SlideShare a Scribd company logo
When do you decide to
go to The Cloud?
SharePoint Saturday UK – November 2013 – Mark Stokes
Mark Stokes


Red Plane


Microsoft Partner in North West UK



www.redplane.co.uk



@FlyRedPlane



Office 365, SharePoint, Azure, nopCommerce, Windows 8 Apps, Windows Phone
Apps, iOS Apps, .Net



mark.stokes@redplane.co.uk



@MarkStokes



Interests: SharePoint, Technology, Photography, Raspberry Pi, Snowboarding,
Wakeboaring, Running, Tough Mudder (maybe!), My Dog - Hugo
Agenda


What does the Cloud mean to us?



What the marketing tells you



What the marketing doesn’t tell you



Trust – Security & Privacy



Control



Cost / Benefits



Some other things to think about



Job Security – The end of the IT Pro?
What does The Cloud mean to us?


Types of cloud



Cloud Offerings





SaaS



Private Cloud



PaaS



Community Cloud



IaaS





On-Premises

Public Cloud



DaaS

Characteristics (NIST)


On-demand self-service



Broad network access



Resource pooling



Rapid elasticity



Measured service
What the marketing tells you


No upfront “infrastructure” costs



Simple per user per month licencing cost



It’s always there (99.9% uptime – Financially backed!)



Access Anywhere, Anytime on Any Device



You will save money



It’s quick, easy and idiot proof



There is no downside



It’s the future



We are “all in”



It what you should be doing…..
What the marketing doesn't tell you


Upfront Costs


Awareness, education and training on new systems



You still need to “design” your cloud environment



You still need to migrate your content into The Cloud



You might need to invest in faster / more robust Internet connectivity



De-provisioning costs of existing infrastructure



Supporting Architecture – DirSync / ADFS – Single Sign-On



Vendor Lock-in



Lack of control of the platform



You will (should) save money if you do it right and have a medium to long term
strategy



How good is your MS Partner at setting up and configuring the services?
Service Continuity


Redundancy



Monitoring





Internal monitoring built to drive automatic
recovery



Data redundancy with robust failover capabilities



Outside-in monitoring raises alerts about incidents





Physical redundancy at server, datacenter, and
service levels

Functional redundancy with offline functionality



Extensive diagnostics provide logging, auditing, and
granular tracing

Resiliency





Automated failover with human backup





Active load balancing

Recovery testing across failure domains



Distributed component services like Exchange
Online, SharePoint Online, and Lync Online limit
scope and impact of any failures in a component



Directory data replicated across component
services insulates one service from another in any
failure events



Fully automated deployment models, making
deployment easier than ever





Standardized hardware reduces issue isolation
complexities



Distributed services


Simplification

Standard built-in management mechanism

Human backup


Automated recovery actions with 24/7 on-call
support



Team with diverse skills on the call provides rapid
response and resolution



Continuous improvement by learning from the oncall teams

Simplified operations and deployment
Service Continuity


Continuous learning




Our post-incident review consists of analysis of
what happened, our response, and our plan to
prevent it in the future





If an incident occurs, regardless of the
magnitude of impact we do a thorough postincident review every time

In the event your organization was affected by
a service incident, we share the post-incident
review with you

Consistent communication


Transparency requires consistent
communication, especially when you are using
the service



We have a number of communication channels
such as email, RSS feeds, and the very
important and highly relevant Service Health
Dashboard



Consistent communication
Trust - Security


Is your Cloud Provider Secure?



Do you “Trust” your cloud provider with your data?



What accreditations does you Cloud provider have (e.g. IL2 / IL3)



Are there any recorded security breaches?



What level of security to you actually need?



Could YOU do a better job of securing your own data?


Security of Data at Rest



Security of Data in Transit
Trust - Privacy / Data Protection


Where is your data?





The laws of the land in the location where your data is stored
Check the small print of your Service Providers Terms and Conditions

Who owns your data?


And what can they do with it?



PRISM



Safe Harbor



Additional questions are:


Just how private is your data REALLY?



Are hackers REALLY going to be interested in YOUR data?



If yes, then can your Cloud provider provide “at least the same” level of privacy control that
you could do yourself?
PRISM


Clandestine mass electronic surveillance data mining program



Operated by the US National Security Agency (NSA) since 2007



Collects stored Internet Communications based on demands made to Internet companies such
as Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, Apple



Provides – E-mail, Chat (Video & Voice), Videos, Photos, Stored data, VoIP, File
Transfers, Video Conferencing, Notifications of target activity (logins, etc), Online Social
Networking details, Special Requests



US as a World’s Telecommunications Backbone


Much of the worlds communications flow through the US



A target’s phone call, e-mail or chat will take the cheapest path, not the physically most
direct path – you can’t always predict the path.



A target’s communications could easily be flowing into and through the U.S.
US-EU Safe Harbor


Streamlined process for US companies to comply with EU Directive on the
protection of personal data



Companies operating in the EU are not allowed to send personal data to
countries outside of the European Economic Area unless there is a guarantee
that it will receive adequate levels of protection



Intended for organisations within the EU or US that stores customer data, the
Safe Harbor Principles are designed to prevent accidental information
disclosure or loss.



US companies can opt into the program as long as they adhere to the 7
principles outlined in the directive.
US-EU Safe Harbor Principles


Notice – Individuals must be informed that their data is being collected and
how it will be used



Choice – individuals must have the ability to opt out of the collection and
forward transfer of the data to third parties



Onward Transfer – Transfers of data to third parties may only occur to other
organisations that follow adequate data protection principles



Security – Reasonable efforts must be made to prevent loss of collected data



Data integrity – Data must be relevant and reliable for the purpose it was
collected for



Access – Individuals must be able to access information held about them, and
correct or delete it if it is inaccurate



Enforcement – There must be effective means of enforcing these rules
Control - Or rather the lack of


You no longer control the platform



You no longer have control over platform updates



What warning / communication do you have of impending updates?




How do you test your configuration / customisations against impending updates?

What support capability is offered? /what are the SLAs?
Cost benefits


Compare on-premises to cloud for certain scenarios


Focus on running your company rather than being an IT company that makes some
widgets



Short, medium or long term investment?



Capital Expenditure to Operational Expenditure
CapEx vs OpEx
CAPEX

OPEX

Definition:

OPEX refers to expenses incurred in the course
Capital expenditures are expenditures creating future benefits. A
of ordinary business, such as sales, general
capital expenditure is incurred when a business spends money either
and administrative expenses (and excluding cost
to buy fixed assets or to add to the value of an existing asset with a
of goods sold – or COGS, taxes, depreciation and
useful life that extends beyond the tax year.
interest).

Also known as:

Capital Expense

Accounting treatment:

Cannot be fully deducted in the period when they were incurred.
Operating expenses are fully deducted in the
Tangible assets are depreciated and intangible assets are amortized accounting period during which they were
over time.
incurred.

In throughput accounting:

Money spent on inventory falls under CAPEX.

The money spent turning inventory into
throughput is OPEX.

In real estate term:

Costs incurred for buying the income producing property.

Costs associated with the operation and
maintenance of an income producing property.

Examples:

Buying machinery and other equipment, acquiring intellectual
property assets like patents, furniture and fixtures

Wages, maintenance and repair of machinery,
utilities, rent, SG&A expenses, license fees,
office running expenses

Operating Expenditure, Revenue Expenditure

http://www.office365-singapore.com/microsoft-office-365/office-365-opex-cost-savings/
Things to think about


Content Migration



Connectivity





Internet Connectivity
Cloud connectivity to on-premises LOB applications

Features




Do you need features your chosen cloud doesn't have / support?

Customisations


Developing



Deploying



Maintenance / Support - Third Party Support Contracts (changes to the platform
might break your code)
Job Security – The end of the IT Pro?
Thanks to our
Sponsors
Thank you…

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
Quadrisk
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Symantec LATAM
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
Ariel Evans
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Peak 10
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
Withum
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
WithumSmith+Brown, formerly Portal Solutions
 
DLP
DLPDLP
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
pabatan
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
xband
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
DLP
DLPDLP
DLP
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 

Viewers also liked

Instrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjengInstrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjengRobbi Robbi
 
SUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint SocialSUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint Social
Mark Stokes
 
SUGUK - News - 2013-12
SUGUK - News - 2013-12SUGUK - News - 2013-12
SUGUK - News - 2013-12
Mark Stokes
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first time
Mark Stokes
 
Nokia
NokiaNokia
Christmas traditions in lithuania 2012-2013
Christmas traditions in lithuania  2012-2013Christmas traditions in lithuania  2012-2013
Christmas traditions in lithuania 2012-2013Elena Kulbokienė
 
Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)Amna Obeid
 
Amazon EC2
Amazon EC2Amazon EC2
Amazon EC2
OSoft Labs
 
mardu masin araspelner
mardu masin araspelnermardu masin araspelner
mardu masin araspelner
nanor2003
 
Black and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.comBlack and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.com
araman
 
Lorenzini.belli
Lorenzini.belliLorenzini.belli
Lorenzini.belliimartini
 

Viewers also liked (15)

Instrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjengInstrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjeng
 
SUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint SocialSUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint Social
 
Cb renewables
Cb renewablesCb renewables
Cb renewables
 
Link building-secrets
Link building-secretsLink building-secrets
Link building-secrets
 
SUGUK - News - 2013-12
SUGUK - News - 2013-12SUGUK - News - 2013-12
SUGUK - News - 2013-12
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first time
 
Nokia
NokiaNokia
Nokia
 
NOAAsept2004
NOAAsept2004NOAAsept2004
NOAAsept2004
 
E1mybusyday
E1mybusydayE1mybusyday
E1mybusyday
 
Christmas traditions in lithuania 2012-2013
Christmas traditions in lithuania  2012-2013Christmas traditions in lithuania  2012-2013
Christmas traditions in lithuania 2012-2013
 
Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)
 
Amazon EC2
Amazon EC2Amazon EC2
Amazon EC2
 
mardu masin araspelner
mardu masin araspelnermardu masin araspelner
mardu masin araspelner
 
Black and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.comBlack and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.com
 
Lorenzini.belli
Lorenzini.belliLorenzini.belli
Lorenzini.belli
 

Similar to SPSUK - When do you decide to go to the cloud?

Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
Robert Kleinschmidt
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
Effective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locationsEffective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locations
InTechnology Managed Services (part of Redcentric)
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
Dawn Simpson
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
SteveAtHPE
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
Joseph Williams
 

Similar to SPSUK - When do you decide to go to the cloud? (20)

Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Effective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locationsEffective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locations
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 

More from Mark Stokes

SUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 updateSUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 update
Mark Stokes
 
Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014
Mark Stokes
 
AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?
Mark Stokes
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
Mark Stokes
 
Evo conf - Designing SharePoint Solutions
Evo conf  - Designing SharePoint SolutionsEvo conf  - Designing SharePoint Solutions
Evo conf - Designing SharePoint Solutions
Mark Stokes
 
Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365
Mark Stokes
 
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgradeSPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
Mark Stokes
 
SharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End UsersSharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End Users
Mark Stokes
 

More from Mark Stokes (8)

SUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 updateSUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 update
 
Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014
 
AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
 
Evo conf - Designing SharePoint Solutions
Evo conf  - Designing SharePoint SolutionsEvo conf  - Designing SharePoint Solutions
Evo conf - Designing SharePoint Solutions
 
Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365
 
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgradeSPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
 
SharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End UsersSharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End Users
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

SPSUK - When do you decide to go to the cloud?

  • 1. When do you decide to go to The Cloud? SharePoint Saturday UK – November 2013 – Mark Stokes
  • 2. Mark Stokes  Red Plane  Microsoft Partner in North West UK  www.redplane.co.uk  @FlyRedPlane  Office 365, SharePoint, Azure, nopCommerce, Windows 8 Apps, Windows Phone Apps, iOS Apps, .Net  mark.stokes@redplane.co.uk  @MarkStokes  Interests: SharePoint, Technology, Photography, Raspberry Pi, Snowboarding, Wakeboaring, Running, Tough Mudder (maybe!), My Dog - Hugo
  • 3. Agenda  What does the Cloud mean to us?  What the marketing tells you  What the marketing doesn’t tell you  Trust – Security & Privacy  Control  Cost / Benefits  Some other things to think about  Job Security – The end of the IT Pro?
  • 4. What does The Cloud mean to us?  Types of cloud  Cloud Offerings   SaaS  Private Cloud  PaaS  Community Cloud  IaaS   On-Premises Public Cloud  DaaS Characteristics (NIST)  On-demand self-service  Broad network access  Resource pooling  Rapid elasticity  Measured service
  • 5. What the marketing tells you  No upfront “infrastructure” costs  Simple per user per month licencing cost  It’s always there (99.9% uptime – Financially backed!)  Access Anywhere, Anytime on Any Device  You will save money  It’s quick, easy and idiot proof  There is no downside  It’s the future  We are “all in”  It what you should be doing…..
  • 6. What the marketing doesn't tell you  Upfront Costs  Awareness, education and training on new systems  You still need to “design” your cloud environment  You still need to migrate your content into The Cloud  You might need to invest in faster / more robust Internet connectivity  De-provisioning costs of existing infrastructure  Supporting Architecture – DirSync / ADFS – Single Sign-On  Vendor Lock-in  Lack of control of the platform  You will (should) save money if you do it right and have a medium to long term strategy  How good is your MS Partner at setting up and configuring the services?
  • 7. Service Continuity  Redundancy  Monitoring   Internal monitoring built to drive automatic recovery  Data redundancy with robust failover capabilities  Outside-in monitoring raises alerts about incidents   Physical redundancy at server, datacenter, and service levels Functional redundancy with offline functionality  Extensive diagnostics provide logging, auditing, and granular tracing Resiliency    Automated failover with human backup   Active load balancing Recovery testing across failure domains  Distributed component services like Exchange Online, SharePoint Online, and Lync Online limit scope and impact of any failures in a component  Directory data replicated across component services insulates one service from another in any failure events  Fully automated deployment models, making deployment easier than ever   Standardized hardware reduces issue isolation complexities  Distributed services  Simplification Standard built-in management mechanism Human backup  Automated recovery actions with 24/7 on-call support  Team with diverse skills on the call provides rapid response and resolution  Continuous improvement by learning from the oncall teams Simplified operations and deployment
  • 8. Service Continuity  Continuous learning   Our post-incident review consists of analysis of what happened, our response, and our plan to prevent it in the future   If an incident occurs, regardless of the magnitude of impact we do a thorough postincident review every time In the event your organization was affected by a service incident, we share the post-incident review with you Consistent communication  Transparency requires consistent communication, especially when you are using the service  We have a number of communication channels such as email, RSS feeds, and the very important and highly relevant Service Health Dashboard  Consistent communication
  • 9. Trust - Security  Is your Cloud Provider Secure?  Do you “Trust” your cloud provider with your data?  What accreditations does you Cloud provider have (e.g. IL2 / IL3)  Are there any recorded security breaches?  What level of security to you actually need?  Could YOU do a better job of securing your own data?  Security of Data at Rest  Security of Data in Transit
  • 10. Trust - Privacy / Data Protection  Where is your data?    The laws of the land in the location where your data is stored Check the small print of your Service Providers Terms and Conditions Who owns your data?  And what can they do with it?  PRISM  Safe Harbor  Additional questions are:  Just how private is your data REALLY?  Are hackers REALLY going to be interested in YOUR data?  If yes, then can your Cloud provider provide “at least the same” level of privacy control that you could do yourself?
  • 11. PRISM  Clandestine mass electronic surveillance data mining program  Operated by the US National Security Agency (NSA) since 2007  Collects stored Internet Communications based on demands made to Internet companies such as Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, Apple  Provides – E-mail, Chat (Video & Voice), Videos, Photos, Stored data, VoIP, File Transfers, Video Conferencing, Notifications of target activity (logins, etc), Online Social Networking details, Special Requests  US as a World’s Telecommunications Backbone  Much of the worlds communications flow through the US  A target’s phone call, e-mail or chat will take the cheapest path, not the physically most direct path – you can’t always predict the path.  A target’s communications could easily be flowing into and through the U.S.
  • 12. US-EU Safe Harbor  Streamlined process for US companies to comply with EU Directive on the protection of personal data  Companies operating in the EU are not allowed to send personal data to countries outside of the European Economic Area unless there is a guarantee that it will receive adequate levels of protection  Intended for organisations within the EU or US that stores customer data, the Safe Harbor Principles are designed to prevent accidental information disclosure or loss.  US companies can opt into the program as long as they adhere to the 7 principles outlined in the directive.
  • 13. US-EU Safe Harbor Principles  Notice – Individuals must be informed that their data is being collected and how it will be used  Choice – individuals must have the ability to opt out of the collection and forward transfer of the data to third parties  Onward Transfer – Transfers of data to third parties may only occur to other organisations that follow adequate data protection principles  Security – Reasonable efforts must be made to prevent loss of collected data  Data integrity – Data must be relevant and reliable for the purpose it was collected for  Access – Individuals must be able to access information held about them, and correct or delete it if it is inaccurate  Enforcement – There must be effective means of enforcing these rules
  • 14. Control - Or rather the lack of  You no longer control the platform  You no longer have control over platform updates  What warning / communication do you have of impending updates?   How do you test your configuration / customisations against impending updates? What support capability is offered? /what are the SLAs?
  • 15. Cost benefits  Compare on-premises to cloud for certain scenarios  Focus on running your company rather than being an IT company that makes some widgets  Short, medium or long term investment?  Capital Expenditure to Operational Expenditure
  • 16. CapEx vs OpEx CAPEX OPEX Definition: OPEX refers to expenses incurred in the course Capital expenditures are expenditures creating future benefits. A of ordinary business, such as sales, general capital expenditure is incurred when a business spends money either and administrative expenses (and excluding cost to buy fixed assets or to add to the value of an existing asset with a of goods sold – or COGS, taxes, depreciation and useful life that extends beyond the tax year. interest). Also known as: Capital Expense Accounting treatment: Cannot be fully deducted in the period when they were incurred. Operating expenses are fully deducted in the Tangible assets are depreciated and intangible assets are amortized accounting period during which they were over time. incurred. In throughput accounting: Money spent on inventory falls under CAPEX. The money spent turning inventory into throughput is OPEX. In real estate term: Costs incurred for buying the income producing property. Costs associated with the operation and maintenance of an income producing property. Examples: Buying machinery and other equipment, acquiring intellectual property assets like patents, furniture and fixtures Wages, maintenance and repair of machinery, utilities, rent, SG&A expenses, license fees, office running expenses Operating Expenditure, Revenue Expenditure http://www.office365-singapore.com/microsoft-office-365/office-365-opex-cost-savings/
  • 17. Things to think about  Content Migration  Connectivity    Internet Connectivity Cloud connectivity to on-premises LOB applications Features   Do you need features your chosen cloud doesn't have / support? Customisations  Developing  Deploying  Maintenance / Support - Third Party Support Contracts (changes to the platform might break your code)
  • 18. Job Security – The end of the IT Pro?

Editor's Notes

  1. NIST – National Institute for Standards and TechnologyOn-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth.Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.SaaS – Software-as-a-Service is a model of software deployment whereby a provider licenses an application to customers for use as a service on demand. One example of SaaS is the Salesforce.com CRM application.IaaS – Infrastructure-as-a-Service is the delivery of computer infrastructure (typically a platform virtualization environment) as a service. Rather than purchasing servers, software, data center space or network equipment, clients instead buy those resources as a fully outsourced service. One such example of this is the Amazon web services.PaaS – Platform-as a-Service is the delivery of a computing platform and solution stack as a service. It facilitates the deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. PaaS provides the facilities required to support the complete lifecycle of building and delivering web applications and services. An example of this would the GoogleApps.DaaS – Desktop-as-a-Service enables users to use their desktops virtually from anywhere. Commonly known as “Desktop Virtualization”, this concept separates personal computer desktop environments from the physical machine through a client-server computing model. Nowadays, with the rise of SaaS and RIA (Rich Internet Applications) this method of usage is becoming obsolete.
  2. IT service continuity is a subset of business continuity planning and encompasses IT disaster recovery planning and wider IT resilience planning. It is the process of assessing and managing risks associated with information technology (IT) departments. It involves the evaluation of values, threats, risks, vulnerabilities and development of countermeasures to ensure continuation in the event of an IT services disruption.
  3. European Economic Area:- Member states of the EU, except Croatia, who is expected to join later, plus Iceland, Lichtenstein and Norway