Lisa Davis, VP & GM, Digital Transformation & Scale Solutions, Enterprise & Government, Data Center Group, Intel Corp.
Red Hat Government Symposium 2019
Big Data is all about extracting 4Vs
Cloud focuses on On-Demand, Elastic, Scalable, Pay-Per use Self Service models
“Big data is not a stand-alone technology; rather, it is a combination of the last 50 years of technology evolution”
Wave 1: Creating manageable data structures
Wave 2: Web and content management
Wave 3: Managing big data
Lisa Davis, VP & GM, Digital Transformation & Scale Solutions, Enterprise & Government, Data Center Group, Intel Corp.
Red Hat Government Symposium 2019
Big Data is all about extracting 4Vs
Cloud focuses on On-Demand, Elastic, Scalable, Pay-Per use Self Service models
“Big data is not a stand-alone technology; rather, it is a combination of the last 50 years of technology evolution”
Wave 1: Creating manageable data structures
Wave 2: Web and content management
Wave 3: Managing big data
Greater Efficiency in Design for Project Delivery #COMIT2019Comit Projects Ltd
Presentation by Caroline Keane, Bentley and Cameron Blackwell, Mott Macdonald at the 2019 COMIT Conference. More information: http://www.comit.org.uk/conference-2019
In this presentation, Narendra introduces IoT and associated trends. Narendra wishes to solve the problem of migration in cloud systems as most cloud platforms have proprietary APIs.
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...Memoori
Memoori's 10th Webinar in the 2019 Smart Buildings Series. We spoke with Chris Irwin, VP Sales EMEA & Asia at J2 Innovations about the FIN 5 software framework and “Simplifying Building Automation by Leveraging Semantic Tagging with a New Breed of Software”.
Latest 2018 innovations in cloud computingPivIT Global
Cloud Computing is an Information Technology paradigm in which hosted services are delivered over the Internet in order to share resources and services such as Virtual Machines (VMs), Storage space, Applications and tools as a utility. All the recent innovations going in cloud computing, In this document, PivIT Global has explained about Trends in cloud computing.
5 Key Areas in the Construction Industry, where Big Data Solutions Play a Piv...SPEC INDIA
The construction industry is one of the most complex, wide spread and happening industry today. With Big Data solutions paving their way into each and every domain, why would this fraternity not make the most of it? Yes, there is an increasing usage of Big Data Analytics being observed in this industry and there are visible benefits being observed. Have a sneak peek at how this robust technology would facilitate the best of profitability and productivity in the construction industry?
Read more At: http://blog.spec-india.com/big-data-solutions-providing-powerful-thrust-construction-industry/
Gartner predicts that by 2026, 75% of organizations will adopt a digital transformation model predicated on cloud as the fundamental underlying platform. It is clear that cloud is here to stay and will continue to be top of mind for organizations of all sizes for years to come. To have a successful cloud strategy, not only is it important to know how other organizations are successfully migrating their architecture, but also how they are handling operations once they make the switch.
However, moving to and operating in the cloud successfully is not as easy as purchasing some public cloud credits and calling it a day. There are many common challenges that organizations face as they move to be cloud-first. By understanding more about these challenges, organizations can avoid expensive consequences.
Join this session to learn about:
Top trends in cloud migration and computingCommon challenges that organizations face as they move to a cloud-first approachConsequences that organizations face when they mishandle cloud adoption
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
Greater Efficiency in Design for Project Delivery #COMIT2019Comit Projects Ltd
Presentation by Caroline Keane, Bentley and Cameron Blackwell, Mott Macdonald at the 2019 COMIT Conference. More information: http://www.comit.org.uk/conference-2019
In this presentation, Narendra introduces IoT and associated trends. Narendra wishes to solve the problem of migration in cloud systems as most cloud platforms have proprietary APIs.
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...Memoori
Memoori's 10th Webinar in the 2019 Smart Buildings Series. We spoke with Chris Irwin, VP Sales EMEA & Asia at J2 Innovations about the FIN 5 software framework and “Simplifying Building Automation by Leveraging Semantic Tagging with a New Breed of Software”.
Latest 2018 innovations in cloud computingPivIT Global
Cloud Computing is an Information Technology paradigm in which hosted services are delivered over the Internet in order to share resources and services such as Virtual Machines (VMs), Storage space, Applications and tools as a utility. All the recent innovations going in cloud computing, In this document, PivIT Global has explained about Trends in cloud computing.
5 Key Areas in the Construction Industry, where Big Data Solutions Play a Piv...SPEC INDIA
The construction industry is one of the most complex, wide spread and happening industry today. With Big Data solutions paving their way into each and every domain, why would this fraternity not make the most of it? Yes, there is an increasing usage of Big Data Analytics being observed in this industry and there are visible benefits being observed. Have a sneak peek at how this robust technology would facilitate the best of profitability and productivity in the construction industry?
Read more At: http://blog.spec-india.com/big-data-solutions-providing-powerful-thrust-construction-industry/
Gartner predicts that by 2026, 75% of organizations will adopt a digital transformation model predicated on cloud as the fundamental underlying platform. It is clear that cloud is here to stay and will continue to be top of mind for organizations of all sizes for years to come. To have a successful cloud strategy, not only is it important to know how other organizations are successfully migrating their architecture, but also how they are handling operations once they make the switch.
However, moving to and operating in the cloud successfully is not as easy as purchasing some public cloud credits and calling it a day. There are many common challenges that organizations face as they move to be cloud-first. By understanding more about these challenges, organizations can avoid expensive consequences.
Join this session to learn about:
Top trends in cloud migration and computingCommon challenges that organizations face as they move to a cloud-first approachConsequences that organizations face when they mishandle cloud adoption
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
Developing a cloud strategy - Presentation Nexon ABC EventNexon Asia Pacific
In this SlideShare you will learn about the cloud for modern business, moving to the cloud - what to expect, digitise datafy and differentiate, bringing it all together with Nexon ABC.
Cloud is not an option, but is security?Jody Keyser
A "cloudless" computing environment in your enterprise is not an option, due to the coming wave of the Cloud. Cloud Security is an option of course. Spend an hour with one of the industries top cloud security consultants, Graham Silver.
Webinar / Discussion / Q&A
AGENDA:
- Common understanding of Cloud
- Look at Cloud Computing Trends
- Examine Cloud Security Concerns
- Introduce Cloud Life Cycle
- Cloud Security Assessment
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValueRapidValue
Digital transformation based on cloud-first strategy is a marathon. Any transformation journey which is disruptive and requires changing the core foundation of the organization can be very challenging. It is bound to fail unless the journey is planned with specific goals in mind, right roles and resources allocated to it, ‘as-is’ to ‘to-be state’ is mapped and implementation engine is fine-tuned.
Based on the experience of implementing numerous transformation projects for our global clients, RapidValue has formulated a BRAVE framework for cloud-first digital transformation.
Clint Harder, Vice President of Product Strategy for TDS HMS presents on "Cloud Services and Enterprise IT Applications: Are They a Match?". Clint Harder takes you through key decision points in selecting cloud services for enterprise applications.
This presentation was given at the Enterprise Cloud Summit on October 16, 2012 - presented by VISI.
Learn more about enterprise cloud computing at http://www.reliacloud.com.
Learn what a modern architecture looks like. It accepts any identity, authenticates users, and asserts those identities to any cloud, mobile, web, or network resource without requiring directory migration or duplication.
Learn from security experts at Deloitte how you can rethink your architecture with a fresh outlook that meets the needs of your agile enterprise.
The Microsoft Cloud includes Azure, Office 365 and much more. During this presentation I give an overview of the platform and talk specifically about the productivity portion of the Microsoft Cloud and the services Oakwood provides to implement Office 365 for customers.
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Amazon Web Services
(Presented by Skytap) Complex multi-tier enterprise applications that have been under development for decades assume reliable hardware and typically have dependencies on underlying operating systems, hardware configurations, and network topologies. The boundary between one application or service and another is often fuzzy, with many interdependencies. These traits make some enterprise applications difficult to refactor and move to a public cloud. Even the teams that manage these applications can be unfamiliar with cloud terminology and concepts. In this session for enterprise IT architects and developers, Brad Schick, CTO of Skytap and Skytap customers Fulcrum, DataXu and F5 will share their insights into why the evolution of enterprise applications will lead to hybrid applications that opportunistically take advantage of cloud-based services. Brad will then demonstrate Skytap Cloud with Amazon Web Services and discuss how enterprises can easily achieve this integration today for application development and testing.
Similar to May 2013 Federal Cloud Computing Summit Keynote by David Cearly (20)
Speaker Presention by Irena Bojanova of the University of Maryland University...Tim Harvey
Irena Bojanova, Professor & Program Director in Information and Technology Systems at the University of Maryland University College, spoke at the Federal Cloud Computing Summit on Dec. 17, 2013 at the Ronald Reagan Building in Washington, D.C.
Speaker Presention by Adam Porter of the University of Maryland | December 17...Tim Harvey
Adam Porter, Professor in the Deptartment of Computer Science at the University of Maryland, spoke at the Federal Cloud Computing Summit on Dec. 17, 2013 at the Ronald Reagan Building in Washington, D.C.
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Tim Harvey
Justin Brunelle of MITRE gave a recap of the MITRE Cloud Collaboration Sessions at the Federal Cloud Computing Summit on Dec. 17, 2013 at the Ronald Reagan Building in Washington, D.C.
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Tim Harvey
Bill Schlough, Senior VP and CIO of the 2012 World Champion San Francisco Giants, gave the visionary keynote at the Federal Cloud Computing Summit on Dec. 17, 2013 at the Ronald Reagan Building in Washington, D.C.
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Tim Harvey
The Advanced Mobility Academic Research Center (AMARC) hosted a Citrix Technical Exchange on July 18 at The Hamilton in Washington, D.C. Faisal Faisal Iqbal, Director of Systems Engineering, U.S. Public Sector for Citrix spoke at the event, which featured a Digital Government Strategy panel with Anil Karmel (NNSA), Brad Nix (USDA FNS) and Dan Mintz (AMARC).
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. Key Issues
1. What is the Current State of Cloud Computing
Adoption?
2. How should agencies approach cloud
computing, and how does it change the IT
environment?
3. How does cloud relate to other key technology
trends?
4. When Everything is Called Cloud …
Cloud Computing Loses It’s Meaning
Service-
Based
Metered
by Use
Internet
Technologies
Consumer
Provider
A style of computing in which scalable and elastic IT-enabled capabilities
are delivered as a service to consumers using Internet technologies
• Open
• Limited
• Provider
"Virtual" Private
Cloud Service
• Limited
• Full
• Provider
Community
Cloud Service
• Closed
• Exclusive
• Consumer
Private Cloud
Service
• Open
• Full
• Provider
Public Cloud
Service
Self-
Service
Access:
Sharing:
Ownership:
Shared Scalable & Elastic Automated
The Service
5. Cloud Computing Service Layers and
Vendor Offerings
System Infrastructure Services
App. Infrastructure Services
Enabling Technologies
Cloud Services Professional Services
for Consumption
Marketplace, Brokerage,
Management and/or
Security Services
Consuming Cloud Services
Building or Operating Public/Private Cloud Services
Professional Services
for Build/Run
Service Enablers & Implementation
Application Services
Business & Info. Services
6. Key Issues
1. What is the Current State of Cloud Computing
Adoption?
2. How should agencies approach cloud
computing, and how does it change the IT
environment?
3. How does cloud relate to other key technology
trends?
7. 6
Survey Question:
Are You Using Public Cloud Services?
SaaS
PaaS
IaaS
44%
36%
36%
Source: Gartner, Future of IT Survey, November 2012
Today In 12 Months
87%
80%
80%
8. 7
Survey Question:
What Cloud Approach Do You Prefer?
Private
Cloud
34%
Hosted
Cloud
25%
Community
Cloud
12%
Public
Cloud
12%
Hybrid
7%
Not
Cloud
10%
Source: Gartner Cloud Survey, July 2012
Private
Hosted Private
Community
Public
Hybrid
Not Cloud
9. 8
Survey Question:
What Cloud Approach Do You Prefer?
27%
37%
37%
32%
31%
35%
40%
23%
22%
24%
31%
23%
30%
24%
14%
10%
12%
12%
15%
11%
11%
13%
12%
10%
12%
15%
12%
9%
10%
7%
8%
7%
6%
4%
8%
12%
13%
9%
6%
9%
8%
8%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Manufacturing & Natural Resources
Financial Services
Services
Communications & Media
Government
Retail & Wholesale
Other
Private Cloud Hosted Cloud Community Cloud Public Cloud Hybrid Not Cloud
Source: Gartner Cloud Survey, July 2012
10. Hybrid Cloud Aspirations are Sky-High
Yes
70%
Maybe
23%
No
7%
Gartner Data
Center Conference
Poll, December
2012
(N = 129)
Will your enterprise
be pursuing a
hybrid cloud
computing strategy
by 2015?
While very few enterprises have established a hybrid cloud service so
far, the interest is very high
11. High Growth Expected in Cloud Infrastructure
Services But SaaS Still Larger Overall
• Highest growth rates in
Emerging Asia/Pacific,
China, Latin America
and Eurasia
• Greatest increase in
spending in N. America
• India, Indonesia and
China show the highest
growth rates in Asia
• Western Europe growth
rates continue as the
lowest worldwide
• PaaS is smaller but
big impact
Source: Gartner, Public Cloud Services Forecast, Sept 2012 (G00238928)
* Excluding Cloud Advertising
0
10
20
30
40
50
60
2010 2011 2012 2013 2014 2015 2016
MarketSize($USBillions)
BPaaS SaaS PaaS IaaS Mgmt & Sec
BPaaS SaaS PaaS IaaS Mgmt & Sec
5-year CAGR (2011-2016) 11.3% 19.1% 26.6% 41.8% 26.9%
12. 11
But Public Cloud Spending Remains a
Minority of Total IT spending
2012 2017
Infrastructure Software
& Middleware
Data Center
Outsourcing
Business Process
Outsourcing
Application Software
Source: Gartner, Public Cloud Services Forecast, Mar 2013 (G00248727),
Enterprise Software Forecast, Mar 2013 (G00249485), IT Services Forecast, Mar 2013 (G00248578)
13. Key Issues
1. What is the Current State of Cloud Computing
Adoption?
2. How should agencies approach cloud
computing, and how does it change the IT
environment?
3. How does cloud relate to other key technology
trends?
14. A Strategic Model for Cloud ComputingEssentialCloudStrategyElements
How will we secure, manage and govern cloud
services across internal, external and hybrid
environments?
3
Where and how should agencies implement private
cloud environments?
2
Where and how should agencies consume cloud
computing services?1
How does cloud computing factor into application
strategy and architecture?
4
Are there opportunities for the agency to become a
cloud computing service provider?5
15. Agility
Cost
Security
Transparency
Establish a Decision Framework
Less Complexity
More Focus
Self-Service
Innovation
Assurance
Lock-in
Integration
Financial
• Examine by service type,
workload, data and use case.
• Consider how to mitigate risk.
• Examine market maturity &
total cost including exit costs
Challenges
Benefit
Low and
Manageable
High or
Unmanageable
Highand
Clear
Lowor
Uncertain
Avoid
Embrace
Public
Experiment
Consider
Private
16. Take a Realistic View of Cloud Risks
• Cloud services are not
inherently more or less secure
than traditional outsourcing.
• Map workloads and data to the
right "style" of cloud security.
• Adapt security processes to
address cloud computing.
• Separation of duties and
change control are key risks.
• Examine software and cloud-
based options to mitigate risks.
• Integrate cloud services into
situationally aware SIEM*.
Audit and
Event
Streams
Cloud
Application
Cloud
Infrastructure
Cloud
Application
Data Centers
Application
Infrastructure
Application
Unified View
*security information and event management
17. Build a Cloud Services Sourcing
Capability
• Modify existing service procurement
processes to accommodate the
cloud.
• Focus negotiations on business
issues, not technical
implementations.
• Selectively review provider
implementation details.
• Service commitments are delivered
via standard self-service interfaces.
• Understand the real long-term
commitment behind SLA and price.
• Don't ignore hidden upfront costs.
• Develop contingency plans.
Standardized & Fixed
Terms & Conditions
Customized & Negotiated
Terms & Conditions
Cloud
Computing
Traditional
Outsourcing
Service Acquisition Models
18. Consider Use of Cloud Brokerage
The Simple Cloud Model
The Cloud Brokerage Model
Providers
Brokerage
Point-to-Point
Relationships
Intermediated
Relationships
Strengths
• Direct relationship with customer
• Low barrier to adoption
Challenges
• "Take it or leave it" cloud services
• Multiple provider complexity
Strengths
• Value-added services
• Centralized governance
Challenges
• Indirect customer relationship
• Skills lacking, unfocused and
narrow
Consumers
Cloud Services
Cloud Services
Cloud Services
19. Private Cloud Is More Than Virtualization
CloudManagement
Platform
Virtualizationand
PhysicalLayer
Resource
Management
• Resource State Management
• Performance Management
• Security
Service
Management
• Service Catalog
• Service-Level Management/Monitoring
• Service Configuration and Provisioning
• Service Demand and Financial Management
Resources • Physical and Virtual Resources
• Component Managers
Access
Management
• Self-Service/Programmable Interface
• Subscriber Management
• Identity and Access Management
Service
Optimization
• Governor (i.e., Policies for Placement and Elasticity)
• Orchestration
• Federation and Multisite
ExternalManagementAPIs
(Incident/Change/Release,Analytics)
20. CMP Vendor Landscape:
A Crowded and Fast-Moving Market
Fabric-Based Infrastructure
• Cisco Intelligent Automation for Cloud
(Cloupia)
• Dell VIS Creator (Gale Technologies
and enStratius)
• HP CloudSystem Matrix
• IBM PureFlex System Manager
and PureApplication System
• VCE vCloud Director and CIAC
Infrastructure Software
• Citrix CloudPlatform
• IBM Workload Deployer
• Microsoft System Center 2012
• Oracle Enterprise Manager 12c (Nimbula)
• Red Hat CloudForms (ManageIQ)
• VMware vCloud Director and vCloud
Automation Center
Point Solution Vendors
• Abiquo
• Adaptive Computing
• Cloudbolt
• Egenera
• Embotics
• Flexiant
• Gravitant
• NetIQ (Novell Cloud Manager)
• RightScale
• ServiceMesh
• Zimory
Traditional Big Four IT
Operations Management
• BMC Software CLM
• CA AppLogic (Automation Suite for Cloud)
• HP CSA
• IBM SmartCloud Orchestrator
Open Source
• CloudStack
• Eucalyptus
• OpenNebula
• OpenStack
21. From Software Defined Networking
To Software Defined Environments
• SDN is a new way to operate
networks
• Moves control plane (and potentially
the value) from individual devices to
a central controller
- Abstracts network layer to drive
agility and flexibility
- Allows configuration of the network
from one place not each individual
device
• Beyond SDN
- Fabric Based Computing
20
BandwidthGrowth
• Cloud Service Provider Needs Drive Innovation
22. The Future is Hybrid:
Extend Security, Management & Governance
IT
Cloud Services Broker
Enterprise App Store
Private
Cloud
Services
Public
Cloud
Services
Traditional
Services
Public
Cloud
Services
IT should become the
trusted broker for most/all
IT-based services
Hybrid IT
Service Catalog
Service-Level Mgmt.
Chargeback
Capacity Mgmt.
Service Governor
Orchestration
Optimization
Cloud Management
PlatformEnterprise
23. Hybrid IT
Hybrid IT is the mission and the operational model for IT infrastructure
and operations in a cloud computing world.
Yes
58%
Not
Sure
31%
No
10%
Gartner Data
Center
Conference Poll,
December 2012
(N = 127)
Will your IT
organization
pursue an internal
Hybrid IT strategy
by 2015?
Hybrid IT Organization
24. Hybrid IT:
The Organizational Perspective
• Assist service
development
• Self-service
• Metered use
• User focus
• Evaluate internal &
external services
• Forge relationship
with CSPs
• Manage service
consumption
IT organization acting as
provider and broker
Private
Clouds
Public
Clouds
Hybrid
Clouds
25. Developing Cloud-Based Solutions
• Multiple Approaches:
- SaaS configuration and mashup.
- Migrate and enhance enterprise
software (custom or packaged).
- Innovative cloud applications.
• Tools and Techniques:
- Build it from scratch with linear
scalability, parallel processing
and distributed data.
- Leverage application services
and/or platform services.
- MapReduce and Hadoop.
- GData and OData access
models.
- Coordinate Web design and
application development.
- Cloud-Centric Design
Developer
Browser/RIA
or Traditional
Client
System Infrastructure
Sys./App. Infra.
Application
Consumer
Global-
Class App.
SaaS Config.
and Mashup
Traditional
Software
27. Think Like a Cloud Services Provider
• Focus on high-value targets.
• For the end user
• For the developer
• Everything is a platform.
• Public Web APIs are a key
component of your business
strategy.
• Build a public Web API as
part of next-generation AD
projects.
• Develop focused, cohesive
and loosely coupled
services.
• Make sure you get value,
even if nobody adopts it
externally.
Partners
Business Service
Information Service
Application Service
Website
Customers
Suppliers
Portal & API
Internal
28. Key Issues
1. What is the Current State of Cloud Computing
Adoption?
2. How should agencies approach cloud
computing, and how does it change the IT
environment?
3. How does cloud relate to other key technology
trends?
30. Cloud Computing & The Nexus of Forces
Cloud in the
Nexus of Forces
Personal Cloud
Client/Cloud
Cloud
Collaboration
Cloud is a
foundation of
the Nexus,
but the
Nexus in turn
enhances
new cloud
related
segments
Cloud + Social
Cloud + Mobile
Big Data
Contextual Apps
Cloud + Info.
31. Recommendations
Be proactive — the worst strategy is to ignore the cloud.
Develop selection criteria and governance models for each layer of the
cloud computing service hierarchy:
- Realistically assess risks and carefully embrace new trust models.
- Modify existing service procurement models, and build new cloud
governance, trust and security models.
Use a business impact analysis to determine when, where and why to
adopt cloud computing:
- Determine where migrating or enhancing applications deliver value.
- Consider innovation applications that benefit from unique cloud
capabilities.
Ensure that private cloud initiatives extend beyond virtualization to
address access, service and resource management.
Use external cloud brokers to reduce complexity and enhance
performance.
Position IT as a cloud service broker across internal and external
cloud services.
Coordinate cloud and mobile strategies.