Cloud Sourcing New Market Dynamics Require Changes To Sourcing Strategy. Gaetano Santucci November 2012
|
|
|
- Rosemary Horn
- 10 years ago
- Views:
Transcription
1 Cloud Sourcing New Market Dynamics Require Changes To Sourcing Strategy Gaetano Santucci November 2012
2 Four powerful dynamics are reshaping the IT services ecosystem The innovation revolution The tech industry is entering a period of unprecedented change. Technology is shaping the business. As-a-service becomes the norm New pricing and delivery models change how and from whom services are sold and provisioned. Changing user demographics and decision structures The rise of the business influencer and the digital native Innovation moving to the edge/the rise of social and mobile Innovation shifts from core applications to the edge of the enterprise and analytics. 1
3 Business wants: A place to experiment Fast integration Looser IT restrictions Responsiveness Faster time-to-market The need for speed fuels the IT-business disconnect IT wants: Plenty of notice Predictability Stability Justification Controls 2
4 The state of the art of SaaS Main benefits perceived by the users Concerns about SaaS is decreasing ( ) Europe SaaS main fields of applications (public sector included) improved business agility focalization of resources speed of implementation faster delivery of new features and functions lower overall costs reduction of doubts related to security, integration, performance, costs and complexity fear of financially and operational lock-in with a unique vendor Collaboration Customer Relationships Management Human Resource Management Asset management Claim management The SaaS outpaces other ICT services, with an increase factor higher than the growth rate of other traditional services 3
5 The balance is shifting between traditional and emerging services Application development (agile, mobile, modernization) IT consulting (strategy, business process consulting, change management) System integration (packaged apps implementation, apps integration) Outsourcing (mainframes, networks, data centers, desktops, applications) Traditional services Emerging services Data consulting services (implementation design, integration) Data outsourcing services SaaS seats Saas implementation Public cloud implementation and consulting Security project work/consulting Security managemet services Services integration Services orchestration Product dev services (R&D, SW and embedded systems) 4
6 What does this mean for Sourcing? New stakeholders and decision structures New and different stakeholder requirements Radically different marketplace and vendor capabilities Last year s sourcing strategy will not meet this year s needs. 5
7 Knowing the criteria for sourcing s Involvement will be a key skill Empowered Business Zone Intermediate Business Zone Core Business Zone Localized impact on business Risk can be BOUNDED Need for speed primary Localized impact on business Risk can be MANAGED Moderate agility required High business impact High Risk Agility least important 6
8 The continuum of sourcing empowerment Empowered Business Zone Intermediate Business Zone Core Business Zone Sourcing and IT educates and provides backstop when required Sourcing and IT as educator and consultant Inspector Sourcing and IT leads sourcing lifecycle Full risk assessment Ongoing contract compliance Measure value Audit value 7
9 Key areas of SaaS contract negotiation Type Pricing Data usage and access Business continuity Security Support Exit clause Usage based or user-based Term or pay-as-you-go Key issues/recommendations Regular access to data define format and frequency of backup Ability to get data back at termination of contract How is the vendor allowed to use your data during relationship How long should the vendor keep your data post-relationship Nightly backups of customer data are typical Look for multiple data centers in multiple locations Find out annual (or better) testing of disaster recovery plan Look for audits such as SSAE 16, ISO 27001, and industry-specific, such as FISMA or PCI Password compliance, logs and audit trails Physical and electronic security Right to customer audit. Define hours, modes, escalation, governance, response time, definitions of severity For cause and for no cause, make sure to detail notification windows/minimums and fees (if any) 8
10 Thank you Gaetano Santucci Consip S.p.A. Director of Competence Center
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples
Amazon Web Services Agenda - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples How did Amazon Get into Cloud Computing? On-Premise
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Amazon Web Services. For Government, Education, and Nonprofit Organizations. Jakob Huhn. [email protected]. Partner Manager Benelux, Public Sector
Amazon Web Services For Government, Education, and Nonprofit Organizations Jakob Huhn Partner Manager Benelux, Public Sector [email protected] 2015, Amazon Web Services, Inc. or its Affiliates. All rights
Accelerate the journey to your Cloud
Accelerate the journey to your Cloud Atos, EMC and VMware strategic alliance Presentation - February 15 th, 2012 Copyright 2011 EMC Corporation. All rights reserved. 1 Our clients are facing 3 new key
Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC [email protected]
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC [email protected] What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net
Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group [email protected] Twitter @PeterDReynolds The Hardware Layer
Hybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
CLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
Contact Centers in the Cloud: A Better Way to Source
Contact Centers in the Cloud: A Better Way to Source By Irwin Lazar Vice President and Service Director, Nemertes Research Executive Summary Contact Center Software as a Service (CCSaaS) solutions provide
Case Study Cloud Computing
Case Study Cloud Computing Rotterdam Juli 2013 Robeco Ton Ligtvoet, Manager IT Contracts and Infra Projects For institutional investors 1 Facts and figures Robeco IT Servicing Asset Management, Pension
The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!
The agile Cloud Brokerage approach An innovative, business aligned and mature IT services delivery model! CLOUD BROKER DEFINITION as defined by the NIST A Cloud Broker is an entity That manages the selection,
Cloud Computing. Nahil Mahmood. CEO, Delta Tech Founder & President, CSA
Cloud Computing Nahil Mahmood CEO, Delta Tech Founder & President, CSA Nahil Mahmood Profile CEO & Founder of Delta Tech Global Received (ISC)2 Asia-Pacific Information Security Leadership Award (2012)
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
SAP HANA Cloud Platform Frequently Asked Questions - Business
SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform 1. What is SAP HANA Cloud Platform? SAP HANA Cloud Platform, the in-memory Platform-as-a-Service offering from SAP,
CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Environments
Research Report CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Introduction File transfer sounds simple, right? Sending a file from here to there is not something that information
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business
Tips For Buying Cloud Infrastructure
27 Tips For Buying Cloud Infrastructure A Comprehensive list of questions to ask yourself when reviewing potential cloud providers By Christopher Wilson @chrisleewilson Table of Contents Intro: Evaluating
The Fastest Path to the Cloud Building Your SaaS Company on Force.com
The Fastest Path to the Cloud Building Your SaaS Company on Force.com Kai Mäkelä salesforce.com [email protected] Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs
Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business
The Gotchas of Cloud-Based
leading thoughts / may 2013 The Gotchas of Cloud-Based Contact Center Solutions Take a dose of caution when moving to a cloud-based solution. Lessons learned from early adopters. By Ken Barton, Strategic
Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ
Delivering Cloud Services Transformation : Plan > Build> Assure> Secure Stephen Miles Vice President, Solution Sales, APJ Agenda Cloud is Great, Cloud is Good More Options, More Complexity From Outlier
Data Protection & Cloud. Corradino Milone PreSales Commvault Italia
Data Protection & Cloud Corradino Milone PreSales Commvault Italia Snapshot of Commvault Established in 1996, headquartered in New Jersey, USA Over 2,000 employees operating across six continents More
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
Software Enabled Creative Destruction. Jason Jackson, Field CTO, Pivotal
Software Enabled Creative Destruction Jason Jackson, Field CTO, Pivotal A New Era Begins Digital Transformation Jason K Jackson CTO Asia Pacific & Japan @jasonkjackson A new era begins at the demise of
A Strategic Approach to Meeting the Demand for Cloud
White Paper For Cloud Providers A Strategic Approach to Meeting the Demand for Cloud Introduction: New Customer Challenges Propel Cloud Adoption In a dynamic business environment, enterprise customers
VCE BUSINESS UPDATE AND OVERVIEW
VCE BUSINESS UPDATE AND OVERVIEW October, 2014 BUSINESS UPDATE VCE is a privately held company funded by Cisco, EMC, VMware, and Intel 2000+ employees globally, with manufacturing operations in the US
Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)
Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms. In a tale
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
APPLICATION-CENTRIC SOLUTIONS FOR A CLOUD-EMPOWERED ENTERPRISE
APPLICATION-CENTRIC IaaS SOLUTIONS FOR A CLOUD-EMPOWERED ENTERPRISE Changing fast, acting smart and innovating quickly are what enable organizations to get ahead and stay ahead of the competition. Today,
Cloud Computing Evolution Not Revolution
Cloud Computing Evolution Not Revolution Craig Magee Head of Global Infrastructure Strategy & Architecture ANZ Banking Group 26 November 2010 Cloud Computing Evolution Not Revolution Ontology Evolutionary
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The image part with relationship ID rid2 was not found in the file. Insight
Adopting Cloud Computing with a RISK Mitigation Strategy
Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager
Expand Your Infrastructure with the Elastic Cloud Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager Today we re going to talk about The Cloud Scenarios Questions You Probably
Orchestrated. Release Management. Gain insight and control, eliminate ineffective handoffs, and automate application deployments
Orchestrated Release Management Gain insight and control, eliminate ineffective handoffs, and automate application deployments Solution Brief Challenges Release management processes have been characterized
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
White Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
Move your business into the Cloud with one single, easy step.
The Cloud Desktop For Business Unify Your Business IT Experience Move your business into the Cloud with one single, easy step. Secure all your apps & data in one place. What is OS33 Cloud Desktop for Business?
Cloud Deployment Models. Kirk Kern CTO Cloud Solutions NetApp US Public Sector
Cloud Deployment Models Kirk Kern CTO Cloud Solutions NetApp US Public Sector Application Delivery Model Changing Boundary-less IT Infrastructure as a Service Backup as a Service DR as a Service Compute
Cloud Computing: Background, Risks and Audit Recommendations
Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.
Clarity in the Cloud Defining cloud services and the strategic impact on businesses. Table of Contents Executive Summary... 3 Cloud Services... 4 Clarity within the Cloud... 4 Public Cloud Solution...
HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
ALIGNING BUSINESS STRATEGY TO CLOUD APPLICATIONS
ALIGNING BUSINESS STRATEGY TO CLOUD APPLICATIONS AGENDA Introductions Business challenges Cloud answers Organization adoption Migration to Cloud Governance, risk and compliance Panel discussion Summary
Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services
Building High Growth Services on the Microsoft Cloud Platform Rich Cannon Senior Director, US Partner and Cloud Services Momentum 35% YoY revenue growth Hosters are largest contributor across all partner
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014 What do the experts say? 3 4 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated
Services Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
Avnet's Guide to Cloud Computing
Avnet's Guide to Cloud Computing Reimagine Transform Accelerate Cloud Computing from A Z Avnet can help you reduce complexity by understanding the terminology and phrases associated with cloud computing.
ITSMF UK. 150 Wharfdale Road, Winnersh Triangle, Wokingham, RG415RB, United Kingdom. Tel: +44 (0) 118 918 6500 Fax: +44 (0) 118 969 9749
ITSMF UK 150 Wharfdale Road, Winnersh Triangle, Wokingham, RG415RB, United Kingdom Tel: +44 (0) 118 918 6500 Fax: +44 (0) 118 969 9749 Lance Mitchell Allen Systems Group ITSM and the Cloud Are cloud implementations
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Pharma CloudAdoption. and Qualification Trends
Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for
Contingency Plan for HIPAA
TEMPLATE SUITE FOR BUSINESS CONTINUITY PLAN FOR SMALL BUSINESS (LESS THAN 50 EMPLOYEES) INCLUDES Total Cost: $549 Business Impact Analysis Enterprise Business Impact Analysis Survey Short (15 pages) Example
The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution
BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................
PERFORMANCE Technologies A.E. June 2015
PERFORMANCE Technologies A.E. June 2015 2 The Company PERFORMANCE TECHNOLOGIES S.A. is a specialist IT company with leadership position in highly prospective niche markets Provider of IT Solutions & Services
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges
"Service Lifecycle Management strategies for CIOs"
"Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
How To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
Seamless adaptive multi-cloud management of service-based applications
Seamless adaptive multi-cloud management of service-based applications Open solution brings Interoperability & Portability to PaaS The future of Cloud computing: Elasticity, Legacy Support, Interoperability
Best Practices for Building Mobile Web
Best Practices for Building Mobile Web and Hybrid Applications Mobile is the NEXT dominant phase of computing Mobile is different: Transformational business models Faster lifecycles More iterative Mobile/Wireless/Cloud
PAC Multi-Client Study 2014. Applications Modernization: The path to Omni-channel retail
PAC Multi-Client Study 2014 Applications Modernization: The path to Omni-channel retail What is Applications Modernization? Old World Fragmented application estates, sprawl caused by M&A activity, globalization
LEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
Hot Topics in IT. CUAV Conference May 2012
Hot Topics in IT CUAV Conference May 2012 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.
FINANCIAL SERVICES DEPLOYMENTS. Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio
FINANCIAL SERVICES DEPLOYMENTS Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio http://aka.ms/yungchou http://aka.ms/yc @yungchou The 5-3-2 Principle
