SlideShare a Scribd company logo
WHITEPAPER
State of the Cloud Computing Marketplace
The Need for a Trust-But-Verify Software Licensing Approach
State of the Cloud Computing Marketplace
2
State of the Cloud Computing Marketplace
The Need for a Trust-But-Verify Software Licensing Approach
Executive Overview
Enterprises are accelerating their use of cloud computing
because it provides such an attractive value proposition.
This value proposition is enhanced through usage-based
licensing. However, the difficulty of monitoring usage-based
licensing has slowed its adoption. Flexera Software, the
market leader in software monetization solutions, makes it
possible to efficiently deploy usage-based licensing models.
The company’s solutions empower application producers to
implement a broad spectrum of licensing models within a
single product—from strict enforcement to a more open trust-
but-verify approach—to maximize software revenues and
ensure compliance.
The State of the Cloud Computing Marketplace
Cloud computing continues to grow because it offers a
wealth of benefits to software vendors as well as their
enterprise customers. Rather than a company having to
purchase a software package, which must be deployed and
maintained on their own servers, cloud computing provides
the economies and conveniences of an organization
simply logging into a web-based service. Cloud computing
eliminates the CapEx costs of purchasing dedicated servers
and software, and it greatly reduces OpEx by eliminating
the need for allocating IT personnel for application
administration and maintenance, including keeping up with
security patches. All of this in turn allows companies to focus
on their core competencies, rather than devoting precious
time and resources to peripheral tasks. These benefits are
likely to drive increased SaaS adoption well into the future.
The biggest obstacle to greater adoption of cloud computing
has been enterprise concern and regulatory mandates
concerning privacy and control of sensitive data. Yet these
concerns, including regulatory requirements for on-site
storage and control, have to a great extent been relieved as
cloud providers have gone beyond the original public cloud
model to private cloud deployments (in which cloud-based
resources are only used by a single organization) and
public/private hybrid models in which sensitive information
is stored on dedicated resources on the customer’s premises.
Meanwhile the pressures that have made the cloud
computing marketplace so attractive continue to build.
Organizations see a need to relieve the burdens on
overworked, understaffed and underfunded IT departments.
As long as vendors meet customer requirements for
performance, security and other factors, many more
companies are now willing to use hosted software services.
In many cases, the cloud offers greater redundancy,
fewer points of failure and superior IT resources to ensure
security and high availability than what organizations can
economically provide on their own.
At the same time, the basic cloud value proposition has
become more attractive as cloud providers have created
new pricing models—including usage-based licensing—to
better compete in the marketplace.
Projected Software Growth
Research firm IDC estimates that $367 billion was spent in
2012 globally for packaged software, with a steady growth
for the sector projected for some years out. The cloud
computing market is growing as well, as Gartner estimates
that global cloud computing sales were up nearly 18% to
some $14.5 billion for 2012.
Industry Shift from Perpetual to Consumption-Based
Licensing and Pricing
The shift from perpetual to usage-based licensing models is
driven by a number of IT needs, including a desire to avoid
shelfware and to pay only for actual use, while avoiding the
hassle of software audits. Consumption-based pricing—which
is a hallmark of cloud computing—gives organizations the
flexibility to ramp departments up or down, according to
needs and varying workloads.From a hardware standpoint,
a company can spin up more servers for its testing group to
use, for example, prior to a new release, and then release
the hardware (and its cost) when the extra resources are
no longer needed. The value of such pricing is seen from a
software standpoint, too. All of this points toward the desire
of customers for greater flexibility in licensing. These same
forces provide opportunities for producers to provide a
State of the Cloud Computing Marketplace
3
distinguishing value-add through offering innovative licensing
and pricing programs.
Technology Forcing New Monetization and Protection Models
Hybrid cloud computing, much like a hybrid cloud,
describes situations in which a solution is partitioned
between local software running on company premises and
web-hosted cloud-based services. Google Apps and Office
365, for example, can be run both locally and in the cloud.
An important driver for hybrid deployments is the need for
privacy and security. A hybrid cloud computing solution
enables cloud-based resources to support a presentation
tier, for example, while the data could reside either on
customer-based servers or on private cloud infrastructure.
As earlier noted, regulatory compliance for some
industries—such as healthcare and financial services—
mandates that critical content must be stored locally. A
company which handles military contracts might be required
to not let any sensitive data be stored elsewhere. Even
when not mandated, companies with high-value intellectual
property may have internal policies that prohibit use of
public cloud and standard cloud computing solutions.
Customer demands come into play as well. For example,
customers of a chip design firm might stipulate that their
data be stored locally to protect intellectual property.
New monetization models will be required to deal with
hybrid and other specialized solutions. In cases where the
solution is partially cloud-based and partially enterprise-
based, usage-based licensing is a way for companies to
make sure that they are not paying twice for the same services.
Why is Usage-based Licensing So Complex?
Surveys indicate that many companies intend to migrate to
usage-based licensing, but fail to do so. Part of the reason
for this is that usage-based licensing is more complex than
simply buying software to use on the company premises.
Table 1
Pricing & Licensing Strategies in Flux
Forty two percent of application producers report that over the past 18-24 months, their
software pricing and licensing strategies have changed
Change remains the norm for the immediate future. When asked how licensing and
pricing strategies would change over the next 18-24 months, application producers said
they would add subscription/term licensing (26%), better enforcement or security (24%),
pay-as-you-use (24%) and temporary/evaluation/ “try-before-you-buy” licensing (19%).
Source: Flexera Software, 2012 Software Pricing and Licensing Survey
State of the Cloud Computing Marketplace
4
This is largely due to the need to track much more data,
which then needs to be aggregated for invoicing. For the
vendor, updating their software to generate usage data and
developing the infrastructure required to process that data is
a difficult undertaking. In addition, the reality is that some
enterprises are not willing to let vendors collect and process
product usage data—though others are open to sharing the
usage data as long as it is aggregated and anonymized.
Additional complexity comes with hybrid products as you
need to track both premises-based and remote products.
Not only is keeping track of usage in two different places
harder, but unlike flat licensing, where retrieval of data
from former customers at the end of the contract period is
unnecessary, usage-based licensing makes recovery of that
data essential. This can cause any number of nightmare
scenarios, such where the customer is either unwilling or
unable to send back the information in a timely manner.
Data privacy is another critical issue. One company tried to
do usage-based licensing for a large French manufacturer,
who was going to send the solution provider usage logs
containing the logins of those who used the service. They
found that France prohibits giving that information to third
parties without getting the approval of the employees. The
manufacturer was therefore unable to send the usage logs.
These and other challenges can double the complexity
which must be faced by companies seeking to implement
usage-based licensing, as they need to handle both the on-
premises and SaaS deployments.
The Increasing Complexity of Software Licensing
As producers adapt to embrace new technologies, support
new software deployment models and offer their customers
new licensing options, they and their customers face
growing complexity. For most producers, all of these
changes represent additions, not replacements, to the
number of licensing models they support as they must
continue to support old models for their existing customers.
Application producers and customers enter into contracts in
order to ensure that they make an exchange of fair value.
Software contracts can include a wide range of terms and
conditions. The core terms and conditions of any software
contract, however, are price and use. Customers want to
keep the price down and in some cases only pay for what
they use. Producers want to keep the price up and ensure
that they are getting paid for as much use as actually
occurs. While new models can accommodate these needs,
and bring greater value to users and producers, they can
entail more complexity in the software licensing—though
ultimately, the number of licensing models should decrease.
Licensing Model Definition of Use
Named users Entitles the customer to have a given number of specified individual employees who use
the software
Concurrent use Puts no restrictions on who is entitled to use the software, as long as the customer’s total
number of simultaneous sessions does not exceed a specified number at any time
Node-locked Entitles the customer to only use the software on a specified set of end-user desktops
Server- and/or CPU-
based
Restricts the customer’s entitlement to a specific number of physical servers and/or a specific
number of CPUs within those servers
Transaction-based Entitles the customer the right to execute a specified number of transactions (which must also
be appropriately defined) with the software (similar to usage-based)
Usage-based Entitles the customer the right to use the application freely then captures usage and shares
that usage with the customer. Types of usage data that could be captured include:
# of compilations	 # of pictures sent
# of characters translated	 # of campaigns managed
# of drawings rendered	 # of email messages sent
# of CPU minutes	 # of gigabytes stores
# of data converted
Environmental
limitations
The producer bases pricing on entitlement for a particular type of use – i.e. in the production
environment, in a development environment, or in a disaster recovery environment
Table 2: A quick look at common licensing models.
State of the Cloud Computing Marketplace
5
Matching the Entitlement to Usage
The first challenge in engineering the exchange of fair value
in a software sale is to define use. This is no small matter.
In fact, use of software can be defined in many ways, as
shown in table 2.
Not listed in the table, but a much-used alternative is the
enterprise license approach, which sets no limits whatsoever
on the use of the software within the organization—
although the contract may define the bounds of such a license
to ensure that changes in the business don’t result in use
beyond that which is anticipated at the time of the agreement.
The enterprise license may also include some type of a
periodic true-up, whereby the customer agrees to pay for
actual use according to a pre-defined schedule in exchange
for the flexibility of using the software on an as-needed basis.
All of these licensing models may be appropriate based on
the products sold, the markets served and corporate culture.
For example, a node-locked model may make the most
sense in a 24/7 contact center where different users may
occupy any seat at any given moment—but where users
won’t need access to the software from home or on the
road. A transaction-based model, on the other hand, may
be more appropriate for applications that are exposed to
the producer’s customers via the web—making it impossible
to accurately predict total utilization in advance.
Producers and customers who enter into these types of
contracts in good faith must clearly have some means
of capturing usage and ensuring compliance with these
various complex models of compliance or use. If they don’t
have such a mechanism in place, there won’t be any way to
ensure that the terms of the contract are being honored and
that a fair exchange of value is actually taking place.
No Tools to Track, Aggregate and Share Usage Data
The clear definition of customer entitlements only has real
meaning when it is accompanied by an effective means
of managing and capturing use in the context of those
entitlements. Traditionally, application producers have
failed to provide customers with an effective means of
pro-actively discovering disparities between authorized
and actual use. This lack of a compliance management
capability greatly increases the likelihood that customers
will inadvertently violate their contract terms. It also prevents
customers from defending their own integrity by either
restricting their use or offering producers fair additional
compensation for observed additional use.
This helps explain the rise in products such as Software
Asset Management (SAM) tools—though they are limited in
the number of models they can support. The lack of tools to
track and aggregate usage data can be credited to the vast
complexity involved, due to the amount of data as well as
the need to address privacy concerns.
As covered in more detail in the final sections of this white
paper, Flexera Software provides one of the only tools
available to track, aggregate and share usage data. For
transparency, we make this data available to the end user
as well as the publisher.
Data Privacy and Tamper-Proofing Concerns
Enterprises suffer from a lack of communication and trust
in regard to software publishers, software publishers, in
return, have the same issues with customers. Data privacy
is an enterprise concern, tamper proofing is a publisher
concern—and both are hard to deal with.
Companies are reluctant to share their usage data with
publishers, and are more comfortable with aggregating
and forwarding it in paper form at agreed intervals. The
publishers find this unacceptable because of the possibility
that the customer will tamper with the data to lower their
apparent usage. The customer in turn is reluctant to send the
data electronically because of concerns that the publisher
will use the data to learn the customer’s usage patterns, and
alter their pricing structure to maximize their revenue at the
expense of the customer.
One way around this impasse is to have both parties agree
to a fixed rate for a certain period, such as five years, such
as was done with cell phones. In the early 1990s, users
had to pay for every minute on the huge cell phones that
existed at that time. They had to pay for roaming and other
usage patterns, and they never knew how much the bill
would be. For this reason, users would put usage alerts on
their phone, or shut off roaming, which is why the ability to
turn off roaming still exists on mobile phones.
Service providers learned from this, and began to offer a
certain number of minutes for a fixed price, and only charge
for roaming after that limit is reached. This practice is now
nearly universal, as it offers users far more control of their
mobile telephone costs. The cloud computing and SaaS
marketplace, as well as enterprises in general, can and
should learn from this experience.
A Trust-But-Verify Approach to Usage-Based Licensing
Successful business relationships depend on trust between
buyers and sellers. Both sides want and need the other
side to succeed. With the right monitoring technology,
organizations can take advantage of a trust-but-verify
approach to usage-based licensing. This gives both sides
complete transparency of usage, while sparing producers
the expense—and users the invasiveness—of the traditional
usage audit.
Adopting a trust-but-verify approach is a particularly
attractive alternative for application producers seeking to
ensure the exchange of fair value in an atmosphere of trust.
With this usage-based model, application producers and
customers have access to actual customer application usage
information that can be reconciled against the customer
contracted entitlements.
State of the Cloud Computing Marketplace
6
The ability to get to a single source of truth regarding
entitlements and actual usage is the foundation of a
successful trust-but-verify approach.
Implementing a trust-but-verify approach for compliance
management automates the entire compliance process.
It requires the producer to instrument their products with
a usage-based licensing model. Today’s sophisticated
enterprise applications are typically comprised of a variety
of functional components that invoke complex sets of
software processes. To capture the use of such applications,
it is necessary to instrument these components and
processes in a way that accurately measures use according
to whichever licensing metric is applied.
How Flexera Software Can Help
As the market leader in software monetization solutions,
Flexera Software empowers application producers to
implement a broad spectrum of licensing models within
a single product—from strict enforcement to a more open
trust-but-verify approach—to maximize revenues and ensure
compliance. Application producers are able to:
• Enable flexible monetization and licensing models. 	
The ability to sense and respond to changing market
conditions is a significant competitive advantage.
Having keen insight into product use enables you to
quickly alter monetization models across products
and tailor the models for various market segments,
geographies, etc.
• Offer mature monetization models for cloud
computing applications. Many application producers
are developing SaaS applications and require
sophisticated, mature solutions to implement the
required monetization models the market demands
for such solutions (e.g., pay-for-overage, pay-for-burst,
pay-for-use).
• Ensure that application producers get paid for the
value delivered. Prevent anti-piracy and licensing abuse
across all geographies with the right licensing model.
Automate back-office operations that ensure license
compliance to streamline internal operations (i.e.,
reduces the costs of audits) while ensuring all potential
revenue is realized.
The software monetization solutions from Flexera Software
automates compliance management by supporting the
full licensing spectrum, all licensing models and the back-
office automation required to manage a growing software
business, enabling application producers to generate more
recurring and predictable revenue from customers.
About Flexera Software
Flexera Software helps application producers and
enterprises increase application usage and the value they
derive from their software. Our next-generation software
licensing, compliance and installation solutions are essential
to ensure continuous licensing compliance, optimized
software investments and to future-proof businesses against
the risks and costs of constantly changing technology. Over
80,000 customers turn to Flexera Software as a trusted and
neutral source for the knowledge and expertise we have
gained as the marketplace leader for over 25 years and for
the automation and intelligence designed into our products.
For more information, please go to:
www.flexerasoftware.com
Flexera Software LLC
(Global Headquarters):
+1 800-809-5659
United Kingdom (Europe,
Middle East Headquarters):
+44 870-871-1111
+44 870-873-6300
Australia (Asia,
Pacific Headquarters):
+61 3-9895-2000
For more office locations visit:
www.flexerasoftware.com
Copyright © 2015 Flexera Software LLC. All other brand and product names mentioned herein may be the trademarks and registered trademarks of their respective owners.
SWM_WP_StateOfCC_Jan15

More Related Content

What's hot

Cloud Based POV_single page
Cloud Based POV_single pageCloud Based POV_single page
Cloud Based POV_single pageTim Hofer
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyCoca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Lightwell
 
Erp
ErpErp
CEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationCEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B Integration
Lightwell
 
IDC WHITE PAPER - IBM PureFlex System Ready for Cloud
IDC WHITE PAPER - IBM PureFlex System Ready for CloudIDC WHITE PAPER - IBM PureFlex System Ready for Cloud
IDC WHITE PAPER - IBM PureFlex System Ready for Cloud
Angel Villar Garea
 
Mobiso Intro1109
Mobiso Intro1109Mobiso Intro1109
Mobiso Intro1109
ddebbrown
 
Telecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag SarkarTelecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag Sarkar
Sohag Sarkar
 
Lattice: RedChip's Global Online CEO Conference
Lattice: RedChip's Global Online CEO ConferenceLattice: RedChip's Global Online CEO Conference
Lattice: RedChip's Global Online CEO Conference
RedChip Companies, Inc.
 
eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...
eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...
eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...
ISIS Papyrus Software
 
White Paper: True Cloud vs. Hosted Applications
White Paper: True Cloud vs. Hosted ApplicationsWhite Paper: True Cloud vs. Hosted Applications
White Paper: True Cloud vs. Hosted Applications
Host Analytics
 
Soft Summit 2008 Nov 06 08 Revised
Soft Summit 2008 Nov 06 08 RevisedSoft Summit 2008 Nov 06 08 Revised
Soft Summit 2008 Nov 06 08 Revised
Roger Bottum
 
A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)
A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)
A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)
Lustratus REPAMA
 
The Jamcracker Platform - Cloud Services Governance and Management for the En...
The Jamcracker Platform - Cloud Services Governance and Management for the En...The Jamcracker Platform - Cloud Services Governance and Management for the En...
The Jamcracker Platform - Cloud Services Governance and Management for the En...
John Katrick
 

What's hot (18)

Cloud Based POV_single page
Cloud Based POV_single pageCloud Based POV_single page
Cloud Based POV_single page
 
Power Point
Power PointPower Point
Power Point
 
Chapter 9 Slides
Chapter 9 SlidesChapter 9 Slides
Chapter 9 Slides
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyCoca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
 
Erp
ErpErp
Erp
 
CEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationCEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B Integration
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
IDC WHITE PAPER - IBM PureFlex System Ready for Cloud
IDC WHITE PAPER - IBM PureFlex System Ready for CloudIDC WHITE PAPER - IBM PureFlex System Ready for Cloud
IDC WHITE PAPER - IBM PureFlex System Ready for Cloud
 
Mobiso Intro1109
Mobiso Intro1109Mobiso Intro1109
Mobiso Intro1109
 
Telecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag SarkarTelecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag Sarkar
 
Lattice: RedChip's Global Online CEO Conference
Lattice: RedChip's Global Online CEO ConferenceLattice: RedChip's Global Online CEO Conference
Lattice: RedChip's Global Online CEO Conference
 
eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...
eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...
eCommunication - Turning Green Into Gold - Technology Innovation Brochure by ...
 
White Paper: True Cloud vs. Hosted Applications
White Paper: True Cloud vs. Hosted ApplicationsWhite Paper: True Cloud vs. Hosted Applications
White Paper: True Cloud vs. Hosted Applications
 
Soft Summit 2008 Nov 06 08 Revised
Soft Summit 2008 Nov 06 08 RevisedSoft Summit 2008 Nov 06 08 Revised
Soft Summit 2008 Nov 06 08 Revised
 
A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)
A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)
A Market Landscape/Taxonomy/Segmentation Model for Cloud Computing Rev 1 (0.92)
 
Press releases
Press releasesPress releases
Press releases
 
The Jamcracker Platform - Cloud Services Governance and Management for the En...
The Jamcracker Platform - Cloud Services Governance and Management for the En...The Jamcracker Platform - Cloud Services Governance and Management for the En...
The Jamcracker Platform - Cloud Services Governance and Management for the En...
 

Viewers also liked

Total Stress Management Guide For Nurses Dr Shriniwas Kashalikar
Total Stress Management Guide For Nurses Dr Shriniwas KashalikarTotal Stress Management Guide For Nurses Dr Shriniwas Kashalikar
Total Stress Management Guide For Nurses Dr Shriniwas Kashalikarshriniwaskashalikar
 
Atteindre la maturité de l'Application Readiness
Atteindre la maturité de l'Application ReadinessAtteindre la maturité de l'Application Readiness
Atteindre la maturité de l'Application Readiness
Flexera
 
Mobile-App-Risiken minimieren: Sichere und zuverlässige Bereitstellung
Mobile-App-Risiken minimieren: Sichere und zuverlässige BereitstellungMobile-App-Risiken minimieren: Sichere und zuverlässige Bereitstellung
Mobile-App-Risiken minimieren: Sichere und zuverlässige Bereitstellung
Flexera
 
Master key system part 10
Master key system   part 10Master key system   part 10
Master key system part 10canei2day
 
Blossoming Together Dr. Shriniwas Kashalikar
Blossoming Together Dr. Shriniwas KashalikarBlossoming Together Dr. Shriniwas Kashalikar
Blossoming Together Dr. Shriniwas Kashalikarshriniwaskashalikar
 
衛國軍魂(抗日名將)
衛國軍魂(抗日名將)衛國軍魂(抗日名將)
衛國軍魂(抗日名將)Josephine C
 
Simplifying social business
Simplifying social businessSimplifying social business
Simplifying social business
Kathy Herrmann
 
More About Equality Dr. Shriniwas Kashalikar
More About Equality Dr. Shriniwas KashalikarMore About Equality Dr. Shriniwas Kashalikar
More About Equality Dr. Shriniwas Kashalikarshriniwaskashalikar
 
Telling your story
Telling your story Telling your story
Telling your story
Alexandra Laney (Chaikin), PMP
 
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas KashalikarHolisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikarshriniwaskashalikar
 
Walaval Dr. Shriniwas Kashalikar
Walaval Dr. Shriniwas KashalikarWalaval Dr. Shriniwas Kashalikar
Walaval Dr. Shriniwas Kashalikarshriniwaskashalikar
 
De patient José Van Der Schoor
De patient   José Van Der SchoorDe patient   José Van Der Schoor
De patient José Van Der SchoorMijnZorgnet
 
Banner maker展现端flash性能优化
Banner maker展现端flash性能优化 Banner maker展现端flash性能优化
Banner maker展现端flash性能优化
taobao.com
 
Tips for a successful Salesforce.com implementation
Tips for a successful Salesforce.com implementationTips for a successful Salesforce.com implementation
Tips for a successful Salesforce.com implementation
Kathy Herrmann
 

Viewers also liked (19)

Total Stress Management Guide For Nurses Dr Shriniwas Kashalikar
Total Stress Management Guide For Nurses Dr Shriniwas KashalikarTotal Stress Management Guide For Nurses Dr Shriniwas Kashalikar
Total Stress Management Guide For Nurses Dr Shriniwas Kashalikar
 
Atteindre la maturité de l'Application Readiness
Atteindre la maturité de l'Application ReadinessAtteindre la maturité de l'Application Readiness
Atteindre la maturité de l'Application Readiness
 
Mobile-App-Risiken minimieren: Sichere und zuverlässige Bereitstellung
Mobile-App-Risiken minimieren: Sichere und zuverlässige BereitstellungMobile-App-Risiken minimieren: Sichere und zuverlässige Bereitstellung
Mobile-App-Risiken minimieren: Sichere und zuverlässige Bereitstellung
 
Master key system part 10
Master key system   part 10Master key system   part 10
Master key system part 10
 
Blossoming Together Dr. Shriniwas Kashalikar
Blossoming Together Dr. Shriniwas KashalikarBlossoming Together Dr. Shriniwas Kashalikar
Blossoming Together Dr. Shriniwas Kashalikar
 
衛國軍魂(抗日名將)
衛國軍魂(抗日名將)衛國軍魂(抗日名將)
衛國軍魂(抗日名將)
 
病兆
病兆病兆
病兆
 
Simplifying social business
Simplifying social businessSimplifying social business
Simplifying social business
 
More About Equality Dr. Shriniwas Kashalikar
More About Equality Dr. Shriniwas KashalikarMore About Equality Dr. Shriniwas Kashalikar
More About Equality Dr. Shriniwas Kashalikar
 
Internet Marketing Service
Internet Marketing ServiceInternet Marketing Service
Internet Marketing Service
 
Telling your story
Telling your story Telling your story
Telling your story
 
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas KashalikarHolisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
 
Cl201 using social media to build community k medit
Cl201 using social media to build community k meditCl201 using social media to build community k medit
Cl201 using social media to build community k medit
 
AMC WIT MARMER COLLECTIE
AMC WIT MARMER COLLECTIEAMC WIT MARMER COLLECTIE
AMC WIT MARMER COLLECTIE
 
Walaval Dr. Shriniwas Kashalikar
Walaval Dr. Shriniwas KashalikarWalaval Dr. Shriniwas Kashalikar
Walaval Dr. Shriniwas Kashalikar
 
De patient José Van Der Schoor
De patient   José Van Der SchoorDe patient   José Van Der Schoor
De patient José Van Der Schoor
 
Italy
ItalyItaly
Italy
 
Banner maker展现端flash性能优化
Banner maker展现端flash性能优化 Banner maker展现端flash性能优化
Banner maker展现端flash性能优化
 
Tips for a successful Salesforce.com implementation
Tips for a successful Salesforce.com implementationTips for a successful Salesforce.com implementation
Tips for a successful Salesforce.com implementation
 

Similar to State of the Cloud Computing Marketplace

New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
NIIT Technologies
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
Assem mousa
 
Cloud computing - the impact on revenue recognition
Cloud computing - the impact on revenue recognitionCloud computing - the impact on revenue recognition
Cloud computing - the impact on revenue recognition
PwC
 
Why Choose the Nalpeiron Licensing Service vs. Building Your Own
Why Choose the Nalpeiron Licensing Service vs. Building Your OwnWhy Choose the Nalpeiron Licensing Service vs. Building Your Own
Why Choose the Nalpeiron Licensing Service vs. Building Your Own
Jon Gillespie-Brown
 
testdata
testdatatestdata
testdata
Beenish Burhan
 
Small and medium-sized businesses can reduce software licensing and other OPE...
Small and medium-sized businesses can reduce software licensing and other OPE...Small and medium-sized businesses can reduce software licensing and other OPE...
Small and medium-sized businesses can reduce software licensing and other OPE...
Principled Technologies
 
Virtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyVirtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing Policy
Flexera
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
GovCloud Network
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS Solution
Daniel Connor
 
9 Considerations Before You License a New ITSM Solution
9 Considerations Before You License a New ITSM Solution9 Considerations Before You License a New ITSM Solution
9 Considerations Before You License a New ITSM Solution
Cherwell Software
 
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Justrassity996
 
Oris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloudOris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloudJim Robins
 
Is the cloud right for your business?
Is the cloud right for your business?Is the cloud right for your business?
Is the cloud right for your business?
Grant Thornton LLP
 
Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing software
MRPeasy
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
GFI Software
 

Similar to State of the Cloud Computing Marketplace (20)

Software Pricing
Software PricingSoftware Pricing
Software Pricing
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Cloud computing - the impact on revenue recognition
Cloud computing - the impact on revenue recognitionCloud computing - the impact on revenue recognition
Cloud computing - the impact on revenue recognition
 
Why Choose the Nalpeiron Licensing Service vs. Building Your Own
Why Choose the Nalpeiron Licensing Service vs. Building Your OwnWhy Choose the Nalpeiron Licensing Service vs. Building Your Own
Why Choose the Nalpeiron Licensing Service vs. Building Your Own
 
TestTitle
TestTitleTestTitle
TestTitle
 
testdata
testdatatestdata
testdata
 
NewFile
NewFileNewFile
NewFile
 
SaaS Presentation
SaaS PresentationSaaS Presentation
SaaS Presentation
 
Small and medium-sized businesses can reduce software licensing and other OPE...
Small and medium-sized businesses can reduce software licensing and other OPE...Small and medium-sized businesses can reduce software licensing and other OPE...
Small and medium-sized businesses can reduce software licensing and other OPE...
 
Virtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyVirtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing Policy
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS Solution
 
9 Considerations Before You License a New ITSM Solution
9 Considerations Before You License a New ITSM Solution9 Considerations Before You License a New ITSM Solution
9 Considerations Before You License a New ITSM Solution
 
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
 
Oris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloudOris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloud
 
Is the cloud right for your business?
Is the cloud right for your business?Is the cloud right for your business?
Is the cloud right for your business?
 
Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing software
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 

More from Flexera

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Flexera
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
Flexera
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
Flexera
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
Flexera
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
Flexera
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
Flexera
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
Flexera
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
Flexera
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
Flexera
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Flexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Flexera
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
Flexera
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Flexera
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Flexera
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Flexera
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
Flexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
Flexera
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Flexera
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Flexera
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Flexera
 

More from Flexera (20)

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

State of the Cloud Computing Marketplace

  • 1. WHITEPAPER State of the Cloud Computing Marketplace The Need for a Trust-But-Verify Software Licensing Approach
  • 2. State of the Cloud Computing Marketplace 2 State of the Cloud Computing Marketplace The Need for a Trust-But-Verify Software Licensing Approach Executive Overview Enterprises are accelerating their use of cloud computing because it provides such an attractive value proposition. This value proposition is enhanced through usage-based licensing. However, the difficulty of monitoring usage-based licensing has slowed its adoption. Flexera Software, the market leader in software monetization solutions, makes it possible to efficiently deploy usage-based licensing models. The company’s solutions empower application producers to implement a broad spectrum of licensing models within a single product—from strict enforcement to a more open trust- but-verify approach—to maximize software revenues and ensure compliance. The State of the Cloud Computing Marketplace Cloud computing continues to grow because it offers a wealth of benefits to software vendors as well as their enterprise customers. Rather than a company having to purchase a software package, which must be deployed and maintained on their own servers, cloud computing provides the economies and conveniences of an organization simply logging into a web-based service. Cloud computing eliminates the CapEx costs of purchasing dedicated servers and software, and it greatly reduces OpEx by eliminating the need for allocating IT personnel for application administration and maintenance, including keeping up with security patches. All of this in turn allows companies to focus on their core competencies, rather than devoting precious time and resources to peripheral tasks. These benefits are likely to drive increased SaaS adoption well into the future. The biggest obstacle to greater adoption of cloud computing has been enterprise concern and regulatory mandates concerning privacy and control of sensitive data. Yet these concerns, including regulatory requirements for on-site storage and control, have to a great extent been relieved as cloud providers have gone beyond the original public cloud model to private cloud deployments (in which cloud-based resources are only used by a single organization) and public/private hybrid models in which sensitive information is stored on dedicated resources on the customer’s premises. Meanwhile the pressures that have made the cloud computing marketplace so attractive continue to build. Organizations see a need to relieve the burdens on overworked, understaffed and underfunded IT departments. As long as vendors meet customer requirements for performance, security and other factors, many more companies are now willing to use hosted software services. In many cases, the cloud offers greater redundancy, fewer points of failure and superior IT resources to ensure security and high availability than what organizations can economically provide on their own. At the same time, the basic cloud value proposition has become more attractive as cloud providers have created new pricing models—including usage-based licensing—to better compete in the marketplace. Projected Software Growth Research firm IDC estimates that $367 billion was spent in 2012 globally for packaged software, with a steady growth for the sector projected for some years out. The cloud computing market is growing as well, as Gartner estimates that global cloud computing sales were up nearly 18% to some $14.5 billion for 2012. Industry Shift from Perpetual to Consumption-Based Licensing and Pricing The shift from perpetual to usage-based licensing models is driven by a number of IT needs, including a desire to avoid shelfware and to pay only for actual use, while avoiding the hassle of software audits. Consumption-based pricing—which is a hallmark of cloud computing—gives organizations the flexibility to ramp departments up or down, according to needs and varying workloads.From a hardware standpoint, a company can spin up more servers for its testing group to use, for example, prior to a new release, and then release the hardware (and its cost) when the extra resources are no longer needed. The value of such pricing is seen from a software standpoint, too. All of this points toward the desire of customers for greater flexibility in licensing. These same forces provide opportunities for producers to provide a
  • 3. State of the Cloud Computing Marketplace 3 distinguishing value-add through offering innovative licensing and pricing programs. Technology Forcing New Monetization and Protection Models Hybrid cloud computing, much like a hybrid cloud, describes situations in which a solution is partitioned between local software running on company premises and web-hosted cloud-based services. Google Apps and Office 365, for example, can be run both locally and in the cloud. An important driver for hybrid deployments is the need for privacy and security. A hybrid cloud computing solution enables cloud-based resources to support a presentation tier, for example, while the data could reside either on customer-based servers or on private cloud infrastructure. As earlier noted, regulatory compliance for some industries—such as healthcare and financial services— mandates that critical content must be stored locally. A company which handles military contracts might be required to not let any sensitive data be stored elsewhere. Even when not mandated, companies with high-value intellectual property may have internal policies that prohibit use of public cloud and standard cloud computing solutions. Customer demands come into play as well. For example, customers of a chip design firm might stipulate that their data be stored locally to protect intellectual property. New monetization models will be required to deal with hybrid and other specialized solutions. In cases where the solution is partially cloud-based and partially enterprise- based, usage-based licensing is a way for companies to make sure that they are not paying twice for the same services. Why is Usage-based Licensing So Complex? Surveys indicate that many companies intend to migrate to usage-based licensing, but fail to do so. Part of the reason for this is that usage-based licensing is more complex than simply buying software to use on the company premises. Table 1 Pricing & Licensing Strategies in Flux Forty two percent of application producers report that over the past 18-24 months, their software pricing and licensing strategies have changed Change remains the norm for the immediate future. When asked how licensing and pricing strategies would change over the next 18-24 months, application producers said they would add subscription/term licensing (26%), better enforcement or security (24%), pay-as-you-use (24%) and temporary/evaluation/ “try-before-you-buy” licensing (19%). Source: Flexera Software, 2012 Software Pricing and Licensing Survey
  • 4. State of the Cloud Computing Marketplace 4 This is largely due to the need to track much more data, which then needs to be aggregated for invoicing. For the vendor, updating their software to generate usage data and developing the infrastructure required to process that data is a difficult undertaking. In addition, the reality is that some enterprises are not willing to let vendors collect and process product usage data—though others are open to sharing the usage data as long as it is aggregated and anonymized. Additional complexity comes with hybrid products as you need to track both premises-based and remote products. Not only is keeping track of usage in two different places harder, but unlike flat licensing, where retrieval of data from former customers at the end of the contract period is unnecessary, usage-based licensing makes recovery of that data essential. This can cause any number of nightmare scenarios, such where the customer is either unwilling or unable to send back the information in a timely manner. Data privacy is another critical issue. One company tried to do usage-based licensing for a large French manufacturer, who was going to send the solution provider usage logs containing the logins of those who used the service. They found that France prohibits giving that information to third parties without getting the approval of the employees. The manufacturer was therefore unable to send the usage logs. These and other challenges can double the complexity which must be faced by companies seeking to implement usage-based licensing, as they need to handle both the on- premises and SaaS deployments. The Increasing Complexity of Software Licensing As producers adapt to embrace new technologies, support new software deployment models and offer their customers new licensing options, they and their customers face growing complexity. For most producers, all of these changes represent additions, not replacements, to the number of licensing models they support as they must continue to support old models for their existing customers. Application producers and customers enter into contracts in order to ensure that they make an exchange of fair value. Software contracts can include a wide range of terms and conditions. The core terms and conditions of any software contract, however, are price and use. Customers want to keep the price down and in some cases only pay for what they use. Producers want to keep the price up and ensure that they are getting paid for as much use as actually occurs. While new models can accommodate these needs, and bring greater value to users and producers, they can entail more complexity in the software licensing—though ultimately, the number of licensing models should decrease. Licensing Model Definition of Use Named users Entitles the customer to have a given number of specified individual employees who use the software Concurrent use Puts no restrictions on who is entitled to use the software, as long as the customer’s total number of simultaneous sessions does not exceed a specified number at any time Node-locked Entitles the customer to only use the software on a specified set of end-user desktops Server- and/or CPU- based Restricts the customer’s entitlement to a specific number of physical servers and/or a specific number of CPUs within those servers Transaction-based Entitles the customer the right to execute a specified number of transactions (which must also be appropriately defined) with the software (similar to usage-based) Usage-based Entitles the customer the right to use the application freely then captures usage and shares that usage with the customer. Types of usage data that could be captured include: # of compilations # of pictures sent # of characters translated # of campaigns managed # of drawings rendered # of email messages sent # of CPU minutes # of gigabytes stores # of data converted Environmental limitations The producer bases pricing on entitlement for a particular type of use – i.e. in the production environment, in a development environment, or in a disaster recovery environment Table 2: A quick look at common licensing models.
  • 5. State of the Cloud Computing Marketplace 5 Matching the Entitlement to Usage The first challenge in engineering the exchange of fair value in a software sale is to define use. This is no small matter. In fact, use of software can be defined in many ways, as shown in table 2. Not listed in the table, but a much-used alternative is the enterprise license approach, which sets no limits whatsoever on the use of the software within the organization— although the contract may define the bounds of such a license to ensure that changes in the business don’t result in use beyond that which is anticipated at the time of the agreement. The enterprise license may also include some type of a periodic true-up, whereby the customer agrees to pay for actual use according to a pre-defined schedule in exchange for the flexibility of using the software on an as-needed basis. All of these licensing models may be appropriate based on the products sold, the markets served and corporate culture. For example, a node-locked model may make the most sense in a 24/7 contact center where different users may occupy any seat at any given moment—but where users won’t need access to the software from home or on the road. A transaction-based model, on the other hand, may be more appropriate for applications that are exposed to the producer’s customers via the web—making it impossible to accurately predict total utilization in advance. Producers and customers who enter into these types of contracts in good faith must clearly have some means of capturing usage and ensuring compliance with these various complex models of compliance or use. If they don’t have such a mechanism in place, there won’t be any way to ensure that the terms of the contract are being honored and that a fair exchange of value is actually taking place. No Tools to Track, Aggregate and Share Usage Data The clear definition of customer entitlements only has real meaning when it is accompanied by an effective means of managing and capturing use in the context of those entitlements. Traditionally, application producers have failed to provide customers with an effective means of pro-actively discovering disparities between authorized and actual use. This lack of a compliance management capability greatly increases the likelihood that customers will inadvertently violate their contract terms. It also prevents customers from defending their own integrity by either restricting their use or offering producers fair additional compensation for observed additional use. This helps explain the rise in products such as Software Asset Management (SAM) tools—though they are limited in the number of models they can support. The lack of tools to track and aggregate usage data can be credited to the vast complexity involved, due to the amount of data as well as the need to address privacy concerns. As covered in more detail in the final sections of this white paper, Flexera Software provides one of the only tools available to track, aggregate and share usage data. For transparency, we make this data available to the end user as well as the publisher. Data Privacy and Tamper-Proofing Concerns Enterprises suffer from a lack of communication and trust in regard to software publishers, software publishers, in return, have the same issues with customers. Data privacy is an enterprise concern, tamper proofing is a publisher concern—and both are hard to deal with. Companies are reluctant to share their usage data with publishers, and are more comfortable with aggregating and forwarding it in paper form at agreed intervals. The publishers find this unacceptable because of the possibility that the customer will tamper with the data to lower their apparent usage. The customer in turn is reluctant to send the data electronically because of concerns that the publisher will use the data to learn the customer’s usage patterns, and alter their pricing structure to maximize their revenue at the expense of the customer. One way around this impasse is to have both parties agree to a fixed rate for a certain period, such as five years, such as was done with cell phones. In the early 1990s, users had to pay for every minute on the huge cell phones that existed at that time. They had to pay for roaming and other usage patterns, and they never knew how much the bill would be. For this reason, users would put usage alerts on their phone, or shut off roaming, which is why the ability to turn off roaming still exists on mobile phones. Service providers learned from this, and began to offer a certain number of minutes for a fixed price, and only charge for roaming after that limit is reached. This practice is now nearly universal, as it offers users far more control of their mobile telephone costs. The cloud computing and SaaS marketplace, as well as enterprises in general, can and should learn from this experience. A Trust-But-Verify Approach to Usage-Based Licensing Successful business relationships depend on trust between buyers and sellers. Both sides want and need the other side to succeed. With the right monitoring technology, organizations can take advantage of a trust-but-verify approach to usage-based licensing. This gives both sides complete transparency of usage, while sparing producers the expense—and users the invasiveness—of the traditional usage audit. Adopting a trust-but-verify approach is a particularly attractive alternative for application producers seeking to ensure the exchange of fair value in an atmosphere of trust. With this usage-based model, application producers and customers have access to actual customer application usage information that can be reconciled against the customer contracted entitlements.
  • 6. State of the Cloud Computing Marketplace 6 The ability to get to a single source of truth regarding entitlements and actual usage is the foundation of a successful trust-but-verify approach. Implementing a trust-but-verify approach for compliance management automates the entire compliance process. It requires the producer to instrument their products with a usage-based licensing model. Today’s sophisticated enterprise applications are typically comprised of a variety of functional components that invoke complex sets of software processes. To capture the use of such applications, it is necessary to instrument these components and processes in a way that accurately measures use according to whichever licensing metric is applied. How Flexera Software Can Help As the market leader in software monetization solutions, Flexera Software empowers application producers to implement a broad spectrum of licensing models within a single product—from strict enforcement to a more open trust-but-verify approach—to maximize revenues and ensure compliance. Application producers are able to: • Enable flexible monetization and licensing models. The ability to sense and respond to changing market conditions is a significant competitive advantage. Having keen insight into product use enables you to quickly alter monetization models across products and tailor the models for various market segments, geographies, etc. • Offer mature monetization models for cloud computing applications. Many application producers are developing SaaS applications and require sophisticated, mature solutions to implement the required monetization models the market demands for such solutions (e.g., pay-for-overage, pay-for-burst, pay-for-use). • Ensure that application producers get paid for the value delivered. Prevent anti-piracy and licensing abuse across all geographies with the right licensing model. Automate back-office operations that ensure license compliance to streamline internal operations (i.e., reduces the costs of audits) while ensuring all potential revenue is realized. The software monetization solutions from Flexera Software automates compliance management by supporting the full licensing spectrum, all licensing models and the back- office automation required to manage a growing software business, enabling application producers to generate more recurring and predictable revenue from customers. About Flexera Software Flexera Software helps application producers and enterprises increase application usage and the value they derive from their software. Our next-generation software licensing, compliance and installation solutions are essential to ensure continuous licensing compliance, optimized software investments and to future-proof businesses against the risks and costs of constantly changing technology. Over 80,000 customers turn to Flexera Software as a trusted and neutral source for the knowledge and expertise we have gained as the marketplace leader for over 25 years and for the automation and intelligence designed into our products. For more information, please go to: www.flexerasoftware.com
  • 7. Flexera Software LLC (Global Headquarters): +1 800-809-5659 United Kingdom (Europe, Middle East Headquarters): +44 870-871-1111 +44 870-873-6300 Australia (Asia, Pacific Headquarters): +61 3-9895-2000 For more office locations visit: www.flexerasoftware.com Copyright © 2015 Flexera Software LLC. All other brand and product names mentioned herein may be the trademarks and registered trademarks of their respective owners. SWM_WP_StateOfCC_Jan15