Your SlideShare is downloading. ×
0
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Cloud Asia 2013 Highlights
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cloud Asia 2013 Highlights

1,407

Published on

Some of the Highlights from Cloud Asia 2013

Some of the Highlights from Cloud Asia 2013

Published in: Technology, Business
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,407
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
67
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CloudAsia 2013HighlightsMay 23rd 2013www.alanquayle.com/blog
  • 2. Conference Highlights• Strong Government Support to leapfrog the APAC IT gapo Cloud Computing Policy in Koreao Overview of Cloud Adoption in Singapore• Case Studies in Cloud Adoptiono Steps in Cloud Adoption in SATS (Singapore Airport)o Diners World Travel’s Experienceo Unified Communications in Healthcare• Technologies and Frameworkso Cloud Security Alliance’s Open Security Frameworko 2013 Data Break Report by Verizono Role of Identity managemento Complex Analytics using Array DBMS2
  • 3. 3Seong Il Seo gave a 5 min review of the state of cloud computing in Korea as partof the panel session I ran. Bottom-line, cloud computing is growing fast acrossmost of developed APAC countries.
  • 4. 4Like most APAC governments they see cloud computing as a way of leapfrogingthe IT gap compared with some western nations.
  • 5. 5Khoong Hock Yun gave a 5 min review of the state of cloud computing inSingapore as part of the panel session I ran. Bottom-line, cloud computing isgrowing fast across most of developed APAC.
  • 6. 6The Singapore government has tax incentives that have accelerated cloudadoption in many small and medium businesses in Singapore. The later DinersWorld Travel case study will explain this in more detail.
  • 7. 7All of the APAC countries on the panel (Korea, HK, Thailand and Singapore)where claiming similar cloud computing penetration rates across enterprise.
  • 8. 8As always the difference between the figures presented is who does the measuringand the questions asked and whether a technically strict (see NIST slides in CloudAsia 2012 summary) or loose marketing definition is used for cloud computing.
  • 9. 9
  • 10. 10Focus is security, but security can not be looked at just from just the cloud, needan end to end approach. Often security is an excuse for the underlying and muchmore difficult issue of business case.
  • 11. 11Great update on SATS Cloud Migration (Singapore Airport). See Cloud Asia 2012Highlights for last year’s presentation.
  • 12. 12
  • 13. 13The move to a hybrid cloud was a theme throughout Cloud Asia – which meanssecurity must be viewed end to end and not just within the cloud.
  • 14. 14
  • 15. 15Most enterprises are using a mix of public cloud (analytics workloads), privatecloud (trading systems) and hybrid cloud (CRM workloads)
  • 16. 16These are very common issues. Partner selection is everything, PoC (Proof ofConcept) beats any amount of tendering and RFI/P/Qs (Request For Information/ Product / Quote), Business units want to retain control, and the migration tocloud is not simple as discussed in my Workshop on Cloud Computing.
  • 17. 17Another great case studies in Cloud Computing adoption
  • 18. 18I’ve seen many similar incremental migrations, analytics, then some desktopapplications (cost saving and mobilization) and then CRM. Sometimes UnifiedCommunications will be the first or second step, especially when a Telco Cloudprovider is used.
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26This is a key point – there’s a BIG tax incentive to adopt cloud computing inSingapore!!!
  • 27. 27Unified Communication is also a popular workload to move to the cloud.
  • 28. 28Users of the UC Cloud
  • 29. 29
  • 30. 30Maxis plays an important role in this solution
  • 31. 31
  • 32. 32A trend over the past year has been the creation of security frameworks, securitycertifications and auditing around cloud computing
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36This is true, and security is sometimes used as an excuse when the underlyingreason is lack of clarity around the business case of moving a specific workloadonto the cloud.
  • 37. 37
  • 38. 38But regardless of the your cloud providers certification, every enterprise musthave an end to end security framework . Next slides highlight some interestingresults from Verizon on Data Breaches
  • 39. 39http://www.verizonenterprise.com/DBIR/2013/This is an excellent report, URL shown above. It came up in many of thediscussions around security in the conference.
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47Vocabulary for Event Recording and Incident Sharing (VERIS) is a set of metricsdesigned to provide a common language for describing security incidents in astructured and repeatable manner.
  • 48. 48And in taking an end to end approach to ecurity Identity management becomescritical
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 52Great review on the emergence of complex analytics and the challenges we’reseeing with Hadoop for some complex analytic tasks
  • 53. 53
  • 54. 54
  • 55. 55
  • 56. 56I am seeing with some implementations the limitations of Hadoop beingdiscovered as organizations start looking within their data for covariance to betterpredict customer behavior and addressable services.
  • 57. 57Granted Michael is selling his technology, but I am seeing a gap emergingbetween RDBMS and Hadoop as the analytics gets more sophisticated, andcorrelation between variables becomes a topic of study. Whether an Array DBMSfills the gap, or the ecosystems extend their capabilities to better fill this gap willlikely take a few years to resolve. As always nothing remains still… All we can dois focus on solving today’s problems without locking ourselves in.

×