virtualization Platform Permissive Federation Project MatsuCollaboration Applications for Mobile Verified Federation Project CometPlatforms Encrypted Federation HPC in the CloudText Messaging Trusted Federation The Open Cloud TestbediPhone Applications Using XMPP in the Federated The Open Science Data CloudBlackBerry Applications Environment Intercloud Testbed

Presence in the Cloud Reporting on an Open Cloud ConsortiumWhat It Is Working Group Presence Protocols Distributed Management Task Force

line Leveraging Presence (DMTF)Cloud Computing Infrastructure Presence Enabled What It Is?Cloud Computing Terms The Future of Presence DMTK Working Groups Associated withBenefits and Limitations of Cloud Computing The Interrelation of Identity, Presence, Cloud Computing Benefits and Location in the Cloud Standards for Application DevelopersLimitations Identity Management ProtocolsCloud Computing Case Studies What It Is Scripting LanguagesHow Companies Are Using Cloud Future of Identity in the Cloud Content Formatting Standards andComputing Privacy and Its Relation to Cloud-Based Languages Implementing Applications and Services in Information Systems Standards for Security in the Cloudthe Cloud Personal Information Confidentiality, Integrity, AvailabilityUsing Your Company's Services vs. the Privacy-Related Issues Authentication, Authorization,Cloud Provider Finding Your Private Information AccountabilityA Cloud Service Provider Introduced Open Cloud Consortium Working Groups Regulations for PrivacyCloud Computing Risks and Issues Project Matsu Security Protocols Products and Services Provided by Cloud Project Comet Establishing a Baseline for CloudComputing Companies HPC in the Cloud PerformanceEconomic The Open Cloud Testbed Best Practices for Selecting a Vendor andStaffing The Open Science Data Cloud Implementing Cloud-Based ApplicationsShould Your Company Invest in Cloud Intercloud Testbed Choosing the Right VendorComputing? Reporting on an Open Cloud Consortium Implementing Cloud-Based Applications What Should Not be Moved to the Cloud Working Group Windows Remote DesktopLANs and the Cloud Distributed Management Task Force VncInternet and the Cloud (DMTF) Web BrowsersWeb Services, Browsers, and the Cloud What It Is? Server ExtensionsThin Client DMTK Working Groups Associated with Thin ClientsAdvances in Networking and Processing Cloud Computing Smart Phones, Pads, Pods, etc. Speeds that Led to Cloud Computing Standards for Application Developers Virtual Terminal Security Strengths andNetworking Developments Protocols WeaknessesIncreased Processing Speeds Scripting Languages StrengthsManaged Service Provider Model to Cloud Content Formatting Standards and Weaknesses Computing and Software as a Service Languages Android(SaaS) Standards for Security in the Cloud BlackBerrySingle Purpose Architectures Migrate to Confidentiality, Integrity, Availability Windows MobileMultipurpose Architectures Authentication, Authorization, Ubuntu Mobile Internet Device Data Center Virtualization Accountability Mobile Platform VirtualizationCollaboration Regulations for Privacy Kernel-Based Virtual MachineThe Cloud as a Reach Extender Security Protocols VMware Mobile Virtualization Platform The Cloud as a Communication Enabler Establishing a Baseline for Cloud Collaboration Applications for MobileThe Cloud as an Employee Enabler Performance PlatformsService-Oriented Architecture (SOA) Best Practices for Selecting a Vendor Text MessagingEvolving from SOA to the Cloud and Implementing Cloud-Based iPhone ApplicationsCapacity: Limited Performance Applications BlackBerry ApplicationsAvailability: Communications Failure and Choosing the Right VendorPerformance Issues Implementing Cloud-Based Applications Security: Newer Security Protocols Provide Windows Remote DesktopMore Protection Vnc lineWhat's Next in Cloud Computing Web Browsers Cloud Computing InfrastructureIndependent Components Server Extensions Cloud Computing Terms Message Base Thin Clients Benefits and Limitations of CloudLocation Independence Smart Phones, Pads, Pods, etc. ComputingCommunication Requirements for Cloud Virtual Terminal Security Strengths and Benefits

Page 48: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Implementation Weaknesses LimitationsPublic Internet Strengths Cloud Computing Case Studies Private Internet Weaknesses How Companies Are Using CloudRouting to the Datacenter Android ComputingSwitching within the Data Center BlackBerry Implementing Applications and Services inBandwidth Windows Mobile the CloudTools Used to Measure Network Ubuntu Mobile Internet Device Using Your Company's Services vs. thePerformance Mobile Platform Virtualization Cloud ProviderUsing the Protocol Analyzer to Measure Kernel-Based Virtual Machine A Cloud Service Provider Introduced Bandwidth VMware Mobile Virtualization Platform Cloud Computing Risks and Issues Using Ping and Traceroute to Measure Collaboration Applications for Mobile Products and Services Provided by CloudNetwork Performance Platforms Computing Companies Security Text Messaging EconomicSSL iPhone Applications Staffing VPN BlackBerry Applications Should Your Company Invest in CloudOverhead Computing?Storage Options for Cloud Computing What Should Not be Moved to the Cloud Storage Capacity LANs and the CloudData Protection and Partitioning line Internet and the CloudNAS Cloud Computing Infrastructure Web Services, Browsers, and the CloudSAN Cloud Computing Terms Thin ClientCAS Benefits and Limitations of Cloud Advances in Networking and ProcessingRedundancy Computing Speeds that Led to Cloud ComputingReplication Benefits Networking DevelopmentsMultisiting Limitations Increased Processing Speeds Backup and Recovery Cloud Computing Case Studies Managed Service Provider Model to CloudServer Software Environments that Support How Companies Are Using Cloud Computing and Software as a ServiceCloud Computing Computing (SaaS)Server Capacity Implementing Applications and Services Single Purpose Architectures Migrate toVirtualization in the Cloud Multipurpose ArchitecturesClustering Using Your Company's Services vs. the Data Center Virtualization Expansion Cloud Provider CollaborationServer Functions A Cloud Service Provider Introduced The Cloud as a Reach ExtenderApplication Cloud Computing Risks and Issues The Cloud as a Communication EnablerWeb Products and Services Provided by Cloud The Cloud as an Employee Enabler Database Computing Companies Service-Oriented Architecture (SOA)Vendor Approaches to Cloud Computing Economic Evolving from SOA to the CloudRole of Open Source Software in Data Staffing Capacity: Limited PerformanceCenter Should Your Company Invest in Cloud Availability: Communications Failure andCost Reduction vs. Reliability Computing? Performance IssuesOpen Source Server Software What Should Not be Moved to the Cloud Security: Newer Security Protocols ProvideOpen Source Database Software LANs and the Cloud More Protection Open Source Applications Software Internet and the Cloud What's Next in Cloud Computing Open Source System Management Software Web Services, Browsers, and the Cloud Independent ComponentsOpen Source Load-Balancing Software Thin Client Message BaseVirtualization as the "Operating System" Advances in Networking and Processing Location Independence Virtualization with a Host Operating System Speeds that Led to Cloud Computing Communication Requirements for CloudVirtualization Infections on Virtualized Networking Developments ImplementationEnvironments Increased Processing Speeds Public InternetType 1 Virtualized Environment Managed Service Provider Model to Private InternetType 2 Virtualized Environment Cloud Computing and Software as a Routing to the DatacenterVirtualization Environments Service (SaaS) Switching within the Data CenterMicrosoft Virtualization Single Purpose Architectures Migrate to BandwidthSun xVM VirtualBox Multipurpose Architectures Tools Used to Measure NetworkLinux/UNIX Virtualization Data Center Virtualization PerformanceVMware Products Collaboration Using the Protocol Analyzer to MeasureData Center and Cloud Infrastructure The Cloud as a Reach Extender BandwidthProducts The Cloud as a Communication Enabler Using Ping and Traceroute to MeasureEnd-User and Desktop Products The Cloud as an Employee Enabler Network Performance IBM Virtualization Service-Oriented Architecture (SOA) SecurityUsing VMware to see a Virtualized Server Evolving from SOA to the Cloud SSLEnvironment Capacity: Limited Performance VPNPermissive Federation Availability: Communications Failure and Overhead Verified Federation Performance Issues Storage Options for Cloud ComputingEncrypted Federation Security: Newer Security Protocols Storage Capacity

Page 49: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Trusted Federation Provide More Protection Data Protection and PartitioningUsing XMPP in the Federated Environment What's Next in Cloud Computing NASPresence in the Cloud Independent Components SANWhat It Is Message Base CASPresence Protocols Location Independence RedundancyLeveraging Presence Communication Requirements for Cloud ReplicationPresence Enabled Implementation Multisiting The Future of Presence Public Internet Backup and Recovery The Interrelation of Identity, Presence, and Private Internet Server Software Environments thatLocation in the Cloud Routing to the Datacenter Support Cloud ComputingIdentity Management Switching within the Data Center Server CapacityWhat It Is Bandwidth VirtualizationFuture of Identity in the Cloud Tools Used to Measure Network ClusteringPrivacy and Its Relation to Cloud-Based Performance ExpansionInformation Systems Using the Protocol Analyzer to Measure Server FunctionsPersonal Information Bandwidth ApplicationPrivacy-Related Issues Using Ping and Traceroute to Measure WebFinding Your Private Information Network Performance Database Open Cloud Consortium Working Groups Security Vendor Approaches to Cloud ComputingProject Matsu SSL Role of Open Source Software in DataProject Comet VPN CenterHPC in the Cloud Overhead Cost Reduction vs. ReliabilityThe Open Cloud Testbed Storage Options for Cloud Computing Open Source Server SoftwareThe Open Science Data Cloud Storage Capacity Open Source Database SoftwareIntercloud Testbed Data Protection and Partitioning Open Source Applications SoftwareReporting on an Open Cloud Consortium NAS Open Source System ManagementWorking Group SAN SoftwareDistributed Management Task Force CAS Open Source Load-Balancing Software (DMTF) Redundancy Virtualization as the "Operating System"What It Is? Replication Virtualization with a Host OperatingDMTK Working Groups Associated with Multisiting System Cloud Computing Backup and Recovery Virtualization Infections on VirtualizedStandards for Application Developers Server Software Environments that EnvironmentsProtocols Support Cloud Computing Type 1 Virtualized EnvironmentScripting Languages Server Capacity Type 2 Virtualized Environment Content Formatting Standards and Virtualization Virtualization EnvironmentsLanguages Clustering Microsoft VirtualizationStandards for Security in the Cloud Expansion Sun xVM VirtualBoxConfidentiality, Integrity, Availability Server Functions Linux/UNIX VirtualizationAuthentication, Authorization, Accountability Application VMware ProductsRegulations for Privacy Web Data Center and Cloud InfrastructureSecurity Protocols Database ProductsEstablishing a Baseline for Cloud Vendor Approaches to Cloud Computing End-User and Desktop Products Performance Role of Open Source Software in Data IBM VirtualizationBest Practices for Selecting a Vendor and Center Using VMware to see a Virtualized ServerImplementing Cloud-Based Applications Cost Reduction vs. Reliability Environment Choosing the Right Vendor Open Source Server Software Permissive FederationImplementing Cloud-Based Applications Open Source Database Software Verified FederationWindows Remote Desktop Open Source Applications Software Encrypted FederationVnc Open Source System Management Trusted FederationWeb Browsers Software Using XMPP in the Federated EnvironmentServer Extensions Open Source Load-Balancing Software Presence in the CloudThin Clients Virtualization as the "Operating System" What It IsSmart Phones, Pads, Pods, etc. Virtualization with a Host Operating Presence ProtocolsVirtual Terminal Security Strengths and System Leveraging PresenceWeaknesses Virtualization Infections on Virtualized Presence EnabledStrengths Environments The Future of PresenceWeaknesses Type 1 Virtualized Environment The Interrelation of Identity, Presence, andAndroid Type 2 Virtualized Environment Location in the Cloud BlackBerry Virtualization Environments Identity ManagementWindows Mobile Microsoft Virtualization What It IsUbuntu Mobile Internet Device Sun xVM VirtualBox Future of Identity in the Cloud Mobile Platform Virtualization Linux/UNIX Virtualization Privacy and Its Relation to Cloud-BasedKernel-Based Virtual Machine VMware Products Information SystemsVMware Mobile Virtualization Platform Data Center and Cloud Infrastructure Personal Information

Page 50: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Collaboration Applications for Mobile Products Privacy-Related IssuesPlatforms End-User and Desktop Products Finding Your Private Information Text Messaging IBM Virtualization Open Cloud Consortium Working GroupsiPhone Applications Using VMware to see a Virtualized Server Project MatsuBlackBerry Applications Environment Project Comet

Permissive Federation HPC in the CloudVerified Federation The Open Cloud TestbedEncrypted Federation The Open Science Data Cloud

line Trusted Federation Intercloud TestbedCloud Computing Infrastructure Using XMPP in the Federated Reporting on an Open Cloud ConsortiumCloud Computing Terms Environment Working Group Benefits and Limitations of Cloud Computing Presence in the Cloud Distributed Management Task ForceBenefits What It Is (DMTF)Limitations Presence Protocols What It Is?Cloud Computing Case Studies Leveraging Presence DMTK Working Groups Associated withHow Companies Are Using Cloud Presence Enabled Cloud Computing Computing The Future of Presence Standards for Application DevelopersImplementing Applications and Services in The Interrelation of Identity, Presence, Protocolsthe Cloud and Location in the Cloud Scripting LanguagesUsing Your Company's Services vs. the Identity Management Content Formatting Standards andCloud Provider What It Is Languages A Cloud Service Provider Introduced Future of Identity in the Cloud Standards for Security in the CloudCloud Computing Risks and Issues Privacy and Its Relation to Cloud-Based Confidentiality, Integrity, AvailabilityProducts and Services Provided by Cloud Information Systems Authentication, Authorization,Computing Companies Personal Information AccountabilityEconomic Privacy-Related Issues Regulations for PrivacyStaffing Finding Your Private Information Security Protocols Should Your Company Invest in Cloud Open Cloud Consortium Working Groups Establishing a Baseline for CloudComputing? Project Matsu PerformanceWhat Should Not be Moved to the Cloud Project Comet Best Practices for Selecting a Vendor andLANs and the Cloud HPC in the Cloud Implementing Cloud-Based ApplicationsInternet and the Cloud The Open Cloud Testbed Choosing the Right VendorWeb Services, Browsers, and the Cloud The Open Science Data Cloud Implementing Cloud-Based Applications Thin Client Intercloud Testbed Windows Remote DesktopAdvances in Networking and Processing Reporting on an Open Cloud Consortium VncSpeeds that Led to Cloud Computing Working Group Web BrowsersNetworking Developments Distributed Management Task Force Server ExtensionsIncreased Processing Speeds (DMTF) Thin ClientsManaged Service Provider Model to Cloud What It Is? Smart Phones, Pads, Pods, etc. Computing and Software as a Service DMTK Working Groups Associated with Virtual Terminal Security Strengths and(SaaS) Cloud Computing WeaknessesSingle Purpose Architectures Migrate to Standards for Application Developers StrengthsMultipurpose Architectures Protocols Weaknesses Data Center Virtualization Scripting Languages AndroidCollaboration Content Formatting Standards and BlackBerryThe Cloud as a Reach Extender Languages Windows MobileThe Cloud as a Communication Enabler Standards for Security in the Cloud Ubuntu Mobile Internet Device The Cloud as an Employee Enabler Confidentiality, Integrity, Availability Mobile Platform VirtualizationService-Oriented Architecture (SOA) Authentication, Authorization, Kernel-Based Virtual MachineEvolving from SOA to the Cloud Accountability VMware Mobile Virtualization Platform Capacity: Limited Performance Regulations for Privacy Collaboration Applications for MobileAvailability: Communications Failure and Security Protocols PlatformsPerformance Issues Establishing a Baseline for Cloud Text MessagingSecurity: Newer Security Protocols Provide Performance iPhone ApplicationsMore Protection Best Practices for Selecting a Vendor BlackBerry ApplicationsWhat's Next in Cloud Computing and Implementing Cloud-BasedIndependent Components ApplicationsMessage Base Choosing the Right VendorLocation Independence Implementing Cloud-Based Applications lineCommunication Requirements for Cloud Windows Remote Desktop Cloud Computing InfrastructureImplementation Vnc Cloud Computing Terms Public Internet Web Browsers Benefits and Limitations of CloudPrivate Internet Server Extensions ComputingRouting to the Datacenter Thin Clients BenefitsSwitching within the Data Center Smart Phones, Pads, Pods, etc. Limitations

Page 51: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Bandwidth Virtual Terminal Security Strengths and Cloud Computing Case Studies Tools Used to Measure Network Weaknesses How Companies Are Using CloudPerformance Strengths ComputingUsing the Protocol Analyzer to Measure Weaknesses Implementing Applications and Services inBandwidth Android the CloudUsing Ping and Traceroute to Measure BlackBerry Using Your Company's Services vs. theNetwork Performance Windows Mobile Cloud ProviderSecurity Ubuntu Mobile Internet Device A Cloud Service Provider Introduced SSL Mobile Platform Virtualization Cloud Computing Risks and Issues VPN Kernel-Based Virtual Machine Products and Services Provided by CloudOverhead VMware Mobile Virtualization Platform Computing Companies Storage Options for Cloud Computing Collaboration Applications for Mobile EconomicStorage Capacity Platforms Staffing Data Protection and Partitioning Text Messaging Should Your Company Invest in CloudNAS iPhone Applications Computing?SAN BlackBerry Applications What Should Not be Moved to the Cloud CAS LANs and the CloudRedundancy Internet and the CloudReplication 6. Virtualization Web Services, Browsers, and the CloudMultisiting line Thin ClientBackup and Recovery Student Virtualization Architectures Advances in Networking and ProcessingServer Software Environments that Support The Hypervisor Speeds that Led to Cloud ComputingCloud Computing Networking DevelopmentsServer Capacity Increased Processing Speeds Virtualization line Managed Service Provider Model to CloudClustering Cloud Computing Infrastructure Computing and Software as a ServiceExpansion Cloud Computing Terms (SaaS)Server Functions Benefits and Limitations of Cloud Single Purpose Architectures Migrate toApplication Computing Multipurpose ArchitecturesWeb Benefits Data Center Virtualization Database Limitations CollaborationVendor Approaches to Cloud Computing Cloud Computing Case Studies The Cloud as a Reach ExtenderRole of Open Source Software in Data How Companies Are Using Cloud The Cloud as a Communication EnablerCenter Computing The Cloud as an Employee Enabler Cost Reduction vs. Reliability Implementing Applications and Services Service-Oriented Architecture (SOA)Open Source Server Software in the Cloud Evolving from SOA to the CloudOpen Source Database Software Using Your Company's Services vs. the Capacity: Limited PerformanceOpen Source Applications Software Cloud Provider Availability: Communications Failure andOpen Source System Management Software A Cloud Service Provider Introduced Performance IssuesOpen Source Load-Balancing Software Cloud Computing Risks and Issues Security: Newer Security Protocols ProvideVirtualization as the "Operating System" Products and Services Provided by Cloud More Protection Virtualization with a Host Operating System Computing Companies What's Next in Cloud Computing Virtualization Infections on Virtualized Economic Independent ComponentsEnvironments Staffing Message BaseType 1 Virtualized Environment Should Your Company Invest in Cloud Location Independence Type 2 Virtualized Environment Computing? Communication Requirements for CloudVirtualization Environments What Should Not be Moved to the Cloud ImplementationMicrosoft Virtualization LANs and the Cloud Public InternetSun xVM VirtualBox Internet and the Cloud Private InternetLinux/UNIX Virtualization Web Services, Browsers, and the Cloud Routing to the DatacenterVMware Products Thin Client Switching within the Data CenterData Center and Cloud Infrastructure Advances in Networking and Processing BandwidthProducts Speeds that Led to Cloud Computing Tools Used to Measure NetworkEnd-User and Desktop Products Networking Developments PerformanceIBM Virtualization Increased Processing Speeds Using the Protocol Analyzer to MeasureUsing VMware to see a Virtualized Server Managed Service Provider Model to BandwidthEnvironment Cloud Computing and Software as a Using Ping and Traceroute to MeasurePermissive Federation Service (SaaS) Network Performance Verified Federation Single Purpose Architectures Migrate to SecurityEncrypted Federation Multipurpose Architectures SSLTrusted Federation Data Center Virtualization VPNUsing XMPP in the Federated Environment Collaboration Overhead Presence in the Cloud The Cloud as a Reach Extender Storage Options for Cloud ComputingWhat It Is The Cloud as a Communication Enabler Storage CapacityPresence Protocols The Cloud as an Employee Enabler Data Protection and Partitioning

Page 52: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Leveraging Presence Service-Oriented Architecture (SOA) NASPresence Enabled Evolving from SOA to the Cloud SANThe Future of Presence Capacity: Limited Performance CASThe Interrelation of Identity, Presence, and Availability: Communications Failure and RedundancyLocation in the Cloud Performance Issues ReplicationIdentity Management Security: Newer Security Protocols Multisiting What It Is Provide More Protection Backup and Recovery Future of Identity in the Cloud What's Next in Cloud Computing Server Software Environments thatPrivacy and Its Relation to Cloud-Based Independent Components Support Cloud ComputingInformation Systems Message Base Server CapacityPersonal Information Location Independence VirtualizationPrivacy-Related Issues Communication Requirements for Cloud ClusteringFinding Your Private Information Implementation ExpansionOpen Cloud Consortium Working Groups Public Internet Server FunctionsProject Matsu Private Internet ApplicationProject Comet Routing to the Datacenter WebHPC in the Cloud Switching within the Data Center Database The Open Cloud Testbed Bandwidth Vendor Approaches to Cloud ComputingThe Open Science Data Cloud Tools Used to Measure Network Role of Open Source Software in DataIntercloud Testbed Performance CenterReporting on an Open Cloud Consortium Using the Protocol Analyzer to Measure Cost Reduction vs. ReliabilityWorking Group Bandwidth Open Source Server SoftwareDistributed Management Task Force Using Ping and Traceroute to Measure Open Source Database Software(DMTF) Network Performance Open Source Applications SoftwareWhat It Is? Security Open Source System ManagementDMTK Working Groups Associated with SSL SoftwareCloud Computing VPN Open Source Load-Balancing Software Standards for Application Developers Overhead Virtualization as the "Operating System"Protocols Storage Options for Cloud Computing Virtualization with a Host OperatingScripting Languages Storage Capacity System Content Formatting Standards and Data Protection and Partitioning Virtualization Infections on VirtualizedLanguages NAS EnvironmentsStandards for Security in the Cloud SAN Type 1 Virtualized EnvironmentConfidentiality, Integrity, Availability CAS Type 2 Virtualized Environment Authentication, Authorization, Accountability Redundancy Virtualization EnvironmentsRegulations for Privacy Replication Microsoft VirtualizationSecurity Protocols Multisiting Sun xVM VirtualBoxEstablishing a Baseline for Cloud Backup and Recovery Linux/UNIX VirtualizationPerformance Server Software Environments that VMware ProductsBest Practices for Selecting a Vendor and Support Cloud Computing Data Center and Cloud InfrastructureImplementing Cloud-Based Applications Server Capacity ProductsChoosing the Right Vendor Virtualization End-User and Desktop Products Implementing Cloud-Based Applications Clustering IBM VirtualizationWindows Remote Desktop Expansion Using VMware to see a Virtualized ServerVnc Server Functions Environment Web Browsers Application Permissive FederationServer Extensions Web Verified FederationThin Clients Database Encrypted FederationSmart Phones, Pads, Pods, etc. Vendor Approaches to Cloud Computing Trusted FederationVirtual Terminal Security Strengths and Role of Open Source Software in Data Using XMPP in the Federated EnvironmentWeaknesses Center Presence in the CloudStrengths Cost Reduction vs. Reliability What It IsWeaknesses Open Source Server Software Presence ProtocolsAndroid Open Source Database Software Leveraging PresenceBlackBerry Open Source Applications Software Presence EnabledWindows Mobile Open Source System Management The Future of PresenceUbuntu Mobile Internet Device Software The Interrelation of Identity, Presence, andMobile Platform Virtualization Open Source Load-Balancing Software Location in the Cloud Kernel-Based Virtual Machine Virtualization as the "Operating System" Identity ManagementVMware Mobile Virtualization Platform Virtualization with a Host Operating What It IsCollaboration Applications for Mobile System Future of Identity in the Cloud Platforms Virtualization Infections on Virtualized Privacy and Its Relation to Cloud-BasedText Messaging Environments Information SystemsiPhone Applications Type 1 Virtualized Environment Personal InformationBlackBerry Applications Type 2 Virtualized Environment Privacy-Related Issues

Page 53: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Virtualization Environments Finding Your Private Information Microsoft Virtualization Open Cloud Consortium Working GroupsSun xVM VirtualBox Project Matsu

line Linux/UNIX Virtualization Project CometCloud Computing Infrastructure VMware Products HPC in the CloudCloud Computing Terms Data Center and Cloud Infrastructure The Open Cloud TestbedBenefits and Limitations of Cloud Computing Products The Open Science Data CloudBenefits End-User and Desktop Products Intercloud TestbedLimitations IBM Virtualization Reporting on an Open Cloud ConsortiumCloud Computing Case Studies Using VMware to see a Virtualized Server Working Group How Companies Are Using Cloud Environment Distributed Management Task ForceComputing Permissive Federation (DMTF)Implementing Applications and Services in Verified Federation What It Is?the Cloud Encrypted Federation DMTK Working Groups Associated withUsing Your Company's Services vs. the Trusted Federation Cloud Computing Cloud Provider Using XMPP in the Federated Standards for Application DevelopersA Cloud Service Provider Introduced Environment ProtocolsCloud Computing Risks and Issues Presence in the Cloud Scripting LanguagesProducts and Services Provided by Cloud What It Is Content Formatting Standards andComputing Companies Presence Protocols Languages Economic Leveraging Presence Standards for Security in the CloudStaffing Presence Enabled Confidentiality, Integrity, AvailabilityShould Your Company Invest in Cloud The Future of Presence Authentication, Authorization,Computing? The Interrelation of Identity, Presence, AccountabilityWhat Should Not be Moved to the Cloud and Location in the Cloud Regulations for PrivacyLANs and the Cloud Identity Management Security Protocols Internet and the Cloud What It Is Establishing a Baseline for CloudWeb Services, Browsers, and the Cloud Future of Identity in the Cloud PerformanceThin Client Privacy and Its Relation to Cloud-Based Best Practices for Selecting a Vendor andAdvances in Networking and Processing Information Systems Implementing Cloud-Based ApplicationsSpeeds that Led to Cloud Computing Personal Information Choosing the Right VendorNetworking Developments Privacy-Related Issues Implementing Cloud-Based Applications Increased Processing Speeds Finding Your Private Information Windows Remote DesktopManaged Service Provider Model to Cloud Open Cloud Consortium Working Groups VncComputing and Software as a Service Project Matsu Web Browsers(SaaS) Project Comet Server ExtensionsSingle Purpose Architectures Migrate to HPC in the Cloud Thin ClientsMultipurpose Architectures The Open Cloud Testbed Smart Phones, Pads, Pods, etc. Data Center Virtualization The Open Science Data Cloud Virtual Terminal Security Strengths andCollaboration Intercloud Testbed WeaknessesThe Cloud as a Reach Extender Reporting on an Open Cloud Consortium StrengthsThe Cloud as a Communication Enabler Working Group Weaknesses The Cloud as an Employee Enabler Distributed Management Task Force AndroidService-Oriented Architecture (SOA) (DMTF) BlackBerryEvolving from SOA to the Cloud What It Is? Windows MobileCapacity: Limited Performance DMTK Working Groups Associated with Ubuntu Mobile Internet Device Availability: Communications Failure and Cloud Computing Mobile Platform VirtualizationPerformance Issues Standards for Application Developers Kernel-Based Virtual MachineSecurity: Newer Security Protocols Provide Protocols VMware Mobile Virtualization Platform More Protection Scripting Languages Collaboration Applications for MobileWhat's Next in Cloud Computing Content Formatting Standards and PlatformsIndependent Components Languages Text MessagingMessage Base Standards for Security in the Cloud iPhone ApplicationsLocation Independence Confidentiality, Integrity, Availability BlackBerry ApplicationsCommunication Requirements for Cloud Authentication, Authorization,Implementation AccountabilityPublic Internet Regulations for Privacy 9. End-User Access to Cloud ComputingPrivate Internet Security Protocols lineRouting to the Datacenter Establishing a Baseline for Cloud Cloud Access Methods Available to EndSwitching within the Data Center Performance UsersBandwidth Best Practices for Selecting a Vendor CitrixTools Used to Measure Network and Implementing Cloud-BasedPerformance ApplicationsUsing the Protocol Analyzer to Measure Choosing the Right Vendor lineBandwidth Implementing Cloud-Based Applications Cloud Computing Infrastructure

Page 54: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Using Ping and Traceroute to Measure Windows Remote Desktop Cloud Computing Terms Network Performance Vnc Benefits and Limitations of CloudSecurity Web Browsers ComputingSSL Server Extensions BenefitsVPN Thin Clients LimitationsOverhead Smart Phones, Pads, Pods, etc. Cloud Computing Case Studies Storage Options for Cloud Computing Virtual Terminal Security Strengths and How Companies Are Using CloudStorage Capacity Weaknesses ComputingData Protection and Partitioning Strengths Implementing Applications and Services inNAS Weaknesses the CloudSAN Android Using Your Company's Services vs. theCAS BlackBerry Cloud ProviderRedundancy Windows Mobile A Cloud Service Provider Introduced Replication Ubuntu Mobile Internet Device Cloud Computing Risks and Issues Multisiting Mobile Platform Virtualization Products and Services Provided by CloudBackup and Recovery Kernel-Based Virtual Machine Computing Companies Server Software Environments that Support VMware Mobile Virtualization Platform EconomicCloud Computing Collaboration Applications for Mobile Staffing Server Capacity Platforms Should Your Company Invest in CloudVirtualization Text Messaging Computing?Clustering iPhone Applications What Should Not be Moved to the Cloud Expansion BlackBerry Applications LANs and the CloudServer Functions Internet and the CloudApplication Web Services, Browsers, and the CloudWeb Thin ClientDatabase line Advances in Networking and ProcessingVendor Approaches to Cloud Computing Cloud Computing Infrastructure Speeds that Led to Cloud ComputingRole of Open Source Software in Data Cloud Computing Terms Networking DevelopmentsCenter Benefits and Limitations of Cloud Increased Processing Speeds Cost Reduction vs. Reliability Computing Managed Service Provider Model to CloudOpen Source Server Software Benefits Computing and Software as a ServiceOpen Source Database Software Limitations (SaaS)Open Source Applications Software Cloud Computing Case Studies Single Purpose Architectures Migrate toOpen Source System Management Software How Companies Are Using Cloud Multipurpose ArchitecturesOpen Source Load-Balancing Software Computing Data Center Virtualization Virtualization as the "Operating System" Implementing Applications and Services CollaborationVirtualization with a Host Operating System in the Cloud The Cloud as a Reach ExtenderVirtualization Infections on Virtualized Using Your Company's Services vs. the The Cloud as a Communication EnablerEnvironments Cloud Provider The Cloud as an Employee Enabler Type 1 Virtualized Environment A Cloud Service Provider Introduced Service-Oriented Architecture (SOA)Type 2 Virtualized Environment Cloud Computing Risks and Issues Evolving from SOA to the CloudVirtualization Environments Products and Services Provided by Cloud Capacity: Limited PerformanceMicrosoft Virtualization Computing Companies Availability: Communications Failure andSun xVM VirtualBox Economic Performance IssuesLinux/UNIX Virtualization Staffing Security: Newer Security Protocols ProvideVMware Products Should Your Company Invest in Cloud More Protection Data Center and Cloud Infrastructure Computing? What's Next in Cloud Computing Products What Should Not be Moved to the Cloud Independent ComponentsEnd-User and Desktop Products LANs and the Cloud Message BaseIBM Virtualization Internet and the Cloud Location Independence Using VMware to see a Virtualized Server Web Services, Browsers, and the Cloud Communication Requirements for CloudEnvironment Thin Client ImplementationPermissive Federation Advances in Networking and Processing Public InternetVerified Federation Speeds that Led to Cloud Computing Private InternetEncrypted Federation Networking Developments Routing to the DatacenterTrusted Federation Increased Processing Speeds Switching within the Data CenterUsing XMPP in the Federated Environment Managed Service Provider Model to BandwidthPresence in the Cloud Cloud Computing and Software as a Tools Used to Measure NetworkWhat It Is Service (SaaS) PerformancePresence Protocols Single Purpose Architectures Migrate to Using the Protocol Analyzer to MeasureLeveraging Presence Multipurpose Architectures BandwidthPresence Enabled Data Center Virtualization Using Ping and Traceroute to MeasureThe Future of Presence Collaboration Network Performance The Interrelation of Identity, Presence, and The Cloud as a Reach Extender SecurityLocation in the Cloud The Cloud as a Communication Enabler SSL

Page 55: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Identity Management The Cloud as an Employee Enabler VPNWhat It Is Service-Oriented Architecture (SOA) Overhead Future of Identity in the Cloud Evolving from SOA to the Cloud Storage Options for Cloud ComputingPrivacy and Its Relation to Cloud-Based Capacity: Limited Performance Storage CapacityInformation Systems Availability: Communications Failure and Data Protection and PartitioningPersonal Information Performance Issues NASPrivacy-Related Issues Security: Newer Security Protocols SANFinding Your Private Information Provide More Protection CASOpen Cloud Consortium Working Groups What's Next in Cloud Computing RedundancyProject Matsu Independent Components ReplicationProject Comet Message Base Multisiting HPC in the Cloud Location Independence Backup and Recovery The Open Cloud Testbed Communication Requirements for Cloud Server Software Environments thatThe Open Science Data Cloud Implementation Support Cloud ComputingIntercloud Testbed Public Internet Server CapacityReporting on an Open Cloud Consortium Private Internet VirtualizationWorking Group Routing to the Datacenter ClusteringDistributed Management Task Force Switching within the Data Center Expansion(DMTF) Bandwidth Server FunctionsWhat It Is? Tools Used to Measure Network ApplicationDMTK Working Groups Associated with Performance WebCloud Computing Using the Protocol Analyzer to Measure Database Standards for Application Developers Bandwidth Vendor Approaches to Cloud ComputingProtocols Using Ping and Traceroute to Measure Role of Open Source Software in DataScripting Languages Network Performance CenterContent Formatting Standards and Security Cost Reduction vs. ReliabilityLanguages SSL Open Source Server SoftwareStandards for Security in the Cloud VPN Open Source Database SoftwareConfidentiality, Integrity, Availability Overhead Open Source Applications SoftwareAuthentication, Authorization, Accountability Storage Options for Cloud Computing Open Source System ManagementRegulations for Privacy Storage Capacity SoftwareSecurity Protocols Data Protection and Partitioning Open Source Load-Balancing Software Establishing a Baseline for Cloud NAS Virtualization as the "Operating System"Performance SAN Virtualization with a Host OperatingBest Practices for Selecting a Vendor and CAS System Implementing Cloud-Based Applications Redundancy Virtualization Infections on VirtualizedChoosing the Right Vendor Replication EnvironmentsImplementing Cloud-Based Applications Multisiting Type 1 Virtualized EnvironmentWindows Remote Desktop Backup and Recovery Type 2 Virtualized Environment Vnc Server Software Environments that Virtualization EnvironmentsWeb Browsers Support Cloud Computing Microsoft VirtualizationServer Extensions Server Capacity Sun xVM VirtualBoxThin Clients Virtualization Linux/UNIX VirtualizationSmart Phones, Pads, Pods, etc. Clustering VMware ProductsVirtual Terminal Security Strengths and Expansion Data Center and Cloud InfrastructureWeaknesses Server Functions ProductsStrengths Application End-User and Desktop Products Weaknesses Web IBM VirtualizationAndroid Database Using VMware to see a Virtualized ServerBlackBerry Vendor Approaches to Cloud Computing Environment Windows Mobile Role of Open Source Software in Data Permissive FederationUbuntu Mobile Internet Device Center Verified FederationMobile Platform Virtualization Cost Reduction vs. Reliability Encrypted FederationKernel-Based Virtual Machine Open Source Server Software Trusted FederationVMware Mobile Virtualization Platform Open Source Database Software Using XMPP in the Federated EnvironmentCollaboration Applications for Mobile Open Source Applications Software Presence in the CloudPlatforms Open Source System Management What It IsText Messaging Software Presence ProtocolsiPhone Applications Open Source Load-Balancing Software Leveraging PresenceBlackBerry Applications Virtualization as the "Operating System" Presence Enabled

Virtualization with a Host Operating The Future of PresenceSystem The Interrelation of Identity, Presence, andVirtualization Infections on Virtualized Location in the Cloud

line Environments Identity ManagementCloud Computing Infrastructure Type 1 Virtualized Environment What It Is

Page 56: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Computing Terms Type 2 Virtualized Environment Future of Identity in the Cloud Benefits and Limitations of Cloud Computing Virtualization Environments Privacy and Its Relation to Cloud-BasedBenefits Microsoft Virtualization Information SystemsLimitations Sun xVM VirtualBox Personal InformationCloud Computing Case Studies Linux/UNIX Virtualization Privacy-Related IssuesHow Companies Are Using Cloud VMware Products Finding Your Private Information Computing Data Center and Cloud Infrastructure Open Cloud Consortium Working GroupsImplementing Applications and Services in Products Project Matsuthe Cloud End-User and Desktop Products Project CometUsing Your Company's Services vs. the IBM Virtualization HPC in the CloudCloud Provider Using VMware to see a Virtualized Server The Open Cloud TestbedA Cloud Service Provider Introduced Environment The Open Science Data CloudCloud Computing Risks and Issues Permissive Federation Intercloud TestbedProducts and Services Provided by Cloud Verified Federation Reporting on an Open Cloud ConsortiumComputing Companies Encrypted Federation Working Group Economic Trusted Federation Distributed Management Task ForceStaffing Using XMPP in the Federated (DMTF)Should Your Company Invest in Cloud Environment What It Is?Computing? Presence in the Cloud DMTK Working Groups Associated withWhat Should Not be Moved to the Cloud What It Is Cloud Computing LANs and the Cloud Presence Protocols Standards for Application DevelopersInternet and the Cloud Leveraging Presence ProtocolsWeb Services, Browsers, and the Cloud Presence Enabled Scripting LanguagesThin Client The Future of Presence Content Formatting Standards andAdvances in Networking and Processing The Interrelation of Identity, Presence, Languages Speeds that Led to Cloud Computing and Location in the Cloud Standards for Security in the CloudNetworking Developments Identity Management Confidentiality, Integrity, AvailabilityIncreased Processing Speeds What It Is Authentication, Authorization,Managed Service Provider Model to Cloud Future of Identity in the Cloud AccountabilityComputing and Software as a Service Privacy and Its Relation to Cloud-Based Regulations for Privacy(SaaS) Information Systems Security Protocols Single Purpose Architectures Migrate to Personal Information Establishing a Baseline for CloudMultipurpose Architectures Privacy-Related Issues PerformanceData Center Virtualization Finding Your Private Information Best Practices for Selecting a Vendor andCollaboration Open Cloud Consortium Working Groups Implementing Cloud-Based ApplicationsThe Cloud as a Reach Extender Project Matsu Choosing the Right VendorThe Cloud as a Communication Enabler Project Comet Implementing Cloud-Based Applications The Cloud as an Employee Enabler HPC in the Cloud Windows Remote DesktopService-Oriented Architecture (SOA) The Open Cloud Testbed VncEvolving from SOA to the Cloud The Open Science Data Cloud Web BrowsersCapacity: Limited Performance Intercloud Testbed Server ExtensionsAvailability: Communications Failure and Reporting on an Open Cloud Consortium Thin ClientsPerformance Issues Working Group Smart Phones, Pads, Pods, etc. Security: Newer Security Protocols Provide Distributed Management Task Force Virtual Terminal Security Strengths andMore Protection (DMTF) WeaknessesWhat's Next in Cloud Computing What It Is? StrengthsIndependent Components DMTK Working Groups Associated with Weaknesses Message Base Cloud Computing AndroidLocation Independence Standards for Application Developers BlackBerryCommunication Requirements for Cloud Protocols Windows MobileImplementation Scripting Languages Ubuntu Mobile Internet Device Public Internet Content Formatting Standards and Mobile Platform VirtualizationPrivate Internet Languages Kernel-Based Virtual MachineRouting to the Datacenter Standards for Security in the Cloud VMware Mobile Virtualization Platform Switching within the Data Center Confidentiality, Integrity, Availability Collaboration Applications for MobileBandwidth Authentication, Authorization, PlatformsTools Used to Measure Network Accountability Text MessagingPerformance Regulations for Privacy iPhone ApplicationsUsing the Protocol Analyzer to Measure Security Protocols BlackBerry ApplicationsBandwidth Establishing a Baseline for CloudUsing Ping and Traceroute to Measure PerformanceNetwork Performance Best Practices for Selecting a VendorSecurity and Implementing Cloud-Based lineSSL Applications Cloud Computing InfrastructureVPN Choosing the Right Vendor Cloud Computing Terms

Page 57: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Overhead Implementing Cloud-Based Applications Benefits and Limitations of CloudStorage Options for Cloud Computing Windows Remote Desktop ComputingStorage Capacity Vnc BenefitsData Protection and Partitioning Web Browsers LimitationsNAS Server Extensions Cloud Computing Case Studies SAN Thin Clients How Companies Are Using CloudCAS Smart Phones, Pads, Pods, etc. ComputingRedundancy Virtual Terminal Security Strengths and Implementing Applications and Services inReplication Weaknesses the CloudMultisiting Strengths Using Your Company's Services vs. theBackup and Recovery Weaknesses Cloud ProviderServer Software Environments that Support Android A Cloud Service Provider Introduced Cloud Computing BlackBerry Cloud Computing Risks and Issues Server Capacity Windows Mobile Products and Services Provided by CloudVirtualization Ubuntu Mobile Internet Device Computing Companies Clustering Mobile Platform Virtualization EconomicExpansion Kernel-Based Virtual Machine Staffing Server Functions VMware Mobile Virtualization Platform Should Your Company Invest in CloudApplication Collaboration Applications for Mobile Computing?Web Platforms What Should Not be Moved to the Cloud Database Text Messaging LANs and the CloudVendor Approaches to Cloud Computing iPhone Applications Internet and the CloudRole of Open Source Software in Data BlackBerry Applications Web Services, Browsers, and the CloudCenter Thin ClientCost Reduction vs. Reliability Advances in Networking and ProcessingOpen Source Server Software Speeds that Led to Cloud ComputingOpen Source Database Software line Networking DevelopmentsOpen Source Applications Software Cloud Computing Infrastructure Increased Processing Speeds Open Source System Management Software Cloud Computing Terms Managed Service Provider Model to CloudOpen Source Load-Balancing Software Benefits and Limitations of Cloud Computing and Software as a ServiceVirtualization as the "Operating System" Computing (SaaS)Virtualization with a Host Operating System Benefits Single Purpose Architectures Migrate toVirtualization Infections on Virtualized Limitations Multipurpose ArchitecturesEnvironments Cloud Computing Case Studies Data Center Virtualization Type 1 Virtualized Environment How Companies Are Using Cloud CollaborationType 2 Virtualized Environment Computing The Cloud as a Reach ExtenderVirtualization Environments Implementing Applications and Services The Cloud as a Communication EnablerMicrosoft Virtualization in the Cloud The Cloud as an Employee Enabler Sun xVM VirtualBox Using Your Company's Services vs. the Service-Oriented Architecture (SOA)Linux/UNIX Virtualization Cloud Provider Evolving from SOA to the CloudVMware Products A Cloud Service Provider Introduced Capacity: Limited PerformanceData Center and Cloud Infrastructure Cloud Computing Risks and Issues Availability: Communications Failure andProducts Products and Services Provided by Cloud Performance IssuesEnd-User and Desktop Products Computing Companies Security: Newer Security Protocols ProvideIBM Virtualization Economic More Protection Using VMware to see a Virtualized Server Staffing What's Next in Cloud Computing Environment Should Your Company Invest in Cloud Independent ComponentsPermissive Federation Computing? Message BaseVerified Federation What Should Not be Moved to the Cloud Location Independence Encrypted Federation LANs and the Cloud Communication Requirements for CloudTrusted Federation Internet and the Cloud ImplementationUsing XMPP in the Federated Environment Web Services, Browsers, and the Cloud Public InternetPresence in the Cloud Thin Client Private InternetWhat It Is Advances in Networking and Processing Routing to the DatacenterPresence Protocols Speeds that Led to Cloud Computing Switching within the Data CenterLeveraging Presence Networking Developments BandwidthPresence Enabled Increased Processing Speeds Tools Used to Measure NetworkThe Future of Presence Managed Service Provider Model to PerformanceThe Interrelation of Identity, Presence, and Cloud Computing and Software as a Using the Protocol Analyzer to MeasureLocation in the Cloud Service (SaaS) BandwidthIdentity Management Single Purpose Architectures Migrate to Using Ping and Traceroute to MeasureWhat It Is Multipurpose Architectures Network Performance Future of Identity in the Cloud Data Center Virtualization SecurityPrivacy and Its Relation to Cloud-Based Collaboration SSLInformation Systems The Cloud as a Reach Extender VPN

Page 58: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Personal Information The Cloud as a Communication Enabler Overhead Privacy-Related Issues The Cloud as an Employee Enabler Storage Options for Cloud ComputingFinding Your Private Information Service-Oriented Architecture (SOA) Storage CapacityOpen Cloud Consortium Working Groups Evolving from SOA to the Cloud Data Protection and PartitioningProject Matsu Capacity: Limited Performance NASProject Comet Availability: Communications Failure and SANHPC in the Cloud Performance Issues CASThe Open Cloud Testbed Security: Newer Security Protocols RedundancyThe Open Science Data Cloud Provide More Protection ReplicationIntercloud Testbed What's Next in Cloud Computing Multisiting Reporting on an Open Cloud Consortium Independent Components Backup and Recovery Working Group Message Base Server Software Environments thatDistributed Management Task Force Location Independence Support Cloud Computing(DMTF) Communication Requirements for Cloud Server CapacityWhat It Is? Implementation VirtualizationDMTK Working Groups Associated with Public Internet ClusteringCloud Computing Private Internet ExpansionStandards for Application Developers Routing to the Datacenter Server FunctionsProtocols Switching within the Data Center ApplicationScripting Languages Bandwidth WebContent Formatting Standards and Tools Used to Measure Network Database Languages Performance Vendor Approaches to Cloud ComputingStandards for Security in the Cloud Using the Protocol Analyzer to Measure Role of Open Source Software in DataConfidentiality, Integrity, Availability Bandwidth CenterAuthentication, Authorization, Accountability Using Ping and Traceroute to Measure Cost Reduction vs. ReliabilityRegulations for Privacy Network Performance Open Source Server SoftwareSecurity Protocols Security Open Source Database SoftwareEstablishing a Baseline for Cloud SSL Open Source Applications SoftwarePerformance VPN Open Source System ManagementBest Practices for Selecting a Vendor and Overhead SoftwareImplementing Cloud-Based Applications Storage Options for Cloud Computing Open Source Load-Balancing Software Choosing the Right Vendor Storage Capacity Virtualization as the "Operating System"Implementing Cloud-Based Applications Data Protection and Partitioning Virtualization with a Host OperatingWindows Remote Desktop NAS System Vnc SAN Virtualization Infections on VirtualizedWeb Browsers CAS EnvironmentsServer Extensions Redundancy Type 1 Virtualized EnvironmentThin Clients Replication Type 2 Virtualized Environment Smart Phones, Pads, Pods, etc. Multisiting Virtualization EnvironmentsVirtual Terminal Security Strengths and Backup and Recovery Microsoft VirtualizationWeaknesses Server Software Environments that Sun xVM VirtualBoxStrengths Support Cloud Computing Linux/UNIX VirtualizationWeaknesses Server Capacity VMware ProductsAndroid Virtualization Data Center and Cloud InfrastructureBlackBerry Clustering ProductsWindows Mobile Expansion End-User and Desktop Products Ubuntu Mobile Internet Device Server Functions IBM VirtualizationMobile Platform Virtualization Application Using VMware to see a Virtualized ServerKernel-Based Virtual Machine Web Environment VMware Mobile Virtualization Platform Database Permissive FederationCollaboration Applications for Mobile Vendor Approaches to Cloud Computing Verified FederationPlatforms Role of Open Source Software in Data Encrypted FederationText Messaging Center Trusted FederationiPhone Applications Cost Reduction vs. Reliability Using XMPP in the Federated EnvironmentBlackBerry Applications Open Source Server Software Presence in the Cloud

Open Source Database Software What It IsOpen Source Applications Software Presence ProtocolsOpen Source System Management Leveraging Presence

line Software Presence EnabledCloud Computing Infrastructure Open Source Load-Balancing Software The Future of PresenceCloud Computing Terms Virtualization as the "Operating System" The Interrelation of Identity, Presence, andBenefits and Limitations of Cloud Computing Virtualization with a Host Operating Location in the Cloud Benefits System Identity ManagementLimitations Virtualization Infections on Virtualized What It IsCloud Computing Case Studies Environments Future of Identity in the Cloud

Page 59: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

How Companies Are Using Cloud Type 1 Virtualized Environment Privacy and Its Relation to Cloud-BasedComputing Type 2 Virtualized Environment Information SystemsImplementing Applications and Services in Virtualization Environments Personal Informationthe Cloud Microsoft Virtualization Privacy-Related IssuesUsing Your Company's Services vs. the Sun xVM VirtualBox Finding Your Private Information Cloud Provider Linux/UNIX Virtualization Open Cloud Consortium Working GroupsA Cloud Service Provider Introduced VMware Products Project MatsuCloud Computing Risks and Issues Data Center and Cloud Infrastructure Project CometProducts and Services Provided by Cloud Products HPC in the CloudComputing Companies End-User and Desktop Products The Open Cloud TestbedEconomic IBM Virtualization The Open Science Data CloudStaffing Using VMware to see a Virtualized Server Intercloud TestbedShould Your Company Invest in Cloud Environment Reporting on an Open Cloud ConsortiumComputing? Permissive Federation Working Group What Should Not be Moved to the Cloud Verified Federation Distributed Management Task ForceLANs and the Cloud Encrypted Federation (DMTF)Internet and the Cloud Trusted Federation What It Is?Web Services, Browsers, and the Cloud Using XMPP in the Federated DMTK Working Groups Associated withThin Client Environment Cloud Computing Advances in Networking and Processing Presence in the Cloud Standards for Application DevelopersSpeeds that Led to Cloud Computing What It Is ProtocolsNetworking Developments Presence Protocols Scripting LanguagesIncreased Processing Speeds Leveraging Presence Content Formatting Standards andManaged Service Provider Model to Cloud Presence Enabled Languages Computing and Software as a Service The Future of Presence Standards for Security in the Cloud(SaaS) The Interrelation of Identity, Presence, Confidentiality, Integrity, AvailabilitySingle Purpose Architectures Migrate to and Location in the Cloud Authentication, Authorization,Multipurpose Architectures Identity Management AccountabilityData Center Virtualization What It Is Regulations for PrivacyCollaboration Future of Identity in the Cloud Security Protocols The Cloud as a Reach Extender Privacy and Its Relation to Cloud-Based Establishing a Baseline for CloudThe Cloud as a Communication Enabler Information Systems PerformanceThe Cloud as an Employee Enabler Personal Information Best Practices for Selecting a Vendor andService-Oriented Architecture (SOA) Privacy-Related Issues Implementing Cloud-Based ApplicationsEvolving from SOA to the Cloud Finding Your Private Information Choosing the Right VendorCapacity: Limited Performance Open Cloud Consortium Working Groups Implementing Cloud-Based Applications Availability: Communications Failure and Project Matsu Windows Remote DesktopPerformance Issues Project Comet VncSecurity: Newer Security Protocols Provide HPC in the Cloud Web BrowsersMore Protection The Open Cloud Testbed Server ExtensionsWhat's Next in Cloud Computing The Open Science Data Cloud Thin ClientsIndependent Components Intercloud Testbed Smart Phones, Pads, Pods, etc. Message Base Reporting on an Open Cloud Consortium Virtual Terminal Security Strengths andLocation Independence Working Group WeaknessesCommunication Requirements for Cloud Distributed Management Task Force StrengthsImplementation (DMTF) Weaknesses Public Internet What It Is? AndroidPrivate Internet DMTK Working Groups Associated with BlackBerryRouting to the Datacenter Cloud Computing Windows MobileSwitching within the Data Center Standards for Application Developers Ubuntu Mobile Internet Device Bandwidth Protocols Mobile Platform VirtualizationTools Used to Measure Network Scripting Languages Kernel-Based Virtual MachinePerformance Content Formatting Standards and VMware Mobile Virtualization Platform Using the Protocol Analyzer to Measure Languages Collaboration Applications for MobileBandwidth Standards for Security in the Cloud PlatformsUsing Ping and Traceroute to Measure Confidentiality, Integrity, Availability Text MessagingNetwork Performance Authentication, Authorization, iPhone ApplicationsSecurity Accountability BlackBerry ApplicationsSSL Regulations for PrivacyVPN Security Protocols Overhead Establishing a Baseline for CloudStorage Options for Cloud Computing Performance lineStorage Capacity Best Practices for Selecting a Vendor Cloud Computing InfrastructureData Protection and Partitioning and Implementing Cloud-Based Cloud Computing Terms NAS Applications Benefits and Limitations of Cloud

Page 60: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

SAN Choosing the Right Vendor ComputingCAS Implementing Cloud-Based Applications BenefitsRedundancy Windows Remote Desktop LimitationsReplication Vnc Cloud Computing Case Studies Multisiting Web Browsers How Companies Are Using CloudBackup and Recovery Server Extensions ComputingServer Software Environments that Support Thin Clients Implementing Applications and Services inCloud Computing Smart Phones, Pads, Pods, etc. the CloudServer Capacity Virtual Terminal Security Strengths and Using Your Company's Services vs. theVirtualization Weaknesses Cloud ProviderClustering Strengths A Cloud Service Provider Introduced Expansion Weaknesses Cloud Computing Risks and Issues Server Functions Android Products and Services Provided by CloudApplication BlackBerry Computing Companies Web Windows Mobile EconomicDatabase Ubuntu Mobile Internet Device Staffing Vendor Approaches to Cloud Computing Mobile Platform Virtualization Should Your Company Invest in CloudRole of Open Source Software in Data Kernel-Based Virtual Machine Computing?Center VMware Mobile Virtualization Platform What Should Not be Moved to the Cloud Cost Reduction vs. Reliability Collaboration Applications for Mobile LANs and the CloudOpen Source Server Software Platforms Internet and the CloudOpen Source Database Software Text Messaging Web Services, Browsers, and the CloudOpen Source Applications Software iPhone Applications Thin ClientOpen Source System Management Software BlackBerry Applications Advances in Networking and ProcessingOpen Source Load-Balancing Software Speeds that Led to Cloud ComputingVirtualization as the "Operating System" Networking DevelopmentsVirtualization with a Host Operating System Increased Processing Speeds Virtualization Infections on Virtualized line Managed Service Provider Model to CloudEnvironments Cloud Computing Infrastructure Computing and Software as a ServiceType 1 Virtualized Environment Cloud Computing Terms (SaaS)Type 2 Virtualized Environment Benefits and Limitations of Cloud Single Purpose Architectures Migrate toVirtualization Environments Computing Multipurpose ArchitecturesMicrosoft Virtualization Benefits Data Center Virtualization Sun xVM VirtualBox Limitations CollaborationLinux/UNIX Virtualization Cloud Computing Case Studies The Cloud as a Reach ExtenderVMware Products How Companies Are Using Cloud The Cloud as a Communication EnablerData Center and Cloud Infrastructure Computing The Cloud as an Employee Enabler Products Implementing Applications and Services Service-Oriented Architecture (SOA)End-User and Desktop Products in the Cloud Evolving from SOA to the CloudIBM Virtualization Using Your Company's Services vs. the Capacity: Limited PerformanceUsing VMware to see a Virtualized Server Cloud Provider Availability: Communications Failure andEnvironment A Cloud Service Provider Introduced Performance IssuesPermissive Federation Cloud Computing Risks and Issues Security: Newer Security Protocols ProvideVerified Federation Products and Services Provided by Cloud More Protection Encrypted Federation Computing Companies What's Next in Cloud Computing Trusted Federation Economic Independent ComponentsUsing XMPP in the Federated Environment Staffing Message BasePresence in the Cloud Should Your Company Invest in Cloud Location Independence What It Is Computing? Communication Requirements for CloudPresence Protocols What Should Not be Moved to the Cloud ImplementationLeveraging Presence LANs and the Cloud Public InternetPresence Enabled Internet and the Cloud Private InternetThe Future of Presence Web Services, Browsers, and the Cloud Routing to the DatacenterThe Interrelation of Identity, Presence, and Thin Client Switching within the Data CenterLocation in the Cloud Advances in Networking and Processing BandwidthIdentity Management Speeds that Led to Cloud Computing Tools Used to Measure NetworkWhat It Is Networking Developments PerformanceFuture of Identity in the Cloud Increased Processing Speeds Using the Protocol Analyzer to MeasurePrivacy and Its Relation to Cloud-Based Managed Service Provider Model to BandwidthInformation Systems Cloud Computing and Software as a Using Ping and Traceroute to MeasurePersonal Information Service (SaaS) Network Performance Privacy-Related Issues Single Purpose Architectures Migrate to SecurityFinding Your Private Information Multipurpose Architectures SSLOpen Cloud Consortium Working Groups Data Center Virtualization VPNProject Matsu Collaboration Overhead

Page 61: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Project Comet The Cloud as a Reach Extender Storage Options for Cloud ComputingHPC in the Cloud The Cloud as a Communication Enabler Storage CapacityThe Open Cloud Testbed The Cloud as an Employee Enabler Data Protection and PartitioningThe Open Science Data Cloud Service-Oriented Architecture (SOA) NASIntercloud Testbed Evolving from SOA to the Cloud SANReporting on an Open Cloud Consortium Capacity: Limited Performance CASWorking Group Availability: Communications Failure and RedundancyDistributed Management Task Force Performance Issues Replication(DMTF) Security: Newer Security Protocols Multisiting What It Is? Provide More Protection Backup and Recovery DMTK Working Groups Associated with What's Next in Cloud Computing Server Software Environments thatCloud Computing Independent Components Support Cloud ComputingStandards for Application Developers Message Base Server CapacityProtocols Location Independence VirtualizationScripting Languages Communication Requirements for Cloud ClusteringContent Formatting Standards and Implementation ExpansionLanguages Public Internet Server FunctionsStandards for Security in the Cloud Private Internet ApplicationConfidentiality, Integrity, Availability Routing to the Datacenter WebAuthentication, Authorization, Accountability Switching within the Data Center Database Regulations for Privacy Bandwidth Vendor Approaches to Cloud ComputingSecurity Protocols Tools Used to Measure Network Role of Open Source Software in DataEstablishing a Baseline for Cloud Performance CenterPerformance Using the Protocol Analyzer to Measure Cost Reduction vs. ReliabilityBest Practices for Selecting a Vendor and Bandwidth Open Source Server SoftwareImplementing Cloud-Based Applications Using Ping and Traceroute to Measure Open Source Database SoftwareChoosing the Right Vendor Network Performance Open Source Applications SoftwareImplementing Cloud-Based Applications Security Open Source System ManagementWindows Remote Desktop SSL SoftwareVnc VPN Open Source Load-Balancing Software Web Browsers Overhead Virtualization as the "Operating System"Server Extensions Storage Options for Cloud Computing Virtualization with a Host OperatingThin Clients Storage Capacity System Smart Phones, Pads, Pods, etc. Data Protection and Partitioning Virtualization Infections on VirtualizedVirtual Terminal Security Strengths and NAS EnvironmentsWeaknesses SAN Type 1 Virtualized EnvironmentStrengths CAS Type 2 Virtualized Environment Weaknesses Redundancy Virtualization EnvironmentsAndroid Replication Microsoft VirtualizationBlackBerry Multisiting Sun xVM VirtualBoxWindows Mobile Backup and Recovery Linux/UNIX VirtualizationUbuntu Mobile Internet Device Server Software Environments that VMware ProductsMobile Platform Virtualization Support Cloud Computing Data Center and Cloud InfrastructureKernel-Based Virtual Machine Server Capacity ProductsVMware Mobile Virtualization Platform Virtualization End-User and Desktop Products Collaboration Applications for Mobile Clustering IBM VirtualizationPlatforms Expansion Using VMware to see a Virtualized ServerText Messaging Server Functions Environment iPhone Applications Application Permissive FederationBlackBerry Applications Web Verified Federation

Database Encrypted FederationVendor Approaches to Cloud Computing Trusted FederationRole of Open Source Software in Data Using XMPP in the Federated Environment

line Center Presence in the CloudCloud Computing Infrastructure Cost Reduction vs. Reliability What It IsCloud Computing Terms Open Source Server Software Presence ProtocolsBenefits and Limitations of Cloud Computing Open Source Database Software Leveraging PresenceBenefits Open Source Applications Software Presence EnabledLimitations Open Source System Management The Future of PresenceCloud Computing Case Studies Software The Interrelation of Identity, Presence, andHow Companies Are Using Cloud Open Source Load-Balancing Software Location in the Cloud Computing Virtualization as the "Operating System" Identity ManagementImplementing Applications and Services in Virtualization with a Host Operating What It Isthe Cloud System Future of Identity in the Cloud Using Your Company's Services vs. the Virtualization Infections on Virtualized Privacy and Its Relation to Cloud-Based

Page 62: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cloud Provider Environments Information SystemsA Cloud Service Provider Introduced Type 1 Virtualized Environment Personal InformationCloud Computing Risks and Issues Type 2 Virtualized Environment Privacy-Related IssuesProducts and Services Provided by Cloud Virtualization Environments Finding Your Private Information Computing Companies Microsoft Virtualization Open Cloud Consortium Working GroupsEconomic Sun xVM VirtualBox Project MatsuStaffing Linux/UNIX Virtualization Project CometShould Your Company Invest in Cloud VMware Products HPC in the CloudComputing? Data Center and Cloud Infrastructure The Open Cloud TestbedWhat Should Not be Moved to the Cloud Products The Open Science Data CloudLANs and the Cloud End-User and Desktop Products Intercloud TestbedInternet and the Cloud IBM Virtualization Reporting on an Open Cloud ConsortiumWeb Services, Browsers, and the Cloud Using VMware to see a Virtualized Server Working Group Thin Client Environment Distributed Management Task ForceAdvances in Networking and Processing Permissive Federation (DMTF)Speeds that Led to Cloud Computing Verified Federation What It Is?Networking Developments Encrypted Federation DMTK Working Groups Associated withIncreased Processing Speeds Trusted Federation Cloud Computing Managed Service Provider Model to Cloud Using XMPP in the Federated Standards for Application DevelopersComputing and Software as a Service Environment Protocols(SaaS) Presence in the Cloud Scripting LanguagesSingle Purpose Architectures Migrate to What It Is Content Formatting Standards andMultipurpose Architectures Presence Protocols Languages Data Center Virtualization Leveraging Presence Standards for Security in the CloudCollaboration Presence Enabled Confidentiality, Integrity, AvailabilityThe Cloud as a Reach Extender The Future of Presence Authentication, Authorization,The Cloud as a Communication Enabler The Interrelation of Identity, Presence, AccountabilityThe Cloud as an Employee Enabler and Location in the Cloud Regulations for PrivacyService-Oriented Architecture (SOA) Identity Management Security Protocols Evolving from SOA to the Cloud What It Is Establishing a Baseline for CloudCapacity: Limited Performance Future of Identity in the Cloud PerformanceAvailability: Communications Failure and Privacy and Its Relation to Cloud-Based Best Practices for Selecting a Vendor andPerformance Issues Information Systems Implementing Cloud-Based ApplicationsSecurity: Newer Security Protocols Provide Personal Information Choosing the Right VendorMore Protection Privacy-Related Issues Implementing Cloud-Based Applications What's Next in Cloud Computing Finding Your Private Information Windows Remote DesktopIndependent Components Open Cloud Consortium Working Groups VncMessage Base Project Matsu Web BrowsersLocation Independence Project Comet Server ExtensionsCommunication Requirements for Cloud HPC in the Cloud Thin ClientsImplementation The Open Cloud Testbed Smart Phones, Pads, Pods, etc. Public Internet The Open Science Data Cloud Virtual Terminal Security Strengths andPrivate Internet Intercloud Testbed WeaknessesRouting to the Datacenter Reporting on an Open Cloud Consortium StrengthsSwitching within the Data Center Working Group Weaknesses Bandwidth Distributed Management Task Force AndroidTools Used to Measure Network (DMTF) BlackBerryPerformance What It Is? Windows MobileUsing the Protocol Analyzer to Measure DMTK Working Groups Associated with Ubuntu Mobile Internet Device Bandwidth Cloud Computing Mobile Platform VirtualizationUsing Ping and Traceroute to Measure Standards for Application Developers Kernel-Based Virtual MachineNetwork Performance Protocols VMware Mobile Virtualization Platform Security Scripting Languages Collaboration Applications for MobileSSL Content Formatting Standards and PlatformsVPN Languages Text MessagingOverhead Standards for Security in the Cloud iPhone ApplicationsStorage Options for Cloud Computing Confidentiality, Integrity, Availability BlackBerry ApplicationsStorage Capacity Authentication, Authorization,Data Protection and Partitioning AccountabilityNAS Regulations for PrivacySAN Security Protocols lineCAS Establishing a Baseline for Cloud Cloud Computing InfrastructureRedundancy Performance Cloud Computing Terms Replication Best Practices for Selecting a Vendor Benefits and Limitations of CloudMultisiting and Implementing Cloud-Based Computing

Page 63: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Backup and Recovery Applications BenefitsServer Software Environments that Support Choosing the Right Vendor LimitationsCloud Computing Implementing Cloud-Based Applications Cloud Computing Case Studies Server Capacity Windows Remote Desktop How Companies Are Using CloudVirtualization Vnc ComputingClustering Web Browsers Implementing Applications and Services inExpansion Server Extensions the CloudServer Functions Thin Clients Using Your Company's Services vs. theApplication Smart Phones, Pads, Pods, etc. Cloud ProviderWeb Virtual Terminal Security Strengths and A Cloud Service Provider Introduced Database Weaknesses Cloud Computing Risks and Issues Vendor Approaches to Cloud Computing Strengths Products and Services Provided by CloudRole of Open Source Software in Data Weaknesses Computing Companies Center Android EconomicCost Reduction vs. Reliability BlackBerry Staffing Open Source Server Software Windows Mobile Should Your Company Invest in CloudOpen Source Database Software Ubuntu Mobile Internet Device Computing?Open Source Applications Software Mobile Platform Virtualization What Should Not be Moved to the Cloud Open Source System Management Software Kernel-Based Virtual Machine LANs and the CloudOpen Source Load-Balancing Software VMware Mobile Virtualization Platform Internet and the CloudVirtualization as the "Operating System" Collaboration Applications for Mobile Web Services, Browsers, and the CloudVirtualization with a Host Operating System Platforms Thin ClientVirtualization Infections on Virtualized Text Messaging Advances in Networking and ProcessingEnvironments iPhone Applications Speeds that Led to Cloud ComputingType 1 Virtualized Environment BlackBerry Applications Networking DevelopmentsType 2 Virtualized Environment Increased Processing Speeds Virtualization Environments Managed Service Provider Model to CloudMicrosoft Virtualization Computing and Software as a ServiceSun xVM VirtualBox line (SaaS)Linux/UNIX Virtualization Cloud Computing Infrastructure Single Purpose Architectures Migrate toVMware Products Cloud Computing Terms Multipurpose ArchitecturesData Center and Cloud Infrastructure Benefits and Limitations of Cloud Data Center Virtualization Products Computing CollaborationEnd-User and Desktop Products Benefits The Cloud as a Reach ExtenderIBM Virtualization Limitations The Cloud as a Communication EnablerUsing VMware to see a Virtualized Server Cloud Computing Case Studies The Cloud as an Employee Enabler Environment How Companies Are Using Cloud Service-Oriented Architecture (SOA)Permissive Federation Computing Evolving from SOA to the CloudVerified Federation Implementing Applications and Services Capacity: Limited PerformanceEncrypted Federation in the Cloud Availability: Communications Failure andTrusted Federation Using Your Company's Services vs. the Performance IssuesUsing XMPP in the Federated Environment Cloud Provider Security: Newer Security Protocols ProvidePresence in the Cloud A Cloud Service Provider Introduced More Protection What It Is Cloud Computing Risks and Issues What's Next in Cloud Computing Presence Protocols Products and Services Provided by Cloud Independent ComponentsLeveraging Presence Computing Companies Message BasePresence Enabled Economic Location Independence The Future of Presence Staffing Communication Requirements for CloudThe Interrelation of Identity, Presence, and Should Your Company Invest in Cloud ImplementationLocation in the Cloud Computing? Public InternetIdentity Management What Should Not be Moved to the Cloud Private InternetWhat It Is LANs and the Cloud Routing to the DatacenterFuture of Identity in the Cloud Internet and the Cloud Switching within the Data CenterPrivacy and Its Relation to Cloud-Based Web Services, Browsers, and the Cloud BandwidthInformation Systems Thin Client Tools Used to Measure NetworkPersonal Information Advances in Networking and Processing PerformancePrivacy-Related Issues Speeds that Led to Cloud Computing Using the Protocol Analyzer to MeasureFinding Your Private Information Networking Developments BandwidthOpen Cloud Consortium Working Groups Increased Processing Speeds Using Ping and Traceroute to MeasureProject Matsu Managed Service Provider Model to Network Performance Project Comet Cloud Computing and Software as a SecurityHPC in the Cloud Service (SaaS) SSLThe Open Cloud Testbed Single Purpose Architectures Migrate to VPNThe Open Science Data Cloud Multipurpose Architectures Overhead Intercloud Testbed Data Center Virtualization Storage Options for Cloud Computing

Page 64: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Reporting on an Open Cloud Consortium Collaboration Storage CapacityWorking Group The Cloud as a Reach Extender Data Protection and PartitioningDistributed Management Task Force The Cloud as a Communication Enabler NAS(DMTF) The Cloud as an Employee Enabler SANWhat It Is? Service-Oriented Architecture (SOA) CASDMTK Working Groups Associated with Evolving from SOA to the Cloud RedundancyCloud Computing Capacity: Limited Performance ReplicationStandards for Application Developers Availability: Communications Failure and Multisiting Protocols Performance Issues Backup and Recovery Scripting Languages Security: Newer Security Protocols Server Software Environments thatContent Formatting Standards and Provide More Protection Support Cloud ComputingLanguages What's Next in Cloud Computing Server CapacityStandards for Security in the Cloud Independent Components VirtualizationConfidentiality, Integrity, Availability Message Base ClusteringAuthentication, Authorization, Accountability Location Independence ExpansionRegulations for Privacy Communication Requirements for Cloud Server FunctionsSecurity Protocols Implementation ApplicationEstablishing a Baseline for Cloud Public Internet WebPerformance Private Internet Database Best Practices for Selecting a Vendor and Routing to the Datacenter Vendor Approaches to Cloud ComputingImplementing Cloud-Based Applications Switching within the Data Center Role of Open Source Software in DataChoosing the Right Vendor Bandwidth CenterImplementing Cloud-Based Applications Tools Used to Measure Network Cost Reduction vs. ReliabilityWindows Remote Desktop Performance Open Source Server SoftwareVnc Using the Protocol Analyzer to Measure Open Source Database SoftwareWeb Browsers Bandwidth Open Source Applications SoftwareServer Extensions Using Ping and Traceroute to Measure Open Source System ManagementThin Clients Network Performance SoftwareSmart Phones, Pads, Pods, etc. Security Open Source Load-Balancing Software Virtual Terminal Security Strengths and SSL Virtualization as the "Operating System"Weaknesses VPN Virtualization with a Host OperatingStrengths Overhead System Weaknesses Storage Options for Cloud Computing Virtualization Infections on VirtualizedAndroid Storage Capacity EnvironmentsBlackBerry Data Protection and Partitioning Type 1 Virtualized EnvironmentWindows Mobile NAS Type 2 Virtualized Environment Ubuntu Mobile Internet Device SAN Virtualization EnvironmentsMobile Platform Virtualization CAS Microsoft VirtualizationKernel-Based Virtual Machine Redundancy Sun xVM VirtualBoxVMware Mobile Virtualization Platform Replication Linux/UNIX VirtualizationCollaboration Applications for Mobile Multisiting VMware ProductsPlatforms Backup and Recovery Data Center and Cloud InfrastructureText Messaging Server Software Environments that ProductsiPhone Applications Support Cloud Computing End-User and Desktop Products BlackBerry Applications Server Capacity IBM Virtualization

Virtualization Using VMware to see a Virtualized ServerClustering Environment

5. Building Cloud Networks Expansion Permissive Federationline Server Functions Verified Federation

Designing and Implementing a Data Application Encrypted FederationCenter-Based Cloud Web Trusted FederationUsing Industry and International Standards Database Using XMPP in the Federated Environment

Vendor Approaches to Cloud Computing Presence in the CloudRole of Open Source Software in Data What It Is

line Center Presence ProtocolsCloud Computing Infrastructure Cost Reduction vs. Reliability Leveraging PresenceCloud Computing Terms Open Source Server Software Presence EnabledBenefits and Limitations of Cloud Computing Open Source Database Software The Future of PresenceBenefits Open Source Applications Software The Interrelation of Identity, Presence, andLimitations Open Source System Management Location in the Cloud Cloud Computing Case Studies Software Identity ManagementHow Companies Are Using Cloud Open Source Load-Balancing Software What It IsComputing Virtualization as the "Operating System" Future of Identity in the Cloud Implementing Applications and Services in Virtualization with a Host Operating Privacy and Its Relation to Cloud-Basedthe Cloud System Information Systems

Page 65: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Using Your Company's Services vs. the Virtualization Infections on Virtualized Personal InformationCloud Provider Environments Privacy-Related IssuesA Cloud Service Provider Introduced Type 1 Virtualized Environment Finding Your Private Information Cloud Computing Risks and Issues Type 2 Virtualized Environment Open Cloud Consortium Working GroupsProducts and Services Provided by Cloud Virtualization Environments Project MatsuComputing Companies Microsoft Virtualization Project CometEconomic Sun xVM VirtualBox HPC in the CloudStaffing Linux/UNIX Virtualization The Open Cloud TestbedShould Your Company Invest in Cloud VMware Products The Open Science Data CloudComputing? Data Center and Cloud Infrastructure Intercloud TestbedWhat Should Not be Moved to the Cloud Products Reporting on an Open Cloud ConsortiumLANs and the Cloud End-User and Desktop Products Working Group Internet and the Cloud IBM Virtualization Distributed Management Task ForceWeb Services, Browsers, and the Cloud Using VMware to see a Virtualized Server (DMTF)Thin Client Environment What It Is?Advances in Networking and Processing Permissive Federation DMTK Working Groups Associated withSpeeds that Led to Cloud Computing Verified Federation Cloud Computing Networking Developments Encrypted Federation Standards for Application DevelopersIncreased Processing Speeds Trusted Federation ProtocolsManaged Service Provider Model to Cloud Using XMPP in the Federated Scripting LanguagesComputing and Software as a Service Environment Content Formatting Standards and(SaaS) Presence in the Cloud Languages Single Purpose Architectures Migrate to What It Is Standards for Security in the CloudMultipurpose Architectures Presence Protocols Confidentiality, Integrity, AvailabilityData Center Virtualization Leveraging Presence Authentication, Authorization,Collaboration Presence Enabled AccountabilityThe Cloud as a Reach Extender The Future of Presence Regulations for PrivacyThe Cloud as a Communication Enabler The Interrelation of Identity, Presence, Security Protocols The Cloud as an Employee Enabler and Location in the Cloud Establishing a Baseline for CloudService-Oriented Architecture (SOA) Identity Management PerformanceEvolving from SOA to the Cloud What It Is Best Practices for Selecting a Vendor andCapacity: Limited Performance Future of Identity in the Cloud Implementing Cloud-Based ApplicationsAvailability: Communications Failure and Privacy and Its Relation to Cloud-Based Choosing the Right VendorPerformance Issues Information Systems Implementing Cloud-Based Applications Security: Newer Security Protocols Provide Personal Information Windows Remote DesktopMore Protection Privacy-Related Issues VncWhat's Next in Cloud Computing Finding Your Private Information Web BrowsersIndependent Components Open Cloud Consortium Working Groups Server ExtensionsMessage Base Project Matsu Thin ClientsLocation Independence Project Comet Smart Phones, Pads, Pods, etc. Communication Requirements for Cloud HPC in the Cloud Virtual Terminal Security Strengths andImplementation The Open Cloud Testbed WeaknessesPublic Internet The Open Science Data Cloud StrengthsPrivate Internet Intercloud Testbed Weaknesses Routing to the Datacenter Reporting on an Open Cloud Consortium AndroidSwitching within the Data Center Working Group BlackBerryBandwidth Distributed Management Task Force Windows MobileTools Used to Measure Network (DMTF) Ubuntu Mobile Internet Device Performance What It Is? Mobile Platform VirtualizationUsing the Protocol Analyzer to Measure DMTK Working Groups Associated with Kernel-Based Virtual MachineBandwidth Cloud Computing VMware Mobile Virtualization Platform Using Ping and Traceroute to Measure Standards for Application Developers Collaboration Applications for MobileNetwork Performance Protocols PlatformsSecurity Scripting Languages Text MessagingSSL Content Formatting Standards and iPhone ApplicationsVPN Languages BlackBerry ApplicationsOverhead Standards for Security in the CloudStorage Options for Cloud Computing Confidentiality, Integrity, AvailabilityStorage Capacity Authentication, Authorization,Data Protection and Partitioning Accountability lineNAS Regulations for Privacy Cloud Computing InfrastructureSAN Security Protocols Cloud Computing Terms CAS Establishing a Baseline for Cloud Benefits and Limitations of CloudRedundancy Performance ComputingReplication Best Practices for Selecting a Vendor Benefits

Page 66: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Multisiting and Implementing Cloud-Based LimitationsBackup and Recovery Applications Cloud Computing Case Studies Server Software Environments that Support Choosing the Right Vendor How Companies Are Using CloudCloud Computing Implementing Cloud-Based Applications ComputingServer Capacity Windows Remote Desktop Implementing Applications and Services inVirtualization Vnc the CloudClustering Web Browsers Using Your Company's Services vs. theExpansion Server Extensions Cloud ProviderServer Functions Thin Clients A Cloud Service Provider Introduced Application Smart Phones, Pads, Pods, etc. Cloud Computing Risks and Issues Web Virtual Terminal Security Strengths and Products and Services Provided by CloudDatabase Weaknesses Computing Companies Vendor Approaches to Cloud Computing Strengths EconomicRole of Open Source Software in Data Weaknesses Staffing Center Android Should Your Company Invest in CloudCost Reduction vs. Reliability BlackBerry Computing?Open Source Server Software Windows Mobile What Should Not be Moved to the Cloud Open Source Database Software Ubuntu Mobile Internet Device LANs and the CloudOpen Source Applications Software Mobile Platform Virtualization Internet and the CloudOpen Source System Management Software Kernel-Based Virtual Machine Web Services, Browsers, and the CloudOpen Source Load-Balancing Software VMware Mobile Virtualization Platform Thin ClientVirtualization as the "Operating System" Collaboration Applications for Mobile Advances in Networking and ProcessingVirtualization with a Host Operating System Platforms Speeds that Led to Cloud ComputingVirtualization Infections on Virtualized Text Messaging Networking DevelopmentsEnvironments iPhone Applications Increased Processing Speeds Type 1 Virtualized Environment BlackBerry Applications Managed Service Provider Model to CloudType 2 Virtualized Environment Computing and Software as a ServiceVirtualization Environments (SaaS)Microsoft Virtualization Single Purpose Architectures Migrate toSun xVM VirtualBox line Multipurpose ArchitecturesLinux/UNIX Virtualization Cloud Computing Infrastructure Data Center Virtualization VMware Products Cloud Computing Terms CollaborationData Center and Cloud Infrastructure Benefits and Limitations of Cloud The Cloud as a Reach ExtenderProducts Computing The Cloud as a Communication EnablerEnd-User and Desktop Products Benefits The Cloud as an Employee Enabler IBM Virtualization Limitations Service-Oriented Architecture (SOA)Using VMware to see a Virtualized Server Cloud Computing Case Studies Evolving from SOA to the CloudEnvironment How Companies Are Using Cloud Capacity: Limited PerformancePermissive Federation Computing Availability: Communications Failure andVerified Federation Implementing Applications and Services Performance IssuesEncrypted Federation in the Cloud Security: Newer Security Protocols ProvideTrusted Federation Using Your Company's Services vs. the More Protection Using XMPP in the Federated Environment Cloud Provider What's Next in Cloud Computing Presence in the Cloud A Cloud Service Provider Introduced Independent ComponentsWhat It Is Cloud Computing Risks and Issues Message BasePresence Protocols Products and Services Provided by Cloud Location Independence Leveraging Presence Computing Companies Communication Requirements for CloudPresence Enabled Economic ImplementationThe Future of Presence Staffing Public InternetThe Interrelation of Identity, Presence, and Should Your Company Invest in Cloud Private InternetLocation in the Cloud Computing? Routing to the DatacenterIdentity Management What Should Not be Moved to the Cloud Switching within the Data CenterWhat It Is LANs and the Cloud BandwidthFuture of Identity in the Cloud Internet and the Cloud Tools Used to Measure NetworkPrivacy and Its Relation to Cloud-Based Web Services, Browsers, and the Cloud PerformanceInformation Systems Thin Client Using the Protocol Analyzer to MeasurePersonal Information Advances in Networking and Processing BandwidthPrivacy-Related Issues Speeds that Led to Cloud Computing Using Ping and Traceroute to MeasureFinding Your Private Information Networking Developments Network Performance Open Cloud Consortium Working Groups Increased Processing Speeds SecurityProject Matsu Managed Service Provider Model to SSLProject Comet Cloud Computing and Software as a VPNHPC in the Cloud Service (SaaS) Overhead The Open Cloud Testbed Single Purpose Architectures Migrate to Storage Options for Cloud ComputingThe Open Science Data Cloud Multipurpose Architectures Storage Capacity

Page 67: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Intercloud Testbed Data Center Virtualization Data Protection and PartitioningReporting on an Open Cloud Consortium Collaboration NASWorking Group The Cloud as a Reach Extender SANDistributed Management Task Force The Cloud as a Communication Enabler CAS(DMTF) The Cloud as an Employee Enabler RedundancyWhat It Is? Service-Oriented Architecture (SOA) ReplicationDMTK Working Groups Associated with Evolving from SOA to the Cloud Multisiting Cloud Computing Capacity: Limited Performance Backup and Recovery Standards for Application Developers Availability: Communications Failure and Server Software Environments thatProtocols Performance Issues Support Cloud ComputingScripting Languages Security: Newer Security Protocols Server CapacityContent Formatting Standards and Provide More Protection VirtualizationLanguages What's Next in Cloud Computing ClusteringStandards for Security in the Cloud Independent Components ExpansionConfidentiality, Integrity, Availability Message Base Server FunctionsAuthentication, Authorization, Accountability Location Independence ApplicationRegulations for Privacy Communication Requirements for Cloud WebSecurity Protocols Implementation Database Establishing a Baseline for Cloud Public Internet Vendor Approaches to Cloud ComputingPerformance Private Internet Role of Open Source Software in DataBest Practices for Selecting a Vendor and Routing to the Datacenter CenterImplementing Cloud-Based Applications Switching within the Data Center Cost Reduction vs. ReliabilityChoosing the Right Vendor Bandwidth Open Source Server SoftwareImplementing Cloud-Based Applications Tools Used to Measure Network Open Source Database SoftwareWindows Remote Desktop Performance Open Source Applications SoftwareVnc Using the Protocol Analyzer to Measure Open Source System ManagementWeb Browsers Bandwidth SoftwareServer Extensions Using Ping and Traceroute to Measure Open Source Load-Balancing Software Thin Clients Network Performance Virtualization as the "Operating System"Smart Phones, Pads, Pods, etc. Security Virtualization with a Host OperatingVirtual Terminal Security Strengths and SSL System Weaknesses VPN Virtualization Infections on VirtualizedStrengths Overhead EnvironmentsWeaknesses Storage Options for Cloud Computing Type 1 Virtualized EnvironmentAndroid Storage Capacity Type 2 Virtualized Environment BlackBerry Data Protection and Partitioning Virtualization EnvironmentsWindows Mobile NAS Microsoft VirtualizationUbuntu Mobile Internet Device SAN Sun xVM VirtualBoxMobile Platform Virtualization CAS Linux/UNIX VirtualizationKernel-Based Virtual Machine Redundancy VMware ProductsVMware Mobile Virtualization Platform Replication Data Center and Cloud InfrastructureCollaboration Applications for Mobile Multisiting ProductsPlatforms Backup and Recovery End-User and Desktop Products Text Messaging Server Software Environments that IBM VirtualizationiPhone Applications Support Cloud Computing Using VMware to see a Virtualized ServerBlackBerry Applications Server Capacity Environment

Virtualization Permissive FederationClustering Verified FederationExpansion Encrypted Federation

line Server Functions Trusted FederationCloud Computing Infrastructure Application Using XMPP in the Federated EnvironmentCloud Computing Terms Web Presence in the CloudBenefits and Limitations of Cloud Computing Database What It IsBenefits Vendor Approaches to Cloud Computing Presence ProtocolsLimitations Role of Open Source Software in Data Leveraging PresenceCloud Computing Case Studies Center Presence EnabledHow Companies Are Using Cloud Cost Reduction vs. Reliability The Future of PresenceComputing Open Source Server Software The Interrelation of Identity, Presence, andImplementing Applications and Services in Open Source Database Software Location in the Cloud the Cloud Open Source Applications Software Identity ManagementUsing Your Company's Services vs. the Open Source System Management What It IsCloud Provider Software Future of Identity in the Cloud A Cloud Service Provider Introduced Open Source Load-Balancing Software Privacy and Its Relation to Cloud-BasedCloud Computing Risks and Issues Virtualization as the "Operating System" Information SystemsProducts and Services Provided by Cloud Virtualization with a Host Operating Personal Information

Page 68: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Computing Companies System Privacy-Related IssuesEconomic Virtualization Infections on Virtualized Finding Your Private Information Staffing Environments Open Cloud Consortium Working GroupsShould Your Company Invest in Cloud Type 1 Virtualized Environment Project MatsuComputing? Type 2 Virtualized Environment Project CometWhat Should Not be Moved to the Cloud Virtualization Environments HPC in the CloudLANs and the Cloud Microsoft Virtualization The Open Cloud TestbedInternet and the Cloud Sun xVM VirtualBox The Open Science Data CloudWeb Services, Browsers, and the Cloud Linux/UNIX Virtualization Intercloud TestbedThin Client VMware Products Reporting on an Open Cloud ConsortiumAdvances in Networking and Processing Data Center and Cloud Infrastructure Working Group Speeds that Led to Cloud Computing Products Distributed Management Task ForceNetworking Developments End-User and Desktop Products (DMTF)Increased Processing Speeds IBM Virtualization What It Is?Managed Service Provider Model to Cloud Using VMware to see a Virtualized Server DMTK Working Groups Associated withComputing and Software as a Service Environment Cloud Computing (SaaS) Permissive Federation Standards for Application DevelopersSingle Purpose Architectures Migrate to Verified Federation ProtocolsMultipurpose Architectures Encrypted Federation Scripting LanguagesData Center Virtualization Trusted Federation Content Formatting Standards andCollaboration Using XMPP in the Federated Languages The Cloud as a Reach Extender Environment Standards for Security in the CloudThe Cloud as a Communication Enabler Presence in the Cloud Confidentiality, Integrity, AvailabilityThe Cloud as an Employee Enabler What It Is Authentication, Authorization,Service-Oriented Architecture (SOA) Presence Protocols AccountabilityEvolving from SOA to the Cloud Leveraging Presence Regulations for PrivacyCapacity: Limited Performance Presence Enabled Security Protocols Availability: Communications Failure and The Future of Presence Establishing a Baseline for CloudPerformance Issues The Interrelation of Identity, Presence, PerformanceSecurity: Newer Security Protocols Provide and Location in the Cloud Best Practices for Selecting a Vendor andMore Protection Identity Management Implementing Cloud-Based ApplicationsWhat's Next in Cloud Computing What It Is Choosing the Right VendorIndependent Components Future of Identity in the Cloud Implementing Cloud-Based Applications Message Base Privacy and Its Relation to Cloud-Based Windows Remote DesktopLocation Independence Information Systems VncCommunication Requirements for Cloud Personal Information Web BrowsersImplementation Privacy-Related Issues Server ExtensionsPublic Internet Finding Your Private Information Thin ClientsPrivate Internet Open Cloud Consortium Working Groups Smart Phones, Pads, Pods, etc. Routing to the Datacenter Project Matsu Virtual Terminal Security Strengths andSwitching within the Data Center Project Comet WeaknessesBandwidth HPC in the Cloud StrengthsTools Used to Measure Network The Open Cloud Testbed Weaknesses Performance The Open Science Data Cloud AndroidUsing the Protocol Analyzer to Measure Intercloud Testbed BlackBerryBandwidth Reporting on an Open Cloud Consortium Windows MobileUsing Ping and Traceroute to Measure Working Group Ubuntu Mobile Internet Device Network Performance Distributed Management Task Force Mobile Platform VirtualizationSecurity (DMTF) Kernel-Based Virtual MachineSSL What It Is? VMware Mobile Virtualization Platform VPN DMTK Working Groups Associated with Collaboration Applications for MobileOverhead Cloud Computing PlatformsStorage Options for Cloud Computing Standards for Application Developers Text MessagingStorage Capacity Protocols iPhone ApplicationsData Protection and Partitioning Scripting Languages BlackBerry ApplicationsNAS Content Formatting Standards andSAN Languages CAS Standards for Security in the CloudRedundancy Confidentiality, Integrity, Availability lineReplication Authentication, Authorization, Cloud Computing InfrastructureMultisiting Accountability Cloud Computing Terms Backup and Recovery Regulations for Privacy Benefits and Limitations of CloudServer Software Environments that Support Security Protocols ComputingCloud Computing Establishing a Baseline for Cloud BenefitsServer Capacity Performance Limitations

Page 69: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Virtualization Best Practices for Selecting a Vendor Cloud Computing Case Studies Clustering and Implementing Cloud-Based How Companies Are Using CloudExpansion Applications ComputingServer Functions Choosing the Right Vendor Implementing Applications and Services inApplication Implementing Cloud-Based Applications the CloudWeb Windows Remote Desktop Using Your Company's Services vs. theDatabase Vnc Cloud ProviderVendor Approaches to Cloud Computing Web Browsers A Cloud Service Provider Introduced Role of Open Source Software in Data Server Extensions Cloud Computing Risks and Issues Center Thin Clients Products and Services Provided by CloudCost Reduction vs. Reliability Smart Phones, Pads, Pods, etc. Computing Companies Open Source Server Software Virtual Terminal Security Strengths and EconomicOpen Source Database Software Weaknesses Staffing Open Source Applications Software Strengths Should Your Company Invest in CloudOpen Source System Management Software Weaknesses Computing?Open Source Load-Balancing Software Android What Should Not be Moved to the Cloud Virtualization as the "Operating System" BlackBerry LANs and the CloudVirtualization with a Host Operating System Windows Mobile Internet and the CloudVirtualization Infections on Virtualized Ubuntu Mobile Internet Device Web Services, Browsers, and the CloudEnvironments Mobile Platform Virtualization Thin ClientType 1 Virtualized Environment Kernel-Based Virtual Machine Advances in Networking and ProcessingType 2 Virtualized Environment VMware Mobile Virtualization Platform Speeds that Led to Cloud ComputingVirtualization Environments Collaboration Applications for Mobile Networking DevelopmentsMicrosoft Virtualization Platforms Increased Processing Speeds Sun xVM VirtualBox Text Messaging Managed Service Provider Model to CloudLinux/UNIX Virtualization iPhone Applications Computing and Software as a ServiceVMware Products BlackBerry Applications (SaaS)Data Center and Cloud Infrastructure Single Purpose Architectures Migrate toProducts Multipurpose ArchitecturesEnd-User and Desktop Products Data Center Virtualization IBM Virtualization line CollaborationUsing VMware to see a Virtualized Server Cloud Computing Infrastructure The Cloud as a Reach ExtenderEnvironment Cloud Computing Terms The Cloud as a Communication EnablerPermissive Federation Benefits and Limitations of Cloud The Cloud as an Employee Enabler Verified Federation Computing Service-Oriented Architecture (SOA)Encrypted Federation Benefits Evolving from SOA to the CloudTrusted Federation Limitations Capacity: Limited PerformanceUsing XMPP in the Federated Environment Cloud Computing Case Studies Availability: Communications Failure andPresence in the Cloud How Companies Are Using Cloud Performance IssuesWhat It Is Computing Security: Newer Security Protocols ProvidePresence Protocols Implementing Applications and Services More Protection Leveraging Presence in the Cloud What's Next in Cloud Computing Presence Enabled Using Your Company's Services vs. the Independent ComponentsThe Future of Presence Cloud Provider Message BaseThe Interrelation of Identity, Presence, and A Cloud Service Provider Introduced Location Independence Location in the Cloud Cloud Computing Risks and Issues Communication Requirements for CloudIdentity Management Products and Services Provided by Cloud ImplementationWhat It Is Computing Companies Public InternetFuture of Identity in the Cloud Economic Private InternetPrivacy and Its Relation to Cloud-Based Staffing Routing to the DatacenterInformation Systems Should Your Company Invest in Cloud Switching within the Data CenterPersonal Information Computing? BandwidthPrivacy-Related Issues What Should Not be Moved to the Cloud Tools Used to Measure NetworkFinding Your Private Information LANs and the Cloud PerformanceOpen Cloud Consortium Working Groups Internet and the Cloud Using the Protocol Analyzer to MeasureProject Matsu Web Services, Browsers, and the Cloud BandwidthProject Comet Thin Client Using Ping and Traceroute to MeasureHPC in the Cloud Advances in Networking and Processing Network Performance The Open Cloud Testbed Speeds that Led to Cloud Computing SecurityThe Open Science Data Cloud Networking Developments SSLIntercloud Testbed Increased Processing Speeds VPNReporting on an Open Cloud Consortium Managed Service Provider Model to Overhead Working Group Cloud Computing and Software as a Storage Options for Cloud ComputingDistributed Management Task Force Service (SaaS) Storage Capacity(DMTF) Single Purpose Architectures Migrate to Data Protection and Partitioning

Page 70: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

What It Is? Multipurpose Architectures NASDMTK Working Groups Associated with Data Center Virtualization SANCloud Computing Collaboration CASStandards for Application Developers The Cloud as a Reach Extender RedundancyProtocols The Cloud as a Communication Enabler ReplicationScripting Languages The Cloud as an Employee Enabler Multisiting Content Formatting Standards and Service-Oriented Architecture (SOA) Backup and Recovery Languages Evolving from SOA to the Cloud Server Software Environments thatStandards for Security in the Cloud Capacity: Limited Performance Support Cloud ComputingConfidentiality, Integrity, Availability Availability: Communications Failure and Server CapacityAuthentication, Authorization, Accountability Performance Issues VirtualizationRegulations for Privacy Security: Newer Security Protocols ClusteringSecurity Protocols Provide More Protection ExpansionEstablishing a Baseline for Cloud What's Next in Cloud Computing Server FunctionsPerformance Independent Components ApplicationBest Practices for Selecting a Vendor and Message Base WebImplementing Cloud-Based Applications Location Independence Database Choosing the Right Vendor Communication Requirements for Cloud Vendor Approaches to Cloud ComputingImplementing Cloud-Based Applications Implementation Role of Open Source Software in DataWindows Remote Desktop Public Internet CenterVnc Private Internet Cost Reduction vs. ReliabilityWeb Browsers Routing to the Datacenter Open Source Server SoftwareServer Extensions Switching within the Data Center Open Source Database SoftwareThin Clients Bandwidth Open Source Applications SoftwareSmart Phones, Pads, Pods, etc. Tools Used to Measure Network Open Source System ManagementVirtual Terminal Security Strengths and Performance SoftwareWeaknesses Using the Protocol Analyzer to Measure Open Source Load-Balancing Software Strengths Bandwidth Virtualization as the "Operating System"Weaknesses Using Ping and Traceroute to Measure Virtualization with a Host OperatingAndroid Network Performance System BlackBerry Security Virtualization Infections on VirtualizedWindows Mobile SSL EnvironmentsUbuntu Mobile Internet Device VPN Type 1 Virtualized EnvironmentMobile Platform Virtualization Overhead Type 2 Virtualized Environment Kernel-Based Virtual Machine Storage Options for Cloud Computing Virtualization EnvironmentsVMware Mobile Virtualization Platform Storage Capacity Microsoft VirtualizationCollaboration Applications for Mobile Data Protection and Partitioning Sun xVM VirtualBoxPlatforms NAS Linux/UNIX VirtualizationText Messaging SAN VMware ProductsiPhone Applications CAS Data Center and Cloud InfrastructureBlackBerry Applications Redundancy Products

Replication End-User and Desktop Products Multisiting IBM VirtualizationBackup and Recovery Using VMware to see a Virtualized Server

line Server Software Environments that Environment Cloud Computing Infrastructure Support Cloud Computing Permissive FederationCloud Computing Terms Server Capacity Verified FederationBenefits and Limitations of Cloud Computing Virtualization Encrypted FederationBenefits Clustering Trusted FederationLimitations Expansion Using XMPP in the Federated EnvironmentCloud Computing Case Studies Server Functions Presence in the CloudHow Companies Are Using Cloud Application What It IsComputing Web Presence ProtocolsImplementing Applications and Services in Database Leveraging Presencethe Cloud Vendor Approaches to Cloud Computing Presence EnabledUsing Your Company's Services vs. the Role of Open Source Software in Data The Future of PresenceCloud Provider Center The Interrelation of Identity, Presence, andA Cloud Service Provider Introduced Cost Reduction vs. Reliability Location in the Cloud Cloud Computing Risks and Issues Open Source Server Software Identity ManagementProducts and Services Provided by Cloud Open Source Database Software What It IsComputing Companies Open Source Applications Software Future of Identity in the Cloud Economic Open Source System Management Privacy and Its Relation to Cloud-BasedStaffing Software Information SystemsShould Your Company Invest in Cloud Open Source Load-Balancing Software Personal InformationComputing? Virtualization as the "Operating System" Privacy-Related Issues

Page 71: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

What Should Not be Moved to the Cloud Virtualization with a Host Operating Finding Your Private Information LANs and the Cloud System Open Cloud Consortium Working GroupsInternet and the Cloud Virtualization Infections on Virtualized Project MatsuWeb Services, Browsers, and the Cloud Environments Project CometThin Client Type 1 Virtualized Environment HPC in the CloudAdvances in Networking and Processing Type 2 Virtualized Environment The Open Cloud TestbedSpeeds that Led to Cloud Computing Virtualization Environments The Open Science Data CloudNetworking Developments Microsoft Virtualization Intercloud TestbedIncreased Processing Speeds Sun xVM VirtualBox Reporting on an Open Cloud ConsortiumManaged Service Provider Model to Cloud Linux/UNIX Virtualization Working Group Computing and Software as a Service VMware Products Distributed Management Task Force(SaaS) Data Center and Cloud Infrastructure (DMTF)Single Purpose Architectures Migrate to Products What It Is?Multipurpose Architectures End-User and Desktop Products DMTK Working Groups Associated withData Center Virtualization IBM Virtualization Cloud Computing Collaboration Using VMware to see a Virtualized Server Standards for Application DevelopersThe Cloud as a Reach Extender Environment ProtocolsThe Cloud as a Communication Enabler Permissive Federation Scripting LanguagesThe Cloud as an Employee Enabler Verified Federation Content Formatting Standards andService-Oriented Architecture (SOA) Encrypted Federation Languages Evolving from SOA to the Cloud Trusted Federation Standards for Security in the CloudCapacity: Limited Performance Using XMPP in the Federated Confidentiality, Integrity, AvailabilityAvailability: Communications Failure and Environment Authentication, Authorization,Performance Issues Presence in the Cloud AccountabilitySecurity: Newer Security Protocols Provide What It Is Regulations for PrivacyMore Protection Presence Protocols Security Protocols What's Next in Cloud Computing Leveraging Presence Establishing a Baseline for CloudIndependent Components Presence Enabled PerformanceMessage Base The Future of Presence Best Practices for Selecting a Vendor andLocation Independence The Interrelation of Identity, Presence, Implementing Cloud-Based ApplicationsCommunication Requirements for Cloud and Location in the Cloud Choosing the Right VendorImplementation Identity Management Implementing Cloud-Based Applications Public Internet What It Is Windows Remote DesktopPrivate Internet Future of Identity in the Cloud VncRouting to the Datacenter Privacy and Its Relation to Cloud-Based Web BrowsersSwitching within the Data Center Information Systems Server ExtensionsBandwidth Personal Information Thin ClientsTools Used to Measure Network Privacy-Related Issues Smart Phones, Pads, Pods, etc. Performance Finding Your Private Information Virtual Terminal Security Strengths andUsing the Protocol Analyzer to Measure Open Cloud Consortium Working Groups WeaknessesBandwidth Project Matsu StrengthsUsing Ping and Traceroute to Measure Project Comet Weaknesses Network Performance HPC in the Cloud AndroidSecurity The Open Cloud Testbed BlackBerrySSL The Open Science Data Cloud Windows MobileVPN Intercloud Testbed Ubuntu Mobile Internet Device Overhead Reporting on an Open Cloud Consortium Mobile Platform VirtualizationStorage Options for Cloud Computing Working Group Kernel-Based Virtual MachineStorage Capacity Distributed Management Task Force VMware Mobile Virtualization Platform Data Protection and Partitioning (DMTF) Collaboration Applications for MobileNAS What It Is? PlatformsSAN DMTK Working Groups Associated with Text MessagingCAS Cloud Computing iPhone ApplicationsRedundancy Standards for Application Developers BlackBerry ApplicationsReplication ProtocolsMultisiting Scripting LanguagesBackup and Recovery Content Formatting Standards andServer Software Environments that Support Languages lineCloud Computing Standards for Security in the Cloud Cloud Computing InfrastructureServer Capacity Confidentiality, Integrity, Availability Cloud Computing Terms Virtualization Authentication, Authorization, Benefits and Limitations of CloudClustering Accountability ComputingExpansion Regulations for Privacy BenefitsServer Functions Security Protocols LimitationsApplication Establishing a Baseline for Cloud Cloud Computing Case Studies

Page 72: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Web Performance How Companies Are Using CloudDatabase Best Practices for Selecting a Vendor ComputingVendor Approaches to Cloud Computing and Implementing Cloud-Based Implementing Applications and Services inRole of Open Source Software in Data Applications the CloudCenter Choosing the Right Vendor Using Your Company's Services vs. theCost Reduction vs. Reliability Implementing Cloud-Based Applications Cloud ProviderOpen Source Server Software Windows Remote Desktop A Cloud Service Provider Introduced Open Source Database Software Vnc Cloud Computing Risks and Issues Open Source Applications Software Web Browsers Products and Services Provided by CloudOpen Source System Management Software Server Extensions Computing Companies Open Source Load-Balancing Software Thin Clients EconomicVirtualization as the "Operating System" Smart Phones, Pads, Pods, etc. Staffing Virtualization with a Host Operating System Virtual Terminal Security Strengths and Should Your Company Invest in CloudVirtualization Infections on Virtualized Weaknesses Computing?Environments Strengths What Should Not be Moved to the Cloud Type 1 Virtualized Environment Weaknesses LANs and the CloudType 2 Virtualized Environment Android Internet and the CloudVirtualization Environments BlackBerry Web Services, Browsers, and the CloudMicrosoft Virtualization Windows Mobile Thin ClientSun xVM VirtualBox Ubuntu Mobile Internet Device Advances in Networking and ProcessingLinux/UNIX Virtualization Mobile Platform Virtualization Speeds that Led to Cloud ComputingVMware Products Kernel-Based Virtual Machine Networking DevelopmentsData Center and Cloud Infrastructure VMware Mobile Virtualization Platform Increased Processing Speeds Products Collaboration Applications for Mobile Managed Service Provider Model to CloudEnd-User and Desktop Products Platforms Computing and Software as a ServiceIBM Virtualization Text Messaging (SaaS)Using VMware to see a Virtualized Server iPhone Applications Single Purpose Architectures Migrate toEnvironment BlackBerry Applications Multipurpose ArchitecturesPermissive Federation Data Center Virtualization Verified Federation CollaborationEncrypted Federation The Cloud as a Reach ExtenderTrusted Federation line The Cloud as a Communication EnablerUsing XMPP in the Federated Environment Cloud Computing Infrastructure The Cloud as an Employee Enabler Presence in the Cloud Cloud Computing Terms Service-Oriented Architecture (SOA)What It Is Benefits and Limitations of Cloud Evolving from SOA to the CloudPresence Protocols Computing Capacity: Limited PerformanceLeveraging Presence Benefits Availability: Communications Failure andPresence Enabled Limitations Performance IssuesThe Future of Presence Cloud Computing Case Studies Security: Newer Security Protocols ProvideThe Interrelation of Identity, Presence, and How Companies Are Using Cloud More Protection Location in the Cloud Computing What's Next in Cloud Computing Identity Management Implementing Applications and Services Independent ComponentsWhat It Is in the Cloud Message BaseFuture of Identity in the Cloud Using Your Company's Services vs. the Location Independence Privacy and Its Relation to Cloud-Based Cloud Provider Communication Requirements for CloudInformation Systems A Cloud Service Provider Introduced ImplementationPersonal Information Cloud Computing Risks and Issues Public InternetPrivacy-Related Issues Products and Services Provided by Cloud Private InternetFinding Your Private Information Computing Companies Routing to the DatacenterOpen Cloud Consortium Working Groups Economic Switching within the Data CenterProject Matsu Staffing BandwidthProject Comet Should Your Company Invest in Cloud Tools Used to Measure NetworkHPC in the Cloud Computing? PerformanceThe Open Cloud Testbed What Should Not be Moved to the Cloud Using the Protocol Analyzer to MeasureThe Open Science Data Cloud LANs and the Cloud BandwidthIntercloud Testbed Internet and the Cloud Using Ping and Traceroute to MeasureReporting on an Open Cloud Consortium Web Services, Browsers, and the Cloud Network Performance Working Group Thin Client SecurityDistributed Management Task Force Advances in Networking and Processing SSL(DMTF) Speeds that Led to Cloud Computing VPNWhat It Is? Networking Developments Overhead DMTK Working Groups Associated with Increased Processing Speeds Storage Options for Cloud ComputingCloud Computing Managed Service Provider Model to Storage CapacityStandards for Application Developers Cloud Computing and Software as a Data Protection and PartitioningProtocols Service (SaaS) NAS

Page 73: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Scripting Languages Single Purpose Architectures Migrate to SANContent Formatting Standards and Multipurpose Architectures CASLanguages Data Center Virtualization RedundancyStandards for Security in the Cloud Collaboration ReplicationConfidentiality, Integrity, Availability The Cloud as a Reach Extender Multisiting Authentication, Authorization, Accountability The Cloud as a Communication Enabler Backup and Recovery Regulations for Privacy The Cloud as an Employee Enabler Server Software Environments thatSecurity Protocols Service-Oriented Architecture (SOA) Support Cloud ComputingEstablishing a Baseline for Cloud Evolving from SOA to the Cloud Server CapacityPerformance Capacity: Limited Performance VirtualizationBest Practices for Selecting a Vendor and Availability: Communications Failure and ClusteringImplementing Cloud-Based Applications Performance Issues ExpansionChoosing the Right Vendor Security: Newer Security Protocols Server FunctionsImplementing Cloud-Based Applications Provide More Protection ApplicationWindows Remote Desktop What's Next in Cloud Computing WebVnc Independent Components Database Web Browsers Message Base Vendor Approaches to Cloud ComputingServer Extensions Location Independence Role of Open Source Software in DataThin Clients Communication Requirements for Cloud CenterSmart Phones, Pads, Pods, etc. Implementation Cost Reduction vs. ReliabilityVirtual Terminal Security Strengths and Public Internet Open Source Server SoftwareWeaknesses Private Internet Open Source Database SoftwareStrengths Routing to the Datacenter Open Source Applications SoftwareWeaknesses Switching within the Data Center Open Source System ManagementAndroid Bandwidth SoftwareBlackBerry Tools Used to Measure Network Open Source Load-Balancing Software Windows Mobile Performance Virtualization as the "Operating System"Ubuntu Mobile Internet Device Using the Protocol Analyzer to Measure Virtualization with a Host OperatingMobile Platform Virtualization Bandwidth System Kernel-Based Virtual Machine Using Ping and Traceroute to Measure Virtualization Infections on VirtualizedVMware Mobile Virtualization Platform Network Performance EnvironmentsCollaboration Applications for Mobile Security Type 1 Virtualized EnvironmentPlatforms SSL Type 2 Virtualized Environment Text Messaging VPN Virtualization EnvironmentsiPhone Applications Overhead Microsoft VirtualizationBlackBerry Applications Storage Options for Cloud Computing Sun xVM VirtualBox

Storage Capacity Linux/UNIX VirtualizationData Protection and Partitioning VMware ProductsNAS Data Center and Cloud Infrastructure

line SAN ProductsCloud Computing Infrastructure CAS End-User and Desktop Products Cloud Computing Terms Redundancy IBM VirtualizationBenefits and Limitations of Cloud Computing Replication Using VMware to see a Virtualized ServerBenefits Multisiting Environment Limitations Backup and Recovery Permissive FederationCloud Computing Case Studies Server Software Environments that Verified FederationHow Companies Are Using Cloud Support Cloud Computing Encrypted FederationComputing Server Capacity Trusted FederationImplementing Applications and Services in Virtualization Using XMPP in the Federated Environmentthe Cloud Clustering Presence in the CloudUsing Your Company's Services vs. the Expansion What It IsCloud Provider Server Functions Presence ProtocolsA Cloud Service Provider Introduced Application Leveraging PresenceCloud Computing Risks and Issues Web Presence EnabledProducts and Services Provided by Cloud Database The Future of PresenceComputing Companies Vendor Approaches to Cloud Computing The Interrelation of Identity, Presence, andEconomic Role of Open Source Software in Data Location in the Cloud Staffing Center Identity ManagementShould Your Company Invest in Cloud Cost Reduction vs. Reliability What It IsComputing? Open Source Server Software Future of Identity in the Cloud What Should Not be Moved to the Cloud Open Source Database Software Privacy and Its Relation to Cloud-BasedLANs and the Cloud Open Source Applications Software Information SystemsInternet and the Cloud Open Source System Management Personal InformationWeb Services, Browsers, and the Cloud Software Privacy-Related IssuesThin Client Open Source Load-Balancing Software Finding Your Private Information

Page 74: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Advances in Networking and Processing Virtualization as the "Operating System" Open Cloud Consortium Working GroupsSpeeds that Led to Cloud Computing Virtualization with a Host Operating Project MatsuNetworking Developments System Project CometIncreased Processing Speeds Virtualization Infections on Virtualized HPC in the CloudManaged Service Provider Model to Cloud Environments The Open Cloud TestbedComputing and Software as a Service Type 1 Virtualized Environment The Open Science Data Cloud(SaaS) Type 2 Virtualized Environment Intercloud TestbedSingle Purpose Architectures Migrate to Virtualization Environments Reporting on an Open Cloud ConsortiumMultipurpose Architectures Microsoft Virtualization Working Group Data Center Virtualization Sun xVM VirtualBox Distributed Management Task ForceCollaboration Linux/UNIX Virtualization (DMTF)The Cloud as a Reach Extender VMware Products What It Is?The Cloud as a Communication Enabler Data Center and Cloud Infrastructure DMTK Working Groups Associated withThe Cloud as an Employee Enabler Products Cloud Computing Service-Oriented Architecture (SOA) End-User and Desktop Products Standards for Application DevelopersEvolving from SOA to the Cloud IBM Virtualization ProtocolsCapacity: Limited Performance Using VMware to see a Virtualized Server Scripting LanguagesAvailability: Communications Failure and Environment Content Formatting Standards andPerformance Issues Permissive Federation Languages Security: Newer Security Protocols Provide Verified Federation Standards for Security in the CloudMore Protection Encrypted Federation Confidentiality, Integrity, AvailabilityWhat's Next in Cloud Computing Trusted Federation Authentication, Authorization,Independent Components Using XMPP in the Federated AccountabilityMessage Base Environment Regulations for PrivacyLocation Independence Presence in the Cloud Security Protocols Communication Requirements for Cloud What It Is Establishing a Baseline for CloudImplementation Presence Protocols PerformancePublic Internet Leveraging Presence Best Practices for Selecting a Vendor andPrivate Internet Presence Enabled Implementing Cloud-Based ApplicationsRouting to the Datacenter The Future of Presence Choosing the Right VendorSwitching within the Data Center The Interrelation of Identity, Presence, Implementing Cloud-Based Applications Bandwidth and Location in the Cloud Windows Remote DesktopTools Used to Measure Network Identity Management VncPerformance What It Is Web BrowsersUsing the Protocol Analyzer to Measure Future of Identity in the Cloud Server ExtensionsBandwidth Privacy and Its Relation to Cloud-Based Thin ClientsUsing Ping and Traceroute to Measure Information Systems Smart Phones, Pads, Pods, etc. Network Performance Personal Information Virtual Terminal Security Strengths andSecurity Privacy-Related Issues WeaknessesSSL Finding Your Private Information StrengthsVPN Open Cloud Consortium Working Groups Weaknesses Overhead Project Matsu AndroidStorage Options for Cloud Computing Project Comet BlackBerryStorage Capacity HPC in the Cloud Windows MobileData Protection and Partitioning The Open Cloud Testbed Ubuntu Mobile Internet Device NAS The Open Science Data Cloud Mobile Platform VirtualizationSAN Intercloud Testbed Kernel-Based Virtual MachineCAS Reporting on an Open Cloud Consortium VMware Mobile Virtualization Platform Redundancy Working Group Collaboration Applications for MobileReplication Distributed Management Task Force PlatformsMultisiting (DMTF) Text MessagingBackup and Recovery What It Is? iPhone ApplicationsServer Software Environments that Support DMTK Working Groups Associated with BlackBerry ApplicationsCloud Computing Cloud Computing Server Capacity Standards for Application DevelopersVirtualization Protocols 10. Mobility and the CloudClustering Scripting Languages lineExpansion Content Formatting Standards and Mobile Operating Systems forServer Functions Languages SmartphonesApplication Standards for Security in the Cloud iPhoneWeb Confidentiality, Integrity, AvailabilityDatabase Authentication, Authorization,Vendor Approaches to Cloud Computing Accountability lineRole of Open Source Software in Data Regulations for Privacy Cloud Computing InfrastructureCenter Security Protocols Cloud Computing Terms

Page 75: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Cost Reduction vs. Reliability Establishing a Baseline for Cloud Benefits and Limitations of CloudOpen Source Server Software Performance ComputingOpen Source Database Software Best Practices for Selecting a Vendor BenefitsOpen Source Applications Software and Implementing Cloud-Based LimitationsOpen Source System Management Software Applications Cloud Computing Case Studies Open Source Load-Balancing Software Choosing the Right Vendor How Companies Are Using CloudVirtualization as the "Operating System" Implementing Cloud-Based Applications ComputingVirtualization with a Host Operating System Windows Remote Desktop Implementing Applications and Services inVirtualization Infections on Virtualized Vnc the CloudEnvironments Web Browsers Using Your Company's Services vs. theType 1 Virtualized Environment Server Extensions Cloud ProviderType 2 Virtualized Environment Thin Clients A Cloud Service Provider Introduced Virtualization Environments Smart Phones, Pads, Pods, etc. Cloud Computing Risks and Issues Microsoft Virtualization Virtual Terminal Security Strengths and Products and Services Provided by CloudSun xVM VirtualBox Weaknesses Computing Companies Linux/UNIX Virtualization Strengths EconomicVMware Products Weaknesses Staffing Data Center and Cloud Infrastructure Android Should Your Company Invest in CloudProducts BlackBerry Computing?End-User and Desktop Products Windows Mobile What Should Not be Moved to the Cloud IBM Virtualization Ubuntu Mobile Internet Device LANs and the CloudUsing VMware to see a Virtualized Server Mobile Platform Virtualization Internet and the CloudEnvironment Kernel-Based Virtual Machine Web Services, Browsers, and the CloudPermissive Federation VMware Mobile Virtualization Platform Thin ClientVerified Federation Collaboration Applications for Mobile Advances in Networking and ProcessingEncrypted Federation Platforms Speeds that Led to Cloud ComputingTrusted Federation Text Messaging Networking DevelopmentsUsing XMPP in the Federated Environment iPhone Applications Increased Processing Speeds Presence in the Cloud BlackBerry Applications Managed Service Provider Model to CloudWhat It Is Computing and Software as a ServicePresence Protocols (SaaS)Leveraging Presence 7. Federation, Presence, Security, and Single Purpose Architectures Migrate toPresence Enabled Privacy in the Cloud Multipurpose ArchitecturesThe Future of Presence line Data Center Virtualization The Interrelation of Identity, Presence, and Federation in the Cloud CollaborationLocation in the Cloud What It Is The Cloud as a Reach ExtenderIdentity Management The Cloud as a Communication EnablerWhat It Is The Cloud as an Employee Enabler Future of Identity in the Cloud line Service-Oriented Architecture (SOA)Privacy and Its Relation to Cloud-Based Cloud Computing Infrastructure Evolving from SOA to the CloudInformation Systems Cloud Computing Terms Capacity: Limited PerformancePersonal Information Benefits and Limitations of Cloud Availability: Communications Failure andPrivacy-Related Issues Computing Performance IssuesFinding Your Private Information Benefits Security: Newer Security Protocols ProvideOpen Cloud Consortium Working Groups Limitations More Protection Project Matsu Cloud Computing Case Studies What's Next in Cloud Computing Project Comet How Companies Are Using Cloud Independent ComponentsHPC in the Cloud Computing Message BaseThe Open Cloud Testbed Implementing Applications and Services Location Independence The Open Science Data Cloud in the Cloud Communication Requirements for CloudIntercloud Testbed Using Your Company's Services vs. the ImplementationReporting on an Open Cloud Consortium Cloud Provider Public InternetWorking Group A Cloud Service Provider Introduced Private InternetDistributed Management Task Force Cloud Computing Risks and Issues Routing to the Datacenter(DMTF) Products and Services Provided by Cloud Switching within the Data CenterWhat It Is? Computing Companies BandwidthDMTK Working Groups Associated with Economic Tools Used to Measure NetworkCloud Computing Staffing PerformanceStandards for Application Developers Should Your Company Invest in Cloud Using the Protocol Analyzer to MeasureProtocols Computing? BandwidthScripting Languages What Should Not be Moved to the Cloud Using Ping and Traceroute to MeasureContent Formatting Standards and LANs and the Cloud Network Performance Languages Internet and the Cloud SecurityStandards for Security in the Cloud Web Services, Browsers, and the Cloud SSLConfidentiality, Integrity, Availability Thin Client VPN

Page 76: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Authentication, Authorization, Accountability Advances in Networking and Processing Overhead Regulations for Privacy Speeds that Led to Cloud Computing Storage Options for Cloud ComputingSecurity Protocols Networking Developments Storage CapacityEstablishing a Baseline for Cloud Increased Processing Speeds Data Protection and PartitioningPerformance Managed Service Provider Model to NASBest Practices for Selecting a Vendor and Cloud Computing and Software as a SANImplementing Cloud-Based Applications Service (SaaS) CASChoosing the Right Vendor Single Purpose Architectures Migrate to RedundancyImplementing Cloud-Based Applications Multipurpose Architectures ReplicationWindows Remote Desktop Data Center Virtualization Multisiting Vnc Collaboration Backup and Recovery Web Browsers The Cloud as a Reach Extender Server Software Environments thatServer Extensions The Cloud as a Communication Enabler Support Cloud ComputingThin Clients The Cloud as an Employee Enabler Server CapacitySmart Phones, Pads, Pods, etc. Service-Oriented Architecture (SOA) VirtualizationVirtual Terminal Security Strengths and Evolving from SOA to the Cloud ClusteringWeaknesses Capacity: Limited Performance ExpansionStrengths Availability: Communications Failure and Server FunctionsWeaknesses Performance Issues ApplicationAndroid Security: Newer Security Protocols WebBlackBerry Provide More Protection Database Windows Mobile What's Next in Cloud Computing Vendor Approaches to Cloud ComputingUbuntu Mobile Internet Device Independent Components Role of Open Source Software in DataMobile Platform Virtualization Message Base CenterKernel-Based Virtual Machine Location Independence Cost Reduction vs. ReliabilityVMware Mobile Virtualization Platform Communication Requirements for Cloud Open Source Server SoftwareCollaboration Applications for Mobile Implementation Open Source Database SoftwarePlatforms Public Internet Open Source Applications SoftwareText Messaging Private Internet Open Source System ManagementiPhone Applications Routing to the Datacenter SoftwareBlackBerry Applications Switching within the Data Center Open Source Load-Balancing Software

Bandwidth Virtualization as the "Operating System"Tools Used to Measure Network Virtualization with a Host OperatingPerformance System

line Using the Protocol Analyzer to Measure Virtualization Infections on VirtualizedCloud Computing Infrastructure Bandwidth EnvironmentsCloud Computing Terms Using Ping and Traceroute to Measure Type 1 Virtualized EnvironmentBenefits and Limitations of Cloud Computing Network Performance Type 2 Virtualized Environment Benefits Security Virtualization EnvironmentsLimitations SSL Microsoft VirtualizationCloud Computing Case Studies VPN Sun xVM VirtualBoxHow Companies Are Using Cloud Overhead Linux/UNIX VirtualizationComputing Storage Options for Cloud Computing VMware ProductsImplementing Applications and Services in Storage Capacity Data Center and Cloud Infrastructurethe Cloud Data Protection and Partitioning ProductsUsing Your Company's Services vs. the NAS End-User and Desktop Products Cloud Provider SAN IBM VirtualizationA Cloud Service Provider Introduced CAS Using VMware to see a Virtualized ServerCloud Computing Risks and Issues Redundancy Environment Products and Services Provided by Cloud Replication Permissive FederationComputing Companies Multisiting Verified FederationEconomic Backup and Recovery Encrypted FederationStaffing Server Software Environments that Trusted FederationShould Your Company Invest in Cloud Support Cloud Computing Using XMPP in the Federated EnvironmentComputing? Server Capacity Presence in the CloudWhat Should Not be Moved to the Cloud Virtualization What It IsLANs and the Cloud Clustering Presence ProtocolsInternet and the Cloud Expansion Leveraging PresenceWeb Services, Browsers, and the Cloud Server Functions Presence EnabledThin Client Application The Future of PresenceAdvances in Networking and Processing Web The Interrelation of Identity, Presence, andSpeeds that Led to Cloud Computing Database Location in the Cloud Networking Developments Vendor Approaches to Cloud Computing Identity ManagementIncreased Processing Speeds Role of Open Source Software in Data What It IsManaged Service Provider Model to Cloud Center Future of Identity in the Cloud

Page 77: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Computing and Software as a Service Cost Reduction vs. Reliability Privacy and Its Relation to Cloud-Based(SaaS) Open Source Server Software Information SystemsSingle Purpose Architectures Migrate to Open Source Database Software Personal InformationMultipurpose Architectures Open Source Applications Software Privacy-Related IssuesData Center Virtualization Open Source System Management Finding Your Private Information Collaboration Software Open Cloud Consortium Working GroupsThe Cloud as a Reach Extender Open Source Load-Balancing Software Project MatsuThe Cloud as a Communication Enabler Virtualization as the "Operating System" Project CometThe Cloud as an Employee Enabler Virtualization with a Host Operating HPC in the CloudService-Oriented Architecture (SOA) System The Open Cloud TestbedEvolving from SOA to the Cloud Virtualization Infections on Virtualized The Open Science Data CloudCapacity: Limited Performance Environments Intercloud TestbedAvailability: Communications Failure and Type 1 Virtualized Environment Reporting on an Open Cloud ConsortiumPerformance Issues Type 2 Virtualized Environment Working Group Security: Newer Security Protocols Provide Virtualization Environments Distributed Management Task ForceMore Protection Microsoft Virtualization (DMTF)What's Next in Cloud Computing Sun xVM VirtualBox What It Is?Independent Components Linux/UNIX Virtualization DMTK Working Groups Associated withMessage Base VMware Products Cloud Computing Location Independence Data Center and Cloud Infrastructure Standards for Application DevelopersCommunication Requirements for Cloud Products ProtocolsImplementation End-User and Desktop Products Scripting LanguagesPublic Internet IBM Virtualization Content Formatting Standards andPrivate Internet Using VMware to see a Virtualized Server Languages Routing to the Datacenter Environment Standards for Security in the CloudSwitching within the Data Center Permissive Federation Confidentiality, Integrity, AvailabilityBandwidth Verified Federation Authentication, Authorization,Tools Used to Measure Network Encrypted Federation AccountabilityPerformance Trusted Federation Regulations for PrivacyUsing the Protocol Analyzer to Measure Using XMPP in the Federated Security Protocols Bandwidth Environment Establishing a Baseline for CloudUsing Ping and Traceroute to Measure Presence in the Cloud PerformanceNetwork Performance What It Is Best Practices for Selecting a Vendor andSecurity Presence Protocols Implementing Cloud-Based ApplicationsSSL Leveraging Presence Choosing the Right VendorVPN Presence Enabled Implementing Cloud-Based Applications Overhead The Future of Presence Windows Remote DesktopStorage Options for Cloud Computing The Interrelation of Identity, Presence, VncStorage Capacity and Location in the Cloud Web BrowsersData Protection and Partitioning Identity Management Server ExtensionsNAS What It Is Thin ClientsSAN Future of Identity in the Cloud Smart Phones, Pads, Pods, etc. CAS Privacy and Its Relation to Cloud-Based Virtual Terminal Security Strengths andRedundancy Information Systems WeaknessesReplication Personal Information StrengthsMultisiting Privacy-Related Issues Weaknesses Backup and Recovery Finding Your Private Information AndroidServer Software Environments that Support Open Cloud Consortium Working Groups BlackBerryCloud Computing Project Matsu Windows MobileServer Capacity Project Comet Ubuntu Mobile Internet Device Virtualization HPC in the Cloud Mobile Platform VirtualizationClustering The Open Cloud Testbed Kernel-Based Virtual MachineExpansion The Open Science Data Cloud VMware Mobile Virtualization Platform Server Functions Intercloud Testbed Collaboration Applications for MobileApplication Reporting on an Open Cloud Consortium PlatformsWeb Working Group Text MessagingDatabase Distributed Management Task Force iPhone ApplicationsVendor Approaches to Cloud Computing (DMTF) BlackBerry ApplicationsRole of Open Source Software in Data What It Is?Center DMTK Working Groups Associated withCost Reduction vs. Reliability Cloud Computing Open Source Server Software Standards for Application Developers lineOpen Source Database Software Protocols Cloud Computing InfrastructureOpen Source Applications Software Scripting Languages Cloud Computing Terms Open Source System Management Software Content Formatting Standards and Benefits and Limitations of Cloud

Page 78: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Open Source Load-Balancing Software Languages ComputingVirtualization as the "Operating System" Standards for Security in the Cloud BenefitsVirtualization with a Host Operating System Confidentiality, Integrity, Availability LimitationsVirtualization Infections on Virtualized Authentication, Authorization, Cloud Computing Case Studies Environments Accountability How Companies Are Using CloudType 1 Virtualized Environment Regulations for Privacy ComputingType 2 Virtualized Environment Security Protocols Implementing Applications and Services inVirtualization Environments Establishing a Baseline for Cloud the CloudMicrosoft Virtualization Performance Using Your Company's Services vs. theSun xVM VirtualBox Best Practices for Selecting a Vendor Cloud ProviderLinux/UNIX Virtualization and Implementing Cloud-Based A Cloud Service Provider Introduced VMware Products Applications Cloud Computing Risks and Issues Data Center and Cloud Infrastructure Choosing the Right Vendor Products and Services Provided by CloudProducts Implementing Cloud-Based Applications Computing Companies End-User and Desktop Products Windows Remote Desktop EconomicIBM Virtualization Vnc Staffing Using VMware to see a Virtualized Server Web Browsers Should Your Company Invest in CloudEnvironment Server Extensions Computing?Permissive Federation Thin Clients What Should Not be Moved to the Cloud Verified Federation Smart Phones, Pads, Pods, etc. LANs and the CloudEncrypted Federation Virtual Terminal Security Strengths and Internet and the CloudTrusted Federation Weaknesses Web Services, Browsers, and the CloudUsing XMPP in the Federated Environment Strengths Thin ClientPresence in the Cloud Weaknesses Advances in Networking and ProcessingWhat It Is Android Speeds that Led to Cloud ComputingPresence Protocols BlackBerry Networking DevelopmentsLeveraging Presence Windows Mobile Increased Processing Speeds Presence Enabled Ubuntu Mobile Internet Device Managed Service Provider Model to CloudThe Future of Presence Mobile Platform Virtualization Computing and Software as a ServiceThe Interrelation of Identity, Presence, and Kernel-Based Virtual Machine (SaaS)Location in the Cloud VMware Mobile Virtualization Platform Single Purpose Architectures Migrate toIdentity Management Collaboration Applications for Mobile Multipurpose ArchitecturesWhat It Is Platforms Data Center Virtualization Future of Identity in the Cloud Text Messaging CollaborationPrivacy and Its Relation to Cloud-Based iPhone Applications The Cloud as a Reach ExtenderInformation Systems BlackBerry Applications The Cloud as a Communication EnablerPersonal Information The Cloud as an Employee Enabler Privacy-Related Issues Service-Oriented Architecture (SOA)Finding Your Private Information Evolving from SOA to the CloudOpen Cloud Consortium Working Groups line Capacity: Limited PerformanceProject Matsu Cloud Computing Infrastructure Availability: Communications Failure andProject Comet Cloud Computing Terms Performance IssuesHPC in the Cloud Benefits and Limitations of Cloud Security: Newer Security Protocols ProvideThe Open Cloud Testbed Computing More Protection The Open Science Data Cloud Benefits What's Next in Cloud Computing Intercloud Testbed Limitations Independent ComponentsReporting on an Open Cloud Consortium Cloud Computing Case Studies Message BaseWorking Group How Companies Are Using Cloud Location Independence Distributed Management Task Force Computing Communication Requirements for Cloud(DMTF) Implementing Applications and Services ImplementationWhat It Is? in the Cloud Public InternetDMTK Working Groups Associated with Using Your Company's Services vs. the Private InternetCloud Computing Cloud Provider Routing to the DatacenterStandards for Application Developers A Cloud Service Provider Introduced Switching within the Data CenterProtocols Cloud Computing Risks and Issues BandwidthScripting Languages Products and Services Provided by Cloud Tools Used to Measure NetworkContent Formatting Standards and Computing Companies PerformanceLanguages Economic Using the Protocol Analyzer to MeasureStandards for Security in the Cloud Staffing BandwidthConfidentiality, Integrity, Availability Should Your Company Invest in Cloud Using Ping and Traceroute to MeasureAuthentication, Authorization, Accountability Computing? Network Performance Regulations for Privacy What Should Not be Moved to the Cloud SecuritySecurity Protocols LANs and the Cloud SSLEstablishing a Baseline for Cloud Internet and the Cloud VPNPerformance Web Services, Browsers, and the Cloud Overhead

Page 79: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Best Practices for Selecting a Vendor and Thin Client Storage Options for Cloud ComputingImplementing Cloud-Based Applications Advances in Networking and Processing Storage CapacityChoosing the Right Vendor Speeds that Led to Cloud Computing Data Protection and PartitioningImplementing Cloud-Based Applications Networking Developments NASWindows Remote Desktop Increased Processing Speeds SANVnc Managed Service Provider Model to CASWeb Browsers Cloud Computing and Software as a RedundancyServer Extensions Service (SaaS) ReplicationThin Clients Single Purpose Architectures Migrate to Multisiting Smart Phones, Pads, Pods, etc. Multipurpose Architectures Backup and Recovery Virtual Terminal Security Strengths and Data Center Virtualization Server Software Environments thatWeaknesses Collaboration Support Cloud ComputingStrengths The Cloud as a Reach Extender Server CapacityWeaknesses The Cloud as a Communication Enabler VirtualizationAndroid The Cloud as an Employee Enabler ClusteringBlackBerry Service-Oriented Architecture (SOA) ExpansionWindows Mobile Evolving from SOA to the Cloud Server FunctionsUbuntu Mobile Internet Device Capacity: Limited Performance ApplicationMobile Platform Virtualization Availability: Communications Failure and WebKernel-Based Virtual Machine Performance Issues Database VMware Mobile Virtualization Platform Security: Newer Security Protocols Vendor Approaches to Cloud ComputingCollaboration Applications for Mobile Provide More Protection Role of Open Source Software in DataPlatforms What's Next in Cloud Computing CenterText Messaging Independent Components Cost Reduction vs. ReliabilityiPhone Applications Message Base Open Source Server SoftwareBlackBerry Applications Location Independence Open Source Database Software

Communication Requirements for Cloud Open Source Applications SoftwareImplementation Open Source System ManagementPublic Internet Software

line Private Internet Open Source Load-Balancing Software Cloud Computing Infrastructure Routing to the Datacenter Virtualization as the "Operating System"Cloud Computing Terms Switching within the Data Center Virtualization with a Host OperatingBenefits and Limitations of Cloud Computing Bandwidth System Benefits Tools Used to Measure Network Virtualization Infections on VirtualizedLimitations Performance EnvironmentsCloud Computing Case Studies Using the Protocol Analyzer to Measure Type 1 Virtualized EnvironmentHow Companies Are Using Cloud Bandwidth Type 2 Virtualized Environment Computing Using Ping and Traceroute to Measure Virtualization EnvironmentsImplementing Applications and Services in Network Performance Microsoft Virtualizationthe Cloud Security Sun xVM VirtualBoxUsing Your Company's Services vs. the SSL Linux/UNIX VirtualizationCloud Provider VPN VMware ProductsA Cloud Service Provider Introduced Overhead Data Center and Cloud InfrastructureCloud Computing Risks and Issues Storage Options for Cloud Computing ProductsProducts and Services Provided by Cloud Storage Capacity End-User and Desktop Products Computing Companies Data Protection and Partitioning IBM VirtualizationEconomic NAS Using VMware to see a Virtualized ServerStaffing SAN Environment Should Your Company Invest in Cloud CAS Permissive FederationComputing? Redundancy Verified FederationWhat Should Not be Moved to the Cloud Replication Encrypted FederationLANs and the Cloud Multisiting Trusted FederationInternet and the Cloud Backup and Recovery Using XMPP in the Federated EnvironmentWeb Services, Browsers, and the Cloud Server Software Environments that Presence in the CloudThin Client Support Cloud Computing What It IsAdvances in Networking and Processing Server Capacity Presence ProtocolsSpeeds that Led to Cloud Computing Virtualization Leveraging PresenceNetworking Developments Clustering Presence EnabledIncreased Processing Speeds Expansion The Future of PresenceManaged Service Provider Model to Cloud Server Functions The Interrelation of Identity, Presence, andComputing and Software as a Service Application Location in the Cloud (SaaS) Web Identity ManagementSingle Purpose Architectures Migrate to Database What It IsMultipurpose Architectures Vendor Approaches to Cloud Computing Future of Identity in the Cloud Data Center Virtualization Role of Open Source Software in Data Privacy and Its Relation to Cloud-Based

Page 80: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Collaboration Center Information SystemsThe Cloud as a Reach Extender Cost Reduction vs. Reliability Personal InformationThe Cloud as a Communication Enabler Open Source Server Software Privacy-Related IssuesThe Cloud as an Employee Enabler Open Source Database Software Finding Your Private Information Service-Oriented Architecture (SOA) Open Source Applications Software Open Cloud Consortium Working GroupsEvolving from SOA to the Cloud Open Source System Management Project MatsuCapacity: Limited Performance Software Project CometAvailability: Communications Failure and Open Source Load-Balancing Software HPC in the CloudPerformance Issues Virtualization as the "Operating System" The Open Cloud TestbedSecurity: Newer Security Protocols Provide Virtualization with a Host Operating The Open Science Data CloudMore Protection System Intercloud TestbedWhat's Next in Cloud Computing Virtualization Infections on Virtualized Reporting on an Open Cloud ConsortiumIndependent Components Environments Working Group Message Base Type 1 Virtualized Environment Distributed Management Task ForceLocation Independence Type 2 Virtualized Environment (DMTF)Communication Requirements for Cloud Virtualization Environments What It Is?Implementation Microsoft Virtualization DMTK Working Groups Associated withPublic Internet Sun xVM VirtualBox Cloud Computing Private Internet Linux/UNIX Virtualization Standards for Application DevelopersRouting to the Datacenter VMware Products ProtocolsSwitching within the Data Center Data Center and Cloud Infrastructure Scripting LanguagesBandwidth Products Content Formatting Standards andTools Used to Measure Network End-User and Desktop Products Languages Performance IBM Virtualization Standards for Security in the CloudUsing the Protocol Analyzer to Measure Using VMware to see a Virtualized Server Confidentiality, Integrity, AvailabilityBandwidth Environment Authentication, Authorization,Using Ping and Traceroute to Measure Permissive Federation AccountabilityNetwork Performance Verified Federation Regulations for PrivacySecurity Encrypted Federation Security Protocols SSL Trusted Federation Establishing a Baseline for CloudVPN Using XMPP in the Federated PerformanceOverhead Environment Best Practices for Selecting a Vendor andStorage Options for Cloud Computing Presence in the Cloud Implementing Cloud-Based ApplicationsStorage Capacity What It Is Choosing the Right VendorData Protection and Partitioning Presence Protocols Implementing Cloud-Based Applications NAS Leveraging Presence Windows Remote DesktopSAN Presence Enabled VncCAS The Future of Presence Web BrowsersRedundancy The Interrelation of Identity, Presence, Server ExtensionsReplication and Location in the Cloud Thin ClientsMultisiting Identity Management Smart Phones, Pads, Pods, etc. Backup and Recovery What It Is Virtual Terminal Security Strengths andServer Software Environments that Support Future of Identity in the Cloud WeaknessesCloud Computing Privacy and Its Relation to Cloud-Based StrengthsServer Capacity Information Systems Weaknesses Virtualization Personal Information AndroidClustering Privacy-Related Issues BlackBerryExpansion Finding Your Private Information Windows MobileServer Functions Open Cloud Consortium Working Groups Ubuntu Mobile Internet Device Application Project Matsu Mobile Platform VirtualizationWeb Project Comet Kernel-Based Virtual MachineDatabase HPC in the Cloud VMware Mobile Virtualization Platform Vendor Approaches to Cloud Computing The Open Cloud Testbed Collaboration Applications for MobileRole of Open Source Software in Data The Open Science Data Cloud PlatformsCenter Intercloud Testbed Text MessagingCost Reduction vs. Reliability Reporting on an Open Cloud Consortium iPhone ApplicationsOpen Source Server Software Working Group BlackBerry ApplicationsOpen Source Database Software Distributed Management Task ForceOpen Source Applications Software (DMTF)Open Source System Management Software What It Is?Open Source Load-Balancing Software DMTK Working Groups Associated with lineVirtualization as the "Operating System" Cloud Computing Cloud Computing InfrastructureVirtualization with a Host Operating System Standards for Application Developers Cloud Computing Terms Virtualization Infections on Virtualized Protocols Benefits and Limitations of CloudEnvironments Scripting Languages Computing

Page 81: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Type 1 Virtualized Environment Content Formatting Standards and BenefitsType 2 Virtualized Environment Languages LimitationsVirtualization Environments Standards for Security in the Cloud Cloud Computing Case Studies Microsoft Virtualization Confidentiality, Integrity, Availability How Companies Are Using CloudSun xVM VirtualBox Authentication, Authorization, ComputingLinux/UNIX Virtualization Accountability Implementing Applications and Services inVMware Products Regulations for Privacy the CloudData Center and Cloud Infrastructure Security Protocols Using Your Company's Services vs. theProducts Establishing a Baseline for Cloud Cloud ProviderEnd-User and Desktop Products Performance A Cloud Service Provider Introduced IBM Virtualization Best Practices for Selecting a Vendor Cloud Computing Risks and Issues Using VMware to see a Virtualized Server and Implementing Cloud-Based Products and Services Provided by CloudEnvironment Applications Computing Companies Permissive Federation Choosing the Right Vendor EconomicVerified Federation Implementing Cloud-Based Applications Staffing Encrypted Federation Windows Remote Desktop Should Your Company Invest in CloudTrusted Federation Vnc Computing?Using XMPP in the Federated Environment Web Browsers What Should Not be Moved to the Cloud Presence in the Cloud Server Extensions LANs and the CloudWhat It Is Thin Clients Internet and the CloudPresence Protocols Smart Phones, Pads, Pods, etc. Web Services, Browsers, and the CloudLeveraging Presence Virtual Terminal Security Strengths and Thin ClientPresence Enabled Weaknesses Advances in Networking and ProcessingThe Future of Presence Strengths Speeds that Led to Cloud ComputingThe Interrelation of Identity, Presence, and Weaknesses Networking DevelopmentsLocation in the Cloud Android Increased Processing Speeds Identity Management BlackBerry Managed Service Provider Model to CloudWhat It Is Windows Mobile Computing and Software as a ServiceFuture of Identity in the Cloud Ubuntu Mobile Internet Device (SaaS)Privacy and Its Relation to Cloud-Based Mobile Platform Virtualization Single Purpose Architectures Migrate toInformation Systems Kernel-Based Virtual Machine Multipurpose ArchitecturesPersonal Information VMware Mobile Virtualization Platform Data Center Virtualization Privacy-Related Issues Collaboration Applications for Mobile CollaborationFinding Your Private Information Platforms The Cloud as a Reach ExtenderOpen Cloud Consortium Working Groups Text Messaging The Cloud as a Communication EnablerProject Matsu iPhone Applications The Cloud as an Employee Enabler Project Comet BlackBerry Applications Service-Oriented Architecture (SOA)HPC in the Cloud Evolving from SOA to the CloudThe Open Cloud Testbed Capacity: Limited PerformanceThe Open Science Data Cloud Availability: Communications Failure andIntercloud Testbed line Performance IssuesReporting on an Open Cloud Consortium Cloud Computing Infrastructure Security: Newer Security Protocols ProvideWorking Group Cloud Computing Terms More Protection Distributed Management Task Force Benefits and Limitations of Cloud What's Next in Cloud Computing (DMTF) Computing Independent ComponentsWhat It Is? Benefits Message BaseDMTK Working Groups Associated with Limitations Location Independence Cloud Computing Cloud Computing Case Studies Communication Requirements for CloudStandards for Application Developers How Companies Are Using Cloud ImplementationProtocols Computing Public InternetScripting Languages Implementing Applications and Services Private InternetContent Formatting Standards and in the Cloud Routing to the DatacenterLanguages Using Your Company's Services vs. the Switching within the Data CenterStandards for Security in the Cloud Cloud Provider BandwidthConfidentiality, Integrity, Availability A Cloud Service Provider Introduced Tools Used to Measure NetworkAuthentication, Authorization, Accountability Cloud Computing Risks and Issues PerformanceRegulations for Privacy Products and Services Provided by Cloud Using the Protocol Analyzer to MeasureSecurity Protocols Computing Companies BandwidthEstablishing a Baseline for Cloud Economic Using Ping and Traceroute to MeasurePerformance Staffing Network Performance Best Practices for Selecting a Vendor and Should Your Company Invest in Cloud SecurityImplementing Cloud-Based Applications Computing? SSLChoosing the Right Vendor What Should Not be Moved to the Cloud VPNImplementing Cloud-Based Applications LANs and the Cloud Overhead Windows Remote Desktop Internet and the Cloud Storage Options for Cloud Computing

Page 82: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Vnc Web Services, Browsers, and the Cloud Storage CapacityWeb Browsers Thin Client Data Protection and PartitioningServer Extensions Advances in Networking and Processing NASThin Clients Speeds that Led to Cloud Computing SANSmart Phones, Pads, Pods, etc. Networking Developments CASVirtual Terminal Security Strengths and Increased Processing Speeds RedundancyWeaknesses Managed Service Provider Model to ReplicationStrengths Cloud Computing and Software as a Multisiting Weaknesses Service (SaaS) Backup and Recovery Android Single Purpose Architectures Migrate to Server Software Environments thatBlackBerry Multipurpose Architectures Support Cloud ComputingWindows Mobile Data Center Virtualization Server CapacityUbuntu Mobile Internet Device Collaboration VirtualizationMobile Platform Virtualization The Cloud as a Reach Extender ClusteringKernel-Based Virtual Machine The Cloud as a Communication Enabler ExpansionVMware Mobile Virtualization Platform The Cloud as an Employee Enabler Server FunctionsCollaboration Applications for Mobile Service-Oriented Architecture (SOA) ApplicationPlatforms Evolving from SOA to the Cloud WebText Messaging Capacity: Limited Performance Database iPhone Applications Availability: Communications Failure and Vendor Approaches to Cloud ComputingBlackBerry Applications Performance Issues Role of Open Source Software in Data

Security: Newer Security Protocols CenterProvide More Protection Cost Reduction vs. ReliabilityWhat's Next in Cloud Computing Open Source Server Software

line Independent Components Open Source Database SoftwareCloud Computing Infrastructure Message Base Open Source Applications SoftwareCloud Computing Terms Location Independence Open Source System ManagementBenefits and Limitations of Cloud Computing Communication Requirements for Cloud SoftwareBenefits Implementation Open Source Load-Balancing Software Limitations Public Internet Virtualization as the "Operating System"Cloud Computing Case Studies Private Internet Virtualization with a Host OperatingHow Companies Are Using Cloud Routing to the Datacenter System Computing Switching within the Data Center Virtualization Infections on VirtualizedImplementing Applications and Services in Bandwidth Environmentsthe Cloud Tools Used to Measure Network Type 1 Virtualized EnvironmentUsing Your Company's Services vs. the Performance Type 2 Virtualized Environment Cloud Provider Using the Protocol Analyzer to Measure Virtualization EnvironmentsA Cloud Service Provider Introduced Bandwidth Microsoft VirtualizationCloud Computing Risks and Issues Using Ping and Traceroute to Measure Sun xVM VirtualBoxProducts and Services Provided by Cloud Network Performance Linux/UNIX VirtualizationComputing Companies Security VMware ProductsEconomic SSL Data Center and Cloud InfrastructureStaffing VPN ProductsShould Your Company Invest in Cloud Overhead End-User and Desktop Products Computing? Storage Options for Cloud Computing IBM VirtualizationWhat Should Not be Moved to the Cloud Storage Capacity Using VMware to see a Virtualized ServerLANs and the Cloud Data Protection and Partitioning Environment Internet and the Cloud NAS Permissive FederationWeb Services, Browsers, and the Cloud SAN Verified FederationThin Client CAS Encrypted FederationAdvances in Networking and Processing Redundancy Trusted FederationSpeeds that Led to Cloud Computing Replication Using XMPP in the Federated EnvironmentNetworking Developments Multisiting Presence in the CloudIncreased Processing Speeds Backup and Recovery What It IsManaged Service Provider Model to Cloud Server Software Environments that Presence ProtocolsComputing and Software as a Service Support Cloud Computing Leveraging Presence(SaaS) Server Capacity Presence EnabledSingle Purpose Architectures Migrate to Virtualization The Future of PresenceMultipurpose Architectures Clustering The Interrelation of Identity, Presence, andData Center Virtualization Expansion Location in the Cloud Collaboration Server Functions Identity ManagementThe Cloud as a Reach Extender Application What It IsThe Cloud as a Communication Enabler Web Future of Identity in the Cloud The Cloud as an Employee Enabler Database Privacy and Its Relation to Cloud-BasedService-Oriented Architecture (SOA) Vendor Approaches to Cloud Computing Information Systems

Page 83: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Evolving from SOA to the Cloud Role of Open Source Software in Data Personal InformationCapacity: Limited Performance Center Privacy-Related IssuesAvailability: Communications Failure and Cost Reduction vs. Reliability Finding Your Private Information Performance Issues Open Source Server Software Open Cloud Consortium Working GroupsSecurity: Newer Security Protocols Provide Open Source Database Software Project MatsuMore Protection Open Source Applications Software Project CometWhat's Next in Cloud Computing Open Source System Management HPC in the CloudIndependent Components Software The Open Cloud TestbedMessage Base Open Source Load-Balancing Software The Open Science Data CloudLocation Independence Virtualization as the "Operating System" Intercloud TestbedCommunication Requirements for Cloud Virtualization with a Host Operating Reporting on an Open Cloud ConsortiumImplementation System Working Group Public Internet Virtualization Infections on Virtualized Distributed Management Task ForcePrivate Internet Environments (DMTF)Routing to the Datacenter Type 1 Virtualized Environment What It Is?Switching within the Data Center Type 2 Virtualized Environment DMTK Working Groups Associated withBandwidth Virtualization Environments Cloud Computing Tools Used to Measure Network Microsoft Virtualization Standards for Application DevelopersPerformance Sun xVM VirtualBox ProtocolsUsing the Protocol Analyzer to Measure Linux/UNIX Virtualization Scripting LanguagesBandwidth VMware Products Content Formatting Standards andUsing Ping and Traceroute to Measure Data Center and Cloud Infrastructure Languages Network Performance Products Standards for Security in the CloudSecurity End-User and Desktop Products Confidentiality, Integrity, AvailabilitySSL IBM Virtualization Authentication, Authorization,VPN Using VMware to see a Virtualized Server AccountabilityOverhead Environment Regulations for PrivacyStorage Options for Cloud Computing Permissive Federation Security Protocols Storage Capacity Verified Federation Establishing a Baseline for CloudData Protection and Partitioning Encrypted Federation PerformanceNAS Trusted Federation Best Practices for Selecting a Vendor andSAN Using XMPP in the Federated Implementing Cloud-Based ApplicationsCAS Environment Choosing the Right VendorRedundancy Presence in the Cloud Implementing Cloud-Based Applications Replication What It Is Windows Remote DesktopMultisiting Presence Protocols VncBackup and Recovery Leveraging Presence Web BrowsersServer Software Environments that Support Presence Enabled Server ExtensionsCloud Computing The Future of Presence Thin ClientsServer Capacity The Interrelation of Identity, Presence, Smart Phones, Pads, Pods, etc. Virtualization and Location in the Cloud Virtual Terminal Security Strengths andClustering Identity Management WeaknessesExpansion What It Is StrengthsServer Functions Future of Identity in the Cloud Weaknesses Application Privacy and Its Relation to Cloud-Based AndroidWeb Information Systems BlackBerryDatabase Personal Information Windows MobileVendor Approaches to Cloud Computing Privacy-Related Issues Ubuntu Mobile Internet Device Role of Open Source Software in Data Finding Your Private Information Mobile Platform VirtualizationCenter Open Cloud Consortium Working Groups Kernel-Based Virtual MachineCost Reduction vs. Reliability Project Matsu VMware Mobile Virtualization Platform Open Source Server Software Project Comet Collaboration Applications for MobileOpen Source Database Software HPC in the Cloud PlatformsOpen Source Applications Software The Open Cloud Testbed Text MessagingOpen Source System Management Software The Open Science Data Cloud iPhone ApplicationsOpen Source Load-Balancing Software Intercloud Testbed BlackBerry ApplicationsVirtualization as the "Operating System" Reporting on an Open Cloud ConsortiumVirtualization with a Host Operating System Working Group Virtualization Infections on Virtualized Distributed Management Task ForceEnvironments (DMTF) lineType 1 Virtualized Environment What It Is? Cloud Computing InfrastructureType 2 Virtualized Environment DMTK Working Groups Associated with Cloud Computing Terms Virtualization Environments Cloud Computing Benefits and Limitations of CloudMicrosoft Virtualization Standards for Application Developers ComputingSun xVM VirtualBox Protocols Benefits

Page 84: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Linux/UNIX Virtualization Scripting Languages LimitationsVMware Products Content Formatting Standards and Cloud Computing Case Studies Data Center and Cloud Infrastructure Languages How Companies Are Using CloudProducts Standards for Security in the Cloud ComputingEnd-User and Desktop Products Confidentiality, Integrity, Availability Implementing Applications and Services inIBM Virtualization Authentication, Authorization, the CloudUsing VMware to see a Virtualized Server Accountability Using Your Company's Services vs. theEnvironment Regulations for Privacy Cloud ProviderPermissive Federation Security Protocols A Cloud Service Provider Introduced Verified Federation Establishing a Baseline for Cloud Cloud Computing Risks and Issues Encrypted Federation Performance Products and Services Provided by CloudTrusted Federation Best Practices for Selecting a Vendor Computing Companies Using XMPP in the Federated Environment and Implementing Cloud-Based EconomicPresence in the Cloud Applications Staffing What It Is Choosing the Right Vendor Should Your Company Invest in CloudPresence Protocols Implementing Cloud-Based Applications Computing?Leveraging Presence Windows Remote Desktop What Should Not be Moved to the Cloud Presence Enabled Vnc LANs and the CloudThe Future of Presence Web Browsers Internet and the CloudThe Interrelation of Identity, Presence, and Server Extensions Web Services, Browsers, and the CloudLocation in the Cloud Thin Clients Thin ClientIdentity Management Smart Phones, Pads, Pods, etc. Advances in Networking and ProcessingWhat It Is Virtual Terminal Security Strengths and Speeds that Led to Cloud ComputingFuture of Identity in the Cloud Weaknesses Networking DevelopmentsPrivacy and Its Relation to Cloud-Based Strengths Increased Processing Speeds Information Systems Weaknesses Managed Service Provider Model to CloudPersonal Information Android Computing and Software as a ServicePrivacy-Related Issues BlackBerry (SaaS)Finding Your Private Information Windows Mobile Single Purpose Architectures Migrate toOpen Cloud Consortium Working Groups Ubuntu Mobile Internet Device Multipurpose ArchitecturesProject Matsu Mobile Platform Virtualization Data Center Virtualization Project Comet Kernel-Based Virtual Machine CollaborationHPC in the Cloud VMware Mobile Virtualization Platform The Cloud as a Reach ExtenderThe Open Cloud Testbed Collaboration Applications for Mobile The Cloud as a Communication EnablerThe Open Science Data Cloud Platforms The Cloud as an Employee Enabler Intercloud Testbed Text Messaging Service-Oriented Architecture (SOA)Reporting on an Open Cloud Consortium iPhone Applications Evolving from SOA to the CloudWorking Group BlackBerry Applications Capacity: Limited PerformanceDistributed Management Task Force Availability: Communications Failure and(DMTF) Performance IssuesWhat It Is? Security: Newer Security Protocols ProvideDMTK Working Groups Associated with line More Protection Cloud Computing Cloud Computing Infrastructure What's Next in Cloud Computing Standards for Application Developers Cloud Computing Terms Independent ComponentsProtocols Benefits and Limitations of Cloud Message BaseScripting Languages Computing Location Independence Content Formatting Standards and Benefits Communication Requirements for CloudLanguages Limitations ImplementationStandards for Security in the Cloud Cloud Computing Case Studies Public InternetConfidentiality, Integrity, Availability How Companies Are Using Cloud Private InternetAuthentication, Authorization, Accountability Computing Routing to the DatacenterRegulations for Privacy Implementing Applications and Services Switching within the Data CenterSecurity Protocols in the Cloud BandwidthEstablishing a Baseline for Cloud Using Your Company's Services vs. the Tools Used to Measure NetworkPerformance Cloud Provider PerformanceBest Practices for Selecting a Vendor and A Cloud Service Provider Introduced Using the Protocol Analyzer to MeasureImplementing Cloud-Based Applications Cloud Computing Risks and Issues BandwidthChoosing the Right Vendor Products and Services Provided by Cloud Using Ping and Traceroute to MeasureImplementing Cloud-Based Applications Computing Companies Network Performance Windows Remote Desktop Economic SecurityVnc Staffing SSLWeb Browsers Should Your Company Invest in Cloud VPNServer Extensions Computing? Overhead Thin Clients What Should Not be Moved to the Cloud Storage Options for Cloud ComputingSmart Phones, Pads, Pods, etc. LANs and the Cloud Storage Capacity

Page 85: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Virtual Terminal Security Strengths and Internet and the Cloud Data Protection and PartitioningWeaknesses Web Services, Browsers, and the Cloud NASStrengths Thin Client SANWeaknesses Advances in Networking and Processing CASAndroid Speeds that Led to Cloud Computing RedundancyBlackBerry Networking Developments ReplicationWindows Mobile Increased Processing Speeds Multisiting Ubuntu Mobile Internet Device Managed Service Provider Model to Backup and Recovery Mobile Platform Virtualization Cloud Computing and Software as a Server Software Environments thatKernel-Based Virtual Machine Service (SaaS) Support Cloud ComputingVMware Mobile Virtualization Platform Single Purpose Architectures Migrate to Server CapacityCollaboration Applications for Mobile Multipurpose Architectures VirtualizationPlatforms Data Center Virtualization ClusteringText Messaging Collaboration ExpansioniPhone Applications The Cloud as a Reach Extender Server FunctionsBlackBerry Applications The Cloud as a Communication Enabler Application

The Cloud as an Employee Enabler WebService-Oriented Architecture (SOA) Database Evolving from SOA to the Cloud Vendor Approaches to Cloud Computing

line Capacity: Limited Performance Role of Open Source Software in DataCloud Computing Infrastructure Availability: Communications Failure and CenterCloud Computing Terms Performance Issues Cost Reduction vs. ReliabilityBenefits and Limitations of Cloud Computing Security: Newer Security Protocols Open Source Server SoftwareBenefits Provide More Protection Open Source Database SoftwareLimitations What's Next in Cloud Computing Open Source Applications SoftwareCloud Computing Case Studies Independent Components Open Source System ManagementHow Companies Are Using Cloud Message Base SoftwareComputing Location Independence Open Source Load-Balancing Software Implementing Applications and Services in Communication Requirements for Cloud Virtualization as the "Operating System"the Cloud Implementation Virtualization with a Host OperatingUsing Your Company's Services vs. the Public Internet System Cloud Provider Private Internet Virtualization Infections on VirtualizedA Cloud Service Provider Introduced Routing to the Datacenter EnvironmentsCloud Computing Risks and Issues Switching within the Data Center Type 1 Virtualized EnvironmentProducts and Services Provided by Cloud Bandwidth Type 2 Virtualized Environment Computing Companies Tools Used to Measure Network Virtualization EnvironmentsEconomic Performance Microsoft VirtualizationStaffing Using the Protocol Analyzer to Measure Sun xVM VirtualBoxShould Your Company Invest in Cloud Bandwidth Linux/UNIX VirtualizationComputing? Using Ping and Traceroute to Measure VMware ProductsWhat Should Not be Moved to the Cloud Network Performance Data Center and Cloud InfrastructureLANs and the Cloud Security ProductsInternet and the Cloud SSL End-User and Desktop Products Web Services, Browsers, and the Cloud VPN IBM VirtualizationThin Client Overhead Using VMware to see a Virtualized ServerAdvances in Networking and Processing Storage Options for Cloud Computing Environment Speeds that Led to Cloud Computing Storage Capacity Permissive FederationNetworking Developments Data Protection and Partitioning Verified FederationIncreased Processing Speeds NAS Encrypted FederationManaged Service Provider Model to Cloud SAN Trusted FederationComputing and Software as a Service CAS Using XMPP in the Federated Environment(SaaS) Redundancy Presence in the CloudSingle Purpose Architectures Migrate to Replication What It IsMultipurpose Architectures Multisiting Presence ProtocolsData Center Virtualization Backup and Recovery Leveraging PresenceCollaboration Server Software Environments that Presence EnabledThe Cloud as a Reach Extender Support Cloud Computing The Future of PresenceThe Cloud as a Communication Enabler Server Capacity The Interrelation of Identity, Presence, andThe Cloud as an Employee Enabler Virtualization Location in the Cloud Service-Oriented Architecture (SOA) Clustering Identity ManagementEvolving from SOA to the Cloud Expansion What It IsCapacity: Limited Performance Server Functions Future of Identity in the Cloud Availability: Communications Failure and Application Privacy and Its Relation to Cloud-BasedPerformance Issues Web Information SystemsSecurity: Newer Security Protocols Provide Database Personal Information

Page 86: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

More Protection Vendor Approaches to Cloud Computing Privacy-Related IssuesWhat's Next in Cloud Computing Role of Open Source Software in Data Finding Your Private Information Independent Components Center Open Cloud Consortium Working GroupsMessage Base Cost Reduction vs. Reliability Project MatsuLocation Independence Open Source Server Software Project CometCommunication Requirements for Cloud Open Source Database Software HPC in the CloudImplementation Open Source Applications Software The Open Cloud TestbedPublic Internet Open Source System Management The Open Science Data CloudPrivate Internet Software Intercloud TestbedRouting to the Datacenter Open Source Load-Balancing Software Reporting on an Open Cloud ConsortiumSwitching within the Data Center Virtualization as the "Operating System" Working Group Bandwidth Virtualization with a Host Operating Distributed Management Task ForceTools Used to Measure Network System (DMTF)Performance Virtualization Infections on Virtualized What It Is?Using the Protocol Analyzer to Measure Environments DMTK Working Groups Associated withBandwidth Type 1 Virtualized Environment Cloud Computing Using Ping and Traceroute to Measure Type 2 Virtualized Environment Standards for Application DevelopersNetwork Performance Virtualization Environments ProtocolsSecurity Microsoft Virtualization Scripting LanguagesSSL Sun xVM VirtualBox Content Formatting Standards andVPN Linux/UNIX Virtualization Languages Overhead VMware Products Standards for Security in the CloudStorage Options for Cloud Computing Data Center and Cloud Infrastructure Confidentiality, Integrity, AvailabilityStorage Capacity Products Authentication, Authorization,Data Protection and Partitioning End-User and Desktop Products AccountabilityNAS IBM Virtualization Regulations for PrivacySAN Using VMware to see a Virtualized Server Security Protocols CAS Environment Establishing a Baseline for CloudRedundancy Permissive Federation PerformanceReplication Verified Federation Best Practices for Selecting a Vendor andMultisiting Encrypted Federation Implementing Cloud-Based ApplicationsBackup and Recovery Trusted Federation Choosing the Right VendorServer Software Environments that Support Using XMPP in the Federated Implementing Cloud-Based Applications Cloud Computing Environment Windows Remote DesktopServer Capacity Presence in the Cloud VncVirtualization What It Is Web BrowsersClustering Presence Protocols Server ExtensionsExpansion Leveraging Presence Thin ClientsServer Functions Presence Enabled Smart Phones, Pads, Pods, etc. Application The Future of Presence Virtual Terminal Security Strengths andWeb The Interrelation of Identity, Presence, WeaknessesDatabase and Location in the Cloud StrengthsVendor Approaches to Cloud Computing Identity Management Weaknesses Role of Open Source Software in Data What It Is AndroidCenter Future of Identity in the Cloud BlackBerryCost Reduction vs. Reliability Privacy and Its Relation to Cloud-Based Windows MobileOpen Source Server Software Information Systems Ubuntu Mobile Internet Device Open Source Database Software Personal Information Mobile Platform VirtualizationOpen Source Applications Software Privacy-Related Issues Kernel-Based Virtual MachineOpen Source System Management Software Finding Your Private Information VMware Mobile Virtualization Platform Open Source Load-Balancing Software Open Cloud Consortium Working Groups Collaboration Applications for MobileVirtualization as the "Operating System" Project Matsu PlatformsVirtualization with a Host Operating System Project Comet Text MessagingVirtualization Infections on Virtualized HPC in the Cloud iPhone ApplicationsEnvironments The Open Cloud Testbed BlackBerry ApplicationsType 1 Virtualized Environment The Open Science Data CloudType 2 Virtualized Environment Intercloud TestbedVirtualization Environments Reporting on an Open Cloud ConsortiumMicrosoft Virtualization Working Group lineSun xVM VirtualBox Distributed Management Task Force Cloud Computing InfrastructureLinux/UNIX Virtualization (DMTF) Cloud Computing Terms VMware Products What It Is? Benefits and Limitations of CloudData Center and Cloud Infrastructure DMTK Working Groups Associated with ComputingProducts Cloud Computing BenefitsEnd-User and Desktop Products Standards for Application Developers Limitations

Page 87: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

IBM Virtualization Protocols Cloud Computing Case Studies Using VMware to see a Virtualized Server Scripting Languages How Companies Are Using CloudEnvironment Content Formatting Standards and ComputingPermissive Federation Languages Implementing Applications and Services inVerified Federation Standards for Security in the Cloud the CloudEncrypted Federation Confidentiality, Integrity, Availability Using Your Company's Services vs. theTrusted Federation Authentication, Authorization, Cloud ProviderUsing XMPP in the Federated Environment Accountability A Cloud Service Provider Introduced Presence in the Cloud Regulations for Privacy Cloud Computing Risks and Issues What It Is Security Protocols Products and Services Provided by CloudPresence Protocols Establishing a Baseline for Cloud Computing Companies Leveraging Presence Performance EconomicPresence Enabled Best Practices for Selecting a Vendor Staffing The Future of Presence and Implementing Cloud-Based Should Your Company Invest in CloudThe Interrelation of Identity, Presence, and Applications Computing?Location in the Cloud Choosing the Right Vendor What Should Not be Moved to the Cloud Identity Management Implementing Cloud-Based Applications LANs and the CloudWhat It Is Windows Remote Desktop Internet and the CloudFuture of Identity in the Cloud Vnc Web Services, Browsers, and the CloudPrivacy and Its Relation to Cloud-Based Web Browsers Thin ClientInformation Systems Server Extensions Advances in Networking and ProcessingPersonal Information Thin Clients Speeds that Led to Cloud ComputingPrivacy-Related Issues Smart Phones, Pads, Pods, etc. Networking DevelopmentsFinding Your Private Information Virtual Terminal Security Strengths and Increased Processing Speeds Open Cloud Consortium Working Groups Weaknesses Managed Service Provider Model to CloudProject Matsu Strengths Computing and Software as a ServiceProject Comet Weaknesses (SaaS)HPC in the Cloud Android Single Purpose Architectures Migrate toThe Open Cloud Testbed BlackBerry Multipurpose ArchitecturesThe Open Science Data Cloud Windows Mobile Data Center Virtualization Intercloud Testbed Ubuntu Mobile Internet Device CollaborationReporting on an Open Cloud Consortium Mobile Platform Virtualization The Cloud as a Reach ExtenderWorking Group Kernel-Based Virtual Machine The Cloud as a Communication EnablerDistributed Management Task Force VMware Mobile Virtualization Platform The Cloud as an Employee Enabler (DMTF) Collaboration Applications for Mobile Service-Oriented Architecture (SOA)What It Is? Platforms Evolving from SOA to the CloudDMTK Working Groups Associated with Text Messaging Capacity: Limited PerformanceCloud Computing iPhone Applications Availability: Communications Failure andStandards for Application Developers BlackBerry Applications Performance IssuesProtocols Security: Newer Security Protocols ProvideScripting Languages More Protection Content Formatting Standards and What's Next in Cloud Computing Languages line Independent ComponentsStandards for Security in the Cloud Cloud Computing Infrastructure Message BaseConfidentiality, Integrity, Availability Cloud Computing Terms Location Independence Authentication, Authorization, Accountability Benefits and Limitations of Cloud Communication Requirements for CloudRegulations for Privacy Computing ImplementationSecurity Protocols Benefits Public InternetEstablishing a Baseline for Cloud Limitations Private InternetPerformance Cloud Computing Case Studies Routing to the DatacenterBest Practices for Selecting a Vendor and How Companies Are Using Cloud Switching within the Data CenterImplementing Cloud-Based Applications Computing BandwidthChoosing the Right Vendor Implementing Applications and Services Tools Used to Measure NetworkImplementing Cloud-Based Applications in the Cloud PerformanceWindows Remote Desktop Using Your Company's Services vs. the Using the Protocol Analyzer to MeasureVnc Cloud Provider BandwidthWeb Browsers A Cloud Service Provider Introduced Using Ping and Traceroute to MeasureServer Extensions Cloud Computing Risks and Issues Network Performance Thin Clients Products and Services Provided by Cloud SecuritySmart Phones, Pads, Pods, etc. Computing Companies SSLVirtual Terminal Security Strengths and Economic VPNWeaknesses Staffing Overhead Strengths Should Your Company Invest in Cloud Storage Options for Cloud ComputingWeaknesses Computing? Storage CapacityAndroid What Should Not be Moved to the Cloud Data Protection and Partitioning

Page 88: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

BlackBerry LANs and the Cloud NASWindows Mobile Internet and the Cloud SANUbuntu Mobile Internet Device Web Services, Browsers, and the Cloud CASMobile Platform Virtualization Thin Client RedundancyKernel-Based Virtual Machine Advances in Networking and Processing ReplicationVMware Mobile Virtualization Platform Speeds that Led to Cloud Computing Multisiting Collaboration Applications for Mobile Networking Developments Backup and Recovery Platforms Increased Processing Speeds Server Software Environments thatText Messaging Managed Service Provider Model to Support Cloud ComputingiPhone Applications Cloud Computing and Software as a Server CapacityBlackBerry Applications Service (SaaS) Virtualization

Single Purpose Architectures Migrate to ClusteringMultipurpose Architectures ExpansionData Center Virtualization Server Functions

line Collaboration ApplicationCloud Computing Infrastructure The Cloud as a Reach Extender WebCloud Computing Terms The Cloud as a Communication Enabler Database Benefits and Limitations of Cloud Computing The Cloud as an Employee Enabler Vendor Approaches to Cloud ComputingBenefits Service-Oriented Architecture (SOA) Role of Open Source Software in DataLimitations Evolving from SOA to the Cloud CenterCloud Computing Case Studies Capacity: Limited Performance Cost Reduction vs. ReliabilityHow Companies Are Using Cloud Availability: Communications Failure and Open Source Server SoftwareComputing Performance Issues Open Source Database SoftwareImplementing Applications and Services in Security: Newer Security Protocols Open Source Applications Softwarethe Cloud Provide More Protection Open Source System ManagementUsing Your Company's Services vs. the What's Next in Cloud Computing SoftwareCloud Provider Independent Components Open Source Load-Balancing Software A Cloud Service Provider Introduced Message Base Virtualization as the "Operating System"Cloud Computing Risks and Issues Location Independence Virtualization with a Host OperatingProducts and Services Provided by Cloud Communication Requirements for Cloud System Computing Companies Implementation Virtualization Infections on VirtualizedEconomic Public Internet EnvironmentsStaffing Private Internet Type 1 Virtualized EnvironmentShould Your Company Invest in Cloud Routing to the Datacenter Type 2 Virtualized Environment Computing? Switching within the Data Center Virtualization EnvironmentsWhat Should Not be Moved to the Cloud Bandwidth Microsoft VirtualizationLANs and the Cloud Tools Used to Measure Network Sun xVM VirtualBoxInternet and the Cloud Performance Linux/UNIX VirtualizationWeb Services, Browsers, and the Cloud Using the Protocol Analyzer to Measure VMware ProductsThin Client Bandwidth Data Center and Cloud InfrastructureAdvances in Networking and Processing Using Ping and Traceroute to Measure ProductsSpeeds that Led to Cloud Computing Network Performance End-User and Desktop Products Networking Developments Security IBM VirtualizationIncreased Processing Speeds SSL Using VMware to see a Virtualized ServerManaged Service Provider Model to Cloud VPN Environment Computing and Software as a Service Overhead Permissive Federation(SaaS) Storage Options for Cloud Computing Verified FederationSingle Purpose Architectures Migrate to Storage Capacity Encrypted FederationMultipurpose Architectures Data Protection and Partitioning Trusted FederationData Center Virtualization NAS Using XMPP in the Federated EnvironmentCollaboration SAN Presence in the CloudThe Cloud as a Reach Extender CAS What It IsThe Cloud as a Communication Enabler Redundancy Presence ProtocolsThe Cloud as an Employee Enabler Replication Leveraging PresenceService-Oriented Architecture (SOA) Multisiting Presence EnabledEvolving from SOA to the Cloud Backup and Recovery The Future of PresenceCapacity: Limited Performance Server Software Environments that The Interrelation of Identity, Presence, andAvailability: Communications Failure and Support Cloud Computing Location in the Cloud Performance Issues Server Capacity Identity ManagementSecurity: Newer Security Protocols Provide Virtualization What It IsMore Protection Clustering Future of Identity in the Cloud What's Next in Cloud Computing Expansion Privacy and Its Relation to Cloud-BasedIndependent Components Server Functions Information SystemsMessage Base Application Personal InformationLocation Independence Web Privacy-Related Issues

Page 89: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Communication Requirements for Cloud Database Finding Your Private Information Implementation Vendor Approaches to Cloud Computing Open Cloud Consortium Working GroupsPublic Internet Role of Open Source Software in Data Project MatsuPrivate Internet Center Project CometRouting to the Datacenter Cost Reduction vs. Reliability HPC in the CloudSwitching within the Data Center Open Source Server Software The Open Cloud TestbedBandwidth Open Source Database Software The Open Science Data CloudTools Used to Measure Network Open Source Applications Software Intercloud TestbedPerformance Open Source System Management Reporting on an Open Cloud ConsortiumUsing the Protocol Analyzer to Measure Software Working Group Bandwidth Open Source Load-Balancing Software Distributed Management Task ForceUsing Ping and Traceroute to Measure Virtualization as the "Operating System" (DMTF)Network Performance Virtualization with a Host Operating What It Is?Security System DMTK Working Groups Associated withSSL Virtualization Infections on Virtualized Cloud Computing VPN Environments Standards for Application DevelopersOverhead Type 1 Virtualized Environment ProtocolsStorage Options for Cloud Computing Type 2 Virtualized Environment Scripting LanguagesStorage Capacity Virtualization Environments Content Formatting Standards andData Protection and Partitioning Microsoft Virtualization Languages NAS Sun xVM VirtualBox Standards for Security in the CloudSAN Linux/UNIX Virtualization Confidentiality, Integrity, AvailabilityCAS VMware Products Authentication, Authorization,Redundancy Data Center and Cloud Infrastructure AccountabilityReplication Products Regulations for PrivacyMultisiting End-User and Desktop Products Security Protocols Backup and Recovery IBM Virtualization Establishing a Baseline for CloudServer Software Environments that Support Using VMware to see a Virtualized Server PerformanceCloud Computing Environment Best Practices for Selecting a Vendor andServer Capacity Permissive Federation Implementing Cloud-Based ApplicationsVirtualization Verified Federation Choosing the Right VendorClustering Encrypted Federation Implementing Cloud-Based Applications Expansion Trusted Federation Windows Remote DesktopServer Functions Using XMPP in the Federated VncApplication Environment Web BrowsersWeb Presence in the Cloud Server ExtensionsDatabase What It Is Thin ClientsVendor Approaches to Cloud Computing Presence Protocols Smart Phones, Pads, Pods, etc. Role of Open Source Software in Data Leveraging Presence Virtual Terminal Security Strengths andCenter Presence Enabled WeaknessesCost Reduction vs. Reliability The Future of Presence StrengthsOpen Source Server Software The Interrelation of Identity, Presence, Weaknesses Open Source Database Software and Location in the Cloud AndroidOpen Source Applications Software Identity Management BlackBerryOpen Source System Management Software What It Is Windows MobileOpen Source Load-Balancing Software Future of Identity in the Cloud Ubuntu Mobile Internet Device Virtualization as the "Operating System" Privacy and Its Relation to Cloud-Based Mobile Platform VirtualizationVirtualization with a Host Operating System Information Systems Kernel-Based Virtual MachineVirtualization Infections on Virtualized Personal Information VMware Mobile Virtualization Platform Environments Privacy-Related Issues Collaboration Applications for MobileType 1 Virtualized Environment Finding Your Private Information PlatformsType 2 Virtualized Environment Open Cloud Consortium Working Groups Text MessagingVirtualization Environments Project Matsu iPhone ApplicationsMicrosoft Virtualization Project Comet BlackBerry ApplicationsSun xVM VirtualBox HPC in the CloudLinux/UNIX Virtualization The Open Cloud TestbedVMware Products The Open Science Data CloudData Center and Cloud Infrastructure Intercloud Testbed lineProducts Reporting on an Open Cloud Consortium Cloud Computing InfrastructureEnd-User and Desktop Products Working Group Cloud Computing Terms IBM Virtualization Distributed Management Task Force Benefits and Limitations of CloudUsing VMware to see a Virtualized Server (DMTF) ComputingEnvironment What It Is? BenefitsPermissive Federation DMTK Working Groups Associated with LimitationsVerified Federation Cloud Computing Cloud Computing Case Studies

Page 90: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Encrypted Federation Standards for Application Developers How Companies Are Using CloudTrusted Federation Protocols ComputingUsing XMPP in the Federated Environment Scripting Languages Implementing Applications and Services inPresence in the Cloud Content Formatting Standards and the CloudWhat It Is Languages Using Your Company's Services vs. thePresence Protocols Standards for Security in the Cloud Cloud ProviderLeveraging Presence Confidentiality, Integrity, Availability A Cloud Service Provider Introduced Presence Enabled Authentication, Authorization, Cloud Computing Risks and Issues The Future of Presence Accountability Products and Services Provided by CloudThe Interrelation of Identity, Presence, and Regulations for Privacy Computing Companies Location in the Cloud Security Protocols EconomicIdentity Management Establishing a Baseline for Cloud Staffing What It Is Performance Should Your Company Invest in CloudFuture of Identity in the Cloud Best Practices for Selecting a Vendor Computing?Privacy and Its Relation to Cloud-Based and Implementing Cloud-Based What Should Not be Moved to the Cloud Information Systems Applications LANs and the CloudPersonal Information Choosing the Right Vendor Internet and the CloudPrivacy-Related Issues Implementing Cloud-Based Applications Web Services, Browsers, and the CloudFinding Your Private Information Windows Remote Desktop Thin ClientOpen Cloud Consortium Working Groups Vnc Advances in Networking and ProcessingProject Matsu Web Browsers Speeds that Led to Cloud ComputingProject Comet Server Extensions Networking DevelopmentsHPC in the Cloud Thin Clients Increased Processing Speeds The Open Cloud Testbed Smart Phones, Pads, Pods, etc. Managed Service Provider Model to CloudThe Open Science Data Cloud Virtual Terminal Security Strengths and Computing and Software as a ServiceIntercloud Testbed Weaknesses (SaaS)Reporting on an Open Cloud Consortium Strengths Single Purpose Architectures Migrate toWorking Group Weaknesses Multipurpose ArchitecturesDistributed Management Task Force Android Data Center Virtualization (DMTF) BlackBerry CollaborationWhat It Is? Windows Mobile The Cloud as a Reach ExtenderDMTK Working Groups Associated with Ubuntu Mobile Internet Device The Cloud as a Communication EnablerCloud Computing Mobile Platform Virtualization The Cloud as an Employee Enabler Standards for Application Developers Kernel-Based Virtual Machine Service-Oriented Architecture (SOA)Protocols VMware Mobile Virtualization Platform Evolving from SOA to the CloudScripting Languages Collaboration Applications for Mobile Capacity: Limited PerformanceContent Formatting Standards and Platforms Availability: Communications Failure andLanguages Text Messaging Performance IssuesStandards for Security in the Cloud iPhone Applications Security: Newer Security Protocols ProvideConfidentiality, Integrity, Availability BlackBerry Applications More Protection Authentication, Authorization, Accountability What's Next in Cloud Computing Regulations for Privacy Independent ComponentsSecurity Protocols Message BaseEstablishing a Baseline for Cloud line Location Independence Performance Cloud Computing Infrastructure Communication Requirements for CloudBest Practices for Selecting a Vendor and Cloud Computing Terms ImplementationImplementing Cloud-Based Applications Benefits and Limitations of Cloud Public InternetChoosing the Right Vendor Computing Private InternetImplementing Cloud-Based Applications Benefits Routing to the DatacenterWindows Remote Desktop Limitations Switching within the Data CenterVnc Cloud Computing Case Studies BandwidthWeb Browsers How Companies Are Using Cloud Tools Used to Measure NetworkServer Extensions Computing PerformanceThin Clients Implementing Applications and Services Using the Protocol Analyzer to MeasureSmart Phones, Pads, Pods, etc. in the Cloud BandwidthVirtual Terminal Security Strengths and Using Your Company's Services vs. the Using Ping and Traceroute to MeasureWeaknesses Cloud Provider Network Performance Strengths A Cloud Service Provider Introduced SecurityWeaknesses Cloud Computing Risks and Issues SSLAndroid Products and Services Provided by Cloud VPNBlackBerry Computing Companies Overhead Windows Mobile Economic Storage Options for Cloud ComputingUbuntu Mobile Internet Device Staffing Storage CapacityMobile Platform Virtualization Should Your Company Invest in Cloud Data Protection and PartitioningKernel-Based Virtual Machine Computing? NAS

Page 91: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

VMware Mobile Virtualization Platform What Should Not be Moved to the Cloud SANCollaboration Applications for Mobile LANs and the Cloud CASPlatforms Internet and the Cloud RedundancyText Messaging Web Services, Browsers, and the Cloud ReplicationiPhone Applications Thin Client Multisiting BlackBerry Applications Advances in Networking and Processing Backup and Recovery

Speeds that Led to Cloud Computing Server Software Environments thatNetworking Developments Support Cloud ComputingIncreased Processing Speeds Server Capacity

line Managed Service Provider Model to VirtualizationCloud Computing Infrastructure Cloud Computing and Software as a ClusteringCloud Computing Terms Service (SaaS) ExpansionBenefits and Limitations of Cloud Computing Single Purpose Architectures Migrate to Server FunctionsBenefits Multipurpose Architectures ApplicationLimitations Data Center Virtualization WebCloud Computing Case Studies Collaboration Database How Companies Are Using Cloud The Cloud as a Reach Extender Vendor Approaches to Cloud ComputingComputing The Cloud as a Communication Enabler Role of Open Source Software in DataImplementing Applications and Services in The Cloud as an Employee Enabler Centerthe Cloud Service-Oriented Architecture (SOA) Cost Reduction vs. ReliabilityUsing Your Company's Services vs. the Evolving from SOA to the Cloud Open Source Server SoftwareCloud Provider Capacity: Limited Performance Open Source Database SoftwareA Cloud Service Provider Introduced Availability: Communications Failure and Open Source Applications SoftwareCloud Computing Risks and Issues Performance Issues Open Source System ManagementProducts and Services Provided by Cloud Security: Newer Security Protocols SoftwareComputing Companies Provide More Protection Open Source Load-Balancing Software Economic What's Next in Cloud Computing Virtualization as the "Operating System"Staffing Independent Components Virtualization with a Host OperatingShould Your Company Invest in Cloud Message Base System Computing? Location Independence Virtualization Infections on VirtualizedWhat Should Not be Moved to the Cloud Communication Requirements for Cloud EnvironmentsLANs and the Cloud Implementation Type 1 Virtualized EnvironmentInternet and the Cloud Public Internet Type 2 Virtualized Environment Web Services, Browsers, and the Cloud Private Internet Virtualization EnvironmentsThin Client Routing to the Datacenter Microsoft VirtualizationAdvances in Networking and Processing Switching within the Data Center Sun xVM VirtualBoxSpeeds that Led to Cloud Computing Bandwidth Linux/UNIX VirtualizationNetworking Developments Tools Used to Measure Network VMware ProductsIncreased Processing Speeds Performance Data Center and Cloud InfrastructureManaged Service Provider Model to Cloud Using the Protocol Analyzer to Measure ProductsComputing and Software as a Service Bandwidth End-User and Desktop Products (SaaS) Using Ping and Traceroute to Measure IBM VirtualizationSingle Purpose Architectures Migrate to Network Performance Using VMware to see a Virtualized ServerMultipurpose Architectures Security Environment Data Center Virtualization SSL Permissive FederationCollaboration VPN Verified FederationThe Cloud as a Reach Extender Overhead Encrypted FederationThe Cloud as a Communication Enabler Storage Options for Cloud Computing Trusted FederationThe Cloud as an Employee Enabler Storage Capacity Using XMPP in the Federated EnvironmentService-Oriented Architecture (SOA) Data Protection and Partitioning Presence in the CloudEvolving from SOA to the Cloud NAS What It IsCapacity: Limited Performance SAN Presence ProtocolsAvailability: Communications Failure and CAS Leveraging PresencePerformance Issues Redundancy Presence EnabledSecurity: Newer Security Protocols Provide Replication The Future of PresenceMore Protection Multisiting The Interrelation of Identity, Presence, andWhat's Next in Cloud Computing Backup and Recovery Location in the Cloud Independent Components Server Software Environments that Identity ManagementMessage Base Support Cloud Computing What It IsLocation Independence Server Capacity Future of Identity in the Cloud Communication Requirements for Cloud Virtualization Privacy and Its Relation to Cloud-BasedImplementation Clustering Information SystemsPublic Internet Expansion Personal InformationPrivate Internet Server Functions Privacy-Related IssuesRouting to the Datacenter Application Finding Your Private Information

Page 92: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Switching within the Data Center Web Open Cloud Consortium Working GroupsBandwidth Database Project MatsuTools Used to Measure Network Vendor Approaches to Cloud Computing Project CometPerformance Role of Open Source Software in Data HPC in the CloudUsing the Protocol Analyzer to Measure Center The Open Cloud TestbedBandwidth Cost Reduction vs. Reliability The Open Science Data CloudUsing Ping and Traceroute to Measure Open Source Server Software Intercloud TestbedNetwork Performance Open Source Database Software Reporting on an Open Cloud ConsortiumSecurity Open Source Applications Software Working Group SSL Open Source System Management Distributed Management Task ForceVPN Software (DMTF)Overhead Open Source Load-Balancing Software What It Is?Storage Options for Cloud Computing Virtualization as the "Operating System" DMTK Working Groups Associated withStorage Capacity Virtualization with a Host Operating Cloud Computing Data Protection and Partitioning System Standards for Application DevelopersNAS Virtualization Infections on Virtualized ProtocolsSAN Environments Scripting LanguagesCAS Type 1 Virtualized Environment Content Formatting Standards andRedundancy Type 2 Virtualized Environment Languages Replication Virtualization Environments Standards for Security in the CloudMultisiting Microsoft Virtualization Confidentiality, Integrity, AvailabilityBackup and Recovery Sun xVM VirtualBox Authentication, Authorization,Server Software Environments that Support Linux/UNIX Virtualization AccountabilityCloud Computing VMware Products Regulations for PrivacyServer Capacity Data Center and Cloud Infrastructure Security Protocols Virtualization Products Establishing a Baseline for CloudClustering End-User and Desktop Products PerformanceExpansion IBM Virtualization Best Practices for Selecting a Vendor andServer Functions Using VMware to see a Virtualized Server Implementing Cloud-Based ApplicationsApplication Environment Choosing the Right VendorWeb Permissive Federation Implementing Cloud-Based Applications Database Verified Federation Windows Remote DesktopVendor Approaches to Cloud Computing Encrypted Federation VncRole of Open Source Software in Data Trusted Federation Web BrowsersCenter Using XMPP in the Federated Server ExtensionsCost Reduction vs. Reliability Environment Thin ClientsOpen Source Server Software Presence in the Cloud Smart Phones, Pads, Pods, etc. Open Source Database Software What It Is Virtual Terminal Security Strengths andOpen Source Applications Software Presence Protocols WeaknessesOpen Source System Management Software Leveraging Presence StrengthsOpen Source Load-Balancing Software Presence Enabled Weaknesses Virtualization as the "Operating System" The Future of Presence AndroidVirtualization with a Host Operating System The Interrelation of Identity, Presence, BlackBerryVirtualization Infections on Virtualized and Location in the Cloud Windows MobileEnvironments Identity Management Ubuntu Mobile Internet Device Type 1 Virtualized Environment What It Is Mobile Platform VirtualizationType 2 Virtualized Environment Future of Identity in the Cloud Kernel-Based Virtual MachineVirtualization Environments Privacy and Its Relation to Cloud-Based VMware Mobile Virtualization Platform Microsoft Virtualization Information Systems Collaboration Applications for MobileSun xVM VirtualBox Personal Information PlatformsLinux/UNIX Virtualization Privacy-Related Issues Text MessagingVMware Products Finding Your Private Information iPhone ApplicationsData Center and Cloud Infrastructure Open Cloud Consortium Working Groups BlackBerry ApplicationsProducts Project MatsuEnd-User and Desktop Products Project CometIBM Virtualization HPC in the CloudUsing VMware to see a Virtualized Server The Open Cloud Testbed lineEnvironment The Open Science Data Cloud Cloud Computing InfrastructurePermissive Federation Intercloud Testbed Cloud Computing Terms Verified Federation Reporting on an Open Cloud Consortium Benefits and Limitations of CloudEncrypted Federation Working Group ComputingTrusted Federation Distributed Management Task Force BenefitsUsing XMPP in the Federated Environment (DMTF) LimitationsPresence in the Cloud What It Is? Cloud Computing Case Studies What It Is DMTK Working Groups Associated with How Companies Are Using Cloud

Page 93: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Presence Protocols Cloud Computing ComputingLeveraging Presence Standards for Application Developers Implementing Applications and Services inPresence Enabled Protocols the CloudThe Future of Presence Scripting Languages Using Your Company's Services vs. theThe Interrelation of Identity, Presence, and Content Formatting Standards and Cloud ProviderLocation in the Cloud Languages A Cloud Service Provider Introduced Identity Management Standards for Security in the Cloud Cloud Computing Risks and Issues What It Is Confidentiality, Integrity, Availability Products and Services Provided by CloudFuture of Identity in the Cloud Authentication, Authorization, Computing Companies Privacy and Its Relation to Cloud-Based Accountability EconomicInformation Systems Regulations for Privacy Staffing Personal Information Security Protocols Should Your Company Invest in CloudPrivacy-Related Issues Establishing a Baseline for Cloud Computing?Finding Your Private Information Performance What Should Not be Moved to the Cloud Open Cloud Consortium Working Groups Best Practices for Selecting a Vendor LANs and the CloudProject Matsu and Implementing Cloud-Based Internet and the CloudProject Comet Applications Web Services, Browsers, and the CloudHPC in the Cloud Choosing the Right Vendor Thin ClientThe Open Cloud Testbed Implementing Cloud-Based Applications Advances in Networking and ProcessingThe Open Science Data Cloud Windows Remote Desktop Speeds that Led to Cloud ComputingIntercloud Testbed Vnc Networking DevelopmentsReporting on an Open Cloud Consortium Web Browsers Increased Processing Speeds Working Group Server Extensions Managed Service Provider Model to CloudDistributed Management Task Force Thin Clients Computing and Software as a Service(DMTF) Smart Phones, Pads, Pods, etc. (SaaS)What It Is? Virtual Terminal Security Strengths and Single Purpose Architectures Migrate toDMTK Working Groups Associated with Weaknesses Multipurpose ArchitecturesCloud Computing Strengths Data Center Virtualization Standards for Application Developers Weaknesses CollaborationProtocols Android The Cloud as a Reach ExtenderScripting Languages BlackBerry The Cloud as a Communication EnablerContent Formatting Standards and Windows Mobile The Cloud as an Employee Enabler Languages Ubuntu Mobile Internet Device Service-Oriented Architecture (SOA)Standards for Security in the Cloud Mobile Platform Virtualization Evolving from SOA to the CloudConfidentiality, Integrity, Availability Kernel-Based Virtual Machine Capacity: Limited PerformanceAuthentication, Authorization, Accountability VMware Mobile Virtualization Platform Availability: Communications Failure andRegulations for Privacy Collaboration Applications for Mobile Performance IssuesSecurity Protocols Platforms Security: Newer Security Protocols ProvideEstablishing a Baseline for Cloud Text Messaging More Protection Performance iPhone Applications What's Next in Cloud Computing Best Practices for Selecting a Vendor and BlackBerry Applications Independent ComponentsImplementing Cloud-Based Applications Message BaseChoosing the Right Vendor Location Independence Implementing Cloud-Based Applications Communication Requirements for CloudWindows Remote Desktop line ImplementationVnc Cloud Computing Infrastructure Public InternetWeb Browsers Cloud Computing Terms Private InternetServer Extensions Benefits and Limitations of Cloud Routing to the DatacenterThin Clients Computing Switching within the Data CenterSmart Phones, Pads, Pods, etc. Benefits BandwidthVirtual Terminal Security Strengths and Limitations Tools Used to Measure NetworkWeaknesses Cloud Computing Case Studies PerformanceStrengths How Companies Are Using Cloud Using the Protocol Analyzer to MeasureWeaknesses Computing BandwidthAndroid Implementing Applications and Services Using Ping and Traceroute to MeasureBlackBerry in the Cloud Network Performance Windows Mobile Using Your Company's Services vs. the SecurityUbuntu Mobile Internet Device Cloud Provider SSLMobile Platform Virtualization A Cloud Service Provider Introduced VPNKernel-Based Virtual Machine Cloud Computing Risks and Issues Overhead VMware Mobile Virtualization Platform Products and Services Provided by Cloud Storage Options for Cloud ComputingCollaboration Applications for Mobile Computing Companies Storage CapacityPlatforms Economic Data Protection and PartitioningText Messaging Staffing NASiPhone Applications Should Your Company Invest in Cloud SAN

Page 94: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

BlackBerry Applications Computing? CASWhat Should Not be Moved to the Cloud RedundancyLANs and the Cloud ReplicationInternet and the Cloud Multisiting

line Web Services, Browsers, and the Cloud Backup and Recovery Cloud Computing Infrastructure Thin Client Server Software Environments thatCloud Computing Terms Advances in Networking and Processing Support Cloud ComputingBenefits and Limitations of Cloud Computing Speeds that Led to Cloud Computing Server CapacityBenefits Networking Developments VirtualizationLimitations Increased Processing Speeds ClusteringCloud Computing Case Studies Managed Service Provider Model to ExpansionHow Companies Are Using Cloud Cloud Computing and Software as a Server FunctionsComputing Service (SaaS) ApplicationImplementing Applications and Services in Single Purpose Architectures Migrate to Webthe Cloud Multipurpose Architectures Database Using Your Company's Services vs. the Data Center Virtualization Vendor Approaches to Cloud ComputingCloud Provider Collaboration Role of Open Source Software in DataA Cloud Service Provider Introduced The Cloud as a Reach Extender CenterCloud Computing Risks and Issues The Cloud as a Communication Enabler Cost Reduction vs. ReliabilityProducts and Services Provided by Cloud The Cloud as an Employee Enabler Open Source Server SoftwareComputing Companies Service-Oriented Architecture (SOA) Open Source Database SoftwareEconomic Evolving from SOA to the Cloud Open Source Applications SoftwareStaffing Capacity: Limited Performance Open Source System ManagementShould Your Company Invest in Cloud Availability: Communications Failure and SoftwareComputing? Performance Issues Open Source Load-Balancing Software What Should Not be Moved to the Cloud Security: Newer Security Protocols Virtualization as the "Operating System"LANs and the Cloud Provide More Protection Virtualization with a Host OperatingInternet and the Cloud What's Next in Cloud Computing System Web Services, Browsers, and the Cloud Independent Components Virtualization Infections on VirtualizedThin Client Message Base EnvironmentsAdvances in Networking and Processing Location Independence Type 1 Virtualized EnvironmentSpeeds that Led to Cloud Computing Communication Requirements for Cloud Type 2 Virtualized Environment Networking Developments Implementation Virtualization EnvironmentsIncreased Processing Speeds Public Internet Microsoft VirtualizationManaged Service Provider Model to Cloud Private Internet Sun xVM VirtualBoxComputing and Software as a Service Routing to the Datacenter Linux/UNIX Virtualization(SaaS) Switching within the Data Center VMware ProductsSingle Purpose Architectures Migrate to Bandwidth Data Center and Cloud InfrastructureMultipurpose Architectures Tools Used to Measure Network ProductsData Center Virtualization Performance End-User and Desktop Products Collaboration Using the Protocol Analyzer to Measure IBM VirtualizationThe Cloud as a Reach Extender Bandwidth Using VMware to see a Virtualized ServerThe Cloud as a Communication Enabler Using Ping and Traceroute to Measure Environment The Cloud as an Employee Enabler Network Performance Permissive FederationService-Oriented Architecture (SOA) Security Verified FederationEvolving from SOA to the Cloud SSL Encrypted FederationCapacity: Limited Performance VPN Trusted FederationAvailability: Communications Failure and Overhead Using XMPP in the Federated EnvironmentPerformance Issues Storage Options for Cloud Computing Presence in the CloudSecurity: Newer Security Protocols Provide Storage Capacity What It IsMore Protection Data Protection and Partitioning Presence ProtocolsWhat's Next in Cloud Computing NAS Leveraging PresenceIndependent Components SAN Presence EnabledMessage Base CAS The Future of PresenceLocation Independence Redundancy The Interrelation of Identity, Presence, andCommunication Requirements for Cloud Replication Location in the Cloud Implementation Multisiting Identity ManagementPublic Internet Backup and Recovery What It IsPrivate Internet Server Software Environments that Future of Identity in the Cloud Routing to the Datacenter Support Cloud Computing Privacy and Its Relation to Cloud-BasedSwitching within the Data Center Server Capacity Information SystemsBandwidth Virtualization Personal InformationTools Used to Measure Network Clustering Privacy-Related IssuesPerformance Expansion Finding Your Private Information Using the Protocol Analyzer to Measure Server Functions Open Cloud Consortium Working Groups

Page 95: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Bandwidth Application Project MatsuUsing Ping and Traceroute to Measure Web Project CometNetwork Performance Database HPC in the CloudSecurity Vendor Approaches to Cloud Computing The Open Cloud TestbedSSL Role of Open Source Software in Data The Open Science Data CloudVPN Center Intercloud TestbedOverhead Cost Reduction vs. Reliability Reporting on an Open Cloud ConsortiumStorage Options for Cloud Computing Open Source Server Software Working Group Storage Capacity Open Source Database Software Distributed Management Task ForceData Protection and Partitioning Open Source Applications Software (DMTF)NAS Open Source System Management What It Is?SAN Software DMTK Working Groups Associated withCAS Open Source Load-Balancing Software Cloud Computing Redundancy Virtualization as the "Operating System" Standards for Application DevelopersReplication Virtualization with a Host Operating ProtocolsMultisiting System Scripting LanguagesBackup and Recovery Virtualization Infections on Virtualized Content Formatting Standards andServer Software Environments that Support Environments Languages Cloud Computing Type 1 Virtualized Environment Standards for Security in the CloudServer Capacity Type 2 Virtualized Environment Confidentiality, Integrity, AvailabilityVirtualization Virtualization Environments Authentication, Authorization,Clustering Microsoft Virtualization AccountabilityExpansion Sun xVM VirtualBox Regulations for PrivacyServer Functions Linux/UNIX Virtualization Security Protocols Application VMware Products Establishing a Baseline for CloudWeb Data Center and Cloud Infrastructure PerformanceDatabase Products Best Practices for Selecting a Vendor andVendor Approaches to Cloud Computing End-User and Desktop Products Implementing Cloud-Based ApplicationsRole of Open Source Software in Data IBM Virtualization Choosing the Right VendorCenter Using VMware to see a Virtualized Server Implementing Cloud-Based Applications Cost Reduction vs. Reliability Environment Windows Remote DesktopOpen Source Server Software Permissive Federation VncOpen Source Database Software Verified Federation Web BrowsersOpen Source Applications Software Encrypted Federation Server ExtensionsOpen Source System Management Software Trusted Federation Thin ClientsOpen Source Load-Balancing Software Using XMPP in the Federated Smart Phones, Pads, Pods, etc. Virtualization as the "Operating System" Environment Virtual Terminal Security Strengths andVirtualization with a Host Operating System Presence in the Cloud WeaknessesVirtualization Infections on Virtualized What It Is StrengthsEnvironments Presence Protocols Weaknesses Type 1 Virtualized Environment Leveraging Presence AndroidType 2 Virtualized Environment Presence Enabled BlackBerryVirtualization Environments The Future of Presence Windows MobileMicrosoft Virtualization The Interrelation of Identity, Presence, Ubuntu Mobile Internet Device Sun xVM VirtualBox and Location in the Cloud Mobile Platform VirtualizationLinux/UNIX Virtualization Identity Management Kernel-Based Virtual MachineVMware Products What It Is VMware Mobile Virtualization Platform Data Center and Cloud Infrastructure Future of Identity in the Cloud Collaboration Applications for MobileProducts Privacy and Its Relation to Cloud-Based PlatformsEnd-User and Desktop Products Information Systems Text MessagingIBM Virtualization Personal Information iPhone ApplicationsUsing VMware to see a Virtualized Server Privacy-Related Issues BlackBerry ApplicationsEnvironment Finding Your Private Information Permissive Federation Open Cloud Consortium Working GroupsVerified Federation Project MatsuEncrypted Federation Project Comet lineTrusted Federation HPC in the Cloud Cloud Computing InfrastructureUsing XMPP in the Federated Environment The Open Cloud Testbed Cloud Computing Terms Presence in the Cloud The Open Science Data Cloud Benefits and Limitations of CloudWhat It Is Intercloud Testbed ComputingPresence Protocols Reporting on an Open Cloud Consortium BenefitsLeveraging Presence Working Group LimitationsPresence Enabled Distributed Management Task Force Cloud Computing Case Studies The Future of Presence (DMTF) How Companies Are Using CloudThe Interrelation of Identity, Presence, and What It Is? Computing

Page 96: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Location in the Cloud DMTK Working Groups Associated with Implementing Applications and Services inIdentity Management Cloud Computing the CloudWhat It Is Standards for Application Developers Using Your Company's Services vs. theFuture of Identity in the Cloud Protocols Cloud ProviderPrivacy and Its Relation to Cloud-Based Scripting Languages A Cloud Service Provider Introduced Information Systems Content Formatting Standards and Cloud Computing Risks and Issues Personal Information Languages Products and Services Provided by CloudPrivacy-Related Issues Standards for Security in the Cloud Computing Companies Finding Your Private Information Confidentiality, Integrity, Availability EconomicOpen Cloud Consortium Working Groups Authentication, Authorization, Staffing Project Matsu Accountability Should Your Company Invest in CloudProject Comet Regulations for Privacy Computing?HPC in the Cloud Security Protocols What Should Not be Moved to the Cloud The Open Cloud Testbed Establishing a Baseline for Cloud LANs and the CloudThe Open Science Data Cloud Performance Internet and the CloudIntercloud Testbed Best Practices for Selecting a Vendor Web Services, Browsers, and the CloudReporting on an Open Cloud Consortium and Implementing Cloud-Based Thin ClientWorking Group Applications Advances in Networking and ProcessingDistributed Management Task Force Choosing the Right Vendor Speeds that Led to Cloud Computing(DMTF) Implementing Cloud-Based Applications Networking DevelopmentsWhat It Is? Windows Remote Desktop Increased Processing Speeds DMTK Working Groups Associated with Vnc Managed Service Provider Model to CloudCloud Computing Web Browsers Computing and Software as a ServiceStandards for Application Developers Server Extensions (SaaS)Protocols Thin Clients Single Purpose Architectures Migrate toScripting Languages Smart Phones, Pads, Pods, etc. Multipurpose ArchitecturesContent Formatting Standards and Virtual Terminal Security Strengths and Data Center Virtualization Languages Weaknesses CollaborationStandards for Security in the Cloud Strengths The Cloud as a Reach ExtenderConfidentiality, Integrity, Availability Weaknesses The Cloud as a Communication EnablerAuthentication, Authorization, Accountability Android The Cloud as an Employee Enabler Regulations for Privacy BlackBerry Service-Oriented Architecture (SOA)Security Protocols Windows Mobile Evolving from SOA to the CloudEstablishing a Baseline for Cloud Ubuntu Mobile Internet Device Capacity: Limited PerformancePerformance Mobile Platform Virtualization Availability: Communications Failure andBest Practices for Selecting a Vendor and Kernel-Based Virtual Machine Performance IssuesImplementing Cloud-Based Applications VMware Mobile Virtualization Platform Security: Newer Security Protocols ProvideChoosing the Right Vendor Collaboration Applications for Mobile More Protection Implementing Cloud-Based Applications Platforms What's Next in Cloud Computing Windows Remote Desktop Text Messaging Independent ComponentsVnc iPhone Applications Message BaseWeb Browsers BlackBerry Applications Location Independence Server Extensions Communication Requirements for CloudThin Clients ImplementationSmart Phones, Pads, Pods, etc. Public InternetVirtual Terminal Security Strengths and line Private InternetWeaknesses Cloud Computing Infrastructure Routing to the DatacenterStrengths Cloud Computing Terms Switching within the Data CenterWeaknesses Benefits and Limitations of Cloud BandwidthAndroid Computing Tools Used to Measure NetworkBlackBerry Benefits PerformanceWindows Mobile Limitations Using the Protocol Analyzer to MeasureUbuntu Mobile Internet Device Cloud Computing Case Studies BandwidthMobile Platform Virtualization How Companies Are Using Cloud Using Ping and Traceroute to MeasureKernel-Based Virtual Machine Computing Network Performance VMware Mobile Virtualization Platform Implementing Applications and Services SecurityCollaboration Applications for Mobile in the Cloud SSLPlatforms Using Your Company's Services vs. the VPNText Messaging Cloud Provider Overhead iPhone Applications A Cloud Service Provider Introduced Storage Options for Cloud ComputingBlackBerry Applications Cloud Computing Risks and Issues Storage Capacity

Products and Services Provided by Cloud Data Protection and PartitioningComputing Companies NASEconomic SANStaffing CAS

Page 97: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Should Your Company Invest in Cloud RedundancyComputing? ReplicationWhat Should Not be Moved to the Cloud Multisiting LANs and the Cloud Backup and Recovery Internet and the Cloud Server Software Environments thatWeb Services, Browsers, and the Cloud Support Cloud ComputingThin Client Server CapacityAdvances in Networking and Processing VirtualizationSpeeds that Led to Cloud Computing ClusteringNetworking Developments ExpansionIncreased Processing Speeds Server FunctionsManaged Service Provider Model to ApplicationCloud Computing and Software as a WebService (SaaS) Database Single Purpose Architectures Migrate to Vendor Approaches to Cloud ComputingMultipurpose Architectures Role of Open Source Software in DataData Center Virtualization CenterCollaboration Cost Reduction vs. ReliabilityThe Cloud as a Reach Extender Open Source Server SoftwareThe Cloud as a Communication Enabler Open Source Database SoftwareThe Cloud as an Employee Enabler Open Source Applications SoftwareService-Oriented Architecture (SOA) Open Source System ManagementEvolving from SOA to the Cloud SoftwareCapacity: Limited Performance Open Source Load-Balancing Software Availability: Communications Failure and Virtualization as the "Operating System"Performance Issues Virtualization with a Host OperatingSecurity: Newer Security Protocols System Provide More Protection Virtualization Infections on VirtualizedWhat's Next in Cloud Computing EnvironmentsIndependent Components Type 1 Virtualized EnvironmentMessage Base Type 2 Virtualized Environment Location Independence Virtualization EnvironmentsCommunication Requirements for Cloud Microsoft VirtualizationImplementation Sun xVM VirtualBoxPublic Internet Linux/UNIX VirtualizationPrivate Internet VMware ProductsRouting to the Datacenter Data Center and Cloud InfrastructureSwitching within the Data Center ProductsBandwidth End-User and Desktop Products Tools Used to Measure Network IBM VirtualizationPerformance Using VMware to see a Virtualized ServerUsing the Protocol Analyzer to Measure Environment Bandwidth Permissive FederationUsing Ping and Traceroute to Measure Verified FederationNetwork Performance Encrypted FederationSecurity Trusted FederationSSL Using XMPP in the Federated EnvironmentVPN Presence in the CloudOverhead What It IsStorage Options for Cloud Computing Presence ProtocolsStorage Capacity Leveraging PresenceData Protection and Partitioning Presence EnabledNAS The Future of PresenceSAN The Interrelation of Identity, Presence, andCAS Location in the Cloud Redundancy Identity ManagementReplication What It IsMultisiting Future of Identity in the Cloud Backup and Recovery Privacy and Its Relation to Cloud-BasedServer Software Environments that Information SystemsSupport Cloud Computing Personal InformationServer Capacity Privacy-Related IssuesVirtualization Finding Your Private Information Clustering Open Cloud Consortium Working GroupsExpansion Project Matsu

Page 98: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Server Functions Project CometApplication HPC in the CloudWeb The Open Cloud TestbedDatabase The Open Science Data CloudVendor Approaches to Cloud Computing Intercloud TestbedRole of Open Source Software in Data Reporting on an Open Cloud ConsortiumCenter Working Group Cost Reduction vs. Reliability Distributed Management Task ForceOpen Source Server Software (DMTF)Open Source Database Software What It Is?Open Source Applications Software DMTK Working Groups Associated withOpen Source System Management Cloud Computing Software Standards for Application DevelopersOpen Source Load-Balancing Software ProtocolsVirtualization as the "Operating System" Scripting LanguagesVirtualization with a Host Operating Content Formatting Standards andSystem Languages Virtualization Infections on Virtualized Standards for Security in the CloudEnvironments Confidentiality, Integrity, AvailabilityType 1 Virtualized Environment Authentication, Authorization,Type 2 Virtualized Environment AccountabilityVirtualization Environments Regulations for PrivacyMicrosoft Virtualization Security Protocols Sun xVM VirtualBox Establishing a Baseline for CloudLinux/UNIX Virtualization PerformanceVMware Products Best Practices for Selecting a Vendor andData Center and Cloud Infrastructure Implementing Cloud-Based ApplicationsProducts Choosing the Right VendorEnd-User and Desktop Products Implementing Cloud-Based Applications IBM Virtualization Windows Remote DesktopUsing VMware to see a Virtualized Server VncEnvironment Web BrowsersPermissive Federation Server ExtensionsVerified Federation Thin ClientsEncrypted Federation Smart Phones, Pads, Pods, etc. Trusted Federation Virtual Terminal Security Strengths andUsing XMPP in the Federated WeaknessesEnvironment StrengthsPresence in the Cloud Weaknesses What It Is AndroidPresence Protocols BlackBerryLeveraging Presence Windows MobilePresence Enabled Ubuntu Mobile Internet Device The Future of Presence Mobile Platform VirtualizationThe Interrelation of Identity, Presence, Kernel-Based Virtual Machineand Location in the Cloud VMware Mobile Virtualization Platform Identity Management Collaboration Applications for MobileWhat It Is PlatformsFuture of Identity in the Cloud Text MessagingPrivacy and Its Relation to Cloud-Based iPhone ApplicationsInformation Systems BlackBerry ApplicationsPersonal InformationPrivacy-Related IssuesFinding Your Private Information This course includes interactive labs,Open Cloud Consortium Working Groups demonstrations, and case studies to illustrateProject Matsu cloud computing concepts and applications.Project Comet lineHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking Group Distributed Management Task Force(DMTF)

Page 99: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

What It Is?DMTK Working Groups Associated withCloud Computing Standards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguages Standards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity Protocols Establishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc. Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet Device Mobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization Platform Collaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry Applications

lineCloud Computing InfrastructureCloud Computing Terms Benefits and Limitations of CloudComputingBenefitsLimitationsCloud Computing Case Studies How Companies Are Using CloudComputingImplementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider Introduced Cloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies Economic

Page 100: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Staffing Should Your Company Invest in CloudComputing?What Should Not be Moved to the Cloud LANs and the CloudInternet and the CloudWeb Services, Browsers, and the CloudThin ClientAdvances in Networking and ProcessingSpeeds that Led to Cloud ComputingNetworking DevelopmentsIncreased Processing Speeds Managed Service Provider Model toCloud Computing and Software as aService (SaaS)Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center Virtualization CollaborationThe Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee Enabler Service-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More Protection What's Next in Cloud Computing Independent ComponentsMessage BaseLocation Independence Communication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork Performance SecuritySSLVPNOverhead Storage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisiting Backup and Recovery Server Software Environments thatSupport Cloud ComputingServer CapacityVirtualizationClustering

Page 101: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

ExpansionServer FunctionsApplicationWebDatabase Vendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software Virtualization as the "Operating System"Virtualization with a Host OperatingSystem Virtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized Environment Virtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop Products IBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment Permissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironment Presence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the Cloud Identity ManagementWhat It IsFuture of Identity in the Cloud Privacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information Open Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking Group Distributed Management Task Force

Page 102: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

(DMTF)What It Is?DMTK Working Groups Associated withCloud Computing Standards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguages Standards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity Protocols Establishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc. Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet Device Mobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization Platform Collaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry Applications

lineCloud Computing InfrastructureCloud Computing Terms Benefits and Limitations of CloudComputingBenefitsLimitationsCloud Computing Case Studies How Companies Are Using CloudComputingImplementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider Introduced Cloud Computing Risks and Issues Products and Services Provided by CloudComputing Companies

Page 103: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

EconomicStaffing Should Your Company Invest in CloudComputing?What Should Not be Moved to the Cloud LANs and the CloudInternet and the CloudWeb Services, Browsers, and the CloudThin ClientAdvances in Networking and ProcessingSpeeds that Led to Cloud ComputingNetworking DevelopmentsIncreased Processing Speeds Managed Service Provider Model toCloud Computing and Software as aService (SaaS)Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center Virtualization CollaborationThe Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee Enabler Service-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More Protection What's Next in Cloud Computing Independent ComponentsMessage BaseLocation Independence Communication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork Performance SecuritySSLVPNOverhead Storage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisiting Backup and Recovery Server Software Environments thatSupport Cloud ComputingServer CapacityVirtualization

Page 104: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

ClusteringExpansionServer FunctionsApplicationWebDatabase Vendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software Virtualization as the "Operating System"Virtualization with a Host OperatingSystem Virtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized Environment Virtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop Products IBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment Permissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironment Presence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the Cloud Identity ManagementWhat It IsFuture of Identity in the Cloud Privacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information Open Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud ConsortiumWorking Group

Page 105: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Distributed Management Task Force(DMTF)What It Is?DMTK Working Groups Associated withCloud Computing Standards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguages Standards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity Protocols Establishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc. Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet Device Mobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization Platform Collaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry Applications

lineCloud Computing InfrastructureCloud Computing Terms Benefits and Limitations of CloudComputingBenefitsLimitationsCloud Computing Case Studies How Companies Are Using CloudComputingImplementing Applications and Servicesin the CloudUsing Your Company's Services vs. theCloud ProviderA Cloud Service Provider Introduced Cloud Computing Risks and Issues Products and Services Provided by Cloud

Page 106: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Computing Companies EconomicStaffing Should Your Company Invest in CloudComputing?What Should Not be Moved to the Cloud LANs and the CloudInternet and the CloudWeb Services, Browsers, and the CloudThin ClientAdvances in Networking and ProcessingSpeeds that Led to Cloud ComputingNetworking DevelopmentsIncreased Processing Speeds Managed Service Provider Model toCloud Computing and Software as aService (SaaS)Single Purpose Architectures Migrate toMultipurpose ArchitecturesData Center Virtualization CollaborationThe Cloud as a Reach ExtenderThe Cloud as a Communication EnablerThe Cloud as an Employee Enabler Service-Oriented Architecture (SOA)Evolving from SOA to the CloudCapacity: Limited PerformanceAvailability: Communications Failure andPerformance IssuesSecurity: Newer Security ProtocolsProvide More Protection What's Next in Cloud Computing Independent ComponentsMessage BaseLocation Independence Communication Requirements for CloudImplementationPublic InternetPrivate InternetRouting to the DatacenterSwitching within the Data CenterBandwidthTools Used to Measure NetworkPerformanceUsing the Protocol Analyzer to MeasureBandwidthUsing Ping and Traceroute to MeasureNetwork Performance SecuritySSLVPNOverhead Storage Options for Cloud ComputingStorage CapacityData Protection and PartitioningNASSANCASRedundancyReplicationMultisiting Backup and Recovery Server Software Environments thatSupport Cloud ComputingServer Capacity

Page 107: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

VirtualizationClusteringExpansionServer FunctionsApplicationWebDatabase Vendor Approaches to Cloud ComputingRole of Open Source Software in DataCenterCost Reduction vs. ReliabilityOpen Source Server SoftwareOpen Source Database SoftwareOpen Source Applications SoftwareOpen Source System ManagementSoftwareOpen Source Load-Balancing Software Virtualization as the "Operating System"Virtualization with a Host OperatingSystem Virtualization Infections on VirtualizedEnvironmentsType 1 Virtualized EnvironmentType 2 Virtualized Environment Virtualization EnvironmentsMicrosoft VirtualizationSun xVM VirtualBoxLinux/UNIX VirtualizationVMware ProductsData Center and Cloud InfrastructureProductsEnd-User and Desktop Products IBM VirtualizationUsing VMware to see a Virtualized ServerEnvironment Permissive FederationVerified FederationEncrypted FederationTrusted FederationUsing XMPP in the FederatedEnvironment Presence in the CloudWhat It IsPresence ProtocolsLeveraging PresencePresence EnabledThe Future of PresenceThe Interrelation of Identity, Presence,and Location in the Cloud Identity ManagementWhat It IsFuture of Identity in the Cloud Privacy and Its Relation to Cloud-BasedInformation SystemsPersonal InformationPrivacy-Related IssuesFinding Your Private Information Open Cloud Consortium Working GroupsProject MatsuProject CometHPC in the CloudThe Open Cloud TestbedThe Open Science Data CloudIntercloud TestbedReporting on an Open Cloud Consortium

Page 108: Cloud Computing Essentialsstore.globalknowledge.net/course-overviews/DK/GK3210.pdf · How Companies Are Using Cloud Using Your Company's Services vs. the Using Your Company's Services

GK3210 www.globalknowledge.com/da-dk/ [email protected] tlf.nr.: 44 88 18 00

Working Group Distributed Management Task Force(DMTF)What It Is?DMTK Working Groups Associated withCloud Computing Standards for Application DevelopersProtocolsScripting LanguagesContent Formatting Standards andLanguages Standards for Security in the CloudConfidentiality, Integrity, AvailabilityAuthentication, Authorization,AccountabilityRegulations for PrivacySecurity Protocols Establishing a Baseline for CloudPerformanceBest Practices for Selecting a Vendorand Implementing Cloud-BasedApplicationsChoosing the Right VendorImplementing Cloud-Based Applications Windows Remote DesktopVncWeb BrowsersServer ExtensionsThin ClientsSmart Phones, Pads, Pods, etc. Virtual Terminal Security Strengths andWeaknessesStrengthsWeaknesses AndroidBlackBerryWindows MobileUbuntu Mobile Internet Device Mobile Platform VirtualizationKernel-Based Virtual MachineVMware Mobile Virtualization Platform Collaboration Applications for MobilePlatformsText MessagingiPhone ApplicationsBlackBerry Applications

Flere Informationer:

For yderligere informationer eller booking af kursus, kontakt os på tlf.nr.: 44 88 18 00

[email protected]

www.globalknowledge.com/da-dk/

Global Knowledge, Stamholmen 110, 2650 Hvidovre