This document discusses strategic dimensions for network and IT service providers entering the cloud computing market. It conducted a survey of experts on both the demand and supply sides of the industry. The survey found that cloud computing is seen as a good opportunity for both network and IT service providers to expand into. Experts said the top benefits of cloud computing are flexibility, scalability, cost savings, and business continuity. However, security and data confidentiality were cited as major concerns. The document provides recommendations on strategic positioning in areas like value proposition, branding, and customization to differentiate in the cloud computing market.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
This document discusses security and privacy issues related to cloud computing. It begins by providing background on cloud computing architectures and infrastructures. It then reviews existing literature on common security issues in cloud computing like confidentiality, authentication, access control, and privacy. It also discusses potential solutions that have been proposed, such as virtualization, encryption, access control frameworks, and risk-adaptable access control models. Finally, it proposes a two-tier authentication scheme within a risk-adaptable access control framework to help address security and privacy challenges in cloud computing.
Netmagic stresses on how switching to the cloud allows organizations to meet their changing needs and goals without large capital or time investments. Read more here!
Industry edge communications edition spring 2013Jeff Edlund
HP helps the world’s communications service providers (CSPs) transform the
way they do business—to grow in a fast-changing market. CSPs must meet
the huge demand for new services and streamline internal operations. HP
is unmatched in its ability to help CSPs drive transformation with more than
30 years of telecom experience, global IT leadership, and a broad telecom specific
portfolio coupled with leadership in telecom services including
consulting, outsourcing, and managed services.
Organizations today face massive data growth and must choose between dedicated storage systems or cloud-based storage. There are pros and cons to each. Dedicated storage offers more control over data but requires infrastructure investment, while cloud storage provides scalability and flexibility at a lower cost but with less control. The best choice depends on an organization's unique needs, such as data security, compliance requirements, workload performance needs, and cost factors. The document provides details on how different data types and importance levels may be best suited for different storage technologies.
Cloud computing of late has become the new buzz word joining the ranks of terms including; grid computing, utility computing, virtualization, clustering, etc. However the problem is that everyone seems to have a different definition..
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The document discusses HP's Internet of Things (IoT) platform and solutions for communications service providers (CSPs) to capitalize on opportunities in the IoT market. It describes HP's IoT platform architecture which includes capabilities for device and service management, data acquisition and verification, data analytics, and network interworking. It also discusses how the platform allows CSPs to launch new revenue streams, enhance customer experiences, and optimize investments. The document provides examples of HP's energy management solution which uses the IoT platform to securely provide home automation and energy control services.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
This document discusses security and privacy issues related to cloud computing. It begins by providing background on cloud computing architectures and infrastructures. It then reviews existing literature on common security issues in cloud computing like confidentiality, authentication, access control, and privacy. It also discusses potential solutions that have been proposed, such as virtualization, encryption, access control frameworks, and risk-adaptable access control models. Finally, it proposes a two-tier authentication scheme within a risk-adaptable access control framework to help address security and privacy challenges in cloud computing.
Netmagic stresses on how switching to the cloud allows organizations to meet their changing needs and goals without large capital or time investments. Read more here!
Industry edge communications edition spring 2013Jeff Edlund
HP helps the world’s communications service providers (CSPs) transform the
way they do business—to grow in a fast-changing market. CSPs must meet
the huge demand for new services and streamline internal operations. HP
is unmatched in its ability to help CSPs drive transformation with more than
30 years of telecom experience, global IT leadership, and a broad telecom specific
portfolio coupled with leadership in telecom services including
consulting, outsourcing, and managed services.
Organizations today face massive data growth and must choose between dedicated storage systems or cloud-based storage. There are pros and cons to each. Dedicated storage offers more control over data but requires infrastructure investment, while cloud storage provides scalability and flexibility at a lower cost but with less control. The best choice depends on an organization's unique needs, such as data security, compliance requirements, workload performance needs, and cost factors. The document provides details on how different data types and importance levels may be best suited for different storage technologies.
Cloud computing of late has become the new buzz word joining the ranks of terms including; grid computing, utility computing, virtualization, clustering, etc. However the problem is that everyone seems to have a different definition..
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The document discusses HP's Internet of Things (IoT) platform and solutions for communications service providers (CSPs) to capitalize on opportunities in the IoT market. It describes HP's IoT platform architecture which includes capabilities for device and service management, data acquisition and verification, data analytics, and network interworking. It also discusses how the platform allows CSPs to launch new revenue streams, enhance customer experiences, and optimize investments. The document provides examples of HP's energy management solution which uses the IoT platform to securely provide home automation and energy control services.
This document discusses cloud computing and its potential benefits for organizations. It defines cloud computing and describes deployment and service models. The key benefits of cloud computing include lower costs, faster deployment of applications, scalability, and improved organizational agility. However, security, lack of standards, and regulatory compliance are challenges. The adoption of cloud computing is increasing but still early, with most activity from early adopters.
SDN creates a tailored or customized network experience which enables greater level of speed, flexibility, agility and scale in the data center. Read here from Netmagic Solutions.
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
This document discusses cloud computing, including its various models and challenges. It begins by defining cloud computing as the delivery of computing services over the internet. It then discusses the three main service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document also outlines the different types of cloud models based on location and service, including public, private, hybrid, community, and federated clouds. Finally, it discusses some of the key challenges of adopting cloud computing such as security, loss of control, vendor lock-in, and lack of skills.
This document discusses cloud computing, including its benefits and risks for businesses. Cloud computing provides shared IT resources over the internet on-demand, allowing businesses to avoid large upfront costs. It can increase efficiency and scalability while reducing costs. However, it also presents security risks to sensitive data if responsibilities between clients and providers are not clear or if standards lack. When selecting a cloud provider, businesses should carefully consider the provider's security controls, access management, legal policies for data storage, and ability to exit the agreement if needed. Overall, cloud computing offers a potentially cost-effective way to access computing resources but also requires managing risks to data security and privacy.
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
Cloud computing is a new technology that some people do not fully understand. Oracle CEO Larry Ellison has expressed confusion about cloud computing and what it would really change for companies. The document discusses an upcoming international conference on cloud computing that will bring together experts, providers, and users of cloud services.
The purpose of this webinar is to discuss project management of cloud computing. It demystifies terms and uncovers concepts associated with the cloud-based services. It discusses the evolution of the cloud by tracing its conceptualization back to earlier pioneers.
This document discusses the future of cloud computing and infrastructure. It covers several topics including:
1. How technological advances will enable machines to make rapid decisions without human biases.
2. The economic benefits cloud computing provides through standardized workloads, rapid provisioning, and usage-based billing.
3. The challenges of cloud computing including security, data privacy, application mobility between cloud providers, and lack of visibility across business processes.
4. Emerging trends in cloud computing like the rise of application containers and platforms as a service, as well as countertrends around vendor strategies and the role of operating systems.
Implementation of OSS/BSS Solution in IoT EcosystemVishal Kumar
IoT demands a different set of OSS/BSS Solution. This presentation presents our analysis to find a solution to implement OSS/BSS Solution in IoT Ecosystem. Various Whitepapers, Research Papers, and companies work have been studied key aspects are presented.
Service providers are aggressively exploring how artificial intelligence (AI) can streamline their business, reduce costs, and create new customer experiences. The Microsoft AI platform includes capabilities that enable developers to infuse AI across their applications. Cognitive Services are a collection of artificial intelligence Application Programing Interfaces (API) that are easy to use in enterprise apps and can enable service providers to reach their objectives in AI. The APIs enable service providers to acquire intelligence from customer calls by analyzing speech and sentiment, better respond to customer requests via natural language, and improve the customer experience by using knowledge to help agents serve customers better. Cognitive apps and Bots to improve operations and customer service are among the fastest growing technology trends in telecommunications.
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over Internet as a service providing cost effective and scalable solution to customers. Cloud computing has evolved as a disruptive technology and picked up speed with the presence of many vendors in cloud computing space. The evolution of cloud computing from numerous technological approaches and business models such as SaaS, cluster computing, high performance computing, etc., signifies that the cloud IDM can be considered as a superset of all the corresponding issues from these paradigms and many more. In this paper we will discuss Life cycle management, Cloud architecture, Pattern in Cloud IDM, Volatility of Cloud relations.
Convergence of Cloud Computing & Project ManagementVSR *
1. Cloud computing and project management are converging as technology provides real-time information and computing power to automate business processes.
2. Smart data centers that utilize virtualization, multi-tenant applications, and internet access can provide reliable computing power at an affordable price through public cloud computing.
3. Public clouds are playing a key role in making commercially viable computing power available, as building private data centers requires large upfront investments that many small and medium businesses cannot afford.
The document discusses a roundtable debate between experts on how network virtualization and cloud computing are impacting network service architectures. Key points discussed include:
- Virtualization breaks the linkage between applications and physical network devices, challenging traditional network models.
- Virtualization shifts the leverage point in networks from physical devices to hypervisor software, where more information is available.
- Most scalable cloud networks are architected without relying on VLANs or a single large Layer 2 domain.
- Networking functionality may become more generic and commoditized as infrastructure is outsourced to cloud providers. However, rich feature sets from individual vendors may still be required to meet customer needs.
- In the long run, a few large providers
Know whether cloud based storage or dedicated storage is best for your business IT infrastructure depending on our organization requirements. Check Netmagic’s outlooks.
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
Enterprise networks are increasingly required to support cloud applications, mobile users, and diverse devices seamlessly. This has heightened network requirements at the edge and driven demand for cloud-enabled campus networks that connect the network edge to cloud resources reliably. Modern networks must recognize a variety of wired and wireless devices, applications, users, and IoT things while optimizing for cloud apps and providing pervasive, reliable connectivity between remote offices, mobile users, and cloud/datacenter resources.
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersGartnerJessica
This presentation is focused on addressing the broad category of Cloud Service Providers. Gartner will provide a overview of how Cloud Service Providers are being defined and how they different from traditional providers of outsourcing or products. And more importantly, what are they offering that is different, new and seeks to solve business problems for the enterprise. This session will provide an overview of these areas and begin the discussion of how do clients develop the business case for certain cloud services offerings.
Topics Discussed
Gartner analysts discussed with participants the following topics:
What is a cloud service provider and how does it differ from traditional outsourcing providers?
How will the approaches to evaluate and select among these providers differ?
How does the business case analysis differ?
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer's hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26452.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26452/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/yin-myo-kay-khine-thaw
Cloud computing offers organizations scalability, flexibility, and speed while reducing costs. However, issues around security, data privacy, and regulatory compliance need to be addressed. While some organizations are piloting cloud computing services, widespread adoption is still 1-2 years away as only 10-30% of IT budgets are expected to be used for cloud services in the near future. Overall cloud computing has the potential to significantly change how IT services are delivered and used by businesses.
The document is a report from the U.S. Energy Information Administration analyzing oil and natural gas production from seven U.S. regions. It finds that these seven regions accounted for 92% of domestic oil production growth and all domestic natural gas production growth from 2011-2014. For each region, it provides data on historical and current production levels of oil and natural gas, as well as indicators of expected monthly changes for February 2016.
This document discusses cloud computing and its potential benefits for organizations. It defines cloud computing and describes deployment and service models. The key benefits of cloud computing include lower costs, faster deployment of applications, scalability, and improved organizational agility. However, security, lack of standards, and regulatory compliance are challenges. The adoption of cloud computing is increasing but still early, with most activity from early adopters.
SDN creates a tailored or customized network experience which enables greater level of speed, flexibility, agility and scale in the data center. Read here from Netmagic Solutions.
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
This document discusses cloud computing, including its various models and challenges. It begins by defining cloud computing as the delivery of computing services over the internet. It then discusses the three main service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document also outlines the different types of cloud models based on location and service, including public, private, hybrid, community, and federated clouds. Finally, it discusses some of the key challenges of adopting cloud computing such as security, loss of control, vendor lock-in, and lack of skills.
This document discusses cloud computing, including its benefits and risks for businesses. Cloud computing provides shared IT resources over the internet on-demand, allowing businesses to avoid large upfront costs. It can increase efficiency and scalability while reducing costs. However, it also presents security risks to sensitive data if responsibilities between clients and providers are not clear or if standards lack. When selecting a cloud provider, businesses should carefully consider the provider's security controls, access management, legal policies for data storage, and ability to exit the agreement if needed. Overall, cloud computing offers a potentially cost-effective way to access computing resources but also requires managing risks to data security and privacy.
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
Cloud computing is a new technology that some people do not fully understand. Oracle CEO Larry Ellison has expressed confusion about cloud computing and what it would really change for companies. The document discusses an upcoming international conference on cloud computing that will bring together experts, providers, and users of cloud services.
The purpose of this webinar is to discuss project management of cloud computing. It demystifies terms and uncovers concepts associated with the cloud-based services. It discusses the evolution of the cloud by tracing its conceptualization back to earlier pioneers.
This document discusses the future of cloud computing and infrastructure. It covers several topics including:
1. How technological advances will enable machines to make rapid decisions without human biases.
2. The economic benefits cloud computing provides through standardized workloads, rapid provisioning, and usage-based billing.
3. The challenges of cloud computing including security, data privacy, application mobility between cloud providers, and lack of visibility across business processes.
4. Emerging trends in cloud computing like the rise of application containers and platforms as a service, as well as countertrends around vendor strategies and the role of operating systems.
Implementation of OSS/BSS Solution in IoT EcosystemVishal Kumar
IoT demands a different set of OSS/BSS Solution. This presentation presents our analysis to find a solution to implement OSS/BSS Solution in IoT Ecosystem. Various Whitepapers, Research Papers, and companies work have been studied key aspects are presented.
Service providers are aggressively exploring how artificial intelligence (AI) can streamline their business, reduce costs, and create new customer experiences. The Microsoft AI platform includes capabilities that enable developers to infuse AI across their applications. Cognitive Services are a collection of artificial intelligence Application Programing Interfaces (API) that are easy to use in enterprise apps and can enable service providers to reach their objectives in AI. The APIs enable service providers to acquire intelligence from customer calls by analyzing speech and sentiment, better respond to customer requests via natural language, and improve the customer experience by using knowledge to help agents serve customers better. Cognitive apps and Bots to improve operations and customer service are among the fastest growing technology trends in telecommunications.
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over Internet as a service providing cost effective and scalable solution to customers. Cloud computing has evolved as a disruptive technology and picked up speed with the presence of many vendors in cloud computing space. The evolution of cloud computing from numerous technological approaches and business models such as SaaS, cluster computing, high performance computing, etc., signifies that the cloud IDM can be considered as a superset of all the corresponding issues from these paradigms and many more. In this paper we will discuss Life cycle management, Cloud architecture, Pattern in Cloud IDM, Volatility of Cloud relations.
Convergence of Cloud Computing & Project ManagementVSR *
1. Cloud computing and project management are converging as technology provides real-time information and computing power to automate business processes.
2. Smart data centers that utilize virtualization, multi-tenant applications, and internet access can provide reliable computing power at an affordable price through public cloud computing.
3. Public clouds are playing a key role in making commercially viable computing power available, as building private data centers requires large upfront investments that many small and medium businesses cannot afford.
The document discusses a roundtable debate between experts on how network virtualization and cloud computing are impacting network service architectures. Key points discussed include:
- Virtualization breaks the linkage between applications and physical network devices, challenging traditional network models.
- Virtualization shifts the leverage point in networks from physical devices to hypervisor software, where more information is available.
- Most scalable cloud networks are architected without relying on VLANs or a single large Layer 2 domain.
- Networking functionality may become more generic and commoditized as infrastructure is outsourced to cloud providers. However, rich feature sets from individual vendors may still be required to meet customer needs.
- In the long run, a few large providers
Know whether cloud based storage or dedicated storage is best for your business IT infrastructure depending on our organization requirements. Check Netmagic’s outlooks.
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
Enterprise networks are increasingly required to support cloud applications, mobile users, and diverse devices seamlessly. This has heightened network requirements at the edge and driven demand for cloud-enabled campus networks that connect the network edge to cloud resources reliably. Modern networks must recognize a variety of wired and wireless devices, applications, users, and IoT things while optimizing for cloud apps and providing pervasive, reliable connectivity between remote offices, mobile users, and cloud/datacenter resources.
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersGartnerJessica
This presentation is focused on addressing the broad category of Cloud Service Providers. Gartner will provide a overview of how Cloud Service Providers are being defined and how they different from traditional providers of outsourcing or products. And more importantly, what are they offering that is different, new and seeks to solve business problems for the enterprise. This session will provide an overview of these areas and begin the discussion of how do clients develop the business case for certain cloud services offerings.
Topics Discussed
Gartner analysts discussed with participants the following topics:
What is a cloud service provider and how does it differ from traditional outsourcing providers?
How will the approaches to evaluate and select among these providers differ?
How does the business case analysis differ?
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer's hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26452.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26452/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/yin-myo-kay-khine-thaw
Cloud computing offers organizations scalability, flexibility, and speed while reducing costs. However, issues around security, data privacy, and regulatory compliance need to be addressed. While some organizations are piloting cloud computing services, widespread adoption is still 1-2 years away as only 10-30% of IT budgets are expected to be used for cloud services in the near future. Overall cloud computing has the potential to significantly change how IT services are delivered and used by businesses.
The document is a report from the U.S. Energy Information Administration analyzing oil and natural gas production from seven U.S. regions. It finds that these seven regions accounted for 92% of domestic oil production growth and all domestic natural gas production growth from 2011-2014. For each region, it provides data on historical and current production levels of oil and natural gas, as well as indicators of expected monthly changes for February 2016.
The document summarizes the key elements and design of a magazine content page. It explains that the title catches readers' attention and helps them navigate the magazine. Pictures and credits keep readers engaged. The footer displays the page number while sections and features inform readers about the magazine's content. Color, font, and graphical elements are used strategically to guide the eye and emphasize important information.
La primera generación de computadoras abarcó desde 1938 hasta 1958 y se caracterizó por estar construidas con electrónica de válvulas y programarse en lenguaje de máquina. Algunas de las primeras computadoras más importantes fueron la ENIAC, la primera computadora electrónica de propósito general, y la EDVAC, la primera en ser binaria y almacenar programas. El transistor también se desarrolló durante esta época y reemplazó a las válvulas, mientras que las tarjetas perforadas y los tambores magnéticos se usaron como
Instituto Academia de Formación Jurídica Simón Rodríguez
“Enseñanza Jurídica que transforma vidas”.
Somos una institución de Educación de Adultos, que germino legalmente el 17 de Julio del Año 2014, siendo registrada en el Ministerio del Poder Popular Para las Relaciones Interiores y Justicia, Servicio Autónomo de Registros y Notarias y ante los órganos educativos del Estado Venezolano, entre los que destacan el INCES y el Ministerio del Poder Popular para la Educación, dedicada a la formación continua de profesionales en el derecho, preparándolos para entender, comprender y desarrollar exitosamente su ejercicio jurídico.
Estamos ubicados en la Ciudad de Maracay Estado Aragua – Venezuela. www.iafjsr.com.ve
Este documento fornece um modelo de contrato social para uma sociedade limitada (LTDA) no Brasil. Ele inclui cláusulas sobre a denominação social, sede, duração, objetivo, capital social, ingresso de novos sócios e direito de preferência na aquisição de quotas. O documento também fornece informações sobre o registro de empresas como sociedades limitadas versus empreendedores individuais.
This document discusses project scope management processes. It describes the five main processes: collect requirements, define scope, create WBS, verify scope, and control scope. The key outputs are the requirements documentation, project scope statement, work breakdown structure (WBS), and change requests. The collect requirements process involves gathering stakeholder needs through techniques like interviews, focus groups and prototypes. Define scope develops a detailed project description. Create WBS breaks down deliverables into smaller components. Verify scope ensures deliverables meet requirements. Control scope monitors for scope changes and manages the scope baseline.
The document discusses the key differences between an interest-based economic system and an Islamic economic system. It notes that an interest-based system leads to widening inequality, inflation, unemployment and corruption. However, an Islamic system based on prohibitions on interest and emphasis on zakat and charity can achieve full employment, reduce poverty and inequality, and create deflation instead of inflation. The Islamic system is presented as the superior model that provides practical solutions to economic problems that have troubled the world for centuries.
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
This document discusses multitenancy in cloud computing. It begins with an abstract describing multitenancy as the sharing of computing infrastructure like databases, processors and storage among multiple customers and organizations, providing cost and performance advantages. It then provides background on cloud computing and its advantages over traditional server systems. The document outlines the various components of a multitenant cloud computing system including users, providers and modules. It discusses requirements analysis and describes the system architecture and a multi-cloud system approach. In conclusion, it states that cloud computing will be extremely useful in the future for both testing startup projects and moving existing technology to reduce costs through a pay-per-use model.
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
- The document discusses the future of cloud computing and its potential benefits like cost savings, flexibility, and scalability compared to traditional IT models. However, some industry leaders like Richard Stallman and Larry Ellison have criticized cloud computing as hype.
- Market forecasts predict that cloud computing revenues will grow significantly over the next few years and that 20% of businesses will own no IT assets by 2012. The public cloud computing market in India is currently small but expected to grow rapidly.
- For companies considering cloud adoption, the document recommends starting with storage consolidation and virtualization before moving workloads to private and public clouds over time based on factors like security and control needs.
This document discusses cloud computing and OpenStack, an open source cloud computing platform. It provides definitions of cloud computing and describes how OpenStack uses virtualization to effectively share resources among users. The document also outlines different types of cloud computing users and services models, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It discusses the benefits of cloud computing for end users, such as reduced costs from outsourcing hardware maintenance and access to applications from anywhere.
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
This document discusses security challenges and digital forensic techniques for Software as a Service (SaaS) applications in cloud computing environments. It first describes SaaS and its benefits and outlines common security issues like data security, application security, and deployment security. It then reviews related work on securing cloud data storage and integrity. Various digital forensic challenges of investigating crimes in cloud environments are discussed, like lack of transparency and complex virtualized systems. A proposed cloud forensic strategy is described to help investigators collect and analyze evidence from cloud systems in an effective manner. Key security attacks on SaaS like SQL injection and cross-site scripting are also mentioned.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...Club Alliances
Collection de slides sur le Cloud Computing préparée pour l'animation d'un atelier de travail avec des partenaires [revendeurs, VAR, intégrateurs, éditeurs... de Best'Ware : Jargon, marché, usages, écosystème, risques, opportunités, étapes de démarrage... du Cloud Computing - Focus sur le rôle des revendeurs.
Cloud computing is a model for accessing computing resources over the internet on-demand. There are concerns about security and data protection with cloud services. While cloud computing provides benefits like scalability, cost savings, and mobility, issues include security risks from outages or data breaches, uncertainty around service agreements, and governance challenges with foreign data locations. Standards and best practices can help manage security risks for cloud computing.
The document discusses implementing cloud technology for business processes and choosing a cloud provider. It highlights the benefits of cloud computing like availability, scalability, and cost savings. It also covers important considerations for cloud adoption like data types used, integration needs, and strategies. When choosing a provider, the document emphasizes clarifying topics in the service level agreement like security, privacy, compliance, and performance definitions.
This document discusses cloud computing and provides an overview of key concepts. It begins with definitions of cloud computing and describes the three main models of cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It then outlines some common applications of cloud computing and benefits such as scalability, simplicity, and security. The document also reviews limitations, design principles, and the future scope of cloud computing. In conclusion, cloud computing provides convenient and cost-effective Internet-based computing services.
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
1) Homomorphic encryption allows processing of encrypted data without decrypting it first, enabling secure computations on outsourced data in cloud computing.
2) A homomorphic encryption scheme is proposed that uses a large integer ring as the plaintext space and a single key for encryption and decryption, providing confidentiality even when a non-trusted cloud server processes encrypted data.
3) The scheme could enable applications like private queries to a search engine, private information retrieval from databases, and secure electronic voting by allowing computations on encrypted data.
This document discusses cloud computing and its opportunities for telecommunications companies. It provides an overview of cloud computing concepts and categories. It then discusses True IDC, a major cloud computing provider in Thailand, and how it offers infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document also outlines opportunities and challenges for telecommunications companies to leverage their network expertise and enterprise relationships to provide cloud services.
IT professionals need to develop new skills to work with cloud technologies. Their core skills in areas like system configuration and virtualization transfer well, but they must learn skills for managing services in the cloud. These include skills in provisioning, monitoring, automation, security, and service management. Developers also need new skills like identity management, middleware use, and application architecture for the cloud. Database administrators should learn cloud storage services and how to design databases for any location.
The document discusses prospects and risks of cloud-based modeling and simulation services. It explores how cloud computing can be used in the area of computer-aided engineering (CAE) through two research projects funded by the German government and European Union. The projects examine technical foundations, security aspects, potential applications, and viable business models for offering CAE modeling and simulation services in the cloud. While the cloud provides benefits like flexibility, accessibility, and reduced costs, security, reliability, and usability must be ensured for long-term success of cloud-based engineering applications.
An Analysis on Business Value of Cloud ComputingIOSR Journals
This document analyzes the business value of cloud computing. It begins by defining cloud computing as a model for enabling on-demand access to shared computing resources over the internet. The key concepts of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service are described. The three cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - are outlined. The four deployment models of public, private, hybrid, and community clouds are also discussed. The document explores how cloud computing benefits business models by providing flexibility and a pay-as-you-go option. Ch
HARDWARE ARCHITECTURE OF PARALLEL COMPUTING, THE CLOUD COMPUTING REFERENCE MODEL, BUILDING CLOUD COMPUTING ENVIRONMENT, INFRASTRUCTURE AND SYSTEM DEVELOPMENT, HARDWARE ARCHITECTURES FOR PARALLEL PROCESSING APPROACHES TO
PARALLEL PROGRAMMING,
1. Single-Instruction, Single-Data (SISD) Systems
2. Single-Instruction, Multiple-Data (SIMD) Systems
3. Multiple-Instruction, Single-Data (MISD) Systems
4. Multiple-Instruction, Multiple-Data (MIMD) Systems
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
This document discusses security issues related to software-as-a-service (SaaS) applications in cloud computing environments. It first highlights different environments where SaaS is used and then analyzes common SaaS security challenges like data, application, and deployment security. The document then discusses digital forensics investigations of crimes related to cloud environments. It proposes a cloud forensics strategy to help investigators examine cybercrimes in an effective and efficient manner. Finally, the document identifies different types of security attacks on cloud computing and SaaS components, along with associated vulnerabilities and potential countermeasures.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Niloufer Tamboly and Mallik Prasad presented 'Securing The Journey To The Cloud' at the first (ISC)2 New Jersey Chapter meeting.
Chapter officers:
Gurdeep Kaur, President
Niloufer Tamboly, Membership Chair
Mallik Prasad, Secretary
Anthony Nelson, Treasurer
This document provides an overview of cloud computing, including its key benefits and challenges. It discusses the basics of cloud computing models like SaaS, PaaS, and IaaS. Public and private cloud options are described, as well as hybrid cloud. The main benefits of cloud computing are reduced costs, increased storage, and flexibility. However, key challenges include data security, availability, management capabilities, and regulatory compliance restrictions.
2. Abstract
Introduction
Literature review
Research Objective
Design & Methodology
◦ Problem Identification
◦ Selection of experts
◦ Administration of Questionnaire
◦ Survey Analysis
Findings
◦ The Strategic Benefits of Cloud Computing
◦ What to expect: Associated risks and challenges
◦ Strategic dimensions for Telecom/Network service providers
entering into cloud computing market.
◦ Telecom/ Network provider’s competitive advantages
◦ Strategic enablers for IT service providers
Conclusion
References
5/7/2010 2
3. A paradigm shift is taking place in the IT industry. Whereas
customers who wanted to support their business processes
with IT used to face having to buy all the necessary hardware,
operating systems and other components and decide on a
software platform, there is now the realistic vision of
obtaining the functionality they require under a pure leasing
model where they merely pay for what they use. IT will be
delivered as a service in future.delivered as a service in future.
The purpose of this research is to find strategic dimensions
and recommendations for Network & IT service providers to
enter into cloud computing market. This research is
conducted based on some publications & case study analysis,
and survey with some senior people in industry, both from
demand and supply side, and using IT industry experience.
5/7/2010 3
4. Cloud computing is a model for enabling
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and
services) that can be rapidly provisioned and
released with minimal management effort or
service provider interaction.service provider interaction.
This cloud model promotes availability and is
composed of five essential characteristics,characteristics,characteristics,characteristics, three
service modelsservice modelsservice modelsservice models, and four deployment modelsdeployment modelsdeployment modelsdeployment models.
(Definition by NISTDefinition by NISTDefinition by NISTDefinition by NIST-National Institute of standards and Technology)
5/7/2010 4
5. For all the reasons, it is easy to see why cloud computing is
an attractive potential service offering for any business
looking to enhance IT resources while controlling costs.
However, it should be noted that along with the benefits
come security and risk concerns that must be considered.
Cloud computing service and deployment model
◦ Cloud computing Service Models
◦ Cloud Computing Deployment Models
◦ Cloud computing essential characteristics◦ Cloud computing essential characteristics
(SourceSourceSourceSource: Publication by ISACA on “Cloud Computing –Business benefits and security issues”-year 2009)
Many major IT outsourcing service providers are investing
heavily to lay the groundwork for this potentially disruptive
market shift.
From Merrill Lynch, which is estimating the cloud computing
market to reach $160 billion by 2011.The estimate includes
$95 billion in business and productivity applications.
Earlier this year, Gartner pegged the market at $150 billion by
2013.
5/7/2010 5
6. Cloud computing Service ModelsCloud computing Service ModelsCloud computing Service ModelsCloud computing Service Models
Service ModelService ModelService ModelService Model DefinitionDefinitionDefinitionDefinition To be consideredTo be consideredTo be consideredTo be considered
Infrastructure as a service
(IaaS)
Capability to provision processing
storage, networks and other basic
computing resources. It offers
customers the ability to deploy
and run arbitrary software, which
may include operating systems
and applications. IaaS puts these
IT operations in the hands of third
party.
Options to minimize the impacts if
the cloud provide has a service
interruption.
party.
Platform as a service
(PaaS)
Capability to deploy onto the
cloud infrastructure customer-
created or acquired applications
created using the programming
languages and tools supported by
the provider
-Availability
-Confidentiality
-Privacy and legal liability in the
event of a security breach (as
databases housing sensitive
information will now be hosted
offsite)
-Data ownership
-Concerns around e-discovery
Software as a service
(SaaS)
Capability to use the provider’s
applications running on the cloud
infrastructure. The applications
are accessible from various client
devices through a thin client
interface such as a web browser.
-Who owns the applications?
-Where do the applications reside?
5/7/2010 6
7. Cloud computing Deployment ModelsCloud computing Deployment ModelsCloud computing Deployment ModelsCloud computing Deployment Models
Description of DeploymentDescription of DeploymentDescription of DeploymentDescription of Deployment
ModelModelModelModel
Description of DeploymentDescription of DeploymentDescription of DeploymentDescription of Deployment
ModelModelModelModel
To be consideredTo be consideredTo be consideredTo be considered
Private Cloud -Operated solely for an
organization
-May be managed by the
organization or a third party
-May exist on-premise or off-
premise
-Cloud services with minimum risk
-May not provide the scalability and agility
of public cloud services
Community Cloud -Shared by several organizations
-Supports a specific community
that has shared mission or interest
-May be managed by the
-Same as private cloud, plus:
-Data may be shared with the data
of competitors
-May be managed by the
organizations or
a third party
Public Cloud -Made available to the general
public or a large industry group
-Owned by an organization selling
cloud services
-Same as community cloud, plus:
-Data may be stored in unknown locations
and may not be easily retrievable.
Hybrid Cloud A composition of two or more
clouds (private, community or
public) that remain unique entities
but are bound together by
standardized or proprietary
technology that enables data and
application portability (e.g. cloud
bursting for load balancing between
clouds)
-Aggregate risk of merging
different deployment models
-Classification and labeling of data
will be beneficial to the security
manager to ensure that data are
assigned to the correct cloud type.
5/7/2010 7
8. Cloud computing essential characteristicsCloud computing essential characteristicsCloud computing essential characteristicsCloud computing essential characteristics
CharacteristicsCharacteristicsCharacteristicsCharacteristics DefinitionDefinitionDefinitionDefinition
On-demand self
service
The cloud provider should have the ability to automatically provision
computing capabilities, such as server and network storage, as needed
without requiring human interaction with each service’s provider.
Broad network
access
According to NIST, the cloud network should be accessible anywhere, by
almost any device (e.g. smart phone, laptop, mobile devices, PDA)
Resource pooling The provider’s computing resources are pooled to serve multiple
customers using a multitenant model, with different physical and virtual
Resource pooling
customers using a multitenant model, with different physical and virtual
resources dynamically assigned reassigned according to demand.
Rapid elasticity Capabilities can be rapidly and elastically provisioned, in many cases
automatically, to scale out quickly and rapidly released to scale in
quickly. To the customer, the capabilities available for provisioning often
appear to be unlimited and can be purchased in any quantity at any time.
Measured service Cloud systems automatically control and optimize resource use by
leveraging a meeting capability (e.g. storage, processing, bandwidth and
active user accounts). Resource usage can be monitored, controlled and
reported, providing transparency for both the provider and customer of
the utilized service.
5/7/2010 8
10. The research objective is to find strategic
dimensions and recommendations for
Network and IT service providers to enter into
this market.
5/7/2010 10
11. Delphi techniqueDelphi techniqueDelphi techniqueDelphi technique is used to capture the experts opinion on
different parameters related to customers expectations on
services and benefits using a web based survey followed a
discussions. Also, some related technical articles and industry
practices are referred.
Problem IdentificationProblem IdentificationProblem IdentificationProblem Identification
To identify the strategic dimensions for Cloud Computing market.
Selection of expertsSelection of expertsSelection of expertsSelection of experts
Selected people belong to different communities including both
Providers and Business users.
Selected people belong to different communities including both
Providers and Business users.
Administration of questionnaireAdministration of questionnaireAdministration of questionnaireAdministration of questionnaire
A survey is created using 3C's Model3C's Model3C's Model3C's Model of Ohmae for strategic look
needed for success factor of this business model.
The Corporation
The Customer
The Competitors
The survey URL isThe survey URL isThe survey URL isThe survey URL is
http://www.surveymonkey.com/s.aspx?sm=ZVHVL7T40PD4UkrrYio
Cqg_3d_3d
5/7/2010 11
12. Up to what extent you think as cloud will be a successful model
including for big enterprise (rate 1 to 5, where 1 is least and 5 is
most)
◦ 77%
Do you think that it will be a good opportunity for Network service
providers (like orange) to enter into this market or expand? (rate 1
to 5, where 1 is least and 5 is most)to 5, where 1 is least and 5 is most)
◦ 78%
Do you think that it will be a good opportunity for IT service
providers (like IBM, HP, TCS etc..) to enter into this market or
expand ?(rate 1 to 5, where 1 is least and 5 is most)
◦ 82%
5/7/2010 12
13. 45
100
90.9
36.4
9.1
63.6
72.7
72.7
63.6
36.4
Remove economic/expertise barriers impeding to…
Avoiding capital expenditure in hardware, software,…
Flexibility and scalability of IT resources
Increasing computing capacity and business…
Diversification of IT systems
Local and global optimisation of IT infrastructure…
Business Continuity and Disaster recovery capabilities
Assessing the feasibility and profitability of new…
Adding redundancy to increase availability and…
Controlling marginal profit and marginal costs
Series1
•What are the reasons behind your possible engagement in the Cloud computing area if you
need to take decision for moving your company's IT on cloud?
72.7
63.3
81.8
45.5
9.1
0 10 20 30 40 50 60 70 80 90
Individual software packages (SaaS)
Complete operating system and software…
Just infrastructure services such as storage,…
Security services in the cloud
Other (please specify)
Series1
45
0 20 40 60 80 100 120
Remove economic/expertise barriers impeding to…
•Which “layer” of the Cloud would you be most likely to approach?
5/7/2010 13
14. ◦ What are your main concerns in your approach to Cloud Computing?
45.5
18.2
27.3
18.2
36.4
72.7
Lack of liability of providers in case of…
Inconsistency between trans national laws…
Unclear scheme in the pay per use approach
Uncontrolled variable cost
Cost and difficulty of migration to the cloud…
Intra-clouds (vendor lock-in) migration
27.3
27.3
54.5
81.8
9.1
45.5
45.5
0 10 20 30 40 50 60 70 80 90
Privacy
Availability of services and/or data
Integrity of services and/or data
Confidentiality of corporate data
Repudiation
Loss of control of services and/or data
Lack of liability of providers in case of…
Series1
5/7/2010 14
15. Majority of experts (78%) feels that this business model is not
limited to SMBs which may go to cloud because of lack of IT
infrastructure and expertise, but big enterprises will also use this
model starting from different components and the overall
transition will be done in phased manner.
Majority (80%) think that Existing Network and IT service provider
can look forward for providing this business using their existing
capabilities.
Top reasons for selection cloud service are
◦ Avoiding capital expenditure in hardware, software, IT support, Information◦ Avoiding capital expenditure in hardware, software, IT support, Information
Security by outsourcing infrastructure/platforms/services.
◦ Flexibility and scalability of IT resources.
◦ Assessing the feasibility and profitability of new services (i.e. by developing
business cases into the Cloud).
◦ Business Continuity and Disaster recovery capabilities
The demand of services like Infrastructure as Service (IaaS) 82%
and Software as Service (SaaS) 73% is more.
However, there are some concerns on using this service primarily
for security reasons where “Confidentiality of data” is the major
concern by 82% population.
5/7/2010 15
16. The Strategic Benefits of Cloud ComputingThe Strategic Benefits of Cloud ComputingThe Strategic Benefits of Cloud ComputingThe Strategic Benefits of Cloud Computing
Cost containmentCost containmentCost containmentCost containment
The cloud offers enterprises the option of scalability without the serious
commitments required for the infrastructure purchase and maintenance.
There is little to no upfront capital with cloud services. Services and storage
are available on demand and are priced as a pay-as-you-go service.
Additionally, the cloud model could assist with cost savings in term of
wasted resources.
ImmediacyImmediacyImmediacyImmediacy
Many early adopters of cloud computing have cited the ability toMany early adopters of cloud computing have cited the ability to
provision and utilize a service in a single day. This compares to
traditional IT projects that may require weeks or months to order,
configure and operationalize the necessary resources. This has a
fundamental impact on the agility of a business and the reduction of
costs associated with time delays.
AvailabilityAvailabilityAvailabilityAvailability
Cloud providers have the infrastructure and bandwidth to
accommodate business requirements for high speed access, storage
and applications. As these providers often have redundant paths,
the opportunity for load balancing exists to ensure that systems are
not overloaded and services delayed.
5/7/2010 16
17. ScalabilityScalabilityScalabilityScalability
With unconsidered capacity, cloud services offer increased flexibility
and scalability for evolving IT needs. Provisioning the
implementation is done on demand, allowing for traffic spikes and
reducing the time to implement new services.
EfficiencyEfficiencyEfficiencyEfficiency
Reallocating information management operational activities to the
cloud offers businesses a unique opportunity to focus efforts on
innovation and research and development. This allows for business
and product growth and may be even more beneficial than the
innovation and research and development. This allows for business
and product growth and may be even more beneficial than the
financial advantages offered by the cloud.
ResiliencyResiliencyResiliencyResiliency
Cloud providers have mirrored solutions that can be utilized in a
disaster scenario as well as for load-balancing traffic. Whether there
is a natural disaster requiring a site in a different geographic area or
just heavy traffic, cloud providers say they will have the resiliency
and capacity to ensure sustainability through an unexpected event.
5/7/2010 17
18. Associated risks and challengesAssociated risks and challengesAssociated risks and challengesAssociated risks and challenges
Security is the biggest concern.Security is the biggest concern.Security is the biggest concern.Security is the biggest concern.
In cloud computing, server, network, and storage are provided to the
enterprise as a service. In turn, data is delivered to the cloud. Whether
it’s private customer information, business data, intellectual property,
trade secrets, or legal documents, IT leaders are understandably
sensitive for an organization.
Availability and reliability must meet enterprise expectationsAvailability and reliability must meet enterprise expectationsAvailability and reliability must meet enterprise expectationsAvailability and reliability must meet enterprise expectations.
IT systems that support key enterprise applications need to be stable,
reliable, and highly available. Theoretically, on-demand computing should
offer a high degree of reliability since the cloud distributes compute,
network, and storage functions across a substantially larger pool of physical
and virtual resources, making it more tolerant of individual hardware failures.
Control of environments in the cloud is a concernControl of environments in the cloud is a concernControl of environments in the cloud is a concernControl of environments in the cloud is a concern.
By their very nature, cloud computing service models involve transferring
some control to a trusted service provider. If certain areas of functionality
are deemed so essential that they must remain in-house under the direct
control of IT, then other considerations may have to take a back seat.
5/7/2010 18
19. -Value based positioning
(quality, performance &
Image)
-Product, brand elements
and price positioning are
highly standardized
Pioneering strategy helps
to differentiate from
Strong corporate
values
Trust with
Elements of
existing marketing
strategy for other
services
Existence of
similar
transnational
customers
Competitors like
Web market
leaders (Amazon &
Google)
Critical Internal Factors Critical External Factors
Typical elements of a
standardization strategy
of cloud market
to differentiate from
competition
(SLAs and platform
independence)
-High end segments are
natural target market
-Add-on service and as
an entry
Trust with
Customers and
operational
capabilities (SLA)
Balancing of
profitability and
risk considerations
Google)
Prospects of
integrating with
existing services
Focus on cost
reduction and
energy saving by
corporate-Adaptation of non core elements
(Packaging of offerings, sales
promotion-B2B)
-Creative selection (product/service
mix, advertising –B2B)
Area of mechanism
adaption
5/7/2010 19
20. Clouds will increase network traffic and utilization and thus
transport revenues.
In physically delivering cloud-based services, telecom carriers have
an opportunity to extract two revenue streams from the same
function.
Telecom/ Network provider’s competitive advantagesTelecom/ Network provider’s competitive advantagesTelecom/ Network provider’s competitive advantagesTelecom/ Network provider’s competitive advantages
Trusted relationshipsTrusted relationshipsTrusted relationshipsTrusted relationships
Existing association with enterprises with capabilities like 24x7
operation.
Reliable operations that scaleReliable operations that scaleReliable operations that scaleReliable operations that scale
Existing certification process and engineered to provideExisting certification process and engineered to provide
99.999% service availability
Service level agreements (SLAs) with real impactService level agreements (SLAs) with real impactService level agreements (SLAs) with real impactService level agreements (SLAs) with real impact
Meaningful SLAs and clear matrices.
Vendor independenceVendor independenceVendor independenceVendor independence
Existing infrastructure components, easy to integrate with other
IT systems
Global presence and market commitmentGlobal presence and market commitmentGlobal presence and market commitmentGlobal presence and market commitment
Global customer base and reach to cover global market with
ease.
5/7/2010 20
21. Strategic enablers for IT service providersStrategic enablers for IT service providersStrategic enablers for IT service providersStrategic enablers for IT service providers
The value proposition of cloud computingThe value proposition of cloud computingThe value proposition of cloud computingThe value proposition of cloud computing
By enhancing the existing IT infra management and hosting
model.
WebWebWebWeb----based applications promote IT independencebased applications promote IT independencebased applications promote IT independencebased applications promote IT independence
Promoting web based applications as solution to serve
globally positioned customers of organization.
Growing managed services market produces revenue.Growing managed services market produces revenue.Growing managed services market produces revenue.Growing managed services market produces revenue.
By promoting their capability of being end to end solutionBy promoting their capability of being end to end solution
provider to enterprise users.
Increasing carriers' data center efficiency and operationsIncreasing carriers' data center efficiency and operationsIncreasing carriers' data center efficiency and operationsIncreasing carriers' data center efficiency and operations
By reducing no. of servers, storage, applications platforms
using technology like virtualization.
Differentiating service providers from the packDifferentiating service providers from the packDifferentiating service providers from the packDifferentiating service providers from the pack
Using approach like pay-as-use for end to end service,
instead of different units for different IT services.
5/7/2010 21
22. The research outcome indicates the benefits of cloud
computing for business and challenges for service providers.
Moving to a cloud-based platform poses challengeschallengeschallengeschallenges and
concerns for service providers. Dealing with standards,standards,standards,standards,
security, performance, data compliancesecurity, performance, data compliancesecurity, performance, data compliancesecurity, performance, data compliance aligned with
procedures and operationsoperationsoperationsoperations, and availabilityavailabilityavailabilityavailability issues are just a
few of the organizational and technical challenges they'll have
to address to make cloud computing a true value proposition.
Service providers can leverageleverageleverageleverage their reputationsreputationsreputationsreputations and solid
performances to offer reliable, comprehensive and secure
cloud services. Most importantly, service providers can showcloud services. Most importantly, service providers can show
valuevaluevaluevalue by strongly emphasizing that cloud computing allows
enterprises to focusfocusfocusfocus on other aspects of their businessesaspects of their businessesaspects of their businessesaspects of their businesses
without having to concentrate resources on IT, server
updates, and maintenance issues -- a win-win service
offering for both service providers and their customers.
And last but certainly not least, by ensuring the value ofvalue ofvalue ofvalue of
services deliveredservices deliveredservices deliveredservices delivered via cloud computing, service providers not
only deliver business valuebusiness valuebusiness valuebusiness value to their users but increase and
extend their sustainabilitysustainabilitysustainabilitysustainability.
5/7/2010 22
23. Cloud services core to the strategy
Firms like Dell and IBM are extremely focused on the impending disruptive
change that the growth of the cloud services market will cause. These firms,
IBM in particular, are also the most aggressive in generating and protecting
cloud-related intellectual property.
Aggressive strategy for cloud services growth
Firms like Accenture, HP, and Wipro are aggressive to have a few more
existing clients than firms that are still developing cloud services as a broad
commercial offering that supplement traditional outsourced services.
Managed growth into cloud servicesManaged growth into cloud services
Firms like Atos Origin, CSC, and Siemens IT Solutions and Services, and TCS
all offer some cloud services and have intent to grow their offerings for
enterprise clients. These firms are treating cloud more as a key service add-
on to their existing portfolios.
Cloud service alliance partner
Capgemini is taking a focused position as the consultant and service
integrator in place to plan, sell, implement, and manage the cloud services
developed by other firms like Amazon, Google and Symantec.
(Source:(Source:(Source:(Source: Market Overview Of Cloud Service Strategies From Global IT Providers from - by Paul Roehrig, For Sourcing &
Vendor Management Professionals-June 2009)
5/7/2010 23
24. Draft NIST Working Definition of Cloud Computing v15,
http://csrc.nist.gov/groups/SNS/
Cloud-computing/cloud-def-v15.doc
Publication by ISACA on “Cloud Computing –Business benefits
and security issues”-year 2009
Cloud Computing – A Classification, Business Models, and
Research Directions,
Business & Information Systems Engineering 5 | 2009
www.alcatel-lucent.com – Strategic discussionswww.alcatel-lucent.com – Strategic discussions
Paper on “Building theories from case study research” by
Eisenhardt, Kathleen M.
Academy of Management. The Academy of Management Review;
Oct 1989; 14, 4; ABI/INFORM Global
Market Overview Of Cloud Service Strategies From Global IT
Providers from - by Paul Roehrig, For Sourcing & Vendor
Management Professionals-June 2009
Cloud Computing – Business Models, Value Creation Dynamics
and Advantages for Customers Siemens IT Solutions and ServicesIT Solutions and ServicesIT Solutions and ServicesIT Solutions and Services
5/7/2010 24