ICT Transformation in KSA presented by Mr. Imran Ashraf (Director Cloud & Advance Services, Mobily) at the Mobily-IBM Security & Resiliency Conference 2014
Hi,
e again Abdul Hadi Anwar, This is my Bachelor level presentation on STC, I hope you like it, for more information please ,
G mail: abdulhadianwar9998@gmail.com
Provides a brief overview of the IT Market in Qatar as of September,2015. It covers the following aspects:
1. Size of the IT market(Services, Hardware and Software) in Qatar
2. An outlook on some of the current IT Service Providers in Qatar
3. Major initiatives/projects and key drivers for IT growth in Qatar
4. Key Challenges to the growth
5. Current Ongoing projects in Qatar where scope of IT investment is huge
ICT Transformation in KSA presented by Mr. Imran Ashraf (Director Cloud & Advance Services, Mobily) at the Mobily-IBM Security & Resiliency Conference 2014
Hi,
e again Abdul Hadi Anwar, This is my Bachelor level presentation on STC, I hope you like it, for more information please ,
G mail: abdulhadianwar9998@gmail.com
Provides a brief overview of the IT Market in Qatar as of September,2015. It covers the following aspects:
1. Size of the IT market(Services, Hardware and Software) in Qatar
2. An outlook on some of the current IT Service Providers in Qatar
3. Major initiatives/projects and key drivers for IT growth in Qatar
4. Key Challenges to the growth
5. Current Ongoing projects in Qatar where scope of IT investment is huge
Africa, adopting cloud computing on its own termsitnewsafrica
Africa, adopting cloud computing on its own terms. An overview of cloud adoption in Africa.
Presented by Ian Duvenage, Head of ICT, Africa, Frost & Sullivan.
September 05, 2013 edition of the IT News Africa Innovation Dinner (www.innovationdinner.co.za)
Information and Communication Technology Spends in GCC | An Aranca Infographic Aranca
Information and Communication Technology spends in the GCC region is expected to grow. Investment in technology parks, rising FDI, growing e-commerce will be major driven factors for IT spending in the GCC region. CAGR forecast highlights that ICT spending is rising in Saudi Arabia, UAE, Qatar, etc.
Following from the theme of the 16th annual IAD Summit, this report provides tips and roadmaps to how you can access, engage and retain your stakeholders
Cloud computing in africa emerging trends & perspectivesFola Odufuwa
Cloud-computing is in its early growth stages, large corporate enterprises being earlier adopters. Market activity across Africa appears supply-side driven rather than demand-side driven. Exception is South Africa where demand is arising from the private sector. SMEs and the public sector without legacy IT assets can be greatest beneficiaries.
Cloud providers are mostly global US-based players with some local presence. A number of South African based companies like Dimension Data and Internet Solutions are competing aggressively by providing services on the continent. Local IT providers and telcos typically compete with global brands within the cloud market. Public sector usage is limited though the governments of Ethiopia, Ghana, Kenya and Nigeria are beginning to explore public cloud solutions
Cloud Services: Opportunities & Challenges for East Africaitnewsafrica
Cloud Services: Opportunities and Challenges for East Africa
Danson Njue
Research Analyst – Africa
Informa Telecoms & Media
Danson.njue@informa.com
ITNewsAfrica Innovation Dinner Nairobi, 10 December 2013
ICT has a pivotal role in the national aspiration of becoming a High Income Nation by 2020. From the strategic role as an enabler, ICT has become a key economic sector of the country. As such, it is imperative to position ICT as an industry with a sustainable national innovation ecosystem. The advent of ICT has conceived the Internet of Things (IoT), the next evolution of the Internet.
The Review of National Strategic ICT Roadmap 2008 and Technology Roadmaps identified six technology focus areas; specifically Cloud Computing, Wireless Intelligence, Big Data and Analytics, Security, E-Services and Ubiquitous Connectivity. Accordingly, IoT technology being the convergence of the six technology focus areas will galvanize the Government machinery and the country’s ICT industry alike in forging ahead with our technological transformation and increase Malaysia’s global competitiveness.
Malaysia’s IoT Strategic Roadmap is part of our continuous efforts in harnessing science, technology and human capital to create a new source of economic growth. IoT will create boundless opportunities for the R&D community to thrust homegrown technologies for commercialization to a higher level.
The proliferation and the industrialization of IoT in Malaysia will lead to market creation, and in turn, job creation as well as accumulation of intellectual property. With the right direction and policies, this will bring Malaysia further towards a knowledge-based society.
The National IoT Strategic Roadmap that has been thoughtfully formulated will be the fruit of a collective national endeavor, where each and every stakeholder has a critical role to play. I am confident that it will rejuvenate vigor and energy to various implementation agencies in the Government and the Malaysian ICT industry towards achieving Vision 2020.
Find out how digital security and surveillance solutions could help cities with reducing urban road accident fatalities, crime prevention and resolution, effective incident monitoring, predictive analytics, and emergency response management.
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...accacloud
The ACCA developed this report with the primary purpose of equipping CSPs with an understanding of the current regulatory landscape in APAC, and their FSI customers’ key regulatory challenges to adopting Cloud Services. This report aims to help CSPs to develop and provide solutions to these challenges. In particular, this report:
1. provides CSPs with a database of issues and possible solutions to discuss with their FSI customers;
2. provides CSPs with recommendations as to how to comply with the current regulatory landscape; and
3. supports CSPs in their engagement with relevant governments and Regulators.
This report may also be used by Regulators and FSIs to understand the current regulatory landscape in APAC and the key opportunities and challenges to adopting Cloud Services.
For more information, visit us at http://www.asiacloudcomputing.org
Presentation on ICT Overview and Opportunity in Thailand. Information is gathered from many sources and prepare for presenting to ATCI on 4 February 2013
Bank 2.0 - How to get ready for the new era of Engagement BankingBackbase
In this presentation, Jelmer de Jong presents the Backbase vision of Engagement Banking, introducing the concept of Bank 2.0, to help banks prepare for this new era.
Africa, adopting cloud computing on its own termsitnewsafrica
Africa, adopting cloud computing on its own terms. An overview of cloud adoption in Africa.
Presented by Ian Duvenage, Head of ICT, Africa, Frost & Sullivan.
September 05, 2013 edition of the IT News Africa Innovation Dinner (www.innovationdinner.co.za)
Information and Communication Technology Spends in GCC | An Aranca Infographic Aranca
Information and Communication Technology spends in the GCC region is expected to grow. Investment in technology parks, rising FDI, growing e-commerce will be major driven factors for IT spending in the GCC region. CAGR forecast highlights that ICT spending is rising in Saudi Arabia, UAE, Qatar, etc.
Following from the theme of the 16th annual IAD Summit, this report provides tips and roadmaps to how you can access, engage and retain your stakeholders
Cloud computing in africa emerging trends & perspectivesFola Odufuwa
Cloud-computing is in its early growth stages, large corporate enterprises being earlier adopters. Market activity across Africa appears supply-side driven rather than demand-side driven. Exception is South Africa where demand is arising from the private sector. SMEs and the public sector without legacy IT assets can be greatest beneficiaries.
Cloud providers are mostly global US-based players with some local presence. A number of South African based companies like Dimension Data and Internet Solutions are competing aggressively by providing services on the continent. Local IT providers and telcos typically compete with global brands within the cloud market. Public sector usage is limited though the governments of Ethiopia, Ghana, Kenya and Nigeria are beginning to explore public cloud solutions
Cloud Services: Opportunities & Challenges for East Africaitnewsafrica
Cloud Services: Opportunities and Challenges for East Africa
Danson Njue
Research Analyst – Africa
Informa Telecoms & Media
Danson.njue@informa.com
ITNewsAfrica Innovation Dinner Nairobi, 10 December 2013
ICT has a pivotal role in the national aspiration of becoming a High Income Nation by 2020. From the strategic role as an enabler, ICT has become a key economic sector of the country. As such, it is imperative to position ICT as an industry with a sustainable national innovation ecosystem. The advent of ICT has conceived the Internet of Things (IoT), the next evolution of the Internet.
The Review of National Strategic ICT Roadmap 2008 and Technology Roadmaps identified six technology focus areas; specifically Cloud Computing, Wireless Intelligence, Big Data and Analytics, Security, E-Services and Ubiquitous Connectivity. Accordingly, IoT technology being the convergence of the six technology focus areas will galvanize the Government machinery and the country’s ICT industry alike in forging ahead with our technological transformation and increase Malaysia’s global competitiveness.
Malaysia’s IoT Strategic Roadmap is part of our continuous efforts in harnessing science, technology and human capital to create a new source of economic growth. IoT will create boundless opportunities for the R&D community to thrust homegrown technologies for commercialization to a higher level.
The proliferation and the industrialization of IoT in Malaysia will lead to market creation, and in turn, job creation as well as accumulation of intellectual property. With the right direction and policies, this will bring Malaysia further towards a knowledge-based society.
The National IoT Strategic Roadmap that has been thoughtfully formulated will be the fruit of a collective national endeavor, where each and every stakeholder has a critical role to play. I am confident that it will rejuvenate vigor and energy to various implementation agencies in the Government and the Malaysian ICT industry towards achieving Vision 2020.
Find out how digital security and surveillance solutions could help cities with reducing urban road accident fatalities, crime prevention and resolution, effective incident monitoring, predictive analytics, and emergency response management.
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...accacloud
The ACCA developed this report with the primary purpose of equipping CSPs with an understanding of the current regulatory landscape in APAC, and their FSI customers’ key regulatory challenges to adopting Cloud Services. This report aims to help CSPs to develop and provide solutions to these challenges. In particular, this report:
1. provides CSPs with a database of issues and possible solutions to discuss with their FSI customers;
2. provides CSPs with recommendations as to how to comply with the current regulatory landscape; and
3. supports CSPs in their engagement with relevant governments and Regulators.
This report may also be used by Regulators and FSIs to understand the current regulatory landscape in APAC and the key opportunities and challenges to adopting Cloud Services.
For more information, visit us at http://www.asiacloudcomputing.org
Presentation on ICT Overview and Opportunity in Thailand. Information is gathered from many sources and prepare for presenting to ATCI on 4 February 2013
Bank 2.0 - How to get ready for the new era of Engagement BankingBackbase
In this presentation, Jelmer de Jong presents the Backbase vision of Engagement Banking, introducing the concept of Bank 2.0, to help banks prepare for this new era.
Saudi Arabia: The National Communications and Information Technology PlanUnited Interactive™
Ministry of Communications and Information Technology, Kingdom of Saudi Arabia: The National Communications and Information Technology Plan - The Vision Towards the Information Society
HOW TO DEVELOP BUSINESS STRATEGY_ICT MODEL_Dr. TALAAT REFAATDr Talaat Refaat
In the frame of the rapid growth of NGC, specially while trying to gain subcontracts with AT&T after the later had won a huge contract with the Ministry of Post, Telegraph & Telephone (PTT); now it is “Saudi Telecom Company” (STC), KSA http://www.stc.com.sa/ The contract includes Telephone Exchanges to provide 1.5 million telephone lines, Transmission and junction links, Information Systems, Subscriber radio network, Training Facilities and programs... etc. The total contract value is three billion and nine hundred fifty one million US dollars. In the frame of these circumstances the following tasks have been conducted:
A study titled "Business Strategy for Business Development Sector";
The Directors, Departments and Projects managers needs to Improve the
Decision Making Process have been identified,
The material for the following topics were prepared:
Project Awareness and Definition Course, Network Analysis Course; Project
Management & Control Tools, Quantitative Approaches to Management Awareness; Decision Support Systems (DSS) Awareness; Procurement Methodology Awareness and Writing the Wining Proposal Awareness;
A training room equipped with recent H/W , S/W, and devices had been established;
A two months courses and awareness including the mentioned topics have been taught for about 15 Directors, Departments, and Projects Managers of NGC;
Professional Presentations explaining complex concepts and ideas through highly developed communication and presentation skills have been done for NGC clients as well as NGC Projects Managers.
With my team (LKYSPP MPA), we presented the basic concept, advantages, case studies, and risk management of "Cloud Computing" to (potential) policy makers, in the framework of our "Governance Study Project". We'd like to help those policy makers to make their informed decision on integrating tech-solutions in their governance, business community, and the general public.
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
Datacomm Cloud Business Overview
Making Indonesia 4.0
Digital Transformation in Banking Industry
Introduction to Cloud Computing
Big Data Analytics Introduction
Big Data Analytics Application in Banking
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
Deployment of scalable reliable and collaborative technologyGGR Communications
Increasing employee/customer satisfaction and competitive advantage through the deployment of scalable, reliable and collaborative technology. This presentation goes into more detail regarding the solutions available from GGR Communications.
Partners in Technology 11Oct2013 DSDIP DLGCRR Mark CushingDigital Queensland
Mark Cushing will provide an overview of the profile of DSDIP and DLGCRR, the departments' strategic direction and change agenda. Mark will discuss the departments' forward ICT procurement and major business challenges expected over the coming years.
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalKalin Hitrov
At our digital event for IT innovators looking to future-proof their infrastructure we shared ideas and real-world case studies on how to reduce complexity, improve agility and perfect scalability in an ever-changing environment.
Assessing the Business Value of SDN Datacenter Security Solutionsxband
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Similar to Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD (20)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. The Defence Information Vision
Agile exploitation of our information
capabilities to improve effectiveness
and efficiency on operations and in
support areas through access to, and
sharing of timely, accurate and trusted
information.
MODIS 2011
4. The Current Defence ICT Environment
ICT is constraining Operational and Corporate activity
• Lack of flexibility to meet user demands.
• Slow introduction and adoption of new technology.
• Limited interoperability and opportunities for collaboration.
Budgets are significantly reduced
• Existing programme and project budgets have been continually and significantly reduced.
• Forcing a focus on rationalisation and continuity of service.
Uncertain and changing environment
• Fractured ICT ownership with limited governance.
• Transition risk resulting from the Cabinet Office direction to move from large prime to
smaller multi-vendor services.
• ICT suitably qualified and experienced resources, and rapid market innovation.
• Increased Cyber Security threat.
5. Wider ICT Environment
• Social Media
• Engagement
• Productivity
• Cloud and Crowd Sourcing
• IP Telephony – Ubiquitous Connectivity
• Cost Reduction
• Big Data
• Mobility
• Consumerisation
6. MOD’s response - Information Operating Model
• Defence wide Information Strategy and Policy
• Defence wide Information Coherence (CTO)
• Defence Wide Information Risk and Assurance
• Delivery Sponsorship accountability for common
Defence projects (e.g. Crypto, DCNS, DII)
• Delivery Sponsorship accountability for Corporate and
X Govt projects (e.g. CSSCP)
Functions
• 2 Star CIO reporting to DG T and CS
• One 1 star post being established for each
function (above)
• CTO Post set up as a dual report between
CIO and JFC
Org
CIO
• CDI is DA for C4ISR on behalf of Com JFC
• There are 3 key 1 star roles which comprise the
Defence Authority for C4ISR, each reporting to
different 2 stars (Dir Cap, CIO, DCI3)
- HOC C4ISR (capability planning and sub-portfolio
management)
- CTO (C4ISR coherence)
- C4ISR Joint User
JFC – Defence Authority for C4ISR
• Capability Planning
• Capability Sub Portfolio Management
• C4ISR coherence
• Develop and Operate
• Joint User for C4ISR
ISS & ISTAR: Information Systems Acquisition and Operations
FLCs/TLBs: Capability Delivery, Integration and Generation (via SRO Role)
FunctionsOr
g
7. IOM - the opportunities
• Government ICT mechanisms
– Enterprise scales of economy
– Pan-Government solutions and frameworks
– Modern policies
• Defence Authorities for C4ISR and Cyber
– Advocacy and championship
– Focused capability planning
– Needs, priorities and beneficial outcomes identified
– Information and ICT coherence driven
– Assurance
• MOD Enterprise Architecture Leadership
– Including SOSA
• A Defence ‘Coherence Community’
8. The ‘Coherence Community’ – A Virtual CTO Team
NCA NTA NOA
Shared
pipeline
Shared
artefacts
JSA DCA
DSF
JIG
DSAS
EG
SOSA
9. Defence 10-Point Plan Approach
Increased
Productivity
Increased
Productivity
Services
Anywhere
Services
Anywhere
Dynamic
Interoperability
Dynamic
Interoperability
Increased
Information
Management &
Exploitation
Increased
Information
Management &
Exploitation
Strategic Sourcing for
ICT Services
Strategic Sourcing for
ICT Services
Strengthen Cyber
Security
Strengthen Cyber
Security
Identify MOD
Personas
Identify MOD
Personas
Improve Enterprise
Architecture
Improve Enterprise
Architecture
Strengthen WorkforceStrengthen Workforce
Enable Agile ICT
Delivery
Enable Agile ICT
Delivery
Strengthen ICT
Governance
Strengthen ICT
Governance
Optimise Enterprise
Networks
Optimise Enterprise
Networks
Deliver MOD
Enterprise Cloud
Deliver MOD
Enterprise Cloud
Standardise and
Simplify ICT Platforms
Standardise and
Simplify ICT Platforms
10. Desired Operational and Corporate User Experience
Increased
Productivity
Services
Anywhere
Dynamic
Interoperability
Increased
Information
Management
and Exploitation
Reduced Logon and
application access times
(Fixed and Deployed)
Wireless access from
home & mobile access
points
Access to email,
Calendar & Common
Working Environment
from range of devices
CYOD (Limited
Community)
Increased information
access and sharing with
OGDs, NATO, Industry
and Allies
Single and unified
Identity Management
and Access across MOD
Cloud Integration and
Big Data
MOD Social Media
Wireless access (incl
Secure) from MOD Sites
Single Sign-On and
secure trusted cloud
access
Dynamic use of ICT
between the MOD and
wider-Government
CYOD (Full Community)
Easy and quick access
to approved MOD & x-
Gov. applications –
COTS Configured
Enhance collaborative
working direct from
device
Access to MOD Social
Media, New, LOB and
HR applications from a
range of services
Access to range of
services from deployed
environment using a
range of devices
11. CONSOLIDATE
INFRASTRUCTUR
E
STREAMLINE
PROCESSES
STRENGTHEN
WORKFORCE
MOD ICT Transformation
1. Consolidate Enterprise
Networks
2. Deliver MOD
Enterprise Cloud
3. Standardise & Simplify
ICT Platforms
10. Modernise ICT
Guidance & Training
4. Enable Agile ICT
Procurement & Delivery
5. Strengthen ICT
Governance
6. Strategic Sourcing for
ICT Commodities
7. Strengthen Cyber
Security
8. Identify MOD Personas
(User Segmentation)
9. Improve Enterprise
Architecture Effectiveness
12. Defence ICT Transformation Blueprint
Department of State Military
OFFICIAL SECRET TS
Enterprise Cloud
Hosting Environment
Deployed Cloud
Commercial satellite
Military satellite
Public
Switched
Network
Deployed
Mobile
Network
Unified
Comms
Data Centres
Unified
comms
Internet & OGD
Gateways
IdAM
Deployed
trusted comms
CYOD
International
gateways
Fixed mobile convergence
Increased
Productivity
Services
Anywhere
Dynamic
Interoperability
Increased
Information
Management &
Exploitation
Providing a flexible and
modern user
experience…
By equipping the ICT
workforce and
governing the Defence
ICT environment…
To deliver an
integrated and
evolving
architecture…
Defence ICT
Transformation
Team
Defence ICT
Transformation
ISS ICT
Transformation
Reconfigured
ICT Equipment Plan
ICT Resources and
Skills
9
13. Considered
•DCNS (inc. GRAPEVINE and EMPORIUM)
•DII (Current)
•DFTS
Development of the 10-Point Plan – Scope
Aware of but not
included in plan
•CSSP
•ECIP
•LogNEC
•Above SECRET
•FLC ICT
•TLB ICT
•Falcon
•LE TacCIS
•Platform Integration
•BLOS
•EMBRACE
Department of State Military
OFFICIAL SECRET TS
Enterprise Cloud
Hosting Environment
Deployed Cloud
Commercial Satellite
Military Satellite
Public
Switched
Network Deployed Mobile
Network
Unified
Comms
Data Centres
Unified
Comms
Internet & OGD
Gateways
IdAM
Deployed trusted
Comms
CYOD
Allies
Gateway
Fixed Mobile Convergence
The proposed ICT Transformation plan was limited in scope to the core services provided
by the current DII and DFTS contracts, plus EMBRACE. A portfolio approach across all ICT
programmes and projects will drive efficiencies and greater E2E coherence.
10
14. Defence ICT Transformation Indicative Plan
Activities to achieve the desired user experience and transition to a more efficient and agile ICT environment
11
15. Establish the MOD ICT Transformation Programme
Establish a central control of the E2E Lifecycle to drive ICT Transformation through a single ICT Portfolio across Defence
TRANSFORMING
DEFENCE
GOVERNANCE &
LEADERSHIP
TRANSFORMING
ICT
TEAM
FUNCTIONS
E2E Lifecycle
Coherence
•Strategy & Policy
•Capability Planning
•Capability Delivery
•Capability Generation
•User
•Operations / Live
Service
ICT
DESIGN
AUTHORITY
(CIO, CTO)
ICT PORTFOLIO
MANAGEMENT
(DAC4ISR, ISS)
DCNS
Defence Transformation Board
Defence Board
Department of State
PUS, CIO,
DISS, DC4ISR,
DCI3
PORTFOLIO ASSURANCE
DII TLBs ICT FLCs ICT …DFTS
COHERENT ICT PORTFOLIO ICT Programmes & Projects
Defence Operating Board (Transformation)
ICT PROFESSION
Culture,
People and Skills
(CIO)
DIRECTION & DECISION TAKING
COMMS & ENABLING FUNCTIONS
JFC (Transformation)
ICTTransformation
PortfolioEntry
16. Governance
• Chaired by PUS and Com JFC - endorse MOD ICT Transformation and the establishment of
the Team to develop and embed the mandate (under IB Leadership).
Defence
Information Board
•Scope of the initial portfolio (ECIP, BLOS etc.).
•Approach to Cloud (e.g. Cloud first).
•Approach for Grapevine 2 & Emporium (Stop, Start, Continue).
•Establish MOD ICT Design Authority.
•Sentence key requirements.
•Decision on a “build it and they will come “ approach and the approval implications.
•Appoint ICT Career Champion.
•Policy agreement that MOD organisations will align to market ICT operating models. (e.g. SIAM).
CIO D ISSDAfC4ISR DCI3
Initial ActionsInitial Actions
17. Grapevine 2 Impact of Carrier Enabled Power Projection
Department of State
Military
OFFICIAL SECRET TS
Enterprise Cloud
Hosting Environment
Deployed Cloud
Commercial Satellite
Military Satellite
Public
Services
Network Deployed Mobile
Network
Unified
Comms
Data Centre’s
Unified
Comms
Internet & OGD
Gateways
IdAM
Deployed trusted
Comms
CYOD
Allies
Gateway
Fixed Mobile Convergence
Recce
Air TaskingBattle
Group
JCHAT TIC
C2
Surveillance
Surveillance
Product
GV2
Changes to the networking
(Wan & LAN) and gateway
components being
contracted by the Grapevine
2 project will have a
significant impact on MOD’s
ability to provided C2 and
ISTAR capabilities.
18. Defence ICT Strategy – Key Messages (1 of 2)
• User-centricity - ICT that enables rather than constrains the User in
achieving their output
• This does not equate with demand for modern technology for the
sake of it - investment MUST be better linked to benefits
• Need much clearer expressions of user need and expected benefit
(over time), supported by consistent use of effective business and
information architectures
• Cannot ignore security, given compelling evidence of the cyber
threat, but better articulation of need and benefit should enable ICT
providers to strike a better balance between security and utility,
leveraging recent policy shifts to the full
• Need to depend less on boundary protection for our Cyber defences
and invest more in 'deeper' defences such as pattern analyses
• Need to act more robustly against poor IA practices, including use of
'shadow technologies'
• Poor utilisation of current investments needs to be addressed,
through up-skilling, process improvement and technology
configuration
19. Defence ICT Strategy – Key Messages (2 of 2)
• Better visibility/awareness of the ICT landscape, to promote re-use
and consistent practice and to minimise additional ICT (and its
associated complexity)
• Need to adjust planned investments to spend proportionally less on
networks and infrastructure and more on 'value adding' applications
and services
• Need to invest in essential enablers which do not come directly from
statements of user need (e.g. identity and access management,
PKI, ESB)
• Need to maintain as close a match to 'vanilla COTS' as is possible,
as 'bespoke investments' increase complexity and cost, and
potentially limit utility and benefit realisation.
• Every subsequent refresh or update of 'bespoke investments' is less
agile and more costly than 'vanilla COTS' equivalents
• Need to commoditise wherever possible, to reduce cost and to
increase agility
• Need to match supply with demand, turning services on and off as
required to increase efficiency and green credentials
20. • ICT Transformation Strategy
- Consolidate Infrastructure
- Streamline Processes
- Strengthen Workforce
• Requires Partnerships Across MOD to achieve
- Improved mission effectiveness and user satisfaction
- Reduced costs
- Improved Cyber security and interoperability
- Agile, faster and responsive delivery of ICT capabilities
Enabling Agile, Secure, Efficient and Effective MOD ICT
Executive Summary - Proactive
Partnerships for MOD ICT Transformation