The document discusses data center consolidation and cloud computing in government information and communications technology, noting that data center consolidation through adopting cloud computing can help reduce costs and improve effectiveness and efficiency by consolidating infrastructure and applications. It provides an overview of data center consolidation efforts, introduces cloud computing and traditional vs cloud models, and discusses challenges to consolidation like resistance to change and ensuring business continuity and disaster recovery.
EMC: Business Continuity a Disaster Recovery pre virtuálne prostrediaASBIS SK
The document discusses business continuity and disaster recovery considerations for virtual environments. It outlines key questions about an organization's critical processes, data loss tolerance, and recovery time objectives. It then describes various events that can impact IT availability and outlines approaches to data protection and replication with different recovery point and time objectives. Finally, it provides an overview of NetWorker's capabilities for VMware backup and protection.
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
The document discusses how organizations can beat backup blues by shifting from tape-centric to disk- and network-centric backup approaches enabled by data deduplication and compression. It highlights how this transition helps reduce backup windows, storage needs, and replication bandwidth while improving reliability and making backup and recovery faster and more cost-effective.
The document discusses how IBM Smarter Storage is efficient by design through techniques like heterogeneous virtualization, thin provisioning, real-time compression, and EasyTIER. This allows customers to store more data in less space, manage heterogeneous storage, simplify administration, maximize efficiency of active workloads, and reduce costs. Specifically, the document shows how through these techniques the cost per terabyte can be reduced from $15K/TB to around $2.5K/TB, a savings of 6 times. In a real world example over 5 years, the net savings with IBM Smarter Storage was $102 million.
The document summarizes EMC's strategy for helping customers transition to hybrid cloud computing through a three phase journey:
1) Transitioning non-critical IT systems to a private cloud for efficiency and cost savings
2) Virtualizing business-critical applications in the private cloud for quality of service
3) Creating an IT service catalog and running IT as a business for agility
It provides examples of how EMC technologies like VNX, VMAX, Isilon, and Greenplum can help customers at each phase of the journey to hybrid cloud.
Best Practices for Emergency Notification Featuring The Private BankEverbridge, Inc.
The document discusses best practices for emergency notification systems based on the experience of The Private Bank. It describes how the bank created a Business Continuity Communications Committee after growing significantly in size. This committee developed scenario-based scripts for emergency alerts. The bank also implemented the Everbridge notification platform to quickly reach its large number of employees during emergencies. Testing the system revealed issues like making sure to collect both work and personal contact details from employees.
The document discusses two key market trends that Juniper is focused on: cloud computing and mobile internet. It notes that virtualization is not the same as cloud computing. The cloud delivers services over the network and provides benefits like elasticity, agility, and efficiency through dynamically shared resource pools. The document also discusses how the rise of mobility is redefining business practices and creating demand for more advanced data center capabilities, with data centers beginning to build cloud environments.
The document discusses EMC and Microsoft's integrated backup solution with deduplication. It highlights key capabilities like end-to-end support for Microsoft platforms, the evolution from tape-based to disk-based backup using deduplication, and integration with products like Microsoft DPM and EMC NetWorker. Deduplication is shown to dramatically reduce storage needs by eliminating redundant data.
This document discusses how unified communications (UC) can accelerate business transformation by allowing organizations to communicate and collaborate more effectively. It outlines the key benefits of UC, such as lower total cost of ownership through infrastructure simplification and reduced long-distance charges. The document also notes that while early cost savings were a main driver for UC adoption, its true potential is in fundamentally changing business processes and building long-term competitive advantage through improved productivity, collaboration and customer service. SIP trunking can play an important role in UC deployments by further lowering costs and simplifying network design.
EMC: Business Continuity a Disaster Recovery pre virtuálne prostrediaASBIS SK
The document discusses business continuity and disaster recovery considerations for virtual environments. It outlines key questions about an organization's critical processes, data loss tolerance, and recovery time objectives. It then describes various events that can impact IT availability and outlines approaches to data protection and replication with different recovery point and time objectives. Finally, it provides an overview of NetWorker's capabilities for VMware backup and protection.
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
The document discusses how organizations can beat backup blues by shifting from tape-centric to disk- and network-centric backup approaches enabled by data deduplication and compression. It highlights how this transition helps reduce backup windows, storage needs, and replication bandwidth while improving reliability and making backup and recovery faster and more cost-effective.
The document discusses how IBM Smarter Storage is efficient by design through techniques like heterogeneous virtualization, thin provisioning, real-time compression, and EasyTIER. This allows customers to store more data in less space, manage heterogeneous storage, simplify administration, maximize efficiency of active workloads, and reduce costs. Specifically, the document shows how through these techniques the cost per terabyte can be reduced from $15K/TB to around $2.5K/TB, a savings of 6 times. In a real world example over 5 years, the net savings with IBM Smarter Storage was $102 million.
The document summarizes EMC's strategy for helping customers transition to hybrid cloud computing through a three phase journey:
1) Transitioning non-critical IT systems to a private cloud for efficiency and cost savings
2) Virtualizing business-critical applications in the private cloud for quality of service
3) Creating an IT service catalog and running IT as a business for agility
It provides examples of how EMC technologies like VNX, VMAX, Isilon, and Greenplum can help customers at each phase of the journey to hybrid cloud.
Best Practices for Emergency Notification Featuring The Private BankEverbridge, Inc.
The document discusses best practices for emergency notification systems based on the experience of The Private Bank. It describes how the bank created a Business Continuity Communications Committee after growing significantly in size. This committee developed scenario-based scripts for emergency alerts. The bank also implemented the Everbridge notification platform to quickly reach its large number of employees during emergencies. Testing the system revealed issues like making sure to collect both work and personal contact details from employees.
The document discusses two key market trends that Juniper is focused on: cloud computing and mobile internet. It notes that virtualization is not the same as cloud computing. The cloud delivers services over the network and provides benefits like elasticity, agility, and efficiency through dynamically shared resource pools. The document also discusses how the rise of mobility is redefining business practices and creating demand for more advanced data center capabilities, with data centers beginning to build cloud environments.
The document discusses EMC and Microsoft's integrated backup solution with deduplication. It highlights key capabilities like end-to-end support for Microsoft platforms, the evolution from tape-based to disk-based backup using deduplication, and integration with products like Microsoft DPM and EMC NetWorker. Deduplication is shown to dramatically reduce storage needs by eliminating redundant data.
This document discusses how unified communications (UC) can accelerate business transformation by allowing organizations to communicate and collaborate more effectively. It outlines the key benefits of UC, such as lower total cost of ownership through infrastructure simplification and reduced long-distance charges. The document also notes that while early cost savings were a main driver for UC adoption, its true potential is in fundamentally changing business processes and building long-term competitive advantage through improved productivity, collaboration and customer service. SIP trunking can play an important role in UC deployments by further lowering costs and simplifying network design.
The document discusses cloud computing and key considerations for investigating cloud solutions. It provides examples of how various companies have benefited from cloud-based solutions, including cost savings, flexibility, and improved collaboration. The document outlines factors to consider when evaluating cloud options such as workloads, data security, and return on investment areas. Cloud computing allows for automation, standardization, and labor leverage that can reduce IT costs.
The document is an introduction to IBM's managed services for datacenter operations in Romania. It discusses the facilities and infrastructure of IBM's Romanian datacenter, including 1000 sqm of server space, separate spaces for telecom equipment, electrical distribution, UPS systems, batteries, generators, fire suppression, and storage. It details the datacenter's reliable power supply including on-site power generation, UPS configuration, and backup generators. It also summarizes the datacenter's cooling and humidity control systems.
Macleans - NZ Business taking on the world with a world class IT infrastructu...Vincent Kwon
The document summarizes a presentation given by Adam Zame and Gerhard Richards of Maclean Computing. It describes a project where Maclean Computing virtualized the IT infrastructure of a textile company with locations in the US, New Zealand, and Australia to address risks in the company's aging systems and lack of disaster recovery capabilities. After the new virtualized infrastructure was implemented, a flood damaged the physical servers, but Maclean was able to restore all virtual machines from backups within 5 hours, avoiding significant downtime and costs. The client is now considering further improvements such as physical hosting and additional redundancy.
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011EMC Forum India
The document discusses EMC's vision and strategy around cloud computing. It outlines EMC's agenda to discuss their cloud vision, how cloud meets big data, and EMC IT's own transformation journey to the cloud and IT-as-a-service strategy. It highlights challenges like budget constraints, increasing data volumes, and security threats that cloud computing can help address. The document advocates for a hybrid cloud approach combining private and public clouds and outlines phases in the journey to establishing a private cloud.
The document discusses Tangoe's real-time expense management (rTEM) solution for managing mobility costs. It outlines the solution's capabilities such as providing real-time visibility into mobile usage and location tracking to prevent unexpected costs from roaming or overages. Example benefits mentioned include eliminating "bill shock", optimizing plans, and enforcing usage policies. Case studies show how the solution helped companies like Canada Post reduce annual overage costs by $3 million and Samsung avoid $100,000 in unexpected roaming charges on a single trip.
Maples ESM Technologies provides IT infrastructure management and training services. It has over 500 employees, with 20% certified in ITIL. It offers training in various technologies including networking, databases, security and ITIL. Maples also provides an IT Finishing School to help fresh graduates gain job skills in IT and ITES sectors. Further, it offers IBM Mainframe ELTP services to rapidly develop entry-level technical professionals through a training and evaluation process. One success story highlighted a strategic partnership with IBM Global Services where Maples enabled transition and support of IT infrastructure for five global customers and deployed over 27 professionals to the US.
1) Big changes are happening in enterprise IT as new technologies become available that allow for more agile and less constrained applications.
2) Traditional enterprise applications were limited by high costs, difficulty changing, and siloed data, but new capabilities from cloud, mobile, social, and open source allow for custom apps with competitive advantages.
3) A wave of disruptive technologies like increased processing power and decreased storage costs require changing application design patterns from traditional scale-up architectures to more flexible scale-out and REST-based approaches.
The document describes the VXTracker call accounting software. It collects call records from PBXs and phones and produces summary and detail reports about telephone activity. These reports help organizations manage employees, networks, and risks. The document lists many types of reports the software can generate and how different departments within an organization can benefit from the reports. It provides examples of specific reports and how they can help with tasks like optimizing telecom costs, analyzing marketing campaigns, and improving productivity.
Advancing the Traditional Enterprise: An EA Story InnoTech
Electronic Arts (EA) is a major video game company founded in 1982 with over 9,000 employees worldwide and 500 in Austin. It has exclusive partnerships with prominent sports leagues and brands. While EA was originally known for boxed retail games, it is transitioning to digital services and analyzing player data to improve experiences. There are four technology options considered to handle the growing amounts of player data, each with their own challenges regarding scalability, workload management, and coupling between structured and unstructured data tools.
The document discusses EMC's Velocity Solution Provider program for partners. It provides an overview of the program's tiers including Affiliate, Premier, Signature, and SSCP. It outlines the incremental benefits, requirements, and financial incentives for each tier. The program aims to provide partners with opportunities for growth, differentiation, and profitability through specializations, training, marketing support, and rebates.
The Frontier Conference Center at Fort Leavenworth underwent a major upgrade to modernize its aging audiovisual systems in a cost-effective manner. The new systems installed by Conference Technologies allow for high-definition presentations and videoconferencing while staying within budget by using analog rather than digital signals. This was possible through the use of Category cable and Extron switching equipment, saving an estimated 25-30% over a fully digital system. The advanced yet easy-to-use new AV systems have made the conference center much more competitive for hosting events.
1) Gulf Insurance conducted intensive JAD sessions in 1990 to define their computing architecture and critical applications at a high level. This resulted in enterprise data and process models that were used to craft a development plan.
2) Gulf has since implemented 30 projects identified from the JAD sessions, focusing initially on the most critical applications to support the business. This has delivered several successful client/server applications running on a 3-tier architecture using OS/2, Novell, and IBM mainframes.
3) The key applications delivered include Submission, Reinsurance, Producer, Policy and Diary systems. Gulf has had success with their OS/2 desktop environment but may evaluate porting some applications to Windows in the future.
(1) what does it mean to be a mainframe today friedman1Reba-Anna Lee
This article discusses what defines a "mainframe" computer in today's technology landscape. It provides perspectives from experts in the field on whether key attributes that once distinguished mainframes, like rigorous system management and reliability, now also apply to other enterprise computing platforms. While some argue mainframes still have distinguishing characteristics in capabilities like logical partitioning and instrumentation, others believe the differences are increasingly matters of degree rather than kind as other systems adopt similar management practices and capabilities. There is no consensus on whether a system must be an IBM zSeries machine or employ a particular architecture to qualify as a "mainframe" in the modern context.
The document discusses the IT Acquisition Advisory Council (IT-AAC), a non-partisan think tank. IT-AAC aims to provide decision makers alternative resources and expertise to guide the establishment of best-in-class IT acquisition processes and governance structures. Specifically, IT-AAC seeks to help acquire new technologies like cloud computing using approaches other than traditional military specifications processes, in order to achieve goals like faster acquisition timelines and incremental development. IT-AAC understands the different dimensions involved in the IT acquisition lifecycle and aims to help address challenges through approaches like governance reforms and performance-based acquisition metrics.
Korea has made significant progress in developing its e-government systems over the past few decades. It established foundational laws and projects in the 1990s and 2000s to build administrative computer networks and promote informatization. Key achievements include consolidating administrative procedures, establishing common platforms, and advancing internal processes and integrated public services. Korea now provides seamless online services and is recognized as a global leader in e-government development. However, challenges remain such as further developing seamless and converged services. The government aims to complete this transition through tasks focused on usage, convergence and citizen-centered services.
The document summarizes key topics from the ICEGOV 2011 Conference on the management and coordination of e-government. It discusses evolving roles of government in providing services to citizens, consumers, and taxpayers. It outlines an agenda covering vision/strategy, public sector change management, and performance management. It emphasizes that e-government requires strong leadership, commitment to change, and a focus on users. Key challenges include balancing openness with stakeholder interests and providing more for less.
The document discusses interoperability in the framework of the Digital Agenda for Europe. It outlines several key initiatives and strategies to enhance interoperability across governments in Europe, including the European Interoperability Strategy, the European Interoperability Framework, and cross-border authentication projects like STORK and ECAS. The goal is to create more open, flexible and seamless eGovernment services through increased cooperation and aligned standards between member states.
The document discusses cloud computing and key considerations for investigating cloud solutions. It provides examples of how various companies have benefited from cloud-based solutions, including cost savings, flexibility, and improved collaboration. The document outlines factors to consider when evaluating cloud options such as workloads, data security, and return on investment areas. Cloud computing allows for automation, standardization, and labor leverage that can reduce IT costs.
The document is an introduction to IBM's managed services for datacenter operations in Romania. It discusses the facilities and infrastructure of IBM's Romanian datacenter, including 1000 sqm of server space, separate spaces for telecom equipment, electrical distribution, UPS systems, batteries, generators, fire suppression, and storage. It details the datacenter's reliable power supply including on-site power generation, UPS configuration, and backup generators. It also summarizes the datacenter's cooling and humidity control systems.
Macleans - NZ Business taking on the world with a world class IT infrastructu...Vincent Kwon
The document summarizes a presentation given by Adam Zame and Gerhard Richards of Maclean Computing. It describes a project where Maclean Computing virtualized the IT infrastructure of a textile company with locations in the US, New Zealand, and Australia to address risks in the company's aging systems and lack of disaster recovery capabilities. After the new virtualized infrastructure was implemented, a flood damaged the physical servers, but Maclean was able to restore all virtual machines from backups within 5 hours, avoiding significant downtime and costs. The client is now considering further improvements such as physical hosting and additional redundancy.
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011EMC Forum India
The document discusses EMC's vision and strategy around cloud computing. It outlines EMC's agenda to discuss their cloud vision, how cloud meets big data, and EMC IT's own transformation journey to the cloud and IT-as-a-service strategy. It highlights challenges like budget constraints, increasing data volumes, and security threats that cloud computing can help address. The document advocates for a hybrid cloud approach combining private and public clouds and outlines phases in the journey to establishing a private cloud.
The document discusses Tangoe's real-time expense management (rTEM) solution for managing mobility costs. It outlines the solution's capabilities such as providing real-time visibility into mobile usage and location tracking to prevent unexpected costs from roaming or overages. Example benefits mentioned include eliminating "bill shock", optimizing plans, and enforcing usage policies. Case studies show how the solution helped companies like Canada Post reduce annual overage costs by $3 million and Samsung avoid $100,000 in unexpected roaming charges on a single trip.
Maples ESM Technologies provides IT infrastructure management and training services. It has over 500 employees, with 20% certified in ITIL. It offers training in various technologies including networking, databases, security and ITIL. Maples also provides an IT Finishing School to help fresh graduates gain job skills in IT and ITES sectors. Further, it offers IBM Mainframe ELTP services to rapidly develop entry-level technical professionals through a training and evaluation process. One success story highlighted a strategic partnership with IBM Global Services where Maples enabled transition and support of IT infrastructure for five global customers and deployed over 27 professionals to the US.
1) Big changes are happening in enterprise IT as new technologies become available that allow for more agile and less constrained applications.
2) Traditional enterprise applications were limited by high costs, difficulty changing, and siloed data, but new capabilities from cloud, mobile, social, and open source allow for custom apps with competitive advantages.
3) A wave of disruptive technologies like increased processing power and decreased storage costs require changing application design patterns from traditional scale-up architectures to more flexible scale-out and REST-based approaches.
The document describes the VXTracker call accounting software. It collects call records from PBXs and phones and produces summary and detail reports about telephone activity. These reports help organizations manage employees, networks, and risks. The document lists many types of reports the software can generate and how different departments within an organization can benefit from the reports. It provides examples of specific reports and how they can help with tasks like optimizing telecom costs, analyzing marketing campaigns, and improving productivity.
Advancing the Traditional Enterprise: An EA Story InnoTech
Electronic Arts (EA) is a major video game company founded in 1982 with over 9,000 employees worldwide and 500 in Austin. It has exclusive partnerships with prominent sports leagues and brands. While EA was originally known for boxed retail games, it is transitioning to digital services and analyzing player data to improve experiences. There are four technology options considered to handle the growing amounts of player data, each with their own challenges regarding scalability, workload management, and coupling between structured and unstructured data tools.
The document discusses EMC's Velocity Solution Provider program for partners. It provides an overview of the program's tiers including Affiliate, Premier, Signature, and SSCP. It outlines the incremental benefits, requirements, and financial incentives for each tier. The program aims to provide partners with opportunities for growth, differentiation, and profitability through specializations, training, marketing support, and rebates.
The Frontier Conference Center at Fort Leavenworth underwent a major upgrade to modernize its aging audiovisual systems in a cost-effective manner. The new systems installed by Conference Technologies allow for high-definition presentations and videoconferencing while staying within budget by using analog rather than digital signals. This was possible through the use of Category cable and Extron switching equipment, saving an estimated 25-30% over a fully digital system. The advanced yet easy-to-use new AV systems have made the conference center much more competitive for hosting events.
1) Gulf Insurance conducted intensive JAD sessions in 1990 to define their computing architecture and critical applications at a high level. This resulted in enterprise data and process models that were used to craft a development plan.
2) Gulf has since implemented 30 projects identified from the JAD sessions, focusing initially on the most critical applications to support the business. This has delivered several successful client/server applications running on a 3-tier architecture using OS/2, Novell, and IBM mainframes.
3) The key applications delivered include Submission, Reinsurance, Producer, Policy and Diary systems. Gulf has had success with their OS/2 desktop environment but may evaluate porting some applications to Windows in the future.
(1) what does it mean to be a mainframe today friedman1Reba-Anna Lee
This article discusses what defines a "mainframe" computer in today's technology landscape. It provides perspectives from experts in the field on whether key attributes that once distinguished mainframes, like rigorous system management and reliability, now also apply to other enterprise computing platforms. While some argue mainframes still have distinguishing characteristics in capabilities like logical partitioning and instrumentation, others believe the differences are increasingly matters of degree rather than kind as other systems adopt similar management practices and capabilities. There is no consensus on whether a system must be an IBM zSeries machine or employ a particular architecture to qualify as a "mainframe" in the modern context.
The document discusses the IT Acquisition Advisory Council (IT-AAC), a non-partisan think tank. IT-AAC aims to provide decision makers alternative resources and expertise to guide the establishment of best-in-class IT acquisition processes and governance structures. Specifically, IT-AAC seeks to help acquire new technologies like cloud computing using approaches other than traditional military specifications processes, in order to achieve goals like faster acquisition timelines and incremental development. IT-AAC understands the different dimensions involved in the IT acquisition lifecycle and aims to help address challenges through approaches like governance reforms and performance-based acquisition metrics.
Korea has made significant progress in developing its e-government systems over the past few decades. It established foundational laws and projects in the 1990s and 2000s to build administrative computer networks and promote informatization. Key achievements include consolidating administrative procedures, establishing common platforms, and advancing internal processes and integrated public services. Korea now provides seamless online services and is recognized as a global leader in e-government development. However, challenges remain such as further developing seamless and converged services. The government aims to complete this transition through tasks focused on usage, convergence and citizen-centered services.
The document summarizes key topics from the ICEGOV 2011 Conference on the management and coordination of e-government. It discusses evolving roles of government in providing services to citizens, consumers, and taxpayers. It outlines an agenda covering vision/strategy, public sector change management, and performance management. It emphasizes that e-government requires strong leadership, commitment to change, and a focus on users. Key challenges include balancing openness with stakeholder interests and providing more for less.
The document discusses interoperability in the framework of the Digital Agenda for Europe. It outlines several key initiatives and strategies to enhance interoperability across governments in Europe, including the European Interoperability Strategy, the European Interoperability Framework, and cross-border authentication projects like STORK and ECAS. The goal is to create more open, flexible and seamless eGovernment services through increased cooperation and aligned standards between member states.
The document describes a tutorial on electronic governance for sustainable development and collaborative policy development. It discusses the need for open government and inclusive policy making to address complex global challenges. It then introduces the OCOPOMO project, which aims to support stakeholder participation in policy formulation through an integrated ICT platform and methods to develop evidence-based scenarios and conceptual policy models. Finally, it outlines the integrated policy process in OCOPOMO involving domain experts, stakeholders, and policy analysts.
This document discusses cyber identity and e-government structures in Argentina. It notes that technology accounts for 15% of e-government, while processes, people, and culture each account for 25%. It then outlines several digital inclusion initiatives in Argentina including the distribution of netbooks to schools and the expansion of wireless networks. The document emphasizes the importance of cyber identity and discusses the use of biometrics, passwords, and digital signatures for trusted online identities. Finally, it provides an overview of Argentina's national cyber security agency and its role in protecting critical infrastructures.
The document discusses Georgia's G3 governmental gateway project. It outlines several goals of the project including establishing electronic messaging between government agencies, developing information technology and security policies, and promoting efficiency and transparency in governance through the use of IT systems. It then provides examples of IT systems already in use by various government agencies and ministries in Georgia and benefits those systems provide such as increased access, reduced costs, and improved services for citizens. Potential challenges for e-governance initiatives are also mentioned such as limited budgets, lack of standards and security, and shortage of qualified personnel.
The document discusses the European Cloud Computing Strategy. It defines cloud computing and outlines the key challenges including security, interoperability, privacy, and legal issues. It summarizes the European cloud computing market and notes the need for an EU-wide strategy. The strategy focuses on developing a legal framework, addressing technical and commercial barriers, and supporting ongoing research projects related to cloud computing.
The document discusses electronic identification (eID) in Austria, including:
- The Austrian citizen card concept combines electronic signature, unique electronic identity, and representation data.
- A valid legal basis is provided by the E-Government Act, which mandates electronic IDs from various sectors that are linked to a citizen's identity.
- Identity is comprised of a citizen's unique "sourcePIN" cryptographically bound to their public key certificate from an accredited certification services provider.
- Citizen cards have been issued on physical cards like health insurance cards as well as digitally through mobile phone signatures.
The document discusses eGovernance in Oman. It provides an overview of Oman's digital transformation strategy and approach to eGovernance. The strategy has 6 pillars, and initially focused on national infrastructure, governance & standards, and promotion & awareness. The approach to eGovernance involves defining standards/processes, governance frameworks, policies, and enforcing national laws/regulations across 4 key areas: structure, frameworks, policies, and laws.
The document discusses Moldova's plan to implement an e-governance technology platform called M-Cloud based on cloud computing. M-Cloud will provide common services to government agencies through a private government cloud (G-Cloud) using modern, cost-efficient technologies. The platform aims to reduce costs while increasing flexibility, mobility and focus on innovation for IT staff and government organizations through a service-oriented architecture hosted in the cloud.
This document discusses cloud computing and defines key concepts such as infrastructure as a service, platform as a service, and software as a service. It outlines opportunities and risks of cloud computing related to legal, structural, economic and technical aspects. The document also discusses how electronic identification and security will be impacted by cloud computing and proposes possible approaches for Austria, including defining suitability criteria for cloud services and standards for cloud providers.
The document discusses strategies for increasing internet access and reducing poverty through digital inclusion in Colombia. It outlines Colombia's plan to multiply internet connections by 4 times by 2014 to reach more households and businesses. The plan is governed by principles of public-private partnership and reducing barriers to expand infrastructure and access. The specific goals are to increase online government services, transition to paperless systems, and link all public entities to an electronic contracting system to improve transparency and civic participation.
The document discusses several key questions regarding eGovernment frameworks:
1) Whether eGovernment policy should be the driving force or develop in response to technological developments.
2) The optimal organizational setup for coordinating eGovernment initiatives, whether through a strong centralized unit or decentralized approach.
3) The different models for coordinating implementation and policymaking, ranging from fully decentralized to fully centralized.
The document then outlines some of the factors that can drive successful eGovernment development, including stable coordination structures, leadership, legal/fiscal frameworks, and interoperable technical architectures.
Colombia has made significant progress in developing its online government system over the past decade. It now ranks highly in international rankings of e-government. The government's strategy is coordinated through the Online Government Program and aims to improve efficiency, transparency, and citizen participation through expanded online services. Key achievements include establishing an integrated access point portal for government services, implementing an e-procurement system, and providing over 700 online transactions and services across all local governments. The strategy focuses on continuing to expand online information, interactions, transactions, and democratic participation to build an increasingly digital government.
This document provides an overview of electronic governance for sustainable development (EGOV4SD). It discusses how governments face pressures to be more responsive, efficient, and deliver public value. New technologies like web 2.0, cloud computing, and mobile services are transforming governments' use of technology and interactions with citizens. EGOV4SD aims to advance social, environmental, economic and transitional sustainability goals through open government and policy development that utilizes these new technologies.
Estonia has achieved high levels of internet penetration and digital government services. Through initiatives like Tiger Leap and programs offering computer training, Estonia developed an e-government infrastructure connecting databases across levels of government through the X-Road system. This allows citizens to access most government services online. Estonia's success is attributed to the political commitment to ICT development, allocating around 1% of the budget annually from 1994-2004. Estonia prioritized digital transformation with consensus across society and active government leadership through project-based approaches.
This document discusses some of the key legal issues related to cloud computing. It identifies three main categories of issues: data privacy and security, contracts and liability, and compliance. Under data privacy and security, it discusses issues around data location, cross-border data transfers, and ensuring appropriate security measures. For contracts and liability, it outlines various risks that should be addressed in service contracts such as data backups, disaster recovery, and security breach handling. The compliance section notes some national rules regarding public records, access to information, and public procurement requirements.
This document discusses the major activities and functions of central banks. It explains that central banks historically served as bankers to governments and had control over money supply through printing currency. Their modern functions include conducting monetary policy to stabilize economic growth and inflation through interest rate adjustments and money supply management. The primary reason for establishing central banks is to ensure control over a country's currency and monetary system. The document also outlines the objectives, design considerations, and fundamental tools of central banks like the European Central Bank.
The document discusses Belgium's e-government system and its reliance on interoperability and electronic IDs (eIDs). It outlines how eIDs allow Belgian citizens to access a variety of e-applications from healthcare to home banking. The system provides efficiency, speed, transparency and lower costs for both citizens and the government. It also describes ongoing developments to make services hardware-agnostic and standardize modules, process flows and identity management across different levels of government.
The document discusses challenges with deploying ICT in marginalized areas and proposes solutions. It suggests (1) creating "broadband islands" with open-source software and refurbished computers connected to the internet via various means. (2) Establishing software production centers using industrial standards to develop specialized ICT solutions. (3) Developing a business model where an entity sets up the broadband infrastructure and contracts with other organizations to access users, eventually making the infrastructure self-sustaining through these partnerships and local revenues.
The document summarizes a cloud computing summit that took place in 2011. It includes the agenda for presentations on cloud computing from various speakers, including John Suffolk, the former CIO of the UK Government. Suffolk's presentation discussed how technology is advancing rapidly, outpacing many organizations, and suggested governments need to transform public services through approaches like outsourcing, shared services, and moving to a common infrastructure and cloud computing to address challenges like duplication and reduce costs.
The document discusses opportunities for ICT delivery and student access through cloud computing. It outlines 10 steps to implementing educational ICT using cloud-based solutions, including using thin clients with low power needs, centralized software deployment and management, and read-only operating systems. Cloud computing allows flexible ICT delivery, reduces costs, and improves sustainability for educational institutions.
Rightscale Webinar: Plan for Failure: How to Avert Disaster With a Cloud Stra...RightScale
As AWS and Netflix learned this past Christmas Eve, outages happen. The question isn’t how to avoid outages, but rather how to recover quickly and effectively when they occur. One approach is to develop a multi-cloud strategy – utilizing either different providers or multiple regions from the same provider – to build in safeguards against anything from a natural disaster to the workman in the street who accidentally chops into a cable. But multi-cloud strategies carry their own challenges. Besides coping with architecture and resource allocation, businesses that leverage more than one cloud provider are faced with forecasting cloud costs that have suddenly become even more complex and managing a high availability architecture across multiple clouds.
Related topics we’ll discuss:
- How to translate an old IT budget into accurate costs for the new world of cloud
- Is outage-proofing possible?
- Using a global hybrid approach to cope with regional compliance regulations
- Managing multiple private and public clouds from a single dashboard
Who should attend:
- CIOs
- Data managers/developers
- IT decision makers
- Business strategists and decision makers
- Cloud platform providers
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
It goes without saying that cloud computing has dramatically reshaped the information technology services landscape. Virtualization is unleashing the power of commodity-based technology and open source communities are building new applications and services at an astonishing rate, but networking has lagged behind compute and storage in virtualization and automation. We’ve become accustomed to specialized networking silicon, complex operating systems and highly distributed control planes. For the most part, we’ve accepted the model along with its high costs.
All that is changing! New protocols such as OpenFlow are freeing the network control plane from proprietary operating systems and hardware platforms. We are entering a new era where customers control the features – and release schedules – of new, open networking applications that address the needs of the mega-scale world.
A lot of work is required to realize the potential of Software-Defined Networking (SDN), where we can enjoy the benefits derived from “software automating software.” This talk will examine some of the history that led us to the point where current networking architectures are no longer viable for cloud computing at mega-scale. We’ll take a look at the basics of SDN and some of its key elements – OpenFlow, network virtualization, and orchestration – along with some of the initiatives and companies that are setting the stage for the next generation of networking.
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.finalTuan Phan
The document summarizes an agency workshop on FedRAMP compliance and implementation. It includes an agenda for the workshop covering topics such as FedRAMP responsibilities and compliance, implementation planning and assessment phases, and ongoing assessment and authorization. Key players in FedRAMP like the JAB, agencies, cloud service providers, and independent assessors have defined responsibilities. Agencies can leverage existing FedRAMP authorizations by reviewing security assessment documentation in the FedRAMP repository.
This document provides information about the 2nd annual Distributed Energy Storage 2013 conference to be held June 17-18, 2013 in London. The conference will bring together speakers from utilities, government agencies, and energy storage technology companies to discuss topics such as integrating energy storage into smart grids, developing business models for energy storage, and case studies of energy storage projects. An interactive workshop on developing microgeneration and domestic energy storage for smart grids will also be held on June 19.
PDF Transforming Your Infrastructure into a Utility-Grade NetworkGraybar
Is your network ready and are you prepared for the Internet of Everything? The demands of the network are changing and changing very fast. A robust network infrastructure is critical as we enter this new era of “all things connected."
This G2 Talk webinar will help you understand the challenges that are ahead of you and outline a migration path to a utility-grade infrastructure to support the network of the future.
Managed MPLS vs "wires only" VPLS. As technologies both VPLS and MPLS offer a
number of business benefits. However, there
are key operational differences between the
two, and the old adage stands – ‘do you really
know what you are buying’?
IBM provides a 3-step approach to smarter storage management:
1. Create a responsive infrastructure across multiple storage tiers and vendors to reduce complexity and costs while maintaining flexibility.
2. Standardize storage usage and processes through an intelligent storage service catalog to minimize custom solutions and drive automation.
3. Make storage management intelligent through analytics-driven automation of tasks like provisioning, migration, and archiving to improve efficiency.
Juniper Networks MetaFabric Architecture. Enabling a Simple, Open, and Smart Data Center
Follow GCC Computers
http://www.facebook.com/GccComputersLtd
http://www.linkedin.com/company/gcc-computers-ltd
http://twitter.com/gcc_computers
http://www.youtube.com/channel/UCjWj_h4lrCdw65x2xbM3lhQ
http://www.gcc.com.cy/
CFO Network Event May 2012 - Presentation by Paul BrooksAzure Group
Presentation for CFO Australia network event held in conjunction with the Institute of Chartered Accountants on the impact of the NBN on Australian business
This presentation discuss about -
Why 24x7 monitoring is essential for large enterprise network management system?
How to monitor distributed remote locations without losing the data or centralized visibility?
How to scale without breaking the IT budget?
Business Continuity In The Cloud, FirehostInternet World
The document discusses business continuity and disaster recovery in the cloud. It notes that approximately 40% of organizations still use tape backup, though cloud solutions are becoming more popular. The cloud provides flexibility, lean deployment models, and performance that allows for affordable business continuity for mid-sized enterprises. Specifically, the cloud allows environments to be spun up quickly on demand and then scaled up or down as needed. It also reduces infrastructure requirements through techniques like DNS management and geo-IP routing for local performance.
View On-Demand
http://ecast.opensystemsmedia.com/331
Learn how to avoid commonly made mistakes when designing your distributed system. Whether it's misunderstanding your data flow or underestimating scale – learn from and apply real-world technical experience to your project.
RTI is the world's leading vendor of real-time middleware. We have direct experience with hundreds of teams building thousands of complex distributed systems. These range from a few computers to thousands, and soon, millions. We have seen, across the dozens of industries we engage, patterns of use, and critical mistakes, that even the best designers can make.
This webinar targets chief engineers and software architects for high-performance distributed systems. It captures some of our experience with these types of systems.
SP-AusNet was facing challenges with managing their large collection of documents and content across multiple systems. This made it difficult to find information, onboard employees, and manage projects efficiently. They implemented an Enterprise Content Management system using Microsoft SharePoint to address these issues by centralizing their content, improving search capabilities, and automating workflows and approval processes. This allowed them to reduce costs, improve collaboration both internally and with external partners, and make critical information more accessible.
The document discusses a presentation on cloud computing for research and education. It covers current usage of cloud services, barriers to adoption, and the different types of cloud services. It also discusses the financial benefits of cloud computing, using cloud services for collaboration and capacity needs, and scenarios that are well-suited for cloud deployment. Building a private research cloud is presented as a way to address trust issues. The role of national research and education networks and potential federation of national clouds in Europe is also mentioned.
Webinar- Simple and Cost-Effective Disaster Recovery in the Cloud - 7-19-12peak10marketing
This document discusses disaster recovery (DR) strategies and solutions. It begins with an overview of challenges organizations face with traditional DR approaches. It then discusses how virtualization and cloud computing can help address these challenges by providing more flexible, scalable and cost-effective DR options. Customer testimonials are provided on how they have implemented cloud-based DR solutions to better protect their business operations and meet recovery objectives. The document concludes by outlining the DR services provided by Peak 10, including cloud, hot site and cold site options, and how these can help organizations reduce vulnerability from disruptive events and ensure business continuity.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
1. 29.09.2011
Data Center Consolidation and
Cloud Computing in Government ICT
It is a Matter of Time
John R. Savageau
Los Angeles, California
savageau@pacific-tier.com
Topics
• Data center consolidation
• Disaster recovery and business continuity
• Introduction to cloud computing
• Moldova case study
• Government roles in cloud computing
1
2. 29.09.2011
Every Day Dynamics
Urgency
Business
Data Center
Continuity/
Consolidation
Disaster Recovery
Meeting Point
For
Cloud Computing Discussion
Planning
Technology Changing/Enabling
Refresh Cycles Applications
Government
Data Center
Consolidation
Not just an issue for
US – it is a common
issue for nearly all
governments
2
3. 29.09.2011
Data Center Consolidation
VISION: Create a whole-of-government approach to data centers, disaster
recovery, and business continuity. Provides standards and integration of the
government’s ICT infrastructure matching a wide range of government
information needs in an optimal manner with regard to interoperability,
development agility, cost, energy use, and operations.
• Adopt modern technologies and practices that will improve
the effectiveness and efficiency of data center use
• Consolidate data centers in a model that will reduce
duplication and un-necessary costs for base ICT infrastructure
• Match national objectives and business needs to ICT utility
and protection of national data
Australia
Traditional vs. Cloud in Data Center
Traditional Data Center Cloud Processing Center
• One user, one cabinet or suite • One infrastructure, many
in data center users
• One application per server or • One application per virtual
cluster server
• Dedicated storage for a single
application • Shared processing resource
• Average utilization <20% • Shared storage resource
• Separate switching and • Average utilization >75%
telecom • Shared switching and telecom
• Separate/individual licenses • Volume licensing
NASCIO
3
4. 29.09.2011
Surveys – National ICT Infrastructure
• Obsolete or
unsupported h/w, s/w
• Incompatible systems
• Old or non-existent
documentation
• Loss of skilled or
experienced staff
• Inability to meet
business requirements
• Data security
shortfalls
– Disaster recovery
– Standard access
controls
Data Center Reviews
Suitability Offsite Expansion
Location to Task Size Air Conditioning Power UPS OSS/BSS Telecom DR Security Plans Comments
Jakarta Kominfo 6th Floor Small Spot NMS 1 no Medium Yes
Jakarta Kominfo 2nd Floor Small Spot NMS 1 no Medium Yes Single use facility
Batam Medium Central/Dry NMS 1 no Medium Yes Low power
Samarinda Small Spot NO 1 no Medium Yes
Cyber Center Large Chilled Water OSS/BMS >20 no High Yes Best observed - Carrier hotel/IXP/Colo
Ministry of Agriculture Small Spot NMS 1 no Low Yes No power available for expeansion
PLN Jakarta Medium Central/Dry NMS 3 no Medium Yes Moving facility
IDC Batam Medium Central/Dry OSS 5 no Medium Yes Small colo, adequate
Ministry of Public Works Small Spot NO 2 no Low Yes Small , low power, not all on UPS
Bureau of Statistics Medium Central/Dry NMS 1 no Medium Yes Good facility, requires DR
Ministry of Finance Medium Central/Dry NMS 2 no Medium Yes Good facility, moving
Unsatisfactory 1
Marginal 2
Adequate 3
Good 4
Exceptional 5
4
5. 29.09.2011
Why Some Resist Consolidation
Overall, resistance to data center consolidation is
not a technical issue, it is based on personal reasons.
NASCIO – National Association of State CIOs
Disaster Management
5
6. 29.09.2011
Disasters do Happen…
• How well will you be
prepared when it happens
to your data center?
• Is your critical national
data protected?
Disaster Recovery Planning
• International DR/DRC/BCP standards
– NFPA 1600 (Process and Planning)
– ISO 24762
– BS 25999 (UK) There are good international
– COBIT/ITIL standards for disaster recovery and
business continuity, as well as
mature application support. The
• Main objectives problem is getting plans off
– Safeguard data PowerPoint slides and into
implementation.
– Respond quickly
– Restore operations
6
7. 29.09.2011
Intro to Cloud Computing
It is Just a Matter of Time
A Matter of Time
• We need to start the discussion someplace, and
defining cloud computing is that place
• Cloud computing is still an evolving paradigm. Its
definition, use cases, underlying technologies,
issues, risks, and benefits will be refined and better
understood with a spirited debate by the public and
private sectors.
• This definition, its attributes, characteristics, and
underlying rationale will evolve over time. (NIST)
7
8. 29.09.2011
NIST - The Most Common Cloud Frameworks
"Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can
be rapidly provisioned and released with minimal
management effort or service provider interaction”
ICT Operational Costs
11%
New Applications
Development
Existing Applications
53% Maintenance
36% Infrastructure (IT
Equipment/Facility)
A major objective of cloud computing is to
return as much budget/funding to new ICT Spending in
applications development and innovation as Traditional Large
possible by relieving individual organizations
of infrastructure cost and operations burden Organizations
Various Sources
8
9. 29.09.2011
Economics of Virtualization
• We plan for peak use
• Most resource remains unused
From Berkeley “Above the Clouds”
Traditional IT Equipment Use
• Normally less than 20%
• Consolidation increases performance
• Virtualization reduces cost
Overall Compute
Unused or Wasted Resources
and Storage
Resource Capacity
Turn Off
Until Needed
Move to
Virtualization
9
10. 29.09.2011
Cloud Service Essential Characteristics
• On-demand Self-service. Users provision computing and storage
capabilities.
• Broad Network Access. Compute, software, and storage resources
are available through a network connection.
• Resource Pooling. Compute resources are pooled to provide a
single resource to be assigned and reassigned according to user
demand.
• Rapid Elasticity. Compute and storage capabilities can be rapidly
and elastically provisioned, in some cases automatically, to quickly
scale out, and rapidly released to quickly scale in.
• Measured Service. Cloud management systems automatically
control and optimize resource use by leveraging a metering
capability at some level of abstraction appropriate to the type of
service used.
Cloud Service Models
• Infrastructure as a Service/IaaS. The capability provided to the
consumer/user to provision processing, storage, networks, and other
fundamental computing resources where the consumer/user is able to
deploy and run arbitrary software, which can include operating systems
and applications.
• Platform as a Service/PaaS. The capability provided to the consumer/user
to deploy onto the cloud infrastructure consumer-created or acquired
applications created using programming languages and tools supported by
the provider.
• Software as a Service/SaaS. The capability provided to the consumer/user
to use a software provider’s applications running on a cloud infrastructure.
SaaS
PaaS
Each layer builds on the previous layer
IaaS
Wikipedia
10
11. 29.09.2011
Cloud Deployment Models
NIST Deployment Models
Cloud Model Cloud Description
The cloud infrastructure is operated solely for an organization. It may
Private Cloud be managed by the organization or a third party and may exist on
premise or off premise.
The cloud infrastructure is made available to the general public or a
Public Cloud large industry group and is owned by an organization selling cloud
services.
The cloud infrastructure is a composition of two or more clouds
(private, community, or public) that remain unique entities but are
Hybrid Cloud bound together by standardized or proprietary technology that
enables data and application portability (e.g., cloud bursting for load-
balancing between clouds).
The cloud infrastructure is shared by several organizations and
Community supports a specific community that has shared concerns (e.g., mission,
security requirements, policy, and compliance considerations). It may
Cloud be managed by the organizations or a third party and may exist on
premise or off premise.
An interconnection by several cloud service providers allowing cross
Plus -> InterCloud provisioning, resource allocation, and cloud exchange marketplace.
NIST Cloud Combined Framework
Hybrid Clouds
Deployment
Models Private Community Public
Cloud Cloud Cloud
Service IaaS PaaS SaaS
Models
On Demand Self-Service
Essential Broad Network Access Rapid Elasticity
Characteristics Resource Pooling Measured Service
Massive Scale Resilient Computing
Common Homogenity Geographic Distribution
Characteristics Virtualization Service Orientation
Low Cost Software Advanced Security
Based upon original chart created by Alex Dowbor - http://ornot.wordpress.com
11
12. 29.09.2011
Elements of the Cloud
Users Users Users Users Users Users Users
Application User Interface Layer
(SaaS)
API Layer
(PaaS)
Resource Management Layer
(IaaS)
Storage Systems
Provisioning Engine for the Virtual Data Center
Creates virtual data centers and IT infrastructure
within a compute and storage resource
12
13. 29.09.2011
The Virtual Data Center
• To the user, it is no different than a traditional
data center
• Greater efficiency
• Faster provisioning
• Ease of management
IaaS
PaaS
Cloud (PaaS) User Views and Control
• Allows individual agency or
ministry IT managers to
control own virtual data
center resources
• Easy to visualize and
understand
• Simplifies resource planning
and management
• Overall resource
management at the
national operations center
level
13
14. 29.09.2011
SaaS – I Don’t Care Where the Applications are Hosted
• Single application
• Many users
• Content is secure
• Simple
Virtual Desktop Support/ SaaS
• Full desktop utility
• Security
– Physical media protection
– Virus/Malware
– Hacking
• Rapid provisioning
• Volume licensing
Not hardware or
OS
dependent
14
15. 29.09.2011
NIST Cloud Computing Priorities
• Interoperability – clouds need to work
together
• Portability – workloads and data should be
able to move as needed
• Security – customer data and workloads are
protected
All require development of open and usable standards
“Quick Win” - Disaster Recovery
• Requirement to backup government data into a
central (offsite) location
– Server-based
– Workstation-based
– “Cloud Storage” model
• Long term disaster recovery designed into Cloud as a
distributed/mirrored architecture allowing
immediate fail-over
15
16. 29.09.2011
Issues and Concerns w/Clouds
• Security of government information
• Personal Privacy of citizens
• Availability and performance
• Management and control
• Migration planning
“Cloud computing is not a silver bullet,
but offers a transformational opportunity
to fundamentally reshape the operations
of government and close the IT gap”
(Kundra)
Security is Main Issue with Clouds
Q: Rate the challenges/issues ascribed to the “cloud on demand model”
1= Not Significant 5= Very Significant
Vendor Availability/Experience 44,3%
Regulatory Requirements 49,2%
Portability 50,0%
Cost of Implementing 50,4%
Ability to Customize 55,8%
Integration with Existing IT
61,1%
Systems
Availability 63,1%
Performance 63,1%
Security 74,6%
0,0% 10,0% 20,0% 30,0% 40,0% 50,0% 60,0% 70,0% 80,0%
Source: IDC Enterprise Panel N=244
16
17. 29.09.2011
Cloud Security Challenges
• Data dispersal and international privacy laws
– EU Data Protection Directive and U.S. Safe Harbor
program
– Exposure of data to foreign government and data
subpoenas
– Data retention issues
• Need for isolation management
• Multi-tenancy
• Logging challenges
• Data ownership issues
• Quality of service guarantees
NIST
Government Roles in Cloud Computing
Thought Leadership
Standards
Policy
17
18. 29.09.2011
Government Roles in Cloud
• Create national policies and standards
– Data security
– Data formats
– Data and IT Governance
• Produce cloud computing solutions in support of
government operations
• Provide guidance for both government and commercial
initiatives
– Strategic roadmaps
– Best practices
– PPPs Government Plays
An Additional Role
As National ICT
“Thought Leader”
US Federal Cloud Computing Vision and Mission
Vision Statement
Establish secure, easy to use, rapidly
provisioned IT services for the Federal
Government, including:
• Agile and simple acquisition and
certification processes Mission Statement
• Elastic, usage-based delivery of Drive the government-wide adoption of
pooled computing resources cost effective, green, and sustainable
• Portable, reusable and interoperable Federal cloud computing solutions
business-driven tools
• Browser-based ubiquitous internet
access to services
• Always on and available, utility-like
solutions
36
GSA Cloud Computing Initiative Vision and Strategy Document
36
18
19. 29.09.2011
Cloud Readiness Assessment
• Profiles – all levels of government
management and users
• Awareness and Knowledge
• Existing Technical Architecture
• IT Organizations and Training Plans
• Security and Risk Assessment
• Cloud Computing Strategy
• IT Governance and Management Strategy
Cloud Development Case Study
Moldova M-Cloud
19
20. 29.09.2011
M-Cloud Introduction
The Requirement
– Establish a government-wide shared compute
infrastructure
– Use international best-practices
– Develop M-Cloud public services focusing on:
• Meet specific performance objectives
• Availability
• Security
• Data location
• Data recovery
• Regulatory
• and other legal requirements.
Moldova
• Develop approach, including:
– Surveys of existing data centers
– Cloud Readiness Assessment
– Review of BCDR environment
– Interview govt agencies and private companies
– Intensive thought leadership campaign
– Feasibility study
• Prepare cloud vendor procurement bid and
implementation roadmap
20
21. 29.09.2011
M-Cloud Leadership
• Move to a “cloud first” national ICT policy
• Identify opportunities through data center
consolidation
• Centralize certification of cloud solutions
• Establish standards for security, interoperability &
data portability
There was a time when every household, town, farm or village had its own water well. Today,
shared public utilities give us access to clean water by simply turning on the tap; cloud
computing works in a similar fashion. Just like water from the tap in your kitchen, cloud
computing services can be turned on or off quickly as needed. Like at the water utility, there
is a team of dedicated professionals making sure the service provided is safe, secure and
available on a 24/7 basis. When the tap isn’t on, not only are you saving water, but you aren’t
paying for resources you don’t currently need. (Kundra)
Utilities: 1) Roads 2) Water 3) Electricity
4) Broadband and Compute
M-Cloud Government Structure
High Level View of M-Cloud
21
22. 29.09.2011
Governments Should Consider Cloud
Computing at Any Stage of Development
• Cloud computing solves immediate problems
– BCDR
– More responsive to urgent government agency
requirements
– Data center consolidation & operations efficiency
– Improved flexibility/productivity in application
development
• Knowledge creation
Cloud Standards
A B
Proprietary
Value-Added
Standard
22
23. 29.09.2011
Cloud Standards Mission
Provide guidance to industry and
government for the creation and
management of relevant cloud computing
standards allowing all parties to gain the
maximum value from cloud computing
45
Standardization
Allowing Value-Added and Proprietary Implementation
• Advanced or Value- Proprietary Value
Added features and Additional
Functionality
• Standard or
Core features Standardized Core
Cloud Capabilities
GSA
23
24. 29.09.2011
Standards Framework
• Cloud computing reference architecture
• Cloud service level agreements
There are many existing and emerging standards
• Systems interoperability •
•
OASIS
OCCI
• DMTF
• Data portability • OVF
• CDMI
• Security and privacy •
•
IEEE
And more…
• Recommendations
– Contribute government or agency requirements
– Participate in standards development
– Encourage agency compliance testing and development
– Encourage all agencies to adopt standards
– Provide training to all agencies and users
Cloud Computing
Reference Architecture
48
48
24
25. 29.09.2011
Cloud Computing Journey Inter-Cloud
We Are
Here Open
Standards
APIs and Virtual Private
Protocols Cloud Hybrid Cloud
Private
Cloud
Public
Cloud
25