Leon Cruywagen discusses how cloud computing can help businesses address challenges through reduced costs, improved security and resiliency, and increased agility. Cloud computing offers a new consumption and delivery model for IT resources on-demand via the internet. IBM is investing in cloud computing to meet internal and client needs through data centers globally and a portfolio of cloud services across planning, building, and delivering clouds. Working with partners, IBM aims to help businesses optimize their cloud journey and take advantage of the opportunities cloud provides.
Jambey Clinkscales gave presentation on "The Value of Cloud in the Business Technology Ecosystem" at the 2011 BDPA Technology Conference in Chicago.
Jambey shared his thoughts on the workshop during BDPA iRadio Show interview held on August 28, 2011 --> http://www.blogtalkradio.com/bdpa/2011/08/29/bdpa-iradio-workshop-presenters
Workshop Presenter:
Jambey Clinkscales
Capabilites and Program Manager, HP Enterprise Services
Topic: The Value of the Cloud in the Business Technology Ecology
BDPA New York Chapter
18 ottobre 2011 VMware presenta al Virtualization day,evento patrocinato dalla Provincia di Roma e organizzato da S&Q a Palazzo Valentini, l'ultimo software,denominato Vsphere 5.
Jambey Clinkscales gave presentation on "The Value of Cloud in the Business Technology Ecosystem" at the 2011 BDPA Technology Conference in Chicago.
Jambey shared his thoughts on the workshop during BDPA iRadio Show interview held on August 28, 2011 --> http://www.blogtalkradio.com/bdpa/2011/08/29/bdpa-iradio-workshop-presenters
Workshop Presenter:
Jambey Clinkscales
Capabilites and Program Manager, HP Enterprise Services
Topic: The Value of the Cloud in the Business Technology Ecology
BDPA New York Chapter
18 ottobre 2011 VMware presenta al Virtualization day,evento patrocinato dalla Provincia di Roma e organizzato da S&Q a Palazzo Valentini, l'ultimo software,denominato Vsphere 5.
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen
What is cloud computing and what does it mean for your business today?
Microsoft New Zealand will share insights into cloud computing including:
• Beyond the hype - what really is cloud computing?
• The business case for cloud
• Showcases of what cloud computing is doing for New Zealand companies
• Economics of cloud computing and cost considerations
• Implementation tips and recommendations to get started
• Demonstration of Microsoft’s leading cloud productivity suite – Office365
Learn about Microsoft Office365 - a set of cloud-enabled tools that let you access your email, documents, contacts, and calendars from virtually anywhere, on almost any device. Office 365 brings together our best communication and collaboration tools including Microsoft Office, Microsoft SharePoint, Microsoft Exchange and Microsoft Lync in an always-up-to-date cloud service, for a low flexible monthly subscription. And we’ll show you this works and how to assess whether or not cloud computing makes sense for your organisation and what it takes to get there.
Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)Andreas Ramov
Long standing customer Permal, a leading alternative asset management
firm, was looking to focus on running its business, rather than running its
infrastructure. With an expensive technology refresh imminent, the firm
considered its options and found SunGard Availability Services’ enterprise class
private cloud to be a secure, flexible and cost-effective solution.
VMware Enterprise Management – The Vision cfArrow ECS UK
VMware Enterprise Management – The Vision
A steer on the vision for the new Enterprise Management solution suites – the biggest management launch in VMware history.
Colin Fernandes, Global Technical Marketing Manager, VMware
On March 23, TD Azlan held the "Build 4 the Cloud" seminar at De Olifant in Breukelen, Utrecht.
By organizing this seminar, TD Azlan was able to show her resellers which opportunities TD Azlan can offer to their enterprise, for virtualization and datacenter solutions.
Speakers Marc Samsom (Cisco) and Jan Smit (VMWare), among others, shared very useful information about upcoming changes in the datacenter market.
Why We Fail: How an architect learned to stop worrying and love the cloudAlex Jauch
Private cloud has been the “up and coming” trend for several years. You would think this would mean we’re all running clouds inside our firewalls by now. In reality, this hasn’t happened. Why? Where are all the clouds? All the technical skills that the IT folks need to get this done are normally in house or easily accessible to them. So you would think that private clouds would be super common. Turns out they are not. Only a very small minority of IT organizations have deployed successful internal Private Clouds. There are notable exceptions, but they’re just that, exceptions. Why is this so hard? Why can’t folks get this done in their sleep? In this book, we will explore the reasons why we fail and how to overcome these obstacles to success in our private cloud deployments.
Transforming Your Business Through Cloud ComputingAMD
AMD Senior Vice President and Chief Information Officer, Mike Wolfe, for offers insight into how AMD is using leading virtualization and cloud computing technologies to transform its business - reducing costs, increasing efficiency and bolstering productivity.
Investments in information technology have a direct and fundamental impact on the success of an organization's revenue-generating activities. As a consequence, the business' financial leadership has a crucial stake in understanding and influencing IT decisions.
The presentation content focuses on a three-stage approach geared toward building profit models around well-planned cloud implementations. Discover how CFOs are in a unique position to lead this effort and make the IT organization aware of its impact on revenue and profitability
Ctrls delineates how organizations are moving towards Virtualization and Cloud Computing to optimize their IT Infrastructure needs. Benefits such as cost effectiveness, scalability on demand, moving from a CAPEX to OPEX model and increased returns on investments have made virtualization a lucrative datacenter option.
The cloud computing market is growing rapidly, and the latest Gartner Hype Cycle shows that the hype around it has recently transformed into reality. In fact, eighty percent of Fortune 1000 companies are adopting cloud-operating models.
Cloud has significant implications on many roles within an organization and on IT service management. These implications on service management are increasing the discussions around the application and relevance of ITIL in cloud environments.
Organizations and professionals are looking to:
Develop cloud competencies to adopt cloud computing
Understand how cloud computing impacts service management
Adapt the ITIL framework to fit a cloud environment
Have a look and examine whether this can be a successful marriage or if a prenuptial agreement is required!
Businesses are increasingly turning to hybrid cloud solutions to reduce costs and enable more scalable and flexible business processes. A hybrid cloud is a seamless and transparent combination of public and private clouds that uses a highly virtualized, on-premise infrastructure and merges with public cloud resources to increase efficiency, scalability and dependability. This seamless integration also helps extend security, control and transparency to all IT assets and environments regardless of their physical location.
This presentation will discuss concerns and opportunities, business drivers, cisco solutions for enterprise cloud, the compute platform, cisco automation solutions and cloud enablement workshop.
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen
What is cloud computing and what does it mean for your business today?
Microsoft New Zealand will share insights into cloud computing including:
• Beyond the hype - what really is cloud computing?
• The business case for cloud
• Showcases of what cloud computing is doing for New Zealand companies
• Economics of cloud computing and cost considerations
• Implementation tips and recommendations to get started
• Demonstration of Microsoft’s leading cloud productivity suite – Office365
Learn about Microsoft Office365 - a set of cloud-enabled tools that let you access your email, documents, contacts, and calendars from virtually anywhere, on almost any device. Office 365 brings together our best communication and collaboration tools including Microsoft Office, Microsoft SharePoint, Microsoft Exchange and Microsoft Lync in an always-up-to-date cloud service, for a low flexible monthly subscription. And we’ll show you this works and how to assess whether or not cloud computing makes sense for your organisation and what it takes to get there.
Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)Andreas Ramov
Long standing customer Permal, a leading alternative asset management
firm, was looking to focus on running its business, rather than running its
infrastructure. With an expensive technology refresh imminent, the firm
considered its options and found SunGard Availability Services’ enterprise class
private cloud to be a secure, flexible and cost-effective solution.
VMware Enterprise Management – The Vision cfArrow ECS UK
VMware Enterprise Management – The Vision
A steer on the vision for the new Enterprise Management solution suites – the biggest management launch in VMware history.
Colin Fernandes, Global Technical Marketing Manager, VMware
On March 23, TD Azlan held the "Build 4 the Cloud" seminar at De Olifant in Breukelen, Utrecht.
By organizing this seminar, TD Azlan was able to show her resellers which opportunities TD Azlan can offer to their enterprise, for virtualization and datacenter solutions.
Speakers Marc Samsom (Cisco) and Jan Smit (VMWare), among others, shared very useful information about upcoming changes in the datacenter market.
Why We Fail: How an architect learned to stop worrying and love the cloudAlex Jauch
Private cloud has been the “up and coming” trend for several years. You would think this would mean we’re all running clouds inside our firewalls by now. In reality, this hasn’t happened. Why? Where are all the clouds? All the technical skills that the IT folks need to get this done are normally in house or easily accessible to them. So you would think that private clouds would be super common. Turns out they are not. Only a very small minority of IT organizations have deployed successful internal Private Clouds. There are notable exceptions, but they’re just that, exceptions. Why is this so hard? Why can’t folks get this done in their sleep? In this book, we will explore the reasons why we fail and how to overcome these obstacles to success in our private cloud deployments.
Transforming Your Business Through Cloud ComputingAMD
AMD Senior Vice President and Chief Information Officer, Mike Wolfe, for offers insight into how AMD is using leading virtualization and cloud computing technologies to transform its business - reducing costs, increasing efficiency and bolstering productivity.
Investments in information technology have a direct and fundamental impact on the success of an organization's revenue-generating activities. As a consequence, the business' financial leadership has a crucial stake in understanding and influencing IT decisions.
The presentation content focuses on a three-stage approach geared toward building profit models around well-planned cloud implementations. Discover how CFOs are in a unique position to lead this effort and make the IT organization aware of its impact on revenue and profitability
Ctrls delineates how organizations are moving towards Virtualization and Cloud Computing to optimize their IT Infrastructure needs. Benefits such as cost effectiveness, scalability on demand, moving from a CAPEX to OPEX model and increased returns on investments have made virtualization a lucrative datacenter option.
The cloud computing market is growing rapidly, and the latest Gartner Hype Cycle shows that the hype around it has recently transformed into reality. In fact, eighty percent of Fortune 1000 companies are adopting cloud-operating models.
Cloud has significant implications on many roles within an organization and on IT service management. These implications on service management are increasing the discussions around the application and relevance of ITIL in cloud environments.
Organizations and professionals are looking to:
Develop cloud competencies to adopt cloud computing
Understand how cloud computing impacts service management
Adapt the ITIL framework to fit a cloud environment
Have a look and examine whether this can be a successful marriage or if a prenuptial agreement is required!
Businesses are increasingly turning to hybrid cloud solutions to reduce costs and enable more scalable and flexible business processes. A hybrid cloud is a seamless and transparent combination of public and private clouds that uses a highly virtualized, on-premise infrastructure and merges with public cloud resources to increase efficiency, scalability and dependability. This seamless integration also helps extend security, control and transparency to all IT assets and environments regardless of their physical location.
This presentation will discuss concerns and opportunities, business drivers, cisco solutions for enterprise cloud, the compute platform, cisco automation solutions and cloud enablement workshop.
Gender-based violence is regarded as one of the forms of human rights violation. It is indeed a global phenomenon surpassing all kinds of national, economic, religious, geographic and cultural borders. Woman abuse is usually performed in her direct social environment thereby affecting the physical as well as her mental health. Violence has disastrous consequences on social welfare, children, families and community. Gender violence restricts the woman’s right to be involved in social life.
A decade ago, we began doing business over the web. Browsers and web servers became the building blocks of services and applications on the Internet. Web application security was a major concern in 2000, but little progress has been made to fix the problems. 2009 saw the underground cyber economy grow by leaps and bounds. Spam is a lucrative business. Writing exploits fetches real money. Large scale breaches of customer data are on the rise. You can purchase pay-per-hour DDoS attacks. The effectiveness of antivirus software has fallen well below acceptable levels. Today, it is impossible for an average user to "survive the web" without falling prey to scams or malware.
We need to take another look at the fundamental building blocks that deliver our web applications. Are browsers and protocols capable of delivering secure web applications? Standards have evolved, but without a focus on application security. In our quest for a slicker Web 2.0, have we compromised on fundamental security principles? Although there is no clear solution in sight, it is time that we start asking for what is really needed.
Alana Ramo, director for strategic partnerships at GEN, on the Global Business Angels Network at the Global Entrepreneurship Congress in Medellin, Colombia.
The Art of Service created a series of 4 short presentations to give a high level introduction into the various concepts of Cloud Computing.
For more information please contact Ivanka Menken at service@theartofservice.com
2011.04.04. Les partenaires IBM et le Cloud Business - Loic SimonClub Alliances
Deck sur les Partenaires IBM et le Cloud Business préparé par Loic Simon à l'occasion de sessions de Formation délivrées aux responsables de la relation partenaires chez IBM.
Effektivisering af Cloud Serviceleverancer (IBM Tivoli)IBM Danmark
Oplev hvordan du kan øge effektiviteten gennem en cloud-løsning som kan anvendes til både eksisterende infrastruktur og services samt som en helt færdig løsning klar til brug for nye services.
Læs mere her: bit.ly/softwaredagtivoli5
The fourth in our series of webinars, 'Journey Through the AWS Cloud'. This complimentary presentation discusses the use of services offered by AWS that alleviate the need for you to install and manage software on EC2 instances. We introduce the key services customers employ to keep them focused on developing their applications, whilst AWS takes care of running the scalable and reliable building blocks upon which they are built.
Infrastructure components configure and deploy 24 hiapc fabrizio volpeFabrizio Volpe
Infrastructure components configure and deploy
In collaboration with IEEE Computer Society, the Cloud Security Alliance and Dell, Microsoft is hosting a 24 Hours in a Private Cloud virtual event
Similar to ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud" (20)
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
2. There is a greater need for IT to help
address the business challenges created by
this complexity.
Doing more with less
Reduce capital expenditures and operational expenses
Reducing risk
Ensure the right levels of security and resiliency
across all business data and processes
Higher quality services
Improve quality of services and deliver new services
that help the business grow and reduce costs
Breakthrough agility
Increase ability to quickly deliver new services to capitalize
on opportunities while containing costs and managing risk
3. Cloud is a shift in the consumption and delivery of IT
with the goal of simplifying to manage complexity more
effectively.
Cloud is:
◦ A new consumption and delivery model
Cloud addresses:
◦ Cost reduction
◦ Scale
◦ Utilization
◦ Self-service
◦ IT agility, flexibility and delivery of value
Cloud represents:
◦ The industrialization of delivery for IT supported
services
Cloud includes:
◦ Deployment models: public, private, hybrid
◦ Delivery models: Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), Software as a
Service (SaaS) and Business Process as a Service
4. There are three ways to acquire IT
capabilities
Software, hardware
Pre-integrated systems Provided as
and services and appliances services
Cloud computing is a new delivery and
consumption model or methodology
spanning all 3 ways.
5. What is different about cloud computing?
Without cloud computing With cloud computing
Virtualized resources Location
Automated service independent
management Rapid scalability
Standardized services Self-service
Software
Software Hardware
Hardware Storage
Storage Networking Software Storage
Networking Hardware Networking
Note: Elements of cloud computing taken from NIST, Gartner, Forrester and IDC cloud computing definitions
6. Cloud computing delivers IT and business
benefits
Virtualized
Higher utilization
Economy of scale
benefits
Doing more with less
Lower capital expense
Standardized
Easier access
Flexible pricing Higher quality services
Reuse and share
Easier to integrate
Automated
Faster cycle times Breakthrough agility
Lower operating expenses and reducing risk
Optimized utilization
Improved compliance
Optimized security
End user experience
7. The emerging agenda: the impact of cloud
computing is extending into driving
business transformation
An enabler of business transformation
Business- Creating new business models
focused Enabling speed and innovation
Reengineering business process
Supporting new levels of collaboration
Transformation
An evolution of information technology
IT-focused Changing the economics of IT
Automating service delivery
Radically exploiting standardization
Rapidly deploying new capabilities
Efficiencies
8. A systematic approach to cloud computing
can ensure a successful implementation.
Build
Integrate public cloud services
Design and construct private clouds
Quality assurance (test)
Plan Security and compliance
Understand strategic direction Lifecycle management
Analyze workloads
Determine delivery model
Define architecture Deliver
Build the business case Pilot
Deploy
Consume
Manage
Optimize
9. Design a cloud computing deployment as
part of the existing IT optimization
strategy and roadmap
Standardize
and automate
Standardize services
Virtualize Reduce deployment
cycles
Remove physical
Enable scalability
Consolidate resource boundaries
Flexible delivery
Increase hardware
Reduce infrastructure utilization
complexity Reduce hardware
Reduce staffing costs
requirements Simplify deployments
Manage fewer things
better
Lower operational costs
10. Adoption of cloud computing will be
workload driven
Workload characteristics determine standardization
Test for Standardization Examine for Risk Explore New Workloads
Web infrastructure Database High volume, low cost
applications analytics
Transaction processing
Collaborative infrastructure Collaborative Business
ERP workloads
Networks
Development and test
Highly regulated workloads
Industry scale “smart”
High Performance
... applications
Computing
...
...
12. There is a spectrum of deployment
options for cloud computing
Private Public
IT capabilities are provided “as a IT activities / functions are
service,” over an intranet, within the provided “as a service,” over
enterprise and behind the firewall the Internet
Enterprise Users
Enterprise Enterprise Enterprise
data center data center A B A B
Private cloud Managed Hosted private Shared cloud Public cloud
private cloud cloud services services
Third-party Third-party hosted • Free
operated and operated • Register
• Credit Card
• Click to contract
Internal and external service delivery
Hybrid methods are integrated
13. Many large enterprise clients will develop a
hybrid cloud strategy and IBM is investing
in enabling an efficient hybrid model
IDC agrees with this perspective….
14. Public and Private Clouds are preferred for
different workloads
Top private workloads Top public workloads
Data mining, text mining, or other analytics Audio/video/Web conferencing
Security Service help desk
Data warehouses or data marts Infrastructure for training and
Business continuity and disaster recovery demonstration
Test environment infrastructure WAN capacity, VOIP Infrastructure
Long-term data archiving/preservation Desktop
Transactional databases Test environment infrastructure
Industry-specific applications Storage
ERP applications Data center network capacity
Server
Database- and application-oriented Infrastructure workloads
workloads emerge as most appropriate emerge as most appropriate
Source: IBM Market Insights, Cloud Computing Research, July 2009. n=1,090
15. Clients interviewed significantly prefer private clouds over public or
hybrid clouds
Overall, how appealing are the public, private Public vs. Private trade-off considerations
and hybrid delivery models for your company?
Benefits
Increased Speed
Private 64% Lower Cost
Security
Public 30% Insecure or incomplete data deletion
Isolation failure
Malicious Insiders
Management infrastructure compromise
Private 64% Governance
Resiliency
Level and source of support
Hybrid 38% Architectural & management control
Compliance
Customization / specialization
Source: IBM Market Insights, Cloud Computing Research, July 2009. n=1,090
16. Our cloud portfolio is addressing client
needs with real capabilities and offerings
across the full cloud lifecycle, enabled by
the IBM Cloud platform
Plan Build Deliver
Help our clients to develop a Help our clients to enable Clients can consume
Cloud strategy, assess their enterprise to deliver secure, reliable services “on
workloads or identify pilot Cloud Services the IBM Cloud”
opportunities
The IBM Cloud is:
• An ecosystem platform – capabilities for clients and for our ecosystem
partners
• A delivery platform and architecture for public and private cloud services
17. Leveraging the IBM Cloud
Application, ISV other
partner ecosystems
IBM Delivered Anchor Industry Ecosystem Other IBM /
SaaS Solutions Enablers ISV Plats
Services
Dev/Test …
Platform ISVs
ISVs ISVs
The IBM Cloud
Cloud Common Management Platform
Cloud Reference Architecture
18. A framework for cloud computing
Application infrastructure for Business services
delivering cloud services delivered via the cloud Integrated capabilities
for visibility, control,
IT services that are integrated Cloud-based business
automation and security
with cloud services solutions for industry-
of cloud services
specific processes
S
Existing services and a
Industry-specific services
Business planning / lifecycle
a
management and security
third-party services, S
management services
partner ecosystems
Integrated service
S
a Process Collaboration Analytics
a services services services …
S
P
a Shared middleware services
a
S
I
a Infrastructure services
a
S
Capabilities to define an
Virtualized and optimized enterprise architecture for
systems storage and business planning/alignment
networking and tools for managing the
lifecycle of cloud services
19. Ready-to-consume cloud services from the IBM Cloud
B us ines s is the
cons umer IBM Federal Community Cloud
IBM BlueWorks Live
IBM Smart Business IBM LotusLive
expense reporting on
the IBM Cloud S
a Industry-specific services
IBM Smart Business a
S Industry-specific services
Business planning and lifecycle
Select Learning
management and security
S
Services SaaS
management services
a
Integrated service
a Bus. Process Collaboration Analytics …
Process Collaboration Analytics IBM Managed
S servicesservices
services services …
servicesservices
Security
P Services
a Shared middleware services IBM Tivoli Live
a
S
I
a Infrastructure services
a
S
IBM Smart Business Cloud for IBM Smart Business Desktop on the IBM Cloud
development and test on the IBM Smart Business End User Support
IBM Cloud
IBM Testing Services for Cloud -- self-enablement portal
IBM Rational Load Testing on IBM Information Protection Services
the IBM Cloud -- managed backup cloud
Cast Iron Systems IT is the cons umer
20. IBM provides services in support of cloud
computing
Plan Enable
IBM Strategy and Change Services IBM Application Development Resiliency Validation for
for Cloud Adoption Services for Cloud Computing Cloud Computing
IBM Strategy and Change Services IBM Deployment Planning and IBM Software Support
for Cloud Providers Automation (Rational) Services – Enhanced
Technical Support
IBM Infrastructure Strategy and IBM Testing Services for Cloud
Planning for Cloud Computing Computing IBM Managed Support
Services – managed
IBM Resiliency Consulting Services IBM Data Center Family™
technical support
IBM Data Center and Facilities solutions – data center design
services IBM Software Support
Strategy Services – data center
Services
strategy and plan Security Consulting Services in
support of Cloud Computing IBM Hardware
IBM Network optimization for cloud
Maintenance Services
computing Express managed e-mail
IBM Converged Communications security and Express managed
Services for Unified Web security from IBM
Communications as a Service –
strategy and assessment
21. Cloud service management capabilities are
needed to enable visibility, control and
automation of cloud services
Workflow Provisioning
Manage the process Automate provisioning
for approval of usage of resources
Monitoring Metering and rating
Provide visibility Track usage
of performance of of resources
virtual machines
22. Security is among a top concern with cloud
computing...
The IBM Security Framework provides a structure to address this concern
Application and process
People and identity Help keep applications secure,
Mitigate the risks protected from malicious or
associated with user fraudulent use, and hardened
access to corporate against failure
resources
Network, server and end point
Optimize service availability by
Data and information
mitigating risks to network components
Understand, deploy and
properly test controls for
access to and usage of
Physical infrastructure
sensitive data Provide actionable intelligence on the
desired state of physical infrastructure
security and make improvements
Professional Managed services Hardware and
services software
23. IBM is investing in cloud computing to meet internal and client needs
D ublin E hning en
B e ijing S e o ul
I rela nd G erm a ny
C hina S . K o re a T o k yo
S ilic o n V a lley R a leig h
C a lifo rnia N o rth C a ro lina H a no i J a pa n
V ie tna m
B a ng a lo re
I ndia S ing a po re
I B M C lo ud L a bs S ão
I B M C lo ud D a ta C ente rs P a ulo J o ha nne s burg
B ra zil S o uth A fric a
IBM CIO Cloud Implementations:
Analytics Collaboration Development Desktop Storage Business
and Test Services
Blue Insight LotusLive Dev/Test Workplace Network Storage Production
140,000 users 75% of all web Time to build a Cloud Cloud Cloud
growing to conferencing dev/ test Estimated Up to 40% 1,000
200,000 environment savings up to savings in applications
from 1 week to 30% storage costs identified
1 hour
24. Working together with an ecosystem of
IBM Business Partners to accelerate and
optimize your cloud journey
25. Cloud is an opportunity—will you be able
to take advantage?
Technology is enabling a
smarter planet
We must face head-on the
challenges to building an
effective IT
Cloud computing is one key
way to address the challenges
of a smarter planet
26. Thank you for your time today.
For more information:
http://www.ibm.com/cloud
Contact:
Leon Cruywagen
+1-720-342-0465
leonpc@us.ibm.com