This document discusses the rise of cloud computing and the opportunities and challenges it presents for businesses and IT departments. It notes that businesses are increasingly adopting cloud technologies at a faster rate than IT can support due to the speed and agility benefits of the cloud. However, IT concerns around security, compliance, and control are slowing cloud adoption. The document proposes that providing trusted cloud services that address these IT concerns can help enable broader cloud usage and allow businesses to realize the economic and innovation benefits of the cloud while allowing IT to play a more strategic role.
In the first fortnight of the Otago Polytechnic Bachelor of Information Technology project we invite local industry leaders "The Dragons". They provide critique of projects as early as possible. This is a chance to get feedback, and hopefully unearth opportunities and risks.
In the first fortnight of the Otago Polytechnic Bachelor of Information Technology project we invite local industry leaders "The Dragons". They provide critique of projects as early as possible. This is a chance to get feedback, and hopefully unearth opportunities and risks.
Work is something you do, not a place you go: flexible working means creating a a workplace model that enables communication and collaboration regardless of location or device.Done well, flexible working creates sustainable competitive advantage in the form of top talent retention and a reduction in the fixed-cost for property.
INTELLIGENT INFORMATION GROUP DELIVERS
Easier to develop, easier to deploy, easier to maintain
New user experiences that delight our customers
Increased automation to improve business efficiency
AGILITY, INTELLIGENCE, PRODUCTIVITY
A presentation on the challenges around BYOD – and more importantly how to make a successful transition to the next-generation workspace that addresses the technology, security, legal and change management aspects.
A new company enters the market in late 2008, LGM Wealth Management, who have found a new way of spinning existing solutions and technologies to provide it with capabilities an order of magnitude better than anyone else.
. Time to Revenue < 5 days
. Cost to Serve < ½ industry average
. New Product Introduction < 5 days
. Infinite customization
How do you react?
Workshop Operations: Benjamin Kohler, Logica - Running Operations DevOps Style
---
Please contact us for a downloadable copy of the slides at CloudOps.Summit@googlemail.com .
Follow us on Twitter @CloudOps_Summit and
Facebook http://www.facebook.com/CloudOps
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen
What is cloud computing and what does it mean for your business today?
Microsoft New Zealand will share insights into cloud computing including:
• Beyond the hype - what really is cloud computing?
• The business case for cloud
• Showcases of what cloud computing is doing for New Zealand companies
• Economics of cloud computing and cost considerations
• Implementation tips and recommendations to get started
• Demonstration of Microsoft’s leading cloud productivity suite – Office365
Learn about Microsoft Office365 - a set of cloud-enabled tools that let you access your email, documents, contacts, and calendars from virtually anywhere, on almost any device. Office 365 brings together our best communication and collaboration tools including Microsoft Office, Microsoft SharePoint, Microsoft Exchange and Microsoft Lync in an always-up-to-date cloud service, for a low flexible monthly subscription. And we’ll show you this works and how to assess whether or not cloud computing makes sense for your organisation and what it takes to get there.
This presentation gives a brief, semi-technical introduction to Data Distribution Service (DDS) technology from the Object Management Group. The focus is on the business benefits of the technology generally, not on RTI's implementation in particular.
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
The cyber threat landscape is evolving faster than security teams can manage without dramatically increasing headcount. As IT organizations seek to achieve new levels of IT efficiency and value for the hybrid cloud, both security and compliance headaches increase in severity as well. See how HP is delivering advanced, data-driven security technologies designed to empower security operations to run more efficiently for the Hybrid Cloud.
Register for this webinar to learn how you can benefit from a new style of IT through the combined wealth of information assimilated from multiple sources to provide you valuable insights that impact your business. In addition you will learn how you can enjoy the use of secure compliant cloud services, that can be consolidated in one view and automated to the click of a button.
Work is something you do, not a place you go: flexible working means creating a a workplace model that enables communication and collaboration regardless of location or device.Done well, flexible working creates sustainable competitive advantage in the form of top talent retention and a reduction in the fixed-cost for property.
INTELLIGENT INFORMATION GROUP DELIVERS
Easier to develop, easier to deploy, easier to maintain
New user experiences that delight our customers
Increased automation to improve business efficiency
AGILITY, INTELLIGENCE, PRODUCTIVITY
A presentation on the challenges around BYOD – and more importantly how to make a successful transition to the next-generation workspace that addresses the technology, security, legal and change management aspects.
A new company enters the market in late 2008, LGM Wealth Management, who have found a new way of spinning existing solutions and technologies to provide it with capabilities an order of magnitude better than anyone else.
. Time to Revenue < 5 days
. Cost to Serve < ½ industry average
. New Product Introduction < 5 days
. Infinite customization
How do you react?
Workshop Operations: Benjamin Kohler, Logica - Running Operations DevOps Style
---
Please contact us for a downloadable copy of the slides at CloudOps.Summit@googlemail.com .
Follow us on Twitter @CloudOps_Summit and
Facebook http://www.facebook.com/CloudOps
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen
What is cloud computing and what does it mean for your business today?
Microsoft New Zealand will share insights into cloud computing including:
• Beyond the hype - what really is cloud computing?
• The business case for cloud
• Showcases of what cloud computing is doing for New Zealand companies
• Economics of cloud computing and cost considerations
• Implementation tips and recommendations to get started
• Demonstration of Microsoft’s leading cloud productivity suite – Office365
Learn about Microsoft Office365 - a set of cloud-enabled tools that let you access your email, documents, contacts, and calendars from virtually anywhere, on almost any device. Office 365 brings together our best communication and collaboration tools including Microsoft Office, Microsoft SharePoint, Microsoft Exchange and Microsoft Lync in an always-up-to-date cloud service, for a low flexible monthly subscription. And we’ll show you this works and how to assess whether or not cloud computing makes sense for your organisation and what it takes to get there.
This presentation gives a brief, semi-technical introduction to Data Distribution Service (DDS) technology from the Object Management Group. The focus is on the business benefits of the technology generally, not on RTI's implementation in particular.
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
The cyber threat landscape is evolving faster than security teams can manage without dramatically increasing headcount. As IT organizations seek to achieve new levels of IT efficiency and value for the hybrid cloud, both security and compliance headaches increase in severity as well. See how HP is delivering advanced, data-driven security technologies designed to empower security operations to run more efficiently for the Hybrid Cloud.
Register for this webinar to learn how you can benefit from a new style of IT through the combined wealth of information assimilated from multiple sources to provide you valuable insights that impact your business. In addition you will learn how you can enjoy the use of secure compliant cloud services, that can be consolidated in one view and automated to the click of a button.
Have some customers who have made decision to go for cloud, but lack controls. Here are some of the slides I used in an alignment session the other day.
AWS security monitoring and compliance validation from Adobe.Splunk
You cant protect what you cant see. How Adobe uses Splunk to automate data collection for security monitoring as well as to validate compliance for large numbers of AWS accounts.
In this presentation I discuss variety of services provided by AWS. I choose services which are in my opinion most commonly used and which may benefit our Payment Platform project which is fully deployed on AWS. In the second part of presentation I show how AWS infrastructure is localized globally and what are differences between region, availability zone and edge location.
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
A presentation on eDiscovery and the cloud by Brian Babineau, Senior Consulting Analyst at Enterprise Strategy Group, and Steve d'Alencon, Chief Marketing Officer at CaseCentral.
As we know, HP is all about "The New Style of IT". To achieve this, HP has highlighted 4 Big Bets: Cloud, Security, Mobility and Big Data. Bart Blommaerts, Expert Information Developer, is going to talk about “Developing applications for the Cloud“. Bart will focus on these questions:
Why do we want applications in the cloud?
Which applications do we want in the cloud?
What methodology do we need to use, to move to the cloud?
Does the cloud have implications on how applications should be developed?
Bart will demonstrate potential pitfalls, and explain the HP approach that aims to avoid issues on the performance, elasticity, resilience and security of Cloud applications. This brown bag session will be an incremental update of a presentation Bart did at HP Discover in Barcelona last year. It is about concepts and methodology, not about technical implementation.
The Digital Age: How to get the most out of mobile devices in the legal envir...e-ternity
Learn more about:
* Marketplace statistics
* Tablet’s, Smartphones and Phablet’s. What are the best devices out there?
* Squeezing efficiencies out of powerful business mobiles devices
* Great iPad and Android apps
* How important is the data on my Mobile device?
* How do I protect my mobile device from data loss?
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
This webinar will show you multiple pathways to the cloud – from Infrastructure-as-a-Service (IaaS) to VDI and Desktop-as-a-Service– giving you valuable insight into how you can chart the right course for your organization.
http://www.web2present.com/upcoming-webinars-details.php?id=74
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...itnewsafrica
The challenge of balancing four conflicting goals:
1.Social – keep employees happy
2.Business – keep processes running effectively
3.Financial – manage costs
4.Risk management – stop bad things from happening.
By Keith Bothma, HP Networking Sales and BU manager for the Enterprise Group in South Africa.
Petteri Uljas, Capgemini; Corporate VP, Head of Infrastructure Services; Eastern Europe, India and Latin America
Cloud doesn’t change everything
Evolutionary in implementation, revolutionary in usage.
Normal IT project methodologies apply (mostly).
Leverage processes and skills you already have.
Don’t throw everything out because a small part is new.
Everything that holds up “traditional” projects will hold up your first Cloud project.
So much has been written, advertised and discussed about cloud computing, it is appropriate to define the term for common understanding. Cloud computing generally describes a method to supplement, consume and deliver IT services over the Internet. Web-based network resources, software and data services are shared under multi-tenancy and provided on-demand to customers. It is this central tenet of sharing - and the standardization it implies - that is the enabler of cloud computing’s core benefits. Cloud computing providers can amortize their costs across many clients and pass these savings on to them. This paradigm shift in computing infrastructure was a logical byproduct and consequence of the ease-of-access to remote and virtual computing sites provided by the Internet. The U.S. National Institute of Standards & Technology (NIST) defines four cloud deployment models: Community Cloud – Shares infrastructure between several organizations from a specific community with common concerns (e.g., security, compliance, jurisdiction), whether managed internally or by a third-party and hosted internally or externally. Public Cloud – The cloud infrastructure is provisioned by the cloud provider for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private Cloud – Infrastructure provisioned solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Hybrid Cloud – A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.
The cloud helps you in two ways: by reducing the costs for operating your business and at the same time increase business agility and flexibility.You need to start testing all your applications immediately. However, this can be an overwhelming endeavor. You need large upfront capital and human investments: Hardware to procure, setup and maintain for the test/ staging environment Software to procure, install and maintain to automate the testing People with the right expertise and experience in security to hire, train and retain Process to define and refine so that everything is standardized and efficient
Some of the symptoms of that problem is that it takes an incredibly long time to get a server up and running and an application up and running.Multiple organizations, different areas of expertise whether it be server, storage, network and management, facilties. Whenever you plug in a server into this infrastructure, you have to cable it up to all those domains, but its not just the cable clutter if you will that is slowing things down, its also that every time you do one of these things, theres a process associated with it. And that process has a lot of manual overhead as well. So the end result is that the architecture that we have built in the last 10-15 years in the data center, kind of the rack, stack and wired world as its called in the past, this architecture forces some incredible organizational complexity on the customers when they go to a larger deployment. Complexity in terms of phy. As well as process complexity.We understand what the problem is and where it came from.[this slide is a simplification of the time-consuming process of standing up complex infrastructure. Make sure the customer sees their own process in all or part of the diagram]To provision new application infrastructure can takes weeks or months due to complexity. This process typically involves reviews and approvals, meetings and more meetings, plus the unpacking and implementation of the systems. The bottom left hand corner reflects the siloed nature of data center teams that must coordinate the build process across servers, network, storage and facilities, as in the previous slide. These meetings, handoffs and wait times between teams are just one aspect of the complexity in the overall provisioning process. [Note stop sign and heading back to the beginning in an endless loop] And sometimes the process can get derailed, requiring a return to the starting point and creating further delays.
Key pointsMany business leaders recognize this and are already moving towards adopting cloud services faster than many IT leaders are comfortable with.Business users have been quick to recognize the cloud’s advantages in speeding innovation, accelerating business processes, and reducing time to revenue. The increasing simplicity of rich cloud services, combined with an increasing level of IT sophistication of the consumers and employees of modern enterprises has resulted in pressure being applied to IT to speed the adoption of cloud services, and in some cases even bypassing IT and signing up for public cloud services like those from Salesforce and Google, often accessed over a smartphone, tablet or laptop owned and managed by the employee instead of the one traditionally provided to them by the enterprise.In theory this is great news, especially if you’re a service provider, but the reality is that cloud adoption will stall in the enterprise unelss we can address a number of critical challenges. Enterprise IT leaders that have been slower to adopt cloud solutions cite well-founded concerns about the challenges of maintainging security, service levels and a portfolio governance seamlessly across the entire IT value chain while ensuring that the decisions they make about cloud technology suppliers today don’t prevent them from innovating in the future.
To succeed, we need to rethink the role of the CIO and of IT. Moving from IT as a sole “supplier” or builder of services, to becoming the builder AND the broker of IT services. That means going beyond building world-class, reliable services inside the datacenter, but to create a core competency in aligning business needs with the optimal mix of internally and externally available services and then seamlessly blending them into a reliable, secure and compliant end-to-end experience.Starting with being able to source and consume the services you need from the market – building a network of suppliers you trust that can be relied upon to deliver at a predictable price and performance.CIO’s also need build a capability to act as an internal service provider, matching the transparency and flexibility of externally available services for those areas where either economies of scale, competitive advantage, risk or compliance mean that it makes more sense to provide their own services.No matter whether they seek to leverage public or private cloud services, both business and IT processes require transformation if they are to maximize the benefits of cloud technologies and ready the enterprise for accelerated innovation and improved agility.Finally, CIO’s need to manage and secure the entire IT value chain using the same consistent, seamless tools and processes or they risk creating silos that introduce cost, complexity and risk to hybrid environments.
We think that cloud is the third generation of computing, after mainframes and client server. It actually represents the maturation of the Internet. It is important to have a common definition of the cloud.
The slide above offers Gartner’s definition of cloud services, as well as fundamental characteristics which have progressively attracted consensus in the market. Almost everyone agrees today that cloud is an “evolved” way of delivering and consuming services, that leverages new technologies such as virtualization and automation, but also changes in the mindset of consumers (e.g: it is now totally accepted to wire money from your account to another one by using the internet portal of your bank). Some people would argue that is it essentially about leveraging new business models, or “consuming by the glass”, which is a drastic change in how IT use to deliver service (see the dedicated whitepaper on this).Also, when we talk about “what” we deliver as a service, we should be more specific: if we look at the typical technology layers within the enterprise, the majority of our customers talk about infrastructure, platform and applications. Cloud is enabling the delivery and consumption of those layers “as a service”.
We use NIST’s cloud definition as the standard. It is important to understand that there are many different types of clouds: SaaS, a full business application, PaaS, a rapid application development environment, IaaS, basic compute and storage. They can be deployed in different ways, but they are all characterized as resource pooling with elasticity, multi-tenancy and metered serviceCloud Computing – a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Deployment Models Community Cloud – Shares infrastructure between several organizations from a specific community with common concerns (e.g., security, compliance, jurisdiction), whether managed internally or by a third-party and hosted internally or externally. Public Cloud – The cloud infrastructure is provisioned by the cloud provider for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private Cloud – Infrastructure provisioned solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Hybrid Cloud – A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another. Cloud Service Models Software as a Service (SaaS) – Employs the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The provider manages or controls the underlying cloud infrastructure with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS) – Consumer-created or acquired applications supported by the provider are deployed onto the cloud infrastructure which the provider manages or controls. The consumer has control over the deployed applications and possible configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS) – The consumer provisions processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The provider manages or controls the underlying cloud infrastructure while the consumer has control over operating systems, storage, and deployed applications; and possible limited control of select networking components (e.g., host firewalls). With IT transformation to the cloud, many of the traditional layers have been abstracted from customers perspective. Customers care more about who is accessing which application/data, and less about which platform the application is running on. Cloud Service Providers have increasing security responsibilities as they move from IaaS to PaaS, to SaaS.IaaS: For example, a LAMP stack (Linux, Apache web-server, MySQL DB, and Perl/PHP/Python) deployed on Amazons EC2 would be classified as a public off-premise, 3rd party managed IaaS solution, even if the instances and applications/data contained within them are owned by the Cloud consumer. Here Amazon is responsible for Infrastructure Security for the Physical and Network level. The consumer is responsible for securing the O/S, Apache Web-server and the MySQL DB.PaaS: Google App Engine includes – dynamic web-server, peristent storage, automatic scaling and load balancing, a Java/Python runtime and development environment, task queues, etc. Here Google provides the tools to secure the platform (e.g. JVM) and application by providing tools to integrate with Google accounts.SaaS: SalesForce.com – provides a purposeful set of applications that are hosted in the cloud. SalesForce.com takes care of protection of all layers – physical, network, system, database, application and users.
The security of the cloud depends not only the physical location of the assets (internal or external), but also the sensitivity of the information, who is consuming the information (multi-tenant Vs single tenant), and who is responsible for the governance, security, and compliance.Security risks depend on:Data classification of the assets, resources, and information being managed?Who manages them and how?Which controls are selected and how they are integrated?Compliance requirements?
Fortify gives you advanced technologies to ensure your applications are secure. Fortify inspects applications at the source code level (static testing) and while they are running (dynamic testing). Fortify supports more languages than any other application security vendor with significant strengths in the area of mobile application security. But it’s not just built for custom applications, Fortify and determine if vulnerabilities exist in commercial, custom and open source activities. And even more differentiated, Fortify can be delivered as a software you purchase or as a service. With unmatched flexibilityand depth of coverage, Fortify ensures you have a world class application security program in place.
Fortify gives you advanced technologies to ensure your applications are secure. Fortify inspects applications at the source code level (static testing) and while they are running (dynamic testing). Fortify supports more languages than any other application security vendor with significant strengths in the area of mobile application security. But it’s not just built for custom applications, Fortify and determine if vulnerabilities exist in commercial, custom and open source activities. And even more differentiated, Fortify can be delivered as a software you purchase or as a service. With unmatched flexibility and depth of coverage, Fortify ensures you have a world class application security program in place.You simply upload an application’s binaries and/or provide a URL for testing, using a highly secure cloud environment designed to safeguard sensitive uploads and intellectual property. HP Fortify on Demand then conducts a static and/or dynamic test and security experts verify the results. It presents correlated findings in an unbiased, tamper-proof report with results in just days, regardless of application size.