SlideShare a Scribd company logo
Cloud Computing: Hindernisse und Chancen für Großunternehmen  CMG-AE John Rhoton Distinguished Technologist EDS Office of the CTO /  30 April 2009
Agenda ,[object Object],[object Object],[object Object],[object Object]
Was bedeutet “Cloud Computing”? ,[object Object],[object Object],[object Object],[object Object],“ A large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of re-sources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customized SLAs.” Vaquero, Rodero-Merino, Caceres, Lindner
Cloud Elemente ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Private versus Public Cloud
Hype Cycle
Across the Chasm Web Services Web 2.0 Laggards Bowling Alley Tornado Main Street Early Market Internet Mobility Cloud Computing Virtualization Geoffrey Moore: Crossing the Chasm. Collins 2002 Innovators Early  Adopters Late  Majority Early  Majority
Cloud Model Integration Operation Governance Hardware Computation Storage Memory Colocation Real Estate Cooling Power Bandwidth Virtualisation Provisioning Billing Virtualisation Platform Programming Language Development Environment APIs Application CRM UC Email ....... .......
Cloud Landscape Governance Operation Integration Infrastructure Platform Application
Cloud-orientierte Applikationen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vorteile von Cloud Computing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Herausforderungen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Konkrete Vorgangsweise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Zusammenfassung ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Weitere Informationen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Understanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software SolutionsUnderstanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software SolutionsZannettos Zannettou
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
Tushar Dhoot
 
Next Generation Service Delivery: Fast Forward to Enterprise Cloud Computing
Next Generation Service Delivery: Fast Forward to Enterprise Cloud ComputingNext Generation Service Delivery: Fast Forward to Enterprise Cloud Computing
Next Generation Service Delivery: Fast Forward to Enterprise Cloud ComputingBMC Software
 
Cloud Application Development – The Future is now
Cloud Application Development – The Future is nowCloud Application Development – The Future is now
Cloud Application Development – The Future is now
SPEC INDIA
 
Dimension Data Cloud Services Portfolio
Dimension Data Cloud Services PortfolioDimension Data Cloud Services Portfolio
Dimension Data Cloud Services Portfolio
albertfrost
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
gaurav jain
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERP
Chirantan Ghosh
 
Cloud proposition for banking
Cloud proposition for bankingCloud proposition for banking
Cloud proposition for banking
Ajay Kumar Uppal
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
Mannat Singh
 
Mobile gis
Mobile gisMobile gis
Mobile gis
Soumik Chakraborty
 
Cloud Essentials
Cloud EssentialsCloud Essentials
Cloud Essentials
Chris Avis
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
Awesome Developers UG
 
cloud computing
cloud computingcloud computing
cloud computing
sowmiyamanikandan1
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
Muhammad Mubashar
 
Distinguishing, Evaluating, and Selecting Cloud Service Providers
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersDistinguishing, Evaluating, and Selecting Cloud Service Providers
Distinguishing, Evaluating, and Selecting Cloud Service Providers
GartnerJessica
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Mochamad James
 
WHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTINGWHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTING
Go4hosting Web Hosting Provider
 

What's hot (20)

Understanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software SolutionsUnderstanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software Solutions
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Next Generation Service Delivery: Fast Forward to Enterprise Cloud Computing
Next Generation Service Delivery: Fast Forward to Enterprise Cloud ComputingNext Generation Service Delivery: Fast Forward to Enterprise Cloud Computing
Next Generation Service Delivery: Fast Forward to Enterprise Cloud Computing
 
Cloud Application Development – The Future is now
Cloud Application Development – The Future is nowCloud Application Development – The Future is now
Cloud Application Development – The Future is now
 
Dimension Data Cloud Services Portfolio
Dimension Data Cloud Services PortfolioDimension Data Cloud Services Portfolio
Dimension Data Cloud Services Portfolio
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERP
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
Cloud proposition for banking
Cloud proposition for bankingCloud proposition for banking
Cloud proposition for banking
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Mobile gis
Mobile gisMobile gis
Mobile gis
 
Cloud Essentials
Cloud EssentialsCloud Essentials
Cloud Essentials
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Distinguishing, Evaluating, and Selecting Cloud Service Providers
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersDistinguishing, Evaluating, and Selecting Cloud Service Providers
Distinguishing, Evaluating, and Selecting Cloud Service Providers
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
WHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTINGWHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTING
 

Viewers also liked

eProcurement Map Report Final IDABC
eProcurement Map Report Final IDABCeProcurement Map Report Final IDABC
eProcurement Map Report Final IDABC
Friso de Jong
 
Android Embedded - Einführung in Android als Embedded-Plattform
Android Embedded - Einführung in Android als Embedded-PlattformAndroid Embedded - Einführung in Android als Embedded-Plattform
Android Embedded - Einführung in Android als Embedded-Plattform
inovex GmbH
 
Impact of the Program IDABC in Spain (interoperable delivery of services to a...
Impact of the Program IDABC in Spain (interoperable delivery of services to a...Impact of the Program IDABC in Spain (interoperable delivery of services to a...
Impact of the Program IDABC in Spain (interoperable delivery of services to a...
Miguel A. Amutio
 
Idabc event2009 signergias
Idabc event2009 signergiasIdabc event2009 signergias
Idabc event2009 signergias
pgonzalp
 
eProcurement Software
eProcurement SoftwareeProcurement Software
eProcurement Software
Anuron Technologies
 
Change and Innovation in E-Government
Change and Innovation in E-GovernmentChange and Innovation in E-Government
Change and Innovation in E-Government
Roman Abashin
 
Estado e implantación del Esquema Nacional de Seguridad
Estado e implantación del Esquema Nacional de SeguridadEstado e implantación del Esquema Nacional de Seguridad
Estado e implantación del Esquema Nacional de Seguridad
Miguel A. Amutio
 
Transformación digital de la administración en España
Transformación digital de la administración en EspañaTransformación digital de la administración en España
Transformación digital de la administración en España
Miguel A. Amutio
 

Viewers also liked (8)

eProcurement Map Report Final IDABC
eProcurement Map Report Final IDABCeProcurement Map Report Final IDABC
eProcurement Map Report Final IDABC
 
Android Embedded - Einführung in Android als Embedded-Plattform
Android Embedded - Einführung in Android als Embedded-PlattformAndroid Embedded - Einführung in Android als Embedded-Plattform
Android Embedded - Einführung in Android als Embedded-Plattform
 
Impact of the Program IDABC in Spain (interoperable delivery of services to a...
Impact of the Program IDABC in Spain (interoperable delivery of services to a...Impact of the Program IDABC in Spain (interoperable delivery of services to a...
Impact of the Program IDABC in Spain (interoperable delivery of services to a...
 
Idabc event2009 signergias
Idabc event2009 signergiasIdabc event2009 signergias
Idabc event2009 signergias
 
eProcurement Software
eProcurement SoftwareeProcurement Software
eProcurement Software
 
Change and Innovation in E-Government
Change and Innovation in E-GovernmentChange and Innovation in E-Government
Change and Innovation in E-Government
 
Estado e implantación del Esquema Nacional de Seguridad
Estado e implantación del Esquema Nacional de SeguridadEstado e implantación del Esquema Nacional de Seguridad
Estado e implantación del Esquema Nacional de Seguridad
 
Transformación digital de la administración en España
Transformación digital de la administración en EspañaTransformación digital de la administración en España
Transformación digital de la administración en España
 

Similar to Cloud Computing: Hindernisse und Chancen für Großunternehmen

Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
Kannan Subbiah
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computingck4eric
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Sunit Tiwari
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Manoj Kumar
 
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
AhmadShah Sultani
 
Cloud computing altanai bisht , collge 2nd year , part i
Cloud computing   altanai bisht , collge 2nd year , part iCloud computing   altanai bisht , collge 2nd year , part i
Cloud computing altanai bisht , collge 2nd year , part i
ALTANAI BISHT
 
A017620123
A017620123A017620123
A017620123
IOSR Journals
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
Club Alliances
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Dulith Kasun
 
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
Club Alliances
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben Kepes
Intergen
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
Predrag Mitrovic
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
mciobo
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
Ben Kepes
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
Modern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale ComputingModern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale Computing
Giragadurai Vallirajan
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
Minor33
 

Similar to Cloud Computing: Hindernisse und Chancen für Großunternehmen (20)

Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
 
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
 
Cloud computing altanai bisht , collge 2nd year , part i
Cloud computing   altanai bisht , collge 2nd year , part iCloud computing   altanai bisht , collge 2nd year , part i
Cloud computing altanai bisht , collge 2nd year , part i
 
A017620123
A017620123A017620123
A017620123
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben Kepes
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Modern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale ComputingModern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale Computing
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 

More from John Rhoton

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
John Rhoton
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
John Rhoton
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
John Rhoton
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
John Rhoton
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud Computing
John Rhoton
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
John Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
John Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
John Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
John Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
John Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
John Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
John Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
John Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
John Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
John Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
John Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
John Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
John Rhoton
 

More from John Rhoton (20)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud Computing
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Cloud Computing: Hindernisse und Chancen für Großunternehmen

  • 1. Cloud Computing: Hindernisse und Chancen für Großunternehmen CMG-AE John Rhoton Distinguished Technologist EDS Office of the CTO / 30 April 2009
  • 2.
  • 3.
  • 4.
  • 6. Across the Chasm Web Services Web 2.0 Laggards Bowling Alley Tornado Main Street Early Market Internet Mobility Cloud Computing Virtualization Geoffrey Moore: Crossing the Chasm. Collins 2002 Innovators Early Adopters Late Majority Early Majority
  • 7. Cloud Model Integration Operation Governance Hardware Computation Storage Memory Colocation Real Estate Cooling Power Bandwidth Virtualisation Provisioning Billing Virtualisation Platform Programming Language Development Environment APIs Application CRM UC Email ....... .......
  • 8. Cloud Landscape Governance Operation Integration Infrastructure Platform Application
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.

Editor's Notes

  1. CTO Office von HP EDS. Unsere Hauptaufgabe besteht darin unsere Grosskunden zu betreuen und ihnen die Einfuehrung neuer Technologien von HP und Partnern zu erleichtern. Wir beschaeftigen uns daher mit neuen Trends die wir am Markt beobachten und auch mit intenen Produkt- und Loesungsentwicklungen die wir bei unseren Kunden umsetzten koennen. Da Cloud Computing sich in den letzten Jahren zu einem unserer vier technischen Hauptinitativen erklaert wurde sind wir auch in diesem Bereich sehr aktiv taetig.