This document provides an agenda for an event on international post-graduate management and high performance networks. The agenda includes topics on high performance network management, cloud computing applications, and strategic technologies identified by Gartner from 2009 to 2012. It also outlines the objectives, cycles, and curriculum of an international post-graduate program in management and governance of high performance networks.
Cloud Computing through FCAPS Managed Services in a Virtualized Data Centervsarathy
This document discusses driving cloud computing through managed services in a virtualized data center. It introduces cloud computing and defines it as more than just an on-demand XaaS stack. The cloud must address issues like massive scalability, reliability, availability, performance optimization, and security. It also discusses how the cloud can help reduce rising data center complexity and costs which are getting out of control.
The document discusses cloud computing and its potential benefits for the Department of Defense (DoD). It provides various definitions of cloud computing from different organizations and outlines some realities of adopting cloud computing, including that it is a disruptive technology that will require planning, pilots, and lessons learned. The document also discusses how moving the desktop into the cloud could pay huge returns through cost savings, agility, and performance.
Overview of technology_visions_v30a_mar_11_blogbbccouk
The document provides summaries of the BBC's technology strategy visions for various areas. It includes visions for:
- Completing the transition from analog to digital television while enabling new services and developing next generation broadcast technologies.
- Enabling high definition (HD) to become fully integrated in content production, storage, and distribution by 2012-2013 so that HD is the expected quality standard.
- Being responsive to changes in stereoscopic 3D and exploring opportunities through production trials while addressing technology challenges.
Open Data Center Alliance Solution Provider Panel Discussion at 2011 Intel Developer Forum
Panel: Marvin Wheeler, ODCA Chair; Winston Bumpus, VMware; Brent Schroeder, Dell; Shannon Williams, Citrix; Gordon Haff, Red Hat; Sanjog Gad, EMC
The document discusses various media file formats for broadcasters, including:
- Image and compression formats for high definition such as resolution, frame rate, and codecs
- File formats for high definition production like MXF and AAF
- Formats are proliferating with the rise of HD, and broadcasters must consider formats for acquisition, production, distribution and display to different screens.
Technology Challenges in the Networked SocietyEricsson Labs
The document discusses technology challenges in the networked society presented at Mobile World Congress 2013. It addresses challenges related to devices, data/information, services, networks, clouds, management, security, and sustainability in an increasingly connected world. Key issues include supporting a wide range of devices and connectivity methods, ensuring coverage and scalability, managing large amounts of data, and maintaining security, privacy, and trust across complex cloud and network infrastructures.
Mobile network data is a unique and valuable asset for mobile operators. By analyzing network data and combining it with external data sources, operators can gain deep insights into consumer behavior and network performance. This allows operators to better understand individual consumers, identify new business opportunities through partnerships, and improve network efficiency. The prototype data analysis tool presented demonstrates how network data can be made understandable through visualization and interaction. It highlights the potential for increased consumer loyalty and new revenue streams from leveraging the power of big data. However, consumer awareness and concerns regarding privacy must be addressed through transparency, perceived value of any data sharing, and only utilizing anonymized and aggregated information.
Cloud Computing through FCAPS Managed Services in a Virtualized Data Centervsarathy
This document discusses driving cloud computing through managed services in a virtualized data center. It introduces cloud computing and defines it as more than just an on-demand XaaS stack. The cloud must address issues like massive scalability, reliability, availability, performance optimization, and security. It also discusses how the cloud can help reduce rising data center complexity and costs which are getting out of control.
The document discusses cloud computing and its potential benefits for the Department of Defense (DoD). It provides various definitions of cloud computing from different organizations and outlines some realities of adopting cloud computing, including that it is a disruptive technology that will require planning, pilots, and lessons learned. The document also discusses how moving the desktop into the cloud could pay huge returns through cost savings, agility, and performance.
Overview of technology_visions_v30a_mar_11_blogbbccouk
The document provides summaries of the BBC's technology strategy visions for various areas. It includes visions for:
- Completing the transition from analog to digital television while enabling new services and developing next generation broadcast technologies.
- Enabling high definition (HD) to become fully integrated in content production, storage, and distribution by 2012-2013 so that HD is the expected quality standard.
- Being responsive to changes in stereoscopic 3D and exploring opportunities through production trials while addressing technology challenges.
Open Data Center Alliance Solution Provider Panel Discussion at 2011 Intel Developer Forum
Panel: Marvin Wheeler, ODCA Chair; Winston Bumpus, VMware; Brent Schroeder, Dell; Shannon Williams, Citrix; Gordon Haff, Red Hat; Sanjog Gad, EMC
The document discusses various media file formats for broadcasters, including:
- Image and compression formats for high definition such as resolution, frame rate, and codecs
- File formats for high definition production like MXF and AAF
- Formats are proliferating with the rise of HD, and broadcasters must consider formats for acquisition, production, distribution and display to different screens.
Technology Challenges in the Networked SocietyEricsson Labs
The document discusses technology challenges in the networked society presented at Mobile World Congress 2013. It addresses challenges related to devices, data/information, services, networks, clouds, management, security, and sustainability in an increasingly connected world. Key issues include supporting a wide range of devices and connectivity methods, ensuring coverage and scalability, managing large amounts of data, and maintaining security, privacy, and trust across complex cloud and network infrastructures.
Mobile network data is a unique and valuable asset for mobile operators. By analyzing network data and combining it with external data sources, operators can gain deep insights into consumer behavior and network performance. This allows operators to better understand individual consumers, identify new business opportunities through partnerships, and improve network efficiency. The prototype data analysis tool presented demonstrates how network data can be made understandable through visualization and interaction. It highlights the potential for increased consumer loyalty and new revenue streams from leveraging the power of big data. However, consumer awareness and concerns regarding privacy must be addressed through transparency, perceived value of any data sharing, and only utilizing anonymized and aggregated information.
The document discusses cloud computing and key considerations for investigating cloud solutions. It provides examples of how various companies have benefited from cloud-based solutions, including cost savings, flexibility, and improved collaboration. The document outlines factors to consider when evaluating cloud options such as workloads, data security, and return on investment areas. Cloud computing allows for automation, standardization, and labor leverage that can reduce IT costs.
This document provides an overview of Microsoft solutions for broadcasters, focusing on solutions demonstrated at the NAB Show Germany. It discusses solutions for editorial collaboration and mobile journalism, digital content management, broadcast business management, media XRM, broadcast business intelligence, and online video services. Case studies are presented on using Microsoft solutions for editorial collaboration at the BBC and for digital content management and news content aggregation at NBC Universal.
EMC offers various solutions for real-time integrated business intelligence including virtualized computing environments to support on-demand resources, intelligent content management of analytical results, and collaborative business process management environments to drive discussion and decision making around business intelligence. EMC also provides infrastructures that link traditional transactional environments like SAP with real-time integrated business intelligence.
Corporate Senior Vice President, Noriyuki Toyoki, shares Fujitsu’s vision of the increasingly prevalent role technology takes in our daily lives. Everything you ever wanted to know about big data, smart grids, supercomputing and how they can support society through disaster recovery, healthcare ICT and food production - to create a human centric intelligent society.
A presentation to the ETIS Business Intelligence & Data Warehousing Working Group in Brussels 22-Mar-13 discussing what Saas & Cloud means and how they will affect BI in Telcos
This document discusses how information security has failed to evolve with advances in software development and web applications. Specifically:
- Security approaches like firewalls and SSL have not changed meaningfully in over 13 years, despite huge growth in web integration, distributed applications, and reliance on web apps for business functions.
- As software evolved to integrate disparate systems using SOAP and XML, security did not develop models for authentication, authorization, or confidentiality for these new programming models.
- For security to progress, it needs to learn from software development practices and priorities like virtualization, interoperability, and reusability - and deliver properties like authentication and authorization as widely deployed services.
Enterprise Cloud - The Evolution of IT StrategyRightScale
RightScale Conference Santa Clara 2011: Enterprises are moving to the cloud. Josh Fraser will outline how to deliver IT services faster and support line-of-business requirements better. Find out how hybrid and private cloud computing can advance your business goals. Leverage multiple resource pools and help you identify which use cases are best suited for public, private, and hybrid clouds.
What is Cloud Computing? It can be defined as a web-based technology that remotely delivers computing resources, namely hardware, software and information as services over a network. Learn more about it here. http://www.microsoft.com/en-in/server-cloud/cloud-computing/default.aspx
The document discusses the evolution of network security over time as networks have become more complex and connected. It describes how early networks were simpler but grew larger and became virtualized and located in multiple cloud environments. This trend of increased connectivity between all kinds of devices and systems from any location creates new security challenges. The document advocates for increased security automation through standards and highlights some recent cyber attacks to demonstrate ongoing threats. It suggests collaboratively sharing ideas and brainstorming as ways to improve network security defenses.
Virtual Campfire/iNMV Storytelling on the iPhoneYiwei Cao
This document summarizes a workshop on future mobile applications. It discusses the UMIC research cluster, challenges for mobile multimedia management, the Virtual Campfire architecture for mobile multimedia management, and the Virtual Campfire concept. It also summarizes the iNMV application for storytelling on the iPhone and the agenda for the workshop, including presentations on iNMV features, the developing environment, implementation experiences, and installation instructions for workshop participants.
The document discusses key trends in information security including efficiency, complexity, risk, consumerization of IT, cloud computing and virtualization. It notes Symantec's focus on governance, information-centric security, infrastructure protection and intelligence to address these trends. Symantec cloud security offerings like SYMC.Cloud are positioned as alternatives to Amazon and Ebay for addressing the 12-62% efficiency gains possible through cloud computing. Next steps involve leveraging Symantec's solutions.
PCTY 2012, Cloud security (real life) v. Ulf FegerIBM Danmark
The document discusses cloud security and provides a roadmap for organizations transforming to the cloud. It addresses:
1. Customer expectations around cloud security and the need to understand their environments and security concepts.
2. Transformation of security involves adapting existing methodologies and technologies to the cloud while ensuring policies, processes, and expectations are also updated.
3. A cloud security roadmap should cover security, compliance, governance, and the handling of business expectations as organizations move workloads and assets to the cloud. It is not limited just to technology.
Getting Connected And Trusting The ConnectionSuhaimi Nordin
This document discusses Telekom Malaysia's Multimedia Service Architecture (MASA). MASA has four main components: the core infrastructure, enabling system platform, enabling IP technology, and interactive service platform. It provides an overview of each component and examples of technologies that fall under each. The document emphasizes that MASA is focused on developing a value-chain type of interactive service platform to provide customers a complete one-stop-solution for multimedia services. It also references Telekom Malaysia's strategy to expand into new markets and partnership opportunities through its internet and multimedia services.
The document discusses how datacenter networks are evolving from fixed, hierarchical designs optimized for client/server transactions to dynamic networks better suited to cloud computing and big data needs. This requires flattening network topologies, converging server and storage networks onto high-speed Ethernet fabrics, and introducing more intelligence and flexibility at the network edge to support virtualized, application-driven workloads. The network must be able to quickly and reliably handle increased server-to-server traffic within the datacenter in order to enable real-time analytics across massive and diverse data sources.
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...IMEX Research
The document discusses implementing a next generation data center using server blades, clustering, and virtualization. It describes consolidating servers onto blade servers with shared networking, storage, power and cooling infrastructure for improved utilization and management. Key benefits include reduced costs, improved availability, manageability and scalability compared to traditional server architectures.
Knowledge Partnership provides design and execution services for mobile communications including operational support systems, business support systems, and enterprise support systems. They help clients with network planning, smart devices, billing, marketing, and other areas. Knowledge Partnership has extensive experience across the mobile value chain and can help clients with strategy, business operations, systems, infrastructure management, and solutions architecture.
Michael Lawrey, Executive Director Architecture, Online & Media spoke to the Cloud Conference & Expo in Sydney on the importance of service level agreements and standards in Cloud Computing, particularly at an enterprise level.
This document discusses the need to modernize data center networks to make them more application-fluent. It describes the various pressures on current networks from server virtualization, real-time applications, mobile devices, and video. It proposes moving to a switching fabric with low-latency connectivity and automatic adaptation to virtual machine movement. Key components of Alcatel-Lucent's solution include Pods for high-density top-of-rack switching, a Mesh to interconnect Pods, and Virtual Network Profiles to manage applications as services and optimize performance. The approach aims to improve user experience, network agility, and reduce costs.
Cloud computing offers potential opportunities for Bangladesh but also faces challenges. It could enable e-governance and provide affordable options for SMEs through reduced costs. However, security concerns, reliability questions, and a lack of confidence in the technology are limiting customer adoption. The country needs infrastructure upgrades, new laws and policies, and incentives to address gaps in order to realize cloud computing's benefits. Government support will be important to build reliability and address reliability concerns that are currently barriers for potential customers.
Cloud Computing for Banking
What does the future of cloud computing for banking look like—both in the near and long terms? Accenture sees cloud computing as an important step in the continuing industrialization of IT and thus capable of ultimately playing a key role in enabling high performance.
The document discusses cloud computing and key considerations for investigating cloud solutions. It provides examples of how various companies have benefited from cloud-based solutions, including cost savings, flexibility, and improved collaboration. The document outlines factors to consider when evaluating cloud options such as workloads, data security, and return on investment areas. Cloud computing allows for automation, standardization, and labor leverage that can reduce IT costs.
This document provides an overview of Microsoft solutions for broadcasters, focusing on solutions demonstrated at the NAB Show Germany. It discusses solutions for editorial collaboration and mobile journalism, digital content management, broadcast business management, media XRM, broadcast business intelligence, and online video services. Case studies are presented on using Microsoft solutions for editorial collaboration at the BBC and for digital content management and news content aggregation at NBC Universal.
EMC offers various solutions for real-time integrated business intelligence including virtualized computing environments to support on-demand resources, intelligent content management of analytical results, and collaborative business process management environments to drive discussion and decision making around business intelligence. EMC also provides infrastructures that link traditional transactional environments like SAP with real-time integrated business intelligence.
Corporate Senior Vice President, Noriyuki Toyoki, shares Fujitsu’s vision of the increasingly prevalent role technology takes in our daily lives. Everything you ever wanted to know about big data, smart grids, supercomputing and how they can support society through disaster recovery, healthcare ICT and food production - to create a human centric intelligent society.
A presentation to the ETIS Business Intelligence & Data Warehousing Working Group in Brussels 22-Mar-13 discussing what Saas & Cloud means and how they will affect BI in Telcos
This document discusses how information security has failed to evolve with advances in software development and web applications. Specifically:
- Security approaches like firewalls and SSL have not changed meaningfully in over 13 years, despite huge growth in web integration, distributed applications, and reliance on web apps for business functions.
- As software evolved to integrate disparate systems using SOAP and XML, security did not develop models for authentication, authorization, or confidentiality for these new programming models.
- For security to progress, it needs to learn from software development practices and priorities like virtualization, interoperability, and reusability - and deliver properties like authentication and authorization as widely deployed services.
Enterprise Cloud - The Evolution of IT StrategyRightScale
RightScale Conference Santa Clara 2011: Enterprises are moving to the cloud. Josh Fraser will outline how to deliver IT services faster and support line-of-business requirements better. Find out how hybrid and private cloud computing can advance your business goals. Leverage multiple resource pools and help you identify which use cases are best suited for public, private, and hybrid clouds.
What is Cloud Computing? It can be defined as a web-based technology that remotely delivers computing resources, namely hardware, software and information as services over a network. Learn more about it here. http://www.microsoft.com/en-in/server-cloud/cloud-computing/default.aspx
The document discusses the evolution of network security over time as networks have become more complex and connected. It describes how early networks were simpler but grew larger and became virtualized and located in multiple cloud environments. This trend of increased connectivity between all kinds of devices and systems from any location creates new security challenges. The document advocates for increased security automation through standards and highlights some recent cyber attacks to demonstrate ongoing threats. It suggests collaboratively sharing ideas and brainstorming as ways to improve network security defenses.
Virtual Campfire/iNMV Storytelling on the iPhoneYiwei Cao
This document summarizes a workshop on future mobile applications. It discusses the UMIC research cluster, challenges for mobile multimedia management, the Virtual Campfire architecture for mobile multimedia management, and the Virtual Campfire concept. It also summarizes the iNMV application for storytelling on the iPhone and the agenda for the workshop, including presentations on iNMV features, the developing environment, implementation experiences, and installation instructions for workshop participants.
The document discusses key trends in information security including efficiency, complexity, risk, consumerization of IT, cloud computing and virtualization. It notes Symantec's focus on governance, information-centric security, infrastructure protection and intelligence to address these trends. Symantec cloud security offerings like SYMC.Cloud are positioned as alternatives to Amazon and Ebay for addressing the 12-62% efficiency gains possible through cloud computing. Next steps involve leveraging Symantec's solutions.
PCTY 2012, Cloud security (real life) v. Ulf FegerIBM Danmark
The document discusses cloud security and provides a roadmap for organizations transforming to the cloud. It addresses:
1. Customer expectations around cloud security and the need to understand their environments and security concepts.
2. Transformation of security involves adapting existing methodologies and technologies to the cloud while ensuring policies, processes, and expectations are also updated.
3. A cloud security roadmap should cover security, compliance, governance, and the handling of business expectations as organizations move workloads and assets to the cloud. It is not limited just to technology.
Getting Connected And Trusting The ConnectionSuhaimi Nordin
This document discusses Telekom Malaysia's Multimedia Service Architecture (MASA). MASA has four main components: the core infrastructure, enabling system platform, enabling IP technology, and interactive service platform. It provides an overview of each component and examples of technologies that fall under each. The document emphasizes that MASA is focused on developing a value-chain type of interactive service platform to provide customers a complete one-stop-solution for multimedia services. It also references Telekom Malaysia's strategy to expand into new markets and partnership opportunities through its internet and multimedia services.
The document discusses how datacenter networks are evolving from fixed, hierarchical designs optimized for client/server transactions to dynamic networks better suited to cloud computing and big data needs. This requires flattening network topologies, converging server and storage networks onto high-speed Ethernet fabrics, and introducing more intelligence and flexibility at the network edge to support virtualized, application-driven workloads. The network must be able to quickly and reliably handle increased server-to-server traffic within the datacenter in order to enable real-time analytics across massive and diverse data sources.
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...IMEX Research
The document discusses implementing a next generation data center using server blades, clustering, and virtualization. It describes consolidating servers onto blade servers with shared networking, storage, power and cooling infrastructure for improved utilization and management. Key benefits include reduced costs, improved availability, manageability and scalability compared to traditional server architectures.
Knowledge Partnership provides design and execution services for mobile communications including operational support systems, business support systems, and enterprise support systems. They help clients with network planning, smart devices, billing, marketing, and other areas. Knowledge Partnership has extensive experience across the mobile value chain and can help clients with strategy, business operations, systems, infrastructure management, and solutions architecture.
Michael Lawrey, Executive Director Architecture, Online & Media spoke to the Cloud Conference & Expo in Sydney on the importance of service level agreements and standards in Cloud Computing, particularly at an enterprise level.
This document discusses the need to modernize data center networks to make them more application-fluent. It describes the various pressures on current networks from server virtualization, real-time applications, mobile devices, and video. It proposes moving to a switching fabric with low-latency connectivity and automatic adaptation to virtual machine movement. Key components of Alcatel-Lucent's solution include Pods for high-density top-of-rack switching, a Mesh to interconnect Pods, and Virtual Network Profiles to manage applications as services and optimize performance. The approach aims to improve user experience, network agility, and reduce costs.
Cloud computing offers potential opportunities for Bangladesh but also faces challenges. It could enable e-governance and provide affordable options for SMEs through reduced costs. However, security concerns, reliability questions, and a lack of confidence in the technology are limiting customer adoption. The country needs infrastructure upgrades, new laws and policies, and incentives to address gaps in order to realize cloud computing's benefits. Government support will be important to build reliability and address reliability concerns that are currently barriers for potential customers.
Cloud Computing for Banking
What does the future of cloud computing for banking look like—both in the near and long terms? Accenture sees cloud computing as an important step in the continuing industrialization of IT and thus capable of ultimately playing a key role in enabling high performance.
- Cloud computing represents a major shift in enterprise IT that will transform the industry over several years.
- It offers opportunities for new cloud-based application and service companies as well as those providing enabling infrastructure.
- Virtualization technologies have allowed data centers to transition from isolated silos to automated and optimized cloud environments, improving efficiency and agility.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
The document discusses bandwidth demand growth, the shift to cloud computing, and data center evolution. It summarizes a presentation about building infrastructure for exponential bandwidth growth, the advantages of third party data center facilities, an SDN case study, and questions. Lumos Networks and Iron Mountain are partnering to provide high-capacity fiber networks and secure data center colocation using Plexxi's SDN technology.
The document discusses bandwidth demand growth, the shift to cloud computing, and data center evolution. It summarizes a presentation about building infrastructure for exponential bandwidth growth, the advantages of third party data center facilities, an SDN case study, and questions. Lumos Networks and Iron Mountain are partnering to provide high-capacity fiber networks and secure data center colocation using Plexxi's SDN technology.
This document discusses the evolving nature of application and service management in cloud and shared IT infrastructures. It outlines how IT is transforming to shared infrastructure models and the need to intelligently manage this transformation through visibility, control, and automation. Specifically, it discusses how IBM provides:
1. Infrastructure monitoring across compute, storage, network resources to track cloud service levels and optimize workloads.
2. Event management to proactively identify and resolve issues impacting applications and end users.
3. Application performance management to ensure strong user experiences across hybrid environments.
The document argues this approach helps customers attain the economic and service benefits of cloud while addressing challenges around availability, composition, performance, utilization and capacity in dynamic
This document provides an overview of Serenus, an Australian company specializing in cloud computing innovations. It discusses how the internet of things is driving innovation in network software. While cloud adoption by businesses is growing, current solutions primarily focus on data centers. Serenus looks beyond data centers to develop systems that provide end-to-end performance management of the entire cloud ecosystem, including networks, internet access, security, and user devices. As businesses increasingly rely on cloud services, control and management of the connectivity between data centers and users becomes important.
Ensuring Privacy & Transparency within Hybrid Clouds Marcin Kotlarski
• Allowing portability of data across any device without compromising security
• Establishing security benchmarks and tackling concerns over transparency
• Moving from private Ethernet clouds to the public domain: where is the data?
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdfInSync2011
The IT landscape has changed significantly due to three major trends:
1) Moore's law has led to increased computing power and data storage capacity but managing complexity and power efficiency is now more important.
2) Server virtualization has improved utilization and flexibility but most organizations have not virtualized mission critical applications.
3) Cloud computing is seen not just as a technology but as capabilities around agility, efficiency, and cost that are aligned to business needs.
The document discusses priorities for government CIOs, including expanding citizen services while controlling costs, driving inter-agency collaboration, and ensuring security and privacy. It also covers the evolution of cloud computing and how it can help address challenges like scalability, efficiency, and budget pressures. The key to government adoption of cloud is establishing trust in areas like security, control, and service-level management.
This document discusses priorities for government CIOs, including expanding citizen services while controlling costs. It also covers the evolution of cloud computing and unified computing models. The document examines survey results on where IT investments can have the greatest impact on government performance and security. Finally, it outlines Cisco's cloud strategy to address customer needs through secure cloud solutions and enabling an open cloud market through technology innovation.
The document discusses cloud computing and infrastructure as a service (IaaS) models. It defines cloud computing as the real-time delivery and consumption of IT infrastructure, networking, and application services over the internet or private networks. IaaS leverages virtualization and automation to create scalable pools of hardware, software, and network resources that can be dynamically provisioned on demand. The document examines how enterprises can use IaaS to access a fully managed IT infrastructure from third-party providers in a flexible and cost-effective manner without large upfront capital expenditures.
Is Cloud Computing Right For You Wp101305Erik Ginalick
1. The document discusses whether cloud computing is right for businesses. It examines infrastructure as a service (IaaS), which allows businesses to access computing resources like servers and storage over the internet. IaaS provides benefits like reduced costs, increased flexibility and scalability, and faster deployment of applications and services.
2. While IaaS provides advantages, not every application is suited to the cloud. Businesses must evaluate each application to determine if factors like security, performance, and data sensitivity are compatible with cloud sourcing. They must also choose an IaaS provider that meets their specific needs in terms of services, expertise, and security capabilities.
3. In conclusion, IaaS can simplify IT infrastructure
Exploring a Cloud Based Approach to IT InfrastructureReadWrite
A key part of cloud-based information technology is the ability to deliver benefits to the business and to the overall technology infrastructure for the organization.
This briefing explores the ways to build a cloud-based IT infrastructure that allows for a dynamic environment that supports business needs.
Is Cloud Computing Right For You Wp101305Erik Ginalick
1. The document discusses whether cloud computing is right for businesses. It examines infrastructure as a service (IaaS), which allows businesses to access computing resources like servers and storage over the internet. IaaS provides benefits like reduced costs, increased flexibility and scalability, and faster deployment of applications and services.
2. While IaaS provides advantages, not every application is suited to the cloud. Businesses must evaluate each application to determine if factors like security, performance, and data sensitivity are compatible with cloud sourcing. They must also choose an IaaS provider that meets their specific needs in terms of services, expertise, and security.
3. In conclusion, IaaS can simplify IT infrastructure for
Similar to Gestão de Redes de Alta Performance (20)
A Falência do Modelo Atual do EAD
Como Aproveitar a Tendência da Digitalização e Gratuidade da Educação Online?
Mesa Redonda: 07/10/2014 – Sala 14
Prof.Dr. Carlos Longo – LAUREATE
Prof.Dr. Alessandro Rosini - FMU
Prof.Dr. Valderes Fernandes Pinheiro – IMPACTA
Coord.: Prof. Onófrio Notarnicola Filho – EDUZZ – Diretor de Curadoria
Coord.Centro de Empreendedorismo da Faculdade de Tecnologia Impacta - FIT
Sistemas de Informação Fator de Vantagem Competitiva para as OrganizaçõesImpacta Eventos
Sistemas de Informação
Fator de Vantagem Competitiva
para as Organizações
Prof.Onófrio Notarnicola Filho
FIT – Faculdade Impacta de Tecnologia
Coord.Centro de Empreendedorismo &Inovação
Supervisão e Coord.Estágios e TCC´s - SI
Geração “Y” e “Z” A Falência do Administrador Nasce um Novo Modelo de GestãoImpacta Eventos
O documento discute as gerações Y e Z e seu comportamento em relação a cargos executivos. Apresenta dados sobre o uso de redes sociais por essas gerações no Brasil e discute os desafios de reter talentos e motivar esses jovens profissionais, sugerindo novas abordagens de educação corporativa e treinamento.
Certificação LPI: qual sua importância no mercado de trabalho?Impacta Eventos
Conheça os diferenciais de uma das dez certificações mais procuradas pelos profissionais da tecnologia da informação, como suas vantagens, aceitação do mercado, dicas valiosas de estudo e preparação para o exame.
A produção editorial e os profissionais de criação.Impacta Eventos
Conhecimento e esclarecimento das etapas de produção de um livro, de forma otimizada, colocando em discussão detalhes, dificuldades e possíveis soluções.
O documento discute como o economista Steven Levitt correlacionou o aumento da legalização do aborto nos Estados Unidos com a queda subsequente nos índices de criminalidade a partir da década de 1990. Levitt argumenta que o perfil típico de um criminoso em potencial (baixa renda, pais ausentes etc.) corresponde ao perfil de quem procuraria um aborto, de modo que menos nascimentos indesejados levariam a menos criminosos no futuro.
Empregabilidade no mundo SAP - Adriana ManettiImpacta Eventos
O documento fornece informações sobre o mercado de TI no Brasil, oportunidades de carreira e o programa SAP University Alliances. Resume que o mercado de TI no Brasil está crescendo rapidamente, criando muitas vagas, e que o programa SAP University Alliances beneficia estudantes e universidades em todo o mundo para prepará-los para o mercado de trabalho em TI.
Tirando Sua Ideia do Papel - Lições aprendidas com a Startup MeuCarrinho - An...Impacta Eventos
O documento discute o aplicativo MeuCarrinho, que atingiu 600 mil downloads. O CEO André Nazareth descreve 10 lições aprendidas com a startup, incluindo a necessidade de focar com menos dinheiro e vender melhor as ideias. Ele também discute como criar um ecossistema empreendedor semelhante ao Vale do Silício.
U-Start - quando grandes ideias encontram grandes investidores - Luiz RinkeImpacta Eventos
O documento descreve os serviços e atividades da empresa U-Start, que conecta startups em estágio inicial com investidores europeus. A U-Start fornece serviços como identificação de oportunidades, diligência prévia e apoio pós-investimento. Ela também organiza a conferência Bloom para promover startups selecionadas de países como Brasil, Quênia e Rússia para investidores. A U-Start está estabelecendo uma parceria com a Impacta Empreenda 360 para apoiar startups de alunos no evento Bloom Brasil e na plataform
O documento descreve a história e evolução dos celulares, desde a primeira ligação comercial em 1983 até o cenário atual dominado por smartphones. Detalha os primeiros modelos como o Motorola DynaTAC de 1983 e a chegada dos celulares no Brasil na década de 1990. Explora também as funções atuais dos celulares, sistemas operacionais, fabricantes, estratégias de monetização de aplicativos e as perspectivas futuras do mercado móvel.
O documento discute os princípios do Lean Startup, enfatizando a importância de reduzir o risco e aumentar a eficiência por meio de experimentação, validação do problema com clientes e lançamento rápido de produtos mínimos viáveis.
O documento discute as tendências do mercado mobile. Ele mostra que as pessoas estão usando smartphones principalmente para se comunicar através de chat, vídeo e redes sociais, e passam muito tempo neles diariamente. Também lista as atividades mais populares em smartphones e mostra que novas aplicações atingem milhões de usuários rapidamente. Por fim, aponta para a gamificação, comércio mobile e marketing mobile como tendências importantes.
Impacta Empreenda 360 - Programa Start-Up BrasilImpacta Eventos
Por meio de dados atualizados e informações exclusivas de profissionais envolvidos na área, você poderá conhecerá os critérios de seleção e recomendação, além de formatos de proposta para o Programa Startup Brasil, que fornece financiamento e infraestrutura para o lançamento de ideias de negócios.
O documento discute os principais tópicos de segurança e desempenho em sistemas web e e-commerce. Aborda ameaças comuns como ataques de negação de serviço e engenharia social, e estratégias de segurança como balanceamento de carga, firewalls, criptografia e hardening de sistemas. Também discute performance, monitoramento, suporte e arquitetura de projetos complexos.
O documento discute oportunidades de carreira no e-commerce, fornecendo dados de mercado e detalhes sobre um curso chamado "E-commerce Professional". O curso capacita estudantes com habilidades em projeto, marketing digital, administração de operações de e-commerce e planejamento de negócios online. Testemunhos sugerem que o curso ajuda a encontrar ou criar oportunidades na área.
As estratégias de Marketing para E-Commerce - Hellison Lemos (Mercado Livre)Impacta Eventos
O documento discute as estratégias de marketing para e-commerce no Brasil, tendências para 2013 e o papel dos marketplaces. Resume que o mercado online brasileiro continua crescendo rapidamente, com destaque para categorias como saúde e beleza; dispositivos móveis representam fatia crescente do tráfego; e marketplaces como o MercadoLivre são importantes multiplicadores de vendas para lojistas.
Explorando o Mundo Apple, Desenvolvendo Aplicativos para IOS - Felipe Martins...Impacta Eventos
• Público-alvo :
Estudantes de cursos de graduação e cursos técnicos de tecnologia que desejam explorar a linguagem de programação iOS.
Profissionais da área de desenvolvimento de aplicativos móveis, incluindo jogos e aplicativos para celulares, com experiência prévia.
Profissionais autônomos com alguma familiaridade em programação orientada a objetos.
• Objetivo: apresentar conceitos e técnicas relativos ao ambiente de desenvolvimento iOS e sua aderência no cenário tecnológico atual.
• Conteúdo programático:
Apresentação;
Cenário de celulares no Brasil e no mundo;
Participação da plataforma iOS no Mercado;
Áreas de atuação;
Ambiente de programação "xcode";
Programa Apple Developer;
Cases de mercado;
O Arquiteto da Informação no Brasil e no Exterior, Desafios & Perspectivas - ...Impacta Eventos
O documento discute o papel e as responsabilidades de um Arquiteto de Informação no Brasil e no exterior. No Brasil, os Arquitetos de Informação enfrentam desafios como vender commodities e focar no entregável. Nos mercados estrangeiros maduros, eles precisam inovar, competir e focar na inovação e qualidade. A palestra descreve as habilidades, conhecimentos e áreas de atuação de um Arquiteto de Informação.
E-Commerce e Mídias Sociais Combinam? Diego Monteiro (Scup)Impacta Eventos
1. O documento discute como e-commerce e mídias sociais podem ser combinados para melhorar as vendas e o relacionamento com os clientes.
2. É sugerido que as empresas foquem mais no relacionamento do que na publicidade, monitorando as mídias sociais para gerar insights sobre o mercado, campanhas e possíveis crises.
3. As mídias sociais podem ser usadas para identificar oportunidades de melhoria nos produtos, preços e atendimento.
Panorama do E-Commerce no Brasil - Alexandre MirandaImpacta Eventos
Alexandre Miranda tem experiência em gestão de projetos e é co-autor de um livro sobre abertura de lojas virtuais. Ele integra o conselho da ABCOMM e é diretor de projetos na GS Virtual, onde também leciona MBA em Marketing Digital. O documento fornece dados sobre o crescimento do e-commerce no Brasil.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Gestão de Redes de Alta Performance
1. 16/04/2010
Pós-
Pós-graduação Internacional
Gerenciamento e
Gestão de Redes de
Alta Performance
Coordenador
Prof. MSc . Ricardo Rodrigues
MSc.
ricardo.rodrigues@impacta.edu.br
AGENDA
09h00 Credenciamento
Gestão de Redes de Alta Performance - Prof. MSc. Ricardo Rodrigues
10h00 Consultor e Coordenador de Graduação e Pós-graduação em Redes de
Computadores - FIT
Application Platforms for Cloud Computing: Who, Why and When –
11h00
Yefim Natis (Vice-Presidente e Analista Emérito - Gartner Research)
12h00 Encerramento
1
2. 16/04/2010
Gerenciamento de Desempenho de Redes
O Gerenciamento de Desempenho de Redes consiste no planejamento,
planejamento,
modelagem,
modelagem, mensuração e otimização das Redes para garantir a transmissão
de informação com a velocidade, confiabilidade e capacidade apropriados à
velocidade,
natureza da aplicação e do custo na organização.
organização.
Em função da Consolidação dos Data Center, do aumento do Número de
Center,
usuários remotos e do Tráfego de Vídeo e Voz, do Software como Serviço
Voz,
(SaaS), de Aplicações mais complexas como o SOA, da Virtualização e do
SaaS), SOA,
Outsourcing,
Outsourcing, a demanda atual para Redes mais Complexas e com Alto
Volume de Tráfego leva à necessidade de Aumento da Performance das
Redes.
Redes.
2
3. 16/04/2010
Gerenciamento de Desempenho de Redes
Nas duas últimas
décadas, as
organizações de TI
e de Infra Estrutura
reduziram o tempo
de inatividade para
o mínimo e houve
um grande aumento
na necessidade de
gerenciamento da
performance das
aplicações.
aplicações.
NetQoS.
NetQoS. Performance First, 2009. - www.netqos.com
First,
Gerenciamento de Desempenho de Redes
“Today we are moving beyond the Giga era and into the Tera era. era.
In fact, data is multiplying so quickly worldwide that it's now being
measured by exabyte – a million terabytes. Tera-IOPs (I/O Operations
Tera-
per second) and terabytes of information represent a new scale of
workload.”
Intel Tomorrow's High-Performance Networks
High-
http://www.intel.com/technology/comms/perfnet/index.htm
3
4. 16/04/2010
TECNOLOGIAS ESTRATÉGICAS DE TI
(GARTNER 2009 – 2012)
TOP 10 STRATEGIC TECHNOLOGY AREAS
Gartner Identifies the Top 10 Strategic Technologies from 2009
to 2012 (STAMFORD, Conn., October 14, 2009)
4
5. 16/04/2010
VIRTUALIZATION
Virtualization changes how IT is acquired
acquired,
managed and how software is priced and
licensed.
It will become an enabler of cloud
computing.
computing
In addition to energy savings and lower
capital expenses due to more efficient use
of your hardware resources, it will get high
availability of resources,
resources better
management,
management increased security and the
potential of improved disaster recovery
processes when you build a virtual
Carl Claunch - IT Infrastructure & Operations Trends — infrastructure.
Change is on the Horizon – The Future of IT - September
15-17, 2009
CLOUD COMPUTING
The cloud-computing grew exponentially
during 2009 and 2010
2010.
The key characteristics of cloud computing:
§ (1) delivery of capabilities "as a service”
§ (2) delivery of services in a highly
scalable and elastic fashion
§ (3) using Internet technologies to
develop and deliver services
Carl Claunch - IT Infrastructure & Operations Trends — § (4) designing for delivery to external
Change is on the Horizon – The Future of IT - September
customers
15-17, 2009
5
6. 16/04/2010
SERVER BEYOND BLADES
Today's blades are
highly server-centric,
server-centric
thus the level of
modularity revolves
around a server as a
component.
The future blade
generations will be not
of server-centric and
will be more modular
modular.
The modules will be
network components,
components
storage components and
processor/memory
Carl Claunch - IT Infrastructure & Operations Trends -
Change is on the Horizon – The Future of IT - September 15-17, 2009
components.
components
WEB ORIENTED ARCHITECTURE (WOA)
Web-
Web-oriented
architecture (WOA
WOA)
is emerging as a
best-practice model
for implementing
SOA in a Web-
centric fashion.
The use of Web-Web-
centric models to
build global class
solutions can not
address the full
breadth of enterprise
Carl Claunch - IT Infrastructure & Operations Trends - computing needs.
Change is on the Horizon – The Future of IT - September 15-17, 2009
6
7. 16/04/2010
ENTERPRISE MASHUPS
In mashup and Web
architecture,
architecture technologies
and standards are used to
combine resources into
compositions.
Mashup applications can
quickly be created and users
can easily personalize
mashup content displays.
Carl Claunch - IT Infrastructure & Operations Trends -
Change is on the Horizon – The Future of IT - September 15-17, 2009
SPECIALIZED SYSTEMS
Some special hardware that
provides a substantial
increase in performance or
a substantial cost advantage
over the alternative of using
a general server
server.
Examples of appliances,
with special hardware as the
advantage over general
purpose servers, include
Cisco routers Netezza Data
routers,
Warehouse appliances to
accelerate performance and
performance,
the Azul Systems Compute
Appliance that has a special
Gartner Identifies the Top 10 Strategic Technologies for 2009
processor designed to run
(STAMFORD, Conn., October 14, 2009) Java code many times faster
than general-
general-purpose
processors.
processors
7
8. 16/04/2010
SOCIAL SOFTWARE AND SOCIAL NETWORKING
Social networking covers social
profile management products,
such as MySpace Facebook and
MySpace, Facebook,
Friendster.
Friendster It also covers the
social networking analysis
technologies that use human
relationships for the discovery of
people and expertise.
Social collaboration covers
technologies, such as wikis wikis,
blogs,
blogs instant messaging,
messaging
collaborative office
office.
Social media includes
technologies that assist
communities in sharing content
such as YouTube
YouTube.
Social validation is getting the
Gartner Identifies the Top 10 Strategic Technologies for 2009 community involved in assessing
(STAMFORD, Conn., October 14, 2009) products, content, people and so
on. Examples include social
rating,
rating social commentary social
commentary,
tagging and social bookmarking
bookmarking.
UNIFIED COMMUNICATIONS
Communication service
integration where all the
communication applications will
be real time integrated
integrated.
Enterprise and Business quick
communications.
Carl Claunch - IT Infrastructure & Operations Trends —
Change is on the Horizon – The Future of IT - September 15-
17, 2009
8
9. 16/04/2010
UNIFIED COMMUNICATIONS
Elia San Miguel - The Unified Communications Scenario – The Future of IT - September 15-17, 2009
BI – BUSINESS INTELLIGENCE
Business Intelligence (BI BI)
initiative leaders must do
two things well to be
successful. First they must
First,
provide new capabilities to
business management and
knowledge workers.
workers
Second,
Second they must build and
evolve a better and more
capable information-centric
information-
infrastructure.
infrastructure
Organization of analysts and
research in five initiatives
initiatives:
Business Intelligence and
Performance Management
Management,
Social Software and
Collaboration,
Collaboration Enterprise
Information Management,
Management
Gartner Identifies the Top 10 Strategic Technologies for 2009 Enterprise Content
(STAMFORD, Conn., October 14, 2009)
Management and Data
Management and
Integration.
Integration
9
10. 16/04/2010
GREEN IT
Gartner Identifies the Top 10 Strategic Technologies for 2009 (STAMFORD, Conn.,
October 14, 2009)
ü COMO GERENCIAR E INTEGRAR
ESSAS TECNOLOGIAS?
ü A DEMANDA DE MERCADO PARA
GESTORES DE TI E REDES DE ALTA
PERFORMANCE?
10
11. 16/04/2010
Pós-
Pós-Graduação Internacional
MBT em Gerenciamento e Gestão de Redes
de Alta Performance
OBJETIVOS DO CURSO
} O curso de Pós-Graduação Internacional MBT em Gerenciamento e Gestão de Redes de
Pós-
Alta Performance tem como objetivo formar Especialistas e Gestores de mercado para
projetar, implantar,
projetar, implantar, integrar e gerenciar redes de alta performance com prática e
utilização de gestão e governança de TI, oferecendo:
TI, oferecendo:
§ Conhecimentos e Práticas em Redes de Alta Performance
§ Visão Prática, Técnica e Normativa de Aplicações e Ferramentas de Segurança da
Informação
§ Integração e Gestão de Redes de Alta Performance
§ Práticas de Implantação e de Estratégias de Infra-Estrutura de Redes, Continuidade de
Infra-
Negócios, Redes Convergentes, Redes em Nuvem, Clusterização e Gerenciamento
de Ambientes Virtualizados
§ Prática de Gerência e Liderança Organizacional e de SLA
§ Planejamento Estratégico para Gestão e Governança de TI
§ Prática na Implantação e Gestão de Redes Gerenciadas
11
12. 16/04/2010
CICLOS DO MBT
Roteameno e Proteção
Multi-
Multi-layer (EGP, IGP e BGP)
EGP, BGP) Redes de Alta Performance
Rede Ótica (DWDM, SONET e
(DWDM,
Aplicações de Alta Performance
SDH)
SDH)
(Aplicações .Net, J2EE, Mobile e
.Net, J2EE,
Gerenciamento de
Computação Distribuída)
Distribuída)
Conexão (QoS, Eng. de
(QoS,
Tráfego,
Tráfego, MPLS e ATM)
ATM) Storage e Banco de Dados de
Segurança da Informação Alta Performance
para Redes Corporativas
Virtualização
Middleware para Redes
Inteligentes
Redes Wireless (WiMax e 4G)
(WiMax 4G)
Arquitetura de Dados
e SOA (SaaS)
(SaaS)
Tecnologias de Redes
Gerência e Liderança Convergentes (Redes
(Redes
Organizacional Triple-Play, xDSL,
Triple-Play, xDSL, Cable
Modem, WLAN, PLC,
Modem, WLAN, PLC, Fiber
Gerenciamento de SLA
to Home, IPTV)
Home, IPTV)
Plano de Continuidade
Cloud Networking
de Negócios (BI, Data
BI,
Warehouse, BIA, DRP,
Warehouse, BIA, DRP, ....)
CICLOS DO MBT
Arquitetura de Gerenciamento
de Redes
Protocolos de Gerenciamento
de Redes
PMI
ITIL
COBIT
Ferramentas de Gerenciamento
de Redes
Prática de Gestão de Projetos
Gerenciamento de Riscos e
Capacity Management
Load Balancing e Clustering
Gerenciamento de Ambientes
Virtualizados
Internet Service Management
12
13. 16/04/2010
GRADE CURRICULAR
Carga
Disciplinas
horária
ü Introdução à Gestão e ao Gerenciamento de Redes de Alta Performance 16 h/a
1º Semestre
(Módulo 1) ü Gestão de Projetos I (PMI) 24 h/a
ü Gerenciamento de Conexão 16 h/a
• A carga horária das
ü Roteamento Inter-domain
Inter- 24 h/a disciplinas de cada
ü Infra-estrutura Ótica
Infra- 16 h/a semestre totaliza 164
horas / aula.
aula.
ü Arquiteturas de Gerenciamento de Redes 16 h/a
ü Tecnologias de Redes Convergentes 20 h/a • Os Projetos de cada
semestre serão realizados
ü Política de Segurança da Informação 20 h/a em laboratórios aos
ü Metodologia de Pesquisa Científica e Tecnológica 12 h/a sábados (2 sábados / mês,
Total
Total com 8 horas de
164 h/a
laboratório) totalizando
2º Semestre ü Normas Técnicas de Segurança 80 horas de laboratório /
(Módulo 2) 16 h/a semestre.
semestre.
ü Gerenciamento de Aplicações de Alta Performance
ü Sinalização para Caminhos Heterogêneos 40 h/a
• A carga horária total de
ü Virtualização 16 h/a cada semestre (Aulas +
16 h/a Projetos) será igual a 244
ü Middleware para Controle de Redes Inteligentes
horas / aula.
aula.
ü Protocolos de Gerenciamento de Redes 16 h/a
ü Proteção Multi-layer
Multi- 20 h/a
ü Práticas de TI 1 (ITIL) 16 h/a
24 h/a
Total
Total 164 h/a
GRADE CURRICULAR
Carga
Disciplinas
horária
ü Control Plane Security 16 h/a
3º Semestre ü Redes Wireless de Alta Performance 24 h/a
(Módulo 3)
ü Práticas de TI 2 (Cobit)
(Cobit) 24 h/a • A carga horária das
disciplinas de cada
ü Ferramentas de Gerenciamento de Redes 24 h/a semestre totaliza 164
ü Gerenciamento de Storage e Banco de Dados de Alta Performance 40 h/a horas / aula.
aula.
ü Gestão de Projetos II 16 h/a • Os Projetos de cada
ü Gerenciamento de Riscos e Capacity Management 20 h/a semestre serão
Total 164 h/a
realizados em
laboratórios aos sábados
ü Gerência e Liderança Organizacional (2 sábados / mês, com 8
16 h/a
horas de laboratório)
4º Semestre ü Gerenciamento de SLA (Service Level Agreement)
(Service Agreement) 16 h/a totalizando 80 horas de
(Módulo 4) ü Load Balancing e Clustering laboratório / semestre.
semestre.
24 h/a
ü Plano de Continuidade de Negócios (PCN) 24 h/a • A carga horária total de
ü Internet Server Management 20 h/a cada semestre (Aulas +
ü Arquitetura de Dados e SOA Projetos) será igual a
24 h/a
244 horas / aula.
aula.
ü Cloud Network (Cloud Computing and Services)
(Cloud Services) 16 h/a
ü Gerenciamento de Ambientes Virtualizados 24 h/a
Total
Total 164 h/a
Total = 656 horas / aula e 320 horas / projeto
13
14. 16/04/2010
PARCEIROS FIT
MÓDULO INTERNACIONAL
Information Security Management for
Módulo Enterprise Networks (32h)
Internacional Managerial Concepts in Information
Technology (32h)
Workshop (16h)
Apresentação do Projeto Final do Curso na
CCC&TI e, posteriormente, na FIT
14
15. 16/04/2010
MÓDULO INTERNACIONAL
Information Security Management for Enterprise
Networks
• Analysis of Vulnerability
• Information Security Project Management
• Risk Management
• Security Planning
• Security Policy
• VPN (tunneling, cryptograph, IPSec, ... )
• Authentication and Protocols
• Firewall / DMZ
• Intrusion Detection Systems
• Group Policy
• Security for Mobile Communications
• Identity Management
• Information Security Maintenance
MÓDULO INTERNACIONAL
Managerial Concepts in Information Technology
• Managing in the Information Age • IT Controls and Asset Protection, and
Security
• Information Technology`s Strategic Importance
• People, Organizations, and Management
• Developing the Organization`s IT Strategy
Systems
• Information Technology Planning
• The Chief Information Officer`s Role
• Hardware and Software Trends
• Strategic Planning
• Modern Telecommunications Systems
• Project Management
• Legislative and Industry Trends
• Business Process and IT Outsourcing
• Managing Application Portfolios
• Corporate Governance and IT
• Managing Application Development
• Collaboration Tools and Wireless
• Development and Acquisition Alternatives Networks
• Managing E-Business Applications
E- • E- business
• Developing and Managing Customer Expectations • Enterprise Resource Planning
• Managing Computer and Data Resources • Business Intelligence
• Managing E-business and Network Systems
E- • Knowledge Management
• Measuring IT Investments and Returns • Enterprise Architecture
15
16. 16/04/2010
MÓDULO INTERNACIONAL
CASE STUDIES
Part 1: Readings in the Management of Information Security
1:
• Mobile Device Security Management, Benjamin J. Halpert
Management,
• Linking Business Objectives and Security Directives, Donald L. Pipkin
Directives,
• Managing Incident Response, David M. Shackleford
Response,
• The Role of Information Security and Its Relationship to Information Technology Risk Management, Chrisan Herrod
Management,
• Architecting and Managing Secure Biometric Systems, Kameswara Raonamuduri & Savitha S. Kadiyala
Systems,
• Integration and Ethical Perspectives for Information Systems Management, Ernest A. Capozzoli; Rober D. Winsor & Sheb L. True
Management, Capozzoli;
• Security Education, Training, and Awareness from a Human Performance Technology Point of View, Melissa J. Dark
View,
• The Provision of Defenses Against Internet-Based Attacks, Li-Chiou Chen; Thomas A. Longstaff & Kathleen M. Carley
Internet- Attacks, Li-
• Trust, Controls and Information Security, Irene Woon & Atreyi Kankanhalli
Security,
• Hierarchical Model of Organizational Work in the Sphere of Information Security, Alexander Anisimov
Security,
• Transparency in Information Security System Design, Hebert J. Mattord & Michael E. Whitman
Design,
Part 2: Cases in the Management of Information Security
2:
• CASE A: Computer Gaming Technologies-CGT Inc., Michael E. Whitman & Hebert J. Mattord
A: Technologies- Inc.,
• CASE B: Assessing and Mitigating the Risks to a Hypothetical Computer System, National Institute of Standards and Technology
B: System,
(NIST); Technology Administration; U.S. Department of Commerce
• CASE C: Random Widget Works, Michael E. Whitman & Hebert J. Mattord
C: Works,
• CASE D: Sequential Label and Supply, Hebert J. Mattord & Michael E. Whitman
D: Supply,
• CASE E: Brightington Academy, Michael E. Whitman & Hebert J. Mattord
E: Academy,
• CASE F: The 9/11 Commission Report , Hebert J. Mattord & Michael E. Whitman
F: Report,
PÚBLICO ALVO
• O curso MBT em Gerenciamento e Gestão de Redes de Alta Performance tem
como público alvo profissionais com experiência mínima de 4 (cinco) anos em
suporte, consultoria,
suporte, consultoria, administração e/ou gerenciamento de redes e que atuem como:
como:
ü Gerentes ou Administradores de Redes
ü Coordenadores de Projetos
ü Analistas de Suporte Técnico
ü Consultores de TI e de Gerenciamento de Redes
ü Diretores e Gerentes de Integração de Recursos e Aplicações em Redes de Alta
Performance
ü Gestores de Redes e TI
ü Gestores de Data Centers
ü Analistas de Negócios e Redes de Alta Performance
• O Inglês Intermediário é também um pré-requisito para estes profissionais.
pré- profissionais.
16