This document discusses using a SCOPE model to assess cloud computing solutions for mission needs. The SCOPE model evaluates four dimensions: net-readiness, capability scope, technical feasibility, and domain-dependent factors. It provides examples of using the model to map mission requirements to cloud computing capabilities and evaluate technical feasibility based on dimensions like resources needed, interface complexity, and technology readiness. The document advocates applying domain-specific dimensions to the SCOPE model for directly assessing cloud solutions.
This is a fusion talk I presented at the devopsdays conference heled in Galway in 2018.
In it I share some of the misuses of the cloud I have seen and then focus on the five essential characteristics of cloud with the aim of imparting the importance of adopting these characteristics to improve performance.
This is a fusion talk I presented at the devopsdays conference heled in Galway in 2018.
In it I share some of the misuses of the cloud I have seen and then focus on the five essential characteristics of cloud with the aim of imparting the importance of adopting these characteristics to improve performance.
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Consulting
Companies are increasingly adopting Cloud applications for their core HR operations. However, some clients are choosing to have retain PeopleSoft for payroll processing, either as an on-premises implementation or running on a Cloud infrastructure platform (IaaS / PaaS).
In this session, we will look at the reasons behind those decisions, the benefits gained and the options available for interfacing to PeopleSoft and how this was implemented.
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsChristopher Blough
Online GIS applications can be delivered using cloud computing platforms which provide Infrastructure as a Service(IaaS) resources. An introduction to essential cloud computing concepts and considerations will be reviewed in addition to a presentation of public sector industry trends involving other cloud hosted technologies related to GIS applications. The presentation will feature examples of cloud hosted GIS applications at federal, state, and local government levels including the City of Novi\'s ArcGIS Server 10 deployment using a public cloud hosting provider.
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics
encourage many organizations to move to this technology. But many consideration faces transmission
process. This paper outline some of these considerations and considerable efforts solved cloud scalability
issues.
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...IndicThreads
Session presented at the 2nd IndicThreads.com Conference on Cloud Computing held in Pune, India on 3-4 June 2011.
http://CloudComputing.IndicThreads.com
Abstract:As the cloud adoption increases, there is a growing concern about the lock-in of customers into the various cloud platforms. This session will discuss various major cloud platforms, the type of lock-in the customer will face in each of these platforms and what each customer can do to minimize their lock-in.
Key takeaways for audience are:
Understand what is cloud lock-in
Types of cloud vendor lock-ins
What is cloud interoperability
Major initiatives around cloud interoperability standards
Goals, differences and players/proponents of these major standards
Steps to minimize cloud lock-in for your customers
Speaker: Ashwin Waknis is a Sr. IT professional with 15 years in the industry. Ashwin is currently head of the Cloud Professional Services Business at Persistent Systems. Before that Ashwin was a Sr. Product Manager at Cisco Systems where he lead major initiatives around Knowledge Management, Enterprise Portal, Web 2.0/Social softwares and Enterprise Search. For the last 2 years, Ashwin has been involved in Cloud Computing initiatives first at Cisco and then at Persistent Systems.Ashwin has spoken at many customer workshops and events organized for educational institutes.
This is a 2 hour strategy workshop developed by Predrag Mitrovic (http://mynethouse.se and http://cloudadvisor.se).
The workshop is intended for CIOs and roles close to business strategy formulation around technology. Feel free to use the material and develop it further, as long as you give me access to the updated materials.
Any questions can be directed to my e-mail: predrag[at]mynethouse.se
I hope that you enjoy this material and find it useful.
/Predrag a.k.a Cloud Advisor
How Cloud Computing Will Transform Information ManagementKnowledge Cue
At the Information Management Summit held in February Jane Cope presented a session entitled “Will Cloud computing transform Information Management” in which she discussed the types of cloud options and the pros and cons. The gist was that moving to cloud won’t change Information Management, but it will influence and impact the way in which we work, and subsequently the way in which we manage our data which fuels information management.
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Consulting
Companies are increasingly adopting Cloud applications for their core HR operations. However, some clients are choosing to have retain PeopleSoft for payroll processing, either as an on-premises implementation or running on a Cloud infrastructure platform (IaaS / PaaS).
In this session, we will look at the reasons behind those decisions, the benefits gained and the options available for interfacing to PeopleSoft and how this was implemented.
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsChristopher Blough
Online GIS applications can be delivered using cloud computing platforms which provide Infrastructure as a Service(IaaS) resources. An introduction to essential cloud computing concepts and considerations will be reviewed in addition to a presentation of public sector industry trends involving other cloud hosted technologies related to GIS applications. The presentation will feature examples of cloud hosted GIS applications at federal, state, and local government levels including the City of Novi\'s ArcGIS Server 10 deployment using a public cloud hosting provider.
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics
encourage many organizations to move to this technology. But many consideration faces transmission
process. This paper outline some of these considerations and considerable efforts solved cloud scalability
issues.
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...IndicThreads
Session presented at the 2nd IndicThreads.com Conference on Cloud Computing held in Pune, India on 3-4 June 2011.
http://CloudComputing.IndicThreads.com
Abstract:As the cloud adoption increases, there is a growing concern about the lock-in of customers into the various cloud platforms. This session will discuss various major cloud platforms, the type of lock-in the customer will face in each of these platforms and what each customer can do to minimize their lock-in.
Key takeaways for audience are:
Understand what is cloud lock-in
Types of cloud vendor lock-ins
What is cloud interoperability
Major initiatives around cloud interoperability standards
Goals, differences and players/proponents of these major standards
Steps to minimize cloud lock-in for your customers
Speaker: Ashwin Waknis is a Sr. IT professional with 15 years in the industry. Ashwin is currently head of the Cloud Professional Services Business at Persistent Systems. Before that Ashwin was a Sr. Product Manager at Cisco Systems where he lead major initiatives around Knowledge Management, Enterprise Portal, Web 2.0/Social softwares and Enterprise Search. For the last 2 years, Ashwin has been involved in Cloud Computing initiatives first at Cisco and then at Persistent Systems.Ashwin has spoken at many customer workshops and events organized for educational institutes.
This is a 2 hour strategy workshop developed by Predrag Mitrovic (http://mynethouse.se and http://cloudadvisor.se).
The workshop is intended for CIOs and roles close to business strategy formulation around technology. Feel free to use the material and develop it further, as long as you give me access to the updated materials.
Any questions can be directed to my e-mail: predrag[at]mynethouse.se
I hope that you enjoy this material and find it useful.
/Predrag a.k.a Cloud Advisor
How Cloud Computing Will Transform Information ManagementKnowledge Cue
At the Information Management Summit held in February Jane Cope presented a session entitled “Will Cloud computing transform Information Management” in which she discussed the types of cloud options and the pros and cons. The gist was that moving to cloud won’t change Information Management, but it will influence and impact the way in which we work, and subsequently the way in which we manage our data which fuels information management.
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
Presentation given by Vaishali Rana, Deputy Director (IT), Delhi Electricity Regulatory Commission on August 1st, 2011 at eWorld Forum (www.eworldforum.net) in the session Sharing Good Practices in eGovernance
Feasibility of cloud migration for large enterprisesAnant Damle
Analysis of conditions favouring movement to cloud for medium to large enterprises including checks for migration of existing application(s) from on-premise setup to cloud.
For more information on Cloud Service offerings and for the complete presentation, contact
Marlabs Inc.
1 Corporate Place South
Piscataway, NJ 08854
732-694-1000
marketing@marlabs.com
info@marlabs.com
Overview of Cloud Computing, Infrastructure as a Service, Platform as a Service, Software as a Service.
Cloud computing means transferring ICT resources (servers, hosts, applications, databases, platforms etc.) to a cloud service provider (CSP) with the goal of reducing capital expenditures (CapEx).
Cloud computing differs from legacy hosting services in that CSPs offer standardized services on a massive scale which results in economy-of-scale effects thus further reducing operating expenses (OpEx).
Different cloud models such as public, private and hybrid clouds address different customer needs.
The 3 categories for the functional level of cloud services are IaaS (Infrastructure as a Service),
PaaS (Platform as a Service) and SaaS (Software as a Service). Countless models emerge almost daily such as MaaS (Management as a Service), BaaS (Backend as a Service) and NaaS (Network as a Service).
To accommodate increases in processing power, cloud services offer the possibility to scale-up or scale-out.
nteractive Session on "Performance Evaluation Strategy of multi-access edge computing" by Arnab Majumdar ,Test Lead ,Cognizant #ATAGTR2021.
#ATAGTR2021 was the 6th Edition of Global Testing Retreat.
The video recording of the session is now available on the following link: https://www.youtube.com/watch?v=Nx1JEMkrosg
To know more about #ATAGTR2021, please visit:https://gtr.agiletestingalliance.org/
This benchmark is the result of the collaboration between Burstorm and Rice University and uses a high degree of automation. The scope of the first benchmark is seven suppliers across three continents with a total of 96 different instance types. The benchmark was executed every day, for at least 15 days. The results are normalized to a monthly pricing model to establish the price-performance metrics.
Cloud Computing is an information technology gold rush. Everything from social media and smart phones to streaming video and additive games come from the cloud. This revolution has also driven many to wonder how they can retool themselves to take advantage of this massive shift. Many in IT see the technology as an opportunity to accelerate their careers but in their attempt to navigate their cloud computing future, the question of what type of training, vendor-neutral or vendor-specific, is right for them
The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acquisition and what it means to be a federal system integrator. This revolution also lacks the physical and tangible artifacts of the past. Its ephemeral nature, global expanse and economic impact all combine in a tidal wave of change. This revolution is called cloud computing.
Since announcing its “Cloud First” policy in 2010, the Federal government has correctly identified cloud computing as a way to reduce costs and improve the use of existing assets, and has accordingly prioritized its adoption. It has also taken judicious steps to protect Federal networks from nefarious cyber-attacks and promote the dissemination of best practices for cybersecurity. The Federal government has also embraced mobility as a means to conduct work from any location. But until now, the implementation of these initiatives has been fragmented and lacked coordination across Federal agencies. This paper offers a framework for integrating these programs in a way that enables the Federal government to realize the economic, technological, and mission-effectiveness benefits of cloud services while simultaneously meeting current Federal cybersecurity
requirements. It advocates shifting from a compliance-based cybersecurity paradigm to
one that is risk-based and focusing on how to most effectively secure their implementation of cloud services.
GovCloud Network, LLC helps its clients develop and execute mission and business strategies to leverage the parallel and global nature of cloud-based services. We employ our technology, strategy, digital publishing and social media expertise across three lines of business- Business Strategy & Design, Digital Publishing & Social Media and Education.
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.
Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA
The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains.
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
Develop and open and inclusive cloud service brokerage environment that provides the Government the capability for rapid acquisition of proven innovative technologies on a fee for service basis
To the maximum extent possible leverage what already exits versus custom development to include incorporation of industry standards and a consistent implementation environment
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
BCL is tailored for the rapid delivery of enterprise business capability. It combines multiple, disjointed oversight processes into a single process. It recognizes that technology rapidly evolves and changes, and consequently, BCL mandates rapid capability delivery – within
eighteen months or less of program initiation. BCL is outcome-based, and modeled on best commercial practices. The process allows for the fact that not all solutions are purely technical. The entire DOTMLPF (Doctrine, Organization, Training, Materiel, Leadership
and education, Personnel and Facilities) spectrum of potential solutions are considered.
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
Cloud computing is driving the business of information technology today.
“A recent Gartner survey on the future of IT services found that only 38 percent of all organizations surveyed indicate cloud services use today. However, 80 percent of organizations said that they intend to use cloud services in some form within 12 months, including 55 percent of the organizations not doing so today.“ (Gartner, Inc, 2013)
As companies rush to adopt cloud, however, information technology (IT) security sometimes seems to be an afterthought.
The goal of this paper is to provide a survey of the current state of IT security within public cloud infrastructure-as-a-service providers. After first providing a cloud computing overview, the paper will focus on the infrastructure-as-a-service (IaaS) deployment model, the typical home of IaaS intrusion detection components. The Gartner Cloud Use Case Framework will then be introduced as it will also serve as the framework for this survey. An in-depth review of public cloud intrusion detection studies, options and expert observations will then follow. The paper will then offer the authors conclusions and cloud computing IDS recommendations for enterprises considering a move to the cloud.
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
Technology adoption is always a critical concern in organizations (private and public). South African government experienced this encounter when adopted Open Source Software (OSS) with the objective to reduce ICT services costs among others. The implementation of OSS in SA government has faced several challenges such as user resistance, human factor, support and funding. As a result of these challenges cost reduction has not been fully achieved. Cost reduction issue ultimately affects implementation of other government programmes such as those who yields job creation, better education, and improving health, etc. The potential alternative to address the same objective as aimed by OSS is Cloud Computing adoption. Cloud Computing promise to offer the SA government more advantages OSS. This study explore the feasibility of Cloud Computing adoption as an alternative to enable cost reduction, effectiveness and efficient of IT services in SA government as was aimed by OSS initiative.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Kevin Jackson - DoDIIS Worldwide 2010
1. Mission Driven Cloud Computing Solution Design Kevin Jackson Engineering Fellow [email_address] NJVC, LLC
2. Cloud Computing. Not a Panacea Lower Gain From Clouds Higher Gain From Clouds Lower Pain To Cloud Delivery Higher Pain To Cloud Delivery Collabora -tion Transactional Content SME ERP LE ERP On-Line Storage Web2.0 Application Dev’t. DB Migration Projects Data Archive Situational Apps Web Scale Analytics [Enterprise Data] Dep’t. BI Applica-tion Test US Situational Awareness European Situational Awareness US has more network bandwidth available in the battlefield, therefore higher gain from using external cloud Courtesy IBM “ DB-Centric” Architecture “ Content-Centric” Architecture “ Loosely Coupled” Architecture Storage and Data Integration Architecture
5. Technical Feasibility Dimensions Value Dimension Smaller Risk Larger Risk Inter-System Time Binding to Achieve Capability Strategic Tactical Transactional Real Time Run-Time Computing Resources Needed <1% of existing system resources 1-10% 10-50% >50% of existing system resources Service Mgmt. Resources Needed Negligible Within Current Net Service Capacity Within Planned Net Service Capacity Beyond Planned Net Service Capacity Net Resources Needed (FD) Negligible Within Current Net Capacity Within Planned Net Capacity Beyond Planned Net Capacity Interface Development Complexity <1% of system size 1-10% 10-50% >50% of system size Technology Readiness Level For Net Use TRL Levels 8-9 TRL Levels 6-7 TRL Levels 4-5 TRL Levels 1-3
6. Domain Dependent Values Cloud Computing SCOPE Model Management Coupling What is the degree of coupling between operational responsibility and execution resource ownership for: Network Resources Computing Platform resources Data resources Service resources What is the degree of coupling between relationship management and consequence management Range of Services What is the dynamic range of services associated with: Platform scalability Storage scalability Network access scalability/Network entity reach Types of applications supported Types of coupling to the physical environment Types of coupling to the political/social environment Network Infrastructure Capacity What is the network infrastructure capacity between cloud provider and consumer? LAN Bandwidths WAN Bandwidths and latencies Mobile network Bandwidths and latencies Dedicated communication links (point to point) Low bandwidth and intermittent links Asymmetric network links Platform Types What execution platform types are provided by the cloud? Domain Specificity What is the degree of domain-specificity of the cloud-based services offered? Data portability Service Level interoperability Levels of privacy/security/anonymity Levels of redundancy and/or physical dispersion Speed of allocation of resources Level of management visibility/control
7. Mission Driven Cloud Computing Solutions SCOPE MODEL General Net-readiness Capability/Domain Dependent Capability/Domain Independent Technical/Economic Feasibility
Editor's Notes
Cloud computing is no panacea. It’s not the right choice for every mission nor is the effort to build a mission-specific cloud always worth the cost. With this in mind, how should organizations go about deciding if cloud computing is appropriate?
Clouds provide capabilities and act as an abstraction layer above the underlying systems and technologies. This make a explicit methodology for measuring capabilities a critical tool in developing cloud-based systems. A future world of inter-clouds will only increase this need. Luckily, the Network Centric Operation Industry Consortium (NCOIC) has such a tool. For your background, NCOIC is a global industry consortium focused on network centric, industry neutral, best practices that support the work of central governments worldwide. The Systems, Capabilities, Operations, Programs, and Enterprises (SCOPE) Model for Interoperability Assessment, or SCOPE tool, offers a means for characterizing system capabilities in a definitive way. Other well know tools, such as the LISI model and DoDAF views don’t do this. SCOPE can also be used as a way of normalizing these and other interoperability strategies and processes. Boeing, LMCO, SAAB, Raytheon and others have adopted SCOPE but we are now customizing it for cloud computing. Using SCOPE, organizations can quantitatively and qualitatively measures how well a system can operate in a network centric environment. The addition of cloud computing domain specific dimensions and metrics can provide a means for directly mapping mission requirements to available, or planned, cloud computing capabilities.
To conceptualized this process, let’s say you have a mission that requires capabilities C1 through C8. Using the SCOPE methodology, the program manager could quantitatively and qualitatively evaluate options. Here I have only shown the Domain Independent and Technical/Economic Feasibility categories. The scale measures Capability C6 along a specific dimension. Below that, the Kiviat diagram aggregates all of the measured capabilities, presenting an aggregated view that compares mission requirements to the proposed solution’s capabilities. The resulting spider graph
This chart gives you an idea of some of the SCOPE technical feasibility dimensions. Technical Feasibility dimensions assess the degree to which the interface services between systems are technically feasible given the technical architecture constraints and resources available to effect the interface services. This chart presents technical feasibility as increasingly more challenging as one moves from level 1 to level 4. This corresponds to the increasing impact on program or capability implementation cost and risk as one moves to the right, as has been done with the other dimensions. A key technical feasibility measure is the degree of time-binding needed between systems to effect a capability. The tighter the time binding, the greater the demand on the technical architecture elements used to implement the interface service. Often the technical architecture elements make it infeasible to meet the time-binding needed to support a capability like time-critical targeting or ballistic missile defense. One resource requirement dimension is shown here as being that of GIG/NCES resources needed by the systems involved to implement a given capability at some Measure of Effectiveness. Typically this would be bandwidth on some portion of the GIG network, but it could also be some service invocation rate for NCES or COI services. Another technical feasibility measure is whether a particular system interaction will require a significant portion of run-time computing resources of the current or envision systems. Since it is difficult to talk about technical feasibility in absolute terms (given enough time and money, almost anything is technically feasible), the measures shown here are relative to the overall sizing estimates or actual costs incurred for the systems envisioned or involved in implementing an operational capability. As technical feasibility becomes increasingly challenging as the resources required for a capability consume increasingly large portions of the overall system capacity. Similar logic applies to the dimension of interface development complexity, although this dimension is more an acquisition time concern than a run time concern (although it may also impact the ease of change/evolution over the life cycle of system/interface). Again, this dimension is best measured relative to the overall scope of the envisioned system or capability. When an interface needed to effect a capability begins to dominate the development size of the system being acquired, sponsors may well consider it to be technically infeasible. They may also question whether the technical architecture assumptions might need to be re-examined and newer/alternate technologies and technology standards considered. The technology readiness level dimension applies in the case where an operational capability requires technical architecture elements that are not yet part of the baseline. In other words, the capability is feasible if we relax the technical maturity level below production level. However, lower TRL’s imply added development cost and technical/schedule risks and thereby impact the feasibility of implementing a particular capability.
Here are some of the Cloud Computing domain specific characteristic we have added to the SCOPE methodology. Since the user doesn’t own the cloud infrastructure, the degree of coupling between operational responsibility and resource ownership is an important facet. For example, coupling between the operational responsibility of a military unit to a DISA cloud would be much tighter that the coupling between that same unit and a commercial cloud service. Looser coupling implies more risk. By enhancing the basic SCOPE model with cloud computing specific dimensions like these, advantages and disadvantages of using a a cloud can be quantitatively and qualitatively measured and compared with other, more traditional options. A future world of inter-clouds will only increase the importance of methodologies like this.
Though the use of this enhanced SCOPE methodology, cloud computing solution design can truly be mission driven.