Deliverable 1.2 Project Presentation

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Deliverable 1.2 Project Presentation"

Transcription

1 FP7-PEOPLE-2012-ITN EID Grant agreement no.: Deliverable 1.2 Project Presentation Abstract This document describes the training program, the objectives, the expected results, the duration and the partners of the SECENTIS project. It also includes two sets of slides and a poster/flyer that have been prepared for presenting the project, together with the project website. Deliverable details Deliverable version: v1.0 Classification: public Date of delivery: August 29 th, 2013 Due on: May 31 st,, 2013 Editors: FBK (A. Armando, S. Ranise, L. Segalla) Total pages: 18 Start date: April 1 st, 2013 Project Coordinator: Prof. Alessandro Armando Partners: FBK, SAP Project details Duration: 48 months

2 Contents 1. Project Overview Project information List of Participants (full beneficiaries) List of Associated Partners (including role and status) The overall goal of the SECENTIS project Project objectives Overall strategy of the work plan Project Presentation Slides Project Presentation Poster and Flyer Project Website /18

3 1. Project Overview 1.1 Project information Project title: A European Industrial Doctorate on Security and Trust of Next Generation Enterprise Information Systems Acronym: SECENTIS Project number: Programme: Seventh Framework Programme (FP7) Call identifier: FP7-PEOPLE-2012-ITN Implementation mode: EID Start date: April 1 st, 2013 End date: March 31 st, 2017 Duration: 48 months Total cost: 1,219, EC contribution: 1,219, Website: For copies of reports, updates on project activities and other SECENTIS-related information, contact: FBK Alessandro Armando Povo - Via Sommarive 18 Phone: I Trento, Italy Fax: List of Participants (full beneficiaries) Part. Part. Short name Private Sector SME Month enter Month exit Country N (Y/N) (Y/N) project project 1 FBK Y N 1 48 Italy 2 SAP Y N 1 48 Germany 1.3 List of Associated Partners (including role and status) N Associated Partner name 1 University of Trento, Department of Information Engineering and Computer Science 2 Associazione Trento RISE Short name Country Organisation type SME (Y/N) Role in Project UNITN Italy Public N RES, TR, SEC Trento RISE Italy Public N TR, SEC 3/18

4 1.4 The overall goal of the SECENTIS project The main goal of the SECENTIS project is to provide an innovative training program at the Doctoral level to educate a new generation of security experts capable to tackle the scientific and technical challenges raised by the combination of new technologies (e.g., cloud computing, mobile applications, and the Software-as-a-Service paradigm) and to manage the impact of these changes in industry. The SECENTIS training program stems from a carefully selected set of research activities aiming at devising cutting-edge solutions that will improve the security of the next generation of Enterprise Information Systems and Process Management solutions. Over the past few years, the IT landscape transformed rapidly taking advantage of the consolidation of virtualization technologies and service oriented architectures as well as of the emergence of new data consumption devices. Today, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Softwareas-a-Service (SaaS) may be valid alternatives to traditional IT systems for both the public and the business world. A multitude of vendors propose to host traditional systems (e.g., Amazon cloud), to develop generic software with advanced Software Development Kit (e.g., Microsoft Azure) and to customize dedicated software with mash-ups integrating social network ideas (e.g., the Facebook SDK). The development and execution of this generation of software raise new challenges since the ownership of servers, software, and data is blurred and can span across organizations and countries. SAP is embracing this (r)evolution by extending the availability of its software and by bringing businesses together with solutions that integrate on-premise and on-demand software with a complete and complementary set of tools to access enterprise data (e.g., fat, web and mobile clients). These solutions are delivered to enterprises as a service ecosystem, where a full suite of enterprise software (including Human Resources, Supply Chain, Finance and Customer Relationship modules) are hosted in the cloud enabling partners and customers toadapt the system's capabilities or build cloud-based extensions. Ultimately, the SAP offer will provide end-to-end business processes across organisational boundaries able to support the emergence of a business market place for add-ons provided by Independent Software Vendors. The infrastructure is based on the following layered architecture that comprises a DBMS Layer, a PaaS Layer, and a SaaS Layer. Image 1 SAP Hana Architecture Security is of course critical for the new SAP Application Infrastructure, but it is also very difficult to attain because of the multi-faceted nature of the problem: sensitive data must be dealt with in accordance 4/18

5 to regulations and internal policies; third-parties applications must be certified before deployment; even applications developed internally by a company must be closely inspected to detect and eliminate vulnerabilities that could enable misuse by unauthorized users; mechanisms should be put in place to prevent and/or detect frauds by authorized users involved in the execution of business processes. The research training projects developed by the Young Researchers are summarized in the Table 1. They will address various aspects of access control in the DBMS and PaaS layers (Topics I and II), enhance the security and trust of third-party business applications in the SaaS layer (Topic III), and provide automated security analysis techniques to support the design of composed business processes in the PaaS layer (Topic IV) and of browser-based protocols that ease the use of business applications in the SaaS layer (Topic V). 1.5 Project objectives The SECENTIS project has four main training objectives (TO): TO1: Expertise on the security of Enterprise Information Systems. By achieving this objective the ESRs will acquire an in-depth knowledge about one of the most critical aspects of the next generation Enterprise Information Systems. This objective can only be achieved through a training program that tightly combines advanced formal training on Information Security with hands-on experience on a state-of-the-art, industrial-strength software platform. This is exactly the kind of training offered by the SECENTIS project. The fulfilment of a PhD in this area implies the achievement of this objective. TO2: Communication skills. The ability to present technical and innovative ideas in an effective way is of crucial importance both in industry and in academia. The achievement of this objective can be assessed by observing the quality of the presentations as well as of the scientific manuscripts written by the ESRs. TO3: Design and management of R&D projects. The ability to design and effectively manage R&D projects is a very important training objective of an industrial doctorate. The achievement of this objective can be assessed by observing the ability of the ESRs to organize their own research work and coordinate their work with others in the context of the SECENTIS work plan. TO4: Entrepreneurship and Innovation. Scientific discoveries are key to the improvement of existing technologies and are prerequisite of the creation of new business opportunities. However only scientists with an entrepreneurial mind-set and an innovation-oriented attitude can achieve the concretization of these opportunities. To this end, formal training must be complemented with activities fostering creativity and students should be immersed in a stimulating working environment that facilities the migration of new ideas into cutting-edge technical solutions. The creation of such an environment is a primary goal of the SECENTIS project. Table 1 The 5 topics of the SECENTIS project. Topic Project Title Host Institution 1 Risk-based Access Control FBK 2 Security Policy Enforcement and Monitoring FBK 3 Certification of Third-parties Applications FBK 4 Automatic Security Analysis of Business Processes FBK 5 Automatic Analysis of Browser based Security Protocols FBK 5/18

6 1.6 Overall strategy of the work plan The SECENTIS project aims at maximizing the quality and quantity of training for the ESRs along the research, education and innovation axes. To achieve this ambitious goal we have structured the work plan in a number of phases: Phase 1: Advertisement and Candidates Selection. The first phase of the project will be devoted to advertising the posts of the ESRs and to the selection of the candidates. A description of the advertisement strategy and the selection procedure is given in Section below. Phase 2: Training on Entrepreneurship and Innovation. The selected ESRs will be invited to Trento and participate in the training activities of the ICT Labs Doctoral Training Center of Trento RISE. This will stimulate their creativity and help them to achieve an entrepreneurial and innovation-oriented mind-set. The ESRs will be also guided in the preparation of their Career Development Plan (Deliverable D1.4), which is subject to approval by the Supervision Board (Milestone M3). During this period the ESRs will also study and identify the research topic to tackle during their PhD (Milestone M5). In this activity they will be supported by the key scientific personnel of the consortium and supervised by the Supervision Committee. Phase 3: Assessment of State-of-the-Art. With the enrolment to the ICT Doctoral School (month 10) the ESRs will officially start their PhD (Milestone M4). Their first task will be a thorough analysis of the state-ofthe-art relative to their own research topic (Milestone M5 and Deliverable D2-6.1). This will be done in the premises of FBK (ESR1, ESR4, ESR5) and of UNITN (ESR2 and ESR3). At the same time the ESRs will benefit from formal training by taking classes offered by the ICT Doctoral School and by the Master Programme in Security & Privacy. Phase 4: Selection of Case Studies. At month 16, ESRs will move to SAP Research in Sophia Antipolis with the goal of identifying case studies within the SAP Application Infrastructure relevant for his research. To this end, they will take hands-on classes on the SAP Application Infrastructure and will closely interact with their SAP advisor. The possibility to undergo additional formal training at Eurécom will be also considered on an individual basis and decided by the Supervision Committee. Phase 5: Beyond the State-of-the-Art. In accordance with the rules of the ICT Doctoral School at month 22 the ESRs will return to Trento to undergo the Qualifying Exam. In preparation to the Qualifying Exam, the ESRs will submit a PhD Project Plan where they must clearly state the scientific challenges that they plan to tackle the state-the-art in the field, and an outline of the research methodology that they plan to use. Since failure to pass the qualifying exam implies termination of the PhD, this is a critical milestone for the ESRs and the project as a whole. To mitigate the risk of failure a number of measures will be taken, including (i) weekly supervision meetings with the advisors in the months 19-22, (ii) detailed review of the PhD Project Plan by the advisors, (iii) rehearsal of all the presentations by ESRs during the Second Project Meeting (Deliverable D1.7) that will allow the ESRs to get timely feedback from the Supervisory Board, and (iv) ESRs will be allowed to take the Qualifying Exam twice according to the current regulations of the ICT International Doctorate School of UNITN. The technical objective of this phase is to identify novel technical solutions to the scientific challenges set in the PhD Project Plan. This activity will be done under the close supervision and help of the respective advisor at FBK or at UNITN. During this period the ESRs will also complete the formal training by taking a final class at UNITN. Phase 6: Proof-of-Concept Implementation in SAP Application Infrastructure. The ESRs will then go back to SAP for a period of 12 months to refine the technical solutions developed in the previous phase and assess their effectiveness through the development of a Proof-of- Concept implementation in the SAP Application Infrastructure. This phase will be a challenge in itself, since the ESRs will have to turn the innovative technical solutions developed with their academic advisor into a working prototype within a platform of industrial complexity. The ESRs will benefit of the close supervision of their SAP advisors and, more in general, of the SAP Research environment. The Third Project Meeting (Deliverable D1.9) will be hosted by SAP in Sophia Antipolis and scheduled right in the middle of this period. This will give the ESRs the opportunity to present their preliminary results and prototypes and receive feedback in a plenary session, i.e. attended by all advisors (both from industry and academia). Experts from the relevant business units of SAP will be also invited to participate and will be asked to contribute to draft the migration path of the proposed solutions into the SAP Application Infrastructure. 6/18

7 Phase 7: Writing the PhD Thesis. The ESRs will return to Trento to fine tune their techniques and complete the writing of the thesis. Phase 8: Industry Migration. Finally, SAP will evaluate internally the pertinence of the results from a business perspective taking into account the adequateness of the different ESR results with the product roadmap using as main input the Deliverable D7.4 and the result of the Third Project Meeting (Deliverable D1.9). The positive evaluations will be discussed with the partners during the final project meeting (e.g., Deliverable D1.11) and the selected ESRs will be offered to work toward the concrete integration of their results on real existing products or to work with the SAP Research Business development team to build a business plan to submit to the SAP internal incubator. This last phase will be funded by SAP. 2 Project Presentation Slides In this section there are the following sets of slides: 1. SECENTIS Project Kickoff Meeting 2. Brief overview or Research Topics. They provide respectively a presentation of the project and its scientific topics. These slides have been given already at a number of meetings, in particular, at the Kick-off meeting and the Selection meeting held in Trento at March 20th and May 23-24, /18

8 8/18

9 9/18

10 10/18

11 11/18

12 12/18

13 13/18

14 14/18

15 15/18

16 D1.2 Project Presentation 3 Project Presentation Poster and Flyer The following poster aimed to advertise the posts of the ESRs. It was also used as a flyer and it has been spread through the network of the project (SAP and associated partners). Furthermore it was exhibited in the stand of SAP at the fifth edition of ICT Days ( an initiative organized by the Department of Information Engineering and Computer Science of the University of Trento, in collaboration with Trento RISE and FBK. The ICT Days are an important event that aims to create networking opportunities for students, businesses, universities and research centers in the Information Communication Technology area. Image 2 Poster/flyer on SECENTIS project. 16/18

17 4 Project Website The web site ( has been launched in February It provides general information about the project and the 5 ESRs positions and it is organized in the following sections: Home. Here it is presented the general purpose of the project. Research. This section describes the research challenges tackled by SECENTIS. Training. This page offers a general overview of the 5 research topics that will be developed within the project. Consortium. Here there is a short presentation of the partners. Highlights. The call of the 5 ESRs position is presented. In this section are reported the same information inserted also in the poster/flyer. After the beginning of the research activities by the 5 ESRSs, the web site will be a channel where to insert news about SECENTIS, events organized by the partners, public documents generated by the project (publications and public deliverables) and all the relevant information linked to it. Image 3 Home page of the SECENTIS web site. 17/18

PROPOSAL ACRONYM - ETN / EID / EJD (delete as appropriate and include as header on each page) START PAGE MARIE SKŁODOWSKA-CURIE ACTIONS

PROPOSAL ACRONYM - ETN / EID / EJD (delete as appropriate and include as header on each page) START PAGE MARIE SKŁODOWSKA-CURIE ACTIONS START PAGE MARIE SKŁODOWSKA-CURIE ACTIONS Innovative Training Networks (ITN) Call: H2020-MSCA-ITN-2015 PART B PROPOSAL ACRONYM This proposal is to be evaluated as: [ETN] [EID] [EJD] [delete as appropriate]

More information

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed

More information

IRMOS Newsletter. Issue N 4 / September 2010. Editorial. In this issue... Dear Reader, Editorial p.1

IRMOS Newsletter. Issue N 4 / September 2010. Editorial. In this issue... Dear Reader, Editorial p.1 IRMOS Newsletter Issue N 4 / September 2010 In this issue... Editorial Editorial p.1 Highlights p.2 Special topic: The IRMOS Cloud Solution p.5 Recent project outcomes p.6 Upcoming events p.8 Dear Reader,

More information

The Cloud Opportunity: Italian Market 01/10/2010

The Cloud Opportunity: Italian Market 01/10/2010 The Cloud Opportunity: Italian Market 01/10/2010 Alessandro Greco @Easycloud.it In collaboration with easycloud.it Who is easycloud.it? Easycloud.it is a Consultant Company based in Europe with HQ in Italy.

More information

Leveraging the Private Cloud for Competitive Advantage

Leveraging the Private Cloud for Competitive Advantage Leveraging the Private Cloud for Competitive Advantage Introduction While it is universally accepted that organisations will leverage cloud solutions to service their IT needs, there is a lack of clarity

More information

The Service, The Cloud & The Method: The Connection Points

The Service, The Cloud & The Method: The Connection Points The Service, The Cloud & The Method: The Connection Points Thomas Erl SOA Systems Inc. Prentice Hall Service-Oriented Computing Series Started in 2003 Text Books are an Official Part of the SOACP Curriculum

More information

Software-as-a-Service: Managing Key Concerns and Considerations

Software-as-a-Service: Managing Key Concerns and Considerations Software-as-a-Service: Managing Key Concerns and Considerations A research report Publication sponsored by: TABLE OF CONTENTS Introduction: Cloud IT, including SaaS, is Real IT Managing The Key Concerns

More information

Cloud Computing for Business

Cloud Computing for Business 1 What Is Cloud? The following excerpt is from Chapter One What is Cloud? 1.8 The Impact of Cloud Computing Most people that have water on tap take it for granted. Few have ever had to go to a well or

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

Cloud Computing in Banking

Cloud Computing in Banking Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and

More information

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud

More information

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

More information

View Point. Lifting the Fog on Cloud

View Point. Lifting the Fog on Cloud View Point Lifting the Fog on Cloud There s a massive Cloud build-up on the horizon and the forecast promises a rain of benefits for the enterprise. Cloud is no more a buzzword. The enabling power of the

More information

Opportunities for human resource capacity building in RTD (new calls of FP7 PEOPLE Programme)

Opportunities for human resource capacity building in RTD (new calls of FP7 PEOPLE Programme) Opportunities for human resource capacity building in RTD (new calls of FP7 PEOPLE Programme) Second Workshop of the Networking initiative for ICT related projects Possibilities for widening further partnership

More information

EIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director

EIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director EIT ICT Labs Education Systematic Approach to EIT Label Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director Our Education Strategy aims at breeding and attracting top talents EIT ICT Labs Education

More information

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall

More information

< IMPACT > START ACCELERATE IMPACT

< IMPACT > START ACCELERATE IMPACT START ACCELERATE IMPACT IMPACT project has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement n 632828 START ACCELERATE IMPACT WEBINAR #2 Technology

More information

Newsletter LATEST NEWS. www.celarcloud.eu CELAR: THE CHALLENGE

Newsletter LATEST NEWS. www.celarcloud.eu CELAR: THE CHALLENGE Newsletter Automatic, Multi-Grained Elasticity-provisioning for the Cloud NUMBER 1 LATEST NEWS CELARCLOUD.EU REACHES 350 MONTHLY VISITS CELAR: OUTCOME AND IMPACT CELAR: THE CHALLENGE Cloud computing as

More information

ASCETiC Project Market Analysis

ASCETiC Project Market Analysis ASCETiC Project Market Analysis Project Acronym ASCETiC Project Title Adapting lifecycle towards EfficienT Clouds Project Number 610874 Instrument Collaborative Project Start Date 01/10/2013 Duration 36

More information

SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible

SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible You don t. But you can get complete visibility to the cloud

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

This guide is prepared to provide general information on Horizon 2020 Marie Sklodowska Curie Actions Innovative Training Networks (ITN).

This guide is prepared to provide general information on Horizon 2020 Marie Sklodowska Curie Actions Innovative Training Networks (ITN). This guide is prepared to provide general information on Horizon 2020 Marie Sklodowska Curie Actions Innovative Training Networks (ITN).For further information please contact to Marie Curie Team of Turkey

More information

Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group

Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group SAP Services Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group A Journey Toward Optimum Results The Three Layers of HR Transformation

More information

Certified Cloud Computing Professional VS-1067

Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing

More information

Accenture Development Partnerships Cloud Lessons Learned

Accenture Development Partnerships Cloud Lessons Learned Accenture Development Partnerships Cloud Lessons Learned Agenda Introducing Accenture Development Partnerships Speaking The Same Language Best Practices For Cloud Projects Project Based Lessons Learned

More information

Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison Jack.Hanison@capgemini.com

Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison Jack.Hanison@capgemini.com Inside the Cloud The Supporting Architecture of Cloud Computing Jack Hanison Jack.Hanison@capgemini.com What is Cloud Computing? 2 http://www.flickr.com/photos/galego/3131005845/ Is Cloud Computing these

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

Cloud Computing @ SingularLogic:

Cloud Computing @ SingularLogic: Cloud Computing @ SingularLogic: Government cloud services: definitions and best practices Synergies with the private sector Are Greek IT companies able to provide Cloud Services? SingularLogic s Cloud

More information

Presented by Mike Jennings President BEI

Presented by Mike Jennings President BEI Presented by Mike Jennings President BEI Cloud Computing Defined Benefits of Cloud Computing Risks of Cloud Computing When and How to Utilize Cloud Computing Recommendations 2 Cloud Computing Defined 3

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

Graduate School. Online skills training (Research Skills Master Programme) Research Methods. Research methods in the social sciences

Graduate School. Online skills training (Research Skills Master Programme) Research Methods. Research methods in the social sciences Graduate School Online skills training (Research Skills Master Programme) Research Methods Research methods in the social sciences This course begins with an examination of different approaches to knowledge

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Virtualization Specialist Certification Self-Study Kit Bundle Cloud Virtualization Specialist Certification Bundle A Certified Cloud Virtualization Specialist has proven knowledge and proficiency with the technologies, mechanisms, platforms, and practices based upon

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Are You in Control of Your Cloud Data? Expanded options for keeping your enterprise in the driver s seat

Are You in Control of Your Cloud Data? Expanded options for keeping your enterprise in the driver s seat Are You in Control of Your Cloud Data? Expanded options for keeping your enterprise in the driver s seat EXECUTIVE SUMMARY Hybrid IT is a fact of life in companies today. Increasingly, the way to deploy

More information

Energy Efficient Systems

Energy Efficient Systems Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm

More information

Public, Private and Hybrid Clouds

Public, Private and Hybrid Clouds Public, Private and Hybrid Clouds When, Why and How They are Really Used Sponsored by: Research Summary 2013 Neovise, LLC. All Rights Reserved. [i] Table of Contents Table of Contents... 1 i Executive

More information

Developing SAP Enterprise Cloud Computing Strategy

Developing SAP Enterprise Cloud Computing Strategy White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

Editorial NUMBER 01 NOVEMBER 2014. Editorial. Project overview. Reference architecture

Editorial NUMBER 01 NOVEMBER 2014. Editorial. Project overview. Reference architecture NUMBER 01 NOVEMBER 2014 Editorial Project overview Reference architecture Latest project news 1 st scientific workshop Events Publications What s next? Editorial Nowadays Cloud Computing reduces time-to-market

More information

DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Adoption of Cloud Computing Model in Government

DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Adoption of Cloud Computing Model in Government For discussion Paper No. 2/2011 on 22 March 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Adoption of Cloud Computing Model in Government Purpose The Government will be adopting the Cloud Computing 1 Model

More information

Cloud Architect Certification Self-Study Kit Bundle

Cloud Architect Certification Self-Study Kit Bundle rchitect Certification undle Certified rchitect has demonstrated proficiency in the technology architecture that underlies cloud platforms and cloud-based IT resources and solutions, and has mastered the

More information

Analysis of the European Platform-as-a-service Market. The Need for Efficient Application Delivery will Influence PaaS Growth

Analysis of the European Platform-as-a-service Market. The Need for Efficient Application Delivery will Influence PaaS Growth Analysis of the European Platform-as-a-service Market The Need for Efficient Application Delivery will Influence PaaS Growth April 2015 Contents Section Slide Number Executive Summary 5 Key Findings 6

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server Course Code: M20465C Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Data Solution with Microsoft SQL Server Overview The focus of this five-day instructor-led course is on planning

More information

Introduction to Cloud Computing

Introduction to Cloud Computing 1 Introduction to Cloud Computing CERTIFICATION OBJECTIVES 1.01 Cloud Computing: Common Terms and Definitions 1.02 Cloud Computing and Virtualization 1.03 Early Examples of Cloud Computing 1.04 Cloud Computing

More information

HR IN THE CLOUD. Basil Sommerfeld Partner Operations Excellence & Human Capital Deloitte

HR IN THE CLOUD. Basil Sommerfeld Partner Operations Excellence & Human Capital Deloitte HR IN THE CLOUD Basil Sommerfeld Partner Operations Excellence & Human Capital Deloitte Elbekry Abdellah Manager Operations Excellence & Human Capital Deloitte Laura Mihaela Ene Senior Consultant Operations

More information

3-year IDIBAPS HRS4R Action Plan: I. Ethical and professional aspects

3-year IDIBAPS HRS4R Action Plan: I. Ethical and professional aspects 3-year IDIBAPS HRS4R Action Plan: I. Ethical and professional aspects 1. Professional attitude applicable to Researchers. Current status: The institution has not established a systematic protocol for welcoming

More information

2010 Trends to Watch: Cloud Computing

2010 Trends to Watch: Cloud Computing 2010 TRENDS BRIEF 2010 Trends to Watch: Cloud Computing The most important trend of the decade has barely started Laurent Lachal, Steve Hodgkinson, Vuk Trifkovic and John Madden Reference Code: BFTC2534

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Guideline on Implementing Cloud Identity and Access Management

Guideline on Implementing Cloud Identity and Access Management CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National

More information

Guidelines for Applicants

Guidelines for Applicants Guidelines for Applicants CORNET 19 th Call for Proposals Opening National and Regional Programmes for transnational Collective Research between SME Associations and Research Organisations. Closing date:

More information

PaaS Cloud Migration Migration Process, Architecture Problems and Solutions. Claus Pahl and Huanhuan Xiong

PaaS Cloud Migration Migration Process, Architecture Problems and Solutions. Claus Pahl and Huanhuan Xiong PaaS Cloud Migration Migration Process, Architecture Problems and Solutions Claus Pahl and Huanhuan Xiong Cloud Migration Motivation HOW TO MIGRATE TO CLOUD IaaS PaaS SaaS Cloud Migration Definition A

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

TechReady. Are you ready to implement IT solutions? Training and Consulting

TechReady. Are you ready to implement IT solutions? Training and Consulting TechReady Are you ready to implement IT solutions? Tech Ready provides training and consulting services for IT professionals, to enable them to successfully evaluate, plan, build, deploy and operate IT

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Big Data & Its Bigger Possibilities In The Cloud

Big Data & Its Bigger Possibilities In The Cloud Big Data & Its Bigger Possibilities In The Cloud Chhavi Gupta Software Engineer, EMC Corporation Sai Pattem Professional MBA Candidate 2013 August 15 th, 9:30 10:30 AM Session 13860 Room 200 (Hynes Convention

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Cloud Security Specialist Certification Self-Study Kit Bundle

Cloud Security Specialist Certification Self-Study Kit Bundle Cloud Security Specialist Certification Bundle CloudSchool.com CLOUD CERTIFIED Technology Professional This certification bundle provides you with the self-study materials you need to prepare for the exams

More information

IBM Threat-aware Identity and Access Management

IBM Threat-aware Identity and Access Management IBM Threat-aware Identity and Access Management Strategy, Overview and Roadmap Brian Jamison Security Architect/Engineer March 2015 IBM Security delivering a comprehensive framework No. 3 security software

More information

Cisco Cloud Enablement Services for Education

Cisco Cloud Enablement Services for Education Services Overview Cisco Cloud Enablement Services for Education Bringing the Cloud to the Campus In today s higher education environment, IT organizations must keep pace with a long list of competing demands:

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3 11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.

More information

Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library

Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library Sanjay Kulkarni, Chief Expert, Solution Management, Virtualization & Cloud Management May 2013 Customer

More information

Securing Cloud Infrastructures with Elastic Security

Securing Cloud Infrastructures with Elastic Security Securing Cloud Infrastructures with Elastic Security White Paper September 2012 SecludIT 1047 route des dolines, 06560 Sophia Antipolis, France T +33 489 866 919 info@secludit.com http://secludit.com Core

More information

FI-PPP / FI-WARE Open Calls. Pascal Bisson (Thales), Henk Heijnen (Technicolor)

FI-PPP / FI-WARE Open Calls. Pascal Bisson (Thales), Henk Heijnen (Technicolor) FI-PPP / FI-WARE Open Calls Pascal Bisson (Thales), Henk Heijnen (Technicolor) Open Calls European Commission Reserved 12M Euro of project budget for distribution among new partners New partners selected

More information

The Cadence Partnership Service Definition

The Cadence Partnership Service Definition The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues

More information

Extending Enterprise Business Intelligence and Big Data to the Cloud

Extending Enterprise Business Intelligence and Big Data to the Cloud Intel IT Cloud Big April 2014 Extending Enterprise Business Intelligence and Big to the Cloud Executive Overview Access to multiple BI platforms including cloud BI gives flexible, powerful, affordable

More information

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications 2010 Ashton, Metzler, & Associates. All rights reserved. Executive Summary Given the technological and organizational risks

More information

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o

More information

Realize More Success with Software-plus-Services. Cloud-based software from Microsoft Dynamics ERP

Realize More Success with Software-plus-Services. Cloud-based software from Microsoft Dynamics ERP Realize More Success with Software-plus-Services Cloud-based software from Microsoft Dynamics ERP Cloud computing is Internet-based development and use of computer technology. Large central data centers

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT APRIL 27-29, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

SAP Cloud Infrastructure Services Guiding you through your cloud journey

SAP Cloud Infrastructure Services Guiding you through your cloud journey SAP Cloud Infrastructure Services Guiding you through your cloud journey Leveraging the cloud for your SAP environment offers an opportunity to fundamentally transform how your organization operates. If

More information

CloudingSMEs Deliverable D2.2.4 Roadmap reflecting the SMEs

CloudingSMEs Deliverable D2.2.4 Roadmap reflecting the SMEs Deliverable D2.2.4 CloudingSMEs FP7- No. 609604 Deliverable D2.2.1 SMEs Requirements for Cloud Development, Adoption and Evolution CloudingSMEs Deliverable D2.2.4 Roadmap reflecting the SMEs viewpoint

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

Cloud Computing Essentials Course Outline

Cloud Computing Essentials Course Outline Cloud Computing Essentials Course Outline Find out everything you need to know about cloud computing on this 4-day interactive course. About CYBERMODO: CYBERMODO is a professional Education Center that

More information

SAP Business One OnDemand. SAP Business One OnDemand Solution Overview

SAP Business One OnDemand. SAP Business One OnDemand Solution Overview SAP Business One OnDemand SAP Business One OnDemand Solution Overview SAP Business One OnDemand Table of Contents 4 Executive Summary Introduction SAP Business One Today 8 A Technical Overview: SAP Business

More information

XOCHL Cloud Capability. 2012 XOCHL LLC The information contained herein is subject to change without notice.

XOCHL Cloud Capability. 2012 XOCHL LLC The information contained herein is subject to change without notice. XOCHL Cloud Capability 2012 XOCHL LLC The information contained herein is subject to change without notice. Agenda XOCHL Cloud Capabilities The Cloud Technology Stack Cloud Adoption Cycle Overview XOCHL

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service

SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service Chuck Kichler (kichler@us.ibm.com) LEARNING POINTS How to consume the on-premise vs.

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

WELCOME TO OPEN SOURCE STORAGE (OSS)

WELCOME TO OPEN SOURCE STORAGE (OSS) WELCOME TO OPEN SOURCE STORAGE (OSS) COMPLETE SOLUTIONS FOR YOUR DATA MANAGEMENT TM THE OSS DIFFERENTIATION FACTOR_ Open Source Storage is led by Eren Niazi, a technology visionary. He is the thought leader

More information

Cloud Computing Market in Canada 2014-2018

Cloud Computing Market in Canada 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2889824/ Cloud Computing Market in Canada 2014-2018 Description: About Cloud Computing Cloud computing is the use of computing resources

More information

Cloud Computing. ( +971 4 264 4444 7 +971 4 264 8888 * info@etac.ae

Cloud Computing. ( +971 4 264 4444 7 +971 4 264 8888 * info@etac.ae Cloud Computing Learning Path Workshop 1 : Implementing a Private Cloud Solution : Hands-on Seminar : Cloud as a Business Enabler Workshop 2 : Securing the Cloud : Hands-on Best Practices for Secure Cloud

More information

MS 20465C: Designing a Data Solution with Microsoft SQL Server

MS 20465C: Designing a Data Solution with Microsoft SQL Server MS 20465C: Designing a Data Solution with Microsoft SQL Server Description: Note: Days: 5 Prerequisites: The focus of this five-day instructor-led course is on planning and implementing enterprise database

More information

5 FEATURES YOUR CLOUD DISASTER RECOVERY SOLUTION SHOULD HAVE

5 FEATURES YOUR CLOUD DISASTER RECOVERY SOLUTION SHOULD HAVE 5 FEATURES YOUR CLOUD DISASTER RECOVERY SOLUTION SHOULD HAVE 1 5 FEATURES YOUR CLOUD DISASTER RECOVERY SOLUTION SHOULD HAVE EXECUTIVE SUMMARY For organizations managing on-premises data centers, having

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

Custom to Commodity Business & IT in the 21 st century

Custom to Commodity Business & IT in the 21 st century Custom to Commodity Business & IT in the 21 st century We make Commodity IT work No IT Consulting Firm Business perspective Changing the mindsets Supplier eco system Commodity IT Discovery Legal, Privacy,

More information

Cloud creates path to profitability for Australian businesses. A complimentary report from cloud-based business management software provider NetSuite

Cloud creates path to profitability for Australian businesses. A complimentary report from cloud-based business management software provider NetSuite Cloud creates path to profitability for Australian businesses A complimentary report from cloud-based business management software provider NetSuite Introduction Australian businesses are facing a dynamic

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Private Cloud Agile Infrastructure-as-a-Service (IaaS) Cloud potential unleashed Cloud computing at its best Cloud is now an integral part of every IT strategy. It reduces

More information

Cisco Data Center Optimization Services

Cisco Data Center Optimization Services Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization

More information

Capability Paper. Today, aerospace and defense (A&D) companies find

Capability Paper. Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

CloudingSMEs Deliverable D5.5.1 Policy Development Guidelines

CloudingSMEs Deliverable D5.5.1 Policy Development Guidelines CloudingSMEs FP7- No. 609604 WP2 SMEs Vision and Road mapping for Cloud Development Deliverable D2.2.1 SMEs Requirements for Cloud Development, Adoption and Evolution CloudingSMEs PROPRIETARY RIGHTS STATEMENT

More information

Improving the Microsoft enterprise. network for public cloud connectivity

Improving the Microsoft enterprise. network for public cloud connectivity Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness

More information

Mapping and Geographic Information Systems Professional Services

Mapping and Geographic Information Systems Professional Services Mapping and Geographic Information Systems Professional Services G-Cloud Services RM 1557 Service Definition Esri UK GCloud 5 Lot 4 Specialist Services Government Procurement Service Acknowledgement Esri

More information