Cloud Computing the new buzz word.
This presentation was presented by CA Anand Prakash Jangid at a regional conference of The Institute of Chartered Accountants of India at Hyderabad.
Hybrid Cloud Journey - Maximizing Private and Public CloudRyan Lynn
This presentation walks through the elements of private and public cloud and how to start looking at use cases for hybrid cloud architectures. It covers benefits, statistics, trends and practical next steps for your hybrid cloud journey.
Live presentation of some of this content: https://www.youtube.com/watch?v=9_5yJr0HKw4&t=13s
Hybrid Cloud Journey - Maximizing Private and Public CloudRyan Lynn
This presentation walks through the elements of private and public cloud and how to start looking at use cases for hybrid cloud architectures. It covers benefits, statistics, trends and practical next steps for your hybrid cloud journey.
Live presentation of some of this content: https://www.youtube.com/watch?v=9_5yJr0HKw4&t=13s
Cloud as a Service: A Powerful New Cloud Management PlatformBMC Software
Shouldn't your Cloud Management Platform be offered as a service? Cloud as a service (CaaS) from Column IT runs on the flagship BMC solution—BMC Cloud Lifecycle Management. View this presentation to learn how CLM delivered in a SaaS model delivers fast deployment time, cloud simplicity, and cost-effectiveness. You’ll also see how CaaS leverages the power of BMC automation and orchestration to deliver full stack provisioning and multi-tier software deployments with compliance, patching and monitoring—all from a single portal request.
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
Cloud computing represents great deal of opportunities for business and IT. The rapid adoption, flexibility, and elasticity of cloud computing have enabled companies to realize benefits such as time to market and cost saving. However, cloud computing presents various challenges for IT service management and increases the company’s security risk exposures. A well structured cloud service management model will enable the company to reap the benefits of cloud while minimizing the risk exposure for the company. This presentation will cover topics on:
• Governance structure for cloud solutions.
• Architecture strategies to identify cloud capabilities to enable business.
• Selection criteria for preferred cloud vendors based on architecture, legal, security, and IT operations categories.
• Risk management process of cloud solutions.
• Service management for cloud computing following ITIL model.
• Executive endorsement and buy in.
Webinar presentation September 20, 2016.
This deck introduces the CSCC’s deliverable, Cloud Security Standards: What to Expect and What to Negotiate V2.0, which was updated in August 2016 to reflect the latest developments in cloud security standards. The presentation is an overview of the various security standards, frameworks, and certifications that exist for cloud computing. This information will help cloud customers understand and distinguish between the different types of security standards that exist and assess the security standards support of their cloud service providers.
Read the CSCC's deliverable here: http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-negotiate.htm
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
There is an increasing trend witnessed in the cloud computing technology which has led to a lot of risks in preserving the Confidentiality, Integrity and Availability of data. The Cloud is now facing a lot of compliance requirements due to the sensitivity of the data that is being stored. View this presentation to understand the Cloud Compliance Requirements, Risks, Audit Processes and Methodologies involved in providing assurance.
This presentation was given by CA Anand Prakash Jangid at the Conference on Cloud Computing conducted by the Committee on Information Technology of the Institute of Chartered Accountants of India on 11th January 2014.
Auditing in the CBS Environment was never this easy. Anand Jangid gives an insight to the Indian Chartered Accountants regarding the correct approach and methodological concepts that is to be remembered while auditing any CBS Environment.
Cloud as a Service: A Powerful New Cloud Management PlatformBMC Software
Shouldn't your Cloud Management Platform be offered as a service? Cloud as a service (CaaS) from Column IT runs on the flagship BMC solution—BMC Cloud Lifecycle Management. View this presentation to learn how CLM delivered in a SaaS model delivers fast deployment time, cloud simplicity, and cost-effectiveness. You’ll also see how CaaS leverages the power of BMC automation and orchestration to deliver full stack provisioning and multi-tier software deployments with compliance, patching and monitoring—all from a single portal request.
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
Cloud computing represents great deal of opportunities for business and IT. The rapid adoption, flexibility, and elasticity of cloud computing have enabled companies to realize benefits such as time to market and cost saving. However, cloud computing presents various challenges for IT service management and increases the company’s security risk exposures. A well structured cloud service management model will enable the company to reap the benefits of cloud while minimizing the risk exposure for the company. This presentation will cover topics on:
• Governance structure for cloud solutions.
• Architecture strategies to identify cloud capabilities to enable business.
• Selection criteria for preferred cloud vendors based on architecture, legal, security, and IT operations categories.
• Risk management process of cloud solutions.
• Service management for cloud computing following ITIL model.
• Executive endorsement and buy in.
Webinar presentation September 20, 2016.
This deck introduces the CSCC’s deliverable, Cloud Security Standards: What to Expect and What to Negotiate V2.0, which was updated in August 2016 to reflect the latest developments in cloud security standards. The presentation is an overview of the various security standards, frameworks, and certifications that exist for cloud computing. This information will help cloud customers understand and distinguish between the different types of security standards that exist and assess the security standards support of their cloud service providers.
Read the CSCC's deliverable here: http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-negotiate.htm
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
There is an increasing trend witnessed in the cloud computing technology which has led to a lot of risks in preserving the Confidentiality, Integrity and Availability of data. The Cloud is now facing a lot of compliance requirements due to the sensitivity of the data that is being stored. View this presentation to understand the Cloud Compliance Requirements, Risks, Audit Processes and Methodologies involved in providing assurance.
This presentation was given by CA Anand Prakash Jangid at the Conference on Cloud Computing conducted by the Committee on Information Technology of the Institute of Chartered Accountants of India on 11th January 2014.
Auditing in the CBS Environment was never this easy. Anand Jangid gives an insight to the Indian Chartered Accountants regarding the correct approach and methodological concepts that is to be remembered while auditing any CBS Environment.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
The cloud is driving significant change in how companies deploy and manage resources for their existing business applications. This session explains in non-technical terms how to evaluate if a move to the cloud is in your midst without being a technical expert. We'll explain the many different deployment options as well as business opportunities, pros and cons that companies should consider when addressing the cloud. This session will also provide an executive viewpoint on Azure and it's future potential for businesses.
Presentation created for Third and Final Year students of , The Department of Information Technology, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune. Collage has invited myself for a training program on “Recent Trends in Information Technology”. I presented on topic of "Serverless Microservices". It is Level-100 Session.
Cloud is getting industry's attention, as more applications are moving to Cloud, Understanding Cloud basics are no longer nice-to-have requirement but became necessity.
This Presentation was presented as an Internal training to employee for educational purposes.
Company: AST Corporation www.astcorporation.com
Presenter: Zeeshan Baig
Website: www.baigzeeshan.com
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
5. 5
Famous Technology Predictions
I think there is a world market for maybe five computers.‘
Thomas Watson, Chairman of IBM, 1943
‗There is no reason why anyone would want a computer in the home.‘
Ken Olson, Present, Chairman and founder of Digital Equipment Corporation,
1977
‗640K should be enough for anybody.‘
Bill Gates, 1981
‗So far, Java seems like a stinker to me…I have a hunch that it won't be a very
successful language.‘
Paul Graham, Author
9. 9
What is Cloud Computing
“Cloud computing is a style of computing where
massively scalable IT-related capabilities are
provided as a service across the Internet to
multiple external customers”
“Cloud computing: A pool of abstracted, highly
scalable, and managed infrastructure capable of
hosting end-customer applications and billed
by consumption”
“Cloud computing is Web-based processing,
whereby shared resources, software, and
information are provided to computers and
other devices (such as smart phones) on
demand over the Internet.”
14. 14
Conventional
Conventional cloud
Manually Provisioned Self-provisioned
Dedicated Hardware Shared Hardware
Fixed Capacity Elastic Capacity
Pay for Capacity Pay for Use
Capital & Operational Expenses Operational Expenses
Managed
Conventional model vs Cloud model
15. 15
Early uses: CPU Sharing example (SETI)
SETI –Search for Extra-Terrestrial Intelligence
•Initiative by Space Science Institute & Berkeley
university
•Uses screen-saver CPU time for
▫analyze radio signals from space
▫present results as a very cool (geek oriented)
screen-saver
•One of the first wide-spread examples of
distributing processing tasks over the internet
to simple users PCs
16. 16
S3 Launches/EC2
Launch of Amazon web services
The arrival of Salesforce.com
Supercomputers/Mainframe
2006
2002
1990
1960
Google App / Azure
2008 - 2009
The first milestone for Cloud Computing
Launches of Google App
Engine/Windows Azure Beta
Evolution of Cloud Computing
17. 17
• Shared / pooled resources
• Broad network access
• On-demand self-service
• Scalable and elastic
• Metered by use
Five Key Cloud Attributes:
18. 18
• Resources are drawn from a common pool
• Common resources build economies of scale
• Common infrastructure runs at high efficiency
Shared / Pooled Resources:
19. 19
• Open standards and APIs
• Almost always IP, HTTP, and REST
• Available from anywhere with an internet connection
Broad Network Access:
20. 20
• Completely automated
• Users abstracted from the implementation
• Near real-time delivery (seconds or minutes)
• Services accessed through a self-serve
• web interface
On-Demand Self-Service:
21. 21
• Resources dynamically-allocated between users
• Additional resources dynamically-released when needed
• Fully automated
Scalable and Elastic:
22. 22
Services are metered, like a utility
Users pay only for services used
Services can be cancelled at any time
Metered by Use:
23. 23
Some success stories
GE:
Global procurement hosting 500k suppliers and 100k users in six languages on SaaS
platform to manage $55B/yr in spend
Eli Lilly :
Using Amazon Web Services can deploy a new server in 3min vs 50days and a 64-node
Linux cluster in 5min vs 100days
Nasdaq:
Using Amazon Storage to store 30-80GB/day of trading activity
30. 30
• Owned and managed by the enterprise
• Limits access to enterprise and partner network
• Retains high degree of control, privacy and security
• Enables business to more easily customize service
• Accessed from "inside" the firewall
Private Cloud
31. 31
Public Cloud
• Owned and managed by service provider
• Delivers select set business process, application or
infrastructure services on a ―pay per use‖ basis
• Highly standardized
• Limited customization options
• Accessed from "outside" the firewall
32. 32
Hybrid Cloud
• A hybrid infrastructure takes advantage of both public and private clouds:
• Services provided over the Internet—the public cloud
• Services provided by the enterprise data center—the private cloud
33. 33
SaaS
PaaS
IaaS
Amazon Google Microsoft Salesforce
Service Delivery Model Examples
Products and companies shown for illustrative purposes only and should not
be construed as an endorsement
36. 36
• Regulatory compliance
• Conflicts with international privacy laws,
• Data ownership & location
• Data Segregation
• Service guarantees & lack of control
• Contingency planning / disaster recovery for clouds
• Investigative support
• Privilege user access
• Long term viability(going concern for Service provider)
• IT general controls
Why should we worry
38. 38
• Business case for moving to cloud
• How does this align to business need
• Understanding the current state of system and
data
Being part of the cloud strategy
39. 39
• Who manages the vendor relationship
• How the asset are protected
• How is the responsibility divided
• Impact on the present disaster recovery plan
• How the vendor manage multi client environment
• Where is the data physically stored
• Impact of change in technology
• Gap in the risk & controls of the vendors
Evaluating vendors
40. 40
• Defining and managing the SLA and OLA
• What are your and cloud service provider compliance
responsibility
• How are incident managed
• How often are the data backed up
• Who determine the user access right to data(BBMP
example)
Implementation of cloud computing model
41. 41
• Process of managing the SLA and OLA with the
vendor
• How are the contractual control requirement are
managed
• Other related issue
Last but not least …Monitoring the vendor
43. 43
Attribute High (5) Med (3) Low (1)
Deployment Model Public Community Private
Service Model IaaS PaaS SaaS
Data Security level Secret Restricted Unclassified
Physical Hosting Site Undefined Int'l Location Domestic Location
SOX Critical Yes No
Dependent Apps Greater than 10 4 to 10 0 to 3
Recovery Time 4 Hours 7 Days 31 Days
Region Supported Europe or Global US All other
Cloud Risk Ranking Example
44. 44
Deployment Model Considerations
High Medium Low
Deploy
Model
Public Community Private
- Security and privacy are not a priority
- Service level agreements may not exist
- Private environments provide
adequate security and privacy
- Service level agreements should exist
Public
Private
45. 45
Service Model Considerations
High Medium Low
Service
Model
IaaS PaaS SaaS
- Issues may impact all hosted applications and
data
- No control over foundational general controls
- PaaS - Impact limited to outsourced platform
- SaaS - Impact limited to applications and data
IaaS
SaaS
46. 46
Data Security Considerations
High Medium Low
Security
Level
Secret Restricted Unclassified
- Difficult to enforce security standards when outsourcing
- Difficult to demonstrate compliance with regulations
- Security and privacy is not a concern (good
candidate for cloud computing)
Secret
Unclassified
47. 47
Dependent Applications
High Medium Low
Number of
Apps
Greater than 10 4 to 9 Less than 3
- Implies complexity and greater organizational
significance
- Implies simplicity and less organizational
significance
> 10
< 3
48. 48
Recovery Time Objectives (RTO) Considerations
High Medium Low
RTO 4 Hours 7 days 31 Days
Implies increased business importance
Cloud provider may lack geographic diversity
Single points of failure may exist in network
Implies lower business importance - good
candidate for cloud computing
4 Hours
31 Days
49. 49
Regions Supported Considerations
High Medium Low
Region Europe or Global United States All Other
- Strictest cross border data protection
regulations – can be at odds with abstract
cloud computing
- ―Other‖ countries may have less
restrictive cross border data protection
regulations
Europe
/ Global
All Other
51. 51
Check out
Start
experimenting
with the cloud.
Be prepared for
your business
to experiment
with it.
Let them know
what you want.
Leverage the
cloud
infrastructure
internally.
Build your own
cloud.