SlideShare a Scribd company logo
1 of 32
Download to read offline
Understanding the Cloud
           October 11, 2012
About Me


      I am the initial architect for our online “cloud” clinical data collection solutions which we have
      been delivering since the late 1990s.

      Personally, I am a proponent and user of online “cloud” applications.


Confidential – 2
Goals Today

        1.         Define “the cloud” in simple terms

        2.         Provide some “cloud” benefit and risk evaluation
                   checklists




Confidential – 3
Understanding the Cloud


Confidential – 4
A majority thought that cloud computing referred to a “fluffy white thing”

          51% believed storms could interfere with it


                                     August 2012 Survey by Citrix
                            http://www.citrix.com/lang/English/lp/lp_2328330.asp
Confidential – 5
http://www.citrix.com/lang/English/lp/lp_2328330.asp


Confidential – 6
So, what is the cloud?




Confidential – 7
We will cover a formal definition from the




                                         but first…


Confidential – 8
“The Cloud” in Simple Terms




Confidential – 9
“The Cloud” in Simple Terms


      1.       You access it through the Internet

      2.       You don't own it (generally)

      3.       You don't have to do much to scale up to a bigger
               footprint (except pay for what you are using)



  Adapted from:
  http://it.toolbox.com/blogs/original-thinking/what-is-cloud-computing-a-simple-definition-30648

Confidential – 10
Examples

               Photos



  Productivity



            Industry



Confidential – 11
Technical Nuts and Bolts
                        (for the record)




Confidential – 12
The National Institute of Standards and Technology
          defines Cloud Computing with three main categories




Confidential – 13
1




Confidential – 14
2




Confidential – 15
Service model options are
             the most commonly discussed Cloud Category




                     Let’s take a closer look at those options…


Confidential – 16
Software           Software (as a Service) indicates special-purpose software made
               (SaaS)            available through the Internet.




                                 Platform indicates a higher-level environment for which developers
              Platform           write custom applications. Generally the developer is accepting
               (PaaS)            some restrictions on the type of software they can write in
                                 exchange for built-in application scalability.



                                 Infrastructure includes provisioning of hardware or virtual
          Infrastructure
                                 computers on which one generally has control over the OS;
               (IaaS)
                                 therefore allowing the execution of arbitrary software.



  Adapted from
  http://rwandering.net/2008/07/03/cloud-services-continuum/
Confidential – 17
Common Users for Cloud Service Models




 http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/
Confidential – 18
The lower you go down in the stack the more security you are
      tactically responsible for implementing and managing.


                    For Example:
                            Operating system
                            Network security
                            Data encryption
                            System installation

 http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/
Confidential – 19
3




Confidential – 20
Open to the general public



                    Exclusively accessed by a single organization



                    Combination of two or more service models



                    Selectively accessible for users with a shared purpose



Confidential – 21
What is the benefit of all this?




Confidential – 22
http://www.citrix.com/lang/English/lp/lp_2328330.asp
Confidential – 23
►     Save money
              • Lower IT costs
              • Economies of scale
              • Pay as you go

      ►     Save time
              • Eliminate install tasks associated with licensed software

      ►     Focus on competitive advantage rather than
              • Purchasing and supporting the server infrastructure
              • Managing the security, reliability, and scalability
              • Maintaining a labor-intensive patch and upgrade process


Confidential – 24
Should I be concerned about the safety of my data?




Confidential – 25
Always.

      Data security is a concern whether you subscribe to SaaS
      or purchase software and implement it on in-house servers.




                       Here are some things to consider…


Confidential – 26
Is the solution Secure?

      Is it easily Accessible?

      Does it support a Global marketplace?

      Is it Sustainable?



Confidential – 27
Some questions to ask!
      ►     Secure
              •     Is the application 21 CFR Part 11 compliant?
              •     Do you have Safe Harbor certification?
              •     What encryption is used for data transfers?
              •     Is the data center SOC 2 Type II certified?

      ►     Accessible
              • Which browsers are supported?
              • Is it accessible on mobile and tablet browsers?
              • Does the application require routine maintenance downtime? How often? How
                    long?

      ►     Global
              • Does the application support the display and storage of multiple languages and
                    typesets (Chinese, Japanese, etc.)?
              •     Can you report on multiple studies with the same application?

      ►     Sustainable
              • What is the cost model?
              • What is the training time for standard end users?
              • How are upgrades supported?

Confidential – 28
Can you audit the vendor facilities?

      How are the data backed up?

      What is the recovery process?

      Is your production equipment housed in a state-of-the-art colocation facility?

      What are the security arrangements for the facility?
                                                                                         Extended
      Are they in place 24 hours a day, 365 days a year?

      On what type of infrastructure do you host data?
                                                                                         SaaS Data Checklist
      How often do you back up data and where are the backups stored?

      Where and how do you store the backups?

      What level of data encryption do you use to protect website transactions?

      Can I export my data in a format that I can easily re-use?




  Adapted from:
  http://www.trumba.com/connect/knowledgecenter/software_as_a_service.aspx#secure_data

Confidential – 29
In Summary




Confidential – 30
Simply Put                    You Have Options
                    “In The Cloud”                 Cloud Service Models
      • You access it through the Internet   • SaaS, PaaS, IaaS

      • You don't own it (generally)         • Most organizations leverage SaaS

      • You don't have to do much to         • Remember the lower you go, the
        scale                                  more you are responsible to
                                               manage



And finally…
When deploying a solution either in-house or as SaaS, make sure it is:




Confidential – 31
®
from Concept to Cure
                        ™
   with D ATATRAK ONE




                        DATAT R A K International
                        Cleveland, Ohio
                        Bryan, Texas
                        Cary, North Carolina


                        888.677.DATA (3282) Toll Free
                        www.datatrak.net

More Related Content

What's hot

Wind River For Medical
Wind River For MedicalWind River For Medical
Wind River For Medical
sheilamia
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
comania
 
Guide project extranets 10 killer features
Guide   project extranets 10 killer featuresGuide   project extranets 10 killer features
Guide project extranets 10 killer features
Kahootz
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
EMC
 

What's hot (18)

NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
CAST Architecture Checker
CAST Architecture CheckerCAST Architecture Checker
CAST Architecture Checker
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Wind River For Medical
Wind River For MedicalWind River For Medical
Wind River For Medical
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
Guide project extranets 10 killer features
Guide   project extranets 10 killer featuresGuide   project extranets 10 killer features
Guide project extranets 10 killer features
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
BC_DR
BC_DRBC_DR
BC_DR
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 
NF101: Nutanix 101
NF101: Nutanix 101NF101: Nutanix 101
NF101: Nutanix 101
 
Devops (start walking in the same direction) by ops
Devops (start walking in the same direction) by opsDevops (start walking in the same direction) by ops
Devops (start walking in the same direction) by ops
 
Healthcare
HealthcareHealthcare
Healthcare
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 

Similar to Understanding the Cloud

Similar to Understanding the Cloud (20)

Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Cloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingCloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Sunil
SunilSunil
Sunil
 
Features of cloud
Features of cloudFeatures of cloud
Features of cloud
 

More from www.datatrak.com

CDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based MonitoringCDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based Monitoring
www.datatrak.com
 
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
www.datatrak.com
 
EDC and Getting Ready for Migration
EDC and Getting Ready for MigrationEDC and Getting Ready for Migration
EDC and Getting Ready for Migration
www.datatrak.com
 

More from www.datatrak.com (20)

eSource: Data Capture Simplified - Uncover Time and Cost Saving Possibilities
eSource: Data Capture Simplified - Uncover Time and Cost Saving PossibilitieseSource: Data Capture Simplified - Uncover Time and Cost Saving Possibilities
eSource: Data Capture Simplified - Uncover Time and Cost Saving Possibilities
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
 
Defining a Central Monitoring Capability: Sharing the Experience of TransCele...
Defining a Central Monitoring Capability: Sharing the Experience of TransCele...Defining a Central Monitoring Capability: Sharing the Experience of TransCele...
Defining a Central Monitoring Capability: Sharing the Experience of TransCele...
 
Technology Considerations to Enable the Risk-Based Monitoring Methodology
Technology Considerations to Enable the Risk-Based Monitoring MethodologyTechnology Considerations to Enable the Risk-Based Monitoring Methodology
Technology Considerations to Enable the Risk-Based Monitoring Methodology
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoring
 
eSource: What You Need To Know
eSource: What You Need To KnoweSource: What You Need To Know
eSource: What You Need To Know
 
eSource: A Clinical Data Manager's Tale of Three Studies
eSource: A Clinical Data Manager's Tale of Three StudieseSource: A Clinical Data Manager's Tale of Three Studies
eSource: A Clinical Data Manager's Tale of Three Studies
 
Monitoring Plan Template
Monitoring Plan TemplateMonitoring Plan Template
Monitoring Plan Template
 
Risk Based Monitoring in Practice
Risk Based Monitoring in PracticeRisk Based Monitoring in Practice
Risk Based Monitoring in Practice
 
Gamification to Incentivize Sites ACRP 2014
Gamification to Incentivize Sites ACRP 2014Gamification to Incentivize Sites ACRP 2014
Gamification to Incentivize Sites ACRP 2014
 
Using Gamification to Incentivize Sites
Using Gamification to Incentivize SitesUsing Gamification to Incentivize Sites
Using Gamification to Incentivize Sites
 
Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...
Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...
Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...
 
Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies
 
Using Technology to Integrate Clinical Data Management and Clinical Operations
Using Technology to Integrate Clinical Data Management and Clinical OperationsUsing Technology to Integrate Clinical Data Management and Clinical Operations
Using Technology to Integrate Clinical Data Management and Clinical Operations
 
The FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDM
The FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDMThe FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDM
The FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDM
 
CDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based MonitoringCDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based Monitoring
 
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
 
Integrating Clinical Operations and Clinical Data Management Through EDC
Integrating Clinical Operations and Clinical Data Management Through EDCIntegrating Clinical Operations and Clinical Data Management Through EDC
Integrating Clinical Operations and Clinical Data Management Through EDC
 
OneMedPlace November Research Report
OneMedPlace November Research ReportOneMedPlace November Research Report
OneMedPlace November Research Report
 
EDC and Getting Ready for Migration
EDC and Getting Ready for MigrationEDC and Getting Ready for Migration
EDC and Getting Ready for Migration
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Understanding the Cloud

  • 1. Understanding the Cloud October 11, 2012
  • 2. About Me I am the initial architect for our online “cloud” clinical data collection solutions which we have been delivering since the late 1990s. Personally, I am a proponent and user of online “cloud” applications. Confidential – 2
  • 3. Goals Today 1. Define “the cloud” in simple terms 2. Provide some “cloud” benefit and risk evaluation checklists Confidential – 3
  • 5. A majority thought that cloud computing referred to a “fluffy white thing” 51% believed storms could interfere with it August 2012 Survey by Citrix http://www.citrix.com/lang/English/lp/lp_2328330.asp Confidential – 5
  • 7. So, what is the cloud? Confidential – 7
  • 8. We will cover a formal definition from the but first… Confidential – 8
  • 9. “The Cloud” in Simple Terms Confidential – 9
  • 10. “The Cloud” in Simple Terms 1. You access it through the Internet 2. You don't own it (generally) 3. You don't have to do much to scale up to a bigger footprint (except pay for what you are using) Adapted from: http://it.toolbox.com/blogs/original-thinking/what-is-cloud-computing-a-simple-definition-30648 Confidential – 10
  • 11. Examples Photos Productivity Industry Confidential – 11
  • 12. Technical Nuts and Bolts (for the record) Confidential – 12
  • 13. The National Institute of Standards and Technology defines Cloud Computing with three main categories Confidential – 13
  • 16. Service model options are the most commonly discussed Cloud Category Let’s take a closer look at those options… Confidential – 16
  • 17. Software Software (as a Service) indicates special-purpose software made (SaaS) available through the Internet. Platform indicates a higher-level environment for which developers Platform write custom applications. Generally the developer is accepting (PaaS) some restrictions on the type of software they can write in exchange for built-in application scalability. Infrastructure includes provisioning of hardware or virtual Infrastructure computers on which one generally has control over the OS; (IaaS) therefore allowing the execution of arbitrary software. Adapted from http://rwandering.net/2008/07/03/cloud-services-continuum/ Confidential – 17
  • 18. Common Users for Cloud Service Models http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/ Confidential – 18
  • 19. The lower you go down in the stack the more security you are tactically responsible for implementing and managing. For Example: Operating system Network security Data encryption System installation http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/ Confidential – 19
  • 21. Open to the general public Exclusively accessed by a single organization Combination of two or more service models Selectively accessible for users with a shared purpose Confidential – 21
  • 22. What is the benefit of all this? Confidential – 22
  • 24. Save money • Lower IT costs • Economies of scale • Pay as you go ► Save time • Eliminate install tasks associated with licensed software ► Focus on competitive advantage rather than • Purchasing and supporting the server infrastructure • Managing the security, reliability, and scalability • Maintaining a labor-intensive patch and upgrade process Confidential – 24
  • 25. Should I be concerned about the safety of my data? Confidential – 25
  • 26. Always. Data security is a concern whether you subscribe to SaaS or purchase software and implement it on in-house servers. Here are some things to consider… Confidential – 26
  • 27. Is the solution Secure? Is it easily Accessible? Does it support a Global marketplace? Is it Sustainable? Confidential – 27
  • 28. Some questions to ask! ► Secure • Is the application 21 CFR Part 11 compliant? • Do you have Safe Harbor certification? • What encryption is used for data transfers? • Is the data center SOC 2 Type II certified? ► Accessible • Which browsers are supported? • Is it accessible on mobile and tablet browsers? • Does the application require routine maintenance downtime? How often? How long? ► Global • Does the application support the display and storage of multiple languages and typesets (Chinese, Japanese, etc.)? • Can you report on multiple studies with the same application? ► Sustainable • What is the cost model? • What is the training time for standard end users? • How are upgrades supported? Confidential – 28
  • 29. Can you audit the vendor facilities? How are the data backed up? What is the recovery process? Is your production equipment housed in a state-of-the-art colocation facility? What are the security arrangements for the facility? Extended Are they in place 24 hours a day, 365 days a year? On what type of infrastructure do you host data? SaaS Data Checklist How often do you back up data and where are the backups stored? Where and how do you store the backups? What level of data encryption do you use to protect website transactions? Can I export my data in a format that I can easily re-use? Adapted from: http://www.trumba.com/connect/knowledgecenter/software_as_a_service.aspx#secure_data Confidential – 29
  • 31. Simply Put You Have Options “In The Cloud” Cloud Service Models • You access it through the Internet • SaaS, PaaS, IaaS • You don't own it (generally) • Most organizations leverage SaaS • You don't have to do much to • Remember the lower you go, the scale more you are responsible to manage And finally… When deploying a solution either in-house or as SaaS, make sure it is: Confidential – 31
  • 32. ® from Concept to Cure ™ with D ATATRAK ONE DATAT R A K International Cleveland, Ohio Bryan, Texas Cary, North Carolina 888.677.DATA (3282) Toll Free www.datatrak.net