IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
Respond to license audits in minutes, uncover unused software that can be cancelled or redeployed to lower expenses by 35% or more with this solution from IBM. Covers Windows, Linux, and Unix applications with a library of over 100,000 software titles.
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
Respond to license audits in minutes, uncover unused software that can be cancelled or redeployed to lower expenses by 35% or more with this solution from IBM. Covers Windows, Linux, and Unix applications with a library of over 100,000 software titles.
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
Java has a security model targeted at running applets and untrusted code, so you don’t need to worry about running your own code on your own servers, right? In fact, there are several vulnerability patterns that can affect server-side Java applications, and this presentation outlines some of the steps you should take to ensure that your server room is not compromised. It looks at the established techniques for enhancing your security and shows new technology from IBM that addresses several attack vectors.
System Center Configuration Manager is in Gartner’s leader’s quadrant for client management tools.
Why?
View C/D/H’s slide deck, as we delve into SCCM's strengths and weaknesses, including how to take advantage of its feature set. And in this special, double session we'll also cover SCCM 2012's tight integration with Endpoint Protection anti-malware, and mobile device management (MDM).
We know MDM is a growing concern with the consumerization of IT and BYOD. Find out how System Center and other, third-party solutions can help!
And for more information on this or other System Center topics, visit our blog at www.cdhtalkstech.com.
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
Join Nimble Storage, Veeam, Microsoft and System Professional for a technology overview and briefing, panel Q&A session and buffet lunch. We will cover:
• Comprehensive application and device management - Use any device, anywhere
• The very latest in hybrid and all flash optimised data storage solutions
• High speed data availability for the modern data centre
• Enabling enterprise mobility while ensuring protection of corporate resources
• Industry leading storage array monitoring and proactive support
• How to leverage cloud technologies for secure off site backup
You will hear detailed technical presentations from Microsoft, Veeam and Nimble Storage on the day, and have the opportunity to ask questions and network with the vendors and other System Professional customers during the event
Accelerate
Learn how to enhance the performance of key applications with Nimble.
Manage
Comprehensive advice on device management with the latest Microsoft tools.
Protect
New features and cloud options for fast and secure backup with Veeam.
University Management System - UMS-X1 Technical DataNasser Hassan
- Enrichment of the educational experience of students.
- Consistency & wide availability to students, faculty and administration.
- Enhancement of communication, fostering engagement in University life and building community.
- Construction of a streamlined, reduced-paper information processing environment based on electronic workflow and hierarchies based on assigned authorizations.
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
In this session we will discuss the features provided by Windows Intune and System Center 2012 Configuration Manager to manage mobile devices using Windows Phone, Windows RT, Android and iOS.
We will discuss the configuration steps and the integration between the two platforms using Windows Intune Connector.
Microsoft System Center Configuration Manager for Education Herman Arnedo
f you are looking at deploying Microsoft SCCM 2012 / Intune or want to make the most of your existing installation, System Professional will be running a 'Configuration Manager as a Service' 'hands-on' technical session at our London office in Shad Thames, SE1 on Weds 20th January.
This event is designed exclusively for technical staff in UK Education establishments (Schools and Colleges).
The session will be hosted by Herman Arnedo Mahr (Microsoft MCT), it runs from 9.30am - 1.30pm and will cover the following topics (including live demos);
Application Management
Packaging and Deployment
Operating System Deployment
Full Support of Windows 10
New Bare Metal / In Place Upgrade / Refresh / Replace
Offline Servicing OS Images
Patch Management
Microsoft Updates
3rd Party Software Updates
IT Asset Management
Hardware Inventory
Software Inventory
Asset Intelligence
Software Metering
Compliance Settings
Mobile Device Management with Microsoft Intune
Mobile Application Management
Protect data and devices
Retire data and devices
NB: Due to limited availability (6 x delegates per session only), these events are arranged for end user organisations only.
FAQs
What are my transport/parking options getting to the event?
London Bridge is the nearest tube / rail station. It is then a 15 mins walk to Maguire Street. Our offices are located next to The Design Museum in Shad Thames.
Do I have to bring my printed ticket to the event?
No - we will contact you beforehand to confirm your attendance on the day.
WHEN
Wednesday, 20 January 2016 from 09:30 to 13:30 (GMT) - Add to Calendar
WHERE
System Professional Ltd - The Clove Gallery . Maguire Street. London SE1 2NQ GB - View Map
Microsoft veröffentlichte vor kurzem das jüngste Update für System Center Configuration Manager - System Center 2012 R2 Configuration Manager. Viele der neuen Updates sind so gut, dass jeder das Upgrade so schnell wie möglich haben möchte. Wally Mead, Microsoft MVP, präsentierte in dieser Preäsentation die neuen Features von Configuration Manager 2012 R2.
Java has a security model targeted at running applets and untrusted code, so you don’t need to worry about running your own code on your own servers, right? In fact, there are several vulnerability patterns that can affect server-side Java applications, and this presentation outlines some of the steps you should take to ensure that your server room is not compromised. It looks at the established techniques for enhancing your security and shows new technology from IBM that addresses several attack vectors.
System Center Configuration Manager is in Gartner’s leader’s quadrant for client management tools.
Why?
View C/D/H’s slide deck, as we delve into SCCM's strengths and weaknesses, including how to take advantage of its feature set. And in this special, double session we'll also cover SCCM 2012's tight integration with Endpoint Protection anti-malware, and mobile device management (MDM).
We know MDM is a growing concern with the consumerization of IT and BYOD. Find out how System Center and other, third-party solutions can help!
And for more information on this or other System Center topics, visit our blog at www.cdhtalkstech.com.
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
Join Nimble Storage, Veeam, Microsoft and System Professional for a technology overview and briefing, panel Q&A session and buffet lunch. We will cover:
• Comprehensive application and device management - Use any device, anywhere
• The very latest in hybrid and all flash optimised data storage solutions
• High speed data availability for the modern data centre
• Enabling enterprise mobility while ensuring protection of corporate resources
• Industry leading storage array monitoring and proactive support
• How to leverage cloud technologies for secure off site backup
You will hear detailed technical presentations from Microsoft, Veeam and Nimble Storage on the day, and have the opportunity to ask questions and network with the vendors and other System Professional customers during the event
Accelerate
Learn how to enhance the performance of key applications with Nimble.
Manage
Comprehensive advice on device management with the latest Microsoft tools.
Protect
New features and cloud options for fast and secure backup with Veeam.
University Management System - UMS-X1 Technical DataNasser Hassan
- Enrichment of the educational experience of students.
- Consistency & wide availability to students, faculty and administration.
- Enhancement of communication, fostering engagement in University life and building community.
- Construction of a streamlined, reduced-paper information processing environment based on electronic workflow and hierarchies based on assigned authorizations.
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
In this session we will discuss the features provided by Windows Intune and System Center 2012 Configuration Manager to manage mobile devices using Windows Phone, Windows RT, Android and iOS.
We will discuss the configuration steps and the integration between the two platforms using Windows Intune Connector.
Microsoft System Center Configuration Manager for Education Herman Arnedo
f you are looking at deploying Microsoft SCCM 2012 / Intune or want to make the most of your existing installation, System Professional will be running a 'Configuration Manager as a Service' 'hands-on' technical session at our London office in Shad Thames, SE1 on Weds 20th January.
This event is designed exclusively for technical staff in UK Education establishments (Schools and Colleges).
The session will be hosted by Herman Arnedo Mahr (Microsoft MCT), it runs from 9.30am - 1.30pm and will cover the following topics (including live demos);
Application Management
Packaging and Deployment
Operating System Deployment
Full Support of Windows 10
New Bare Metal / In Place Upgrade / Refresh / Replace
Offline Servicing OS Images
Patch Management
Microsoft Updates
3rd Party Software Updates
IT Asset Management
Hardware Inventory
Software Inventory
Asset Intelligence
Software Metering
Compliance Settings
Mobile Device Management with Microsoft Intune
Mobile Application Management
Protect data and devices
Retire data and devices
NB: Due to limited availability (6 x delegates per session only), these events are arranged for end user organisations only.
FAQs
What are my transport/parking options getting to the event?
London Bridge is the nearest tube / rail station. It is then a 15 mins walk to Maguire Street. Our offices are located next to The Design Museum in Shad Thames.
Do I have to bring my printed ticket to the event?
No - we will contact you beforehand to confirm your attendance on the day.
WHEN
Wednesday, 20 January 2016 from 09:30 to 13:30 (GMT) - Add to Calendar
WHERE
System Professional Ltd - The Clove Gallery . Maguire Street. London SE1 2NQ GB - View Map
Microsoft veröffentlichte vor kurzem das jüngste Update für System Center Configuration Manager - System Center 2012 R2 Configuration Manager. Viele der neuen Updates sind so gut, dass jeder das Upgrade so schnell wie möglich haben möchte. Wally Mead, Microsoft MVP, präsentierte in dieser Preäsentation die neuen Features von Configuration Manager 2012 R2.
The United States National Institute of Standards and Technology (NIST) has p...Michael Hudak
The NIST Definition of Cloud Computing
http://www.championcloudservices.com/Blog/bid/71922/8-18-2011-FINALLY-an-Agreement-on-Defining-what-the-CLOUD-is
«Руководство по безопасности и защите персональных данных при использовании п...Victor Gridnev
«Руководство по безопасности и защите персональных данных при использовании публичных систем облачных вычислений» (от National Institute of Standards and Technology)
Privacy preserving public auditing for secured cloud storagedbpublications
As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data.
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
Utilities today wish to facilitate the capture of asset information in the field in a way that is not only scalable but cost effective. They need a system that is simple to use, inexpensive to implement, flexible enough to meet ever-changing needs, yet also powerful enough to cover a majority of their needs with immediacy. This paper describes Schneider Electric's powerful cloud-based solution to optimize the inspection and gathering of field information.
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
This is a 2 hour strategy workshop developed by Predrag Mitrovic (http://mynethouse.se and http://cloudadvisor.se).
The workshop is intended for CIOs and roles close to business strategy formulation around technology. Feel free to use the material and develop it further, as long as you give me access to the updated materials.
Any questions can be directed to my e-mail: predrag[at]mynethouse.se
I hope that you enjoy this material and find it useful.
/Predrag a.k.a Cloud Advisor
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
Similar to NIST Definition of Cloud Computing (20)
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
NIST Definition of Cloud Computing
1. Special Publication 800-145
The NIST Definition of Cloud
Computing
Recommendations of the National Institute
of Standards and Technology
Peter Mell
Timothy Grance
2. NIST Special Publication 800-145 The NIST Definition of Cloud Computing
Peter Mell
Timothy Grance
C O M P U T E R S E C U R I T Y
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8930
September 2011
U.S. Department of Commerce
Rebecca M. Blank, Acting Secretary
National Institute of Standards and Technology
Patrick D. Gallagher, Under Secretary for Standards and
Technology and Director
3. Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analysis to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative
activities with industry, government, and academic organizations.
National Institute of Standards and Technology Special Publication 800-145
7 pages (September 2011)
Certain commercial entities, equipment, or materials may be identified in this
document in order to describe an experimental procedure or concept adequately.
Such identification is not intended to imply recommendation or endorsement by the
National Institute of Standards and Technology, nor is it intended to imply that the
entities, materials, or equipment are necessarily the best available for the purpose.
ii
4. Acknowledgements
The authors Peter Mell and Timothy Grance of the National Institute of Standards and Technology
(NIST) would like to thank the many experts in industry and government who contributed their thoughts
to the creation and review of this definition. We especially acknowledge Murugiah Souppaya and Lee
Badger, also of NIST, and Wayne Jansen of Booz Allen Hamilton, whose advice and technical insight
assisted this effort.
iii
5. 1. Introduction
1.1 Authority
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its
statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002,
Public Law 107-347.
NIST is responsible for developing standards and guidelines, including minimum requirements, for
providing adequate information security for all agency operations and assets; but such standards and
guidelines shall not apply to national security systems. This guideline is consistent with the requirements
of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), “Securing Agency
Information Systems,” as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental
information is provided in A-130, Appendix III.
This guideline has been prepared for use by Federal agencies. It may be used by nongovernmental
organizations on a voluntary basis and is not subject to copyright, though attribution is desired.
Nothing in this document should be taken to contradict standards and guidelines made mandatory and
binding on Federal agencies by the Secretary of Commerce under statutory authority, nor should these
guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce,
Director of the OMB, or any other Federal official.
1.2 Purpose and Scope
Cloud computing is an evolving paradigm. The NIST definition characterizes important aspects of cloud
computing and is intended to serve as a means for broad comparisons of cloud services and deployment
strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud
computing. The service and deployment models defined form a simple taxonomy that is not intended to
prescribe or constrain any particular method of deployment, service delivery, or business operation.
1.3 Audience
The intended audience of this document is system planners, program managers, technologists, and others
adopting cloud computing as consumers or providers of cloud services.
2
6. 2. The NIST Definition of Cloud Computing
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model is composed of five essential characteristics, three service models, and four deployment
models.
Essential Characteristics:
On-demand self-service. A consumer can unilaterally provision computing capabilities, such as
server time and network storage, as needed automatically without requiring human
interaction with each service provider.
Broad network access. Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
mobile phones, tablets, laptops, and workstations).
Resource pooling. The provider’s computing resources are pooled to serve multiple consumers
using a multi-tenant model, with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand. There is a sense of location
independence in that the customer generally has no control or knowledge over the exact
location of the provided resources but may be able to specify location at a higher level of
abstraction (e.g., country, state, or datacenter). Examples of resources include storage,
processing, memory, and network bandwidth.
Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases
automatically, to scale rapidly outward and inward commensurate with demand. To the
consumer, the capabilities available for provisioning often appear to be unlimited and can
be appropriated in any quantity at any time.
Measured service. Cloud systems automatically control and optimize resource use by leveraging
a metering capability1 at some level of abstraction appropriate to the type of service (e.g.,
storage, processing, bandwidth, and active user accounts). Resource usage can be
monitored, controlled, and reported, providing transparency for both the provider and
consumer of the utilized service.
Service Models:
Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s
applications running on a cloud infrastructure2. The applications are accessible from
various client devices through either a thin client interface, such as a web browser (e.g.,
web-based email), or a program interface. The consumer does not manage or control the
underlying cloud infrastructure including network, servers, operating systems, storage, or
even individual application capabilities, with the possible exception of limited user-
specific application configuration settings.
Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired applications created using programming
1
Typically this is done on a pay-per-use or charge-per-use basis.
2
A cloud infrastructure is the collection of hardware and software that enables the five essential characteristics of cloud
computing. The cloud infrastructure can be viewed as containing both a physical layer and an abstraction layer. The physical
layer consists of the hardware resources that are necessary to support the cloud services being provided, and typically includes
server, storage and network components. The abstraction layer consists of the software deployed across the physical layer,
which manifests the essential cloud characteristics. Conceptually the abstraction layer sits above the physical layer.
2
7. languages, libraries, services, and tools supported by the provider.3 The consumer does
not manage or control the underlying cloud infrastructure including network, servers,
operating systems, or storage, but has control over the deployed applications and possibly
configuration settings for the application-hosting environment.
Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing resources where the
consumer is able to deploy and run arbitrary software, which can include operating
systems and applications. The consumer does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage, and deployed applications;
and possibly limited control of select networking components (e.g., host firewalls).
Deployment Models:
Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units). It may be owned, managed, and
operated by the organization, a third party, or some combination of them, and it may exist
on or off premises.
Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared concerns (e.g., mission,
security requirements, policy, and compliance considerations). It may be owned,
managed, and operated by one or more of the organizations in the community, a third
party, or some combination of them, and it may exist on or off premises.
Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be
owned, managed, and operated by a business, academic, or government organization, or
some combination of them. It exists on the premises of the cloud provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application
portability (e.g., cloud bursting for load balancing between clouds).
3
This capability does not necessarily preclude the use of compatible programming languages, libraries, services, and tools from
other sources.
3