100% found this document useful (5 votes)
36 views70 pages

Reliability Aspect of Cloud Computing Environment Vikas Kumar - The ebook in PDF format is available for download

The document discusses the reliability aspects of cloud computing, emphasizing its significance in the selection of cloud vendors. It highlights the shift towards cloud services due to their cost-effectiveness and accessibility, while also addressing the challenges and risks associated with cloud adoption. The book aims to provide a comprehensive review of reliability models suitable for different cloud service models and deployments to aid customers and vendors alike.

Uploaded by

slikaszelya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (5 votes)
36 views70 pages

Reliability Aspect of Cloud Computing Environment Vikas Kumar - The ebook in PDF format is available for download

The document discusses the reliability aspects of cloud computing, emphasizing its significance in the selection of cloud vendors. It highlights the shift towards cloud services due to their cost-effectiveness and accessibility, while also addressing the challenges and risks associated with cloud adoption. The book aims to provide a comprehensive review of reliability models suitable for different cloud service models and deployments to aid customers and vendors alike.

Uploaded by

slikaszelya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

Explore the full ebook collection and download it now at textbookfull.

com

Reliability Aspect of Cloud Computing Environment


Vikas Kumar

https://textbookfull.com/product/reliability-aspect-of-
cloud-computing-environment-vikas-kumar/

OR CLICK HERE

DOWLOAD EBOOK

Browse and Get More Ebook Downloads Instantly at https://textbookfull.com


Click here to visit textbookfull.com and download textbook now
Your digital treasures (PDF, ePub, MOBI) await
Download instantly and pick your perfect format...

Read anywhere, anytime, on any device!

Cloud Computing CLOUD 2018 Min Luo

https://textbookfull.com/product/cloud-computing-cloud-2018-min-luo/

textbookfull.com

Essentials of Cloud Computing A Holistic Perspective


Surianarayanan

https://textbookfull.com/product/essentials-of-cloud-computing-a-
holistic-perspective-surianarayanan/

textbookfull.com

Cloud Technologies An Overview of Cloud Computing


Technologies for Managers 1st Edition Mchaney

https://textbookfull.com/product/cloud-technologies-an-overview-of-
cloud-computing-technologies-for-managers-1st-edition-mchaney/

textbookfull.com

Zen of Cloud Learning Cloud Computing by Examples on


Microsoft Azure 1st Edition Bai

https://textbookfull.com/product/zen-of-cloud-learning-cloud-
computing-by-examples-on-microsoft-azure-1st-edition-bai/

textbookfull.com
Assured cloud computing First Edition Campbell

https://textbookfull.com/product/assured-cloud-computing-first-
edition-campbell/

textbookfull.com

Measuring the Business Value of Cloud Computing Theo Lynn

https://textbookfull.com/product/measuring-the-business-value-of-
cloud-computing-theo-lynn/

textbookfull.com

Applications in Ubiquitous Computing Raman Kumar

https://textbookfull.com/product/applications-in-ubiquitous-computing-
raman-kumar/

textbookfull.com

Cloud Computing : Simply in Depth Ajit Singh

https://textbookfull.com/product/cloud-computing-simply-in-depth-ajit-
singh/

textbookfull.com

Python for Water and Environment 2024th Edition Anil Kumar

https://textbookfull.com/product/python-for-water-and-
environment-2024th-edition-anil-kumar/

textbookfull.com
Vikas Kumar · R. Vidhyalakshmi

Reliability
Aspect of Cloud
Computing
Environment
Reliability Aspect of Cloud Computing
Environment
Vikas Kumar R. Vidhyalakshmi

Reliability Aspect of Cloud


Computing Environment

123
Vikas Kumar R. Vidhyalakshmi
School of Business Studies Army Institute of Management &
Sharda University Technology
Greater Noida, Uttar Pradesh, India Greater Noida, Uttar Pradesh, India

ISBN 978-981-13-3022-3 ISBN 978-981-13-3023-0 (eBook)


https://doi.org/10.1007/978-981-13-3023-0

Library of Congress Control Number: 2018958932

© Springer Nature Singapore Pte Ltd. 2018


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

Cloud computing is one of the most promising technologies of the twenty-first


century. It has brought a sweeping change in the implementation of information and
communication technology (ICT) operations by offering computing solutions as a
service. John McCarthy’s idea of computation being provided as utility has been
brought into practicality through cloud computing paradigm. All resources of com-
puting such as storage, server, network, processor capacity, software development
platform, and software applications are delivered as services over the Internet. Low
start-up cost, anytime remote access of services, shifting of IT-related overheads to
cloud service providers, pay-per-use model, conversion of capEx to opEx,
auto-scalability to meet demand spikes, multiple platforms, device portability, etc.,
are some of the various factors that inspire organization of all sizes to adopt cloud
computing. Cloud technologies are now generating massive revenues for technology
vendors and cloud service providers; still, there are many years of strong growth
ahead. According to the RightScale’s State of the Cloud Survey (2018), 38% of
enterprises are prioritizing the public cloud implementations. On the other hand, IDC
had predicted that worldwide spending on public cloud services is expected to double
from almost $70 billion in 2015 to over $141 billion in 2019. An average company
uses about 1,427 cloud-based services ranging from Facebook to Dropbox (Skyhigh
Networks, 2017). Correspondingly, a large number of organizations are migrating to
the cloud-based infrastructure and services. A growing number of cloud applications,
cloud deployments, and cloud vendors are a good example of this. However, this has
put up a challenging need for the more reliable and sustainable cloud computing
models and applications.
A large number of enterprises have a multi-cloud strategy, as the enterprises are
finding it difficult to satisfy all their needs from a single cloud vendor. The relia-
bility of the cloud services plays the most important role in the selection of cloud
vendors. If we consider the available literature, privacy and security have been
given ample attention by researchers; contrary to this, the present book focuses on
the reliability aspect of cloud computing services in particular. The responsibility of
ensuring the reliability of services varies with the type of cloud service model and
deployment chosen by customers. In terms of service models, IaaS customers have

v
vi Preface

maximum control on cloud service utilization, SaaS customers have no or least


control on application services, while the customers and providers share equal
responsibility in PaaS service model. Likewise, private cloud deployments are in
complete control of customers, public cloud deployments are in control of service
providers, whereas in hybrid deployments, customers and providers share their
responsibility. High adoption trends of cloud (particularly SaaS), inherent business
continuity risks in cloud adoption, the majority of SaaS deployment being done
using public clouds, and existing research gap in terms of reliability are the prime
reasons for identifying the reliability of cloud computing environment as the subject
area of this publication.
Traditional software reliability models cannot be used for cloud reliability evalu-
ation due to the changes in the development architecture and delivery designs.
Customer–vendor relationship mostly comes to a close with traditional software
installations, whereas it starts with SaaS subscription. The reliability of cloud services
is normally presented in terms of percentage such as 99.9% or 99.99%. These per-
centage values are converted to downtime and uptime information (per month or per
year). This type of reliability measurement provides confidence only in the service
availability feature and may not talk about all the quality attributes of the product.
Both the qualitative and quantitative approaches to cloud reliability have been taken
up with a comprehensive review of the reliability models suitable for different services
and deployments. The reliability evaluation models will help customers to identify
different cloud products, suitable to the business needs, and will also help developers
to gather customer expectations. Most importantly, it will help the vendors to improve
their service and support.

Greater Noida, India Vikas Kumar


R. Vidhyalakshmi
Contents

1 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2 Deployment Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.3 Service Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1.4 Virtualization Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.5 Business Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2 Cloud Adoption and Migration . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2.1 Merits of Cloud Adoption . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2.2 Cost–Benefit Analysis of Cloud Adoption . . . . . . . . . . . . . 15
1.2.3 Strategy for Cloud Migration . . . . . . . . . . . . . . . . . . . . . . 17
1.2.4 Mitigation of Cloud Migration Risks . . . . . . . . . . . . . . . . 18
1.2.5 Case Study for Adoption and Migration to Cloud . . . . . . . 20
1.3 Challenges of Cloud Adoption . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.3.1 Technology Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.3.2 Service Provider Perspective . . . . . . . . . . . . . . . . . . . . . . . 23
1.3.3 Consumer Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.3.4 Governance Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.4 Limitations of Cloud Adoption . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2 Cloud Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.1.1 Mean Time Between Failure . . . . . . . . . . . . . . . . . . . . . . 32
2.1.2 Mean Time to Repair . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.1.3 Mean Time to Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

vii
viii Contents

2.2 Software Reliability Requirements in Business . . . . . . . . . . . . . . . 32


2.2.1 Business Continuity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.2.2 Information Availability . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.3 Traditional Software Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.4 Reliability in Distributed Environments . . . . . . . . . . . . . . . . . . . . 39
2.5 Defining Cloud Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.5.1 Existing Cloud Reliability Models . . . . . . . . . . . . . . . . . . 43
2.5.2 Types of Cloud Service Failures . . . . . . . . . . . . . . . . . . . . 45
2.5.3 Reliability Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3 Reliability Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.2 Reliability of Service-Oriented Architecture . . . . . . . . . . . . . . . . . 53
3.3 Reliability of Virtualized Environments . . . . . . . . . . . . . . . . . . . . 58
3.4 Recommendations for Reliable Services . . . . . . . . . . . . . . . . . . . . 61
3.4.1 ISO 9126 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.4.2 NIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.4.3 CSMIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.5 Categories of Cloud Reliability Metrics . . . . . . . . . . . . . . . . . . . . 69
3.5.1 Expectation Based Metrics . . . . . . . . . . . . . . . . . . . . . . . . 70
3.5.2 Usage Based Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.5.3 Standards-Based Metrics . . . . . . . . . . . . . . . . . . . . . . . . . 75
3.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
4 Reliability Metrics Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.2 Common Cloud Reliability Metrics . . . . . . . . . . . . . . . . . . . . . . . 81
4.2.1 Reliability Metrics Identification . . . . . . . . . . . . . . . . . . . . 81
4.2.2 Quantification Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.3 Infrastructure as a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.3.1 Reliability Metrics Identification . . . . . . . . . . . . . . . . . . . . 94
4.3.2 Quantification Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
4.4 Platform as a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
4.4.1 Reliability Metrics Identification . . . . . . . . . . . . . . . . . . . . 99
4.4.2 Quantification Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.5 Software as a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
4.5.1 Reliability Metrics Identification . . . . . . . . . . . . . . . . . . . . 102
4.5.2 Quantification Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
4.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Contents ix

5 Reliability Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111


5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
5.2 Multi Criteria Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.2.1 Types of MCDM Methods . . . . . . . . . . . . . . . . . . . . . . . . 114
5.3 Analytical Hierarchy Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
5.3.1 Comparison Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
5.3.2 Eigen Vector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
5.3.3 Consistency Ratio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
5.3.4 Sample Input for SaaS Product Reliability . . . . . . . . . . . . . 120
5.4 CORE Reliability Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
5.4.1 Layers of the Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
5.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
6 Reliability Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
6.1.1 Assumed Customer Profile Details . . . . . . . . . . . . . . . . . . 133
6.2 Reliability Metrics Preference Input . . . . . . . . . . . . . . . . . . . . . . . 134
6.3 Metrics Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
6.3.1 Expectation-Based Input . . . . . . . . . . . . . . . . . . . . . . . . . . 141
6.3.2 Usage-Based Input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
6.3.3 Standards-Based Input . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
6.4 Comparative Reliability Evaluation . . . . . . . . . . . . . . . . . . . . . . . 145
6.4.1 Relative Reliability Matrix . . . . . . . . . . . . . . . . . . . . . . . . 145
6.4.2 Relative Reliability Vector . . . . . . . . . . . . . . . . . . . . . . . . 146
6.5 Final Reliability Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
6.5.1 Single Product Reliability . . . . . . . . . . . . . . . . . . . . . . . . . 150
6.5.2 Reliability Based Product Ranking . . . . . . . . . . . . . . . . . . 152
6.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Annexure: Sample Data for SaaS Reliability Calculations . . . . . . . . . . . . 159
About the Authors

Dr. Vikas Kumar received his M.Sc. in electronics from Kurukshetra University,
Haryana, India, followed by M.Sc. in computer science and Ph.D. from the same
university. His Ph.D. work was in collaboration with CEERI, Pilani, and he has
worked in a number of ISRO-sponsored projects. He has designed and conducted a
number of training programs for the corporate sector and has served as a trainer for
various Government of India departments. Along with six books, he has published
more than 100 research papers in various national and international conferences and
journals. He was Editor of the international refereed journal Asia-Pacific Business
Review from June 2007 to June 2009. He is a regular reviewer for a number of
international journals and prestigious conferences. He is currently Professor at the
Sharda University, Greater Noida, and Visiting Professor at the Indian Institute of
Management, Indore, and University of Northern Iowa, USA.

Dr. R. Vidhyalakshmi received her master’s in computer science from


Bharathidasan University, Tamil Nadu, India, and Ph.D. from JJT University,
Rajasthan, India. Her Ph.D. work focused on determining the reliability of SaaS
applications. She is a Lifetime Member of ISTE. She has conducted training pro-
grams in Java, Advanced Excel, and R Programming. She has published numerous
research papers in Scopus indexed international journals and various national and
international conference proceedings. Her areas of interest include: information
systems, web technologies, database management systems, data sciences, big data
and analytics, and cloud computing. She is currently Faculty Member at the Army
Institute of Management and Technology, Greater Noida, India.

xi
Chapter 1
Cloud Computing

Abbreviations

CapEx Capital expenditure


CSA Cloud security alliance
CSP Cloud service provider
IaaS Infrastructure as a service
NIST National Institute of Standards and Technology
OpEx Operational expenses
PaaS Platform as a service
SaaS Software as a service
SAN Storage area network

Moore’s Law was predicted by Gordon Moore, Intel co-founder in 1965 which stated
that the processing power (i.e., number of in a transistor of a silicon chips) will be
doubled in every 18–24 months. This became reality only in a few decades and finally
failed due to technology advancements resulting in abundant computing power. The
processing power doubled in a much less than the expected time and got leveraged
in almost all domains for incorporating speed, accuracy, and efficiency. Integrated
circuit chips have a limit of 12 mm2 , tweaking the transistors within this limit has
also got an upper limit. Correspondingly, the benefits of making the chips smaller
is diminishing and operating capacity of the high-end chips has been on the plateau
since middle of 2000. This led to a lookout for the development in computing field,
beyond the hardware. One such realization is the new computing paradigm called
Cloud Computing. Since its introduction about a decade ago, cloud computing has
evolved at a rapid pace and has found an inevitable place in every business operation.
This chapter provides an insight to various aspects of cloud computing, its business
benefits along with real time business implementation examples.

© Springer Nature Singapore Pte Ltd. 2018 1


V. Kumar and R. Vidhyalakshmi, Reliability Aspect of Cloud
Computing Environment, https://doi.org/10.1007/978-981-13-3023-0_1
2 1 Cloud Computing

1.1 Introduction

Most commonly stated definition of cloud computing as provided by NIST is “Cloud


computing is a model for enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g. networks, servers, storage,
applications and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction”.
Cloud computing has brought disruption in the computing world. All resources
required for computing are provided as service over Internet on demand. The delivery
of software as a product has been replaced by provision of software as a service. The
computing services are commoditized and delivered as utilities. This has brought the
idea of John McCarthy into reality. He had suggested in 1961 at MIT’s centennial
speech that computing technology might lead to a future where the applications
and computing power could be sold through utility business model like water or
electricity. The maturity of Internet Service Provider (ISP) over a span of time has
led to the evolution of cloud computing.
More and more organizations have moved to or willing to move to cloud due to
its numerous business benefits, with the main benefit being its innovative approach
to solve business problem with less initial investment. Dynamism of technology and
business needs have led to tremendous development in cloud computing. Organiza-
tions cannot afford to spend days or months in adopting new technology. Keeping
abreast with the ever-changing technology will give competitive edge to the organi-
zation. If the technology needs of the organization are given keen importance then
they may loose out in business innovation, which will eventually push them out of
the market. This bottle neck situation is solved by cloud adoption as the technical
overhead of the organization is moved on to the Cloud Service Provider (CSP).
Depending on the IT skill strength and finance potential, organizations have
various options to fulfill IT needs of the organization like in-house development,
hosted setup, outsourcing, or cloud adoption. Most of the organizations prefer hybrid
approach for leveraging IT supports from multiple sources depending on the sen-
sitivity of the business operation. This is considered as an optimal strategy for IT
inclusion in business as hybrid approach reduces dependency on a single IT support.

1.1.1 Characteristics

Cloud Computing services are delivered over the Internet. It provides a very high
level of technology abstraction, due of which, customers with a very limited technical
knowledge, can also starts using cloud applications at the click of the mouse. NIST
describes characteristics of cloud computing as follows (NIST 2015):
1.1 Introduction 3

i. Broad Network Access


Cloud computing facilitates optimal utilization of computing resources of the
organization by hosting them in cloud network and allow access by vari-
ous departments using wide range of devices. Cloud adoption also facilitates
resources and services to be used at the time of need. The services can be uti-
lized using standard mechanism and thin client over Internet from any device.
Heterogeneous client platforms are available for access using desktops, laptops,
mobiles, and tablet PCs with the help of IE, Chrome, Safari, Firefox, or any
browsers that supports HTML standards.
ii. On-demand Self Service
Resource requirements for IT implementations in organizations vary according
to the specific business needs. Thus, the resources need to be provisioned as per
the varying needs of the organization. Faster adoption to changes will provide
competitive advantage, which in turn brings agility to the organizations. Usage of
traditional computing model to accommodate changing business needs depends
on the prediction of business growth. This might end up in either over allocation
or under allocation of resources, if the prediction goes wrong. Over allocation
leads to under-utilization of resources and under allocation leads to loss of
business. Cloud adoption solves these issues as the resources are provisioned
based on the current business demands and are released once the demand recedes.
iii. Elasticity and Scalability
On-demand resource allocation characteristics bring in two more important char-
acteristics of cloud computing: elasticity and scalability. These characteristics
provide flexibility in using the resources. An application, which is initiated to
work on a single server, might scale up to 10 or 100 servers depending on the
usage which is the elasticity of applications. Scalability is the automatic provi-
sioning and de-provisioning of resources depending on the spikes and surges in
IT resource requirements. Scalability can further be categorized as horizontal
and vertical scalability. Horizontal scalability refers to the increase in same type
of resources, whereas vertical scalability refers to the scaling of resources of
various types.
iv. Measured Services
Cloud adoption eliminates the traditional way of software or IT resources pur-
chasing, installing, maintenance, and upgrading. IT requirement of the organiza-
tion are leveraged as services being provided by the CSP. Services are measured
and the charges are levied based on subscription or pay-per-use models. Low-
investment characteristic of cloud computing helps the startups to leverage IT
services with minimal charges. Cloud services can be monitored, measured,
controlled, billed, and reported. Effective monitoring is the key to utilize cloud
service cost.
v. Multi-tenancy
This is the backbone feature of cloud computing allows various users also
referred to as tenants, to utilize same resources. A single instance of software
application will be used to serve multiple users. These are hosted, provisioned
and managed by cloud service providers. The tenants are provided minimum
4 1 Cloud Computing

customization facility. This feature increases optimal utilization of resources


and hence reduces usage cost. This characteristic is common in public cloud
deployments. The resources allotted to tenants are protected using various iso-
lation techniques.
Software or a solution provided with cloud computing service tag must exhibit
all or some of the characteristics defined. Any software product marketed as
cloud solution which does not possess these characteristics is referred to as
cloud-washing.

1.1.2 Deployment Methods

Cloud services can be deployed in any one of the four ways such as private cloud,
public cloud, community cloud and hybrid cloud. Physical presence of the resources,
security levels, and access methods varies with service deployment type. The selec-
tion of cloud deployment method is done based on the data sensitivity of the business
and their business requirements (Liu et al. 2011). Figure 1.1 depicts advantages of
various deployment methods.
i. Private Cloud
It is cloud setup that is maintained within the premises of the organization. It
is also called as “Internal Cloud”. Third party can also be involved in this to
host an on-site private cloud or outsourced private cloud maintained exclusively
for a single organization. This type of deployment is preferred by large orga-
nizations that include a strong IT team to setup, maintain, and control cloud
operations. This is intended for a single tenant cloud setup with strong data
security capabilities. Availability, resiliency, privacy, and security are the major
advantages of this type of deployment. Private cloud can be setup using major
service providers such as Amazon, Microsoft, VMware, Sun, IBM, etc. Some of
the open source implementations for the same are Eucalyptus and OpenSatck.
ii. Public Cloud
This type of cloud setup is open to general public. Multiple tenants exist in this
cloud setup which is owned, managed, and operated by service providers. Small-
and mid-sized companies opt for this type of cloud deployments with the prime
intention to replace CapEx with OpEx. “Pay as you go” model is used in this
setup, where the consumers pay only for the resources that are utilized by them.
Adoption of this facility eliminates prediction and forecasting overhead of IT
infrastructure requirements. Public cloud includes thousands of servers spanning
across various data centers situated across the globe. Facility to choose the data
center near to their business operations is provided to the consumers to reduce
latency in service provisioning. The public cloud setup requires huge investment
so it is set up large enterprises like Amazon, Microsoft, Google , Oracle, etc.
1.1 Introduction 5

Public Cloud Private Cloud Community Hybrid Cloud


• Used by • Used within the Cloud •Integraon of
Mulple tenants premises of the • Sharing of OpEx more than one
• Conversion of organizaon and CapEx to type of cloud
CapEx to OpEx • Opmal reduce costs deployment
• Transfer of IT ulizaon of • Used by people model
overhead to CSP exisng IT of same •Supports
• "Pay as you go" infrastrucutre profession resource
model • Used by single • Mulple tenants portability
tenant are supported • Manipulaon of
• Totally • Enjoy public CapEx and OpEx
controlled by in- cloud advantage to reduce costs.
house IT team along with data • Provides
security flexibility to
cloud
implementaon

Fig. 1.1 Advantages of various cloud deployments

iii. Community Cloud


This deployment has multi-tenant cloud setup, which is shared by organizations
having common professional interest and have common concerns towards pri-
vacy, security, and regulatory compliances. This is maintained as an in-house
community cloud or outsourced community cloud. Organizations involved in
this type of setup will have optimal utilization of their resources as unused
resources of one organization will be allotted to the other organization, which
is in need of such resources. This also helps to share in-house CapEx of IT
resources. Community Cloud setup helps to have advantages of public cloud
like Pay-as-you-go billing structure, scalability and multi-tenancy along with
the benefits of private cloud such as compliance, privacy, and security.
iv. Hybrid Cloud
This deployment uses integration of more than one cloud deployment model
such as on-site or outsourced private cloud, public cloud, and on-site or out-
6 1 Cloud Computing

sourced community cloud. It is preferred in such cases where it is necessary


to maintain the facility of one model and also to utilize the feature of another
model. The organizations that deal with more sensitive data can maintain data in
on-site private cloud and can utilize the applications from public cloud. Hybrid
clouds are chosen to meet specific technology or business requirement and to
optimize privacy and security at minimum investment. Organizations can take
the advantage of scalability, and cost efficiency of the public cloud without
exposing critical data and applications to security vulnerabilities.

1.1.3 Service Models

Software, storage, network, and processing capacity are provided as services from
cloud. The wide range of services offered is built on top of one another and is also
termed as cloud computing stack. Figure 1.2 represents cloud computing stack. Three
major cloud computing services are Infrastructure as a Service (IaaS), Platform as
a Service (PaaS), and Software as a Service (SaaS). With the proliferation of cloud
in almost all computing related activities various other services are also provided
on demand and are collectively termed as Anything as a Service (XaaS). The XaaS
service list includes Communication as a Service, Network as a Service, Monitoring
as a Service, Storage as a Service, Database as a Service, etc.

Fig. 1.2 Cloud computing


• Software as a Service
stack showing the cloud
• Fully functional online applications
service models accessed through web browsers
SaaS • Google docs, Google sheets, CRM,
Salesforce, Office 365 etc.

• Platform as a Service
• Development tools, Web Servers, databases
• Google App engine, Microsoft Azure,
PaaS Amazon Elastic Cloud etc.

• Infrastructure as a Service
• Virtual Machines, Servers, Storage and
Networks
IaaS • Amazon Ec2, Rackspace, VMWare, IBM
Smart Cloud, Google cloud Storage etc.
1.1 Introduction 7

i. Infrastructure as a Service (IaaS)


This type of computing model provides the virtualized computing resources,
such as: servers, network, storage, and Operating System on demand over Inter-
net. Third-party service providers host these resources, which can be utilized
by cloud users on subscription basis. The consumers do not have control on the
underlying physical resources, but can control operating system, storage and
deployed applications. Service providers also perform the associated support
tasks like backup, system updation, and resiliency planning. Facility of auto-
matic provisioning and releasing facilitate dynamic resource allocation based
on business needs.
A hypervisor or virtual machine monitor (vmm), such as: Xen, Oracle virtual
box, VMware, or Hyper-V, creates and runs the virtual machines. These virtual
machines are also called as guest machines (Janakiram 2012). A hypervisor pro-
vides virtual operating platform to the guest operating system and also manages
the execution of guest operating system. A pool of hypervisors with large num-
ber of virtual machine provides the scalability. After provisioning of the required
infrastructure, the operating system images and application software needs to be
installed by the cloud user to use these services. Dynamic scaling of resources,
resource distribution as a service, utility pricing model, and handling multiple
users on single hardware are the essential characteristics of IaaS. It is preferred
organizations with low capital investments, rapid growth, and temporary need
of resources or applications that require volatile demand of resources.
IaaS is not preferable when the organizations have compliance regulatory issues
in outsourcing or the applications require dedicated devices to provide high
performance.
Example: Rackspace, VMware, IBM Smart Cloud, Amazon EC2, Open
Stack, etc.
ii. Platform as a Service (PaaS)
This type of service provides the software development platform with operating
system, database, programming language execution environment, web server,
libraries, and tools. These services are utilized to deploy, manage, test, and exe-
cute customized applications in cost-effective manner without hardware and
software maintenance complexities. Cloud users do not have control on the
underlying infrastructure, however has control over the deployed applications.
Specialized applications of PaaS are iPaaS, and dPaaS. iPaaS is an Integration
Platform as a Service which enables customers to develop and execute integra-
tion flows. dPaaS is Data Platform as a Service which provides data management
as a service. Data visualization tools are used to retain control and transparency
over data.
Providing various easy to deploy UI scenarios using web-based user interface
creation tools, enabling utilization of the same development application by mul-
tiple users with the help of multi-tenant architecture, providing web services,
and database integration using common standards and providing project plan-
ning and communication tools for development team collaboration are the main
characteristics of PaaS.
8 1 Cloud Computing

PaaS is preferred, when multiple developers are involved in a single project


development or in development of applications to leverage the data from the
existing application or in the application development using agile software
development. It is not preferred in the scenarios, where proprietary language
approaches would impact the software development or greater customization of
the software and the underlying hardware is unavoidable.
Example: Google app engine, Windows Azure, force.com, Heroku.
iii. Software as a Service
Software as a Service abbreviated as SaaS is also called as on-demand software.
It is an Internet model based software delivery that has changed the identity of the
software from product to service. SaaS applications have resemblance with web
services in terms of remote access but the variations are pricing model, software
scope, and service delivery of both software and hardware. The providers install
and manage application in their cloud infrastructure and cloud user access them
using web browsers which are also called as thin clients. The Cloud users have
no control on the infrastructure or the application barring few user—specific
application configuration settings. This eliminates the cumbersome installation
process and also simplifies the maintenance and support. The applications are
provisioned at the time of need and are charged based on subscription. As the
cloud applications are centrally hosted, software updations are released without
the need to perform any reinstallation of the software.
Essential characteristics of SaaS are software delivery as “one-to-many” model,
software upgrades and patches handling by cloud provider, Web access provision
for commercial software and API interface between pieces of software. SaaS is
preferable for applications that have common business operations across the user
base, web or mobile access requirements, business operation spikes that prompt
resource demand spikes, short-term application software usage requirements.
SaaS is not preferable when the applications deal with fast processing of real-
time data; legalization issues with respect to data hosting or when the on-premise
application satisfies all the business requirements.
Example: Google Docs, Office 365, NetSuite, IBM LotusLive etc.

1.1.4 Virtualization Concepts

Virtualization was introduced in 1960s by IBM for boosting utilization of large


expensive mainframes. Now it has regained its usage as one of the core technology
of cloud computing which allows abstraction of fundamental elements of computing
resources such as server, storage, and networks (Buyya et al. 2013). In simpler terms,
it is the facility by which virtual version of the devices or resources such as server,
storage, network, or operating system can be created in a single system. It will also
help to work beyond the physical IT infrastructure capacity of the organization. The
various working environment created are called as virtual because they simulate the
interface of the new environment. A computer having Windows operating system can
1.1 Introduction 9

Virtual Machine 1 Virtual Machine 2 Virtual Machine 3

Applicaon 1 Tesng Applicaon 2

OS 1 OS 2 OS 3

Virtualizaon Machine Manager

Host Hardware

Fig. 1.3 Virtualization on a single machine

be made to work with other operating systems also using virtualization. It increases
utilization of hardware resources and also allows organizations to reduce the enor-
mous power consuming servers. This also helps organizations to achieve green IT
(Menascé 2005).
VMware and Oracle are the leading companies which are providing products
such as VMware Player and Oracle’s VirtualBox that supports virtualization imple-
mentation. Virtualization can be achieved as a hosted approach or using hypervisor
architecture. In hosted approach partitioning services are provided on top of the exist-
ing operating system to support wide range of guest operating systems. Hypervisor
also known as Virtualization Machine Manager (VMM) is the software that helps
in successful implementation of virtualization on the bare machine. It has direct
access to the machine hardware and is an interface and a controller between the host-
ing machine and the guest operating system or applications to regulate the resource
usage (vmware 2006).
Virtualization can also be used to combine resources from multiple physical
resources into a single virtual resource. Virtualization helps to eliminate server
sprawl, reduced complexity in maintaining business continuity, and rapid provi-
sioning for test and development. Figure 1.3 describes the virtualized environment.
Various types of virtualizations include
10 1 Cloud Computing

i. Storage virtualization
It is the combination of multiple network storage devices to project as a single
huge storage unit. The storage spaces of several interconnected devices are
combined into a simulated single storage space. It is implemented using software
on Storage Area Network (SAN), which is a high-speed sub-network of shared
storage devices primarily used for backup and archiving processes.
ii. Server virtualization
The concept of one physical dedicated server is replaced with virtual servers.
Physical server is divided into many virtual servers to enhance optimal uti-
lization. Main identity of the physical server is masked and the users interact
through the virtual servers only. Usage of virtual web servers helps to provide
low-cost web hosting facility. This also conserves infrastructure space as several
servers are replaced by a single server. The hardware maintenance overhead is
also reduced to a larger extent (Beal 2018).
iii. Operating system virtualization
This type of virtualization allows the same machine to run the multiple instances
of different operating system concurrently through the software. This helps a
single machine to run different application requiring different operating system.
Another type of virtualization involving OS is called as Operating System-
level virtualization where a single OS kernel will provide support for multiple
applications running in different partitions of a single machine.
iv. Network virtualization
This is achieved through logical segmentation of the physical network resources.
The available bandwidth is divided into different channels with each being sep-
arated and distinguished from each other. These channels will be assigned to
server or device for further operations. The true complexity of the network is
abstracted and are provided as simple hard drive for usage.

1.1.5 Business Benefits

Cloud adoption gives a wide array of benefits to business like reduced CapEx, greater
flexibility, business agility, increased efficiency, enhanced web presence, faster time
to market, enhanced collaboration, etc. The business benefits of cloud adoption
include
i. Enhanced Business Agility
Cloud adoption enables organizations to handle business dynamism without com-
plexity. This enhances the agility of the organizations as it is equipped to accom-
modate the changing business and customer needs. The cloud adoption keeps the
organization in pace with the new technology updations with minimal or no human
interaction. This is achieved through faster and self-provisioning and de-provisioning
of IT resources at the time of need from anywhere and using any type of devices.
New application inclusion time has reduced from months to minutes.
1.1 Introduction 11

ii. Pay-As-You-Go

This factor is abbreviated as PYAG is a feature that allows the customers to pay for the
resources based on the time and amount of its utilization. Cloud services are meter-
based where usage-based payment is done or it is subscription-based. This convenient
payment facility enables customers to concentrate on core business activities rather
than worrying about the IT investments. The IT infrastructure investment planning is
replaced with planning for successful cloud migration and efficient cloud adoption.
This useful factor of cloud entitles the new entrants to leverage the entire benefit of
ICT implementation with minimal investment.
iii. Elimination of CapEx

This is an important cost factor that eradicates one of the most important barriers
to cost-based IT adoption for small businesses. The strenuous way of traditional
software usage in business includes activities like purchasing, installing, maintaining,
and upgrading. This is simplified to a simple browser usage. User need not worry
about the initial costs such as purchase costs, costs related to updation and renewal.
In fact the user needs to worry only about the Internet installation cost only in terms
of Capex. The software required for the organizations are used directly from the
provider’s site using authenticated login ids. This eliminates huge initial investment.

iv. Predictable and Manageable Costs

All cloud services are metered and this enables the customer to have greater control
on the use of expensive resources. The basic IT requirements of the business have
to be observed before cloud adoption and the allocations are to be done only for the
basic requirements. This controls the huge initial investment. Careful monitoring of
the cloud usage will enable the organizations to predict the financial implications of
their cloud usage expansion plans. Huge capital investment on resources that may not
be fully utilized is replaced with operation expenses by paying only for the resources
utilized thus managing the costs.

v. Increased Efficiency

This refers to the optimal utilization of IT-related resources which will in turn prevent
the devices from being over provisioned or under provisioned. Traditional IT resource
allocations for server, processing power, and storage are planned by targeting the
resource requirement spikes that occur during peak business seasons which last for
few parts of a year. These additional resources remain idle for most part of the year
thus reducing IT resource efficiency. For example, the estimated server utilization rate
is 5–15% of its total capacity. Cloud adoption eliminates the need of over investment
on resources. The required resources are provisioned at the time of need and are paid
as per usage capacity. This increases the resource efficiency .
12 1 Cloud Computing

vi. Greater Business Continuity

The business continuity is maintained by enhanced disaster recovery management


processes that are carried out by cloud providers. Regular backup of data is carried
out as it is required to be used by the recovery process at the time of failure. The
backup process interval depends on the data intensity of the enterprise. Data inten-
sive applications require daily backup where as others applications require periodic
backup. Cloud adoption relieves the users from the traditional cumbersome backup
and recovery process. Cloud service adoption includes automatic failover process
which guarantees business continuity at faster pace and reduced cost. Mirroring or
replication processes are used for backup purpose depending on the intensity of data
transactions. The replication of the transactions and storage are easily possible due
to server consolidation and virtualization techniques.

vii. Web Collaboration


Interaction between different entities of the organization is established with the help
of this factor. The interaction with the customers enables to setup “customer-centric”
business. The requirements and feedback gathered from the customers are used as
the base for new product or service planning or for the improvement of the existing
product or services. Enterprises use this factor to enhance their web presence which
will help to gain the advantage of global reach. This also enables the organization to
build open and virtual business processes.
viii. Increased Reliability

Any disruption to the IT infrastructure will affect the business continuity and might
also result in financial losses. In traditional IT setup, periodic maintenance of the
hardware, software, storage, and network are essential to avoid the losses. The relia-
bility of traditional ICT for enterprise operations is associated with risk as the retrieval
of the affected IT systems is a time consuming process. Cloud adoption increases
the IT usage reliability for enterprise operations by improving the uptime and faster
recovery from unplanned outages. This is achieved through live migrations, fault
tolerance, storage migrations, distributed resource scheduling, and high availability.

ix. Environment Friendly

Cloud adoption assists the organization to reduce their carbon footprint. Organi-
zations invest on huge servers and IT infrastructure to satisfy their future needs.
Utilization of these huge IT resources and heavy cooling systems contribute to the
carbon footprint. On cloud adoption the over provisioning of resources are eliminated
and only the required resources are utilized from the cloud thus reducing the carbon
footprint. The cloud data center working also results in increased carbon footprint
but is being shared by multiple users and the providers also employ natural cooling
mechanism to reduce the carbon footprint.
1.1 Introduction 13

x. Cost Reduction

Cloud adoption reduces cost in many ways. The initial investment in proprietary
software is eliminated. The overhead charges such as data storage cost, quality control
cost, software and hardware updation and maintenance cost are eliminated. The
expensive proprietary license costs such as license renewal cost and additional license
cost for multiple user access facility is completely removed in cloud adoption.

1.2 Cloud Adoption and Migration

Most of the big organizations have already adopted cloud computing and many of the
medium and small organizations are also in the path of adopting cloud. Gartner’s has
mentioned in 2017 report that Cloud computing is projected to increase to $162B in
2020. As of 2017, nearly 74% of Chief Financial Officers believe Cloud computing
will have the most measurable impact on their business. Cloud spending is growing
at 4.5 times since 2009 and is expected to grow at a better rate of six times from
2015 through 2020 (www.forbes.com). As with two sides of a coin, cloud adoption
also has both merits and demerits. Complexity does exist in choosing between the
service models (IaaS, SaaS, PaaS) and deployment models (private, public, hybrid,
community). SaaS services can be used as utility services without any worry about the
underlying hardware or software, but other services need careful selection to enjoy
the complete benefits of cloud adoption. This section deals with various aspects to
understand before going for cloud adoption or migration.

1.2.1 Merits of Cloud Adoption

Business benefits of cloud adoption such as cost reduction, elimination of CapEx,


leveraging IT benefits with less investment, enhanced web presence, increased busi-
ness agility, etc., were discussed in Sect. 1.1.5. Some of the general merits and
demerits of cloud adoption are

i. Faster Deployments

Cloud applications are deployed faster than on-premise application. This is because
the cumbersome process of installation and configuration is replaced by a registra-
tion and subscription plan selection process. On-premise applications are designed,
created, and implemented for specific customer and had to go through the complete
software development life cycle that spans for months. The updation process also
had to go through the time consuming development cycle. In contrast to this, the
cloud application adoption takes less time as the software is readily available with
the provider. The time taken for the initial software usage is reduced from months to
minutes. Automatic software integration is another benefit of cloud adoption. This
14 1 Cloud Computing

will help people with less technical knowledge to use cloud applications without any
additional installation process. Even organizations with existing IT infrastructure
and in-house applications can migrate to cloud after performing the required data
migration process.

ii. Multi-tenancy

This factor is responsible for the reduced cost of the cloud services. Single instance of
an application is used by multiple customers called as tenants. The cost of the software
development, maintenance, and IT infrastructure incurred by the CSP is shared by
multiple users which results in delivery of the software at low cost. The tenants
are provided with the customization facility of the user interface or business rule
but not the application code. This factor streamlines the software patches or updates
release management. The updations done on the single instance are reflected to all the
customers thus eliminating the version compatibility issue with the software usage.
This multi-tenancy increases the optimal utilization of the resources thus reducing
the resource usage cost for the individuals.

iii. Scalability

In traditional computing methods, organizations plan their IT infrastructure to accom-


modate the requirement spikes that might happen once or twice a year. Huge cost
needs to be spent in purchasing high end systems and storage. Additional mainte-
nance charges needs to be borne by the organization to keep the systems running
even during in its idle time. These issues are totally eliminated due to the scalability
features in cloud adoption. IT resources that are required for business operations can
be provisioned from cloud at the time of need and can be released after the usage.
This helps organizations to eliminate the IT forecasting process. Additional IT infras-
tructure requirements can be scaled horizontally or vertically during seasonal sales
or project testing can be handled by dynamic provisioning of resources at the time of
need. Including additional number of resources of same capacity to satisfy business
needs is called as horizontal scaling. For example, addition of more servers with same
capacity to handle web traffic during festive season sales. Increasing the capacity of
the provisioned infrastructure is called as vertical scaling. For example, increasing
CPU or RAM capacity of the server to handle the additional hits to a web server.

iv. Flexibility

Cloud adoption offers unlimited flexibility to usage of IT resources. Compute


resources such as storage, server, network, and runtime can be provisioned and de-
provisioned based on business requirement. The charges are also billed based on the
usage. Organizations using IaaS and PaaS services need to be vigilant in cloud usage
as the releasing of additional resources has to be done on time to control additional
cost. Dynamic provisioning feature also provides flexibility of work practices.
1.2 Cloud Adoption and Migration 15

v. Backup and Recovery

Recovery is an essential process for business continuity which can be achieved suc-
cessfully with the help of efficient backup process. Clod adoption provides backup
facility by default. Depending on the financial viability of the organization either
selected business operations or entire business operations can be backed up. For
small and medium organizations, backup storage locations must be planned in such
a way that core department or critical data are centrally located and are replicated
regionally. This helps to mitigate risk by moving the critical data close to the region
and their local customers. Primary and secondary backup sites must be geographi-
cally distributed to ensure business continuity. Different types of backups according
to NIST are full backup, incremental, and differential. Full back up process deals with
back up of all files and folders. Incremental backup captures files that were changed
or created since last backup. Differential backup deals with capturing changes or
new file creation after last full backup (Onlinetech 2013).
Cloud computing also has some associated challenges that are discussed in detail
in Sect. 1.3. Solution for handling these challenges are also discussed which needs
to be followed to leverage the benefits of cloud computing adoption.

1.2.2 Cost–Benefit Analysis of Cloud Adoption

Cost–Benefit Analysis (CBA) is a process of evaluating the costs and its correspond-
ing benefits of any investment, here in this context it is cloud adoption. This process
helps to make decisions for the operations that have calculable financial risks. CBA
should also take into the costs and revenue over a period of time including the changes
over monetary values depending on the length and time of the project. Calculating
Net Present Value (NPV) will help to measure the present profitability of the project
by comparing present ongoing cash flow with the present value of the future cash
flow. Three main steps to perform CBA are
i. Identifying costs
ii. Identifying benefits
iii. Comparing both
The main cost benefit of cloud adoption is reduced CapEx. Initial IT hardware
and infrastructure expenses are eliminated. This is due to the virtualization and
consolidation characteristics of cloud adoption. Various costs associated with cloud
adoption are server cost, storage cost, application subscription cost, cost of power,
network cost, etc. The pricing model of cloud (Pay-as-you-go) is one of the main
drivers for cloud adoption. The costs incurred in cloud adoption can be categorized
as upfront cost, ongoing costs and service termination costs (Cloud standards council
2013). Table 1.1 lists the various costs associated with cloud computing adoption.
Various financial metrics such as Total Cost Ownership (TCO), Return on Invest-
ment (ROI), Net Present value (NPV), Internal Rate of Return (IRR), and payback
16 1 Cloud Computing

Table 1.1 Various costs associated with cloud adoption


Costs details Descriptions
Infrastructure setup cost Cost involved in setting up of hardware,
network and purchasing of software
Cloud consultancy charges This cost will be incurred by organizations not
having strong IT team to do IT evaluation
Integration charges These are the charges for migrating the existing
application to cloud or combining in-house
applications with the new cloud applications
Customization or reengineering costs These are the charges that are incurred for the
process of changing the existing SaaS
applications to suit the business needs or
changing of business needs to that of the
application requirement
Training costs An essential cost factor that is required to have
complete control on cloud usage and
monitoring
Subscription costs Monthly, quarterly or annual subscription
charges for usage of cloud services
Connectivity costs Network connectivity charges without which
cloud service delivery is not possible
Risk mitigation costs Costs incurred in the alternative measures
undertaken to avoid or reduce the adverse
effects on business continuity due to outage
Data security costs Costs of any additional security measures
undertaken apart from the basic security
offered by the providers
New application identification and installation Costs incurred in selection of new service
costs provider and application on termination of an
existing service
Data migration cost The cost of data transfer from the existing
provider to the new provider

period are used to measure the costs and monitor the financial benefits of SaaS
investment. ROI is used to estimate the financial benefits of SaaS investment and
TCO calculates the total associated direct and indirect costs for the entire life span
of SaaS. NPV compares the estimated benefits and costs of SaaS adoption over a
specified time period with the help of rate that assist in calculating the present value
of the future cash flow. IRR is used to identify the discount rate which would equate
the NPV of the investment to zero. ROI calculation being simple when compared to
the other metric is preferred for the financial evaluations (ISACA 2012).
Payback period refers to the time taken for the benefits return to equate with that of
the investment. Main payback areas of cloud computing where saving and additional
costs involved are listed in Table 1.2 (Mayo and Perng 2009).
1.2 Cloud Adoption and Migration 17

Table 1.2 Various payback area of cloud computing


Payback area Cost saving Additional costs
Software Reduction in software and OS Cost of virtualization and cloud
licenses management software
Hardware Reduction in number of servers and Nil
facility cost
Productivity Reduction in waiting hours for Nil
software updates/new services
inclusion
Automated Reduction in number of hours of Training, administration and
provisioning resource provisioning maintenance of automation software
System Improved productivity due to server Nil
administration consolidation

1.2.3 Strategy for Cloud Migration

Cloud migration refers to the moving of data and applications related to the business
operations from on-premise IT infrastructure to cloud infrastructure. Moving the IT
operations from one cloud environment to another is also called as cloud migration.
Cisco mentions three types of migration options based on service models—IaaS,
PaaS, and SaaS. If an organization switches to SaaS it is not called as migration but
is a simple replacement of existing applications. Migrating business applications that
were based on standard on-premise application servers to cloud based development
environment is done in PaaS migration. This type of PaaS migrations also has various
steps such as refactor, revise and rebuild as the existing on-premise applications needs
to be modified to suit the cloud architecture and working. IaaS migration deals with
migrating applications and data storage on to the servers that are maintained by
cloud service provider. This is also called as re-hosting, where existing on-premise
applications and data are migrated to cloud (Zhao and Zhou 2014).
Plan, deploy, and optimize are the three main phases that are to be followed for
successful cloud migration. Plan phase includes the complete cloud assessment in
terms of functional, financial, and technical assessments, identifying whether to opt
for IaaS, PaaS, or SaaS and also deciding about the cloud deployment option (public,
private, or hybrid). The cost associated with server, storage, network and IT labor
has to be detailed and compared with on-premise cloud applications (Chugh 2018).
Security and compliance assessment needs to be done to understand the availabil-
ity and confidentiality of data, prevailing security threats, risk tolerance level, and
disaster recovery measures.
Deploy phase deals with application and data migration. The careful planning
for porting of the existing on-premise application and its data onto the cloud plat-
form is carried out in this phase so as to reduce or avoid disturbance to business
continuity. Either forklift migration where all applications are shifted on to cloud
or hybrid migration where partial shifting of application to cloud can be followed.
18 1 Cloud Computing

Self-contained, stateless, and tightly coupled applications are selected and moved
in forklift approach. Optimize phase deals with increasing efficiency of data access,
auto termination of unused instances, reengineering existing applications to suit cloud
environment (CRM Trilogix 2015).
Training the staff to utilize cloud environment is very essential to take control of
the fluctuating cloud expenses. The dynamic provisioning helps to cater to the sudden
increase in work load and the payment for the same will be done in subscription based
model. At the same time continuous monitoring has to be done to scale down the
resource requirement when the demand surges. This will help to reap the complete
cost benefit of cloud adoption. Unmanaged open source tools or provider based
managed tools are available for error free cloud migrations.
Some of the major migration options are live migration, host cloning, data migra-
tion, etc. In live migration, running applications are moved from on-premise physical
machines on to cloud without suspending the operations. In data migration synchro-
nization between the on-premise physical storage and cloud storage is carried out.
After successful migrations users can leverage cloud usage, monitor and optimize
cloud usage pattern using various cloud monitoring tools.

1.2.4 Mitigation of Cloud Migration Risks

Business continuity might be affected due to the disturbances to the existing IT oper-
ations of the organization. The existing on-premise IT infrastructure, applications,
and data have to be completely or partially migrated to cloud. This might include
various risks like affect to business continuity, loss of data, application not working,
loss of control on data, etc. Some of the cloud migration risk mitigation measures
are

i. Identifying the suitable cloud environment


Cloud environments such as public, private, community, or hybrid has its own
merits and demerits. Identifying the one that is suitable to business is very
essential to leverage the benefits of cloud adoption. Depending on the sensitivity
of the data the cloud deployment model needs to be selected. Big organizations
prefer private cloud as they might have the strong IT team to take care of the
cloud installation and their sensitive data will not move out of the organization.
This may not be the case with small and medium organization who prefer cloud
to get rid of the IT overhead. For such organizations it is better to opt for public
cloud. As the public cloud platform is being used by many organizations, they
strive hard to maintain best IT infrastructure, cloud application with enhanced
data security. These features are provided to small organizations at very low cost.
Companies which has done reasonable IT investments and still want leverage the
benefits of cloud can opt for hybrid cloud environment. The business functions,
its implementations, and existing investment on IT infrastructure need to be
studied properly and the suitable cloud environment has to be selected.
1.2 Cloud Adoption and Migration 19

ii. Choosing the suitable service model


Service model selection plays a greater role in pre-migration strategy. This
selection is completely based on the size of the organization and the existing IT
expertise. The organizations which had already invested in IT infrastructure and
had been maintaining on-premise applications efficiently but still intend to opt
for cloud to accommodate varying storage or server loads can opt for IaaS. The
organizations that have ample IT infrastructure to cater to the changing loads but
are having issues with software purchases can opt for PaaS where the required
development or testing platform is provided as service. New startups or small and
medium organizations which are not having huge IT investment can opt for SaaS.
This adoption will enable organizations to benefit from IT implementation for
their operations without any worry about purchase, installation, maintenance,
and renewals. Depending on the utilization the subscription can be taken as
monthly, quarterly, or yearly. Most of the SaaS products have trial period within
which suitability of the product for business operations can be studied. The
monitoring cloud service of any type is essential for subscribing at the time of
need and unsubscribing after usage. This will help to keep cloud costs under
control.
iii. Identifying the best suitable applications
The business processes needs to be segregated as critical business processes
that have to be executed without even a single minute delay and non-critical
business processes which are tolerant to delay due to service outages. Non-
critical applications are the first choice for cloud adoption. For example real
time applications like online games, stock market trading, online bidding, etc.,
are time bound and needs to be completed on that particular moment without
any delay. If these applications are moved to cloud, then any network outage
or latency in data provisioning will result in loss of business. Such applications
are better if maintained in-house. Organization having good IT team might
be in need to implement few operations occasionally. Instead of developing
software for those operations, the team can opt for cloud applications which
can be subscribed at the time of need and unsubscribed after use. This will
eliminate development time and maintenance cost of the software. Small and
medium organizations, which are not having IT team, can opt for multiple SaaS
application for their operations. Subscribing applications from multiple vendors
will eliminate the risk of suffering from outages.
iv. Business continuity plan during migration
This is an essential operation for the organization that have existing IT setup
and software for their operations. New entrants in business can omit this step.
Ensuring resiliency is a major characteristic of any IT implementation. Hence, it
is always advisable to opt for phased manner migrations. This will help organi-
zations to continue their current business operations with tolerable disturbances.
Listing of critical and non-critical business operations and its corresponding IT
applications have to be done. This will help to identify less critical applications,
which are the best candidates to be moved to cloud first. Backup plans must
be in place to ensure information availability in case of failed or delayed cloud
Discovering Diverse Content Through
Random Scribd Documents
GUDIN—Un Tortoni du pinceau, voué à la spécialité des mers
vanille et pistache.

GUEYMARD (Madame)—Sa voix? Un velours que les années


n'ont pu miroiter.

GUYON (Mademoiselle)—Terrible exemple d'inhumation anticipée.


A été enterrée toute vive dans les catacombes de la Comédie-
Française.
Ah! qu'elle a dû regretter souvent d'avoir, apostate du boulevard,
renié la croix... de ma mère!
H

HACHETTE—Une chance pour un commerçant d'avoir un nom


dont l'assonnance dit perpétuellement au passant: Mets donc la
main à la poche!

HADOL—Un esprit qui a du cœur. Quoiqu'il soit notre ami, il faut


bien lui dire la vérité.

HAENTJENS—Un des courtiers de la maison de photographie


Plébiscite et Ce.

HALANZIER—Fut seul à avoir, après la Commune, le courage


de semer sur un sol qui tremblait encore.
Par exemple, il n'a pas manqué d'amateurs plus tard pour chercher à
lui escamoter la moisson.
Vrai enfant de la balle, jouait la comédie à quatre ans, dirigeait un
théâtre à dix-huit!
Vous voyez qu'en se disant fils de ses œuvres, il ne triche pas avec
sa généalogie.

É
HALÉVY (LUDOVIC)—Savez-vous pourquoi votre visage pâle et barbu
est une succursale de l'Amérique? lui demandait Dupuis un jour.—
Non.—Parce que l'on y voit la lutte des blancs et des noirs.
—Avec des si et des mais, prétendait un vieux dicton, on mettrait
Paris dans une bouteille.
Ludovic Halévy a réalisé ce prodige. Il a mis Paris à infuser dans sa
bouteille d'encre. C'est notre faute si, dans cette encre, la vertu
petite ou grande ne brille que par la plus complète absence.

HAMILTON (duc d')—Tout le Paris de high life connaît ce


gentilhomme, gras et haut en couleur, dont l'aspect, qui n'a rien
d'absolument ducal, donne une fois de plus raison au proverbe:
—Il ne faut pas se fier aux apparences.

HARDY—Habile médecin voué à la spécialité des maladies de


peau.
Notre dessus vous fait voir de bien laides choses. Eh bien! c'est égal,
docteur, je vous réponds que les philosophes en voient encore de
plus laides par-dessous.

HAUSSMANN—Le haut baron de l'Empire,—et par droit de


taille et par droit d'influence.
Les officieux d'antan ont voulu nous faire admirer les
embellissements de ce boulevardomane qui nous disait: C'est moi
qui régale et c'est vous qui payez!
Pas malin de bien habiller sa femme en lui mangeant sa dot.

HÉBERT—L'apôtre du faisandé.
Si l'on réunissait toutes ses toiles, ça ne ferait pas un musée, ça
ferait un hôpital.

HÉBRARD—Directeur du Temps.
La fougue d'un méridional tempérée par la prudente habileté d'un
homme d'affaires.
Un torrent canalisé.

HÉLIE (FAUSTIN)—Notre plus savant jurisconsulte. Homme de droit


et homme droit.
NOTA.—Ce qui n'est pas du tout synonyme.

HENNER—Il s'en faut d'un rien qu'il ne fasse un maître.


Mais ce rien-là est tout.
Quand on dit de lui: Sa peinture grise, n'allez pas comprendre: Sa
peinture enivre.
C'est précisément là ce qui lui manque.

HENRION (PAUL)—L'album de nos mères!!!

HENRIQUEL DUPONT—Notre dernier burin.


Il est vrai qu'on produit si peu d'œuvres maintenant qui méritent
d'être burinées.

HÉRISSON—Ment à son nom le plus heureusement du monde.


Un des bons élèves de la turbulente classe de Versailles.

HÉROLD—Fils de l'auteur du Pré-aux-Clercs.


Sa figure colorée et rayonnante se peut définir, ce me semble: un
coucher de soleil à lunettes.
Encore un de ces affreux républicains qui ont l'abomination de
donner l'exemple du travail, du savoir et de la modération!

HERVÉ—Compositeur-acteur.
A l'instar des fous du roi qui étaient obligés de recourir aux grimaces
pour faire passer les vérités, son originalité de mélodiste a été
réduite aux cascades pour se faire écouter.
Un peu délaissé chez nous, l'Angleterre se l'arrache aujourd'hui. Doit
trouver que la France lui a toujours mal rendu justice.

HERVÉ (EDOUARD)—A l'heure actuelle le seul journaliste orléaniste


qui ait du talent.
Décidément dans ce parti-là on ne peut pas se résoudre à
l'adjonction des capacités.

HETZEL—Une bonne belle tête où deux grands yeux jeunes


protestent contre une barbe qui grisonne et des cheveux qui
blanchonnent.
A la fois ouvrier et patron, auteur et libraire.
Vend les livres qui se font et fait des livres qui se vendent.
Républicain de toujours et à toujours.
Un dernier détail pour achever de vous montrer combien il est digne
d'être aimé et honoré:
A été proscrit par le 2 décembre.

HEUGEL—L'homme-musique!
Il ne se compose pas, ne se gratte pas, ne se tape pas, ne se souffle
pas, ne se crie pas en Europe une note sans qu'il ne le sache.
Signe tout à fait particulier.—Est le seul contemporain qui se serve
encore, pour lorgner au théâtre, d'une longue-vue dite os à la moelle
et semblable à celles que Napoléon le Grand porte invariablement à
son œil dans les tableaux mécaniques.
Signe plus particulier encore.—Est le plus dévoué et le plus obligeant
des amis.

HOHENZOLLERN (prince de)—Le clou auquel Bonaparte a


pendu la France.
Nota.—C'est Bismarck qui l'avait enfoncé.
—Le clou ou Bonaparte?
—Les deux, parbleu!

HOUSSAYE (ARSÈNE)—Le clair de lune du romantisme.


Au physique, l'Art de ne pas vérifier les dates.
A dirigé la Comédie-Française avec des chaînes de fleurs... dans
lesquelles, comme dans les féeries, passait une tringle de fer.
Un de nos derniers noctambules. Ne peut se résoudre à se mettre au
lit avant cinq heures du matin. Aussi est-ce à lui qu'un ami disait:
—Voyons, mon cher, tu te tueras. Se coucher comme ça, c'est se
coucher... en joue.

HOUSSAYE (HENRI)—Son père étant Athénien de Paris, il s'est


institué Parisien d'Athènes.
L'Académie a couronné ses remarquables travaux sur la Grèce.

La rancunière! Est-ce pour se venger du 41e Fauteuil paternel,


qu'elle a infligé aux œuvres du fils cette mauvaise note imméritée?

HUART (ADRIEN)—Un des nez éminents de la littérature.


Humoriste à froid. Un sorbet à l'esprit.

HUGO (VICTOR)—Le Poëte-Soleil!


Il réchauffe, il féconde, il éclaire!

HYACINTHE—Acteur français qui doit son succès persistant à


ce que le public n'a pas encore pu savoir si ses mains tiendraient
dans son nez ou si son nez tiendrait dans ses mains.

HYACINTHE (le Père)—Hérétique intermittent et apostat par à


peu près.
Affiche la prétention de nous rédiger un menu religioso-libéral où
l'on aurait trois schismes au choix, comme les plats dans les
restaurants à 40 sous.
Ce Luther de ménage paraissait aspirer à élever les esprits, il
n'aspirait qu'à élever un marmot. Il avait l'air de vouloir épouser la
grande querelle de la libre pensée, il ne voulait qu'épouser mame
Loyson.
Pas la peine de jouer avec les flammes de l'enfer pour faire bouillir
un pot-au-feu!
I

ISABELLE (Reine)—Le poëte a dit:


Ah! n'insultez jamais une femme qui tombe!
Et une reine est une femme, quoique trop souvent la politique fasse
qu'elle n'en a plus l'air.

ISABELLE (bouquetière)—Voyons, mademoiselle, votre


printemps s'est fait automne.
Les fruits confits, très-bien!... Mais les fleurs confites, non!

ISABEY—Tape sur la toile avec son torche-pinceau et ça fait des


tableaux tout de même.
—Pas difficile, direz-vous...
—Eh bien, essayez d'en faire autant.

ISMAIL-PACHA—Le vice-roi d'Egypte.


Les calomniateurs suppriment le trait d'union.
Au contraire, il a des fidèles qui l'admirent fort.
Moi, je ne l'ai vu qu'une fois à Paris. Il m'a paru avoir l'air emprunté.
Les banquiers trouvent qu'il a encore bien plus l'air emprunteur.
J

JACOB (Le zouave)—Je vous jure qu'à ma connaissance il a guéri


cinq personnes... de la crédulité.

JACQUES (CHARLES)—Romance connue;


Je suis le père Jacques,
J'aime tous mes nourrissons:
Mes cochons, mes moutons, mes vacques,
Poulets, canards, lapins, dindons!...

Et sa belle peinture les fait aimer du public.

JACQUOT (dit de Mirecourt)—Il y en a qui, dans le temps,


plaignaient ses biographiés.
Je n'ai jamais trouvé à plaindre que le biographe.

JADIN—
Jadis des empereurs, des princes et des rois
C'était lui qui peignait les meutes renchéries;
Et, rêveur, on l'entend qui soupire parfois:
—Oh! le temps où j'étais Jadin des Tuileries!

JALABERT—Peint nos contemporaines.


Il me semble que cela fait double emploi avec elles-mêmes.

JANICOT (GUSTAVE)—Rédige en chef la Gazette de France.


Son style permettrait d'ajouter: En chef... de cuisine.

JANVIER DE LA MOTTE—L'empire l'avait sacré: Père des


pompiers.
Il n'en a pas moins fait comme tous les autres et oublié
complétement de chercher à éteindre l'incendie du 4 septembre.

JOANNE—Mentor à prix fixe.

JOHNSTON—A toujours été député satisfait, mais jamais


député satisfaisant.

JOIGNEAUX—Représentant républicain.
Un des rares bras qui n'aient jamais manqué à l'agriculture.

JOINVILLE (Prince de)—Physiquement, Henri Murger cassé.


Un proverbe arabe dit: On ne bâtit pas sur les cendres. C'est
pourtant sur les cendres de Napoléon qu'il a bâti autrefois son
éphémère popularité.
Du temps de l'exil, il se disait libéral... comme les autres.
Aujourd'hui, à l'Assemblée, son rôle politique consiste à siéger en
sourd et à voter souvent en aveugle.

JOLIET (CHARLES)—Un piocheur chez qui le travail n'exclut pas


l'originalité.

JOLLIVET (GASTON)—Œil noir, moustache noire, teint bistré.


L'aspect d'un créole.
Un adversaire dont l'esprit se bat toujours à rimes courtoises.

JOUASSAIN—Une actrice dont le talent n'est pas à déduègner.

JOURDE—Directeur du Siècle.
Toute sa vie démontre que la ligne droite est le plus court chemin du
travail à la réussite.

JOURDAN (LOUIS)—Un de nos anciens qui a su rester un de nos


jeunes.

JOUVIN—Le magister du Danube.

JUBINAL—Un bon gros homme ventru, qui s'avise, on ne sait


pourquoi, de rompre des lances en l'honneur de l'empire.
Sancho Pança voulant jouer au don Quichotte politique.
JUDIC—Grande artiste dans un petit genre, de même qu'il y a de
grands tableaux dans de petits cadres.
A trouvé le secret de la pudeur provocante ou de la provocation
pudique; on croirait voir une cantharide dans un bouquet de fleurs
d'oranger.
Même quand elle risque les plus osées des gaillardises, on lui
donnerait, comme on dit, le bon Dieu sans confession.
Sainte Vénus!

JUNDT—Ses tableaux ont le je ne sais quoi qui fait songer.


Un poëte dont l'encrier est une palette.
K

KAEMPFEN—C'est à n'y pas croire.


A fait trois ans d'Officiel cellulaire et est resté le lettré délicat qu'il
était.

KARR (ALPHONSE)—Un esprit que nous avons tous tant aimé! Avoir
dégringolé dans le fin fond des rengaînes réactionnaires!...
Ah! que c'est triste de voir, aux Invalides de la réaction cette guêpe,
l'aiguillon cassé et l'aile en écharpe!

KELLER—Député patriote, quoique clérical.


Il faut bien des exceptions pour prouver la règle générale.

KÉRATRY (DE)—A l'état normal: posant.


Sous l'empire: imposant.
Sous la République: opposant.
Devant la commission d'enquête: déposant.
Pour le quart d'heure: reposant.
Si demain une monarchie faisait l'œil à son libéralisme: composant.

KERDREL (DE)—Un de ceux qui prendraient au besoin le lis pour


nourrir le coq.
Il est avec le blanc des accommodements.

KRAUSS—La Dorval du chant.

KRUPP—Le luthier du concert européen.


L

LABÉDOLLIÈRE (EMILE DE)—Presque tout le monde ignore que


derrière ce joyeux troubadour se cache un vrai bénédictin.
Labédollière, modeste et ami des gais refrains de table, met à son
érudition une feuille de vigne... avec un peu de fruit autour.

LABICHE—L'aspect d'un vrai bourgeois bourgeoisant. Mais


quand un bourgeois se met à avoir de l'esprit, dame, il en a..... pour
toute la corporation.
C'est le cas de l'auteur de la Cagnotte. Les galeries du Palais-Royal
ont un théâtre à chaque bout. Le premier, c'est la maison de Molière;
le second, c'est la maison de Labiche.
Bien des fois, par exemple, les soirs du Misanthrope et l'Auvergnat
ou de Célimare le Bien-Aimé, je suis sûr que Molière a eu envie de
crier:
—Hé! là-bas, voisin! vous vous trompez de porte!

LABOULAYE—Sa célébrité est sortie d'un encrier. Un encrier a


failli la détruire.
A le voir boutonné dans sa petite redingote étriquée, qui penserait
que ce quaker a osé les folâtreries du Prince Caniche?
Moi, je vous avoue, d'ailleurs, que cela ne m'a jamais monté à la
tête, cette gaieté-là.
De l'orgeat mousseux.

LACHAUD—Prestidigitateur habile à faire au jury le tour du


verdict forcé. Ne le réussit pas aussi bien devant les conseils de
guerre. Le rate absolument devant le suffrage universel.
Avec les jurés, l'éloquence est une question de tour de main et de
tour de bras. La renommée de M. Lachaud reposait sur de vieilles
bases. A eu tort de la changer d'assises...

LACRESSONNIÈRE—La figure d'un bébé âgé.


Est-ce pour cela qu'en parlant il a souvent l'air de manger de la
bouillie?

LACROIX (JULES)—Un homme de talent qui a eu le tort de faire


des expériences pour ressusciter la tragédie sous un autre nom.
Je demande, pour prévenir le retour d'aussi coupables tentatives,
qu'on poursuive les délinquants sous l'inculpation de détournement
de cadavre.

LACROIX (PAUL)—On prononce: le Bibliophile Jacob.


Un fort en thème de la littérature.

LAFERRIÈRE—Arthur Mathusalem!
LAFONTAINE—Un inégal.
Est-ce que vous n'aimez pas mieux cela que la correction bebête?
En matière d'art comme en matière de terrain, l'inégalité exclut la
platitude.

LAFONTAINE (Madame)—Poésie, jeunesse, originalité, tout


cela s'appelait Victoria... avant le contrat.
Le jour où nous avons assisté au mariage de l'exquise comédienne,
nous ne nous doutions guère qu'en réalité nous assistions à son
enterrement.

LAFORÊT—Un jeune de la critique dramatique qui pourrait bien,


dans quelque temps, donner raison à la parole de l'Evangile: Les
derniers seront les premiers.

LAFORGE (ANATOLE DE)—Un vaillant de la plume et de l'épée.


A payé de sa personne, à Saint-Quentin... les dettes de l'Empire.

LAGRANGE (comte DE)—Un bon gros qui a les joues de la


couleur de sa décoration. Comme éleveur, il a fait courir avec succès.
Par exemple, comme député éloquent, il n'a jamais fait courir du
tout.

LA GUÉRONNIÈRE (vicomte DE).


Avec Lamartine on commence,
Avec Bonaparte on finit!
Certains prétendent, pour l'excuser, qu'il rêva toujours l'empire
libéral.
Il aurait dû demander à l'histoire naturelle si c'est possible, un aigle
sans serres.

LA MARMORA (général DE)—L'auteur du célèbre livre: Un peu


plus de lumière.
Défiez-vous, général, c'est bon pour les enfants de mettre le feu en
jouant avec des allumettes.

LANFREY—Historien qui a entrepris de démolir la légende


napoléonienne.
Pas assez tôt, puisqu'elle a encore eu le temps de s'écrouler sur
notre tête.

LANGLOIS (colonel)—Député de Paris et blessé à Buzenval.


Le plus rageur, de même qu'il est le plus grave et le meilleur des
hommes.
Tout ça c'est des éclairs de chaleur. Pas de foudre au bout.

LA POMMERAYE (HENRI)—Pourquoi, diable, porte-t-il les


cheveux en baguettes de tambour, lui dont l'aménité est incapable
de battre la charge contre qui que ce soit?
Parle et écrit avec un charme égal.
Inventeur de la critique orale, un succès. Mais qu'il se méfie du
philintisme! Il faut que le sourire laisse voir les dents. Les amers
fortifient, les sirops affadissent.
LAPRADE (VICTOR DE)—Académicien. (C'est bien fait!)
Une poésie qui monte se perdre dans les nuages... parce qu'elle est
creuse et gonflée.

LARCY (DE)—Une des têtes (de pavot) du légitimisme.


Exerça auprès de M. Thiers les fonctions de ministre-surveillant.
Pas un joli métier, ma foi!

LA ROCHEFOUCAULD-BISACCIA (de)—Son mérite?—Il


est duc.
Son savoir?—Ses laquais ont les plus beaux faux mollets de France.
Son caractère?—Touchait 100,000 francs de la République pour être
agent de la monarchie.

LAROCHELLE—A gagné tout d'abord une petite fortune à


récrire le Roman Comique.
A inventé ensuite le vice-Odéon appelé Cluny.
Dirige actuellement la Porte-Saint-Martin.
Un intelligent, et, ce qui est moins fréquent, un bon.
Vrai enfant de la balle, d'ailleurs. La façon dont il a su rebondir
permet d'ajouter: de la balle... élastique.

LA ROUNAT—Effilé de corps et de tête, on dirait qu'il a passé


quelque temps entre les pages d'un énorme bouquin.
A fait du théâtre avec esprit, de la direction avec habileté, de la
critique avec conscience.
Le tiers suffirait pour mériter un coup de chapeau sympathique.

LARREY—Le Louis Racine de la chirurgie.

LASSALLE (ALBERT DE)—Surnommé le Sapeur-Lyrique à cause de


sa barbe, aussi vaste que ses connaissances de critique musical. Un
de nos nocturnistes. Ne peut travailler le jour.
Comme certaines femmes, sa plume n'a d'éclat qu'aux lumières.

LATOUR DE SAINT-YBARS—On demandait autrefois:


Savez-vous quelle différence il y a entre Latour de Saint-Ybars et la
tour de Pise. Et l'on répondait:
—C'est que la seconde ne tombe pas.
Pauvre tragique! Il a fait comme les tragédies: il a mal fini.
Après quinze minutes d'arrêt à la station du succès, il a déraillé
définitivement.
Aussi quelle idée que de vouloir habiller des momies pour les mener
dans le monde!

LA TOUR DU MOULIN—Un coadjuteur du 2 décembre, qui


fit semblant de ne plus vouloir du césarisme quand le césarisme ne
voulut plus de lui.

LAURENT (MARIE)—La Rachel des titis.


Moi, je trouve que sa muse place le mont Parnasse trop près de la
barrière de ce nom.

LAURENT-PICHAT—Poëte, millionnaire et républicain.


Trois raisons pour obtenir ce triple succès d'être blagué par les
Prudhommes, jalousé par les envieux et détesté par les
réactionnaires.

LAURENTIE—A un certain âge les manies deviennent presque


touchantes.
Laissons donc à ce royaliste-né la joie d'entendre son Chambord
l'appeler de temps en temps avec effusion:
—Mon vieux de la veille!

LAURIER—Décidément les noms de végétaux ne portent pas


chance à nos hommes politiques.
Ollivier... Laurier...
Ce Paganini a, dans ses variations, changé non-seulement d'air, mais
d'instrument.
Autrefois il jouait du clairon pour mener l'opposition à l'assaut,
maintenant on assure qu'il préfère la caisse.

LAVERTUJON—Il n'y en a pas déjà tant qui honorent la


profession, pour qu'un journaliste de cette valeur ait le droit de la
déserter.
LAZERGES—Un tout petit homme qui a bien tort d'aller chez les
tailleurs.
Il pourrait s'habiller avec ses cheveux.
Une des cariatides du foyer de l'Odéon.
Est-ce parce qu'il aime à rêver sans cesse qu'il fréquente si
assidûment un des théâtres où l'on a le plus de chances de dormir?
En peinture, ses tableaux, où la fantaisie se mêle à la religion, me
paraissent avoir créé la Demi-Sainteté, comme Dumas fils a créé le
Demi-Monde.

LEBLANC (LÉONIDE)—... d'Espagne.


(Pour plus amples détails, étudier son maquillage à la lorgnette.)

LEBLOND—Dame non? Ce n'est pas l'Apollon du Belvédère.


Jaune, osseux, anguleux, il a tout pour déplaire.
Mais le fond fait oublier la forme.
Un des magistrats de la République qui auraient pu ouvrir un cours
de savoir et de droiture à l'usage de certains magistrats des
monarchies.

LE BŒUF (Maréchal)—Le scandale de l'impunité. Que faut-il


donc faire alors pour être coupable? Un maréchal de France qui a
failli rester maréchal sans France?
Quand on essayait une objection à propos de l'horrible guerre où il
nous entraîna, ce vaniteux entêté répondait avec dédain:
—Laissez donc, je connais la question comme ma poche.
Vu les cinq milliards qu'il nous a coûtés, il aurait dû dire plutôt:
—Je connais la question comme votre poche.
Au physique, l'aspect d'un gendarme... qui a eu bien tort de ne pas
s'arrêter à temps.

LECOCQ (CHARLES)—Musicien qui a fait changer l'orthographe


d'un mot français.
On ne doit plus dire: engouement; on doit dire: angotment.
Chose étrange! Pour être applaudi, il a dû renoncer à prouver tout ce
qu'il vaut.
Il a fallu qu'il se fît petit pour que la mode le trouvât grand.

LECONTE DE LISLE—Un descriptif dont je ne me permettrais


pas de méconnaître le mérite.
Mais je préfère la plume qui émeut à la plume qui peint.

LEFEBVRE-DURUFLÉ—Ancien ministre qui, avec ses longs


cheveux blancs et ses rubans, faisait fort bonne figure en société.
NOTA.—Je ne dis pas cela pour la Société... Industrielle.

LEFEBVRE-PONTALIS (Amédée-Antonin)—Deux de nos


honorables. Des Siamois reliés par un cordon... élastique.
L'un s'est posté sur le chemin de gauche, l'autre sur le chemin de
droite. A la chasse aux faveurs, comme à toutes les chasses, c'est le
bon moyen de ne pas laisser échapper le gibier.
Et l'on partage ensuite.
LEFLO (Général)—Droiture et naïveté.
Toutes les qualités pour faire... un détestable diplomate.
Conséquence naturelle: on l'a nommé ambassadeur.

LEGOUVÉ—Le Camille Doucet du libéralisme.

LEGRAND (PAUL)—On trouve qu'il a du talent. Je ne suis pas


compétent.
Mon opinion sur tous les pierrots passés, présents et futurs se
résume en ce vers du fabuliste:
Ce bloc enfariné ne me dit rien qui vaille.

LÉOPOLD II—Un acteur qui fait les gestes, pendant qu'on parle
dans la coulisse.
A du succès.
Au Théâtre Constitutionnel, le plus beau rôle c'est celui d'Inutilité.

LEROY (LOUIS)—Une verve que les années ont l'air de rajeunir


dans un corps qu'elles ne pourront jamais vieillir.
Aussi ses cheveux d'argent qui contrastent avec tant de verdeur
font-ils l'effet de la neige au mois de juin, et l'on pense:
—Pas possible... Il doit se teindre en blanc.

LESPÈS (LÉO)—On dit que c'est de lui cette pensée:


—La popularité! Une courtisane qui vous fait trimer toute la nuit
pour prendre le lendemain matin un autre amant.

LESSEPS (Ferdinand DE)—Un homme qui a percé.

LESUEUR—Un vrai artiste qui joue admirablement la comédie,


quand l'idée ne lui vient pas d'y introduire une chanson à boire.

LEVERRIER—Des cheveux jaunasses sur une figure rougeasse.


Œil clignotant qui ne sait pas regarder en face.
Directeur expulsé, puis réintégré, de l'Observatoire.
Il est, avec le ciel, des raccommodements.
S'était, en regardant en l'air, laissé tomber dans le sénat, et s'en
vantait, sans qu'il y eût de quoi.
Soupire tout bas après une rechute.
Au moral: un paon qui fait la roue vingt-quatre heures par jour. Aussi
je vous réponds qu'en voilà un qui ne sait pas si le mot sympathie
est français.

LHÉRITIER—Gagne 15,000 francs par an à jouer les ganaches


au théâtre du Palais-Royal.
Au théâtre de Versailles, c'est un peu moins payé.

LIEGEARD (STEPHEN)—Comme poëte, manque de rime, et


comme homme politique, de raison.
A ça près...
LIONNET (Les frères)—Un oiseau à deux têtes.

LISZT—Pianiste défraqué.
A d'ailleurs eu toujours du goût pour les ordres. Ça se voyait à ses
décorations.
Si l'habit a changé, la pose perpétuelle est restée.
L'abbé Mangin!

LITTRÉ —Quelle singulière idée a eue la nature de mettre une


lettre si intéressante dans une si vilaine enveloppe!

LOCKROY—Quand il était pauvre, la presse à réaction lui disait:


—Gredin de Bohème.
A présent qu'il est riche, elle lui dit:
—Gueux de millionnaire.
O bonne foi des partis!

LORGERIL (Vicomte de)—Depuis que je l'ai entendu défendre la


théorie extravagante du droit divin, je ne crois plus au proverbe: In
vino veritas.
Comme poëte, a la spécialité des vers de dix-huit syllabes... Ce que
X... appelait des vers à sous-pieds.

LOUIS II—Roi des Bavarois et sujet de Richard Wagner.


LUCAS (HIPPOLYTE)—La consolation des camards.
M

MAC-MAHON (maréchal de)—Est-ce que Pénélope n'avait pas


le droit de défaire ce qu'elle avait fait?
(Un légitimiste intransigeant.)
Tout vient à point à qui sait attendre!
(Un orléaniste.)
Bertrand et Raton, quelle jolie fable!
(Un bonapartiste.)
Une loyale sentinelle qui fera bien de se défier des factions...
monarchistes.
On ne saurait avoir envie de devenir Monk, quand on peut être
Washington.
(Un républicain.)

MAGNARD (FRANCIS)—Un tempérament de vrai journaliste.


Ce qui devient de plus en plus rare, à une époque où le reporterisme
trouve plus facile de faire des courses que de faire des articles.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like