CAPACITACIÓN

 

COMUNIDAD

MÁS

Aprendizaje Automático

Arquitectura Orientada
a Servicios (SOA)

Big Data

Blockchain

Ciberseguridad

Computación en la Nube

Contenedorización

DevOps

Diseño y Gestión de APIs

Gobernanza de Servicios

Inteligencia Artificial (IA)

Internet de las Cosas (IoT)

Microservicios

Seguridad de Servicios

Transformación Digital

Cursos y Exámenes en Inglés

Sitio de Patrones de Arcitura

Arcitura en YouTube

Arcitura en LinkedIn (español)

Arcitura en LinkedIn (inglés)

Arcitura en Facebook (inglés)

Arcitura en Twitter (inglés)

Arcitura en Facebook (inglés)

Libros de Arcitura Publicados por Pearson Education

Contacte a Arcitura

Soluciones de eLearning

Soluciones de Estudio en Casa

Programas Junior (edades 16-20+)

 

Calendario de Talleres Públicos

Talleres Privados

Descargar Catálogo (PDF)

       

CERTIFICACIONES

     

Especialista en Transformación Digital

Profesional de Tecnología
de Transformación Digital

Arquitecto de Tecnología
de Transformación Digital

Profesional de Ciencia de Datos
de Transformación Digital

Científico de Datos
de Transformación Digital

Profesional de Seguridad
de Transformación Digital

Especialista en Seguridad
de Transformación Digital

Profesional de Nube

Profesional de Tecnología de Nube

Arquitecto de Nube

Especialista en Seguridad en la Nube

Especialista en Gobernanza de Nube

Especialista en Almacenamiento
en la Nube

Especialista en Virtualización
en la Nube

Profesional de SOA

Analista de SOA

Arquitecto de SOA

Arquitecto de Microservicios

Consultor de Tecnología de Servicios

Especialista en APIs de Servicios

Especialista en Gobernanza
de Servicios

Especialista en Seguridad de Servicios

Profesional de Big Data

Profesional en Ciencias de Big Data

Científico de Big Data

Consultor de Big Data

Ingeniero en Big Data

Arquitecto de Big Data

Especialista en Gobernanza
de Big Data

Arquitecto de Blockchain

Arquitecto de Contenedorización

Arquitecto de IoT

Especialista en
Aprendizaje Automático

Especialista en Ciberseguridad

Especialista en DevOps

Especialista en Inteligencia Artificial

Profesional Junior
de Ciencias de Big Data

Profesional Junior
de Computación en la Nube

Profesional Junior
de Transformación Digital

 

Distintivos de Acclaim/Credly

Exámenes de Pearson Vue

TRANSFORMACIÓN DIGITAL
CCP   SOACP   BDSCP  
NEXT-GEN IT   JUNIOR

Cloud Computing Design Patterns

Chapter 1: Introduction

Objective of This Book
What This Book Does Not Cover
Who This Book Is For
Origin of This Book
Recommended Reading
How This Book Is Organized
Chapter 3: Sharing, Scaling and Elasticity Patterns
Chapter 4: Reliability, Resiliency and Recovery Patterns
Chapter 5: Data Management and Storage Device Patterns
Chapter 6: Virtual Server and Hypervisor Connectivity and
Management Patterns
Chapter 7: Monitoring, Provisioning and Administration Patterns
Chapter 8: Cloud Service and Storage Security Patterns
Chapter 9: Network Security, Identity & Access Management
and Trust Assurance Patterns
Chapter 10: Common Compound Patterns
Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns Reference
Additional Information
Symbol Legend
Pattern Documentation Conventions
Updates, Errata, and Resources (www.servicetechbooks.com)
Cloud Computing Design Patterns (www.cloudpatterns.org)
What Is Cloud? (www.whatiscloud.com)
Referenced Specifications (www.servicetechspecs.com)
The Service Technology Magazine (www.servicetechmag.com)
CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)

Chapter 2: Understanding Design Patterns

About Pattern Profiles
Requirement
Icon
Problem
Solution
Application
Mechanisms
About Compound Patterns
Design Pattern Notation.
Capitalization
Page Number References
Measures of Design Pattern Application
Working with This Catalog

Chapter 3: Sharing, Scaling and Elasticity Patterns

Shared Resources
Problem
Solution
Application
Mechanisms
Workload Distribution
Problem
Solution
Application
Mechanisms
Dynamic Scalability
Problem
Solution
Application
Mechanisms
Service Load Balancing
Problem
Solution
Application
Mechanisms
Elastic Resource Capacity
Problem
Solution
Application
Mechanisms
Elastic Network Capacity
Problem
Solution
Application
Mechanisms
Elastic Disk Provisioning
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Server Instances
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Switches
Problem
Solution
Application
Mechanisms
Service State Management
Problem
Solution
Application
Mechanisms
Storage Workload Management
Problem
Solution
Application
Mechanisms
Dynamic Data Normalization
Problem
Solution
Application
Mechanisms
Cross-Storage Device Vertical Tiering
Problem
Solution
Application
Mechanisms
Intra-Storage Device Vertical Data Tiering
Problem
Solution
Application
Mechanisms
Memory Over-Committing
Problem
Solution
Application
Mechanisms
NIC Teaming
Problem
Solution
Application
Mechanisms
Broad Access
Problem
Solution
Application
Mechanisms

Chapter 4: Reliability, Resiliency and Recovery Patterns

Resource Pooling
Problem
Solution
Application
Mechanisms
Resource Reservation
Problem
Solution
Application
Mechanisms
Hypervisor Clustering
Problem
Solution
Application
Mechanisms
Redundant Storage
Problem
Solution
Application
Mechanisms
Dynamic Failure Detection and Recovery
Problem
Solution
Application
Mechanisms
Multipath Resource Access
Problem
Solution
Application
Mechanisms
Redundant Physical Connection for Virtual Servers
Problem
Solution
Application
Mechanisms
Synchronized Operating State
Problem
Solution
Application
Mechanisms
Zero Downtime
Problem
Solution
Application
Mechanisms
Storage Maintenance Window
Problem
Solution
Application
Mechanisms
Virtual Server Auto Crash Recovery
Problem
Solution
Application
Mechanisms
Non-Disruptive Service Relocation
Problem
Solution
Application
Mechanisms

Chapter 5: Data Management and Storage

Device Patterns
Direct I/O Access
Problem
Solution
Application
Mechanisms
Direct LUN Access
Problem
Solution
Application
Mechanisms
Single Root I/O Virtualization
Problem
Solution
Application
Mechanisms
Cloud Storage Data at Rest Encryption
Problem
Solution
Application
Mechanisms
Cloud Storage Data Lifecycle Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Placement Compliance Check
Problem
Solution
Application
Mechanisms
Cloud Storage Device Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Path Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Performance Enforcement
Problem
Solution
Application
Mechanisms
Virtual Disk Splitting
Problem
Solution
Application
Mechanisms
Sub-LUN Tiering
Problem
Solution
Application
Mechanisms
RAID-Based Data Placement
Problem
Solution
Application
Mechanisms
IP Storage Isolation
Problem
Solution
Application
Mechanisms

Chapter 6: Virtual Server and Hypervisor

Connectivity and Management Patterns
Virtual Server Folder Migration
Problem
Solution
Application
Mechanisms
Persistent Virtual Network Configuration
Problem
Solution
Application
Mechanisms
Virtual Server Connectivity Isolation
Problem
Solution
Application
Mechanisms
Virtual Switch Isolation
Problem
Solution
Application
Mechanisms
Virtual Server NAT Connectivity
Problem
Solution
Application
Mechanisms
External Virtual Server Accessibility
Problem
Solution
Application
Mechanisms
Cross-Hypervisor Workload Mobility
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Anti-Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Connectivity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Anti-Affinity
Problem
Solution
Application
Mechanisms
Stateless Hypervisor
Problem
Solution
Application
Mechanisms

Chapter 7: Monitoring, Provisioning and Administration Patterns

Usage Monitoring
Problem
Solution
Application
Mechanisms
Pay-as-You-Go
Problem
Solution
Application
Mechanisms
Realtime Resource Availability
Problem
Solution
Application
Mechanisms
Rapid Provisioning
Problem
Solution
Application
Mechanisms
Platform Provisioning
Problem
Solution
Application
Mechanisms
Bare-Metal Provisioning
Problem
Solution
Application
Mechanisms
Automated Administration
Problem
Solution
Application
Mechanisms
Centralized Remote Administration
Problem
Solution
Application
Mechanisms
Resource Management
Problem
Solution
Application
Mechanisms
Self-Provisioning
Problem
Solution
Application
Mechanisms
Power Consumption Reduction
Problem
Solution
Application
Mechanisms

Chapter 8: Cloud Service and Storage Security Patterns

Trusted Platform BIOS
Problem
Solution
Application
Mechanisms
Geotagging
Problem
Solution
Application
Mechanisms
Hypervisor Protection
Problem
Solution
Application
Mechanisms
Cloud VM Platform Encryption
Problem
Solution
Application
Mechanisms
Trusted Cloud Resource Pools
Problem
Solution
Application
Mechanisms
Secure Cloud Interfaces and APIs
Problem
Solution
Application
Mechanisms
Cloud Resource Access Control
Problem
Solution
Application
Mechanisms
Detecting and Mitigating User-Installed VMs
Problem
Solution
Application
Mechanisms
Mobile BYOD Security
Problem
Solution
Application
Mechanisms
Cloud Data Breach Protection
Problem
Solution
Application
Mechanisms
Permanent Data Loss Protection
Problem
Solution
Application
Mechanisms
In-Transit Cloud Data Encryption
Problem
Solution
Application
Mechanisms

Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns

Secure On-Premise Internet Access
Problem
Solution
Application
Mechanisms
Secure External Cloud Connection
Problem
Solution
Application
Mechanisms
Secure Connection for Scaled VMs
Problem
Solution
Application
Mechanisms
Cloud Denial-of-Service Protection
Problem
Solution
Application
Mechanisms
Cloud Traffic Hijacking Protection
Problem
Solution
Application
Mechanisms
Automatically Defined Perimeter
Problem
Solution
Application
Mechanisms
Cloud Authentication Gateway
Problem
Solution
Application
Mechanisms
Federated Cloud Authentication
Problem
Solution
Application
Mechanisms
Cloud Key Management
Problem
Solution
Application
Mechanisms
Trust Attestation Service
Problem
Solution
Application
Mechanisms
Collaborative Monitoring and Logging
Problem
Solution
Application
Mechanisms
Independent Cloud Auditing
Problem
Solution
Application
Mechanisms
Threat Intelligence Processing
Problem
Solution
Application
Mechanisms

Chapter 10: Common Compound Patterns

“Compound Pattern” vs. “Composite Pattern”
Compound Pattern Members
Joint Application vs. Coexistent Application
Private Cloud
Public Cloud
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (IaaS)
Elastic Environment
Multitenant Environment
Resilient Environment
Cloud Bursting
Burst Out to Private Cloud
Burst Out to Public Cloud
Burst In
Secure Burst Out to Private Cloud/Public Cloud
Cloud Balancing
Cloud Authentication
Resource Workload Management
Isolated Trust Boundary

Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns
Reference
About the Authors

Thomas Erl
Robert Cope
Amin Naserpour

Index