This document discusses banks transitioning to cloud computing. It begins with a brief history of computing and the rise of cloud services. It then examines types of cloud including public, private, community and hybrid models. It outlines key risks for banks related to control, security, data location and exit strategies. It emphasizes the need for banks to retain expertise and control over critical functions. The document also discusses standards for cloud management and the importance of planning for transitioning data and services to and from the cloud. It stresses regularly exercising exit plans to ensure continuity of services and data. Overall the document provides guidance for banks on effectively adopting cloud technologies while managing risks.
Bitcoin and cryptocurrencies fs club final - publicChris Skinner
The latest on cryptocurrencies by Richard Brown, Executive Architect for Industry Innovation, Banking and Financial Markets, IBM UK
Richard's previous roles with the company, for whom he has worked for fifteen years, include Lead Account Architect for a global Investment Banking client and a Consultant for IBM software products. His specialisation is in the integration of complex systems. Richard is an expert in the emerging field of cryptocurrencies, on which he speaks and writes widely
Social networks are solving the problem of barrier to entry for high cost broadband in Australia with open source solutions that enable them to donate bandwidth to the network and gain a revenue.
Disruptive Analysis at Comptel Nexterday -10 telecom mythsDean Bubley
What are the Top 10 Myths in the telecoms industry? Presentation given by Dean Bubley at Comptel Nexterday North anti-seminar in Helsinki, Nov 2015.
Be careful with terms like pipes, OTT, seamless WiFi, agility, subscriptions and more....
Keynote presentation on telcofuturism - the specific analysis of future trends applied to the telecom sector, such as blockchain, maachine-learning, drones & contextual/cognitive computing
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...Dean Bubley
Concluding presentation by Dean Bubley at WebRTC Asia Forums in January 2014, in Hong Kong & Singapore. Examines future trends in use-cases, value chain, regulatory issues & problems for WebRTC, with some focus on Asia-Pacific
Case Studies on Telecom Open Source, Paul Drew, Metaswitch NetworksAlan Quayle
Case Studies on Telecom Open Source
Presented at TADSummit 17th November 2015
Paul Drew
GM, Open Source Business Unit
Metaswitch Networks
Kevin Paige
CTO & Director of Customer Services Manx Telecom
Since last year when we demonstrated "IMS in Minutes" at TADHack, we've seen tier 1 customers around the world ramp up their adoption of open source software in the core of their network. We'll share several case studies on what Metaswitch Networks and our customers have achieved and the impact on their business.
Bitcoin and cryptocurrencies fs club final - publicChris Skinner
The latest on cryptocurrencies by Richard Brown, Executive Architect for Industry Innovation, Banking and Financial Markets, IBM UK
Richard's previous roles with the company, for whom he has worked for fifteen years, include Lead Account Architect for a global Investment Banking client and a Consultant for IBM software products. His specialisation is in the integration of complex systems. Richard is an expert in the emerging field of cryptocurrencies, on which he speaks and writes widely
Social networks are solving the problem of barrier to entry for high cost broadband in Australia with open source solutions that enable them to donate bandwidth to the network and gain a revenue.
Disruptive Analysis at Comptel Nexterday -10 telecom mythsDean Bubley
What are the Top 10 Myths in the telecoms industry? Presentation given by Dean Bubley at Comptel Nexterday North anti-seminar in Helsinki, Nov 2015.
Be careful with terms like pipes, OTT, seamless WiFi, agility, subscriptions and more....
Keynote presentation on telcofuturism - the specific analysis of future trends applied to the telecom sector, such as blockchain, maachine-learning, drones & contextual/cognitive computing
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...Dean Bubley
Concluding presentation by Dean Bubley at WebRTC Asia Forums in January 2014, in Hong Kong & Singapore. Examines future trends in use-cases, value chain, regulatory issues & problems for WebRTC, with some focus on Asia-Pacific
Case Studies on Telecom Open Source, Paul Drew, Metaswitch NetworksAlan Quayle
Case Studies on Telecom Open Source
Presented at TADSummit 17th November 2015
Paul Drew
GM, Open Source Business Unit
Metaswitch Networks
Kevin Paige
CTO & Director of Customer Services Manx Telecom
Since last year when we demonstrated "IMS in Minutes" at TADHack, we've seen tier 1 customers around the world ramp up their adoption of open source software in the core of their network. We'll share several case studies on what Metaswitch Networks and our customers have achieved and the impact on their business.
Presentation by Rune Sjøhelle, Communication Director, Nordea at the Financial Services Club, Oslo, 6th March 2014
Rune Kibsgaard Sjøhelle is head of Brand Management and Social Media in the Nordea Group and head of Communications in Nordea in Norway. He has ten years branding and communication experience from Nordea as well as experience from PR agencies and the European dot.com industry. He is educated MSc in Industrial Economics from the Norwegian Institute of Technology. - See more at: http://www.fsclub.net/events-focus.cfm?id=395#sthash.vUlM3txx.dpuf
Innovación Digital, Fintech, Bitcoin y Blockchain Alan Colmenares
El 10 de junio tuve la oportunidad de hablarle a una audiencia de personas dentro y fuera del banco BBVA sobre la innovación digital, fintech, Bitcoin y Blockchain dentro del contexto de la transformación del sector de banca y finanzas. Esta son las diapositivas de dicha presentación.
La presentación tiene como objetivo acercar Bitcoin al público desde distintos ángulos:
1) Como tecnología
2) Como moneda aceptada en muchos comercios
3) Como potencial cambio de paradigma en muchos ámbitos
4) Como ideología y como fenómeno social
5) Como instrumento financiero
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus nec sem a eros sodales varius non vitae metus. Suspendisse venenatis ullamcorper gravida. Donec venenatis, dui eu scelerisque finibus, risus sapien molestie risus, et tincidunt mi eros eget metus. Vestibulum feugiat elit quis erat commodo faucibus. Curabitur vel congue nibh. Etiam turpis sem, aliquet congue magna ac, elementum ullamcorper velit. Etiam eget lobortis nisi. Mauris vulputate ligula eget fringilla blandit. Integer ac lobortis nibh, vitae fringilla massa. Vestibulum ut metus est. Duis nec accumsan metus, a vulputate turpis. Maecenas vulputate mi eget nunc sollicitudin porttitor.
Vestibulum commodo leo felis. Donec elementum iaculis orci non cursus. Nam mauris quam, volutpat viverra vestibulum nec, facilisis vitae risus. Quisque ipsum mi, tincidunt non tellus sed, vulputate vehicula elit. Pellentesque id iaculis quam, vitae faucibus elit. Integer aliquam a ipsum at cursus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed non suscipit neque, id dictum libero.
Fusce quis mollis nulla, sit amet ultrices purus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam eros quam, ultricies in malesuada id, mollis non velit. Morbi leo nulla, hendrerit vitae varius non, hendrerit finibus magna. Nunc porta elit eu leo finibus suscipit. Sed ac euismod risus. Quisque maximus justo vel efficitur bibendum.
Quisque facilisis ipsum mauris, eget ultrices dui ultrices ut. Proin eleifend consequat semper. Maecenas vestibulum mattis est, vitae pretium tortor ultricies vitae. Pellentesque auctor pulvinar dolor, sit amet maximus nulla consectetur et. Nullam suscipit tincidunt massa eu dapibus. Vestibulum in dapibus elit. Phasellus vitae sem vel ligula bibendum aliquam. Aenean viverra ac mi vitae rhoncus. Vivamus semper et lorem maximus condimentum. Cras commodo eu sapien at mollis. Cras laoreet lorem quis magna condimentum elementum. Maecenas aliquet ante ut hendrerit faucibus. Duis sit amet vulputate massa. Praesent sed lacus malesuada, maximus felis vitae, ornare dolor.
Etiam nulla ligula, mollis quis imperdiet rutrum, ornare sit amet nibh. Cras vitae gravida risus, in hendrerit augue. Morbi id diam est. Phasellus rhoncus cursus diam, vel luctus est rutrum in. Suspendisse pretium ac leo a ullamcorper. Pellentesque finibus id velit quis faucibus. Nullam ultrices nibh id enim scelerisque, sed vestibulum eros fermentum. Duis vestibulum orci sapien, non varius nisl vulputate quis. Mauris lacinia tellus dui, ut dictum elit bibendum sit amet. Ut vel nulla non ipsum egestas pharetra. Nunc purus sapien, euismod nec rhoncus vitae, vehicula non tellus. Proin ante elit, dictum rhoncus enim nec, convallis venenatis mi. Integer eu purus lobortis elit vehicula facilisis vitae sed ex. Nam scelerisque nulla massa, consequat varius tellus condimentum non. Ut feugiat et magna sed tempor.
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus nec sem a eros sodales varius non vitae metus. Suspendisse venenatis ullamcorper gravida. Donec venenatis, dui eu scelerisque finibus, risus sapien molestie risus, et tincidunt mi eros eget metus. Vestibulum feugiat elit quis erat commodo faucibus. Curabitur vel congue nibh. Etiam turpis sem, aliquet congue magna ac, elementum ullamcorper velit. Etiam eget lobortis nisi. Mauris vulputate ligula eget fringilla blandit. Integer ac lobortis nibh, vitae fringilla massa. Vestibulum ut metus est. Duis nec accumsan metus, a vulputate turpis. Maecenas vulputate mi eget nunc sollicitudin porttitor.
Vestibulum commodo leo felis. Donec elementum iaculis orci non cursus. Nam mauris quam, volutpat viverra vestibulum nec, facilisis vitae risus. Quisque ipsum mi, tincidunt non tellus sed, vulputate vehicula elit. Pellentesque id iaculis quam, vitae faucibus elit. Integer aliquam a ipsum at cursus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed non suscipit neque, id dictum libero.
Fusce quis mollis nulla, sit amet ultrices purus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam eros quam, ultricies in malesuada id, mollis non velit. Morbi leo nulla, hendrerit vitae varius non, hendrerit finibus magna. Nunc porta elit eu leo finibus suscipit. Sed ac euismod risus. Quisque maximus justo vel efficitur bibendum.
Quisque facilisis ipsum mauris, eget ultrices dui ultrices ut. Proin eleifend consequat semper. Maecenas vestibulum mattis est, vitae pretium tortor ultricies vitae. Pellentesque auctor pulvinar dolor, sit amet maximus nulla consectetur et. Nullam suscipit tincidunt massa eu dapibus. Vestibulum in dapibus elit. Phasellus vitae sem vel ligula bibendum aliquam. Aenean viverra ac mi vitae rhoncus. Vivamus semper et lorem maximus condimentum. Cras commodo eu sapien at mollis. Cras laoreet lorem quis magna condimentum elementum. Maecenas aliquet ante ut hendrerit faucibus. Duis sit amet vulputate massa. Praesent sed lacus malesuada, maximus felis vitae, ornare dolor.
Etiam nulla ligula, mollis quis imperdiet rutrum, ornare sit amet nibh. Cras vitae gravida risus, in hendrerit augue. Morbi id diam est. Phasellus rhoncus cursus diam, vel luctus est rutrum in. Suspendisse pretium ac leo a ullamcorper. Pellentesque finibus id velit quis faucibus. Nullam ultrices nibh id enim scelerisque, sed vestibulum eros fermentum. Duis vestibulum orci sapien, non varius nisl vulputate quis. Mauris lacinia tellus dui, ut dictum elit bibendum sit amet. Ut vel nulla non ipsum egestas pharetra. Nunc purus sapien, euismod nec rhoncus vitae, vehicula non tellus. Proin ante elit, dictum rhoncus enim nec, convallis venenatis mi. Integer eu purus lobortis elit vehicula facilisis vitae sed ex. Nam scelerisque nulla massa, consequat varius tellus condimentum non. Ut feugiat et magna sed tempor.
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
Presentation I gave in March 2014 on cloud computing with cloud definition & characteristics, cloud ROI, benefits and costs, lessons learned, examples, and 7 enablers.
Here's all you want to know on Cloud Computing..... why used, advantanges, structure etc. All queries regarding cloud computing are met in this presentation. For demo of such software in accounting field visit www.arcus-universe.com
Presentation by Rune Sjøhelle, Communication Director, Nordea at the Financial Services Club, Oslo, 6th March 2014
Rune Kibsgaard Sjøhelle is head of Brand Management and Social Media in the Nordea Group and head of Communications in Nordea in Norway. He has ten years branding and communication experience from Nordea as well as experience from PR agencies and the European dot.com industry. He is educated MSc in Industrial Economics from the Norwegian Institute of Technology. - See more at: http://www.fsclub.net/events-focus.cfm?id=395#sthash.vUlM3txx.dpuf
Innovación Digital, Fintech, Bitcoin y Blockchain Alan Colmenares
El 10 de junio tuve la oportunidad de hablarle a una audiencia de personas dentro y fuera del banco BBVA sobre la innovación digital, fintech, Bitcoin y Blockchain dentro del contexto de la transformación del sector de banca y finanzas. Esta son las diapositivas de dicha presentación.
La presentación tiene como objetivo acercar Bitcoin al público desde distintos ángulos:
1) Como tecnología
2) Como moneda aceptada en muchos comercios
3) Como potencial cambio de paradigma en muchos ámbitos
4) Como ideología y como fenómeno social
5) Como instrumento financiero
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus nec sem a eros sodales varius non vitae metus. Suspendisse venenatis ullamcorper gravida. Donec venenatis, dui eu scelerisque finibus, risus sapien molestie risus, et tincidunt mi eros eget metus. Vestibulum feugiat elit quis erat commodo faucibus. Curabitur vel congue nibh. Etiam turpis sem, aliquet congue magna ac, elementum ullamcorper velit. Etiam eget lobortis nisi. Mauris vulputate ligula eget fringilla blandit. Integer ac lobortis nibh, vitae fringilla massa. Vestibulum ut metus est. Duis nec accumsan metus, a vulputate turpis. Maecenas vulputate mi eget nunc sollicitudin porttitor.
Vestibulum commodo leo felis. Donec elementum iaculis orci non cursus. Nam mauris quam, volutpat viverra vestibulum nec, facilisis vitae risus. Quisque ipsum mi, tincidunt non tellus sed, vulputate vehicula elit. Pellentesque id iaculis quam, vitae faucibus elit. Integer aliquam a ipsum at cursus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed non suscipit neque, id dictum libero.
Fusce quis mollis nulla, sit amet ultrices purus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam eros quam, ultricies in malesuada id, mollis non velit. Morbi leo nulla, hendrerit vitae varius non, hendrerit finibus magna. Nunc porta elit eu leo finibus suscipit. Sed ac euismod risus. Quisque maximus justo vel efficitur bibendum.
Quisque facilisis ipsum mauris, eget ultrices dui ultrices ut. Proin eleifend consequat semper. Maecenas vestibulum mattis est, vitae pretium tortor ultricies vitae. Pellentesque auctor pulvinar dolor, sit amet maximus nulla consectetur et. Nullam suscipit tincidunt massa eu dapibus. Vestibulum in dapibus elit. Phasellus vitae sem vel ligula bibendum aliquam. Aenean viverra ac mi vitae rhoncus. Vivamus semper et lorem maximus condimentum. Cras commodo eu sapien at mollis. Cras laoreet lorem quis magna condimentum elementum. Maecenas aliquet ante ut hendrerit faucibus. Duis sit amet vulputate massa. Praesent sed lacus malesuada, maximus felis vitae, ornare dolor.
Etiam nulla ligula, mollis quis imperdiet rutrum, ornare sit amet nibh. Cras vitae gravida risus, in hendrerit augue. Morbi id diam est. Phasellus rhoncus cursus diam, vel luctus est rutrum in. Suspendisse pretium ac leo a ullamcorper. Pellentesque finibus id velit quis faucibus. Nullam ultrices nibh id enim scelerisque, sed vestibulum eros fermentum. Duis vestibulum orci sapien, non varius nisl vulputate quis. Mauris lacinia tellus dui, ut dictum elit bibendum sit amet. Ut vel nulla non ipsum egestas pharetra. Nunc purus sapien, euismod nec rhoncus vitae, vehicula non tellus. Proin ante elit, dictum rhoncus enim nec, convallis venenatis mi. Integer eu purus lobortis elit vehicula facilisis vitae sed ex. Nam scelerisque nulla massa, consequat varius tellus condimentum non. Ut feugiat et magna sed tempor.
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus nec sem a eros sodales varius non vitae metus. Suspendisse venenatis ullamcorper gravida. Donec venenatis, dui eu scelerisque finibus, risus sapien molestie risus, et tincidunt mi eros eget metus. Vestibulum feugiat elit quis erat commodo faucibus. Curabitur vel congue nibh. Etiam turpis sem, aliquet congue magna ac, elementum ullamcorper velit. Etiam eget lobortis nisi. Mauris vulputate ligula eget fringilla blandit. Integer ac lobortis nibh, vitae fringilla massa. Vestibulum ut metus est. Duis nec accumsan metus, a vulputate turpis. Maecenas vulputate mi eget nunc sollicitudin porttitor.
Vestibulum commodo leo felis. Donec elementum iaculis orci non cursus. Nam mauris quam, volutpat viverra vestibulum nec, facilisis vitae risus. Quisque ipsum mi, tincidunt non tellus sed, vulputate vehicula elit. Pellentesque id iaculis quam, vitae faucibus elit. Integer aliquam a ipsum at cursus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed non suscipit neque, id dictum libero.
Fusce quis mollis nulla, sit amet ultrices purus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam eros quam, ultricies in malesuada id, mollis non velit. Morbi leo nulla, hendrerit vitae varius non, hendrerit finibus magna. Nunc porta elit eu leo finibus suscipit. Sed ac euismod risus. Quisque maximus justo vel efficitur bibendum.
Quisque facilisis ipsum mauris, eget ultrices dui ultrices ut. Proin eleifend consequat semper. Maecenas vestibulum mattis est, vitae pretium tortor ultricies vitae. Pellentesque auctor pulvinar dolor, sit amet maximus nulla consectetur et. Nullam suscipit tincidunt massa eu dapibus. Vestibulum in dapibus elit. Phasellus vitae sem vel ligula bibendum aliquam. Aenean viverra ac mi vitae rhoncus. Vivamus semper et lorem maximus condimentum. Cras commodo eu sapien at mollis. Cras laoreet lorem quis magna condimentum elementum. Maecenas aliquet ante ut hendrerit faucibus. Duis sit amet vulputate massa. Praesent sed lacus malesuada, maximus felis vitae, ornare dolor.
Etiam nulla ligula, mollis quis imperdiet rutrum, ornare sit amet nibh. Cras vitae gravida risus, in hendrerit augue. Morbi id diam est. Phasellus rhoncus cursus diam, vel luctus est rutrum in. Suspendisse pretium ac leo a ullamcorper. Pellentesque finibus id velit quis faucibus. Nullam ultrices nibh id enim scelerisque, sed vestibulum eros fermentum. Duis vestibulum orci sapien, non varius nisl vulputate quis. Mauris lacinia tellus dui, ut dictum elit bibendum sit amet. Ut vel nulla non ipsum egestas pharetra. Nunc purus sapien, euismod nec rhoncus vitae, vehicula non tellus. Proin ante elit, dictum rhoncus enim nec, convallis venenatis mi. Integer eu purus lobortis elit vehicula facilisis vitae sed ex. Nam scelerisque nulla massa, consequat varius tellus condimentum non. Ut feugiat et magna sed tempor.
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
Presentation I gave in March 2014 on cloud computing with cloud definition & characteristics, cloud ROI, benefits and costs, lessons learned, examples, and 7 enablers.
Here's all you want to know on Cloud Computing..... why used, advantanges, structure etc. All queries regarding cloud computing are met in this presentation. For demo of such software in accounting field visit www.arcus-universe.com
90 % av alla dataintrång fokuserar på data i databaser. Det är där ditt företags känsliga och åtråvärda information finns. I 38 % av dessa intrång tar det minuter att få ut känsligt data, samtidigt som det för hälften av intrången tar månader eller mer innan de upptäcks. Dave Valovcin, från IBM WW Guardium Sales, berättar om hur du kan skydda din känsliga data.
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
Vast amounts of data, massive networks of virtual machines, and the limitless potential of the cloud — are the hallmarks of cloud infrastructure services.
Read this Article here: https://ciente.io/blogs/security-considerations-when-using-cloud-infrastructure-services/
Learn more: https://ciente.io/blog/
Follow for more Articles here: https://ciente.io/
RapidScale recognizes the need for compliance with the various laws and regulations across different industries. We have established our data encryption, protocols, and procedures to follow the top compliances and ensure that customer data remains secure and confidential.
Originally presented on April 11, 2017
Watch on-demand: https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&referrer=&eventid=1383298&sessionid=1&key=96B34B2E00F5FAA33C2957FE29D84624®Tag=&sourcepage=register
This presentation was delivered at the 2nd International Conference on Recent Trends in Information Technology and Computer Science in Mumbai. The paper deals with security issues in Cloud Computing, its mitigation and proposes a secure cloud mechanism with an implementation of the single-sign on mechanism on the Ubuntu Enterprise Cloud
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
Are banks ready for the cloud?
1. Are Banks ready for
the Cloud?
Paul Hinton
PAUL.HINTON@KEMPLITTLE.COM
+44 (0)20 7710 1623
2. Prediction is very difficult, especially about the future…”
services
Mid ‘60s to early ‘80s:
IBM heyday
‘80s:
rise of the PC
‘90s to mid-00’s:
Wintel heyday
Mid ‘00s onwards:
Google heyday
Utility Computing
The rise of service based computing
Cloud Computing
SaaS
ASP adoption
internet
Outsourcing ITO
LPO, etc
2000s onwards: broadband
replaces dial up internet
1995: Netscape
IPO ; Bill Gates’
‘Internet tidal
wave’ memo
software
hardware
BPO
1969: the
software
industry is born
as IBM
unbundles
hardware &
software
1940s:
Adoption of
programmable
computer
1940s
1957: IBM
introduces
FORTRAN
programming
language
1950s
2001: .com bust
1981:
Microsoft
develops
MS-DOS
1970: UNIX
released
by AT&T
1964: IBM
introduces
System 360
computer family
1960s
2004: Google, salesforce.com IPOs;
‘web 2.0’ coined
1971: Intel 4004
– the first microprocessor
developed
1970s
1990:
1985:
Microsoft
open
1993:
launches
source
Linux
Windows 3.0
FSF set
up
1981: IBM
‘90s: rise of
launches PC
laptops
1980s
mid ‘00s
onwards: open
source (OSS) in
the mainstream
‘00s: rise of
PDAs
1984: Apple
Mac launched
1990s
2000s
2008:
Google Chrome, Microsoft
Windows ‘in the Cloud’
(Azure) launched
2007: IPO of
hypervisor
developer
VMware
‘anytime
anywhere’
devices
2010s
Smartphones
iPad, etc
3. Types of Cloud
Custom
Private Cloud
Private Cloud
Community
Private Cloud
User Z
Virtual
Private Cloud
Provider X
Managed
Company B
Company A
Company A
Company A
Company A
Company B
Open Public
Company A
Closed Private
Public
Cloud
Owner
Company
Provider
Provider
Provider
Operator
Company
Provider
Provider
Provider
Provider
Service Access
Closed
Closed
Closed
Limited group
Open
Level of Control
Full
High
High
Low
None
Security/Location
As selected by
Company
As selected by
Company
As selected by
Company
As described by
Provider
As described by
Provider
Legal Terms
_3
Company
Bespoke
Bespoke
Negotiable but clear
impact on price
changes
Limited outside of
standard agreed
terms
Standard terms only
– non-negotiable
5. Company A
Custom
Private Cloud
_5
Managed
Private Cloud
Provider X
Provider X
Trading , Customer,
sensitive , regulated,
valuable time- critical data
Lower value,
unregulated,
not time
critical data
Company A
Virtual
Private Cloud
Community
Private Cloud
User Z
User Z
What are you using the cloud for?
Public Cloud
6. SYSC Rule 8 Material Outsourcing PRA/FCA Control
(2) establish methods for assessing the standard of performance of the service provider;
(3) supervise and adequately manage the risks associated with the outsourcing;
(5) the firm must retain the expertise to supervise the outsourced functions and to manage the risks associated with
the outsourcing ,and must supervise those functions and manage those risks;
(7) the firm must be able to terminate the arrangement for the outsourcing where necessary without detriment to the
continuity and quality of its provision of services to clients;
(8) the service provider must co-operate with the relevant competent authority in connection with the outsourced
activities;
(9) the firm, its auditors, the relevant competent authority must have effective access to data related to the
outsourced activities, as well as to the business premises of the service provider; and must be able to exercise those
rights of access;
(10) the service provider must protect any confidential information relating to the firm and its clients;
(11) the firm and the service provider must establish, implement and maintain a contingency plan for disaster
recovery and periodic testing of backup facilities where that is necessary having regard to the function, service or
activity that has been outsourced.
_6
7. Cloud Risks
Potential loss of control –retain sufficient control over critical data and services
Availability and access to Data – what if the internet is down? Normally a customer risk
Data Security - Adequate security measures in place and can you monitor them?
Data location
– Data Protection – tougher regulation 2015
– Keeping track of exact location of Data
– Customer consent?
Global law, tax and regulation
Auditing
– Both rights for customer and Regulator
– Distinction between effective access to data and premises?
Exit - Can you and if so how quickly/safely to ensure certainty of service and data transfer
_7
8. FS Enabled Cloud: Cloud management standards
vApp
vCloud
Nimbus
_8
Open Cloud
Standards
Incubator
OVF
9. FS Enabled Cloud
Increasing awareness and sophistication of banks in utilising
cloud
Software tools to increase control over data and security of data
in cloud
Cloud providers offering:
–Services
–higher levels of control: security, audit, geographic control and
availability designed to meet bank requirements
_9
11. Mastering a hybrid IT environment
High performance companies are
adopting mixed cloud and traditional
IT systems much more quickly than
their lower performing competitors
Accenture survey “High Performance
IT Research November 2013”
_11
12. Transitioning to and from the cloud
Just another form of outsourcing?
Outsourcing procurement rule number one : Never outsource unresolved
problems
Cloud is just another outsourced managed service:
- In a private cloud or managed service,
- the infrastructure may be shared, and the resources can live anywhere, but
process and storage resources are dedicated to your needs.
- In a public cloud structure
- you don't really know where your services are, or who is managing it. You buy
access to resource or an application, normally on a pay as you use basis..
_12
13. Transitioning to and from the cloud
Standards
- Make sure that you understand the data protection, ETSI, TOSCA and other
standards that you need to consider.
Intellectual Property
- Cloud services also have unique third party IP, audit and data usage issues which
may well require re-evaluation of existing software agreements
_13
14. Transitioning to and from the cloud
Rule number two: Retain the ability to manage your supplier and your resources
Supplier Management Issues:
Make sure your IT team have a strong grasp of the supplier and his support
organisation
Ensure the users and their leadership enjoy the same service levels delivered by in
house applications or resources
Ensure your supplier understands the security, data access and portability, IP, risk and
regulatory issues that are specific to you
14
15. Transitioning to and from the cloud
Rule number three: Review and manage your data before transitioning to
cloud
Big Data –keep what’s needed, delete the rest
Big Data Storage is low cost, but big data can mean big storage bills.
Retain control over data in cloud to ensure not storing unnecessary things for
ever (Cost + DP compliance + risk!)
– Data Categories
- Some data can go in public cloud
- Some can only go into private cloud
- Some can never leave the building
_15
16. Transitioning to and from the cloud
Rule Number four: For good or bad, plan for exit:
Post negotiation, make sure that you have a detailed transition support plan.
Identify and address key risks around porting of services to your supplier
And
Monitor your suppliers’ ability to meet clear exit arrangements should this be
needed and make sure that you exercise that plan on a regular basis.
Make sure that your IT and user departments (and their leadership) understand
the implications of change
_16
17. Mastering a hybrid IT environment
High performance companies are
adopting mixed cloud and traditional IT
systems much more quickly than their
lower performing competitors
Accenture survey “High Performance IT
Research November 2013”
_17
Editor's Notes
Cost savings of Public v Private Cloud
SYSC 8.1.8 06/05/2009 A common platform firm must in particular take the necessary steps to ensure that the following conditions are satisfied: (1) the service provider must have the ability, capacity, and any authorisation required by law to perform the outsourced functions, services or activities reliably and professionally; (2) the service provider must carry out the outsourced services effectively, and to this end the firm must establish methods for assessing the standard of performance of the service provider; (3) the service provider must properly supervise the carrying out of the outsourced functions, and adequately manage the risks associated with the outsourcing; (4) appropriate action must be taken if it appears that the service provider may not be carrying out the functions effectively and in compliance with applicable laws and regulatory requirements; (5) the firm must retain the necessary expertise to supervise the outsourced functions effectively and to5 manage the risks associated with the outsourcing ,55and must supervise those functions and manage those risks; (6) the service provider must disclose to the firm any development that may have a material impact on its ability to carry out the outsourced functions effectively and in compliance with applicable laws and regulatory requirements; (7) the firm must be able to terminate the arrangement for the outsourcing where necessary without detriment to the continuity and quality of its provision of services to clients; (8) the service provider must co-operate with the FSA and any other relevant competent authority in connection with the outsourced activities; (9) the firm, its auditors, the FSA and any other relevant competent authority must have effective access to data related to the outsourced activities, as well as to the business premises of the service provider; and the FSA and any other relevant competent authority must be able to exercise those rights of access; (10) the service provider must protect any confidential information relating to the firm and its clients; (11) the firm and the service provider must establish, implement and maintain a contingency plan for disaster recovery and periodic testing of backup facilities where that is necessary having regard to the function, service or activity that has been outsourced. [Note: article 14(2) second paragraph of the MiFID implementing Directive]
EU Strategy: The Commission decided on 27th Sept that they wanted to “Unleash the potential of cloud computing in Europe”. EU justice commissioner Viviane Reding said: "Europe needs to think big. The cloud strategy will enhance trust in innovative computing solutions and boost a competitive digital single market where Europeans feel safe. That means a swift adoption of the new data protection framework, which the EC proposed earlier this year, and the development of safe and fair contract terms and conditions.". The chat about model contract terms in the strategy paper being particularly interesting…. Plans for commission to develop these model terms by end of 2013.However: any model terms would have to interact with proposed Regulation on Common European Sales Law (which it seems every member state opposes) which deals with:“data which are produced and supplied in digital form, whether or not according to the buyer's specifications, including video, audio, picture or written digital content, digital games, software and digital content which makes it possible to personalise existing hardware or software” (digital content) which can be stored, processed or accessed, and re-used by the user but excludes “electronic communications services and networks, and associated facilities and services” as well as ”the creation of new digital content and the amendment of existing digital content”.Industry may develop competing set of terms to increase their input
SYSC 8.1.8 06/05/2009 A common platform firm must in particular take the necessary steps to ensure that the following conditions are satisfied: (1) the service provider must have the ability, capacity, and any authorisation required by law to perform the outsourced functions, services or activities reliably and professionally; (2) the service provider must carry out the outsourced services effectively, and to this end the firm must establish methods for assessing the standard of performance of the service provider; (3) the service provider must properly supervise the carrying out of the outsourced functions, and adequately manage the risks associated with the outsourcing; (4) appropriate action must be taken if it appears that the service provider may not be carrying out the functions effectively and in compliance with applicable laws and regulatory requirements; (5) the firm must retain the necessary expertise to supervise the outsourced functions effectively and to5 manage the risks associated with the outsourcing ,55and must supervise those functions and manage those risks; (6) the service provider must disclose to the firm any development that may have a material impact on its ability to carry out the outsourced functions effectively and in compliance with applicable laws and regulatory requirements; (7) the firm must be able to terminate the arrangement for the outsourcing where necessary without detriment to the continuity and quality of its provision of services to clients; (8) the service provider must co-operate with the FSA and any other relevant competent authority in connection with the outsourced activities; (9) the firm, its auditors, the FSA and any other relevant competent authority must have effective access to data related to the outsourced activities, as well as to the business premises of the service provider; and the FSA and any other relevant competent authority must be able to exercise those rights of access; (10) the service provider must protect any confidential information relating to the firm and its clients; (11) the firm and the service provider must establish, implement and maintain a contingency plan for disaster recovery and periodic testing of backup facilities where that is necessary having regard to the function, service or activity that has been outsourced. [Note: article 14(2) second paragraph of the MiFID implementing Directive] SYSC 8.1.8 06/05/2009 A common platform firm must in particular take the necessary steps to ensure that the following conditions are satisfied: (1) the service provider must have the ability, capacity, and any authorisation required by law to perform the outsourced functions, services or activities reliably and professionally; (2) the service provider must carry out the outsourced services effectively, and to this end the firm must establish methods for assessing the standard of performance of the service provider; (3) the service provider must properly supervise the carrying out of the outsourced functions, and adequately manage the risks associated with the outsourcing; (4) appropriate action must be taken if it appears that the service provider may not be carrying out the functions effectively and in compliance with applicable laws and regulatory requirements; (5) the firm must retain the necessary expertise to supervise the outsourced functions effectively and to5 manage the risks associated with the outsourcing ,55and must supervise those functions and manage those risks; (6) the service provider must disclose to the firm any development that may have a material impact on its ability to carry out the outsourced functions effectively and in compliance with applicable laws and regulatory requirements; (7) the firm must be able to terminate the arrangement for the outsourcing where necessary without detriment to the continuity and quality of its provision of services to clients; (8) the service provider must co-operate with the FSA and any other relevant competent authority in connection with the outsourced activities; (9) the firm, its auditors, the FSA and any other relevant competent authority must have effective access to data related to the outsourced activities, as well as to the business premises of the service provider; and the FSA and any other relevant competent authority must be able to exercise those rights of access; (10) the service provider must protect any confidential information relating to the firm and its clients; (11) the firm and the service provider must establish, implement and maintain a contingency plan for disaster recovery and periodic testing of backup facilities where that is necessary having regard to the function, service or activity that has been outsourced. [Note: article 14(2) second paragraph of the MiFID implementing Directive]