SlideShare a Scribd company logo
1 of 19
Managing Projects in the Cloud




Gary Conley, Independent
gary.conley@comcast.net
                             http://en.wikipedia.org/wiki/Cloud_computing   1
Managing Projects in the Cloud




Cloud computing is the delivery of computing as a service rather than a product, whereby shared
resources, software, and information are provided to computers and other devices as a utility (like the
electricity grid) over a network (typically the Internet).


Gary Conley, Independent
gary.conley@comcast.net
                                                                           http://en.wikipedia.org/wiki/Cloud_computing   2
Agenda




 Introduction
 Why Manage Projects in the Cloud
 Foundational Factors
 Use Considerations
 Conclusion

                                     3
Introduction
 Part of Cisco Services Organization
 Advance Services focused on Service Provider Market
 Started on our PPM journey 4 years ago as a means to
  improve our deliver services – 10 people – one
  program team focused on execution.
 Troubled program and was looking for a better way to
  execute




                                                         4
Introduction –Today
 Multi organizational Adoption
 5900+ Globally distributed users – full collaborative
  environment, project, program and portfolio
  management, mostly about execution
 Hosted system is support by a core team in US,
  Canada, and India and a network of extended team
  members in user organizations who are through out the
  world
                    Customers




                     Partners                             5
Introduction – How did that Happen?

Well, we had a screaming success!




Realized this was not unique situation.
Many other problems we could now be
addressed.


Through sharing, word of mouth, and management support,
The practice began to spread.


                                                          6
Introduction - capabilities
  Status reporting
  Web based report integrated with Project Server data
   using SRSS Reporting Services




                                                          7
Introduction - capabilities




                              8
Why - did we choose to manage our
   Program/Project in the cloud?

For us some very compelling reasons –

Our projects were not inside the corporate
firewall. All participants needed access

Other factors:
Fast - 5 day set up


Expertise


Variable cost/fixed
                                             9
Why – would it matter to anyone else?

Virtual Companies

Mobile worker



Scale Up/ Scale Down programs



Specialized expertise that may not be in
your company

Overall company strategy – core/context
                                           10
And Why it matters to you ?
Cloud based solutions are server based
Significant difference in the how you manage vs. client application
      collaborative
      schedule development
      task updating
      In general Web 2.0 techniques
      New skills in use of tools/methods


Increases the ability to manage larger teams,
 anywhere

Management Reporting significantly enhanced


Standardized methods through templates/
workflow
                                                                11
Foundational Factors

 Information Security Policy


 Infrastructure Architectural


 Application security


 Data Center Practices


 Cost
                                12
Foundational Factors
   Security Information Policy

 Secret – company business plans

 Highly Confidential – personal information, product code

 Confidential – need to know, most information in a company

 Public – ready available information in the public domain

 Review Data confidentially/Indemnification agreements
with provider

The type of information in part drives your solution
                                                              13
Foundational Factors
Infrastructure Architecture

Physically secured facility

Data Center Management

Multi tenant – several users on the same server
vs. separate servers firewall between database and web server

Redundancy in architecture, mirrored disk, redundant firewalls
and hot swappable spares servers

Connected to a Internet Backbone



                                                           14
Foundational Factors
   Application Architecture

Secure connection – https, vpn, remote desktop, strong password

Account Management

Granular security model – ability to segment down to low level
items.

Individual security and group security.




                                                                 15
Foundational Factors
Data Center Practices

Ask if they have a third party evaluation on practices and
security policies!

24/7 support
Data back up, daily, weekly, monthly
Maintenance practice
Offsite storage for disaster recovery
Retention Policy - Most cloud provider have retention policy
That matches back up policy, ie a few months.
If you desire or more/less, you will need to address.

Ask for documented procedures
                                                               16
Use considerations

 Maturity
 Over 90% of organization are at Level 1 or 2 in PPM maturity
 and none are at Level 4 or 5. (1)




Where you operate on the curve as well as where you expect to
operate will influence your solution and your cost.

                                              (1) Center for Business Practices
                                                                              17
Conclusion

Business trends point to continued expansion of
project/program/portfolio management in the Cloud.
 There are foundation elements around:
 Information Security Policy
 Infrastructure architecture
 Data Center practices
 Cost
 Use Consideration
That must be reviewed before venturing into this new
frontier.
                                                       18
Managing Projects in the Cloud




                          Thank you!
Gary Conley
gary.conley@comcast.net
                                       19

More Related Content

What's hot

Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First ArchitectureCameron Vetter
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksKaseya
 
Top 10 Mistakes When Implementing a DAM Solution
Top 10 Mistakes When Implementing a DAM SolutionTop 10 Mistakes When Implementing a DAM Solution
Top 10 Mistakes When Implementing a DAM Solutiondatabasics
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 
NEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPNEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPInteractiveNEC
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld
 
Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center ConsolidationBarry Weber
 
Moving to a New "Business as Usual" after COVID-19
Moving to a New "Business as Usual" after COVID-19 Moving to a New "Business as Usual" after COVID-19
Moving to a New "Business as Usual" after COVID-19 PECB
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityRapidScale
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Itential
 
Step FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckStep FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckchrismannering
 
How to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center EnvironmentsHow to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center EnvironmentsSunbird DCIM
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Data Center Transformation Program Planning and Design
Data Center Transformation Program Planning and DesignData Center Transformation Program Planning and Design
Data Center Transformation Program Planning and DesignJoseph Schwartz
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItStorage Switzerland
 

What's hot (20)

Leading Enterprise Wide Projects
Leading Enterprise Wide ProjectsLeading Enterprise Wide Projects
Leading Enterprise Wide Projects
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First Architecture
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Top 10 Mistakes When Implementing a DAM Solution
Top 10 Mistakes When Implementing a DAM SolutionTop 10 Mistakes When Implementing a DAM Solution
Top 10 Mistakes When Implementing a DAM Solution
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
NEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPNEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUP
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
BC_DR
BC_DRBC_DR
BC_DR
 
Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center Consolidation
 
Moving to a New "Business as Usual" after COVID-19
Moving to a New "Business as Usual" after COVID-19 Moving to a New "Business as Usual" after COVID-19
Moving to a New "Business as Usual" after COVID-19
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
 
Step FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckStep FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeck
 
How to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center EnvironmentsHow to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center Environments
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Data Center Transformation Program Planning and Design
Data Center Transformation Program Planning and DesignData Center Transformation Program Planning and Design
Data Center Transformation Program Planning and Design
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 

Viewers also liked

universidad central facultad de filosofia
universidad central facultad de filosofiauniversidad central facultad de filosofia
universidad central facultad de filosofiasarybetyflores
 
Ganadora del shingo prize
Ganadora del shingo prizeGanadora del shingo prize
Ganadora del shingo prizeAlma Velásquez
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentationjmsobel1
 
Universidad Central del Ecuador Facultad de Filosofia Sara Flores
Universidad Central del Ecuador Facultad de Filosofia Sara FloresUniversidad Central del Ecuador Facultad de Filosofia Sara Flores
Universidad Central del Ecuador Facultad de Filosofia Sara Floressarybetyflores
 
Ca1 reading strategy methods
Ca1 reading strategy methodsCa1 reading strategy methods
Ca1 reading strategy methodsMichele Chillemi
 
CG - Introduction to Computer Graphics
CG - Introduction to Computer GraphicsCG - Introduction to Computer Graphics
CG - Introduction to Computer GraphicsShruti Chopra Arora
 
THINGS IN THE HOUSE BY ESTEFANIA IDROBO
THINGS IN THE  HOUSE  BY ESTEFANIA  IDROBOTHINGS IN THE  HOUSE  BY ESTEFANIA  IDROBO
THINGS IN THE HOUSE BY ESTEFANIA IDROBOst3fy
 
Beware the false positive td planning
Beware the false positive td planningBeware the false positive td planning
Beware the false positive td planningEmelia Rallapalli
 
THINGS IN THE HOUSE ESTEFANIA IDROBO
THINGS IN THE HOUSE  ESTEFANIA IDROBO THINGS IN THE HOUSE  ESTEFANIA IDROBO
THINGS IN THE HOUSE ESTEFANIA IDROBO st3fy
 
Phrasal verbs
Phrasal verbsPhrasal verbs
Phrasal verbsst3fy
 
Skinner
SkinnerSkinner
Skinnerst3fy
 
Skinner
SkinnerSkinner
Skinnerst3fy
 
Briófitas - Características gerais e Função bioindicadora
Briófitas - Características gerais e Função bioindicadoraBriófitas - Características gerais e Função bioindicadora
Briófitas - Características gerais e Função bioindicadoraSid Siqueira
 
Ppt taxonomia [ sid. ]
Ppt   taxonomia [ sid. ]Ppt   taxonomia [ sid. ]
Ppt taxonomia [ sid. ]Sid Siqueira
 

Viewers also liked (19)

universidad central facultad de filosofia
universidad central facultad de filosofiauniversidad central facultad de filosofia
universidad central facultad de filosofia
 
Comm intern2
Comm intern2Comm intern2
Comm intern2
 
Ganadora del shingo prize
Ganadora del shingo prizeGanadora del shingo prize
Ganadora del shingo prize
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentation
 
Universidad Central del Ecuador Facultad de Filosofia Sara Flores
Universidad Central del Ecuador Facultad de Filosofia Sara FloresUniversidad Central del Ecuador Facultad de Filosofia Sara Flores
Universidad Central del Ecuador Facultad de Filosofia Sara Flores
 
Ca1 reading strategy methods
Ca1 reading strategy methodsCa1 reading strategy methods
Ca1 reading strategy methods
 
What is aphasia
What is aphasiaWhat is aphasia
What is aphasia
 
CG - Introduction to Computer Graphics
CG - Introduction to Computer GraphicsCG - Introduction to Computer Graphics
CG - Introduction to Computer Graphics
 
THINGS IN THE HOUSE BY ESTEFANIA IDROBO
THINGS IN THE  HOUSE  BY ESTEFANIA  IDROBOTHINGS IN THE  HOUSE  BY ESTEFANIA  IDROBO
THINGS IN THE HOUSE BY ESTEFANIA IDROBO
 
Beware the false positive td planning
Beware the false positive td planningBeware the false positive td planning
Beware the false positive td planning
 
Ecology power point
Ecology power pointEcology power point
Ecology power point
 
THINGS IN THE HOUSE ESTEFANIA IDROBO
THINGS IN THE HOUSE  ESTEFANIA IDROBO THINGS IN THE HOUSE  ESTEFANIA IDROBO
THINGS IN THE HOUSE ESTEFANIA IDROBO
 
141119
141119141119
141119
 
Universul
UniversulUniversul
Universul
 
Phrasal verbs
Phrasal verbsPhrasal verbs
Phrasal verbs
 
Skinner
SkinnerSkinner
Skinner
 
Skinner
SkinnerSkinner
Skinner
 
Briófitas - Características gerais e Função bioindicadora
Briófitas - Características gerais e Função bioindicadoraBriófitas - Características gerais e Função bioindicadora
Briófitas - Características gerais e Função bioindicadora
 
Ppt taxonomia [ sid. ]
Ppt   taxonomia [ sid. ]Ppt   taxonomia [ sid. ]
Ppt taxonomia [ sid. ]
 

Similar to Managing Projects in the Cloud

Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudBart Blommaerts
 
CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16Dennis. Lee
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Prolifics
 
Implementing Cloud-Based DevOps for Distributed Agile Projects
Implementing Cloud-Based DevOps for Distributed Agile ProjectsImplementing Cloud-Based DevOps for Distributed Agile Projects
Implementing Cloud-Based DevOps for Distributed Agile ProjectsTechWell
 
JD Edwards in the Cloud - Flipbook: What are your peers doing?
JD Edwards in the Cloud - Flipbook: What are your peers doing? JD Edwards in the Cloud - Flipbook: What are your peers doing?
JD Edwards in the Cloud - Flipbook: What are your peers doing? ManageForce
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesLivingstone Advisory
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp PresentationProlifics
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Ezhilarasan Natarajan
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Triaxil
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experienceEric Cattoir
 
Enterprise Cloud Strategy - Facts, FAQs and Implementation Steps
Enterprise Cloud Strategy - Facts, FAQs and Implementation StepsEnterprise Cloud Strategy - Facts, FAQs and Implementation Steps
Enterprise Cloud Strategy - Facts, FAQs and Implementation StepsMarianne Harness
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 
Cloud cpr uncc cloud computing conference 2013
Cloud cpr   uncc cloud computing conference 2013Cloud cpr   uncc cloud computing conference 2013
Cloud cpr uncc cloud computing conference 2013C5_LUCK
 

Similar to Managing Projects in the Cloud (20)

Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloud
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change
 
Implementing Cloud-Based DevOps for Distributed Agile Projects
Implementing Cloud-Based DevOps for Distributed Agile ProjectsImplementing Cloud-Based DevOps for Distributed Agile Projects
Implementing Cloud-Based DevOps for Distributed Agile Projects
 
JD Edwards in the Cloud - Flipbook: What are your peers doing?
JD Edwards in the Cloud - Flipbook: What are your peers doing? JD Edwards in the Cloud - Flipbook: What are your peers doing?
JD Edwards in the Cloud - Flipbook: What are your peers doing?
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp Presentation
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
 
AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experience
 
Enterprise Cloud Strategy - Facts, FAQs and Implementation Steps
Enterprise Cloud Strategy - Facts, FAQs and Implementation StepsEnterprise Cloud Strategy - Facts, FAQs and Implementation Steps
Enterprise Cloud Strategy - Facts, FAQs and Implementation Steps
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
ETCA_5
ETCA_5ETCA_5
ETCA_5
 
Cloud cpr uncc cloud computing conference 2013
Cloud cpr   uncc cloud computing conference 2013Cloud cpr   uncc cloud computing conference 2013
Cloud cpr uncc cloud computing conference 2013
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

Managing Projects in the Cloud

  • 1. Managing Projects in the Cloud Gary Conley, Independent gary.conley@comcast.net http://en.wikipedia.org/wiki/Cloud_computing 1
  • 2. Managing Projects in the Cloud Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Gary Conley, Independent gary.conley@comcast.net http://en.wikipedia.org/wiki/Cloud_computing 2
  • 3. Agenda  Introduction  Why Manage Projects in the Cloud  Foundational Factors  Use Considerations  Conclusion 3
  • 4. Introduction  Part of Cisco Services Organization  Advance Services focused on Service Provider Market  Started on our PPM journey 4 years ago as a means to improve our deliver services – 10 people – one program team focused on execution.  Troubled program and was looking for a better way to execute 4
  • 5. Introduction –Today  Multi organizational Adoption  5900+ Globally distributed users – full collaborative environment, project, program and portfolio management, mostly about execution  Hosted system is support by a core team in US, Canada, and India and a network of extended team members in user organizations who are through out the world Customers Partners 5
  • 6. Introduction – How did that Happen? Well, we had a screaming success! Realized this was not unique situation. Many other problems we could now be addressed. Through sharing, word of mouth, and management support, The practice began to spread. 6
  • 7. Introduction - capabilities  Status reporting  Web based report integrated with Project Server data using SRSS Reporting Services 7
  • 9. Why - did we choose to manage our Program/Project in the cloud? For us some very compelling reasons – Our projects were not inside the corporate firewall. All participants needed access Other factors: Fast - 5 day set up Expertise Variable cost/fixed 9
  • 10. Why – would it matter to anyone else? Virtual Companies Mobile worker Scale Up/ Scale Down programs Specialized expertise that may not be in your company Overall company strategy – core/context 10
  • 11. And Why it matters to you ? Cloud based solutions are server based Significant difference in the how you manage vs. client application collaborative schedule development task updating In general Web 2.0 techniques New skills in use of tools/methods Increases the ability to manage larger teams, anywhere Management Reporting significantly enhanced Standardized methods through templates/ workflow 11
  • 12. Foundational Factors Information Security Policy Infrastructure Architectural Application security Data Center Practices Cost 12
  • 13. Foundational Factors Security Information Policy  Secret – company business plans  Highly Confidential – personal information, product code  Confidential – need to know, most information in a company  Public – ready available information in the public domain  Review Data confidentially/Indemnification agreements with provider The type of information in part drives your solution 13
  • 14. Foundational Factors Infrastructure Architecture Physically secured facility Data Center Management Multi tenant – several users on the same server vs. separate servers firewall between database and web server Redundancy in architecture, mirrored disk, redundant firewalls and hot swappable spares servers Connected to a Internet Backbone 14
  • 15. Foundational Factors Application Architecture Secure connection – https, vpn, remote desktop, strong password Account Management Granular security model – ability to segment down to low level items. Individual security and group security. 15
  • 16. Foundational Factors Data Center Practices Ask if they have a third party evaluation on practices and security policies! 24/7 support Data back up, daily, weekly, monthly Maintenance practice Offsite storage for disaster recovery Retention Policy - Most cloud provider have retention policy That matches back up policy, ie a few months. If you desire or more/less, you will need to address. Ask for documented procedures 16
  • 17. Use considerations Maturity Over 90% of organization are at Level 1 or 2 in PPM maturity and none are at Level 4 or 5. (1) Where you operate on the curve as well as where you expect to operate will influence your solution and your cost. (1) Center for Business Practices 17
  • 18. Conclusion Business trends point to continued expansion of project/program/portfolio management in the Cloud.  There are foundation elements around:  Information Security Policy  Infrastructure architecture  Data Center practices  Cost  Use Consideration That must be reviewed before venturing into this new frontier. 18
  • 19. Managing Projects in the Cloud Thank you! Gary Conley gary.conley@comcast.net 19

Editor's Notes

  1. Removing the resistance – I’ll go over some examples of what we did in our implementation
  2. Services is about $8 billion in sales and the service we offer include anything from a customer trough our TAC to Advance technology deployment to Advisor services.Didn’t really start out with a grand goal in mind, simply looking for a better way to execute on large complex programs As our existing methods were not working.
  3. Soon realized we could get a lot more out of efforts, many internal needs could also be addressed. How did we get there?
  4. Examples what worked for us- There is an unending demand for reportsReports at the team level, reports at the first line management level, status, milestone, resources reports at the portfolio level, health, meeting objectives, resource utilization, what if scenario's
  5. Internet backbone ensures internet speeds, local connection become the governing item in latency performance issues.
  6. Security https best, vpn need to on or able to access that network, but might be what you want, for example information that is Secret, remote desktop, which you don’t see much of now, but some application have portion of it that require this type of connection, most admin type role, so limited and would recommend you do keep it limited.Granular security model, for the need to segment information, - caution, more granular the more overhead to maintain.Account Management, if you are using a cloud solution in a “rent” or more accurately transitory, account management becomes more important, because when efforts end you need/should disable access, to ensure a solid security model.
  7. Many organization has a mixture of all stages, the trick will be understanding how and where to applyReally, really ask the question what is the problem you are trying to solve. There are solutions at all levels practice and you need to understand your needs. Generally speaking the higher to solution maturity the higher the cost and the better you need to understand you information security policies.
  8. That concludes my presentation, I hope you found it interesting and valuable, worth your investment of time, if any of you have question, or just like to discuss a view point, my email is in the bottom left hand corner.