Logo Object Oriented Cybersecurity Detection Architecture (OOCDA) Suite
Executive Summary Start Author Project Map

Sam vs AWS
What is AWS?
Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers including the fastest growing startups, largest enterprises, and leading government agencies are using AWS to lower costs, become more agile, and innovate faster.

AWS Components:
Compute Migration Storage Networking
Messaging Database Management Tools Analytics
Machine Learning AI Infrastructure Application Services
Mobile Services Development tools      

AWS Testing:
Independent, third-party testing providers also provide testing as a service on cloud resources.

What is Sam Virtual Integration?
In a nutshell, Sam Virtual Integration is Homegrown Java-Cloud based components which are added to any existing infrastructure and platforms.

     (see http://sameldin.com/SamQualificationPages/VirtualIntegrationPage.html)

Sam Virtual Integration Platform Components:
Homegrown Cost Effective Reusable Components Performance
Virtual Management Framework Existing Services Support Any Technologies
Intelligent Planning Existing Applications Support Existing Platforms
Integration Training Software and Tools Support Existing System
Automated Documentation Virtual Testing Support Existing Infrastructure


Virtual Cloud Integration Structure
Image #1

We recommend that visitors checkout our Virtual Integration page and see the details of our architect.
In Image #1, we only added the following components to any existing cloud system. These components are Java Based code:

         • Intelligent Business Unit Brokers Cluster
         • Virtual Data Buffer Synchronized Services
         • Services Matrices (Services + Protocols + Security Parameters):
         • Dynamic Business Rules
         • DevOps
         • DataOps
         • Audit Trail


Our Security:
Looking at Image #1, users would be making stateless requests which go through the following security layers:

         1. Firewall
         2. Java Proxy Servlets
         3. Intelligent Business Unit Broker security
         4. Services Matrices security parameters
         5. Virtual Server (container)
         6. Virtual IP Address
         7. Virtual Data Buffer Synchronized Services


AWS Replacement:
Looking at Image #1, the following are steps of AWS Replacement :

1. Inventory of all services
2. Test and grade each service
3. Create calling matrices
4. Create Java Virtual Intelligent Business Units Brokers to track the services and give them a grade based how easy to run, performance, memory usage, testing, storage, security, rollback, reusability, .. etc
5. Create Rollback options
6. Create Virtual containers and virtual components
7. Create Proxy servers
8. Using the existing Firewalls
9. Build Machine Learning support and detection
10. Build DevOps and DataOps support
11. Give options to scheduling services
12. Give options of remote Servers support
13. Provide DevOps Editors - to run independently with automation, scaling, intelligence and customization
14. Vertical and Horizontal Scaling options
15. Virtual testing options
16. Build Dynamic Business Rules
17. Provide Virtual IP Generators - assist in hosting, load balance, security, rollback, testing, remote rerouting, collocation, GoldenGate support,
18. Build Virtual Data synchronization buffers
19. Load Balance would be handled by intelligent dynamic vertical and horizontal scaling
20. Analytics - Machine Learning would perform Analytics
21. Build Audit trail and tracking
22. Create Performance statistics
23. Create Logging plus logging automatic analysis - on/off logging options
24. As for development teams - the DevOps editors would give the freedom to create the own customized environment
25. Containers and Components Management system - see DevOps Editors.
The size of containers and components plus the speed of their creations must be optimized with on/off logging Bare-Metal servers would ready with clones and VIP addresses
26. Create Contains and Components Management system for tracking performance, security, statistics and system updates.
27. As for a reliable network we addressed the four basic requirements of a reliable network:
         Fault Tolerance
         Scalability
         Quality of Service (QoS)
         Security


Our Virtual DevOps-DataOps Containers Support verse Virtual Monolithic (Big Container)
A monolithic architecture is building a large system with a single code base and deployed as a single unit, usually behind a load balancer. It typically consists of four major components: a user interface, business logic, a data interface and a database.

We believe creating a virtual system or a virtual server which encompasses more than one application or services is also a monolithic system or server. Pros and cons of a monolithic architecture is leading software vendors to develop more smaller and concrete services such as Microservices and Docker platform.

Docker is an open platform for developing, shipping, and running applications. Docker enables you to separate your applications from your infrastructure so you can deliver software quickly. With Docker, you can manage your infrastructure in the same ways you manage your applications.

Our DevOps, DataOps Approach and Vertical and Horizontal Scaling:
We view any services (Microservices, web Services, Legacy System, Applications, third party software, ..etc) as a service. Each service must run independently (stateless, Loosely Coupled, with its supporting services) within a Virtual container Server with its own Operation System and supporting software. Data (database, filing system and/or Legacy system, remote support, ..etc) would be created by DataOps as a Virtual supporting container also. The lifetime of our virtual containers (service and data service) would be the life span of the requested service. This means the checking account request in Images #2 would end and all of virtual container including the operation system and possible the hacker code would be wiped clean for next service request. As for DataOps Container, there must be some kind of end of job or house cleaning to make sure data is updated properly and secured. The DataOps container would be wiped clean also.


DevOps-DataOps Virtual Containers' Support Diagram
Image #2


Image #2 presents our approach to monolithic architecture where Our DevOps and DataOps would be creating the virtual servers for helping each service to run (stateless, Loosely Coupled, with its supporting services) within DevOps and DataOps containers. See the following Bank's user request scenario.

Let us look at a Bank user request scenario:
Let us assume a bank customer is requesting bank services plus this bank customer has virus on his/her laptop. Our system would be creating a virtual server (only exists in memory) as a container and it contains a virtual bank service application as a component running within the virtual server. The virus main objective is to copy itself on the server for further attack. It also has the Virtual Server IP (in our case it is virtual IP address) address which the virus would use for future attacks. Regardless of the virus objectives, the virtual server, the virtual bank server application and Virtual IP address would be completely deleted from memory once the virtual bank service application is done. VIP address would also be deleted so no tracking or further attachs would be possible. The Virtual Data Buffer Synchronized Services would also protect the internal data structure and access from an unauthorized access.

Performance of Our Virtual DevOps-DataOps Containers Support:
The creation and end of job house cleaning must be automated with no human interface. Queues of ready Virtual containers with each has its own operating system and virtual IP address can be created to speed the performance of system. This is the Horizontal Scaling of any running services. As for Vertical Scaling would be done by proving enough memory for any service with its supporting software to be running within the DevOps container with no issues.

Sam Virtual Integration verse AWS:
We need to present the following points and give credits to AWS as we see them:

         • CEO, stakeholders, managers and tech leads must make difficult decisions including cost
         • AWS is an easy choice since these decision-makers would be passing the risks onto the AWS
         • The Return on the Investment (ROI) would have less risks and their headaches are gone
         • Sam Eldin is a One-Man-Show without any credentials and only offering Sam's architects, templates and frameworks
         • AWS support can be counted on, but it comes with a price tag
         • .. etc

Most companies have and run their existing infrastructure, development-testing environments and software licenses, .. etc. These are companies' assets and they may have invested heavily in such assets.

What would be AWS cost of the following?

         • Using AWS infrastructure
         • Development
         • Storage and Batch Processes
         • Third party testing
         • Integration
         • Daily Charges
         • Support
         • Upgrade
         • Security
         • Sam's Checklist

Sam's Checklist of processes and steps in building and testing Sam's Virtual Integration.

Planning:
         • Business size (Small, medium and large scale + enterprise level)
         • System Plans ( 1, 5, 10 yrs)
         • Long and Short Term Investment
         • Management Structure and Templates
         • Technologies
         • Risk Analysis
         • Cost Analysis
         • Budget
         • Documentation

Existing Structure:
         • Infrastructure
         • Storage
         • Batch Processing (cost)
         • Distributed System
         • Presentation Zone Firewall
         • Secure Zone Firewall
         • Baronet Zone Firewall
         • Security

Existing Platforms:
         • Bid Data - structured and non-structured data (PDF, excel, images. ..etc)
         • CRM
         • Analytics
         • Business Intelligence (BI)
         • Legacy System

Software and Tools:
         • Frameworks
         • Services
         • Development
         • Reusability of code
         • Common, utilities, services
         • Reports
         • Templates
         • Errors and exceptions
         • Audit trail
         • logging
         • Tracking
         • Parsers
         • Convertors
         • Data Exchange
         • Social Media support
         • Dictionary

Existing Support:
         • Support
         • Online help
         • Customer service
         • Training

Target Performance:
         • Customization
         • Performance
         • Speed
         • Flexibility
         • Availability
         • Refactoring
         • Transparencies
         • Latencies
         • Scalability
         • Reusability
         • Support
         • Recovery
         • Rollback
         • Backup

System Integration:
         • Virtualization
         • Intelligence
         • Automation
         • Integration
         • Security

Testing:
         • Virtual Testing
         • Test Resources
         • Testing Plans
         • QA
         • Documentation
         • Training