SlideShare a Scribd company logo
Cloud Security, Governance and Standards Asia 2012 Conference
Singapore, 25-27 April 2012




                 CLOUD BUSINESS
                  IN INDONESIA

                             HERU SUTADI
Background

           IT Issues

                Technology
                  Change
       Cost                   “Idle”
     Increase                Capacity




Business
Demands          IT              Go Green



                                Cloud Computing           2
Why Cloud Computing?




                  3
Trend Cloud Computing
                           The global cloud
                       computing market is
                        expected to grow $
                       37.8 billion in 2010
                   with $ 121.1 billion in
                         2015 at a CAGR of
No.1                   26.2% from 2010 to
Trend
                          2015. SaaS is the
Since
2010
                      largest contributor in
                       the cloud computing
                    market,accounting for
                         73% of the market
                             2010 revenues
                           (Erick Schmidt –
                       Former Google CEO)
                                        4
Cloud Concern

          Security?
                      Cost?
   Privacy?
                   Integration with
Disaster recovery? legacy system?




                                  5
Challenges vs Benefits

            Challenges                               Benefits
•   Security
•   Governance / Compliance            •   CapEx reduced
•   SLAs                               •   Control OpEx
•   Multi-tenant                       •   Agility
•   Provider capability                •   Re-focus on core business
•   Cost of transition                 •   Rapid deployment
•   Less control of                    •   Elasticity
       • Performance
       • Availability
       • Security




                                                                       6
Potential Market in Indonesia
                  The next IT Model in Indonesia


    SME              Enterprise     SOE      School     University
   520,000              6800        117       4904        3058




                                                IT
                      Telco       Wi-Max
   Hospital                                  Service       ISP
                     Operator     Operator
    1012                                     Provider      200
                        11           8
                                                53



Source: Sharing Vision , 2010                                    7
Concern Cloud Implementation
 25

 20

 15

 10

   5                   Private Cloud
                       Public Cloud
   0




Source: LPPMI, 2011              8
Key Factor for Successful
                              Implementation

1.   Knowing customer needs
2.   Reliable network access
3.   Customer’s confidence level
4.   Proven TechnologyPlatform
5.   Provider’s Capability




                                         9
Concern in Contract
                              Network security
                                    requirement
                                       (16,66%)
                                 Service level
                                     agreements
                                       (15,38%)
                              Quality of service
                                      guarantee
                                       (14,10%)
                              Auditing activities
                                and certification
Source: LPPMI, 2011                    (14,10%)10
Thank You
for your attention…




           Contact:
   herusutadi@hotmail.com

More Related Content

What's hot

Bandwidth On Demand - Dynamic Capacity
Bandwidth On Demand - Dynamic CapacityBandwidth On Demand - Dynamic Capacity
Bandwidth On Demand - Dynamic Capacitylitodelmo
 
Implementation of OSS/BSS Solution in IoT Ecosystem
Implementation of OSS/BSS Solution in IoT EcosystemImplementation of OSS/BSS Solution in IoT Ecosystem
Implementation of OSS/BSS Solution in IoT Ecosystem
Vishal Kumar
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nagui Chalache
 
Connectivity as a Service
Connectivity as a ServiceConnectivity as a Service
Connectivity as a Service
Global Capacity
 
Voice and Video Join IT In The Cloud - Huawei Enterprise
Voice and Video Join IT In The Cloud - Huawei EnterpriseVoice and Video Join IT In The Cloud - Huawei Enterprise
Voice and Video Join IT In The Cloud - Huawei Enterprise
Huawei Enterprise
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
cummins1
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
scharter
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
cVidya Networks
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...TFM&A
 
Monetize broadband and OTT
Monetize broadband and OTTMonetize broadband and OTT
Monetize broadband and OTT
Ericsson Slides
 
Tech Mahindra - Connected Engineering
Tech Mahindra - Connected EngineeringTech Mahindra - Connected Engineering
Tech Mahindra - Connected Engineering
Real-Time Innovations (RTI)
 
Expand Your Market Opportunities
Expand Your Market OpportunitiesExpand Your Market Opportunities
Expand Your Market Opportunities
Cisco Service Provider
 
202511257 spidercloud-wp
202511257 spidercloud-wp202511257 spidercloud-wp
202511257 spidercloud-wpZarobiza
 
Jasper, Internet of Things
Jasper, Internet of ThingsJasper, Internet of Things
Jasper, Internet of Things
Jeffrey Funk Business Models
 
Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Industry edge communications edition spring 2013
Industry edge communications edition spring 2013
Jeff Edlund
 
4G / LTE Small cells deployment & challenges
4G / LTE Small cells deployment & challenges4G / LTE Small cells deployment & challenges
4G / LTE Small cells deployment & challenges
महेंद्र Mahendra लाठी Lathi
 
Internet of things
Internet of thingsInternet of things
Internet of things
Satish Chavan
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
Thierry Coupaye
 
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...
Eurotech
 

What's hot (20)

Bandwidth On Demand - Dynamic Capacity
Bandwidth On Demand - Dynamic CapacityBandwidth On Demand - Dynamic Capacity
Bandwidth On Demand - Dynamic Capacity
 
Implementation of OSS/BSS Solution in IoT Ecosystem
Implementation of OSS/BSS Solution in IoT EcosystemImplementation of OSS/BSS Solution in IoT Ecosystem
Implementation of OSS/BSS Solution in IoT Ecosystem
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
Connectivity as a Service
Connectivity as a ServiceConnectivity as a Service
Connectivity as a Service
 
Voice and Video Join IT In The Cloud - Huawei Enterprise
Voice and Video Join IT In The Cloud - Huawei EnterpriseVoice and Video Join IT In The Cloud - Huawei Enterprise
Voice and Video Join IT In The Cloud - Huawei Enterprise
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
 
Monetize broadband and OTT
Monetize broadband and OTTMonetize broadband and OTT
Monetize broadband and OTT
 
Tech Mahindra - Connected Engineering
Tech Mahindra - Connected EngineeringTech Mahindra - Connected Engineering
Tech Mahindra - Connected Engineering
 
Expand Your Market Opportunities
Expand Your Market OpportunitiesExpand Your Market Opportunities
Expand Your Market Opportunities
 
202511257 spidercloud-wp
202511257 spidercloud-wp202511257 spidercloud-wp
202511257 spidercloud-wp
 
Jasper, Internet of Things
Jasper, Internet of ThingsJasper, Internet of Things
Jasper, Internet of Things
 
Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Industry edge communications edition spring 2013
Industry edge communications edition spring 2013
 
4G / LTE Small cells deployment & challenges
4G / LTE Small cells deployment & challenges4G / LTE Small cells deployment & challenges
4G / LTE Small cells deployment & challenges
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...
 

Similar to Cloud Computing in Indonesia

Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
Open Data Center Alliance
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Ontario Cloud SIG
 
Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11
Hellenic Professionals Informatics Society
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranegovernment
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
Telstra
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Enterprise
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
THE CLOUD – SUSTAINABLE BUSINESS ENVIROMENT
THE CLOUD – SUSTAINABLE BUSINESS ENVIROMENTTHE CLOUD – SUSTAINABLE BUSINESS ENVIROMENT
THE CLOUD – SUSTAINABLE BUSINESS ENVIROMENT
Miroslav Lessev
 
Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Francis D'Silva
 
Ibm Smart Business Overview Jimmy Mills
Ibm Smart Business Overview   Jimmy MillsIbm Smart Business Overview   Jimmy Mills
Ibm Smart Business Overview Jimmy Mills
Jimmy Mills
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
Customer Centric Cloud
Customer Centric CloudCustomer Centric Cloud
Customer Centric Cloud
Eduardo Mendez Polo
 
Ibm puresystems deck for tcs abhed_11102012
Ibm puresystems  deck for tcs abhed_11102012Ibm puresystems  deck for tcs abhed_11102012
Ibm puresystems deck for tcs abhed_11102012abhedk
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
Internap
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
Raleigh ISSA
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
KVH Co. Ltd.
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingFonality
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud Roundtable
Internap
 

Similar to Cloud Computing in Indonesia (20)

Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloud
 
Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
THE CLOUD – SUSTAINABLE BUSINESS ENVIROMENT
THE CLOUD – SUSTAINABLE BUSINESS ENVIROMENTTHE CLOUD – SUSTAINABLE BUSINESS ENVIROMENT
THE CLOUD – SUSTAINABLE BUSINESS ENVIROMENT
 
Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009
 
Ibm Smart Business Overview Jimmy Mills
Ibm Smart Business Overview   Jimmy MillsIbm Smart Business Overview   Jimmy Mills
Ibm Smart Business Overview Jimmy Mills
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Customer Centric Cloud
Customer Centric CloudCustomer Centric Cloud
Customer Centric Cloud
 
Ibm puresystems deck for tcs abhed_11102012
Ibm puresystems  deck for tcs abhed_11102012Ibm puresystems  deck for tcs abhed_11102012
Ibm puresystems deck for tcs abhed_11102012
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud Roundtable
 

More from Heru Sutadi

Keamanan Siber di Era Big Data
Keamanan Siber di Era Big DataKeamanan Siber di Era Big Data
Keamanan Siber di Era Big Data
Heru Sutadi
 
Big Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in IndonesiaBig Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in Indonesia
Heru Sutadi
 
Keuangan Syariah Indonesia di Era Ekonomi Digital
Keuangan Syariah Indonesia di Era Ekonomi DigitalKeuangan Syariah Indonesia di Era Ekonomi Digital
Keuangan Syariah Indonesia di Era Ekonomi Digital
Heru Sutadi
 
E-Commerce in Indonesia
E-Commerce in IndonesiaE-Commerce in Indonesia
E-Commerce in Indonesia
Heru Sutadi
 
Executing Digital Payment Strategy
Executing Digital Payment StrategyExecuting Digital Payment Strategy
Executing Digital Payment Strategy
Heru Sutadi
 
Big Data Strategy
Big Data StrategyBig Data Strategy
Big Data Strategy
Heru Sutadi
 
Latest Update Bigdata in indonesia
Latest Update Bigdata in indonesiaLatest Update Bigdata in indonesia
Latest Update Bigdata in indonesia
Heru Sutadi
 
Indonesia ICT Institute Newsletter - Edisi Dsember
Indonesia ICT Institute Newsletter - Edisi DsemberIndonesia ICT Institute Newsletter - Edisi Dsember
Indonesia ICT Institute Newsletter - Edisi Dsember
Heru Sutadi
 
Hasil kajian Big Data di Indonesia
Hasil kajian Big Data di IndonesiaHasil kajian Big Data di Indonesia
Hasil kajian Big Data di Indonesia
Heru Sutadi
 
Indonesia ICT Institute Newsletter November Edition - in English
Indonesia ICT Institute Newsletter November Edition  - in EnglishIndonesia ICT Institute Newsletter November Edition  - in English
Indonesia ICT Institute Newsletter November Edition - in English
Heru Sutadi
 
Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...
Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...
Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...
Heru Sutadi
 
Indonesia ICT Institute NewsLetter Edisi November 2012
Indonesia ICT Institute NewsLetter Edisi November 2012Indonesia ICT Institute NewsLetter Edisi November 2012
Indonesia ICT Institute NewsLetter Edisi November 2012
Heru Sutadi
 
Indonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English VersionIndonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English Version
Heru Sutadi
 
Indonesia LTE Forum
Indonesia LTE ForumIndonesia LTE Forum
Indonesia LTE Forum
Heru Sutadi
 
Spectrum Management in Indonesia
Spectrum Management in IndonesiaSpectrum Management in Indonesia
Spectrum Management in Indonesia
Heru Sutadi
 
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalDigital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Heru Sutadi
 
Women and ICT - Perempuan dan Teknologi Informasi
Women and ICT - Perempuan dan Teknologi InformasiWomen and ICT - Perempuan dan Teknologi Informasi
Women and ICT - Perempuan dan Teknologi Informasi
Heru Sutadi
 
Perkembangan Jejaring Sosial (Social Networks) di Indonesia dan Implikasinya
Perkembangan Jejaring Sosial (Social Networks) di Indonesia dan ImplikasinyaPerkembangan Jejaring Sosial (Social Networks) di Indonesia dan Implikasinya
Perkembangan Jejaring Sosial (Social Networks) di Indonesia dan Implikasinya
Heru Sutadi
 
Perkembangan ICT dan Pemanfaatannya di Indonesia
Perkembangan ICT dan Pemanfaatannya di IndonesiaPerkembangan ICT dan Pemanfaatannya di Indonesia
Perkembangan ICT dan Pemanfaatannya di Indonesia
Heru Sutadi
 
RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA
RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA
RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA
Heru Sutadi
 

More from Heru Sutadi (20)

Keamanan Siber di Era Big Data
Keamanan Siber di Era Big DataKeamanan Siber di Era Big Data
Keamanan Siber di Era Big Data
 
Big Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in IndonesiaBig Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in Indonesia
 
Keuangan Syariah Indonesia di Era Ekonomi Digital
Keuangan Syariah Indonesia di Era Ekonomi DigitalKeuangan Syariah Indonesia di Era Ekonomi Digital
Keuangan Syariah Indonesia di Era Ekonomi Digital
 
E-Commerce in Indonesia
E-Commerce in IndonesiaE-Commerce in Indonesia
E-Commerce in Indonesia
 
Executing Digital Payment Strategy
Executing Digital Payment StrategyExecuting Digital Payment Strategy
Executing Digital Payment Strategy
 
Big Data Strategy
Big Data StrategyBig Data Strategy
Big Data Strategy
 
Latest Update Bigdata in indonesia
Latest Update Bigdata in indonesiaLatest Update Bigdata in indonesia
Latest Update Bigdata in indonesia
 
Indonesia ICT Institute Newsletter - Edisi Dsember
Indonesia ICT Institute Newsletter - Edisi DsemberIndonesia ICT Institute Newsletter - Edisi Dsember
Indonesia ICT Institute Newsletter - Edisi Dsember
 
Hasil kajian Big Data di Indonesia
Hasil kajian Big Data di IndonesiaHasil kajian Big Data di Indonesia
Hasil kajian Big Data di Indonesia
 
Indonesia ICT Institute Newsletter November Edition - in English
Indonesia ICT Institute Newsletter November Edition  - in EnglishIndonesia ICT Institute Newsletter November Edition  - in English
Indonesia ICT Institute Newsletter November Edition - in English
 
Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...
Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...
Eksistensi Kebudayaan di Tengah Perkembangan Media dan Teknologi Informasi In...
 
Indonesia ICT Institute NewsLetter Edisi November 2012
Indonesia ICT Institute NewsLetter Edisi November 2012Indonesia ICT Institute NewsLetter Edisi November 2012
Indonesia ICT Institute NewsLetter Edisi November 2012
 
Indonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English VersionIndonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English Version
 
Indonesia LTE Forum
Indonesia LTE ForumIndonesia LTE Forum
Indonesia LTE Forum
 
Spectrum Management in Indonesia
Spectrum Management in IndonesiaSpectrum Management in Indonesia
Spectrum Management in Indonesia
 
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalDigital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
 
Women and ICT - Perempuan dan Teknologi Informasi
Women and ICT - Perempuan dan Teknologi InformasiWomen and ICT - Perempuan dan Teknologi Informasi
Women and ICT - Perempuan dan Teknologi Informasi
 
Perkembangan Jejaring Sosial (Social Networks) di Indonesia dan Implikasinya
Perkembangan Jejaring Sosial (Social Networks) di Indonesia dan ImplikasinyaPerkembangan Jejaring Sosial (Social Networks) di Indonesia dan Implikasinya
Perkembangan Jejaring Sosial (Social Networks) di Indonesia dan Implikasinya
 
Perkembangan ICT dan Pemanfaatannya di Indonesia
Perkembangan ICT dan Pemanfaatannya di IndonesiaPerkembangan ICT dan Pemanfaatannya di Indonesia
Perkembangan ICT dan Pemanfaatannya di Indonesia
 
RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA
RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA
RETHINKING ICT REGULATION TO FOSTER EMERGING TELECOMS BUSINESS IN INDONESIA
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Cloud Computing in Indonesia

  • 1. Cloud Security, Governance and Standards Asia 2012 Conference Singapore, 25-27 April 2012 CLOUD BUSINESS IN INDONESIA HERU SUTADI
  • 2. Background IT Issues Technology Change Cost “Idle” Increase Capacity Business Demands IT Go Green Cloud Computing 2
  • 4. Trend Cloud Computing The global cloud computing market is expected to grow $ 37.8 billion in 2010 with $ 121.1 billion in 2015 at a CAGR of No.1 26.2% from 2010 to Trend 2015. SaaS is the Since 2010 largest contributor in the cloud computing market,accounting for 73% of the market 2010 revenues (Erick Schmidt – Former Google CEO) 4
  • 5. Cloud Concern Security? Cost? Privacy? Integration with Disaster recovery? legacy system? 5
  • 6. Challenges vs Benefits Challenges Benefits • Security • Governance / Compliance • CapEx reduced • SLAs • Control OpEx • Multi-tenant • Agility • Provider capability • Re-focus on core business • Cost of transition • Rapid deployment • Less control of • Elasticity • Performance • Availability • Security 6
  • 7. Potential Market in Indonesia The next IT Model in Indonesia SME Enterprise SOE School University 520,000 6800 117 4904 3058 IT Telco Wi-Max Hospital Service ISP Operator Operator 1012 Provider 200 11 8 53 Source: Sharing Vision , 2010 7
  • 8. Concern Cloud Implementation 25 20 15 10 5 Private Cloud Public Cloud 0 Source: LPPMI, 2011 8
  • 9. Key Factor for Successful Implementation 1. Knowing customer needs 2. Reliable network access 3. Customer’s confidence level 4. Proven TechnologyPlatform 5. Provider’s Capability 9
  • 10. Concern in Contract  Network security requirement (16,66%)  Service level agreements (15,38%)  Quality of service guarantee (14,10%)  Auditing activities and certification Source: LPPMI, 2011 (14,10%)10
  • 11. Thank You for your attention… Contact: herusutadi@hotmail.com