SlideShare a Scribd company logo
1 of 16
Cloud Computing: 4
Cloud Service Requirements
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Service
• We define service as a kind of relationship and
interaction between a service provider and a
service consumer. The service provider will
commit to complete tasks for and provide
value to the consumer during the service life
cycle. The goal for both sides is to keep a
healthy, long term trust with efficient and
valuable services.
Service Lifecycle
Key Factors in a Service Lifecycle
 Data/Information
 Processes
 People
 Resources
 Finance Factors
 Knowledge and Skills
 Innovation and Technology
19
Phase 1: Consulting and Strategic
Planning
 The key activity in this phase is to invite third party
consulting companies to perform strategic planning.
Example: Customer invites CSP to analyze its potential
position in the Market together with an IT professional plan
for the next five years. At the end of the consulting phase,
CSP helps C build a Request for Proposal (RFP)
20
Phase 2: Services Engagement
 The key activities in this phase include:
1. Opportunity
2. Identification
3. RFP
4. Negotiating service demands
5. Forming the Statement of Work (SoW)
6. Contracting
21
Phase 2: Services Engagement
Example: C distributes RFP’s to multiple service
providers to bid for the project; then C decides one
service provider, say ITP.
22
Phase 3 Services Delivery
 The key activities in this phase include:
1. Establishing service delivery teams and
governing project management
2. Solution creation
3. Work breakdown
4. Macro design
5. Development and Implementation
6. Testing and Deployment
23
Phase 3 Services Delivery
In this phase, ITP establishes a project team and selects
sub-service providers ITP1 and ITP2. ITP’s project team
comprises a project executive, an IT architect, and some
senior IT experts with rich knowledge in SOA solution
creation. Based on the results from the consulting company
and RFP, they decide to adopt the SOA infrastructure. Part of
the work is decided to be outsourced to ITP1 and ITP2; the
testing work is decided to be outsourced to ITP1.
24
Phase 4: Services Operation
 The key activities in this phase include: call center (contact
center ) management, selecting The unique features of
services and services systems demand corresponding IT
support.
Example of Service Oriented Technologies: Service-Oriented
Architecture (SOA), Web services, Grid Computing, and
Autonomic Computing. These technologies facilitate the
construction of the services systems with higher reusability,
flexibility, extensibility, and robustness.
25
Phase 5: Services Billing
 In this phase, the service provider gathers payment based
on the contracts with the customer.
In the service delivery case, ITP successfully completes the
project for C by collaborating with ITP1 and ITP2.The contract
will be closed, and C will pay ITP according to the contract.
Besides the transaction-based payment for the
completed project, C may sign a new outsourcing contract
with ITP and decide to pay ITP the IT maintenance fee
annually.
26
Phase 5: Services Billing
In the service delivery case, ITP successfully completes
the project for C by collaborating with ITP1 and ITP2.The
contract will be closed, and C will pay ITP according to the
contract.
Besides the transaction-based payment for the
completed project, C may sign a new outsourcing contract
with ITP and decide to pay ITP the IT maintenance fee
annually.
27
Phase 6: Services Management
In this phase, since ITP is in charge of the solution
creation and IT service management tasks, ITP1 could
predict the traffic knowing that customer C wants to add a
new service, and recommends that C increase IT resources
for the new service.
28
Key Factors in a Services Lifecycle
 Seven Key Factors
1. Data and Information
2. Processes people
3. Resources
4. Finance factors
5. Knowledge
6. Skills
7. Innovation and Technology.
29
• Explain the cloud service requirements and
service life cycle phases

More Related Content

Similar to Cloud computing 4 cloud service requirements

Digital Transformation Map
Digital Transformation MapDigital Transformation Map
Digital Transformation Maposcarallejandro
 
Fast-Tracking Digital: A Blueprint for Communications Services Providers
Fast-Tracking Digital: A Blueprint for Communications Services ProvidersFast-Tracking Digital: A Blueprint for Communications Services Providers
Fast-Tracking Digital: A Blueprint for Communications Services ProvidersCognizant
 
Agile Development with Agile Contract
Agile Development with Agile ContractAgile Development with Agile Contract
Agile Development with Agile ContractNUS-ISS
 
L&T Construction- Ananya Sharma
L&T Construction- Ananya SharmaL&T Construction- Ananya Sharma
L&T Construction- Ananya SharmaAnanyaSharma152
 
AYESA Presentation - GC East Coast Railway_12th January.pdf
AYESA Presentation - GC East Coast Railway_12th January.pdfAYESA Presentation - GC East Coast Railway_12th January.pdf
AYESA Presentation - GC East Coast Railway_12th January.pdfrinkumandaljis
 
DEV1111 Principal Engineer Job Desc
DEV1111 Principal Engineer Job DescDEV1111 Principal Engineer Job Desc
DEV1111 Principal Engineer Job DescRichard Childs
 
Session3 introduction to e governance project lifecycle
Session3 introduction to e governance project lifecycleSession3 introduction to e governance project lifecycle
Session3 introduction to e governance project lifecycleBantu Sai Ramesh
 
WS2_FINAL_MITOS_T03_v20151102
WS2_FINAL_MITOS_T03_v20151102WS2_FINAL_MITOS_T03_v20151102
WS2_FINAL_MITOS_T03_v20151102Arun Sankar
 
Sheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docx
Sheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docxSheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docx
Sheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docxlesleyryder69361
 
Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxjasoninnes20
 
3Worksheet The Project CharterProject NameBurl.docx
3Worksheet The Project CharterProject NameBurl.docx3Worksheet The Project CharterProject NameBurl.docx
3Worksheet The Project CharterProject NameBurl.docxgilbertkpeters11344
 
Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...
Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...
Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...Project Controls Expo
 
Digital Transformation Toolkit - Overview and Approach
Digital Transformation Toolkit - Overview and ApproachDigital Transformation Toolkit - Overview and Approach
Digital Transformation Toolkit - Overview and ApproachPeterFranz6
 
CH-2.1 Conceptualizing and Initializing the IT Project.ppt
CH-2.1 Conceptualizing and Initializing the IT Project.pptCH-2.1 Conceptualizing and Initializing the IT Project.ppt
CH-2.1 Conceptualizing and Initializing the IT Project.pptamanuel236786
 
SQ Lecture Four : Distributing Services & Setting Prices and Implementing Re...
SQ Lecture Four : Distributing Services  & Setting Prices and Implementing Re...SQ Lecture Four : Distributing Services  & Setting Prices and Implementing Re...
SQ Lecture Four : Distributing Services & Setting Prices and Implementing Re...SQAdvisor
 

Similar to Cloud computing 4 cloud service requirements (20)

Digital Transformation Map
Digital Transformation MapDigital Transformation Map
Digital Transformation Map
 
Fast-Tracking Digital: A Blueprint for Communications Services Providers
Fast-Tracking Digital: A Blueprint for Communications Services ProvidersFast-Tracking Digital: A Blueprint for Communications Services Providers
Fast-Tracking Digital: A Blueprint for Communications Services Providers
 
Agile Development with Agile Contract
Agile Development with Agile ContractAgile Development with Agile Contract
Agile Development with Agile Contract
 
L&T Construction- Ananya Sharma
L&T Construction- Ananya SharmaL&T Construction- Ananya Sharma
L&T Construction- Ananya Sharma
 
AYESA Presentation - GC East Coast Railway_12th January.pdf
AYESA Presentation - GC East Coast Railway_12th January.pdfAYESA Presentation - GC East Coast Railway_12th January.pdf
AYESA Presentation - GC East Coast Railway_12th January.pdf
 
DEV1111 Principal Engineer Job Desc
DEV1111 Principal Engineer Job DescDEV1111 Principal Engineer Job Desc
DEV1111 Principal Engineer Job Desc
 
Session3 introduction to e governance project lifecycle
Session3 introduction to e governance project lifecycleSession3 introduction to e governance project lifecycle
Session3 introduction to e governance project lifecycle
 
WS2_FINAL_MITOS_T03_v20151102
WS2_FINAL_MITOS_T03_v20151102WS2_FINAL_MITOS_T03_v20151102
WS2_FINAL_MITOS_T03_v20151102
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Itil
ItilItil
Itil
 
Q 1-4
Q  1-4Q  1-4
Q 1-4
 
Sheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docx
Sheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docxSheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docx
Sheet1Fertilizing The LawnDecisionsNitrogenPhosphorusPotash121418O.docx
 
Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docx
 
3Worksheet The Project CharterProject NameBurl.docx
3Worksheet The Project CharterProject NameBurl.docx3Worksheet The Project CharterProject NameBurl.docx
3Worksheet The Project CharterProject NameBurl.docx
 
It services in telecom
It services in telecomIt services in telecom
It services in telecom
 
Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...
Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...
Planning and Project Controls under NEC4 – the choice isn’t yours! by "Glenn ...
 
Digital Transformation Toolkit - Overview and Approach
Digital Transformation Toolkit - Overview and ApproachDigital Transformation Toolkit - Overview and Approach
Digital Transformation Toolkit - Overview and Approach
 
CH-2.1 Conceptualizing and Initializing the IT Project.ppt
CH-2.1 Conceptualizing and Initializing the IT Project.pptCH-2.1 Conceptualizing and Initializing the IT Project.ppt
CH-2.1 Conceptualizing and Initializing the IT Project.ppt
 
SQ Lecture Four : Distributing Services & Setting Prices and Implementing Re...
SQ Lecture Four : Distributing Services  & Setting Prices and Implementing Re...SQ Lecture Four : Distributing Services  & Setting Prices and Implementing Re...
SQ Lecture Four : Distributing Services & Setting Prices and Implementing Re...
 
Outsource.ppt
Outsource.pptOutsource.ppt
Outsource.ppt
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Recently uploaded (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Cloud computing 4 cloud service requirements

  • 1. Cloud Computing: 4 Cloud Service Requirements Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2.
  • 3. Service • We define service as a kind of relationship and interaction between a service provider and a service consumer. The service provider will commit to complete tasks for and provide value to the consumer during the service life cycle. The goal for both sides is to keep a healthy, long term trust with efficient and valuable services.
  • 4.
  • 5. Service Lifecycle Key Factors in a Service Lifecycle  Data/Information  Processes  People  Resources  Finance Factors  Knowledge and Skills  Innovation and Technology 19
  • 6. Phase 1: Consulting and Strategic Planning  The key activity in this phase is to invite third party consulting companies to perform strategic planning. Example: Customer invites CSP to analyze its potential position in the Market together with an IT professional plan for the next five years. At the end of the consulting phase, CSP helps C build a Request for Proposal (RFP) 20
  • 7. Phase 2: Services Engagement  The key activities in this phase include: 1. Opportunity 2. Identification 3. RFP 4. Negotiating service demands 5. Forming the Statement of Work (SoW) 6. Contracting 21
  • 8. Phase 2: Services Engagement Example: C distributes RFP’s to multiple service providers to bid for the project; then C decides one service provider, say ITP. 22
  • 9. Phase 3 Services Delivery  The key activities in this phase include: 1. Establishing service delivery teams and governing project management 2. Solution creation 3. Work breakdown 4. Macro design 5. Development and Implementation 6. Testing and Deployment 23
  • 10. Phase 3 Services Delivery In this phase, ITP establishes a project team and selects sub-service providers ITP1 and ITP2. ITP’s project team comprises a project executive, an IT architect, and some senior IT experts with rich knowledge in SOA solution creation. Based on the results from the consulting company and RFP, they decide to adopt the SOA infrastructure. Part of the work is decided to be outsourced to ITP1 and ITP2; the testing work is decided to be outsourced to ITP1. 24
  • 11. Phase 4: Services Operation  The key activities in this phase include: call center (contact center ) management, selecting The unique features of services and services systems demand corresponding IT support. Example of Service Oriented Technologies: Service-Oriented Architecture (SOA), Web services, Grid Computing, and Autonomic Computing. These technologies facilitate the construction of the services systems with higher reusability, flexibility, extensibility, and robustness. 25
  • 12. Phase 5: Services Billing  In this phase, the service provider gathers payment based on the contracts with the customer. In the service delivery case, ITP successfully completes the project for C by collaborating with ITP1 and ITP2.The contract will be closed, and C will pay ITP according to the contract. Besides the transaction-based payment for the completed project, C may sign a new outsourcing contract with ITP and decide to pay ITP the IT maintenance fee annually. 26
  • 13. Phase 5: Services Billing In the service delivery case, ITP successfully completes the project for C by collaborating with ITP1 and ITP2.The contract will be closed, and C will pay ITP according to the contract. Besides the transaction-based payment for the completed project, C may sign a new outsourcing contract with ITP and decide to pay ITP the IT maintenance fee annually. 27
  • 14. Phase 6: Services Management In this phase, since ITP is in charge of the solution creation and IT service management tasks, ITP1 could predict the traffic knowing that customer C wants to add a new service, and recommends that C increase IT resources for the new service. 28
  • 15. Key Factors in a Services Lifecycle  Seven Key Factors 1. Data and Information 2. Processes people 3. Resources 4. Finance factors 5. Knowledge 6. Skills 7. Innovation and Technology. 29
  • 16. • Explain the cloud service requirements and service life cycle phases