SlideShare a Scribd company logo
1 of 22
Download to read offline
The Economics of Utility
Computing


Alan McSweeney
Objectives

•   To discuss how the transition to utility computing can be
    cost-justified by an organisation




    June 10, 2010                                               2
Utility Computing

•   Utility computing can be:
      − Within an organisation
             • Where users of computing services are charged based on usage
      − With a public cloud model
             • Where the organisation is charged for its use of computing services

•   Utility computing can replace capital costs and charges
•   Utility provider is responsible for providing computing
    resources
      − Users just draw them down and pay for what they use
•   Nothing new here – think of computer bureau services of
    old
    June 10, 2010                                                                    3
Utility Computing

•   Utility Computing is a better term than Cloud Computing
      − Describes the payment, operation and usage approach
      − Cloud computing implies technology and approaches to
        implementation
      − Not just computing but needs to include other aspects of
        information technology resources
             • Storage
             • Data transmission
             • Service management




    June 10, 2010                                                  4
Utility Information Technology Services (UITS)

•   Turn on/off the tap as required
    to access information
    technology resources




    June 10, 2010                                5
Utility Information Technology Services Within
Organisation
•   Business units access              IT Function
    information
    technology services
    on demand and pay
    for what they use
    according to billing
    model
•   This requires that
    the IT function
    knows and manages
    its costs and delivers
    information
    technology services
    cost effectively




    June 10, 2010                                    6
Utility Information Technology Services From
Outside the Organisation
•   Service provider enables delivery of utility IT services through
    plumbing with appropriate service metering
                               Utility IT Service Provider




    June 10, 2010                                                      7
Utility Computing Payment Models

•   Same range of charging models as other utility providers: gas,
    electricity, telecommunications, water, television broadcasting
      −    Flat rate
      −    Tiered
      −    Subscription
      −    Metered
      −    Pay as you go
      −    Standing charges
•   Different pricing models for different customers based on factors
    such as scale, commitment and payment frequency
•   But the principle of utility computing remains
      − The pricing model is simply an expression by the provider of the costs of
        provision of the resources and a profit margin


    June 10, 2010                                                                   8
Information Technology Processing Resources

•   Any computer system consists of
                                                                             Results of
                                                                           Processing are
                                                                              Stored
                                                    Computing
                                                    Resources
                      Information is
                    Transmitted from                          Information is Moved
                    an External Source                           to be Processed
       External
                                            Information is
                                         Stored Temporarily
                                           or Permanently
                                                                 Information Storage
                                                                      Resources
                            Information
                            Transmission
                             Resources                                           Results of
                                                                               Processing are
                                                                                Transmitted


    June 10, 2010                                                                               9
Information Technology Processing Resources

•   This is what you pay for (because it is what costs money)

                                     Computing
                                     Resources




                                                 Information Storage
                                                      Resources
                      Information
                      Transmission
                       Resources



    June 10, 2010                                                      10
Utility Computing

•   There are significant differences between information technology
    utility resources and those of other utilities
•   Gas, electricity, water and telecommunications are single resources
    that you access
      − Easily metered
      − Simple charging models
      − Providers are not responsible for how the product is used
•   Information technology utility resources consist of
      − Computing Resources
      − Information Storage Resources
      − Information Transmission Resources
•   Can requires more complex payment model
•   You need to know what you want, what you are getting and what it
    costs
    June 10, 2010                                                         11
Utility Computing Pricing

•   Any pricing model has to reflect the cost of recovery of
    provision of service
      − Capital cost
      − Operational costs including service management costs
      − Profit margin




    June 10, 2010                                              12
Paying for Utility Computing

•   Within an organisation
      − Do you know how much IT is costing so you can implement a utility supply and
        payment model?
      − Do you know what your costs are so you can charge for their recovery?
      − How mature is your costing model?
      − Could you implement a cost-recovery/chargeback model tomorrow?
•   Outside the organisation
      − Any costs paid to an external utility provider are still part of the IT budget
      − Do you know if their costs will be cheaper or more expensive than internal
        costs?
      − Are there hidden costs?
      − Can you disengage easily, quickly and at low cost?




    June 10, 2010                                                                        13
Coase’s Law on the Nature of the Firm

•   A firm will tend to expand until the cost of organising an extra transaction within the firm
    become equal to the costs of carrying out the same transaction on the open market
•   This means when it is cheaper to buy the service externally it will generally be bought
    externally
•   However there is an assumption of perfect knowledge and perfectly rational use of this
    knowledge to achieve the most logical solution
•   In reality this perfection is rarely if ever achieved
      − Other less rational factors affect the decision
             •      Everybody Else Is Doing It
             •      I Want To Do It So It Appears On My Resume
             •      I Like New Technology
             •      Vendors Keep Talking About It
             •      I Need One Good Idea To Stamp My Mark On The Organisation
             •      It Will Solve All My Problems
             •      I Hate Dealing With IT
             •      I Do Not Want to Setup a Large IT Function
•   Cost estimates are rarely accurate
      − What we know about most projects is that they either or both overrun on costs and deliver less
        than expected
      − Cost overruns are generally caused by a mix of errors in the initial cost estimates and deliberate
        distortions in order to cause the decision to be made



    June 10, 2010                                                                                            14
Transaction Costs

•   Along with production costs, there are costs for preparing, entering into and monitoring the
    execution of all kinds of contracts as well as costs for implementing allocation and tracking
    measures for the contracted services
•   When internal transaction costs become greater than the costs of externally sourcing the
    service, the service will be obtained externally
•   There are hidden costs associated with sourcing a service externally
      −    Selecting the wrong supplier
      −    Costs of writing contract
      −    Costs of enforcing contract
      −    Having a poor service contract that results in hidden cost and/or reduced service
      −    Overlooking personnel issues
      −    Loosing control over the outsourced activity
      −    Management, quality assurance and supervision overhead
      −    Implementation and termination costs
      −    Loss of flexibility
      −    Loss of integration between applications and data
      −    Data extraction costs
      −    Security framework implementation
•   Transition to utility computing model requires full knowledge of costs – current and future
•   Note that anything can be outsourced except the management of what is
    outsourced
    June 10, 2010                                                                                   15
Characteristics of Credible Cost Estimates

•   Clear identification of requirements of the ultimate deliverable
•   Broad participation in preparing estimates
•   Availability of valid data for performing estimates – historical,
    experience, benchmarks
•   Standardised and comprehensive estimate structure that includes all
    possible sources of cost
•   Provision for uncertainties – include known costs explicitly and allow
    for unknown costs
•   Recognition of inflation
•   Recognition of excluded costs
•   Independent review of estimates for completeness and realism
•   Revision of estimates for significant changes in requirements

    June 10, 2010                                                            16
Challenges of Developing Good Cost Estimates

•   Requires detailed, stable, agreed requirements
•   Agreed assumptions
•   Access to detailed documentation and historical data for
    comparison
•   Trained and experienced analysts
•   Risk and uncertainty analysis
•   Identification of a range of confidence levels
•   Adequate contingency and management reserves


    June 10, 2010                                              17
Reasons for Good and Bad Cost Estimates
                                                                                                              Ineffe
                                                                                                             and U ctive Risk
                                    Effect                                                                         ncer
                                           i ve
                                      Unce Risk and                                   Unfa                      Analy tainty
                                              r ta                                 Techn miliar                       s is
         Ident
               ificat                   Analy inty                                First- ology or
                                                 s is
              Rang ion of a                                                             Time
                                                                                             Use
                                                                                                         Probl
                                                                                                               em
        Confi      e of               De                                                                  Acces s Getting
              dence
                      Level     Docu tailed                                                                     s to D
                                       m                                                                              ata           Unre
                            s    and H entation                                Unre
                                                                                                                                  Proje asonable
           Adeq
                 ua                     istor             Train               Unre alistic or                                          ct Bas
       Conti
             ngen te                  Data ical                 e
                                                         Exper d and
                                                                                  liable
                                                                                         Data            Unre                                 elin e
        Mana      cy an                                        ien
              geme d          Detai
                                    led, S                Analy ced                                     Assumalistic
         Reser      nt                                           sts        No o                             ption
                ves               Agree table,                            Comp r Limited                           s            Overo
                              Requ       d                                     ariso                                                 ptimi
                                   ireme                 Agr                 Avail n Data                                                     sm
                                           n ts
                                                      Assum eed                   able              New
                                                            ption                                       Pr   ocess
                                                                   s                                              e   s        Untra
                                                                       Proje                                                  Inexp ined and
                                                                             ct Ins                                                er ie
                                                                                   t   abilit
                                                                                              y   Comp                          Analy nced
                                                                                                       le                              sts
                                                                                                  or Te x Project
                                                                                                       chnol              Unre
                                                                                                             ogy               alistic
                                                                                                                              Savin Project
                                                                                                                                     gs




•   Lost of reasons for and causes of inaccurate cost estimates

    June 10, 2010                                                                                                                                      18
Sources of Risk and Uncertainty in Estimating Costs

•   Lack of understanding of the project requirements
•   Shortcomings of human language and differing
    interpretations of meaning of project
•   Behaviour of parties involved in the cost estimation
    process
•   Haste
•   Deception
•   Poor cost estimating and pricing practices



    June 10, 2010                                          19
Utility Information Technology Services (UITS)

•   What happens when the tap
    runs dry
•   You need to understand the
    operating model




    June 10, 2010                                20
Availing of Utility Information Technology Services
(UITS) Model
•   Need to understand existing and future IT costs completely
•   Need to understand the service model, its limitations and
    roles and responsibilities of parties
•   Need to monitor and manage service provision
•   Works best for those information technology services that
    can be commoditised
•   Does not do away with the need for an IT budget, IT
    function and IT management
• Remember:   Anything can be outsourced except
    the management of what is outsourced
    June 10, 2010                                                21
More Information

          Alan McSweeney
          alan@alanmcsweeney.com




 June 10, 2010                     22

More Related Content

What's hot

Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesAlan McSweeney
 
Driving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information ManagementDriving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information ManagementRay Bachert
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentAlan McSweeney
 
White Paper - The Business Case For Business Intelligence
White Paper -  The Business Case For Business IntelligenceWhite Paper -  The Business Case For Business Intelligence
White Paper - The Business Case For Business IntelligenceDavid Walker
 
Solution Architecture and Solution Acquisition
Solution Architecture and Solution AcquisitionSolution Architecture and Solution Acquisition
Solution Architecture and Solution AcquisitionAlan McSweeney
 
Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT FunctionAlan McSweeney
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureGoutama Bachtiar
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyAlan McSweeney
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningCognizant
 
Agile Enterprise Data Model & Data Management Solution
Agile Enterprise Data Model & Data Management SolutionAgile Enterprise Data Model & Data Management Solution
Agile Enterprise Data Model & Data Management SolutionA.I. Consultancy Ltd
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Alan McSweeney
 
Healthcare intel it 443835 443835
Healthcare intel it 443835 443835Healthcare intel it 443835 443835
Healthcare intel it 443835 443835Liberteks
 
IT Strategy & Planning
IT Strategy & PlanningIT Strategy & Planning
IT Strategy & Planningchakraj
 
Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachSam Thomsett
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overviewsean.mcclowry
 

What's hot (20)

Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management Initiatives
 
Driving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information ManagementDriving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information Management
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
 
White Paper - The Business Case For Business Intelligence
White Paper -  The Business Case For Business IntelligenceWhite Paper -  The Business Case For Business Intelligence
White Paper - The Business Case For Business Intelligence
 
Solution Architecture and Solution Acquisition
Solution Architecture and Solution AcquisitionSolution Architecture and Solution Acquisition
Solution Architecture and Solution Acquisition
 
Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT Function
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology Strategy
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
 
Agile Enterprise Data Model & Data Management Solution
Agile Enterprise Data Model & Data Management SolutionAgile Enterprise Data Model & Data Management Solution
Agile Enterprise Data Model & Data Management Solution
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...
 
Healthcare intel it 443835 443835
Healthcare intel it 443835 443835Healthcare intel it 443835 443835
Healthcare intel it 443835 443835
 
IT Strategy & Planning
IT Strategy & PlanningIT Strategy & Planning
IT Strategy & Planning
 
Ent data model v8
Ent data model v8Ent data model v8
Ent data model v8
 
Information management
Information managementInformation management
Information management
 
Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approach
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
Mike2.0 Information Governance Overview
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overview
 

Viewers also liked

Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computingasmita tarar
 
Utility computing
Utility computingUtility computing
Utility computingEmilio
 
Getting Good And Staying Good At (Out)Sourcing
Getting Good And Staying Good At (Out)SourcingGetting Good And Staying Good At (Out)Sourcing
Getting Good And Staying Good At (Out)SourcingAlan McSweeney
 
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...Alan McSweeney
 
Complexity and Solution Architecture
Complexity and Solution ArchitectureComplexity and Solution Architecture
Complexity and Solution ArchitectureAlan McSweeney
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataAlan McSweeney
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsAlan McSweeney
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution ArchitectureAlan McSweeney
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleAlan McSweeney
 
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Alan McSweeney
 
Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Alan McSweeney
 
Business-Oriented Trends in IT Outsourcing
Business-Oriented Trends in IT OutsourcingBusiness-Oriented Trends in IT Outsourcing
Business-Oriented Trends in IT OutsourcingAlan McSweeney
 
So You Think You Need A Digital Strategy
So You Think You Need A Digital StrategySo You Think You Need A Digital Strategy
So You Think You Need A Digital StrategyAlan McSweeney
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Alan McSweeney
 
Requirements Gathering And Management
Requirements Gathering And ManagementRequirements Gathering And Management
Requirements Gathering And ManagementAlan McSweeney
 
Lies, Damn Lies And Anti Statistics
Lies, Damn Lies And Anti StatisticsLies, Damn Lies And Anti Statistics
Lies, Damn Lies And Anti StatisticsAlan McSweeney
 
Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider GovernanceAlan McSweeney
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyAlan McSweeney
 
The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...Alan McSweeney
 
The Myth Of Requirements
The Myth Of RequirementsThe Myth Of Requirements
The Myth Of RequirementsAlan McSweeney
 

Viewers also liked (20)

Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computing
 
Utility computing
Utility computingUtility computing
Utility computing
 
Getting Good And Staying Good At (Out)Sourcing
Getting Good And Staying Good At (Out)SourcingGetting Good And Staying Good At (Out)Sourcing
Getting Good And Staying Good At (Out)Sourcing
 
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
Stopping Analysis Paralysis And Decision Avoidance In Business Analysis And S...
 
Complexity and Solution Architecture
Complexity and Solution ArchitectureComplexity and Solution Architecture
Complexity and Solution Architecture
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution Architecture
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level Role
 
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
 
Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...
 
Business-Oriented Trends in IT Outsourcing
Business-Oriented Trends in IT OutsourcingBusiness-Oriented Trends in IT Outsourcing
Business-Oriented Trends in IT Outsourcing
 
So You Think You Need A Digital Strategy
So You Think You Need A Digital StrategySo You Think You Need A Digital Strategy
So You Think You Need A Digital Strategy
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
 
Requirements Gathering And Management
Requirements Gathering And ManagementRequirements Gathering And Management
Requirements Gathering And Management
 
Lies, Damn Lies And Anti Statistics
Lies, Damn Lies And Anti StatisticsLies, Damn Lies And Anti Statistics
Lies, Damn Lies And Anti Statistics
 
Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider Governance
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data Strategy
 
The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...
 
The Myth Of Requirements
The Myth Of RequirementsThe Myth Of Requirements
The Myth Of Requirements
 

Similar to Economics of Utility Computing

Enterprise information infrastructure
Enterprise information infrastructureEnterprise information infrastructure
Enterprise information infrastructureJunaid Muzaffar
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 
The IT Chargeback Journey
The IT Chargeback JourneyThe IT Chargeback Journey
The IT Chargeback JourneyPete Hidalgo
 
Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOGlobal Business Events
 
Information technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planningInformation technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planningSubhajit Bhattacharya
 
Ict for monitoring & evaluation bromley
Ict for monitoring & evaluation bromleyIct for monitoring & evaluation bromley
Ict for monitoring & evaluation bromleySuperhighways
 
The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
End user computing feri sulianta
End user computing   feri suliantaEnd user computing   feri sulianta
End user computing feri suliantaferisulianta.com
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructureMohammad Salman
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptxArsalanT2
 
Challenges Facing an IT Director
Challenges Facing an IT DirectorChallenges Facing an IT Director
Challenges Facing an IT DirectorCSaC
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxRoshni814224
 
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government Tim Willoughby
 
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise ITWSO2
 

Similar to Economics of Utility Computing (20)

Enterprise information infrastructure
Enterprise information infrastructureEnterprise information infrastructure
Enterprise information infrastructure
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
The IT Chargeback Journey
The IT Chargeback JourneyThe IT Chargeback Journey
The IT Chargeback Journey
 
Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
 
Information technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planningInformation technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planning
 
Ict for monitoring & evaluation bromley
Ict for monitoring & evaluation bromleyIct for monitoring & evaluation bromley
Ict for monitoring & evaluation bromley
 
The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
End user computing feri sulianta
End user computing   feri suliantaEnd user computing   feri sulianta
End user computing feri sulianta
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
 
Mis
MisMis
Mis
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptx
 
Tamsin stanford presentation
Tamsin stanford   presentationTamsin stanford   presentation
Tamsin stanford presentation
 
Challenges Facing an IT Director
Challenges Facing an IT DirectorChallenges Facing an IT Director
Challenges Facing an IT Director
 
Information systems in global business today
Information systems in global business todayInformation systems in global business today
Information systems in global business today
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
Tim Willoughby - Ideas and Ideals on an ICT Strategy for Local Government
 
Ortiz internap
Ortiz internapOrtiz internap
Ortiz internap
 
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
 

More from Alan McSweeney

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdfAlan McSweeney
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfAlan McSweeney
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Alan McSweeney
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Alan McSweeney
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security ArchitectureAlan McSweeney
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsAlan McSweeney
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Alan McSweeney
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Alan McSweeney
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureAlan McSweeney
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual ChartsAlan McSweeney
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Alan McSweeney
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataAlan McSweeney
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Alan McSweeney
 
Agile Solution Architecture and Design
Agile Solution Architecture and DesignAgile Solution Architecture and Design
Agile Solution Architecture and DesignAlan McSweeney
 

More from Alan McSweeney (20)

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdf
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security Architecture
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation Solutions
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual Charts
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In Data
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
 
Agile Solution Architecture and Design
Agile Solution Architecture and DesignAgile Solution Architecture and Design
Agile Solution Architecture and Design
 

Recently uploaded

KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 

Recently uploaded (20)

KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 

Economics of Utility Computing

  • 1. The Economics of Utility Computing Alan McSweeney
  • 2. Objectives • To discuss how the transition to utility computing can be cost-justified by an organisation June 10, 2010 2
  • 3. Utility Computing • Utility computing can be: − Within an organisation • Where users of computing services are charged based on usage − With a public cloud model • Where the organisation is charged for its use of computing services • Utility computing can replace capital costs and charges • Utility provider is responsible for providing computing resources − Users just draw them down and pay for what they use • Nothing new here – think of computer bureau services of old June 10, 2010 3
  • 4. Utility Computing • Utility Computing is a better term than Cloud Computing − Describes the payment, operation and usage approach − Cloud computing implies technology and approaches to implementation − Not just computing but needs to include other aspects of information technology resources • Storage • Data transmission • Service management June 10, 2010 4
  • 5. Utility Information Technology Services (UITS) • Turn on/off the tap as required to access information technology resources June 10, 2010 5
  • 6. Utility Information Technology Services Within Organisation • Business units access IT Function information technology services on demand and pay for what they use according to billing model • This requires that the IT function knows and manages its costs and delivers information technology services cost effectively June 10, 2010 6
  • 7. Utility Information Technology Services From Outside the Organisation • Service provider enables delivery of utility IT services through plumbing with appropriate service metering Utility IT Service Provider June 10, 2010 7
  • 8. Utility Computing Payment Models • Same range of charging models as other utility providers: gas, electricity, telecommunications, water, television broadcasting − Flat rate − Tiered − Subscription − Metered − Pay as you go − Standing charges • Different pricing models for different customers based on factors such as scale, commitment and payment frequency • But the principle of utility computing remains − The pricing model is simply an expression by the provider of the costs of provision of the resources and a profit margin June 10, 2010 8
  • 9. Information Technology Processing Resources • Any computer system consists of Results of Processing are Stored Computing Resources Information is Transmitted from Information is Moved an External Source to be Processed External Information is Stored Temporarily or Permanently Information Storage Resources Information Transmission Resources Results of Processing are Transmitted June 10, 2010 9
  • 10. Information Technology Processing Resources • This is what you pay for (because it is what costs money) Computing Resources Information Storage Resources Information Transmission Resources June 10, 2010 10
  • 11. Utility Computing • There are significant differences between information technology utility resources and those of other utilities • Gas, electricity, water and telecommunications are single resources that you access − Easily metered − Simple charging models − Providers are not responsible for how the product is used • Information technology utility resources consist of − Computing Resources − Information Storage Resources − Information Transmission Resources • Can requires more complex payment model • You need to know what you want, what you are getting and what it costs June 10, 2010 11
  • 12. Utility Computing Pricing • Any pricing model has to reflect the cost of recovery of provision of service − Capital cost − Operational costs including service management costs − Profit margin June 10, 2010 12
  • 13. Paying for Utility Computing • Within an organisation − Do you know how much IT is costing so you can implement a utility supply and payment model? − Do you know what your costs are so you can charge for their recovery? − How mature is your costing model? − Could you implement a cost-recovery/chargeback model tomorrow? • Outside the organisation − Any costs paid to an external utility provider are still part of the IT budget − Do you know if their costs will be cheaper or more expensive than internal costs? − Are there hidden costs? − Can you disengage easily, quickly and at low cost? June 10, 2010 13
  • 14. Coase’s Law on the Nature of the Firm • A firm will tend to expand until the cost of organising an extra transaction within the firm become equal to the costs of carrying out the same transaction on the open market • This means when it is cheaper to buy the service externally it will generally be bought externally • However there is an assumption of perfect knowledge and perfectly rational use of this knowledge to achieve the most logical solution • In reality this perfection is rarely if ever achieved − Other less rational factors affect the decision • Everybody Else Is Doing It • I Want To Do It So It Appears On My Resume • I Like New Technology • Vendors Keep Talking About It • I Need One Good Idea To Stamp My Mark On The Organisation • It Will Solve All My Problems • I Hate Dealing With IT • I Do Not Want to Setup a Large IT Function • Cost estimates are rarely accurate − What we know about most projects is that they either or both overrun on costs and deliver less than expected − Cost overruns are generally caused by a mix of errors in the initial cost estimates and deliberate distortions in order to cause the decision to be made June 10, 2010 14
  • 15. Transaction Costs • Along with production costs, there are costs for preparing, entering into and monitoring the execution of all kinds of contracts as well as costs for implementing allocation and tracking measures for the contracted services • When internal transaction costs become greater than the costs of externally sourcing the service, the service will be obtained externally • There are hidden costs associated with sourcing a service externally − Selecting the wrong supplier − Costs of writing contract − Costs of enforcing contract − Having a poor service contract that results in hidden cost and/or reduced service − Overlooking personnel issues − Loosing control over the outsourced activity − Management, quality assurance and supervision overhead − Implementation and termination costs − Loss of flexibility − Loss of integration between applications and data − Data extraction costs − Security framework implementation • Transition to utility computing model requires full knowledge of costs – current and future • Note that anything can be outsourced except the management of what is outsourced June 10, 2010 15
  • 16. Characteristics of Credible Cost Estimates • Clear identification of requirements of the ultimate deliverable • Broad participation in preparing estimates • Availability of valid data for performing estimates – historical, experience, benchmarks • Standardised and comprehensive estimate structure that includes all possible sources of cost • Provision for uncertainties – include known costs explicitly and allow for unknown costs • Recognition of inflation • Recognition of excluded costs • Independent review of estimates for completeness and realism • Revision of estimates for significant changes in requirements June 10, 2010 16
  • 17. Challenges of Developing Good Cost Estimates • Requires detailed, stable, agreed requirements • Agreed assumptions • Access to detailed documentation and historical data for comparison • Trained and experienced analysts • Risk and uncertainty analysis • Identification of a range of confidence levels • Adequate contingency and management reserves June 10, 2010 17
  • 18. Reasons for Good and Bad Cost Estimates Ineffe and U ctive Risk Effect ncer i ve Unce Risk and Unfa Analy tainty r ta Techn miliar s is Ident ificat Analy inty First- ology or s is Rang ion of a Time Use Probl em Confi e of De Acces s Getting dence Level Docu tailed s to D m ata Unre s and H entation Unre Proje asonable Adeq ua istor Train Unre alistic or ct Bas Conti ngen te Data ical e Exper d and liable Data Unre elin e Mana cy an ien geme d Detai led, S Analy ced Assumalistic Reser nt sts No o ption ves Agree table, Comp r Limited s Overo Requ d ariso ptimi ireme Agr Avail n Data sm n ts Assum eed able New ption Pr ocess s e s Untra Proje Inexp ined and ct Ins er ie t abilit y Comp Analy nced le sts or Te x Project chnol Unre ogy alistic Savin Project gs • Lost of reasons for and causes of inaccurate cost estimates June 10, 2010 18
  • 19. Sources of Risk and Uncertainty in Estimating Costs • Lack of understanding of the project requirements • Shortcomings of human language and differing interpretations of meaning of project • Behaviour of parties involved in the cost estimation process • Haste • Deception • Poor cost estimating and pricing practices June 10, 2010 19
  • 20. Utility Information Technology Services (UITS) • What happens when the tap runs dry • You need to understand the operating model June 10, 2010 20
  • 21. Availing of Utility Information Technology Services (UITS) Model • Need to understand existing and future IT costs completely • Need to understand the service model, its limitations and roles and responsibilities of parties • Need to monitor and manage service provision • Works best for those information technology services that can be commoditised • Does not do away with the need for an IT budget, IT function and IT management • Remember: Anything can be outsourced except the management of what is outsourced June 10, 2010 21
  • 22. More Information Alan McSweeney alan@alanmcsweeney.com June 10, 2010 22