This document discusses how adopting a hybrid cloud solution can transform an IT manager's role from a reactive maintainer of infrastructure to a proactive leader focused on addressing business needs. It emphasizes that a hybrid cloud, which combines on-premise and public cloud resources, allows IT managers to automate routine tasks and focus on more strategic opportunities through tools that integrate different environments. The document provides guidance on developing an effective cloud governance strategy by focusing on goals, metrics, processes and operations. It also outlines management, builder, developer and intermediary tools that can help streamline processes in a hybrid cloud environment.
When you’re planning to move to the cloud and manage a hybrid environment, security is a top concern. But cloud is not necessarily less secure than a traditional environment. In fact, it may be possible to deliver even greater security in a hybrid cloud environment because it offers new and advanced opportunities.
In this eBook, you’ll discover how hackers are using traditional tactics in new ways to attack the cloud. You’ll also find out how the cloud can help you increase security with innovative approaches designed to detect threats long before they threaten your enterprise.
The document provides perspectives on determining the right cloud environment from telecommunications and retail industries. For telecommunications companies, their significant existing technology investments and in-house IT skills mean they are well positioned for private cloud initially to maximize the value of these assets. However, a hybrid approach utilizing both private and public cloud may be most suitable. For retailers, prioritizing quick customer engagement means public cloud is often the best starting point due to limited infrastructure investments and skills. Both industries may eventually use a hybrid cloud model combining private and public cloud capabilities depending on their evolving needs and skills. Key considerations when choosing a cloud environment include control, compliance, integration needs and operational complexity.
The future of work is not about where you are, but about how
quickly you can move. While most organisations are “keeping
the lights on” by supporting remote work, market leaders are
capitalising by reforming their entire approach.
As remote working has become the “new normal”, businesses
have replaced informal discussions with online messaging,
augmented data centres with the cloud, and secured their
data from outages and cyber attacks with SaaS solutions.
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Oracle aims to support both public and private clouds with a complete portfolio of products. Their strategy includes providing enterprise-grade technology through their PaaS platform and IaaS offerings. Oracle's platform allows customers to build, deploy, and manage applications and services in cloud environments. They are developing their portfolio of applications, middleware, databases, servers, and management tools to enable rich SaaS and cloud solutions.
Is your infrastructure holding you back?Gabe Akisanmi
This ebook will help you connect the dots between
today’s biggest business opportunities and the specific
technology required to seize them. You’ll get the facts
you need to identify where current components may
be falling short—and how the right investments in infrastructure
can lead to better business outcomes while
strengthening your role as a strategic consultant within
your organization.
This document discusses project management strategies for cloud computing projects. It begins by defining cloud computing and its various models like IaaS, PaaS, and SaaS. It then discusses common causes of failure for cloud projects, such as undefined success criteria, unquantified advantages, lack of accountability, and failure to manage applications and costs. The document recommends addressing these risks through effective scoping, change management, and an agile project methodology. Defining strategies, requirements, and risks upfront can help boost success rates for cloud computing projects.
Cloud-based MDM solutions provide several potential rewards over on-premise solutions, including reduced costs, faster deployment, and increased scalability. However, companies must also consider risks like privacy, security, and loss of control. It is important for companies to understand how the cloud vendor will store and manage their data before deciding if a cloud-based MDM is appropriate for their needs and risk tolerance.
This document discusses how adopting a hybrid cloud solution can transform an IT manager's role from a reactive maintainer of infrastructure to a proactive leader focused on addressing business needs. It emphasizes that a hybrid cloud, which combines on-premise and public cloud resources, allows IT managers to automate routine tasks and focus on more strategic opportunities through tools that integrate different environments. The document provides guidance on developing an effective cloud governance strategy by focusing on goals, metrics, processes and operations. It also outlines management, builder, developer and intermediary tools that can help streamline processes in a hybrid cloud environment.
When you’re planning to move to the cloud and manage a hybrid environment, security is a top concern. But cloud is not necessarily less secure than a traditional environment. In fact, it may be possible to deliver even greater security in a hybrid cloud environment because it offers new and advanced opportunities.
In this eBook, you’ll discover how hackers are using traditional tactics in new ways to attack the cloud. You’ll also find out how the cloud can help you increase security with innovative approaches designed to detect threats long before they threaten your enterprise.
The document provides perspectives on determining the right cloud environment from telecommunications and retail industries. For telecommunications companies, their significant existing technology investments and in-house IT skills mean they are well positioned for private cloud initially to maximize the value of these assets. However, a hybrid approach utilizing both private and public cloud may be most suitable. For retailers, prioritizing quick customer engagement means public cloud is often the best starting point due to limited infrastructure investments and skills. Both industries may eventually use a hybrid cloud model combining private and public cloud capabilities depending on their evolving needs and skills. Key considerations when choosing a cloud environment include control, compliance, integration needs and operational complexity.
The future of work is not about where you are, but about how
quickly you can move. While most organisations are “keeping
the lights on” by supporting remote work, market leaders are
capitalising by reforming their entire approach.
As remote working has become the “new normal”, businesses
have replaced informal discussions with online messaging,
augmented data centres with the cloud, and secured their
data from outages and cyber attacks with SaaS solutions.
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Oracle aims to support both public and private clouds with a complete portfolio of products. Their strategy includes providing enterprise-grade technology through their PaaS platform and IaaS offerings. Oracle's platform allows customers to build, deploy, and manage applications and services in cloud environments. They are developing their portfolio of applications, middleware, databases, servers, and management tools to enable rich SaaS and cloud solutions.
Is your infrastructure holding you back?Gabe Akisanmi
This ebook will help you connect the dots between
today’s biggest business opportunities and the specific
technology required to seize them. You’ll get the facts
you need to identify where current components may
be falling short—and how the right investments in infrastructure
can lead to better business outcomes while
strengthening your role as a strategic consultant within
your organization.
This document discusses project management strategies for cloud computing projects. It begins by defining cloud computing and its various models like IaaS, PaaS, and SaaS. It then discusses common causes of failure for cloud projects, such as undefined success criteria, unquantified advantages, lack of accountability, and failure to manage applications and costs. The document recommends addressing these risks through effective scoping, change management, and an agile project methodology. Defining strategies, requirements, and risks upfront can help boost success rates for cloud computing projects.
Cloud-based MDM solutions provide several potential rewards over on-premise solutions, including reduced costs, faster deployment, and increased scalability. However, companies must also consider risks like privacy, security, and loss of control. It is important for companies to understand how the cloud vendor will store and manage their data before deciding if a cloud-based MDM is appropriate for their needs and risk tolerance.
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...Maria Spínola
This document provides an overview of cloud computing, including its benefits, risks, and implementation considerations. It defines cloud computing as transforming how IT is deployed and managed by reducing costs and complexity while increasing scalability, innovation, and speed. While cloud computing provides opportunities, there are also security, integration, and vendor lock-in risks to consider. The document recommends developing a cloud strategy and governance program, evaluating workloads for cloud suitability, asking providers key questions, and testing implementations to realize benefits while mitigating risks.
This document discusses how digital technologies like cloud, analytics, mobile, social, and IoT can help enterprises build business resiliency. It argues that these technologies allow businesses to innovate their disaster recovery plans by leveraging cloud solutions to back up data and systems. For example, a cloud-based backup solution could protect multiple office locations by connecting branch offices to a central data center. This provides scalability and reduces costs compared to traditional disaster recovery methods. Overall, the document promotes adopting a digital enterprise strategy using these new technologies to overcome challenges in keeping infrastructure updated and creating effective business continuity plans.
The document provides a roadmap for successfully migrating applications to public cloud services. It outlines 6 key steps: 1) Assess applications and workloads for cloud readiness, 2) Build a business case, 3) Develop a technical approach, 4) Adopt a flexible integration model, 5) Address security and privacy requirements, and 6) Manage the migration. Each step provides guidance on important considerations and best practices for a strategic application migration to public cloud computing.
The document discusses the emergence of hyperconverged infrastructure (HCI) technology. It describes some of the key issues that led organizations to adopt HCI, including the need for business-IT alignment, operational efficiency, cloud-like flexibility on-premises, and reducing data center complexity. It then provides context around earlier converged infrastructure solutions and how HCI aimed to improve on those approaches.
Faced with depressing predictions of looming budget cuts cloud computing has come to the fore of discussions to uncover relatively short-term economies in IT functions within the public sector. But how much of the cloud story is hype? How different are cloud architectures to the web-server farms that organizations have had the means to access for well over a decade? And how realistic is it that core business systems will move out of the data centre to the cloud?
A comprehensive introduction to Cloud Computing. Learn what it is, how it works, where it might be applicable, and when to avoid it. Presented by C3 / Cloud Computing Concepts Managing Partner, Rick Mancinelli.
Booz Allen Hamilton offers an integrated suite of cloud capabilities, deep subject matter expertise, and unparalleled hands-on experience with a broad range of cloud technology products.
This document discusses how large organizations can balance flexibility and oversight when adopting cloud technologies. While cloud offers benefits like on-demand resources and pay-as-you-go models, it can undermine IT's control if not properly governed. Effective cloud initiatives must be integrated into existing service delivery models and governance mechanisms are needed to ensure alignment with business needs over time. Key areas for governance include demand management, capacity planning, service level management, and invoice/chargeback management. Governance helps organizations maximize cloud benefits while mitigating risks.
This document discusses secure and practical outsourcing of linear programming in cloud computing. It introduces cloud computing and explains why security is important in the cloud. Linear programming is described as a technique for optimizing allocation of resources that is well-suited for the cloud. The document outlines deployment models, service models, and reasons why cloud computing benefits small businesses, including economies of scale, functionality, and security. Risks to cloud security from data breaches, hijacking, and malicious insiders are also summarized.
What are the advantages of adopting public cloudNicole Khoo
Public cloud computing provides organizations flexibility, cost reduction, and regular automatic upgrades. Some key benefits of adopting public cloud include flexibility for employees to access data remotely, reduced IT costs as organizations pay only for the resources they use, and automatic software/hardware upgrades managed by cloud providers. However, security is a primary concern for organizations considering public cloud. Service level agreements and ensuring robust security controls, privacy policies, and technical measures can help address these concerns. Migrating workloads to public cloud requires validating applications' technical portability and compliance.
Cloud computing is a technology that is rapidly being adopted by companies but also presents significant risks if not properly managed. It involves hosting services and computing resources being provided over the internet on a flexible usage basis. While it offers numerous benefits like reduced costs, increased flexibility and scalability, security and data backups, it also transfers control of IT systems and data to external cloud providers. Risk managers must understand cloud computing and ensure comprehensive risk management plans are in place to address the risks of adopting cloud technologies and transferring control to external providers.
The document discusses the impact of cloud computing on business continuity and disaster recovery planning. It outlines pros and cons of using public, private, or hybrid cloud services for backup and recovery. While the cloud offers benefits like lower costs, mobility, and automatic updates, concerns include reliance on internet access and third-party vendors. The document recommends becoming familiar with cloud options and maintaining some backups outside the cloud.
The document provides an overview of cloud computing and advice for managed service providers and value-added resellers on adopting and recommending cloud solutions to clients. It summarizes that cloud adoption will be gradual as businesses will maintain some on-site solutions and hybrid models. It advises providers to [1] become experts on cloud solutions, [2] understand service level agreements of cloud providers, [3] build customized solutions that meet client needs and budgets, and [4] avoid rushing clients into full cloud adoption and allow a phased approach.
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
Gartner did an Audience survey at the Gartner US data center conference Dec 2013 showing that the No. 1 Issue Slowing Adoption of Public Cloud Computing was Security. Cloud is a place where 82% of organization will store sensitive data in the next 2 years according to a study from Ponemon Institute. The Ponemon Institute concluded that Cloud security is an oxymoron for many companies. Sixty-two percent of respondents do not agree or are unsure that cloud services are thoroughly vetted before deployment. Sixty-nine percent believe there is a failure to be proactive in assessing information that is too sensitive to be stored in the cloud. 46 percent of IT professionals in this study say their organizations have stopped or slowed the adoption of cloud services because of security concerns, indicating there is still work to be done to continue advancing cloud adoption. Cloud Security Alliance (CSA) showed that reported cloud outages due to “Insecure Interfaces & APIs”accounted for 29% of all threats; and “Data Loss & Leakage” accounted for 25% of all threats reported. 25% of reported cloud outages did not reveal the causes of the outages. The aim of this report is to encourage transparency and accountability from cloud service providers. Consumers have no control over security once data is inside the public cloud. Completely reliant on provider for application and storage security. A private cloud gives a single Cloud Consumers organization the exclusive access to and usage of the infrastructure and computational resources. But Consumer has limited capability to manage security within outsourced IaaS private cloud. Depending upon the type of Cloud Deployment Model additional threats vectors (that would have not come into the equation for a non-cloud deployment) could be induced. An example of such a threat vector in a SAAS deployment would be induced by multi-tenancy when the same application run time is being used to service multiple tenants and their segregated data. Cloud computing may present different risks to an organization than traditional IT solutions. Examples from Cloud Security Alliance highlighting concerns that Virtualization is bringing. This is one of the key elements of Infrastructure as a Service (IaaS) cloud offerings and private clouds, and it is increasingly used in portions of the back-end of Platform as a Service (PaaS) and SaaS (Software as a Service) providers as well. Just to mention a few examples: A few exmples of Hypervisor Architecture Concerns include: VM Encryption - Virtual machine images are vulnerable to theft or modification when they are dormant or running. The solution to this problem is to encrypt virtual machine images at all times, but there are performance concerns at this time. For high security or regulated environments, the performance cost is worth it. Encryption must be combined with administrative controls, DLP, and audit trails to prevent a snapshot of a running VM from “escaping into the wild,” which
This document discusses the history and definitions of cloud computing. It begins with various definitions of cloud computing from Wikipedia between 2007-2009 which evolved to emphasize dynamically scalable virtual resources provided over the internet. It then covers common characteristics of cloud computing like multi-tenancy, location independence, pay-per-use pricing and rapid scalability. The rest of the document details cloud computing models including public, private and hybrid clouds. It also outlines the different architectural layers of cloud computing from Software as a Service to Infrastructure as a Service. The document concludes with a discussion of security issues in cloud computing and a case study of security features in Amazon Web Services.
Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.
To achieve this, hosting providers are required to implement solutions that rely on robust cloud computing infrastructure that is secured against data loss and external threats.
Although cloud computing presents a compelling business case for companies looking to reduce spending, streamline processes, and increase accessibility, the very idea of trans-border data flows raises the hackles of privacy advocates all over the globe. In Canada, government and members of the public have expressed serious concern over the potential misuse of personal information gone offshore. Join Else for an overview of those concerns and what they might mean for your organization.
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...Maria Spínola
This document provides an overview of cloud computing, including its benefits, risks, and implementation considerations. It defines cloud computing as transforming how IT is deployed and managed by reducing costs and complexity while increasing scalability, innovation, and speed. While cloud computing provides opportunities, there are also security, integration, and vendor lock-in risks to consider. The document recommends developing a cloud strategy and governance program, evaluating workloads for cloud suitability, asking providers key questions, and testing implementations to realize benefits while mitigating risks.
This document discusses how digital technologies like cloud, analytics, mobile, social, and IoT can help enterprises build business resiliency. It argues that these technologies allow businesses to innovate their disaster recovery plans by leveraging cloud solutions to back up data and systems. For example, a cloud-based backup solution could protect multiple office locations by connecting branch offices to a central data center. This provides scalability and reduces costs compared to traditional disaster recovery methods. Overall, the document promotes adopting a digital enterprise strategy using these new technologies to overcome challenges in keeping infrastructure updated and creating effective business continuity plans.
The document provides a roadmap for successfully migrating applications to public cloud services. It outlines 6 key steps: 1) Assess applications and workloads for cloud readiness, 2) Build a business case, 3) Develop a technical approach, 4) Adopt a flexible integration model, 5) Address security and privacy requirements, and 6) Manage the migration. Each step provides guidance on important considerations and best practices for a strategic application migration to public cloud computing.
The document discusses the emergence of hyperconverged infrastructure (HCI) technology. It describes some of the key issues that led organizations to adopt HCI, including the need for business-IT alignment, operational efficiency, cloud-like flexibility on-premises, and reducing data center complexity. It then provides context around earlier converged infrastructure solutions and how HCI aimed to improve on those approaches.
Faced with depressing predictions of looming budget cuts cloud computing has come to the fore of discussions to uncover relatively short-term economies in IT functions within the public sector. But how much of the cloud story is hype? How different are cloud architectures to the web-server farms that organizations have had the means to access for well over a decade? And how realistic is it that core business systems will move out of the data centre to the cloud?
A comprehensive introduction to Cloud Computing. Learn what it is, how it works, where it might be applicable, and when to avoid it. Presented by C3 / Cloud Computing Concepts Managing Partner, Rick Mancinelli.
Booz Allen Hamilton offers an integrated suite of cloud capabilities, deep subject matter expertise, and unparalleled hands-on experience with a broad range of cloud technology products.
This document discusses how large organizations can balance flexibility and oversight when adopting cloud technologies. While cloud offers benefits like on-demand resources and pay-as-you-go models, it can undermine IT's control if not properly governed. Effective cloud initiatives must be integrated into existing service delivery models and governance mechanisms are needed to ensure alignment with business needs over time. Key areas for governance include demand management, capacity planning, service level management, and invoice/chargeback management. Governance helps organizations maximize cloud benefits while mitigating risks.
This document discusses secure and practical outsourcing of linear programming in cloud computing. It introduces cloud computing and explains why security is important in the cloud. Linear programming is described as a technique for optimizing allocation of resources that is well-suited for the cloud. The document outlines deployment models, service models, and reasons why cloud computing benefits small businesses, including economies of scale, functionality, and security. Risks to cloud security from data breaches, hijacking, and malicious insiders are also summarized.
What are the advantages of adopting public cloudNicole Khoo
Public cloud computing provides organizations flexibility, cost reduction, and regular automatic upgrades. Some key benefits of adopting public cloud include flexibility for employees to access data remotely, reduced IT costs as organizations pay only for the resources they use, and automatic software/hardware upgrades managed by cloud providers. However, security is a primary concern for organizations considering public cloud. Service level agreements and ensuring robust security controls, privacy policies, and technical measures can help address these concerns. Migrating workloads to public cloud requires validating applications' technical portability and compliance.
Cloud computing is a technology that is rapidly being adopted by companies but also presents significant risks if not properly managed. It involves hosting services and computing resources being provided over the internet on a flexible usage basis. While it offers numerous benefits like reduced costs, increased flexibility and scalability, security and data backups, it also transfers control of IT systems and data to external cloud providers. Risk managers must understand cloud computing and ensure comprehensive risk management plans are in place to address the risks of adopting cloud technologies and transferring control to external providers.
The document discusses the impact of cloud computing on business continuity and disaster recovery planning. It outlines pros and cons of using public, private, or hybrid cloud services for backup and recovery. While the cloud offers benefits like lower costs, mobility, and automatic updates, concerns include reliance on internet access and third-party vendors. The document recommends becoming familiar with cloud options and maintaining some backups outside the cloud.
The document provides an overview of cloud computing and advice for managed service providers and value-added resellers on adopting and recommending cloud solutions to clients. It summarizes that cloud adoption will be gradual as businesses will maintain some on-site solutions and hybrid models. It advises providers to [1] become experts on cloud solutions, [2] understand service level agreements of cloud providers, [3] build customized solutions that meet client needs and budgets, and [4] avoid rushing clients into full cloud adoption and allow a phased approach.
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
Gartner did an Audience survey at the Gartner US data center conference Dec 2013 showing that the No. 1 Issue Slowing Adoption of Public Cloud Computing was Security. Cloud is a place where 82% of organization will store sensitive data in the next 2 years according to a study from Ponemon Institute. The Ponemon Institute concluded that Cloud security is an oxymoron for many companies. Sixty-two percent of respondents do not agree or are unsure that cloud services are thoroughly vetted before deployment. Sixty-nine percent believe there is a failure to be proactive in assessing information that is too sensitive to be stored in the cloud. 46 percent of IT professionals in this study say their organizations have stopped or slowed the adoption of cloud services because of security concerns, indicating there is still work to be done to continue advancing cloud adoption. Cloud Security Alliance (CSA) showed that reported cloud outages due to “Insecure Interfaces & APIs”accounted for 29% of all threats; and “Data Loss & Leakage” accounted for 25% of all threats reported. 25% of reported cloud outages did not reveal the causes of the outages. The aim of this report is to encourage transparency and accountability from cloud service providers. Consumers have no control over security once data is inside the public cloud. Completely reliant on provider for application and storage security. A private cloud gives a single Cloud Consumers organization the exclusive access to and usage of the infrastructure and computational resources. But Consumer has limited capability to manage security within outsourced IaaS private cloud. Depending upon the type of Cloud Deployment Model additional threats vectors (that would have not come into the equation for a non-cloud deployment) could be induced. An example of such a threat vector in a SAAS deployment would be induced by multi-tenancy when the same application run time is being used to service multiple tenants and their segregated data. Cloud computing may present different risks to an organization than traditional IT solutions. Examples from Cloud Security Alliance highlighting concerns that Virtualization is bringing. This is one of the key elements of Infrastructure as a Service (IaaS) cloud offerings and private clouds, and it is increasingly used in portions of the back-end of Platform as a Service (PaaS) and SaaS (Software as a Service) providers as well. Just to mention a few examples: A few exmples of Hypervisor Architecture Concerns include: VM Encryption - Virtual machine images are vulnerable to theft or modification when they are dormant or running. The solution to this problem is to encrypt virtual machine images at all times, but there are performance concerns at this time. For high security or regulated environments, the performance cost is worth it. Encryption must be combined with administrative controls, DLP, and audit trails to prevent a snapshot of a running VM from “escaping into the wild,” which
This document discusses the history and definitions of cloud computing. It begins with various definitions of cloud computing from Wikipedia between 2007-2009 which evolved to emphasize dynamically scalable virtual resources provided over the internet. It then covers common characteristics of cloud computing like multi-tenancy, location independence, pay-per-use pricing and rapid scalability. The rest of the document details cloud computing models including public, private and hybrid clouds. It also outlines the different architectural layers of cloud computing from Software as a Service to Infrastructure as a Service. The document concludes with a discussion of security issues in cloud computing and a case study of security features in Amazon Web Services.
Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.
To achieve this, hosting providers are required to implement solutions that rely on robust cloud computing infrastructure that is secured against data loss and external threats.
Although cloud computing presents a compelling business case for companies looking to reduce spending, streamline processes, and increase accessibility, the very idea of trans-border data flows raises the hackles of privacy advocates all over the globe. In Canada, government and members of the public have expressed serious concern over the potential misuse of personal information gone offshore. Join Else for an overview of those concerns and what they might mean for your organization.
Most of us think of technology mainly in terms of the useful or entertaining things it does FOR us. However, what it does TO us is just as important, if not more. Technology exerts powerful influences on how we think, feel, and behave – often by accident, but increasingly by design. By increasing your insight into how technology can impact you, your employees, and your customers, this presentation will boost your ability to shape those impacts to actively support - and avoid undermining - the growth of your business.
This document summarizes 10 key security concerns for cloud computing: 1) data location; 2) access controls; 3) regulatory requirements; 4) audit rights; 5) employee training; 6) data classification; 7) service level agreements; 8) long-term viability; 9) security breach response; and 10) disaster recovery plans. It also briefly outlines cloud computing models and benefits, as well as potential security attacks against cloud systems like denial of service attacks and authentication attacks.
Cloud computing is a model for accessing computing resources over the internet on-demand. There are concerns about security and data protection with cloud services. While cloud computing provides benefits like scalability, cost savings, and mobility, issues include security risks from outages or data breaches, uncertainty around service agreements, and governance challenges with foreign data locations. Standards and best practices can help manage security risks for cloud computing.
Sections:
Introduction
Cloud Computing background
Securing the Cloud
Virtualization
Mobile Cloud Computing
User safety & energy consumption
Author’s proposal
Conclusion
In order to make cloud computing to be adopted by users and enterprises, security concerns of users should be rectified by making cloud environment trustworthy, discussed by Latif et al. in the assessment of cloud computing risks[2].
We address the questions related to:
security concerns and threats over general cloud computing,
(2) the solutions for these problems and
(3) mobile users safety in convergence with energy consumption.
This document discusses cloud computing security. It provides an overview of cloud computing and outlines some of the key benefits it provides including minimized costs, scalability, and efficiency. However, it also notes there are security concerns to consider like data breaches, hijacking, and insider threats. The document examines some common threats and vulnerabilities cloud systems face and recommends various countermeasures that can be implemented, such as encryption, identity management, and service level agreements. It concludes with a summary of the main topics covered regarding cloud computing security.
The document discusses hidden costs associated with cloud computing. It notes that cloud services continue to incur costs until removed, and provides examples of unexpected costs like unused applications, data migration, bandwidth overages, integration with other systems, security issues, and management responsibilities. The document advises planning for these issues, starting with pilot projects, and not assuming the cloud solves all problems.
This document provides an introduction to cloud computing, covering its origins, definitions, models, layers, virtualization, software-defined networking, network functions virtualization, benefits, and challenges. Key topics include the NIST cloud computing definition, SPI service models (infrastructure, platform, software as a service), public/private/hybrid cloud deployment models, and how cloud computing delivers scalable IT resources over the internet on a pay-per-use basis.
Cloud computing has become the dominant computing paradigm as businesses and consumers have shifted workloads from personal devices and on-premise servers to third-party cloud services and platforms. This transition has created a large ecosystem of cloud-based business services available in online marketplaces. Many organizations now utilize a hybrid environment combining private and public cloud resources to maximize value across their IT operations.
Managing A Cloud Environment: How To Get Started And Which Way To Go talemadi
This document discusses cloud computing strategies. It begins with introductions to cloud computing concepts and models. It then discusses the goals, advantages, and disadvantages of cloud computing. It provides advice on developing a cloud computing strategy, considering factors like existing infrastructure, applications, services portfolio, and business requirements. It emphasizes aligning a company's IT strategy with its overall business strategy. Finally, it provides tips for an effective cloud computing strategy, such as considering costs, architecture, and governance.
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction Systemchennaijp
This paper presents PACK, a receiver-based end-to-end traffic redundancy elimination system for cloud computing. PACK aims to reduce bandwidth costs for cloud customers by having the client predict and eliminate redundant data sent by the cloud server. It does this by having the client maintain chunks of previously received data and use these to identify redundant chunks in newly received data, allowing it to send "predictions" to the server about future chunks. This avoids the need for the server to do processing for traffic redundancy elimination.
The document discusses architectures for cloud computing. It begins by defining cloud computing and its key characteristics according to NIST. It then discusses different cloud deployment models and service models. The document uses the example of an e-commerce company called Spring Biking to illustrate how to architect applications for the cloud in a way that addresses challenges like lack of statefulness, failure handling, and elastic scaling. It discusses strategies like implementing BASE architectures using event sourcing and NoSQL databases.
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...ijgca
The ever-increasing status of the cloud computing h
ypothesis and the budding concept of federated clou
d
computing have enthused research efforts towards in
tellectual cloud service selection aimed at develop
ing
techniques for enabling the cloud users to gain max
imum benefit from cloud computing by selecting
services which provide optimal performance at lowes
t possible cost. Cloud computing is a novel paradig
m
for the provision of computing infrastructure, whic
h aims to shift the location of the computing
infrastructure to the network in order to reduce th
e maintenance costs of hardware and software resour
ces.
Cloud computing systems vitally provide access to l
arge pools of resources. Resources provided by clou
d
computing systems hide a great deal of services fro
m the user through virtualization. In this paper, t
he
cloud data center is modelled as
queuing system with a single task arrivals
and a task request buffer of infinite capacity.
WSO2 Cloud Platform allows users to purchase computations, storage, and services on demand. It provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) models in both public and private cloud deployments. The platform is multi-tenant and auto-scales resources elastically based on load. It aims to simplify deploying and managing applications and services in the cloud with tools for development, identity management, and governance.
This document discusses cloud computing and provides an overview of key concepts. It begins by looking at new demands for IT infrastructure including capacity, security, availability, and scalability. It then examines challenges of high operating costs and complexity. Benefits of cloud computing are outlined such as flexibility, scalability, and lower costs. Common cloud service models like SaaS, PaaS, and IaaS are defined along with deployment models. Examples of existing cloud systems like Amazon AWS, Google App Engine, and Microsoft Azure are also mentioned.
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...Michael zur Muehlen
The document discusses modeling concepts for enterprise architecture, including defining architecture with modeling languages, using models to describe and capture structure and domain content, and organizing models with taxonomies and model data vocabularies. It also addresses ensuring consistent rendering of models from requirements to implementation based on audience and needs.
Check out the Verizon and EMC European white paper on cloud:Philippe Boivineau
The document discusses considerations for European businesses adopting cloud computing. It highlights that while cloud adoption has been slower in Europe than other regions, momentum is building as 64% of EU businesses now use some form of cloud. Key drivers of cloud adoption are business agility through rapid scalability, cost management through optimized and visible consumption-based costs, and application portfolio optimization. Various industries like manufacturing, media/entertainment, retail, and healthcare are increasingly embracing cloud. The document outlines initial steps for cloud adoption like assessing application dependencies and adapting IT roles, and addresses security, risk, and control concerns. It stresses the importance of choosing a cloud provider that can ensure security, reliability, performance, and maintain an acceptable level of customer control.
This document provides an overview of cloud computing. It defines cloud computing as running applications from an external shared data center rather than locally, allowing access from anywhere without upgrades or dedicated IT staff. The cloud offers three main layers of services: Infrastructure as a Service, Platform as a Service, and Software as a Service. The document also discusses how the cloud has disrupted pricing models, value chains, workforce skills, and business planning. Both businesses and consumers can benefit from the cloud's flexibility, scalability, and reduced costs. However, the document cautions that security, outages, lock-in effects, and cultural barriers present challenges to cloud adoption.
Cloud computing courses in Delhi are the new trend of taking career-oriented opportunities. Let us discuss how this course will be helpful for you all.The market remuneration for these positions is rising quickly along with the increase in demand for cloud technologies.
https://medium.com/@bestcloudcomputinginstitute/cloud-computing-course-in-delhi-55d211b2e449
Calculating the roi on cloud of cloud tweaksdevoteam2
The document discusses calculating the return on investment (ROI) for cloud computing. It explains that assessing ROI for further investments in private cloud and platform as a service is complex. To calculate ROI, companies must first baseline costs of existing applications and determine suitability for cloud migration. Moving to the cloud can generate significant cost savings through reduced hardware, staffing, software licensing and hosting expenses. Labor costs in particular see large reductions since cloud computing requires less staff to manage infrastructure.
The document discusses different types of cloud services including public, private, and hybrid clouds. It notes that while public cloud vendors aim to provide global services at low cost from centralized data centers, this can result in performance issues for end users due to increased latency. Private and hybrid clouds that combine internal and external resources may help address these limitations by bringing applications and infrastructure closer to users. The document advocates for including WAN optimization when adopting cloud strategies to ensure end user performance needs are met and bandwidth usage is controlled.
Cloud: a disruptive technlogy that CEO should use to transform their businessBertrand MAES
Cloud:
What cloud really means ?
How it should help CEO transform their business ?
How it should help CEO transform their IT department ?
Prerequisite for a sucessful cloud project
The document discusses the promises and realities of cloud computing. While the cloud promises cost savings, increased computing power, and automation, realities include security concerns, reliability issues, integration challenges, and costs for early adopters. As cloud technology evolves, both expectations and experiences of users are changing. The cloud remains a work in progress, with opportunities and risks that companies must navigate as adoption increases.
Cloud Repatriation - Big Data & AI Toronto Conference 2020Hubert H. Chan
Cloud Repatriation – when does it make sense for you?
As many organizations are adopting cloud-first strategy, there is also a growing trend that organizations are moving their workload and data away from public cloud. Discover their motivations, what, when and why it makes sense? Understand the options, roadmaps and obstacles that are associated with this decision. Join us at a devil's advocate perspective to the public cloud migration journey.
Booz Allen's Cloud cost model offers a total-value perspective on IT cost that evaluates the explicit and implicit value of a migration to cloud-based services.
For IT recruiters, and just about everyone who has been interested in tech, cloud is not a new phenomena. However, over the past 18 months, adoption of cloud is growing quickly and is now used in some shape or form by businesses of all sizes around the world.
This issue provides an overview to the rise of cloud, highlights the most in demand IT skills and lists the fastest growing cloud companies by employee.
In this QuickView
- Fastest growing cloud companies by employees
- Most in demand skills, job roles and certifications
- Top employers of cloud professionals
- Is Big-data-as-a-service the next big growth sector?
- Top 5 uses of cloud computing for 2015
The document summarizes the agenda of a cloud computing conference with sessions on the current cloud marketplace, security, concerns, interoperability, deployment strategies, and the future of cloud computing. Each session will feature speakers from companies such as IBM, Microsoft, Oracle, Parallels, and others discussing topics like the competitive landscape, on-demand applications, harnessing enterprise infrastructure, access risks, and deployment case studies. The final session will examine the short, medium, and long term outlook for the cloud computing market.
Rio Info 2010 - Seminário de Tecnologia - Integracao de Servicos - Cesar Taur...Rio Info
Cezar Taurion discusses how cloud computing is transforming the IT industry. Cloud computing leverages virtualization, standardization, and automation to reduce costs while increasing capabilities. It allows resources to be provisioned in minutes and paid through metering/billing models. While infrastructure as a service is common, platforms and software as a service provide additional benefits. Both opportunities and challenges exist for companies and CIOs in adopting cloud computing strategies.
- Asia Pacific cloud market expected to grow 40% annually through 2014 reaching $5B as adoption increases
- Most operators' cloud role is unclear as they lack expertise in SLAs, storefronts, and IT solutions
- While cost is the main driver, reliability and agility are challenging for enterprises
- Scale is important for success and only global providers may achieve it
- IT competence, like industry solutions, is key as shown by large IT companies
- Lock-in is a concern for both public and private clouds, with Openstack a potential solution
- Korea Telecom is building its own cloud using Openstack on commodity hardware at a lower price than AWS, but still faces challenges with IT credibility.
This document provides an overview of cloud computing, including its definition, benefits, challenges, and implementation best practices. It defines cloud computing as using on-demand computing resources over the internet instead of local servers or personal devices. The document discusses how cloud computing can reduce costs while improving innovation and flexibility for organizations. However, it also notes security, compliance, and integration challenges that companies should address through careful planning and vendor evaluation before adopting cloud services. Overall, the document aims to provide a balanced perspective on cloud computing opportunities and risks to help with strategic decision making.
This document provides an overview of cloud computing, including definitions, benefits, challenges, and a roadmap for implementation. It defines cloud computing as providing on-demand access to computing resources and bills users based on usage. Benefits include reduced costs, increased flexibility and scalability. Challenges include security, integration with legacy systems, and vendor lock-in. The document provides guidance on assessing applications for the cloud, preparing IT systems, evaluating vendors, testing implementations, and measuring return on investment.
This document provides an overview of cloud computing, including definitions, benefits, challenges, and a roadmap for implementation. It defines cloud computing as providing on-demand access to computing resources and bills users based on usage. Benefits include reduced costs, increased flexibility and scalability. Challenges include security, integration with legacy systems, and vendor lock-in. The document provides guidance on assessing applications for the cloud, preparing IT systems, evaluating vendors, testing implementations, and measuring return on investment.
This document provides an overview of cloud computing, including its definition, benefits, challenges, and risks. It discusses how cloud computing can transform IT deployment and management by reducing costs and complexity while improving innovation and scalability. However, rushing into cloud computing without a strategy can pose security, integration, and compliance risks. The document recommends developing a cloud adoption roadmap that identifies suitable applications, prepares legacy systems, evaluates providers, and tests implementations to realize cloud computing's opportunities while avoiding potential threats.
This document provides an overview of cloud computing, including definitions, benefits, challenges, and a roadmap for implementation. It defines cloud computing as providing on-demand access to computing resources and bills users based on usage. Benefits include reduced costs, increased flexibility and scalability. Challenges include security, integration with legacy systems, and vendor lock-in. The document provides guidance on assessing applications for the cloud, preparing IT systems, evaluating vendors, testing implementations, and measuring return on investment.
Similar to The shortest path to cloud success - your roadmap (20)
***Project Summary***
A well established SaaS company in North America recently migrated workloads of 50,000 Virtual Servers, Five (5) petabytes of data with MySQL database backend from on-premises data center infrastructure to Google Cloud Platform (GCP) through a 'lift and shift' cloud migration methodology.
They are looking to expand their SaaS offering and customer base outside of North America and at the same time optimize cloud platform for High Availability, Scalability, and Resilience.
NETSCOUT Arbor released its 2018 NETSCOUT Threat Intelligence Report offering globally scoped internet threat intelligence together with the analysis of our security research organization. The report covers the latest trends and activities from nation-state advanced persistent threat (APT) groups, crimeware operations and Distributed Denial of Service (DDoS) attack campaigns.
To successfully adopt cloud and enable your teams to move at competitive speed, you need visibility into who is accessing your key enterprise cloud services, what activity is taking place, and how these services are being administered. You need a security partner with deep cloud security expertise and CenturyLink has you covered with Cloud Security Monitoring.
In a dual-region Software-Defined Data Center design:
- The two regions each have independent management pods hosting infrastructure components like vCenter Server, NSX Manager, and Platform Services Controller instances joined in a single SSO domain.
- Secondary NSX Managers in the second region import configurations from primary NSX Managers in the first region.
- A vRealize Log Insight cluster is deployed in each region to collect and analyze logs across the infrastructure.
Clustered data ontap_83_physical_storageGabe Akisanmi
This document section discusses how Data ONTAP manages disks and disk types:
- It explains how Data ONTAP classifies and maps disk types compared to industry standards.
- It covers the storage connection types, like SAS and FC, that Data ONTAP supports and how disks can be combined for each type.
- It provides an overview of how Data ONTAP monitors disk performance and health to prevent failures.
Alert Logic Cloud Security Report analyze a year of security data to find insights to better help defend against latest threats.
Three interesting things found in the report are:
1. Differences between threats in the cloud and in traditional infrastructure
2. what makes a company more vulnerable to attacks
3. why having a good understanding of the Cyber Kill Chain could help take a preventative approach to cloud security
This document provides a summary of a presentation on migrating Windows XP systems to Windows 7 and securing Windows 7 environments. The presentation includes sessions on migrating to Windows 7 using deployment tools like Windows Easy Transfer and USMT, securing Windows 7 in a Windows Server 2008 R2 environment using features like NAP and DirectAccess, and new Active Directory capabilities in Windows Server 2008 R2 like the AD Administrative Center and recycle bin. It discusses tools, demonstrations, and best practices for migration and management.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
2. TABLE
O
F
C
O
N
TEN
TS
For more information
Legal
+
PREVIOUS NEXT
SLOW DOWN:
MAP YOUR PATH
TO CLOUD SUCCESS +2
chapter
MAKE YOUR STRATEGY
A REALITY +3
chapter
1
chapter
INTRODUCTION:
ARE YOU RUSHING BLINDLY
INTO THE CLOUD? +
TABLE OF CONTENTS
0 TABLE OF CONTENTS
3. It’s easy to think you should rush into a
technology such as cloud, which offers so
many opportunities—and not just for your
enterprise, but also for your career. How-
ever, realizing the full potential of cloud for
your organization requires a well-planned,
strategic approach—a detailed roadmap—
that builds your expertise, credibility and
the leadership value of your IT department.
ARE YOU
RUSHING
BLINDLY
INTO
THE
CLOUD?
page 1 of 2 PREVIOUS NEXT
Are you rushing blindly into the cloud?CHAPTER 1
TABLE OF CONTENTS
BACK TO
1.1 INTRODUCTION (p.1)
4. This ebook gives you the key steps to create an effec-
tive roadmap that supports your business needs and
long-term career goals. Creating a roadmap can not
only help you lead your department by driving better
business results faster; it can also allow you to identify
and solve new demands around technology integra-
tion, skill development, security and other complexities
that might otherwise derail your success.
page 2 of 2 PREVIOUS NEXT
Are you rushing blindly into the cloud?CHAPTER 1
TABLE OF CONTENTS
BACK TO
1.2 INTRODUCTION (p.2)
5. SLOW DOWN:
MAP YOUR PATH TO
CLOUD SUCCESS
No matter what industry you’re in, building a
roadmap to cloud success requires answering
three important questions.
Keep in mind that these questions may be addressed individually or concurrently, but
all need to be factored into the development of your roadmap. To help you get started,
explore each section to learn how IT professionals in different industries are finding the
answers they need. Their challenges and considerations can provide relevant insight
as you map your own path.
page 1 of 11 PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
Slow down: Map your path to cloud successCHAPTER 2
What’s the right
cloud environment?
How can you build
credibility, support
and momentum?
Which workloads should
you deploy first?
?
+
?
+
?
+
2.1 MAP YOUR CLOUD –Main
6. page 2 of 11
?
?+
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
RETAILTELECOMMUNICATIONS BANKING
WHAT’S THE RIGHT CLOUD ENVIRONMENT?
Custom-make your cloud
For the past several years, IT leaders have debated how cloud
computing will affect their businesses and whether it is best to
adopt a public or private cloud solution. While the pro–public
cloud crowd has long argued that the only way to go is con-
suming IT and related services as a pay-per-use model, the
pro–private cloud camp is quick to remind clients that enabling
private cloud capabilities provides the highest levels of manage-
ment visibility, control, security, privacy and physical proximity to
data. So what’s the real answer? It’s different for every business
and depends largely on your business goals and challenges, IT
limitations, and investment priorities. Take a look at the following
industries, their common challenges and how they solved these
challenges with cloud technology.
What’s the right cloud environment?
2.2.A MAP YOUR CLOUD –Question 1
7. A TELECOMMUNICATIONS PERSPECTIVE:
Maximizing business opportunities
For telecommunications companies, the cloud environment selection process is
strongly influenced by the scale and history of their existing technology investments
combined with the level of in-house technology skills they possess. Understanding
how these factors influence their cloud environment decisions can provide insight
for you as you develop your own roadmap.
What’s driving this cloud decision?
Significant existing technology investments
and in-house IT skills
telecommunications
?
page 3 of 11
TELECOMMUNICATIONS
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
BANKING
?+
A telecommunications perspective
RETAIL
2.2.B1 MAP YOUR CLOUD –Q1 /Telco (Main)
8. A TELECOMMUNICATIONS PERSPECTIVE:
Maximizing business opportunities
For telecommunications companies, the cloud environment selection process is
strongly influenced by the scale and history of their existing technology investments
combined with the level of in-house technology skills they possess. Understanding
how these factors influence their cloud environment decisions can provide insight
for you as you develop your own roadmap.
A telecommunications perspective
RETAIL
page 3 of 11
TELECOMMUNICATIONS
GOALS AND LIMITATIONS
When a company lacks the agility and flexibility to meet business opportunities
because of the limitations of its IT infrastructure, it may be time to consider the
benefits offered through cloud computing. Cloud can help you deliver technology
services quickly against a rapidly evolving marketplace.
Many telecommunications companies have made significant investments in data
center technologies and assets. In doing so, they have also developed many of
the in-house technology skills required for cloud. To maximize the value of all
those investments, their cloud roadmap begins in a private cloud environment.
In fact, many of these companies have become cloud service providers them-
selves, leveraging the early adoption of cloud technologies to meet the needs
of their own clients.
KEY CONSIDERATIONS
DIFFERENT GOALS MAY LEAD TO DIFFERENT ANSWERS
POTENTIAL PITFALLS
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
BANKING
?+
2.2.B2 MAP YOUR CLOUD –Q1 /Telco (goal)
9. A TELECOMMUNICATIONS PERSPECTIVE:
Maximizing business opportunities
For telecommunications companies, the cloud environment selection process is
strongly influenced by the scale and history of their existing technology investments
combined with the level of in-house technology skills they possess. Understanding
how these factors influence their cloud environment decisions can provide insight
for you as you develop your own roadmap.
?+
RETAIL
page 3 of 11
TELECOMMUNICATIONS
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
Every company’s cloud needs are distinct, but there are some considerations
that every IT professional should think about when planning for cloud:
• Control: A private cloud can give you more control over your data,
mission-critical workloads and possibly security. When your data travels
across state and country lines, you’re at the mercy of their changing breach
protection laws.
• Compliance: A private cloud can provide greater visibility into the environ-
ment, making it easier for highly regulated industries to demonstrate
compliance.
DIFFERENT GOALS MAY LEAD TO DIFFERENT ANSWERS
POTENTIAL PITFALLS
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
BANKING
A telecommunications perspective
5.2.C INNOVATIVE SECURITY (fine grained - benefit)2.2.B3 MAP YOUR CLOUD –Q1 /Telco (key consideration)
10. A TELECOMMUNICATIONS PERSPECTIVE:
Maximizing business opportunities
For telecommunications companies, the cloud environment selection process is
strongly influenced by the scale and history of their existing technology investments
combined with the level of in-house technology skills they possess. Understanding
how these factors influence their cloud environment decisions can provide insight
for you as you develop your own roadmap.
A telecommunications perspective
?+
RETAIL
page 3 of 11
TELECOMMUNICATIONS
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
DIFFERENT GOALS MAY LEAD TO DIFFERENT ANSWERS
For most companies and industries, the roadmap to cloud will consist of multiple
phases that ultimately employ cloud capabilities in a variety of ways. IT organiza-
tions, such as those in telecommunications that have invested heavily in technol-
ogy assets and skills, may begin the cloud journey by transforming their data
centers to private clouds. But private clouds will not always be the right answer.
Although private cloud may be the right starting point in this scenario, other
companies may find that a public cloud environment is the better answer based
on other business factors or needs. For instance, if the business is migrating to
a new customer relationship management (CRM) or salesforce automation appli-
cation, it may make sense to use an off-the-shelf solution served out of a public
cloud. That approach can help the IT organization focus on transforming its
existing technology assets to cloud without slowing down other strategic busi-
ness initiatives.
POTENTIAL PITFALLS
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
BANKING
2.2.B4 MAP YOUR CLOUD –Q1 /Telco (different goal)
11. A TELECOMMUNICATIONS PERSPECTIVE:
Maximizing business opportunities
For telecommunications companies, the cloud environment selection process is
strongly influenced by the scale and history of their existing technology investments
combined with the level of in-house technology skills they possess. Understanding
how these factors influence their cloud environment decisions can provide insight
for you as you develop your own roadmap.
RETAIL
page 3 of 11
TELECOMMUNICATIONS
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
As with every new technology, there are some important and common issues
that you should plan for, including:
• Security: Your team has to keep track of multiple security platforms.
• Increased operational complexity: The management requirements
of cloud computing become much more complex when you’re managing
private, public and traditional data centers together, unless you have the
right management tools.
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
BANKING
A telecommunications perspective
2.2.B5 MAP YOUR CLOUD –Q1 /Telco (pitfalls)
12. A RETAIL PERSPECTIVE:
Prioritizing customer engagement
For retailers, optimizing customer engagement is a top reason for deploying to the
cloud. Yet many may not have the infrastructure investments or technology skills
required to begin the cloud journey with a private environment. Understanding how
these factors influence their selection of a cloud environment can provide some key
insights if you have similar priorities.
What’s driving this cloud decision?
The need to engage with customers
quickly and innovatively
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
retail
?
A retail perspective
page 4 of 11
TELECOMMUNICATIONS
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
BANKINGRETAIL
2.2.C1 MAP YOUR CLOUD –Q1/Retail (main)
13. A RETAIL PERSPECTIVE:
Prioritizing customer engagement
For retailers, optimizing customer engagement is a top reason for deploying to the
cloud. Yet many may not have the infrastructure investments or technology skills
required to begin the cloud journey with a private environment. Understanding how
these factors influence their selection of a cloud environment can provide some key
insights if you have similar priorities.
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
What’s driving this cloud decision?
The need to engage with customers
quickly and innovatively
retail
?
A retail perspective
TELECOMMUNICATIONS
page 4 of 11
RETAIL
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
BANKING
CLOSE X
OF IT ORGANIZATIONS
WILL PURSUE AN
INTERNAL HYBRID
IT STRATEGY.1
74%
2015
1 Gartner, “Hybrid Clouds and Hybrid IT: The Next Frontier,”
September 9, 2014.
BY 2015,
2.2.C1 MAP YOUR CLOUD–Q1/Retail (main) - popUp
14. A RETAIL PERSPECTIVE:
Prioritizing customer engagement
For retailers, optimizing customer engagement is a top reason for deploying to the
cloud. Yet many may not have the infrastructure investments or technology skills
required to begin the cloud journey with a private environment. Understanding how
these factors influence their selection of a cloud environment can provide some key
insights if you have similar priorities.
A retail perspective
GOALS AND LIMITATIONS
For retailers, increasing application speed and performance, enhancing mobile
capabilities, and harnessing data to create a single view of the customer are
all essential to better customer engagement. However, general low levels of
investment in infrastructure and data centers can put these goals out of reach
by requiring capital expenditures and technology skills that go beyond the
company’s ability or appetite.
Rapid adoption of technology by consumers has created new shopping experi-
ence expectations, accelerating the pace at which retailers adopt and deploy
technologies. Driven to enhance the customer experience, retailers now deploy
technology at such a high rate that staff skills are falling behind IT innovations.
To ramp up their ability to capitalize on new opportunities quickly and cost-
effectively, retailers will likely begin their roadmap in a public cloud environment.
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
TELECOMMUNICATIONS
page 4 of 11
RETAIL
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
BANKING
2.2.C2 MAP YOUR CLOUD–Q1/Retail (goals)
15. A RETAIL PERSPECTIVE:
Prioritizing customer engagement
For retailers, optimizing customer engagement is a top reason for deploying to the
cloud. Yet many may not have the infrastructure investments or technology skills
required to begin the cloud journey with a private environment. Understanding how
these factors influence their selection of a cloud environment can provide some key
insights if you have similar priorities.
?+
BANKING
A retail perspective
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
Every company’s cloud needs are distinct, but a few key considerations
are consistent when it comes to determining environments that optimize
customer engagement:
• Increased integration: You need the ability to integrate new applications,
such as mobile, with existing applications and systems. Although it may not
be critical at the onset, systems integration will be required before fragmen-
tation begins to hinder performance and flexibility.
• Compliance: Public environments can make it easier for businesses to take
advantage of cloud, but some trade-offs are required. However, customer
experience shouldn’t be one of them. Understanding the service level agree-
ments (SLAs) offered by a public cloud provider and how the provider ensures
they’ll be met is an important consideration when evaluating providers.
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
TELECOMMUNICATIONS
page 4 of 11
RETAIL
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
2.2.C3 MAP YOUR CLOUD –Q1/Retail (key considerations)
16. A RETAIL PERSPECTIVE:
Prioritizing customer engagement
For retailers, optimizing customer engagement is a top reason for deploying to the
cloud. Yet many may not have the infrastructure investments or technology skills
required to begin the cloud journey with a private environment. Understanding how
these factors influence their selection of a cloud environment can provide some key
insights if you have similar priorities.
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
For most companies and industries, the roadmap to cloud is likely to consist of
multiple phases that ultimately employ cloud capabilities in a number of ways.
Retailers, for example, may find that a public environment represents the fast-
est and most cost-effective way to take advantage of cloud initially. However,
as the organization builds the experience and skills required to manage a cloud
environment, new possibilities will be created that call for the unique character-
istics of a private cloud.
Many retailers may, in fact, ultimately operate within a hybrid environment,
using a public cloud to build and deploy applications that enhance customer
engagement and a private cloud to support existing systems and sensitive
customer data.
POTENTIAL PITFALLS
?+
BANKING
A retail perspective
TELECOMMUNICATIONS
page 4 of 11
RETAIL
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
2.2.C4 MAP YOUR CLOUD–Q1/Retail (changing company)
17. A RETAIL PERSPECTIVE:
Prioritizing customer engagement
For retailers, optimizing customer engagement is a top reason for deploying to the
cloud. Yet many may not have the infrastructure investments or technology skills
required to begin the cloud journey with a private environment. Understanding how
these factors influence their selection of a cloud environment can provide some key
insights if you have similar priorities.
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
CHANGING COMPANY, CHANGING CLOUD
POTENTIAL PITFALLS
Some important and common issues to watch out for when making your final
decisions include:
• Application isolation: Applications all need to interact with one another
and share information.
• Overlooking workload impact on other systems: After workloads move to
the cloud, don’t lose sight of their effect on other information systems. The
more you understand the affinity of information flow and sharing between
applications, the better you’re able to create manageable chunks of work-
flow information that can move to the cloud.
A retail perspective
BANKINGTELECOMMUNICATIONS
page 4 of 11
RETAIL
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
2.2.C4 MAP YOUR CLOUD –Q1/Retail (pitfalls)
18. A BANKING PERSPECTIVE:
Balancing convenience with compliance
In banking, customer intimacy, choice and convenience are all top reasons for
deploying applications to the cloud, but doing so can be complex, risky and costly.
It all depends on the characteristics of the workloads being moved and how they
are integrated with other, often-customized systems of record and external parties.
Many banks are seeking assistance in determining which applications should be
maintained on premises or off premises. Understanding the key factors influencing
their decisions can provide some key insights if you have similar priorities.
CLOSE X
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
SMALL STEPS TOWARDS HYBRID
POTENTIAL PITFALLS
What’s driving this cloud decision?
The delicate balance between
connectivity and privacy
banking
?
?+
A banking perspective
RETAILTELECOMMUNICATIONS
page 5 of 11
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
BANKING
2.2.D1 MAP YOUR CLOUD –Q1/Banking (main)
19. A BANKING PERSPECTIVE:
Balancing convenience with compliance
In banking, customer intimacy, choice and convenience are all top reasons for
deploying applications to the cloud, but doing so can be complex, risky and costly.
It all depends on the characteristics of the workloads being moved and how they
are integrated with other, often-customized systems of record and external parties.
Many banks are seeking assistance in determining which applications should be
maintained on premises or off premises. Understanding the key factors influencing
their decisions can provide some key insights if you have similar priorities.
CLOSE X
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
SMALL STEPS TOWARDS HYBRID
POTENTIAL PITFALLS
What’s driving this cloud decision?
The delicate balance between
connectivity and privacy
?
banking
?+
A banking perspective
RETAILTELECOMMUNICATIONS
page 5 of 11
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
BANKING
CLOSE X
OF COMPANIES REPORT
HAVING ALL THE CLOUD
SKILLS THEY NEED.2
14%
14
2 IBM, Raising the game: The IBM Business Tech Trends Study,
September 2014.
ONLY
6.1 SECURITY APPROACHES (p.1)
2.2.D1 MAP YOUR CLOUD –Q1/Banking (main) - popUp
20. A BANKING PERSPECTIVE:
Balancing convenience with compliance
In banking, customer intimacy, choice and convenience are all top reasons for
deploying applications to the cloud, but doing so can be complex, risky and costly.
It all depends on the characteristics of the workloads being moved and how they
are integrated with other, often-customized systems of record and external parties.
Many banks are seeking assistance in determining which applications should be
maintained on premises or off premises. Understanding the key factors influencing
their decisions can provide some key insights if you have similar priorities.
CLOSE X
GOALS AND LIMITATIONS
Like so many other organizations, banks want to connect with customers directly
and are rapidly taking advantage of customer-facing technologies, such as mobile
apps, to drive customer engagement. But they have to balance their desire for
customer intimacy with their industry’s stringent privacy standards and regula-
tions. A cloud strategy based on a hybrid environment—private to ensure that
sensitive customer data is protected and public to rapidly develop new customer-
facing applications—allows them to address both critical business needs.
KEY CONSIDERATIONS
SMALL STEPS TOWARDS HYBRID
POTENTIAL PITFALLS
A banking perspective
page 5 of 11
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
RETAILTELECOMMUNICATIONS BANKING
2.5.D2 MAP YOUR CLOUD –Q1/Banking (goals)
21. A BANKING PERSPECTIVE:
Balancing convenience with compliance
In banking, customer intimacy, choice and convenience are all top reasons for
deploying applications to the cloud, but doing so can be complex, risky and costly.
It all depends on the characteristics of the workloads being moved and how they
are integrated with other, often-customized systems of record and external parties.
Many banks are seeking assistance in determining which applications should be
maintained on premises or off premises. Understanding the key factors influencing
their decisions can provide some key insights if you have similar priorities.
CLOSE X
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
Every company’s cloud needs are distinct, but a few key considerations are
consistent when it comes to increasing connectivity with customers in an
existing environment within a highly regulated industry:
• Convenience and compliance: Banks and other organizations want all
the mobile opportunities the public cloud offers but want to leave data and
sensitive applications within a private environment that offers the highest
levels of security and control.
• Upgrade of core banking application: Many financial institutions want
a core banking application that functions solely as a system of record and
can easily integrate into and support other parts of their cloud strategy.
SMALL STEPS TOWARDS HYBRID
POTENTIAL PITFALLS
A banking perspective
page 5 of 11
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
RETAILTELECOMMUNICATIONS BANKING
2.5.D3 MAP YOUR CLOUD –Q1/Banking (key considerations)
22. A BANKING PERSPECTIVE:
Balancing convenience with compliance
In banking, customer intimacy, choice and convenience are all top reasons for
deploying applications to the cloud, but doing so can be complex, risky and costly.
It all depends on the characteristics of the workloads being moved and how they
are integrated with other, often-customized systems of record and external parties.
Many banks are seeking assistance in determining which applications should be
maintained on premises or off premises. Understanding the key factors influencing
their decisions can provide some key insights if you have similar priorities.
CLOSE X
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
SMALL STEPS TOWARDS HYBRID
Because data privacy is so critical to banks, they should focus on a private cloud
for high-risk customer data. In the meantime, to take advantage of the full benefits
of cloud, banks are moving nonsensitive, nonproduction workloads, such as
development and test, as well as mobile apps to the public cloud. The real value,
however, in creating an experience connecting directly with customers is in using
public and private clouds linked to systems of record and systems of engagement.
POTENTIAL PITFALLS
A banking perspective
page 5 of 11
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
RETAILTELECOMMUNICATIONS BANKING
2.2.D4 MAP YOUR CLOUD –Q1/Banking (small steps)
23. A BANKING PERSPECTIVE:
Balancing convenience with compliance
In banking, customer intimacy, choice and convenience are all top reasons for
deploying applications to the cloud, but doing so can be complex, risky and costly.
It all depends on the characteristics of the workloads being moved and how they
are integrated with other, often-customized systems of record and external parties.
Many banks are seeking assistance in determining which applications should be
maintained on premises or off premises. Understanding the key factors influencing
their decisions can provide some key insights if you have similar priorities.
CLOSE X
GOALS AND LIMITATIONS
KEY CONSIDERATIONS
SMALL STEPS TOWARDS HYBRID
POTENTIAL PITFALLS
Some important and common issues to watch out for when making your
final decisions include:
• Losing control over customer service: Business processes need
to be well defined, with clear delineation of responsibilities, contracts,
rules, fallback provisions, measurable performance metrics and SLAs
between parties.
• The need to upgrade IT skills: The design of a hybrid cloud environment
requires higher IT skills than are needed for a private environment.
A banking perspective
page 5 of 11
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
RETAILTELECOMMUNICATIONS BANKING
2.2.D5 MAP YOUR CLOUD –Q1/Banking (pitfalls)
24. page 6 of 11
?+
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?
Which workloads should you deploy first?
WHICH WORKLOADS SHOULD YOU DEPLOY FIRST?
What’s hot and what’s not
As an IT manager, you’ve likely had to choose which jobs are
given priority access to essential computing resources. It’s a
common challenge that’s made more difficult when it involves
a new environment like the cloud. How do you decide the right
hierarchy of workloads to deploy to the cloud? Where do you
begin, and why do you begin there?
As demonstrated in each of the following examples, start by
identifying which applications will transition easily and give
you the best return on your investment.
BANKINGRETAILTELECOMMUNICATIONS
2.3.A MAP YOUR CLOUD - Question 2
25. A TELECOMMUNICATIONS PERSPECTIVE:
Prioritizing back-office workloads
Even the smallest telecommunications company could have hundreds of thousands
of customers, which means they require a lot of computing capacity to simply keep
up with day-to-day data processing needs. By deploying large, back-office work-
loads to the cloud, telecommunications and similar companies can free up valuable
resources for mission-critical computing needs. At the same time, these less-critical
workloads aren’t the kind that will disrupt day-to-day operations, which means
there’s little risk involved in moving them quickly.
In general, some ideal candidates to deploy first include:
• Customer billing and payroll: These large batch processing workloads
demand extremely high compute capacity.
• Development and test: Nonproduction workloads such as these can help
speed innovation and delivery of value to customers with less risk exposure.
?+
BANKINGRETAIL
page 7 of 11
TELECOMMUNICATIONS
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
A telecommunications perspective
2.3.B MAP YOUR CLOUD - question 2 (Telco )
26. A RETAIL PERSPECTIVE:
Capitalizing on ready-to-move application functions
When considering marketing within a retail environment, application functions such
as mobile marketing, geolocation-based detection and customer analytics are great
candidates for fast deployment to the cloud because they’re already optimized.
In general, some ideal candidates to deploy first include:
• Mobile apps: They’re new, designed for the cloud and hard to predict from
a demand standpoint, making the flexibility of cloud ideal.
• Inventory management: Deploying these workloads to cloud can make it
easier to securely share them with supply chain vendors and partners.
TELECOMMUNICATIONS
page 8 of 11
RETAIL
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?+
BANKING
A retail perspective
2.3.B MAP YOUR CLOUD - Question 2 (retail)
27. A BANKING PERSPECTIVE:
Focusing on value and flexibility
The cloud is an ideal opportunity for banks to build more responsiveness and
agility into their operations without sacrificing security or compliance. The key is
to prioritize workloads that deliver the greatest value without adding risk or disrupt-
ing core business functions. For example, by moving workloads that demand the
greatest level of flexibility, banks are able to curb costs while addressing business
and customer service level expectations. At the same time, the public cloud provides
an ideal way to minimize risk and cost while developing new services, such as
mobile apps for customers.
In general, some ideal candidates to deploy include applications without high
operational performance or customer data privacy needs, and with noncomplex
and nonstandard integration needs, such as:
• Business support applications: These may include finance, HR manage-
ment and corporate relations workloads.
• Analytics applications: These may include business planning models as
well as bank portfolio and treasury applications.
• Differentiating capabilities: These may include credit monitoring, pricing
and billing, cash positions, sweeping and pooling, and electronic bank and
account management workloads.
A banking perspective
?+
RETAILTELECOMMUNICATIONS
page 9 of 11
BANKING
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
2.3.C MAP YOUR CLOUD - Question 2 (banking)
28. HOW CAN YOU BUILD CREDIBILITY, SUPPORT AND MOMENTUM?
How can you create evangelists for
cloud—and your cloud roadmap?
To understand and realize the value of cloud computing,
organizations must lose the old view of IT as a support organi-
zation and view it as a leader instead, providing services that
support each department and drive business results. In turn,
IT has to market its capabilities and resources and continue
selling the advantages of moving to the cloud, such as simplify-
ing operations, driving revenue, increasing agility and reducing
capital expenditures.
page 10 of 11
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
?
2.4.1 MAP YOUR CLOUD - Question 3 (pg.1)
29. Part of getting leadership buy-in is sharing quick and easy wins.
But moving to any new infrastructure is never easy; one slipup
could spell disaster for an organization, especially if it relies on
a lot of mission-critical systems. Ultimately, you can take the
following steps to come up with a list of workloads that would
provide some quick and relatively easy wins:
• Assess your applications and workloads.
• Build the business case.
• Develop the technical approach.
• Adopt a flexible integration model.
• Address security and privacy requirements.
• Manage the migration.
In general, lead with the solution—look across the business
and identify application functions that serve key business prob-
lems quickly and efficiently. Also, keep in mind that selling your
roadmap—cloud strategy—is just as important as selling the
benefits of the cloud for your organization.
page 11 of 11
?
CLOSE X
Slow down: Map your path to cloud successCHAPTER 2
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
2.4.2 MAP YOUR CLOUD - Question 3 (pg.2)
30. Building your roadmap is a major milestone in the journey
to cloud. But, as you know, journeys like this rarely go
exactly as planned. You will likely experience unanticipated
obstacles and challenges. But, there are ways to minimize
the potential for unexpected setbacks and take advantage
of your growing experience to continually improve your
success rate:
• Assess the cloud deployment challenges, opportunities
and success rates in the marketplace.
• Evaluate and document the success stories, risks and
barriers involved in cloud adoption.
• Develop required skill roadmaps as a part of your process.
• Conduct “lessons learned sessions” after each deployment
and refine your methods accordingly.
MAKE YOUR
STRATEGY A REALITY
Putting your roadmap into action
Make your strategy a realityCHAPTER 3
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
3.1 MAKE STRATEGY REALITY - (pg.1)
31. For more information
For more information on other cloud topics,
visit The Steps to Cloud Expertise Series at:
ibm.com/cloud/expertise
For more information
PREVIOUS NEXT
TABLE OF CONTENTS
BACK TO
+
4.1 FOR MORE INFORMATION