Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone
|
|
- Edmund Strickland
- 7 years ago
- Views:
Transcription
1 Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone
2 Contents Contents Significance of SMEs in Urban Development SME Status Quo IT Capabilities of SMEs Government Support for SMEs isoftstone & Huawei SME Service Platform Using the Platform to Serve SMEs Platform Highlights Page 1
3 Significance of SMEs in Urban Development (1/2) Small and Medium Enterprise (SME): SMEs are companies whose personnel numbers fall below certain limits. Small enterprises outnumber large companies and employ more people. SMEs are also said to drive innovation and competition in many economic sectors. This lecture talks about SMEs in China. SMEs must meet any of the following conditions: Workforce: < 2000 Sales volume: < CNY300 million Total asset: < CNY400 million SME Medium enterprises must have 300+ employees, CNY30+ million sales volume, and CNY40+ total asset. Page 2
4 Significance of SMEs in Urban Development (2/2) Contributing half of the national economy Absolute advantage in quantity: > 98% of total enterprises in China Support forces of economic growth: about 60% of GDP in terms of production and service value Major employment channel: > 75% of total employment in urban areas Important source of technical innovations: strong awareness, fast action Important support for local development: main income channel for residents, main source of local revenue Basic forces of economic reform: actively participating in market competition and promoting industrial structure upgrade Page 3
5 SME Status Quo Difficult financing High production cost Poor technical capability Backward management Blind production expansion Page 4
6 IT Capabilities of SMEs Capital, talent, and time: posing mounting pressures on IT development in SMEs Selfbuilt IT system Capital OA: 9 months CRM: 12 months ERP: 15 months Limited IT investment High hardware cost High maintenance cost Construction Process Equipment room, power supply, network, etc 150 Server, storage, system, and database 100 Cost (CNY thousand) Information software procurement 50 to 200 Annual wage for professional maintenance personnel 60 Talent Time Requiring professional personnel to implement IT projects and perform O&M Difficult to introduce talent that knows both technology and management, which is a major bottleneck to IT development for SMEs Required processes, such as service survey, system design, development, and testing, consume a couple of months and even years IT system construction periods cannot keep up with changing business needs due to rapid growth of SMEs Page 5
7 Government Support for SMEs Work Outline for 2014 SME Innovation and IT Development 1. Plan for building innovation capabilities for SMEs 2. Project for promoting intellectual property strategies for SMEs 3. Project for promoting IT development for SMEs Determine about 10 SME IT service platforms with a significant influence and driving functions, organize service resources, and aggregate application software for SMEs to improve capabilities in: R&D, design, operation, management, marketing, information sharing, financing, and talent training. Promote e-commerce transaction and service platform building, encourage IT service providers to implement professional plans, and allow for SMEs to create business models using e-commerce. Explore and promote cloud computing, Big Data, and mobile Internet technologies to provide smart terminals, cloud services, Software as a Service (SaaS), and service outsourcing for SMEs. Strengthen promotion: Host the 2014 SME IT service press conference as well as SME IT development forum and promotion activities at the Central China Investment and Trade Expo. Page 6
8 isoftstone & Huawei SME Service Platform: Functional Architecture Application providers provide products to form an application supermarket Enterprise application software SME Service Platform Enterprise customer Enterprise customers select applications to suit their needs Share software and hardware, resources, products, and services, and provide voice and data communication as well as industry applications for SMEs. SMEs can easily use cloud applications via cloud leasing and on-demand payment based on existing computers and networks without adding IT software or hardware. Such flexibility meets a variety of business needs, including e- commerce as well as production, sales, office, and personnel management. Page 7
9 isoftstone & Huawei SME Service Platform: Technical Architecture Network management interface Billing interface Software as a Service (SaaS) ISV portal Finance Operation management portal SaaS applications Application supermarket OA SaaS application: enterprise-level application API: standard interface for SaaS applications and platforms Field work PSI CRM Meeting assistant Sales Platform as a Service (PaaS) Communication capability Operating system Database PaaS Web middleware Payment capability J2EE running environment Open communication capability: encapsulating communication capabilities as IT services Diverse environments: development, testing, basic operation, and service operation Virtualized platform Physical resources Infrastructure Virtual server resource pool Virtual storage resource pool Virtual network resource pool Server Storage Network Cabinet, power supply, and air-conditioner Infrastructure as a Service (IaaS) Resource pool: physical and virtual resources Resource management and scheduling: elastic scheduling and management of virtual resources Page 8
10 Needs Solutions Using the Platform to Serve SMEs (1/4) Public cloud service platform: an effective approach for SMEs to achieve business transformation Ideally meets SMEs' five needs for IT systems: cost-efficiency, on-demand delivery, simple deployment, easy management, and flexible expansion. Limited capital Cost priority Cost- efficiency SMEs can lease the service platform without purchasing software or hardware Uncertain and unpredictable business growth Limited energy and capability for IT development Lack of professional IT technicians Changing IT development needs On-demand delivery Simple deployment Easy management Flexible expansion SaaS The business model based on on-demand delivery allows SMEs to pay for only what they have used. The platform leverages cloud computing to provide rich storage and computing capabilities as well as application systems. System O&M is implemented by the platform provider. The platform ensures sufficient openness and flexible expansion. Page 9
11 Using the Platform to Serve SMEs (2/4) What services can cloud computing provide for SMEs? Hardware IT resource integration SAAS Software as a Service Office, marketing, and production operation management software, engineering design and instant messaging software... Communication capability integration PAAS Platform as a Service Legitimate software development environment, SMS/MMS, positioning, and payment Application software and service integration IAAS Infrastructure as a Service Cloud host, storage, operating system, application server, and database Meeting assistant Field work app Wage app SMS Development environment Payment Cloud host Cloud storage Cloud database Page 10
12 Using the Platform to Serve SMEs (3/4) Rich, featured applications: bringing a wide range of benefits to SMEs Cloud resources Office management Production management Marketing management Use virtualization technology to converge IT resources and provide computing resource infrastructure services that can be used by SMEs on demand, including host service, elastic computing, storage backup, and network service. Typical applications: Site deployment, cloud host, cloud storage, and cloud firewall Build a private cloud platform to provide innovative paperless office solutions for SMEs to enable information sharing and work management. Typical applications: OA, meeting assistant, meeting cloud, enterprise microblog, and approval e- flow Use the e-government cloud platform to provide mobile IT solutions for SMEs to improve production and management efficiency. Typical applications: Field work app, wage app, Skyeye, cloud monitoring, and property management Leverage cutting-edge IT technologies of the cloud platform to keep SMEs abreast of customer information, seize business opportunities, and scientifically and quantitatively manage marketing activities. Typical applications: PSI, CRM, and cloud sales Page 11
13 Using the Platform to Serve SMEs (4/4) Promote effective information resource utilization and improve enterprise efficiency and productivity Arrive at the site and sign on via the field work app Record customer visits and give feedback Log in to a mobile office app Check to-dos 10:00 Process s 7:50 8:30 Instant communication Hold a call meeting with colleagues 10:30 11:00 Invite customers to dinner Submit an expense request Determine the next visit Sign off via the field work app 12:00 18:00 Arrange work for the next day 17:00 15:00 Check the PSI View real-time operation data Log in to the enterprise portal Check the wage via the wage app 20:00 Learn about latest information 21:30 Page 12
14 Platform Highlights (1/3) Complete operation support Service integrator (SI) News Unit User isoftstone & Huawei SME Service Platform Customer Application Log Responsibilities Position Subscription Product Resource Basic data Vault mode Menu Complete user and rights management Basic system data management Complaint Appraisal Customer, subscription, complaint, demand, and application assessment management, statistical report Demand Application assessment Statistical report Settlement Troubleshooting SI, application, product, resources, appraisal, settlement, and troubleshooting management Page 13
15 Cloud security support system Cloud security level specifications Platform Highlights (2/3) Platform features: more secure and robust Data security: Perform rights management, data encryption, periodical archiving, and internal backup or backup to external storage devices. Network security: Leverage multiple network security technologies, such as firewall, antivirus, vulnerability scanning; and technical measures to restrain inter-network access. Periodical backup: Perform online and offline data backup at regular intervals, and holistic remote backup. System security: Use latest security technologies to ensure system security and perform timely updates; and provide 24/7 system O&M to detect and rectify problems. Application security Terminal security Cloud security model Authentication & access control Internet Cloud terminal user Content audit Platform security Authentication & access control Monitoring & warning Data protection IPS Firewall Virtual isolation Physical security Cloud audit Monitoring & warning Physical protection Infrastructure protection Cloud computing center Cloud storage system Cloud security system Page 14
16 Real-time monitoring and log service Security testing and analysis Cloud security protection system service Technical support System support Platform Highlights (3/3) Provide holistic security protection services for SMEs 4A management: Perform equipment room, password, risk assessment, security audit, contingency plan, and backup management. Vault mode: To prevent information leakage, the system triggers "vault" management operations when operators perform data maintenance. Only authorized and verified operators can continue operations. Network security: Implement 24/7 monitoring to detect major security events in a timely manner. Security protection: Support network access through an encrypted VPN. Monitoring system: Perform vulnerability scanning, web page tamper resistance, and Internet content audit. Terminal security: Provide a unified authentication platform; complete account lifecycle management; and diverse security authentication modes, including static/dynamic passwords and SMS. Advanced security service Access control Tenant isolation Sharing among tenants Collaboration Role management Data security Key management Data encryption Ciphertext search Hybrid coding Virtual resource management Fault diagnosis Service backup & recovery Responsibility identification Vulnerability analysis Basic security service Account management Authorization management Rights management Data verification Privacy protection Fault tolerance Behavior recognition Resource monitoring Security audit Page 15 Cloud platform Cloud storage Cloud VM Cloud service Cloud data
17 THANK YOU Copyright 2014 Huawei Technologies Co., Ltd. All Rights Reserved. The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.
Public Sector Cloud Services - The Telecom Perspective
Cloud for Europe Conference Berlin, November 14-15, 2013 www.huawei.com www.huawei.com Public Sector Cloud Services - The Telecom Perspective Abdellatif Benjelloun Touimi, Corporate Industry & Standards
More informationApply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu. Pan Yang Deputy Director of Promotion Division, Chengdu, PRC
Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu Pan Yang Deputy Director of Promotion Division, Chengdu, PRC Overview of IT and Industry Convergence (1/2) March 2013 According
More informationThe Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationTENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
More informationResearch on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationDeploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
More informationHow To Create A Network Access Control (Nac) Solution
Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security
More informationExploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationYour Voice is Critical. OpenScape Enterprise voice solutions gives power to voice
Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication
More information20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in ho2099@sib.co.in A monthly publication from South Indian Bank 20 th Year of Publication Experience
More informationCommercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
More informationCloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
More informationUnited Security Technology White Paper
United Security Technology White Paper United Security Technology White Paper 1 Challenges...6 1.1 Security Problems Caused by Mobile Communication...6 1.2 Security Fragmentation Problems...8 2 United
More informationCloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
More informationCredit Unions and The Cloud. By: Chris Sachse
Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!
More informationSecurity Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
More informationSecurity Level: HUAWEI TECHNOLOGIES CO., LTD.
Security Level: www.huawei.com Pedro Gomez Miranda Enterprise Chief Technology Officer Huawei Enterprise Northern Latin America Region pedro.gomez@huawei.com HUAWEI TECHNOLOGIES CO., LTD. Understanding
More informationTime to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
More informationBridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.
Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff
More informationManagement of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
More informationFujitsu s Approach to Platform as a Service (PaaS)
Fujitsu s Approach to Platform as a Service (PaaS) Shoji Wajima Software as a service (SaaS) has been deployed primarily for general-purpose applications, but recently it has been increasingly used for
More informationElectronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
More informationWhite Paper: Optimizing the Cloud Infrastructure for Enterprise Applications
White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications 2010 Ashton, Metzler, & Associates. All rights reserved. Executive Summary Given the technological and organizational risks
More informationHow cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationQuattra s Cloud Vision & Framework Value
Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant
More informationHow to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
More informationSaaS A Product Perspective
SaaS A Product Perspective Software-as-a-Service (SaaS) is quickly gaining credibility and market share against traditional packaged software. This presents new opportunities for product groups and also
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationcloud computing by Orange séminaire Aristote 17/12/2009
cloud computing by Orange séminaire Aristote 17/12/2009 Orange and the cloud vision and strategy cloud computing - what is it about? cloud computing is a model for enabling convenient on-demand network
More informationYour Voice is Critical. OpenScape Enterprise voice solutions gives power to voice
Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication
More informationOnX Oracle Cloud Services
OnX Oracle Cloud Services BUSINESS CHALLENGES There are several business challenges that drive the cloud discussion and cloud infrastructure market. These business challenges are very different from the
More informationICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
More informationWhere in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationTHE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
More informationPublic Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
More informationCloud Standards - A Telco Perspective
Cloud Standards - A Telco Perspective Abdellatif Benjelloun Touimi abdellatif.benjelloun@huawei.com Corporate Standards Department www.huawei.com TEN YEARS OF CONNECTING EUROPE HUAWEI TECHNOLOGIES CO.,
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationIBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader
Cloud Getting hold Computing of the cloud: for a & Cloud Computing Smarter Planet John Easton UK & Ireland Cloud Computing Technical Leader Copyright Corporation 2010 Cloud is important to Corporation
More informationCloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5
Cloud Computing: The atmospheric jeopardy Unique Approach Unique Solutions Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Background Cloud computing has its place in company computing strategies,
More informationCloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
More informationITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationCLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
More informationCLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
More informationCloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
More informationFujitsu s Approach to Cloud Computing
Fujitsu s Approach to Cloud Computing Kenta Miyazawa Cloud computing (hereafter cloud or clouds) has come to be specifically used in various fields. Private clouds are used in enterprises. Groups and individuals
More informationSAP HANA Cloud Platform Frequently Asked Questions - Business
SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform 1. What is SAP HANA Cloud Platform? SAP HANA Cloud Platform, the in-memory Platform-as-a-Service offering from SAP,
More informationCLOUD COMPUTING DEMYSTIFIED
CLOUD COMPUTING DEMYSTIFIED Definitions you ve been pretending to understand JACK DANIEL, CCSK, CISSP, MVP ENTERPRISE SECURITY Definitions Words have meaning, professionals need to understand them. We
More informationStandardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationHuawei Enterprise UC&C Product and Solution Guide. -Mobility, Video Integration, and Cloud Collaboration HUAWEI TECHNOLOGIES CO., LTD.
Huawei Enterprise UC&C Product and Solution Guide -Mobility, Video Integration, and Cloud Collaboration HUAWEI TECHNOLOGIES CO., LTD. A Better Way UC&C Product Line Huawei enterprise service business group
More informationADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT
ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT 2 CLOUD SOLUTION Cloud/hosted software spending by nonprofits and associations increased by 43% while technology hardware
More informationTable of Contents. About the book. Copyright. Preface. About the author. Cloud Computing. Amazing Types of Cloud Computing
Table of Contents About the book Copyright Preface About the author Cloud Computing Amazing Types of Cloud Computing Top Reasons Why Should We Adopt Cloud Pros and Cons of Business Cloud Computing 5 Tips
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationCloud, Community and Collaboration Airline benefits of using the Amadeus community cloud
Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud Index Index... 2 Overview... 3 What is cloud computing?... 3 The benefit to businesses... 4 The downsides of public
More informationHow To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
More informationHuawei Smart Education Solution
Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies
More informationManaged Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
More informationOracle Cloud Computing Strategy
Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationStrategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
More informationICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
More informationNET ACCESS HIPAA COMPLIANT FLEXCloud
Page 0 2015 SOLUTION BRIEF NET ACCESS HIPAA COMPLIANT FLEXCloud A Managed Infrastructure Solution that Meets the Regulatory Demands of the Health Care Industry NET ACCESS LLC 9 Wing Drive Cedar Knolls,
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationSecurity & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
More informationInnovative Architectures For Cloud Data Centers
Innovative Architectures For Cloud Data Centers Cloud computing has ushered in a new era for data centers. Huawei offers efficient, flexible, and innovative cloud data centers and delivers extensive project
More informationThe Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
More informationCommunications in the Cloud Why It Makes Sense for Today s Business
Communications in the Cloud Why It Makes Sense for Today s Business Unified communications delivered in the cloud can help businesses of all sizes address many collaboration and communications challenges.
More informationAddressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
More informationCloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
More informationCloud computing and SAP
Cloud computing and SAP Next Generation SAP Technologies Volume 1 of 2010 Table of contents Document history 1 Overview 2 SAP Landscape challenges 3 Infrastructure as a Service (IaaS) 4 Public, Private,
More informationOffice of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
More informationEAaaS Cloud Security Best Practices
EAaaS Cloud Security Best Practices A Technical White Paper by Sennovate Inc Jan 2013 EAaaS Cloud Security Best Practices Page 1 Introduction: Cloud security is an ever evolving subject that is difficult
More informationCloud Infrastructure Security
Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria dvelev@unwe.acad.bg 2 Institute of Control and
More informationSeeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
More informationTrust but Verify. Vincent Campitelli. VP IT Risk Management
Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify
More informationManaging the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models
Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models A Guide to Cloud Computing Costs, Server Costs, Pricing Plans, and Chargeback Implementation and Systems Introduction
More informationOracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
More informationThe Partnership. You Can Count On. Seth Pomeroy, Partner NDH Group, Ltd May, 2015
The Partnership You Can Count On Seth Pomeroy, Partner NDH Group, Ltd May, 2015 1 Proposed Agenda The Value of Cloud Financial Management Systems & Reporting Prospective Review: Gain a mutual understand
More informationAre You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform
More informationThe Enterprise Journey to a Cloud based Data Centre
Security Level: The Enterprise Journey to a Cloud based Data Centre www.huawei.com Author/ Email: Neo Teck Guan/ teckguan.neo@huawei.com Version: V1.0 (20131113) HUAWEI TECHNOLOGIES CO., LTD. Content 1.
More informationCloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
More informationTrademark Notice. General Disclaimer
Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment
More informationClouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
More informationPublic, Private, Hybrid:
Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud
More informationCloud Computing - Benefits and Barriers for Retail Adoption
Original Published Research from Cobweb Solutions - Europe s Leading Cloud Services Provider Cloud Computing - Benefits and Barriers for Retail Adoption 28022011 v1.5 written by Ed Dixon Director of Enterprise
More informationBuilding a SaaS Application. ReddyRaja Annareddy CTO and Founder
Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings
More informationLocation Information Services Web Portal from AT&T. Workforce Management Industry Brief. Mobile Marketing Portfolio
Location Information Services Web Portal from AT&T Workforce Management Industry Brief Mobile Marketing Portfolio Employee Asset Tracking in the Palm of Your Hand The AT&T Location Information Services
More information