Slides from my recent presentation to the Cloud Circle- Is the Cloud a technical or organisational challenge? It’s probably a bit of both!
· What are the technical realities of developing an evolving IT infrastructure? (integration, interoperability, latency, bandwidth, business continuity, how do you go back to your old infrastructure if you leave the Cloud) In reality how straightforward are these issues to resolve?
· What are the organisational, cultural and political considerations that could derail your initiative? (change management issues/IT resenting lack of control/getting end-user buy-in)
· What about the business processes; how to get Cloud to flow through workflow
· Is security a technical or organisational challenge; the value of encryption versus best practice data governance policies. And what about compliance and data protection?
· Why does the human factor always threaten to derail your initiative?
· What skills will be most important in delivering Cloud success? (debate IT technical integrations skills versus more business integration skills)
· Who is going to make this happen?
The video is on Youtube- here: http://www.youtube.com/watch?v=UCB8T2zEkbE
This document discusses cybersecurity and hacking. It notes that connectivity and technology dependence is growing rapidly, increasing cyber threats. Hackers have unlimited time and low costs, needing to find only one vulnerability, while defenders have limited time and budgets. The document advocates for a proactive "cyber resilience" approach of continuous monitoring, detection and response to secure organizations and limit damage from incidents. It concludes by asking attendees if they have any questions or experiences regarding cybersecurity preparedness.
Email.
It's a confusing time at the moment with lots of choices.
Do you stay on-premise or go Cloud or even hosted? What about Hybrid?
With options abound, Justin Pirie, Saas and Cloud Expert lays out the possibilities- starting from where you are today on your journey- understanding what you want from your email and suggesting some answers.
Cloud, Security and opensource 2012-12-28 at SSULINE株式会社
This document discusses cloud computing and open source technologies. It defines cloud computing and the common service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then provides examples of commercial and open source implementations for each service model, highlighting technologies like OpenStack, CloudStack, Eucalyptus, OpenShift, and CloudFoundry. The document also discusses security considerations for each service model and the use of open source in cloud computing.
This is a talk given at Cloud Expo Bootcamp at Santa Clara. In this talk I highlight the importance of open source in the cloud based world. I argue why federated clouds are the future and how only open source can help promote such an ecosystem.
1) Cloud computing allows for sharing of resources, software, and information over the internet on demand. It provides scalable and managed infrastructure that can host applications.
2) Cloud computing services include Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Storage can also be provided as a service.
3) Cloud services provide access to computing resources from anywhere through an internet connection.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It has several advantages like lower costs, automatic software updates, unlimited storage and reliability. However, it also has disadvantages like requiring a constant internet connection and potential slowness. The document discusses key concepts of cloud computing including characteristics, service models, virtualization, opportunities and challenges of cloud sourcing, commercial offerings and the future of cloud computing.
This document discusses GE's design of the Industrial Internet. It notes that GE is a large, old company with many employees and revenue. It produces industrial things that now run on software and are connected to the internet, generating data. GE has established a design system called the Industrial Internet Design System to establish patterns for its industrial internet software. The speaker discusses how he works, prototyping in the same code as software engineers. He notes some challenges like production code being harder than expected, prototypes feeling too real if done in code, and dealing with both high-level strategy and detailed execution. He emphasizes setting expectations, boundaries, and communication to address these challenges.
This document discusses cybersecurity and hacking. It notes that connectivity and technology dependence is growing rapidly, increasing cyber threats. Hackers have unlimited time and low costs, needing to find only one vulnerability, while defenders have limited time and budgets. The document advocates for a proactive "cyber resilience" approach of continuous monitoring, detection and response to secure organizations and limit damage from incidents. It concludes by asking attendees if they have any questions or experiences regarding cybersecurity preparedness.
Email.
It's a confusing time at the moment with lots of choices.
Do you stay on-premise or go Cloud or even hosted? What about Hybrid?
With options abound, Justin Pirie, Saas and Cloud Expert lays out the possibilities- starting from where you are today on your journey- understanding what you want from your email and suggesting some answers.
Cloud, Security and opensource 2012-12-28 at SSULINE株式会社
This document discusses cloud computing and open source technologies. It defines cloud computing and the common service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then provides examples of commercial and open source implementations for each service model, highlighting technologies like OpenStack, CloudStack, Eucalyptus, OpenShift, and CloudFoundry. The document also discusses security considerations for each service model and the use of open source in cloud computing.
This is a talk given at Cloud Expo Bootcamp at Santa Clara. In this talk I highlight the importance of open source in the cloud based world. I argue why federated clouds are the future and how only open source can help promote such an ecosystem.
1) Cloud computing allows for sharing of resources, software, and information over the internet on demand. It provides scalable and managed infrastructure that can host applications.
2) Cloud computing services include Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Storage can also be provided as a service.
3) Cloud services provide access to computing resources from anywhere through an internet connection.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It has several advantages like lower costs, automatic software updates, unlimited storage and reliability. However, it also has disadvantages like requiring a constant internet connection and potential slowness. The document discusses key concepts of cloud computing including characteristics, service models, virtualization, opportunities and challenges of cloud sourcing, commercial offerings and the future of cloud computing.
This document discusses GE's design of the Industrial Internet. It notes that GE is a large, old company with many employees and revenue. It produces industrial things that now run on software and are connected to the internet, generating data. GE has established a design system called the Industrial Internet Design System to establish patterns for its industrial internet software. The speaker discusses how he works, prototyping in the same code as software engineers. He notes some challenges like production code being harder than expected, prototypes feeling too real if done in code, and dealing with both high-level strategy and detailed execution. He emphasizes setting expectations, boundaries, and communication to address these challenges.
Retaam Solutions is a leading M2M and IoT solution provider in Saudi Arabia and the Gulf region. It develops and implements customized IoT solutions using the ThingWorx platform, which facilitates rapid development and deployment of IoT applications by reducing time to market, cost, and risk. ThingWorx provides capabilities for device management, data collection, analytics and integration with other systems through a drag-and-drop interface. Retaam has implemented various IoT projects using ThingWorx for applications like smart metering, vehicle tracking, connected coolers, and energy profiling.
This document discusses the need for geo-distributed analytics infrastructures and storage to support big data workloads across multiple data centers. It introduces EMC's ECS storage platform as a solution, which provides a global namespace, geo-caching, strong consistency, and active-active replication across data centers. ECS can serve as a Hadoop storage backend through its Hadoop compatible client library and provides multi-tenant, exabyte scale storage for large and small files that addresses issues with data silos and underutilization of resources in current Hadoop deployments.
Hadoop Integration into Data Warehousing ArchitecturesHumza Naseer
This presentation is an explanation of the research work done in the topic of 'hadoop integration into data warehouse architectures'. It explains where Hadoop fits into data warehouse architecture. Furthermore, it purposes a BI assessment model to determine the capability of current BI program and how to define roadmap for its maturity.
This document discusses Azure HDInsight and how it provides a managed Hadoop as a service on Microsoft's cloud platform. Key points include:
- Azure HDInsight runs Apache Hadoop and related projects like Hive and Pig in a cloud-based cluster that can be set up in minutes without hardware to deploy or maintain.
- It supports running queries and analytics jobs on data stored locally in HDFS or in Azure cloud storage like Blob storage and Data Lake Store.
- An IDC study found that Microsoft customers using cloud-based Hadoop through Azure HDInsight have 63% lower total cost of ownership than an on-premises Hadoop deployment.
An IoT13 presentation showcasing promising companies in the internet of things. Ken Foster, Thingworx, describes the Internet of things and M2M opportunity for his company and the evolution of the M2M market
This document discusses how Hadoop can be used in data warehousing and analytics. It begins with an overview of data warehousing and analytical databases. It then describes how organizations traditionally separate transactional and analytical systems and use extract, transform, load processes to move data between them. The document proposes using Hadoop as an alternative to traditional data warehousing architectures by using it for extraction, transformation, loading, and even serving analytical queries.
HPE provides optimized server architectures for Hadoop including the Apollo 4200 server which offers high storage density. HPE also offers a reference architecture for Hadoop that separates compute and storage resources for better performance, using optimized servers like Moonshot for processing and Apollo for storage. Additionally, HPE contributes to Apache Spark through HP Labs to improve efficiency and scale of memory and performance.
This document discusses harnessing cloud computing for analyzing large neuroimaging datasets. It describes using the Amazon cloud to run the Configurable Pipeline for the Analysis of Connectomes (CPAC) on over 1,000 neuroimaging datasets. Running CPAC in the cloud provides scalable resources without hardware costs and allows processing many datasets in parallel. The results show cloud computing can significantly reduce costs and processing time compared to traditional computing for large neuroimaging projects.
Best Practices for the Hadoop Data Warehouse: EDW 101 for Hadoop ProfessionalsCloudera, Inc.
The enormous legacy of EDW experience and best practices can be adapted to the unique capabilities of the Hadoop environment. In this webinar, in a point-counterpoint format, Dr. Kimball will describe standard data warehouse best practices including the identification of dimensions and facts, managing primary keys, and handling slowly changing dimensions (SCDs) and conformed dimensions. Eli Collins, Chief Technologist at Cloudera, will describe how each of these practices actually can be implemented in Hadoop.
Didn't go to design school? Have a taste for good design, but aren't sure what it takes to get there? This talk takes a "playbook" approach to the mechanics of design a with process inspired by art & science. This is not your typical abstract design theory talk; you will take away to-the-point techniques you can start using tomorrow. This talk will guide both the creative-minded technologist and tech-saavvy artist through a practical design process that produces well-designed software.
This document provides an overview of cloud computing, including:
- Definitions of cloud computing and why it is called "cloud" computing
- A brief history and origins of cloud computing
- Characteristics such as on-demand self-service, ubiquitous network access, and resource pooling
- Advantages like lower costs, improved performance, and device independence
- The three main cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS)
- The four types of cloud implementations: public cloud, private cloud, community cloud, and hybrid cloud
This document discusses GE Predix, which is described as an industry first end-to-end solution for the Industrial Internet. It consists of Predix Machine, which collects data from machines at the edge of the network, Predix Security which provides end-to-end security, Predix Core which provides the cloud infrastructure, the Predix Services Catalog containing services from GE and partners, and customer applications. The document emphasizes that Predix allows customers to focus on building and managing applications rather than infrastructure. It also notes there are 14 factors to consider when migrating existing applications to Predix.
Working with frog's UX experts, Melinda curated, collated and edited the GE User Experience Playbook for all those charged with designing GE products and services.
The document provides an overview of the Ichimoku Cloud technical analysis indicator, including:
1. The basic components of the Ichimoku Cloud are described as the Tenkan-Sen, Kijun-Sen, Senkou Span A, Senkou Span B, and Chinkou Span lines.
2. Buy and sell signals are given by crossovers of the Tenkan-Sen and Kijun-Sen lines, whether the closing price is above or below the cloud, the position of the Chinkou Span line, and the composition of Senkou Span A and B.
3. Examples of how to interpret the Ichimoku Cloud signals on
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). IaaS provides basic computing resources, PaaS provides platforms to build applications, and SaaS provides complete applications users can access. Popular cloud platforms include Amazon EC2 for IaaS and Google App Engine for PaaS. Cloud computing offers advantages like scalability, cost savings and device independence.
This document discusses cloud computing, including definitions of cloud computing, the different types of cloud computing services (SaaS, PaaS, IaaS), examples of cloud platforms like Google Cloud, and advantages like reduced costs, scalability, and environmental benefits compared to traditional computing. It also notes some disadvantages like reliance on internet connectivity and lack of access offline.
Cloud computing involves delivering computing services over the Internet. Instead of running programs locally, users access software and storage that resides on remote servers in the "cloud." The concept originated in the 1950s but Amazon launched the first major public cloud in 2006. Cloud computing has three main components - clients that access the cloud, distributed servers that host applications and data, and data centers that house these servers. There are different types of clients, deployment models for clouds, service models, and cloud computing enables scalability, reliability, and efficiency for applications accessed over the Internet like email, social media, and search engines.
Adoption Trends for SaaS- Cloud Computing World Forum 2012Justin Pirie
Here is the official blurb for the conference:
• Help your company adjust more readily to new forces and changing situations
• Serve your customers more efficiently and open up communication with them
• Lessen your need for specialized and/or dedicated in-house IT support staff
The document appears to be a list of usernames from various online platforms and services. There is no other context provided around the purpose of the list or what the usernames may represent. The list contains over 30 unique usernames with no other accompanying information.
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudJustin Pirie
My Session for the Stockholm Hosting Event on the 12th of April 2012 hosted by Microsoft for Hosters:
15:40-16:45 Del 3: Bli en Trusted advisor för din kund
Låt dig inspireras!
Välkommen på sälj- och inspirationsdag
Varmt välkommen på en sälj & inspirationsdag hos Microsoft som kommer vara till hjälp för dig som Service Provider.
Under dagen kommer vi bland annat gå igenom IT-marknaden, olika affärsmodeller samt vilka leveransmetoder som finns. Vi visar även hur man enklast säljer in olika typer av molntjänster och vi går igenom flera lösningar och produkter från Microsoft.
Moderator för dagen är Anders Trolle-Schultz frånSaas-it Consult med många års erfarenhet avaffärsutveckling för Service Providers.
Gästtalare under dagen är bl a Radar Group,
JSC it-partner samt Justin Pirie från Mimecast som hjälper partner över hela Europa med Cloud strategier.
Under dagen kommer vi bjuda på lunch och fika.
Har du några matallergier, kontakta Anna Jansson.
Agenda
09.30-09.45 Välkomna - Introduktion
09:45-10:45 Marknadsstudie - SMB kundsegment
11:00-11:30 Del 1: Hur gör du som Service Provider mer lönsamma affärer?
11:30-11:45 Microsoft Partner Network
11:45-12:45 Lunch
12:45-14:45 Del 2: Vilka leverensmodeller passar kundernas behov?
15:00-15:30 Partner Story - JSC it-partner
15:30-15:50 Få egen erfarenhet av effektiv produktivitet i Upplevelsen
15:40-16:45 Del 3: Bli en Trusted advisor för din kund
16:45-17:00 Avslutning
När, var och hur?
Datum: 12 april 2012
Var: Microsoft, Akalla
Tid: kl. 9.30-17.00
Kostnad: Kostnadsfritt
IT's role is changing- with the rise of "shadow IT" and BYOD people keep saying the "CIO is dead".
Is the CIO dead? I don't think so- they'll just be doing different things.
What? You'll have to view the deck!
Retaam Solutions is a leading M2M and IoT solution provider in Saudi Arabia and the Gulf region. It develops and implements customized IoT solutions using the ThingWorx platform, which facilitates rapid development and deployment of IoT applications by reducing time to market, cost, and risk. ThingWorx provides capabilities for device management, data collection, analytics and integration with other systems through a drag-and-drop interface. Retaam has implemented various IoT projects using ThingWorx for applications like smart metering, vehicle tracking, connected coolers, and energy profiling.
This document discusses the need for geo-distributed analytics infrastructures and storage to support big data workloads across multiple data centers. It introduces EMC's ECS storage platform as a solution, which provides a global namespace, geo-caching, strong consistency, and active-active replication across data centers. ECS can serve as a Hadoop storage backend through its Hadoop compatible client library and provides multi-tenant, exabyte scale storage for large and small files that addresses issues with data silos and underutilization of resources in current Hadoop deployments.
Hadoop Integration into Data Warehousing ArchitecturesHumza Naseer
This presentation is an explanation of the research work done in the topic of 'hadoop integration into data warehouse architectures'. It explains where Hadoop fits into data warehouse architecture. Furthermore, it purposes a BI assessment model to determine the capability of current BI program and how to define roadmap for its maturity.
This document discusses Azure HDInsight and how it provides a managed Hadoop as a service on Microsoft's cloud platform. Key points include:
- Azure HDInsight runs Apache Hadoop and related projects like Hive and Pig in a cloud-based cluster that can be set up in minutes without hardware to deploy or maintain.
- It supports running queries and analytics jobs on data stored locally in HDFS or in Azure cloud storage like Blob storage and Data Lake Store.
- An IDC study found that Microsoft customers using cloud-based Hadoop through Azure HDInsight have 63% lower total cost of ownership than an on-premises Hadoop deployment.
An IoT13 presentation showcasing promising companies in the internet of things. Ken Foster, Thingworx, describes the Internet of things and M2M opportunity for his company and the evolution of the M2M market
This document discusses how Hadoop can be used in data warehousing and analytics. It begins with an overview of data warehousing and analytical databases. It then describes how organizations traditionally separate transactional and analytical systems and use extract, transform, load processes to move data between them. The document proposes using Hadoop as an alternative to traditional data warehousing architectures by using it for extraction, transformation, loading, and even serving analytical queries.
HPE provides optimized server architectures for Hadoop including the Apollo 4200 server which offers high storage density. HPE also offers a reference architecture for Hadoop that separates compute and storage resources for better performance, using optimized servers like Moonshot for processing and Apollo for storage. Additionally, HPE contributes to Apache Spark through HP Labs to improve efficiency and scale of memory and performance.
This document discusses harnessing cloud computing for analyzing large neuroimaging datasets. It describes using the Amazon cloud to run the Configurable Pipeline for the Analysis of Connectomes (CPAC) on over 1,000 neuroimaging datasets. Running CPAC in the cloud provides scalable resources without hardware costs and allows processing many datasets in parallel. The results show cloud computing can significantly reduce costs and processing time compared to traditional computing for large neuroimaging projects.
Best Practices for the Hadoop Data Warehouse: EDW 101 for Hadoop ProfessionalsCloudera, Inc.
The enormous legacy of EDW experience and best practices can be adapted to the unique capabilities of the Hadoop environment. In this webinar, in a point-counterpoint format, Dr. Kimball will describe standard data warehouse best practices including the identification of dimensions and facts, managing primary keys, and handling slowly changing dimensions (SCDs) and conformed dimensions. Eli Collins, Chief Technologist at Cloudera, will describe how each of these practices actually can be implemented in Hadoop.
Didn't go to design school? Have a taste for good design, but aren't sure what it takes to get there? This talk takes a "playbook" approach to the mechanics of design a with process inspired by art & science. This is not your typical abstract design theory talk; you will take away to-the-point techniques you can start using tomorrow. This talk will guide both the creative-minded technologist and tech-saavvy artist through a practical design process that produces well-designed software.
This document provides an overview of cloud computing, including:
- Definitions of cloud computing and why it is called "cloud" computing
- A brief history and origins of cloud computing
- Characteristics such as on-demand self-service, ubiquitous network access, and resource pooling
- Advantages like lower costs, improved performance, and device independence
- The three main cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS)
- The four types of cloud implementations: public cloud, private cloud, community cloud, and hybrid cloud
This document discusses GE Predix, which is described as an industry first end-to-end solution for the Industrial Internet. It consists of Predix Machine, which collects data from machines at the edge of the network, Predix Security which provides end-to-end security, Predix Core which provides the cloud infrastructure, the Predix Services Catalog containing services from GE and partners, and customer applications. The document emphasizes that Predix allows customers to focus on building and managing applications rather than infrastructure. It also notes there are 14 factors to consider when migrating existing applications to Predix.
Working with frog's UX experts, Melinda curated, collated and edited the GE User Experience Playbook for all those charged with designing GE products and services.
The document provides an overview of the Ichimoku Cloud technical analysis indicator, including:
1. The basic components of the Ichimoku Cloud are described as the Tenkan-Sen, Kijun-Sen, Senkou Span A, Senkou Span B, and Chinkou Span lines.
2. Buy and sell signals are given by crossovers of the Tenkan-Sen and Kijun-Sen lines, whether the closing price is above or below the cloud, the position of the Chinkou Span line, and the composition of Senkou Span A and B.
3. Examples of how to interpret the Ichimoku Cloud signals on
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). IaaS provides basic computing resources, PaaS provides platforms to build applications, and SaaS provides complete applications users can access. Popular cloud platforms include Amazon EC2 for IaaS and Google App Engine for PaaS. Cloud computing offers advantages like scalability, cost savings and device independence.
This document discusses cloud computing, including definitions of cloud computing, the different types of cloud computing services (SaaS, PaaS, IaaS), examples of cloud platforms like Google Cloud, and advantages like reduced costs, scalability, and environmental benefits compared to traditional computing. It also notes some disadvantages like reliance on internet connectivity and lack of access offline.
Cloud computing involves delivering computing services over the Internet. Instead of running programs locally, users access software and storage that resides on remote servers in the "cloud." The concept originated in the 1950s but Amazon launched the first major public cloud in 2006. Cloud computing has three main components - clients that access the cloud, distributed servers that host applications and data, and data centers that house these servers. There are different types of clients, deployment models for clouds, service models, and cloud computing enables scalability, reliability, and efficiency for applications accessed over the Internet like email, social media, and search engines.
Adoption Trends for SaaS- Cloud Computing World Forum 2012Justin Pirie
Here is the official blurb for the conference:
• Help your company adjust more readily to new forces and changing situations
• Serve your customers more efficiently and open up communication with them
• Lessen your need for specialized and/or dedicated in-house IT support staff
The document appears to be a list of usernames from various online platforms and services. There is no other context provided around the purpose of the list or what the usernames may represent. The list contains over 30 unique usernames with no other accompanying information.
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudJustin Pirie
My Session for the Stockholm Hosting Event on the 12th of April 2012 hosted by Microsoft for Hosters:
15:40-16:45 Del 3: Bli en Trusted advisor för din kund
Låt dig inspireras!
Välkommen på sälj- och inspirationsdag
Varmt välkommen på en sälj & inspirationsdag hos Microsoft som kommer vara till hjälp för dig som Service Provider.
Under dagen kommer vi bland annat gå igenom IT-marknaden, olika affärsmodeller samt vilka leveransmetoder som finns. Vi visar även hur man enklast säljer in olika typer av molntjänster och vi går igenom flera lösningar och produkter från Microsoft.
Moderator för dagen är Anders Trolle-Schultz frånSaas-it Consult med många års erfarenhet avaffärsutveckling för Service Providers.
Gästtalare under dagen är bl a Radar Group,
JSC it-partner samt Justin Pirie från Mimecast som hjälper partner över hela Europa med Cloud strategier.
Under dagen kommer vi bjuda på lunch och fika.
Har du några matallergier, kontakta Anna Jansson.
Agenda
09.30-09.45 Välkomna - Introduktion
09:45-10:45 Marknadsstudie - SMB kundsegment
11:00-11:30 Del 1: Hur gör du som Service Provider mer lönsamma affärer?
11:30-11:45 Microsoft Partner Network
11:45-12:45 Lunch
12:45-14:45 Del 2: Vilka leverensmodeller passar kundernas behov?
15:00-15:30 Partner Story - JSC it-partner
15:30-15:50 Få egen erfarenhet av effektiv produktivitet i Upplevelsen
15:40-16:45 Del 3: Bli en Trusted advisor för din kund
16:45-17:00 Avslutning
När, var och hur?
Datum: 12 april 2012
Var: Microsoft, Akalla
Tid: kl. 9.30-17.00
Kostnad: Kostnadsfritt
IT's role is changing- with the rise of "shadow IT" and BYOD people keep saying the "CIO is dead".
Is the CIO dead? I don't think so- they'll just be doing different things.
What? You'll have to view the deck!
Opening Address: The What, Where, How
and Why of Cloud Computing
Q A clear understanding of what Cloud
Computing is - with examples
Q What are the constituent parts of Cloud?
A detailed overview of SaaS, PaaS and IaaS
- know what you’re looking at and how to
judge it
Q How did we get to Cloud? A journey through
computing history to the Cloud Paradigm
Shift
Q Why is Cloud so important to making IT work
better - A fundamental look at what IT is for
and how Cloud is enabling it
Q How do you manage the risks vs rewards?
What about resilience, service levels and
security: to what extent are they justified
How to Empower and Secure Employees’ Mobile Email in a BYOD World
How do you empower employees yet retain control?
With an estimated 80% of corporate IP stored in email, it is the single most powerful collaboration tool, yet the most important repository to protect. The consumerisation of IT is upon us. Employees are demanding mobile email on corporate devices and with the rise of smartphones, on personal devices too.
What is the best way to approach mobile email?
This document appears to be a transcript of comments from an online discussion about Lean Startup principles and methodology. It contains over 40 comments from various users discussing concepts like validating hypotheses through minimum viable products, iterating quickly from Plan A, focusing on customer value, and becoming metrics-obsessed rather than relying on politics or sales. Several comments directly quote Lean Startup author Eric Ries and recommend buying his book.
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...Justin Pirie
Cloud Computing is rapidly evolving the hosting marketplace with the big vendors seemingly eating into the supply chain setting up their own data centers and selling Cloud services direct to the customer. Yet dig beneath the surface and the Channel still has enormous value to add, it's just different to before. Cloud Aggregation represents the fastest single growing segment according to the latest Gartner research- so partnering with ISV's represents a massive potential growth area. Adding and bundling Cloud services can transform low margin capital intensive businesses into much more profitable ones. But not all Clouds are created equal, with organizations having Security, Data Protection, Proximity and Sovereignty concerns; Hosters have a massive opportunity to offer differentiated services and need not compete on price. Anders Trolle-Schultz and Justin Pirie, SaaS and Cloud Experts, will set the scene and take you through the journey of the new Cloud ecosystem and the roles the traditional Hoster can take in the emerging Cloud marketplace.
Microsoft Worldwide Partner Conference SessionJustin Pirie
This document appears to be a list of usernames from various social media platforms and online forums. There are over 100 unique usernames listed with many repeating entries. The document also includes some financial figures showing percentage increases and costs.
Cloud and The Channel- Where's the space?Justin Pirie
Is Cloud a "Perfect Storm" or an "Amazing Opportunity" for the IT Channel. It's certainly shaking things up!
Why? Because the delivery model and the business model are changing dramatically and the Channel is being forced by vendors to change the way they do business.
Does this represent and opportunity and how does the Channel best take advantage of the opportunities to resell Cloud services?
In this presentation- Justin Pirie, a SaaS and Cloud expert digs into the issues, presents data from Analysts and suggests a path forward for the Channel.
Cloud and the Channel- A Perfect Storm?Justin Pirie
Some people have said that the Cloud represents a "Perfect Storm" for the Channel. What is making that storm happen and where is the space for the Channel? To get to grips these changes we need to understand what are the drivers behind the technological and business model changes that are affecting the industry today. How do they influence what the Channel has been doing and what does it need to do to change? Justin will share insight and experience from over 7 years in the channel before spending the last 5 years at Cloud vendors. This will help you understand where the industry is going and why, as well as the actionable things the channel can do to retain it's place in the ecosystem.
IAMCP European Leadership Summit Keynote
International Association of Microsoft Channel Partners
Lean Startup - A Primer for EntrepreneursJustin Pirie
The document discusses the Lean Startup methodology. It notes that traditionally startups relied on intuition and business plans, but most startups fail because the problem and solution are not validated with customers. Lean Startup provides a rigorous process to iteratively test hypotheses through building minimum viable products and getting rapid customer feedback to learn what works best. It involves techniques like building, measuring, and learning from results in short cycles to pivot the startup idea as needed based on validated learning from customers rather than relying only on initial plans or intuition.
The Hidden Security Danger – Don’t Let Email Be Your Downfall Justin Pirie
Last year we were speaking to some distinguished analysts in the email space and they had a hunch.
A hunch that end users were using their personal email to work around corporate email systems.
He believed this was because of growth of Social Networks and the blurring of Personal and Work technology. But he didn’t know. This is the guy that sets email strategy for most of the Fortune 1000.
So we wanted to know WHY? Why are users using personal email? Why are they working around their Corporate email systems?
Enter Generation Gmail. An independent survey and report by Loudhouse research comissioned by Mimecast into the usage of personal email for work.
For those of you that wonder what I do for my day job- or are wondering how we help partners at Mimecast- here is my recent presentation on our new Customer Community, Social Media tips for Partners and Events ideas.
This document discusses cloud computing and security. It notes that while cloud computing provides benefits like scalability, speed, and lower costs, it also presents security risks due to the outsourcing and abstraction of technical details. Specifically, the document outlines that cloud security depends on vendors prioritizing it as a business, having specialized skills, operating at large scale for multiple customers, and following best practices. However, cloud computing is still an emerging field with few standards, so buyers should investigate availability, data jurisdiction, and manage risks appropriately through tools like independent audits and well-written contracts.
The Cloud is creating a “perfect storm” in the Channel business. A lot of the value Partners used to offer Customers is now available through the Cloud without them- Email, Collaboration, Storage and even Authentication!
Not only that, but the shift from traditional licenses, Cap-Ex and Maintenance revenue to Op-Ex or Subscription revenue is wreaking major havoc with profitability and cash flow. If your business is geared towards big, lumpy sales, with healthy margins, shifting to a smaller recurring income is going to disrupt the business model.
And because the technology is changing, to be less technical, with more technical detail abstracted away, the skills partners have been investing in for years are becoming obsolete. The people that provided that service aren’t needed anymore.
But I think the Channel is too quick to look to doom and gloom. They mustn’t forget their USP’s.
They’ve got great TRUST with real customers that pay them actual money.
The stuff Cloud providers CRAVE. They have in fact got a head start in the Cloud Business because the Economics of Cloud are so hard, as they’re discovering for themselves. But the reason Cloud Economics are hard is because it costs Cloud providers money to acquire customers. The Channel has the customers already. There is a perfect fit here if the channel can get to grips with the model.
So what does the Channel need to do to transform? Here is my top ten:
1. Construct a Portfolio of Cloud Services
2. Start eating their own Dog Food- using Cloud their own business
3. Sell Support for Cloud Services- It won’t fix itself
4. Add Services around Cloud- It won’t configure itself
5. Cross Sell, Up Sell- Keep that IT budget but deliver more
6. Do Due Diligence on Cloud Providers- They aren’t all the same
7. Guide Cloud in to Networks Safely- and securely
8. Start Delivering On-Ramp Cloud Services Today- because that is where demand is
9. Leverage On-Prem and Cloud for “Hybrid” Solutions- drive ROI with existing networks
10. Focus on Business Transformation- The future is less IT and more Business
As my good friend Anders Trolle-Schultz says- It’s no longer about “How IT” but “Why IT”.
Damien Behan and Justin Pirie present on Cloud Security- from a customer and an Industry perspective.
Damien Behan leads the IT function at Brodies, focusing on delivering value to the firm through its investment in technology. He is responsible for the smooth running of the firm's IT, while also setting the strategy and aligning it to that of the business. He has a wide range of experience within the legal sector, and specialises in the innovative use of technology to address business requirements. Damien has a keen interest and a wide experience in Knowledge Management and has been involved in driving the use of social software within the firm.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
For the first time in history, consumers have access to better IT at home than at work
PP – Discuss the issues when people in the workplace complain about this and explain the corporate challenges around this, such as cost, standardization, support, security, etc
PP - Discuss the perceived issues with allowing social media in the workplace, such as loss of productivity, doing personal things in work time, etc. The reality is that some companies are slow to understand the generational shift in how people communicate.
And consumer facing innovation is driving the market
PP – This is also driven by the fact that the line between working and not being at work is blurring, and therefore people are finding ways of being productive when they are not ‘at work’.
The infiltration of technology in our personal lives is now reversing back into our corporate lives.
But IT aren’t entirely to blame- they’re struggling to find a balance between employee empowerment and control.
PP – A lot of this is because IT are guided by HR departments with a possibly out-dated and misunderstood view of how people want to work against how people used to work. There is an a valid argument that too much empowerment creates a higher reputational risk strategy for the organisation.
But the problem is that the perimeter is gone. You can’t trust your own network anymore.
PP – This is true for a lot of organisations. The converse is also true, where everything is very locked down. A lot of companies are now looking at deploying VDI as a way of securing the desktop further
Force Can’t Solve All Problems-
"The more you tighten your grip… the more star systems will slip through your fingers.” -- Princess Leia
We need to enable them to use corporate systems, not because they have to, but because they prefer to.
But there is an asymmetry of risk here- all the benefits are accrued to the business unit and all the risk is carried by IT
PP – The problem here is that IT are often do not understand the risks that businesses are exposed to and what may or may not be acceptable or beneficial, and therefore they tend to err on the side of extreme caution.
I mean- who get’s blamed when things go wrong?
PP – lack of IT governance can be blamed here. IT operating in a vacuum, and the business operating independently of IT.
So what are the two challenges to adopting Cloud we’re going to address today?
Is it people?
Or Technology
Or Both?
So- who’s using it?
So- who’s using it?
So- who’s using it?
Part of the problem is choice- what do you move to the cloud? Email? CRM? Applications? Virtualised Machines?
In Dan Arielys Predictably Irrational he talks about a paradox. The common belief is that more choice leads to greater uptake and satisfaction. A study proved that this is actually not the case
A simple example of this paradox is an experiment they ran on people choosing Jams.
When only 6 Jams were displayed- shoppers purchased Jams 30% of the time
When 24 Jams were displayed, shoppers purchased Jam only 3% of the time.
The conclusion of the research was that too much choice actually caused people to refuse to make a decision, preferring to not have any Jam rather than make a decision that might leave a better choice unselected.
And the corporate IT real estate is a large and complex beast with choice literally everywhere. We need a way of simplifying it so we can make choices.
We need a frame of reference to make these choices simpler.
The key question is what stage of lifecycle is that technology is and what competitive differentiation does it give to the business. That defines what the choices are.
This is the Technology lifecycle- as defined by Simon Wardley. Competitive advantage is had where ubiquity and certainty in outcome is least- i.e. on the bottom left. The further up and right you go the less differentiation you get as the services become more commoditised.
Take the CRM market for example- the early systems are on the bottom left and move up through Siebel to Salesforce in the top right
Because if they don’t provide the business differentiation- should we be spending time and investing capital doing them?
Let’s reduce our choice so we can start to make some decisions. Then we can look at the issues had in transitioning
Because the issues are well known and understood.
So there are three types of risks we’re dealing with. Firstly the disruption of existing relationships. That software vendor you’ve worked with for years. How you’ve always done things.
Then the transitional risks relating to the shift from a product to a utility service model.
Thirdly the risks with outsourcing that activity to a third party. Let’s look at them
So thinking about the people issues
The fundamental problem is that you need different types of people at each different stage of the lifecycle. Simon uses the example of Pioneers, Settlers and Town Planners
Pioneers go out and find new lands- they are inherently chaotic. They fail often but their successes are responsible for your competitive advantage. They are your Leonardo DaVinci’s of the world.
Settlers follow behind the pioneers and make the land livable. They take the innovations from the pioneers and put them to work, making them usable and safe. They are your Machievelli’s of the world. You want them on your team.
And finally town planners make things solid, usable and scalable. They provide Operational efficiency. They’re ultra reliable and a safe pair of hands. They are your rock. They are your Vitruvius- the worlds first engineer to be known by name.
Mixing these people up and expecting them to deliver the same stuff isn’t easy. And asking people to operate in an area outside their capabilities is a recipe for disaster.
So are we asking IT to do exactly that? It’s not surprising then if we run into some issues…
PP – Often, IT departments are not clear on the business requirements. They are often asked to ‘save money’ or ‘do more with less’. This invariably means that decisions are taken that are not necessarily in step with the real business requirement.
So how do people outside of their comfort zone react? Not well normally…
More often than not- the response is “it’s not secure”
PP – This is a sometimes justified, after all IT departments are relied upon to use their knowledge to make judgements on whether putting information in the cloud is secure and in the company’s interests.
Actually what they’re saying is- I’m not comfortable
PP – This is really interesting. In countless meeting throughout my career, I’ve never had anyone in IT saying that they’re not comfortable.
And secondly it’s outside of my control. I like controlling things. What do you expect when you ask a town planner a question for a pioneer?
PP – Again, this can be justified in some cases, although things are changing fast, and most offerings these days offer a level on control that is more than adequate for most scenarios.
These are the two key areas to tackle if you’re to succeed with your implementation with people.
PP – Buy in from the IT team is vital if transitioning services to the cloud is to be successful, so it is important that the IT department are able to air their views, but also understand the business drivers.
Security- start understanding what makes a Cloud secure. Read best practice. Do due diligence.
PP – Understand the structure of data within your environment and where it is stored.
Vendors see the evolving security landscape and react and deploy in real time. Can provide much more effective Security and spend much more money on it- typically 4-7% of revenue which equates to about 10x customer security investment.
PP – This is especially true of smaller companies, who simply cannot justify such expenditure.
Over half of security incidents were done by an insider- malicious or not- we can’t trust people inside our perimeter. The perimeter is truly gone.
PP – Think of all the ways information gets in and out of a business: Hard copy documents, USB memory sticks, email, smartphones, ipods
Is control such a good thing if half of those security incidents were initiated internally? Is it always good to let IT have the keys to the safe?
IT needs to be focused on delivering sustaining competitive advantage- not just keeping the lights on.
PP – This is a key point. It is about the IT team understanding what they business does and being a part of the competitive process. This comes from management and is a shift in traditional cultures for some companies. It means IT not operating in a vacuum.
And the big worry of people in IT losing their jobs is just not a reality.
Simon Wardley talks about Jevons Paradox- where technological efficiency causes more, not less of the resource to be used. IT need not fear losing their jobs- they’ll just be used differently.
PP – In the short to medium term a lot of operational IT will be working on the transition of IT ‘real estate’ to the cloud. As Justin’s previous point states, IT people will be working differently. After all, who really enjoys working on backups ?.....
And lastly users- we talked about them right up front. They’re driving the change so by and large it’s welcomed with open arms if the systems are introduced well. They want to use IT on their smartphones and tablets.
PP – As IT service providers, we must never lose sight of the fact that we are here to serve our users and make sure that they have the right tools to do their jobs.
So what about the Technology?
The fundamental problem is that you need different types of people at each different stage of the lifecycle. Simon uses the example of Pioneers, Settlers and Town Planners
So what we’re really looking at is the transitional risks from shifting from a product to an outsourced utility service.
IT is complicated.
The challenges facing enterprises building private cloud services or leveraging public cloud services are significantly more complicated than just the technology. Fundamental change is needed in culture, business models, IT architecture, service management and politics — all opportunity areas for the channel to provide business consulting, but very different from the channel's traditional role.
PP – The lack of service orientation in a lot of organisations hampers any transition to the cloud. Successful transitions begin with a clearly defined service catalogue.
Greenfield sites
PP – Most businesses have legacy environments that are vital to them and their profitability. The problem with legacy environments is that often the people who set them up are the people you need to migrate or transition them, and often these people are no longer around. This is a dilemma, as we are at a stage where a lot of these systems will soon be unsupportable because the technology has moved on so far and the skills no longer exist to support the systems.
Risks:
Trust
Security of supply
Security
Governance
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
PP – lack of local knowledge – they don’t understand your business
PP – One of the main barriers that need to be overcome in the transition to cloud based services is SLA’s. How good are they, do they meet your business needs, are you comfortable with them ?
Risks:
Trust
Security of supply
Security
Governance
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
PP – Quality of service, alongside SLA’s are also a concern for organisations transitioning to cloud based services. How good are the eyes, ears and hands of our service providers, and how quickly do they respond when you need them ?
Risks:
Trust
Security of supply
Security
Governance
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
Risks:
Trust
Security of supply
Security
Governance
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
PP – Discuss jurisdictional issues that require data to be held within certain geographies and comply with local data laws.
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
PP – Change in the format or structure of held data.
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
Outsourcing risks
Lock in to a vendor
Pricing competition
Loss of strategic control
PP – It is often easier and more efficient to adapt business processes, rather than try to fit the technology to the process.
PP – Business processes need to be looked at in conjunction with IT services. There is often a lot of duplication of work, often because of legacy processes and/or systems, and these systems are often not integrated with the business IT service catalogue. Efficiencies, and ultimately cost savings can be made here.
Deliberate strategy- not an all or nothing approach. Do so on a project by project approach
PP – Certain IT systems are prime candidates for ‘outsourcing’, such as email management, archiving and backups. There is widespread agreement that these are the ‘low hanging fruit’ for IT departments.
Don’t be afraid of some failure.
PP – look at outsourcing some of the services previously mentioned – inline, low risk, such as backups and archiving. These can be run in parallel with current solutions.
PP – Understanding contracts up front is vital. What happens when you want to change provider or hosting technologies ? How will you get your data back, and how long will it take, how much will it cost ?
But with an eye for the spaghetti- you don’t want to end up with an unmanageable mess
PP – Do we actually know what we have ?
Hybrid architectures
PP – Hybrid architectures are often seen as good ways of transitioning to a cloud based solution. They allow the customer to control migration at a pace and level that they are comfortable with, whilst still allowing them a level of autonomy that they are happy with.
Mean professional services
Cloud readyness-
PP – this is about understanding your service catalogue and business processes.
At your own pace
PP – The process must be carried out at the right pace for the business.
- let the Cloud come to you
Hi My name’s Justin Pirie
I’m the Cloud Strategist here at Mimecast but I’m best known as an Analyst Blogger in the SaaS and Cloud space.