- Learn how to Build your own cloud sandbox; a three-part series.
- Patterns: Create a virtual system pattern (VSP) Scaling Manager pattern type.
- Build a web API to expose objects; API can be invoked to create a contact in the Salesforce.com CSR system.
- See how Apache Thrift enables scalable cross-language development in a sample client/server application.
- Build a compute node or small cluster application and scale with high performance computing.
Complete cloud developer
allenkane 270002Y2HJ Tags:  technology_development devops development_and_operation... 618 Visits
In honor of the Pulse 2012 conference ("Optimizing the World's Infrastructure," March 4-7), I thought I'd provide a knowledgebase roundup of some resources that can help an IT pro automate and manage cloud infrastructure tasks. Many of IBM's infrastructure-management middleware products belong to the Tivoli family ... these are optimized to provide efficient management for cloud systems:
Monitor services in the cloud: Discover the secrets of monitoring cloud services through tips, tricks, and tools | Monitoring cloud services is one of the major cornerstones of the cloud. By monitoring cloud services, you can determine whether you're extracting the most you can out of your resource utilization. In this article, the authors define monitoring with a specific eye on monitoring in the IBM Cloud environment and discuss the fundamental options for monitoring in the IBM Cloud. They walk you through two scenarios designed to illustrate the technical process of monitoring cloud services, demonstrate IBM Tivoli Monitoring (ITM) Autonomous Agent and RESTful APIs, two tools for monitoring services, and take you step by step into setting up and using the IBM Tivoli Monitoring Autonomous Agent on the IBM Cloud.
Product page: IBM Tivoli Monitoring software helps you optimize IT infrastructure performance and availability. Use this system monitoring software to manage operating systems, databases and servers in distributed and host environments.
Deploy a J2EE app with TSAM extensions | IBM Tivoli Service Automation Manager (TSAM) 7.2.2 introduces the extension, a set of TSAM software components that can implement a new IT service automation solution (known as a service definition) or add capabilities to existing service definitions. In this article, the authors define a scenario in which the desired result is to securely deploy a three-tiered enterprise application (in this case J2EE) to the cloud. They demonstrate how to set up and provision extensions in TSAM as the first step to accomplishing this task.
Real-world journey to your own private cloud, Part 1: Prepare the concept | Part 2: Install and configure the software | Part 3: Use the cloud | In this article series, the author outlines the process, from conception to deployment, that his team used to build a private, on-premise cloud environment that incorporates structures found in IaaS and PaaS cloud service models. The cloud environment is constructed with software and hardware components chosen by the team; however, the article contains knowledge and instruction that can be used regardless of technologies you choose. Part 1 provides information on cloud structures, the five phases in the development roadmap, and details on some of the solutions the team discovered. Part 2 provides information on installing and configuring the server environments and cloud software components, post-installation activities, and special features of the installed software. Part 3 defines IBM Tivoli Service Automation Manager (TSAM) user roles, provides an example of the cloud provisioning process and a list of sample exercises the user can do to test the implementation, and shows you some general tricks and tips we learned in implementing the project.
Build a private cloud with IWD and TSAM | An organization must address a number of considerations when building a private cloud computing environment; specifically, it needs to take a holistic approach to private clouds that include creating, deploying, monitoring, and managing service construction and delivery. Both the Tivoli Service Automation Manager (TSAM) and WebSphere CloudBurst Appliance (now known as IBM Workload Deployer) equip users with these capabilities. In this article, the authors discuss why and how you can integrate Tivoli Service Automation Manager with WebSphere CloudBurst to deliver a private cloud.
Product page: IBM Tivoli Service Automation Manager enables users to request, deploy, monitor, and manage cloud computing services. It also provides traceable approvals and processes.
Best practices for access control in multi-tenant cloud solutions using Tivoli Access Manager | Learn how to use the IBM Tivoli Access Manager to provide tenant awareness, protect your application resources, and to provide single sign-on.
Product page: IBM Tivoli Access Manager for e-business is a single sign-on (SSO) solution that authorizes and authenticates user access to web and other hosted applications. It centralizes user access management for online portal and business initiatives.
Product page: Integrate and deploy key ITIL processes into your cloud environment with Tivoli Live Service Manager. It lets you implement incident-, change-, release-, and asset-management processes, leveraging a common data model and a robust change-management database. [Demo | Video]
Establish a system to build custom virtual cloud images | Virtual images allow users to freeze-dry preferred software environments and deliver them to users in a rapid and consistent manner: As a result, companies are turning to virtual images as a means to improve software delivery within their data centers. As they make greater use of virtual images, challenges are emerging -- such as determining how much content to put into a single image and how best to construct these images. The authors discuss these challenges and introduce the IBM Image Construction and Composition Tool (ICCT), freely available for download, that addresses many of these challenges and provides a systematic approach to constructing virtual images in the cloud.
Product page: You can use the IBM Image Construction and Composition Tool to build virtual images for deployment into cloud environments. The ICCT is model-driven and easy-to-use. It promotes a separation of concern and tasks, where experts build particular software bundles for reuse by others. This design approach greatly simplifies the complexity of image creation and reduces errors. The ICCT is designed to enable efficient reuse and management of images and software in a cloud environment. It provides the capability to build and share images that are self-descriptive, customizable, and easily managed.
Product page: Build and manage a low-touch, highly scalable cloud with IBM SmartCloud Provisioning. This IaaS solution reduces costs and offers near-zero downtime and automated recovery, allows quick cloud deployment and features automated provisioning, parallel scalability, and integrated fault tolerance to increase operational efficiency and respond to user needs. It also provides the foundation to integrate more advanced cloud capabilities.
Product page: With IBM SmartCloud Monitoring, you can maximize the density of your virtual environment while ensuring high availability of critical workloads. Also known as Tivoli Monitoring for Virtual Environments, this product provides capacity planning and virtualization and cloud monitoring across multiple hypervisor platforms.
Product page: IBM Service Delivery Manager is a pre-integrated software stack, deployed as a set of virtual images that automate IT service deployment and provide resource monitoring and cost management in a cloud. IBM Service Delivery Manager is a cloud management platform that enables the data center to accelerate the creation of service platforms for a wide spectrum of workload types with a high degree of integration, flexibility, and resource optimization.
The following library of articles, written by IBM Cloud experts, shows you how to successfully perform certain tasks on the IBM Cloud. In many of these resources, you'll find not just the steps to perform the task, but some explanation of the concepts behind the tasks.
allenkane 270002Y2HJ Tags:  ibm_smartcloud_enterprise community_knowledge cloud_computing policy cloud soa governance 1,696 Visits
developerWorks cloud computing has woven several topic threads throughout its knowledge base; one of these is designed to help you determine whether or not you need a policy for various aspects of cloud computing, including service security, mobile access, performance metrics, threshold, workload balancing, policy automation, and billing. For example:
Craft a cloud performance metrics policy: Often businesses and agencies use performance metrics to measure how well the system is performing; not as often do they use them to measure how well cloud services are performing. In this article, the author explains why it is best to be proactive using cloud performance metrics to fix the problems before service outages could happen and provides three proactive steps -- on monitoring performance, testing performance, and crafting a cloud performance metrics policy -- to help you avoid poor cloud performance.
Craft a cloud service security policy: For economic reasons, often businesses and government agencies move data center operations to the cloud whether they want to or not; their reasons for not liking the idea of hosting in a cloud are reliability and security. To help ease business security concerns, a cloud security policy should be in place. In this article, the author explains how to craft a cloud security policy for managing users, protecting data, and securing virtual machines.
Balance workload in a cloud environment: Many businesses and government agencies demand cloud services to provide continuous operational availability and security. To make this a reality, they will require a threshold policy on resource management for application testing and production. In this article, the author explains what a threshold policy is and how it can help to balance workload demands dynamically in a cloud environment.
Build proactive threshold policies on the cloud: Often businesses and agencies implement technical, organizational, and business policies to ensure that users comply with the terms in the policy; in other words, to inform cloud computing service consumers and providers what they should do. This is the purpose of a carefully crafted threshold policy -- too often, this level of policy does not exist. In this article, the author explains how to craft the policies with examples; follow these templates on purpose, scope, background, consumer control, actions, and constraints to learn to craft resource, user, and data request threshold policies for the cloud.
Cloud services: Mitigate risks, maintain availability: Businesses and government agencies demand cloud services to provide better security in order to ensure continuous operational availability. To make this a reality, they need to formulate a cloud service policy on risk mitigation. Learn about cloud service security and how to mitigate risks to cloud services to ensure high uptime availability and security in a cloud environment.
Model-driven cloud security: This article details the challenges to effective application security policy automation, explains the benefits model-driven security adds to security policy automation, and then demonstrates how to achieve cloud application security policy automation.
IBM SmartCloud Enterprise tip: Integrate your authentication policy using a proxy: Managing business rules for the authorization and authentication of custom-built cloud applications in the IBM SmartCloud Enterprise environment doesn't have to be a difficult task. The author uses the structure of IBM Cloud APIs to demonstrate how to build business rules into a proxy that bridges among the command line, Java, and RESTful APIs. Using a proxy also keeps users from skipping around your business rules when accessing the IBM Cloud portal.
Cloud billing service: Cloud billing is the process of generating bills from the resource usage data using a set of predefined billing policies. The author defines a cloud billing service module enabled for a service oriented architecture, covering both functional requirements -- a quote service, conversion functions and policies, payment schemes, and user identification -- and the non-functional, but essential, requirements such as security, scalability, standards, and fault tolerance.
Cloud business analytics: Write your own dashboard: Business analytics and cloud computing are hot, complex topics; the idea of combining the two could drive away those with less experience. But fear not: The author provides a simple look at the complex history of business analytics, illuminates the common points where both meet, explains the benefits that a cloud environment can bring to business analytics (and vice-versa), and gives you an example for writing your own cloud business analytics application.
allenkane 270002Y2HJ Tags:  cloud ibm_smartcloud_enterprise community_knowledge cloud_computing 1,710 Visits
The external IBM developerWorks cloud community -- made up of developers, programmers, administrators, designers and planners, and ecosystem partners - contribute greatly to the developerWorks knowledge base of cloud computing technology. Here are some of our recent contributors and the cutting-edge information they bring with them.
Grid and P2P add to automated testing on the cloud: Randy Hayes, Founder and CTO of Grid Robotics, explains how automated testing on the cloud is the answer to the roadblock that testing the explosive increase in applications that deal with mobile access. His concept: Adding grid computing and peer-to-peer collaboration functionality to make automated testing on the cloud more effective.
Optimize cloud application delivery systems: Alex Gosse, Solutions Architect for Zeus Technology, introduces the concepts that make up a "traffic management" model designed to effect better delivery of your cloud applications. Focus is on the application delivery controller.
Best practices for cloud computing multi-tenancy: Jason Meiers, Systems Planning Engineer at Visa, delivers best practices and tools for creating cloud computing multi-tenancy architectures as well as initial planning for scalable and highly available infrastructures. Meiers also details cloud billing and metering options in Cloud metering and billing.
Build a more secure, mobile cloud environment: Mobile security guru Preston Cox illuminates mobile cloud security issues by looking at the current state of cloud security breaches, vulnerabilities of mobile cloud devices, and how to address those vulnerabilities.
Architecting applications for the cloud: SystemForge CEO Peter Bell shows you how to architect cloud-ready applications that are easier to deploy, maintain, and scale.
Extend Java EE containers with cloud characteristics: Senior Technology Architect Jayakrishnan Ramdas and Principal Architect J. Srinivas at Infosys LTD outline the basic characteristics of cloud applications and Java Enterprise Edition applications, compare their similarities and contrast their differences, and then define a set of strategies and provide patterns to extend Java EE container and application with such cloud characteristics as parallelism, elasticity, multi-tenancy, and security.
Use Node.js as a full cloud environment development stack: AT&T Interactive Associate Director Engineer Noah Gift and Predictix Senior Systems Engineer Jeremy Jones examines the Node.js framework, the ecosystem surrounding it, and shows you how to build a cloud chat server using it.
Disaster recovery in a cloud environment: Educopia Institute System Engineer Bill Robbins outlines steps he took in a disaster recovery exercise at his organization and learn how you can use the process provided as a template for your own disaster recovery efforts.
Develop and deploy cloud-optimized 4GL applications: Servoy Senior Technical Engineer Sean Devlin and CEO Jan Aleman help you explore which programming language type, 3GL or 4GL, is best suited for your cloud application needs and development environment.
Convert your web application to a multi-tenant SaaS solution: Corent Technology VP Scott Chate explains the steps you need to take to convert your existing web application to a full-fledged, multi-tenant, cloud-ready SaaS application.
Solve cloud-related big data problems with MapReduce: AT&T Interactive Associate Director Engineer Noah Gift demonstrates why cloud computing and MapReduce are helpful in solving big data problems.
Deliver cloud network control to the user: Co-founder of CohesiveFT Ryan Koop describes how using a virtual network -- hybrid devices that act as virtual routers, switches, SSL and IPSec VPN concentrators, and protocol redistributors, all tied up in a configurable mesh -- can give the user control of addressing, topology, protocols, and encrypted communications for the devices the user deploys to the cloud.
Enable application-centric cloud management: Kaavo Senior Software Developer Joydeep Biswas presents a definition of application-centric-style management, the three key steps to achieving it, and demonstrates how to automate the deployment of a two-tier J2EE application in the IBM Cloud.