SlideShare a Scribd company logo
School of Computer & Information Sciences
ITS-532 Cloud Computing
Chapter 15 – Governing the Cloud
Learning Objectives
• Define and describe corporate governance.
• Define business strategy and provide examples of strategic
goals.
• Discuss how companies use the Capability Maturity Model
(CMM) to measure their
current capabilities.
• Define and describe internal controls.
• Define and describe IT governance.
• Discuss the various types of governance a company must
perform.
• Discuss the role of Sarbanes-Oxley in corporate IT
governance.
• Discuss factors to consider when developing governance
procedures for the cloud.
Risks and Challenges with Cloud Computing
• Increased Security Vulnerabilities
– Shared Responsibility with Cloud provider
– Expansion of trust boundaries
– Vendor access to the organization’s date
• Reduced Operational Governance Control
– Governance control usually less than on-premise IT resources
• Limited Portability Between Cloud Providers
– Lack of standards and customized integration
• Multi-Regional Compliance and Legal Issue
– Location of data and applications is needed to ensure
compliance
The Need for True Financials
• Following the DOT.com crash and corporate
scandals such as Enron, Tyco, and WorldCom,
pressures emerged from the government,
shareholders, and numerous other stakeholders for
companies to increase their financial oversight to
reduce opportunity for fraud and to restore
confidence in corporate financial reporting.
Why IT is Involved
• Because most of the data that drive corporate
financial reports originate within data centers,
the new era of governance has brought
greater visibility and a greater need for
controls to IT departments.
Corporate Governance
• Corporate governance combines the processes,
policies, laws, and controls that affect how a
company operates.
• The governance guides the company’s decision
making and administrative processes.
• Corporate governance, is complex and involves
people, processes, systems, and more.
Corporate-Governance Process
• Components of the corporate-governance process.
Real World: Organization for Economic
Cooperation
• In 1999, the Organization for Economic
Cooperation and Development (OECD)
published the Principles for Corporate
Development. It has been revised to address
corporate-governance issues.
Understanding Business Strategy
• A strategy is a plan of action designed to
achieve one or more particular goals.
• A business strategy comprises the plans a
company executes to achieve business goals.
Components of a Business Strategy
• Maximizing shareholder value
• Reducing or managing costs to maximize profits
• Providing a high-quality work environment to attract and
retain employees
• Maintaining a high degree of customer satisfaction
• Supporting environmentally friendly operations
• Developing a sustainable, competitive advantage
• Providing accurate reporting of company operations
Real World: Capability Maturity Model (CMM)
• The Capability Maturity Model (CMM) was developed
at Carnegie Mellon University to help businesses
measure and improve their current capabilities.
• Over time, as a business matures and its skills improve,
a company’s CMM scores should increase.
• As scores increase, so too should the predictability and
reliability of the business.
Levels of CMM
Inspect What You Expect
• Once a company defines its business goals and metrics,
it must inspect the underlying factors that drive
business results.
• In other words, rather than take its financials at face
value, the company should examine the sources from
which the values are derived to ensure that each is
accurate and free from fraud.
• This inspection process is known as auditing.
Auditing
• Companies must audit the source of the values they measure
and report using
internal or external auditors.
Internal Controls
• Internal controls allow a company auditor to inspect data
values at key stages.
Real World: COSO of the Treadway Commission
• A key aspect of corporate governance is internal controls. An
internal control is a process that provides assurance that the
objectives of a company’s operational goals and legal
compliance requirements are being met, as well as
confidence in the accuracy of the reporting of operations.
• The Committee of Sponsoring Organizations of the Treadway
Commission (COSO) has defined a model that companies
can use to evaluate their internal controls.
The Components of the (expanded) COSO
Model
Control Objectives for Information and Related
Technology
• Control Objectives for Information and Related
Technology (COBIT) is an IT governance framework
defined by the Information Systems Audit Control
Association (ISACA).
• COBIT defines dozens of processes an IT manager
and staff can use to plan, acquire, implement,
deliver, support, monitor, and evaluate IT solutions.
IT Governance
• IT governance is one of many key types of governance a
company must consider.
Real World: Sarbanes-Oxley
• In 2002, in the aftermath of the dot-com crash and
corporate scandals that included Enron, Tyco, and
WorldCom, Senator Paul Sarbanes of Maryland and
Representative Michael Oxley of Ohio co-sponsored a bill.
• Once passed, the law became known as Sarbanes-Oxley.
• The law’s goal was to improve confidence in the truthfulness
of company reporting by requiring greater transparency and
controls of the data that companies report.
Real World: IT Governance Institute
• The IT Governance Institute (ITGI) was formed in 1998
to assist businesses in aligning IT solutions with
business strategies.
• The institute conducts research on the global practices
and perceptions of IT governance. The institute makes
many of its best practices, case studies, and research
papers available for sale or download from its website.
SLA Governance Considerations
• Who within the company can access the service?
• Who within the cloud provider can access the service?
• What can those who can access the service do?
• Is the solution multitenant?
• How is the service secured?
• How is the service replicated or collocated?
• How can the service be tested and validated?
• What is the service uptime?
SLA Governance Considerations Continued
• How and when is the service maintained?
• What controls can be implemented and at what
stages of the service?
• How are errors and exceptions logged?
• How can performance be monitored?
• What is the upgrading and versioning process?
• What auditing support is provided?
Key Terms
References
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS,
virtualization, business models, mobile, security
and more. Burlington, MA: Jones & Bartlett Learning.
Secondary:
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing:
concepts, technology, & architecture. Upper
Saddle River, NJ: Prentice Hall.
School of Computer & Information Sciences
ITS-532 Cloud Computing
Chapter 14 – Mobile Cloud Computing
Learning Objectives
• Describe the evolution of mobile computing
• Discuss the different generations of cell phones
• Discuss the ecosystem that comprises the mobile web
• Describe the roles of phone network operators, transcoders,
and
proxies
• Compare and contrast web pages, applications (apps), and
widgets
• Discuss the importance of HTML5 with respect to mobile
development
• Describe mobile development considerations
Which Came First?
• Is the cloud is driving the growth of mobile
computing or mobile computing is driving the
growth of the cloud?
Smartphone Use
• Browse websites, including Google, Facebook, eBay,
and more.
• Place face-to-face video calls to phones and computers.
• Perform GPS-based navigational operations.
• Exchange text messages.
• Perform e-commerce operations.
• Run a myriad of applications (apps).
Understanding the G in 3G and 4G
• When you discuss phone capabilities, you will hear terms such
as 3G and 4G. In the simplest sense,
the G stands for generation.
Mobile Cloud Ecosystem
• An ecosystem is an environment that consists of living and
nonliving things with which one
interacts.
• Many cloud-based companies use the term ecosystem to
describe the user’s environment.
• Items in the Mobile Cloud Ecosystem include:
– Phone class, which may be voice or face-to-face
– Web browsing
– Applications (apps) and widgets
– Voice commands and voice recognition
– Display screens
– Transmission speeds for upload and download operations
– Keyboard interface
– Touchscreens
Mobile Cloud
• The mobile cloud consists of apps and web pages that
originate from sites within the cloud from which users
download, or with which they interact via a mobile
device.
• When you create a mobile solution, you should
consider how your solution interacts with or supports
the various mobile-device ecosystem components.
Transcoder, Pages, Apps, and Widgets
• Within a mobile network, a transcoder may modify web
content to a form
and layout more suitable for a mobile device.
• Developers build mobile solutions in one of three ways:
– First, they can build a web page, ideally targeted for a mobile
display. As users
browse the Web using mobile browsers built into their phones,
the contents of
the web page appear.
– Second, developers can build an app, which typically is a
device-specific program
that users download and install (either free or for a price) onto a
device.
– Third, developers can create a widget, which is much like an
app that the user
downloads and installs to his or her mobile device. A widget
differs from an app in
that the widget is always active.
Multi-Device Broker
Figure 8.35 A multi-device broker contains the mapping logic
necessary to
transform data exchanges between a cloud service and different
types of cloud
service consumer devices. This scenario depicts the multi -
device broker as a
cloud service with its own API. This mechanism can also be
implemented as a
service agent that intercepts messages at runtime to perform
necessary
transformations.
Endless Apps
• From business apps, to games, to education, there are
hundreds of thousands of
apps available for the iPhone.
Real World: W3C Mobile Page Checker
• Web developers should be familiar with the W3C website
and its outstanding development tutorials and tools.
• When it comes to malformed HTML tags, mobile web
browsers, because of their compact size (code size), tend not
to be as forgiving as desktop browsers.
• Before you launch your mobile pages, you should validate
your code using the S3C Mobile Checker at
www.w3c.org/mobile
HTML Markup
• An HTML markup file and its display within a web browser
and mobile device.
Revisiting the Role of HTML5
• HTML5 is the fifth major release of HTML.
• HTML5 is important because developers can use it to
create multimedia pages similar to what they
previously created using Flash.
• Unlike Flash-based pages, which handheld browsers
could not display, HTML5 multimedia pages display on
all devices. In this way, HTML 5 opens a vast new area
of development for mobile devices.
Mobile Device Requirements
• The mobile web is not the traditional web
• Fast is good
• Remember your goals and requirements
• You cannot support everything
• Do not treat mobile content as an afterthought; create,
do not convert, mobile content
• Handle different display sizes differently
Real World: WebKit Browser
• As you drill down through the specifics of
mobile web browsers, you will find that many
run the WebKit open source browser.
• You can learn more about this browser and
download the source code at the WebKit
website, www.webkit.org
Real World: mobiReady Page Checker
• Developers will often customize web pages for mobile
delivery.
• As you develop your pages, you should test their content
against the mobiReady page checker.
• As you enter a URL on the mobiReady page, the site will
evaluate your page content and display a detailed report.
• Based on the report feedback, you can adjust your page
components.
Real World: The “.mobi” Top-Level Domain
• Developers will often create separate web pages for mobile
displays.
• To direct users to those pages, developers have several
options. First, they can have
their web software detect the device type, such as a computer or
phone, and then
download the appropriate pages dynamically.
• Second, many developers will place the letter “m” before their
site domain name
(creating a subdomain), such as m.somesite.com or even
mobile.somesite.com.
• Third, just as sites use the domain types .com, .org, and .edu,
many mobile-based sites
now use the “.mobi” domain type, such as www.somesite.mobi.
• Developers can purchase a .mobi-based domain name at most
domain name registry
sites.
Key Terms
References
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS,
virtualization, business models, mobile, security
and more. Burlington, MA: Jones & Bartlett Learning.
Secondary:
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing:
concepts, technology, & architecture. Upper
Saddle River, NJ: Prentice Hall.
School of Computer & Information SciencesITS-532 Cloud Com

More Related Content

Similar to School of Computer & Information SciencesITS-532 Cloud Com

Enterprise digital Labs
Enterprise digital LabsEnterprise digital Labs
Enterprise digital Labs
Zinnov
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
IJCSIS Research Publications
 
Next Generation Digital Transformation
Next Generation Digital TransformationNext Generation Digital Transformation
Next Generation Digital Transformation
Vishal Sharma
 
Software Development Lifecycle
Software Development LifecycleSoftware Development Lifecycle
Software Development LifecycleNicholas Davis
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
Axis Technology, LLC
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB
 
Removing the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateRemoving the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMate
Corso
 
Case Studies
Case StudiesCase Studies
Case Studies
Axis Technology
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
INFOGAIN PUBLICATION
 
PPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptxPPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptx
Ashish360593
 
e-Business systems - introduction it knowledge week 7
e-Business systems - introduction	 it knowledge week 7e-Business systems - introduction	 it knowledge week 7
e-Business systems - introduction it knowledge week 7
Sazzad Hossain, ITP, MBA, CSCA™
 
It assessment case study
It assessment case studyIt assessment case study
It assessment case study
Nandita Nityanandam
 
Setting_Product_Strategy.pptx
Setting_Product_Strategy.pptxSetting_Product_Strategy.pptx
Setting_Product_Strategy.pptx
Ashish360593
 
SAP Best Practices for a mobility center of excellence
SAP Best Practices for a mobility center of excellenceSAP Best Practices for a mobility center of excellence
SAP Best Practices for a mobility center of excellenceSybase Türkiye
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)
Sam Mandebvu
 
Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
Global Business Events
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
Home
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
MDFazlaRabbiAbir
 

Similar to School of Computer & Information SciencesITS-532 Cloud Com (20)

Enterprise digital Labs
Enterprise digital LabsEnterprise digital Labs
Enterprise digital Labs
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
Next Generation Digital Transformation
Next Generation Digital TransformationNext Generation Digital Transformation
Next Generation Digital Transformation
 
Kmppt
KmpptKmppt
Kmppt
 
Software Development Lifecycle
Software Development LifecycleSoftware Development Lifecycle
Software Development Lifecycle
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Group-9.pptx
Group-9.pptxGroup-9.pptx
Group-9.pptx
 
Removing the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateRemoving the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMate
 
Case Studies
Case StudiesCase Studies
Case Studies
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 
PPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptxPPT_Digital_Transformation.pptx
PPT_Digital_Transformation.pptx
 
e-Business systems - introduction it knowledge week 7
e-Business systems - introduction	 it knowledge week 7e-Business systems - introduction	 it knowledge week 7
e-Business systems - introduction it knowledge week 7
 
It assessment case study
It assessment case studyIt assessment case study
It assessment case study
 
Setting_Product_Strategy.pptx
Setting_Product_Strategy.pptxSetting_Product_Strategy.pptx
Setting_Product_Strategy.pptx
 
SAP Best Practices for a mobility center of excellence
SAP Best Practices for a mobility center of excellenceSAP Best Practices for a mobility center of excellence
SAP Best Practices for a mobility center of excellence
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)
 
Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 

More from AlleneMcclendon878

Explain in your own words why it is important to read a statistical .docx
Explain in your own words why it is important to read a statistical .docxExplain in your own words why it is important to read a statistical .docx
Explain in your own words why it is important to read a statistical .docx
AlleneMcclendon878
 
Explain how Matthew editedchanged Marks Gospel for each of the fol.docx
Explain how Matthew editedchanged Marks Gospel for each of the fol.docxExplain how Matthew editedchanged Marks Gospel for each of the fol.docx
Explain how Matthew editedchanged Marks Gospel for each of the fol.docx
AlleneMcclendon878
 
Explain the degree to which media portrayal of crime relates to publ.docx
Explain the degree to which media portrayal of crime relates to publ.docxExplain the degree to which media portrayal of crime relates to publ.docx
Explain the degree to which media portrayal of crime relates to publ.docx
AlleneMcclendon878
 
Explain the difference between genotype and phenotype. Give an examp.docx
Explain the difference between genotype and phenotype. Give an examp.docxExplain the difference between genotype and phenotype. Give an examp.docx
Explain the difference between genotype and phenotype. Give an examp.docx
AlleneMcclendon878
 
Explain the history behind the Black Soldier of the Civil War In t.docx
Explain the history behind the Black Soldier of the Civil War In t.docxExplain the history behind the Black Soldier of the Civil War In t.docx
Explain the history behind the Black Soldier of the Civil War In t.docx
AlleneMcclendon878
 
Explain the fundamental reasons why brands do not exist in isolation.docx
Explain the fundamental reasons why brands do not exist in isolation.docxExplain the fundamental reasons why brands do not exist in isolation.docx
Explain the fundamental reasons why brands do not exist in isolation.docx
AlleneMcclendon878
 
Explain the difference between hypothetical and categorical imperati.docx
Explain the difference between hypothetical and categorical imperati.docxExplain the difference between hypothetical and categorical imperati.docx
Explain the difference between hypothetical and categorical imperati.docx
AlleneMcclendon878
 
Explain in 100 words provide exampleThe capital budgeting decisi.docx
Explain in 100 words provide exampleThe capital budgeting decisi.docxExplain in 100 words provide exampleThe capital budgeting decisi.docx
Explain in 100 words provide exampleThe capital budgeting decisi.docx
AlleneMcclendon878
 
Explain how Supreme Court decisions influenced the evolution of the .docx
Explain how Supreme Court decisions influenced the evolution of the .docxExplain how Supreme Court decisions influenced the evolution of the .docx
Explain how Supreme Court decisions influenced the evolution of the .docx
AlleneMcclendon878
 
Explain how an offender is classified according to risk when he or s.docx
Explain how an offender is classified according to risk when he or s.docxExplain how an offender is classified according to risk when he or s.docx
Explain how an offender is classified according to risk when he or s.docx
AlleneMcclendon878
 
Explain a lesson plan. Describe the different types of information.docx
Explain a lesson plan. Describe the different types of information.docxExplain a lesson plan. Describe the different types of information.docx
Explain a lesson plan. Describe the different types of information.docx
AlleneMcclendon878
 
explain the different roles of basic and applied researchdescribe .docx
explain the different roles of basic and applied researchdescribe .docxexplain the different roles of basic and applied researchdescribe .docx
explain the different roles of basic and applied researchdescribe .docx
AlleneMcclendon878
 
Explain the basics of inspirational and emotion-provoking communicat.docx
Explain the basics of inspirational and emotion-provoking communicat.docxExplain the basics of inspirational and emotion-provoking communicat.docx
Explain the basics of inspirational and emotion-provoking communicat.docx
AlleneMcclendon878
 
Explain how leaders develop through self-awareness and self-discipli.docx
Explain how leaders develop through self-awareness and self-discipli.docxExplain how leaders develop through self-awareness and self-discipli.docx
Explain how leaders develop through self-awareness and self-discipli.docx
AlleneMcclendon878
 
Explain five ways that you can maintain professionalism in the meeti.docx
Explain five ways that you can maintain professionalism in the meeti.docxExplain five ways that you can maintain professionalism in the meeti.docx
Explain five ways that you can maintain professionalism in the meeti.docx
AlleneMcclendon878
 
Explain security awareness and its importance.Your response should.docx
Explain security awareness and its importance.Your response should.docxExplain security awareness and its importance.Your response should.docx
Explain security awareness and its importance.Your response should.docx
AlleneMcclendon878
 
Experimental Design AssignmentYou were given an Aedesaegyp.docx
Experimental Design AssignmentYou were given an Aedesaegyp.docxExperimental Design AssignmentYou were given an Aedesaegyp.docx
Experimental Design AssignmentYou were given an Aedesaegyp.docx
AlleneMcclendon878
 
Expand your website plan.Select at least three interactive fea.docx
Expand your website plan.Select at least three interactive fea.docxExpand your website plan.Select at least three interactive fea.docx
Expand your website plan.Select at least three interactive fea.docx
AlleneMcclendon878
 
Exercise 7 Use el pronombre y la forma correcta del verbo._.docx
Exercise 7 Use el pronombre y la forma correcta del verbo._.docxExercise 7 Use el pronombre y la forma correcta del verbo._.docx
Exercise 7 Use el pronombre y la forma correcta del verbo._.docx
AlleneMcclendon878
 
Exercise 21-8 (Part Level Submission)The following facts pertain.docx
Exercise 21-8 (Part Level Submission)The following facts pertain.docxExercise 21-8 (Part Level Submission)The following facts pertain.docx
Exercise 21-8 (Part Level Submission)The following facts pertain.docx
AlleneMcclendon878
 

More from AlleneMcclendon878 (20)

Explain in your own words why it is important to read a statistical .docx
Explain in your own words why it is important to read a statistical .docxExplain in your own words why it is important to read a statistical .docx
Explain in your own words why it is important to read a statistical .docx
 
Explain how Matthew editedchanged Marks Gospel for each of the fol.docx
Explain how Matthew editedchanged Marks Gospel for each of the fol.docxExplain how Matthew editedchanged Marks Gospel for each of the fol.docx
Explain how Matthew editedchanged Marks Gospel for each of the fol.docx
 
Explain the degree to which media portrayal of crime relates to publ.docx
Explain the degree to which media portrayal of crime relates to publ.docxExplain the degree to which media portrayal of crime relates to publ.docx
Explain the degree to which media portrayal of crime relates to publ.docx
 
Explain the difference between genotype and phenotype. Give an examp.docx
Explain the difference between genotype and phenotype. Give an examp.docxExplain the difference between genotype and phenotype. Give an examp.docx
Explain the difference between genotype and phenotype. Give an examp.docx
 
Explain the history behind the Black Soldier of the Civil War In t.docx
Explain the history behind the Black Soldier of the Civil War In t.docxExplain the history behind the Black Soldier of the Civil War In t.docx
Explain the history behind the Black Soldier of the Civil War In t.docx
 
Explain the fundamental reasons why brands do not exist in isolation.docx
Explain the fundamental reasons why brands do not exist in isolation.docxExplain the fundamental reasons why brands do not exist in isolation.docx
Explain the fundamental reasons why brands do not exist in isolation.docx
 
Explain the difference between hypothetical and categorical imperati.docx
Explain the difference between hypothetical and categorical imperati.docxExplain the difference between hypothetical and categorical imperati.docx
Explain the difference between hypothetical and categorical imperati.docx
 
Explain in 100 words provide exampleThe capital budgeting decisi.docx
Explain in 100 words provide exampleThe capital budgeting decisi.docxExplain in 100 words provide exampleThe capital budgeting decisi.docx
Explain in 100 words provide exampleThe capital budgeting decisi.docx
 
Explain how Supreme Court decisions influenced the evolution of the .docx
Explain how Supreme Court decisions influenced the evolution of the .docxExplain how Supreme Court decisions influenced the evolution of the .docx
Explain how Supreme Court decisions influenced the evolution of the .docx
 
Explain how an offender is classified according to risk when he or s.docx
Explain how an offender is classified according to risk when he or s.docxExplain how an offender is classified according to risk when he or s.docx
Explain how an offender is classified according to risk when he or s.docx
 
Explain a lesson plan. Describe the different types of information.docx
Explain a lesson plan. Describe the different types of information.docxExplain a lesson plan. Describe the different types of information.docx
Explain a lesson plan. Describe the different types of information.docx
 
explain the different roles of basic and applied researchdescribe .docx
explain the different roles of basic and applied researchdescribe .docxexplain the different roles of basic and applied researchdescribe .docx
explain the different roles of basic and applied researchdescribe .docx
 
Explain the basics of inspirational and emotion-provoking communicat.docx
Explain the basics of inspirational and emotion-provoking communicat.docxExplain the basics of inspirational and emotion-provoking communicat.docx
Explain the basics of inspirational and emotion-provoking communicat.docx
 
Explain how leaders develop through self-awareness and self-discipli.docx
Explain how leaders develop through self-awareness and self-discipli.docxExplain how leaders develop through self-awareness and self-discipli.docx
Explain how leaders develop through self-awareness and self-discipli.docx
 
Explain five ways that you can maintain professionalism in the meeti.docx
Explain five ways that you can maintain professionalism in the meeti.docxExplain five ways that you can maintain professionalism in the meeti.docx
Explain five ways that you can maintain professionalism in the meeti.docx
 
Explain security awareness and its importance.Your response should.docx
Explain security awareness and its importance.Your response should.docxExplain security awareness and its importance.Your response should.docx
Explain security awareness and its importance.Your response should.docx
 
Experimental Design AssignmentYou were given an Aedesaegyp.docx
Experimental Design AssignmentYou were given an Aedesaegyp.docxExperimental Design AssignmentYou were given an Aedesaegyp.docx
Experimental Design AssignmentYou were given an Aedesaegyp.docx
 
Expand your website plan.Select at least three interactive fea.docx
Expand your website plan.Select at least three interactive fea.docxExpand your website plan.Select at least three interactive fea.docx
Expand your website plan.Select at least three interactive fea.docx
 
Exercise 7 Use el pronombre y la forma correcta del verbo._.docx
Exercise 7 Use el pronombre y la forma correcta del verbo._.docxExercise 7 Use el pronombre y la forma correcta del verbo._.docx
Exercise 7 Use el pronombre y la forma correcta del verbo._.docx
 
Exercise 21-8 (Part Level Submission)The following facts pertain.docx
Exercise 21-8 (Part Level Submission)The following facts pertain.docxExercise 21-8 (Part Level Submission)The following facts pertain.docx
Exercise 21-8 (Part Level Submission)The following facts pertain.docx
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

School of Computer & Information SciencesITS-532 Cloud Com

  • 1. School of Computer & Information Sciences ITS-532 Cloud Computing Chapter 15 – Governing the Cloud Learning Objectives • Define and describe corporate governance. • Define business strategy and provide examples of strategic goals. • Discuss how companies use the Capability Maturity Model (CMM) to measure their current capabilities. • Define and describe internal controls. • Define and describe IT governance. • Discuss the various types of governance a company must perform. • Discuss the role of Sarbanes-Oxley in corporate IT governance. • Discuss factors to consider when developing governance procedures for the cloud. Risks and Challenges with Cloud Computing • Increased Security Vulnerabilities – Shared Responsibility with Cloud provider – Expansion of trust boundaries
  • 2. – Vendor access to the organization’s date • Reduced Operational Governance Control – Governance control usually less than on-premise IT resources • Limited Portability Between Cloud Providers – Lack of standards and customized integration • Multi-Regional Compliance and Legal Issue – Location of data and applications is needed to ensure compliance The Need for True Financials • Following the DOT.com crash and corporate scandals such as Enron, Tyco, and WorldCom, pressures emerged from the government, shareholders, and numerous other stakeholders for companies to increase their financial oversight to reduce opportunity for fraud and to restore confidence in corporate financial reporting. Why IT is Involved • Because most of the data that drive corporate financial reports originate within data centers, the new era of governance has brought greater visibility and a greater need for controls to IT departments.
  • 3. Corporate Governance • Corporate governance combines the processes, policies, laws, and controls that affect how a company operates. • The governance guides the company’s decision making and administrative processes. • Corporate governance, is complex and involves people, processes, systems, and more. Corporate-Governance Process • Components of the corporate-governance process. Real World: Organization for Economic Cooperation • In 1999, the Organization for Economic Cooperation and Development (OECD) published the Principles for Corporate Development. It has been revised to address corporate-governance issues. Understanding Business Strategy • A strategy is a plan of action designed to achieve one or more particular goals. • A business strategy comprises the plans a
  • 4. company executes to achieve business goals. Components of a Business Strategy • Maximizing shareholder value • Reducing or managing costs to maximize profits • Providing a high-quality work environment to attract and retain employees • Maintaining a high degree of customer satisfaction • Supporting environmentally friendly operations • Developing a sustainable, competitive advantage • Providing accurate reporting of company operations Real World: Capability Maturity Model (CMM) • The Capability Maturity Model (CMM) was developed at Carnegie Mellon University to help businesses measure and improve their current capabilities. • Over time, as a business matures and its skills improve, a company’s CMM scores should increase. • As scores increase, so too should the predictability and reliability of the business. Levels of CMM Inspect What You Expect
  • 5. • Once a company defines its business goals and metrics, it must inspect the underlying factors that drive business results. • In other words, rather than take its financials at face value, the company should examine the sources from which the values are derived to ensure that each is accurate and free from fraud. • This inspection process is known as auditing. Auditing • Companies must audit the source of the values they measure and report using internal or external auditors. Internal Controls • Internal controls allow a company auditor to inspect data values at key stages. Real World: COSO of the Treadway Commission • A key aspect of corporate governance is internal controls. An internal control is a process that provides assurance that the objectives of a company’s operational goals and legal compliance requirements are being met, as well as confidence in the accuracy of the reporting of operations.
  • 6. • The Committee of Sponsoring Organizations of the Treadway Commission (COSO) has defined a model that companies can use to evaluate their internal controls. The Components of the (expanded) COSO Model Control Objectives for Information and Related Technology • Control Objectives for Information and Related Technology (COBIT) is an IT governance framework defined by the Information Systems Audit Control Association (ISACA). • COBIT defines dozens of processes an IT manager and staff can use to plan, acquire, implement, deliver, support, monitor, and evaluate IT solutions. IT Governance • IT governance is one of many key types of governance a company must consider. Real World: Sarbanes-Oxley • In 2002, in the aftermath of the dot-com crash and corporate scandals that included Enron, Tyco, and WorldCom, Senator Paul Sarbanes of Maryland and
  • 7. Representative Michael Oxley of Ohio co-sponsored a bill. • Once passed, the law became known as Sarbanes-Oxley. • The law’s goal was to improve confidence in the truthfulness of company reporting by requiring greater transparency and controls of the data that companies report. Real World: IT Governance Institute • The IT Governance Institute (ITGI) was formed in 1998 to assist businesses in aligning IT solutions with business strategies. • The institute conducts research on the global practices and perceptions of IT governance. The institute makes many of its best practices, case studies, and research papers available for sale or download from its website. SLA Governance Considerations • Who within the company can access the service? • Who within the cloud provider can access the service? • What can those who can access the service do? • Is the solution multitenant? • How is the service secured? • How is the service replicated or collocated? • How can the service be tested and validated? • What is the service uptime? SLA Governance Considerations Continued
  • 8. • How and when is the service maintained? • What controls can be implemented and at what stages of the service? • How are errors and exceptions logged? • How can performance be monitored? • What is the upgrading and versioning process? • What auditing support is provided? Key Terms References Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning. Secondary: Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall. School of Computer & Information Sciences ITS-532 Cloud Computing
  • 9. Chapter 14 – Mobile Cloud Computing Learning Objectives • Describe the evolution of mobile computing • Discuss the different generations of cell phones • Discuss the ecosystem that comprises the mobile web • Describe the roles of phone network operators, transcoders, and proxies • Compare and contrast web pages, applications (apps), and widgets • Discuss the importance of HTML5 with respect to mobile development • Describe mobile development considerations Which Came First? • Is the cloud is driving the growth of mobile computing or mobile computing is driving the growth of the cloud? Smartphone Use • Browse websites, including Google, Facebook, eBay, and more. • Place face-to-face video calls to phones and computers. • Perform GPS-based navigational operations.
  • 10. • Exchange text messages. • Perform e-commerce operations. • Run a myriad of applications (apps). Understanding the G in 3G and 4G • When you discuss phone capabilities, you will hear terms such as 3G and 4G. In the simplest sense, the G stands for generation. Mobile Cloud Ecosystem • An ecosystem is an environment that consists of living and nonliving things with which one interacts. • Many cloud-based companies use the term ecosystem to describe the user’s environment. • Items in the Mobile Cloud Ecosystem include: – Phone class, which may be voice or face-to-face – Web browsing – Applications (apps) and widgets – Voice commands and voice recognition – Display screens – Transmission speeds for upload and download operations – Keyboard interface – Touchscreens Mobile Cloud • The mobile cloud consists of apps and web pages that
  • 11. originate from sites within the cloud from which users download, or with which they interact via a mobile device. • When you create a mobile solution, you should consider how your solution interacts with or supports the various mobile-device ecosystem components. Transcoder, Pages, Apps, and Widgets • Within a mobile network, a transcoder may modify web content to a form and layout more suitable for a mobile device. • Developers build mobile solutions in one of three ways: – First, they can build a web page, ideally targeted for a mobile display. As users browse the Web using mobile browsers built into their phones, the contents of the web page appear. – Second, developers can build an app, which typically is a device-specific program that users download and install (either free or for a price) onto a device. – Third, developers can create a widget, which is much like an app that the user downloads and installs to his or her mobile device. A widget differs from an app in that the widget is always active.
  • 12. Multi-Device Broker Figure 8.35 A multi-device broker contains the mapping logic necessary to transform data exchanges between a cloud service and different types of cloud service consumer devices. This scenario depicts the multi - device broker as a cloud service with its own API. This mechanism can also be implemented as a service agent that intercepts messages at runtime to perform necessary transformations. Endless Apps • From business apps, to games, to education, there are hundreds of thousands of apps available for the iPhone. Real World: W3C Mobile Page Checker • Web developers should be familiar with the W3C website and its outstanding development tutorials and tools. • When it comes to malformed HTML tags, mobile web browsers, because of their compact size (code size), tend not to be as forgiving as desktop browsers. • Before you launch your mobile pages, you should validate your code using the S3C Mobile Checker at
  • 13. www.w3c.org/mobile HTML Markup • An HTML markup file and its display within a web browser and mobile device. Revisiting the Role of HTML5 • HTML5 is the fifth major release of HTML. • HTML5 is important because developers can use it to create multimedia pages similar to what they previously created using Flash. • Unlike Flash-based pages, which handheld browsers could not display, HTML5 multimedia pages display on all devices. In this way, HTML 5 opens a vast new area of development for mobile devices. Mobile Device Requirements • The mobile web is not the traditional web • Fast is good • Remember your goals and requirements • You cannot support everything • Do not treat mobile content as an afterthought; create, do not convert, mobile content • Handle different display sizes differently
  • 14. Real World: WebKit Browser • As you drill down through the specifics of mobile web browsers, you will find that many run the WebKit open source browser. • You can learn more about this browser and download the source code at the WebKit website, www.webkit.org Real World: mobiReady Page Checker • Developers will often customize web pages for mobile delivery. • As you develop your pages, you should test their content against the mobiReady page checker. • As you enter a URL on the mobiReady page, the site will evaluate your page content and display a detailed report. • Based on the report feedback, you can adjust your page components. Real World: The “.mobi” Top-Level Domain • Developers will often create separate web pages for mobile displays. • To direct users to those pages, developers have several options. First, they can have their web software detect the device type, such as a computer or
  • 15. phone, and then download the appropriate pages dynamically. • Second, many developers will place the letter “m” before their site domain name (creating a subdomain), such as m.somesite.com or even mobile.somesite.com. • Third, just as sites use the domain types .com, .org, and .edu, many mobile-based sites now use the “.mobi” domain type, such as www.somesite.mobi. • Developers can purchase a .mobi-based domain name at most domain name registry sites. Key Terms References Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning. Secondary: Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.