Gartner Catalyst Conference Trip Report. Overview
|
|
|
- Amber Hubbard
- 10 years ago
- Views:
Transcription
1 Gartner Catalyst Conference 2014 Architecting the Digital Business How to Use and Secure Cloud, Mobile and Data Trip Report The Gartner Catalyst Conference was held on June 2014 at the Lancaster London hotel, London, UK. This report summarizes and provides highlights from the event. Overview For its first full-fledged edition in Europe, the Gartner Catalyst Conference didn t disappoint, with over 200 attendees from all over Europe gathering for 2 days of intense learning with 16 Gartner analysts and guests speakers from Volvo, BBVA, ICA and NS Dutch Railways. As the theme announced it was all about architecting and securing mobile, cloud, and data for the teams of architecture, infrastructure, security or applications professionals represented at the event. Presentations and roundtables were packed, and so was the schedule of private meetings with the Gartner analysts. The European audience was able to experience brand new Gartner for Technical Professionals, helping them understand, and flesh out an action plan, for the digital transformation under way. Save the date The Gartner Catalyst Conference 2015 will take place on September in London, UK. We hope to see you there! The future is present here, in London, with Gartner Catalyst. Mobility, cloud services, identity and big data are the success! Jose Luis Montero, Backoffice Manager, UPCnet Table of contents Lancaster London hotel Drue Reeves delivers the Gartner Opening Keynote 2 Keynote sessions 3 Top 5 best-rated sessions 3 Top 5 most-attended sessions 3 Attendee Snapshot 4 Recommendations from selected sessions 9 Sponsors 9 Post-event resources 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner and ITxpo are registered trademarks of Gartner, Inc. or its affiliates. For more information, [email protected] or visit gartner.com. 1
2 Gartner Catalyst Conference 2014 Keynotes Opening Gartner Keynote: Architecting the Digital Business: A Blueprint for Competitive Advantage Drue Reeves, VP, Distinguished Analyst, Gartner In his opening keynote, Drue Reeves described how mobility, cloud and big data are connecting people, machines and devices in unprecedented numbers, transforming technology from a business tool to the very medium in which business is conducted. To create competitive advantage, technical professionals must find new ways to capture, analyze, communicate and protect information all within a framework that supports new markets, new models and new customer behaviors. He explained: The architecture necessary to support the scale of a digital enterprise How to leverage Cloud, Mobility, and Data to create a competitive advantage The risks associated with tons of devices connected to the Internet How do we store and gain intelligence from the deluge of data He was joined by Jonas Rönnkvist from Volvo, who provided a real world example of the convergence of technologies to create new products and services, the disruptive power of the internet of things on even the most established enterprises business models. Drue Reeves VP, Distinguished Analyst Guest Keynote: The Future Surviving and Thriving in a Constantly Changing Reality Rohit Talwar, Futurist In this far ranging, inspiring and humorous talk, global futurist and award winning speaker Rohit Talwar took us on a tour of key forces, factors and advances in technology shaping our world over the next decade. He discussed the implications for individuals, organizations and governments and the way in which we design, plan and manage technologies. Clearly he saw the next 5-10 years bring about a greater level of change than the last fifty. From 3D printed buildings, robot employee of the months, to the implication on marriage of 120 year lifespan and brain implanted chips he highlighted how science and technology will play a critical role in this transformation from information to biological age, mapping and uploading of the human brain, emergence of new materials, the quest for radical life extension and the pursuit of immortality. He challenged the audience to respond to these forces and developments and using IT to help create the muscle, magic and mindset required to survive in a transformational era. In this thought rovoking keynote, Rohit provided a inspiring and at times scary! vision of the next 5 to 25 years. He explored how sustabinability, growth and From 3D printed buildings to robot employees of the month, Rohit Talwar Futurist Closing Keynote: Architecting the Digital Business: What to Do on Monday? Drue Reeves, Eric Maiwald, Kyle Hilgendorf, Michael Disabato, Carlie Idoine, Gartner To wrap up the conference, four Gartner analysts presented the most important strategies and takeaways that attendees should take back to their organizations to improve current projects and practices, and influence future plans. They highlight the convergence of mobile, cloud, and data technologies, how they influence each other, and how to protect the data and infrastructure in the digital organization. 2
3 Top 5 best-rated sessions: What did you miss? 1. Why Private Clouds Keep Failing (And What To Do About It) Alan Waite, Research Director 2. Devising Your Cloud Application Decision Making Framework Drue Reeves, VP, Distinguished Analyst 3. Security and SDN: Implementation Considerations Eric Maiwald, Research VP 4. Case Study: Adopting Consumerization and Mobility for Cost, Agility, and Customer Service Rob Zouteriks and Roy Cornelissen, NS Railways 5. Keep Privacy in Mind When Developing Mobile Protection Programs Trent Henry, Research VP Top 5 most-attended sessions: What s on everyone s mind? Very interesting conference highlighting important current and future topics. The exchange with the analysts and colleagues from around Europe inspired me. Markus Moltenbrey, IT Solutions Architect, ResMed 1. Cloud Services: The Foundation for the Digital Business Kyle Hilgendorf, Research Director 2. To the Point: Cloud Application Integration Strategy: Spanning Cloud and On-Premises Services Gonzalo Ruiz, Research Director 3. The Underpinnings of a Successful Mobile Strategy Michael Disabato, Research VP 4. Devising a Cloud Exit Strategy: Proper Planning Prevents Poor Performance Kyle Hilgendorf, Research Director 5. To The Point: Insights on Mobile Security: What Works for Mobile Strategy Eric Maiwald, Research VP Snapshot of attendees Who participated in the 2014 conference? Top 5 job roles 1. Architecture 2. Innovation/Tech Strategy 3. Service Management 4. Applications 5. Infrastructure and Operations Top 5 industry sectors 1. Financial Services 2. IT Services 3. Government and Public Sector 4. Manufacturing 5. Higher Education 3
4 Gartner Catalyst Conference 2014 Recommendations from selections sessions A1. The Underpinnings of a Successful Mobile Strategy Mobile is more than smartphones, tablets and BYOD. It requires a thorough understanding of business needs, user experience requirements, and the impact on the IT organization. This field research presentation will guide you in the formation of a holistic mobile strategy for your organization. Get corporate commitment. Encourage employee involvement. Don t go to the business units with a blank piece of paper. Develop business cases. Know your audience. Communication with the business units and senior management is the key. Create standards and flexibly enforce them. Look ahead. Define metrics for success. Establish and use a mobile center of excellence. Transition to role-based risk management. Allow the corporate culture to adapt. A2. To The Point: Insights on Mobile Security: What Works for Mobile Strategy During a field research project at the end of 2013, Gartner identified important insights from organizations with successful mobile strategies. End user organizations discussed the technology used and how policy was implemented, how business units used apps and how culture impacted mobile security. During the early stages of examining business mobility initiatives maintain a view of enterprise risk 4 Start with and emphasize the business use case Communicate to business leaders and users throughout the mobility project and seek out feedback from employees Keep abreast of technology changes so that you can anticipate business and employee requirements and expectations Base solutions on use cases instead of starting with security precepts and rules A5. Keep Privacy in Mind When Developing Mobile Protection Programs Mobile devices need controls to protect enterprise information. But both regulations and risk assessment demand that privacy also be addressed. This session explores the controls that enable enterprises to balance information protection needs with employee expectations of privacy on mobile devices. Monday Morning: Assess current state of your policies and EMM program. Is it unified across regions? Build privacy expertise into the EMM team, but leave your ego at the door and bring everyone to the table who you think is needed. Next 90 Days: Perform a privacy impact assessment (PIA). Determine technical controls that balance privacy and protection. Inventory data that is expected to be collected via mobile devices. Next 12 Months: Deploy a clear, structured process for enrollment. Launch a comprehensive program including training, controls and notice to employees that defines program participation, obligations and expectations. A6. How to Increase Employee Productivity in a Mobile World IT architects and planners suspect mobile devices can improve productivity, but they don t know how. This session introduces a mobile productivity framework that assesses the formality and repeatability of business processes to determine where enterprises can maximize the value of mobile device use. Mobile infrastructure planning is just the beginning: Value will result only when users are more productive than they were before mobile
5 IT needs to take an active role in translating mobile opportunity into mobile productivity The Mobile Productivity Framework: Determine outcomes and key business processes. Use productivity matrix as intuition pump: Business analyst interviews and observes business units Focus on nonroutine work Identify key processes and work patterns Curate recommended second tier tool list Change processes and work habits: Align mobile tools and practices with key processes and patterns Consider training, workflows, process design, coding, metrics, iteration A7. Mobilizing Business Applications You need to provide mobile access to business applications. Unfortunately, those applications aren t currently designed to support mobile access. This guidance framework breaks the effort into four steps: select an approach, choose client models, integrate the back-end, select an infrastructure. Expect to use multiple methods: Products, tools and services market expanding Web APIs with API management may be the right way, but it s not always justified: Most versatile, future-tolerant But full migration to new Web architecture takes time Devise a mobile application road map Don t presume that you must build a custom app: Consider virtualization, adaptation and COTS I am really impressed by the depth and quality of the sessions. It provides me with a lot of useful material for devising my organization s strategy. Harmen Dijkstra, RABOBANK INTL, NETHERLANDS A8. The Five Biggest Security Issues in Mobile Collaboration Tablets are gradually turning into fullfeatured collaboration endpoints. As a result, mobile devices require syncing and sharing of sensitive information and access to critical applications. This talk assesses the biggest security risks for mobile collaboration and options for mitigation. Don t be led by technical FUD. Understand and be a broker for business risks for the use of mobile devices in collaboration. Start focusing on the users and the data: Those will be the only constants going forward; not the devices, the applications, the networks and the service providers. In the selection of security controls, lean toward stronger authentication and access control, and data security. Require rights management vendors to standardize. In the meantime, offer enterprise solutions with great user experience to your users as an alternative to the freely available, uncontrolled, solutions. B1. Cloud Services: The Foundation for the Digital Business Cloud computing is the infrastructure and application foundation for giving scale and agility to every digital business. So how can organizations improve their cloud adoption? In this session, discover a new maturity plan to adopt cloud services and become a digital business. Appoint an architect NOW! Allow existing cloud projects to operate as is. Develop a cloud maturity plan: Revamp organizational structure as necessary. Build a cloud project governance process. Evaluate and select tactical cloudenabling solutions. Construct provider evaluation criteria. Remember operational management! Brainstorm the future hyperconnected opportunities B4. Managing Users in the Cloud More and more applications are moving to the cloud. For organizations considering cloud computing, managing user accounts and privileges is both top of mind and hard to achieve. Learn the options for provisioning user accounts and access controls to SaaS hosted cloud applications. Understand which user management methods are supported by your cloud applications Implement appropriate identity and access governance practices: Just because it is in the cloud, doesn t mean that this goes away Leverage existing infrastructure and processes where possible Don t become a victim to expediency: Many of the simpler methods may get you going But the more mature methods will take you further Encourage the adoption of SCIM 5
6 Gartner Catalyst Conference 2014 B5. Enabling High Risk Services in the Public Cloud with IAAS Encryption IaaS encryption considerably lifts the bar and delivers a sensible contribution to safeguard intellectual property in computing clouds. It is surely confidential enough for the majority of use cases, but for high risk applications it may be more trouble than its worth. Get real about government capabilities: Outrage and emotion are not part of any risk model. Assess what level of confidentiality and resilience your data requires. Choose an appropriate encryption and key management strategy. Favor client-side encryption versus gateway/proxy based encryption. Get clear about what threats you mitigate: Outsiders, insiders, digital shredding, data integrity, human negligence and errors. Mind that IaaS encryption won t mitigate application level vulnerabilities: For example: SQL injection. Favor client-side encryption versus gateway/proxy based encryption. Get clear about what threats you mitigate: Outsiders, insiders, digital shredding, data integrity, human negligence and errors. Mind that IaaS encryption won t mitigate application level vulnerabilities: For example: SQL injection. Say good bye to the perimeter: Protect data independent of context and perimeter! Encryption is an enabler for enterprise use of IaaS. Protect your data and not your boxes. Be aware of what you are up to: Loss of encryption keys effectively shreds your data. Avoid architectures with high latency that may render application response time unacceptable. Utilize best practice encryption key management. B6. Devising Your Cloud Application Decision Making Framework The heart of a cloud adoption strategy is knowing which applications are cloud ready and which are not. Managing those applications -- and their associated risks -- can make or break an organization s cloud success. Learn how to create a framework to decide which applications are cloud ready, and which aren t. Devise a cloud application readiness framework: Buy first; build second Order the framework to minimalize effort: Showstoppers first; cloud layer second; tech. third Don t forget to include additional services, redundancy, and application growth: These make up the bill estimation Re-evaluate cloud readiness based on QoS expectations: Exit strategy B9. OpenStack for Private Clouds: Technology, Market Landscape, Use Cases This session will clarify how OpenStack compares to cloud management platforms from an architectural and functional standpoint, what is the difference between the major OpenStack commercial distributions, and what are the benefits and limitations of OpenStack for enterprise end user organizations. Implement OpenStack if you are: Early adopters with substantial engineering resources Risk tolerant environments Building low-cost cloud infrastructure for developer enablement Choose a CMP based on functional requirements today: OpenStack will not replace your enterprise virtualization solution for existing workloads, nor displace fullfeatured enterprise CMPs Evaluate the risk and rewards of adopting OpenStack in its current maturity state: OK to use OpenStack as part of a commercial CMP offering, or from a service provider The fact that it is OpenStack-based makes life easier for the vendor, not for your organization Use one of these distributions/cmps if you fit the use cases in an enterprise: Red Hat (best open-source credentials) HP or IBM (best if you have existing products/relationships) 6
7 B10. Private Cloud Security, The Deja Vus, The Surprises and The Pitfalls In private clouds, new security requirements stem from the cloud paradigm that makes forklifting security from the physical world into the virtual world insufficient. The deployed security measures need to match the new paradigm that involves for example elasticity, portability, self-service and API Keys. If rapid code deployment and frequent dynamic configuration changes is none of your concern then forget about ops. automation for now. Take the prematurity of ops. automation tools into account. Python and Ruby maybe better for your job. Make security the cross cutting glue through all levels of automation, not the last step. Hunt for failed deployments with FIM. Let the (server) use case and your cloudiness guide the choice of the most feasible safeguards. Carve out a competitive advantage by using controls that are unique to private clouds. Do not forget your traditional controls! Go and commingle VMs IF it brings you competitive or significant financial advantage. B11. Why Private Clouds Keep Failing (And What To Do About It) This session will describe the top challenges organizations encounter in building private clouds, the shortcoming of the cloud management market offering, and the recommended steps to mitigate those challenges. Define which workloads are targeted for your private cloud: Focus on the most provisioned workloads where agility is required Consider virtual automation for test/ dev. easy win Fix the provisioning process before you start: Change management and process governance will be critical Enforce SLAs for approval requests Appoint a single cloud owner : Invest in dedicated staff and skill set Standardize the hypervisor, servers, network and storage Use out-of-the-box automation capabilities provided by commercial CMPs: Drive value through just enough customization Build your private cloud strategy around a few key vendor/provider partners C2. Next Generation Databases and Future Directions Database technology is evolving rapidly. New types of databases, such as NoSQL technologies, cloud databases, and improved database appliances, offer new capabilities to perform high performance analytics and combined transactional/ analytics workloads Embrace the fact that traditional relational databases are no longer the be-all and end-all. Learn the basics of the next-generation technologies so that you can identify where to use them. Experiment with new database technologies in pilot projects and proofof-concept projects. Given the disruptive nature of these technologies, use them only where the business justification is clear. 7
8 Gartner Catalyst Conference 2014 C3. Measuring the Success of Business Analytics The traditional ROI valuation model of BA must be adjusted to consider the value of innovation and the addition of new capabilities. In addition, the models must be re-assessed over time, in order to document, share and communicate the value of business analytics, and ultimately increase support for it within an organization. Intently focus on understanding, determining and communicating the value of BA initiatives Use business capabilities to categorize BA projects Leverage traditional approaches and Gartner s Business Value Model to determine value Communicate the value to business and IT Incorporate value measurement into the BA processes D7. With Big Data Comes Great Responsibility Securing Hadoop Although Hadoop was initially not created with any notion of (data) security in mind, security features were recently grafted in to re-assure firms and open it up for a bigger market. This session provides clients with a good compass to be prepared for the challenges waiting for them. Keep lock-in minimal: Very special security controls increase lock-in. Do not overthink Hadoop security: Treat core elements of Hadoop as secure enough. Trust hardening of Hadoop and configuration management of Hadoop distributions. Do not try to encompass levels of security that RDBMs do not achieve either! Think about externalizing security: Data redaction at the time of ingestion (Hive, Impala). Tokenization of high risk files before ingestion. Data services. Complement RBAC with FIM: Policy files (e.g., Apache Sentry) are frequently clear text files. Remember that you have an operating system and hardware as well. Expect that security will have a performance impact, especially data encryption! D8. Authorization Architecture for a Hybrid Cloud World Authorization is the science of determining if a person is allowed to perform an action in an application on a piece of data. Where authorization decisions are made is often just as important as how the decisions are made. In this session we explore the pros and cons of multiple authorization architectures. Let go of dogma regarding the best form of authorization. Progress slowly from coarse-grained to finer-grained decision making: Be clear on which attributes are being used and make sure that they are well managed. Authorization techniques can be layered. Use the criteria to determine where best to employ these techniques. Use these techniques to gain the most leverage over the growing number of cloud-based apps. The speakers have all been effective and knowledgeable about their topic areas. I especially appreciated the realworld examples shared, which really put a practical perspective on the topic. Paul Saunders, Nestle 8
9 With thanks to our sponsors Platinum Sponsor Connect with Gartner Connect with Gartner Catalyst Conference on Twitter and LinkedIn. #GartnerCAT Silver Sponsors Gartner Media Partners Post-event resources Customizable post-event worksheet Take a moment to complete your own post-event trip report, a valuable resource for future reference and a great way to share with colleagues what you learned. Click here to access the trip report worksheet. Gartner has you covered View the full Gartner Events Calendar! Learn more with relevant research Want to learn more about the topics that interest you most? Turn to the end of each session presentation for a list of related Gartner research notes. Select Gartner research is available on demand at gartner.com. At the conclusion of the conference, our Web-based Gartner Events On Demand is available to full-conference attendees online FREE for one year, post-event. Streaming content, synchronized to speaker slides, captures every analyst-led presentation, including Gartner keynotes and select solution provider sessions. Visit gartnereventsondemand.com to explore, search, listen and learn. Explore. Search. Listen. Learn. 9
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data
Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview
Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
Exploit New Architectures: Create Your Digital Future
EARLY-BIRD Discount Save 325 by 17 July the annual gathering for technical professionals 16 17 September 2015 London, UK gartner.com/eu/catalyst Exploit New Architectures: Create Your Digital Future Key
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
I D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T U n i fied Cloud Management Increases IT- as- a - S e r vi c e Ag i l i t y November 2013 Adapted from VMware Unifies Cloud Management Portfolio with a Focus
The Cloud Management Scenario
The Cloud Management Scenario Donna Scott Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior
Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat [email protected]
Build & Manage Clouds with Red Hat Cloud Infrastructure Products TONI WILLBERG Solution Architect Red Hat [email protected] AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
Cloud Computing: Current Market Trends and Future Opportunities
Cloud Computing: Current Market Trends and Future Opportunities by Martin Tantow, Editor-in-Chief, CloudTimes.org Commodity Infrastructure as a Service Cloud computing continues to gain more mainstream
Big Data Integration: A Buyer's Guide
SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology
Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS
Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Speaker: Catherine Spence, IT Principal Engineer, Cloud Computing Acknowledgements: Aaron Huber, Jon Price November 2014 Legal Notices
THE #1 MANAGED CLOUD COMPANY RACKSPACE WITH EMC STORAGE
RACKSPACE THE #1 MANAGED CLOUD COMPANY WITH EMC STORAGE TODAY S ENTERPRISE IT LEADERS ARE FACED WITH TREMENDOUS CHALLENGES: They must provide an IT infrastructure that reliably supports the multitude of
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Software Defined Hybrid IT. Execute your 2020 plan
Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014 What do the experts say? 3 4 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated
Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald
Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:
TRANSFORMING I.T. WITH AN OPEN HYBRID CLOUD
Whitepaper TRANSFORMING I.T. WITH AN OPEN HYBRID CLOUD Gordon Haff EXECUTIVE SUMMARY Information technology is increasingly at the core of how organizations service their customers and differentiate themselves
The Role of the Operating System in Cloud Environments
The Role of the Operating System in Cloud Environments Judith Hurwitz, President Marcia Kaufman, COO Sponsored by Red Hat Cloud computing is a technology deployment approach that has the potential to help
O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services
Solution brief An integrated and open platform to build and manage cloud services The industry s most complete cloud system for enterprises and service providers Approximately every decade, technology
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
HP Helion, Cloud and the customer reality in the UK
HP Helion, Cloud and the customer reality in the UK 11.40 Thursday 9 th October 2014 Presented by Alexis Cheshire, CIO, The Scout Association Iain Mobberley, Technology Director, OCSL Introduction UK Cloud
Security of Cloud Computing for the Power Grid
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY
A new era of PaaS. ericsson White paper Uen 284 23-3263 February 2015
ericsson White paper Uen 284 23-3263 February 2015 A new era of PaaS speed and safety for the hybrid cloud This white paper presents the benefits for operators and large enterprises of adopting a policydriven
IBM Software Cloud service delivery and management
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
Digital Business Requires Application Performance Management
A Custom Technology Adoption Profile Commissioned By BMC Software January 2015 Digital Business Requires Application Performance Management Introduction Digital is transforming the rules of business success.
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Gartner Business Intelligence & Analytics Summit 2014. Trip Report. Overview. The Future of Your Business: Transparent, Decisive, Personalized
Gartner Business Intelligence & Analytics Summit 2014 21 22 October Munich, Germany gartner.com/eu/biger The Future of Your Business: Transparent, Decisive, Personalized Trip Report The Gartner Business
Virtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect [email protected] VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
THE OPEN CLOUD COMPANY RACKSPACE WITH EMC STORAGE
RACKSPACE THE OPEN CLOUD COMPANY WITH EMC STORAGE TODAY S ENTERPRISE IT LEADERS ARE FACED WITH TREMENDOUS CHALLENGES: They must provide an IT infrastructure that reliably supports the multitude of applications
Five Cloud Strategy Must -Dos for the CIO
Issue 2 Five Cloud Strategy Must -Dos for the CIO 1 Five Cloud Strategy Must -Dos for the CIO When Building a Private Cloud, Start Small, Think Big 5 About Red Hat Featuring research from Even if your
Secure Bridge to the Cloud
Secure Bridge to the Cloud Jaushin Lee, Ph.D. September 2013 1 Table of Contents The promise for enterprise hybrid cloud computing... 3 Reality facing enterprise today... 3 Connecting the dots... 6 Secure
Understanding Virtualization and Cloud in the Enterprise
Understanding Virtualization and Cloud in the Enterprise James Staten Vice President, Principal Analyst Forrester Research Virtualization is evolving toward cloud but won t be subsumed by it 2 What s different
HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management
HP Converged Cloud Cloud Platform Overview Shane Pearson Vice President, Portfolio & Product Management Cloud is the biggest disruption since the Internet 1970-80s Mainframe 1990s Client/Server 2000s The
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
1 Introduction. 2 What is Cloud Computing?
1 Introduction Table of Contents 1 Introduction 2 What is Cloud Computing? 3 Why is Cloud Computing important? 4 Why Cloud deployments fail? 5 Holistic Approach to cloud computing implementation 6 Conclusion
Enabling Digitization with Next Generation Cloud
Enabling Digitization with Next Generation Cloud Nick Earle SVP, Global Cloud and Managed Services, Cisco December 10, 2015 Live tweeting? I m @nearle Cisco Is Changing of deferred revenue is software
VMware Hybrid Cloud. Accelerate Your Time to Value
VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external
Convergence of Age, Talent & Technology for Employers' Future Planning
Convergence of Age, Talent & Technology for Employers' Future Planning Jason Averbook, Co-founder & CEO, Knowledge Infusion OCTOBER 17, 2011 Coordinates Jason Averbook 925/922-2266 [email protected]
Statement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
Agile, Secure, Reliable: World-Class Customer Service in the Cloud
Agile, Secure, Reliable: World-Class Customer Service in the Cloud Contents 2 Introduction 4 Business Benefits 6 IT Benefits 8 RightNow Product Focus 2 Why Deliver Customer Service in the Cloud? In a volatile
10 Practical Tips for Cloud Optimization
Real Life in the Cloud The Cloud Sprawl Cloud Control Challenges 1. Transparency 2. Governance. Predictability Cloud Optimization in Action 10 Cloud Optimization Guidelines to Keep in Mind The 11th Guideline:
Data Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
RightScale mycloud with Eucalyptus
Swiftly Deploy Private and Hybrid Clouds with a Single Pane of Glass View into Cloud Infrastructure Enable Fast, Easy, and Robust Cloud Computing with RightScale and Eucalyptus Overview As organizations
TRANSITIONING TO BIG DATA:
TRANSITIONING TO BIG DATA: A Checklist for Operational Readiness Moving to a Big Data platform: Key recommendations to ensure operational readiness Overview Many factors can drive the decision to augment
Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0
Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0 Contents MITEL PROFESSIONAL SERVICES DELIVERY METHODOLOGY... 2 CUSTOMER NEEDS... 2 ENGAGING
Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud
Adding value as a Cloud Broker Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner Dell.com/Cloud Overview A. Added Value Brokers in all industries in Digital Era B. Experience of Cloud Marketplace
More Data in Less Time
More Data in Less Time Leveraging Cloudera CDH as an Operational Data Store Daniel Tydecks, Systems Engineering DACH & CE Goals of an Operational Data Store Load Data Sources Traditional Architecture Operational
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT
Intel IT s Cloud Journey Speaker: [speaker name], Intel IT Accelerating The Corporate IT Journey Cloud enables ubiquitous access to resources and applications, and workload flexibility Cloud IaaS Infrastructure
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
Building an AWS-Compatible Hybrid Cloud with OpenStack
Building an AWS-Compatible Hybrid Cloud with OpenStack AWS is Transforming IT Amazon Web Services (AWS) commands a significant lead in the public cloud services market, with revenue estimated to grow from
Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management
Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management Hybrid Delivery: The right IT strategy Creating the optimal mix of traditional IT and cloud services
The Future of Data Management
The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility
Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
CTERA Cloud Storage Platform Architecture
CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage
EMA Radar for Private Cloud Platforms: Q1 2013
EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)
WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM
SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM Optimizing ITSM for Cloud Computing Reginald Lo Director, Accelerate Management, VMware [email protected] Session Description Organizations
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options Marnix Gillis IBM Distinguished Engineer 32 nd Regional Conference 2013 International Business
ECM: Key Market Trends and the Impact of Business Intelligence
ECM: Key Market Trends and the Impact of Business Intelligence Cheryl McKinnon, Principal Analyst February 2014 Agenda ECM current state and market trends Achieve ECM success by using business intelligence
Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management
Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management Table of Contents Executive Summary... 3 Introduction: Cloud Deployment Models... 3 Private Clouds...3 Public
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Don't outsource IT! Bring your own Cloud with SDN
Don't outsource IT! Bring your own Cloud with SDN Education Session 19 Herman Chao Systems Engineering Manager, Cisco State of CA Government May 2015 Agenda Industry Need and Trends The Network Challenge
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Cloud computing insights from 110 implementation projects
IBM Academy of Technology Thought Leadership White Paper October 2010 Cloud computing insights from 110 implementation projects IBM Academy of Technology Survey 2 Cloud computing insights from 110 implementation
THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis
Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents
The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges
WHITE PAPER The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges Cloud computing offers a significant opportunity for improved business outcomes through the delivery of innovative
Networks that know data center virtualization
Networks that know data center virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public
