Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Size: px
Start display at page:

Download "Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone"

Transcription

1 Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone

2 Contents Contents Significance of SMEs in Urban Development SME Status Quo IT Capabilities of SMEs Government Support for SMEs isoftstone & Huawei SME Service Platform Using the Platform to Serve SMEs Platform Highlights Page 1

3 Significance of SMEs in Urban Development (1/2) Small and Medium Enterprise (SME): SMEs are companies whose personnel numbers fall below certain limits. Small enterprises outnumber large companies and employ more people. SMEs are also said to drive innovation and competition in many economic sectors. This lecture talks about SMEs in China. SMEs must meet any of the following conditions: Workforce: < 2000 Sales volume: < CNY300 million Total asset: < CNY400 million SME Medium enterprises must have 300+ employees, CNY30+ million sales volume, and CNY40+ total asset. Page 2

4 Significance of SMEs in Urban Development (2/2) Contributing half of the national economy Absolute advantage in quantity: > 98% of total enterprises in China Support forces of economic growth: about 60% of GDP in terms of production and service value Major employment channel: > 75% of total employment in urban areas Important source of technical innovations: strong awareness, fast action Important support for local development: main income channel for residents, main source of local revenue Basic forces of economic reform: actively participating in market competition and promoting industrial structure upgrade Page 3

5 SME Status Quo Difficult financing High production cost Poor technical capability Backward management Blind production expansion Page 4

6 IT Capabilities of SMEs Capital, talent, and time: posing mounting pressures on IT development in SMEs Selfbuilt IT system Capital OA: 9 months CRM: 12 months ERP: 15 months Limited IT investment High hardware cost High maintenance cost Construction Process Equipment room, power supply, network, etc 150 Server, storage, system, and database 100 Cost (CNY thousand) Information software procurement 50 to 200 Annual wage for professional maintenance personnel 60 Talent Time Requiring professional personnel to implement IT projects and perform O&M Difficult to introduce talent that knows both technology and management, which is a major bottleneck to IT development for SMEs Required processes, such as service survey, system design, development, and testing, consume a couple of months and even years IT system construction periods cannot keep up with changing business needs due to rapid growth of SMEs Page 5

7 Government Support for SMEs Work Outline for 2014 SME Innovation and IT Development 1. Plan for building innovation capabilities for SMEs 2. Project for promoting intellectual property strategies for SMEs 3. Project for promoting IT development for SMEs Determine about 10 SME IT service platforms with a significant influence and driving functions, organize service resources, and aggregate application software for SMEs to improve capabilities in: R&D, design, operation, management, marketing, information sharing, financing, and talent training. Promote e-commerce transaction and service platform building, encourage IT service providers to implement professional plans, and allow for SMEs to create business models using e-commerce. Explore and promote cloud computing, Big Data, and mobile Internet technologies to provide smart terminals, cloud services, Software as a Service (SaaS), and service outsourcing for SMEs. Strengthen promotion: Host the 2014 SME IT service press conference as well as SME IT development forum and promotion activities at the Central China Investment and Trade Expo. Page 6

8 isoftstone & Huawei SME Service Platform: Functional Architecture Application providers provide products to form an application supermarket Enterprise application software SME Service Platform Enterprise customer Enterprise customers select applications to suit their needs Share software and hardware, resources, products, and services, and provide voice and data communication as well as industry applications for SMEs. SMEs can easily use cloud applications via cloud leasing and on-demand payment based on existing computers and networks without adding IT software or hardware. Such flexibility meets a variety of business needs, including e- commerce as well as production, sales, office, and personnel management. Page 7

9 isoftstone & Huawei SME Service Platform: Technical Architecture Network management interface Billing interface Software as a Service (SaaS) ISV portal Finance Operation management portal SaaS applications Application supermarket OA SaaS application: enterprise-level application API: standard interface for SaaS applications and platforms Field work PSI CRM Meeting assistant Sales Platform as a Service (PaaS) Communication capability Operating system Database PaaS Web middleware Payment capability J2EE running environment Open communication capability: encapsulating communication capabilities as IT services Diverse environments: development, testing, basic operation, and service operation Virtualized platform Physical resources Infrastructure Virtual server resource pool Virtual storage resource pool Virtual network resource pool Server Storage Network Cabinet, power supply, and air-conditioner Infrastructure as a Service (IaaS) Resource pool: physical and virtual resources Resource management and scheduling: elastic scheduling and management of virtual resources Page 8

10 Needs Solutions Using the Platform to Serve SMEs (1/4) Public cloud service platform: an effective approach for SMEs to achieve business transformation Ideally meets SMEs' five needs for IT systems: cost-efficiency, on-demand delivery, simple deployment, easy management, and flexible expansion. Limited capital Cost priority Cost- efficiency SMEs can lease the service platform without purchasing software or hardware Uncertain and unpredictable business growth Limited energy and capability for IT development Lack of professional IT technicians Changing IT development needs On-demand delivery Simple deployment Easy management Flexible expansion SaaS The business model based on on-demand delivery allows SMEs to pay for only what they have used. The platform leverages cloud computing to provide rich storage and computing capabilities as well as application systems. System O&M is implemented by the platform provider. The platform ensures sufficient openness and flexible expansion. Page 9

11 Using the Platform to Serve SMEs (2/4) What services can cloud computing provide for SMEs? Hardware IT resource integration SAAS Software as a Service Office, marketing, and production operation management software, engineering design and instant messaging software... Communication capability integration PAAS Platform as a Service Legitimate software development environment, SMS/MMS, positioning, and payment Application software and service integration IAAS Infrastructure as a Service Cloud host, storage, operating system, application server, and database Meeting assistant Field work app Wage app SMS Development environment Payment Cloud host Cloud storage Cloud database Page 10

12 Using the Platform to Serve SMEs (3/4) Rich, featured applications: bringing a wide range of benefits to SMEs Cloud resources Office management Production management Marketing management Use virtualization technology to converge IT resources and provide computing resource infrastructure services that can be used by SMEs on demand, including host service, elastic computing, storage backup, and network service. Typical applications: Site deployment, cloud host, cloud storage, and cloud firewall Build a private cloud platform to provide innovative paperless office solutions for SMEs to enable information sharing and work management. Typical applications: OA, meeting assistant, meeting cloud, enterprise microblog, and approval e- flow Use the e-government cloud platform to provide mobile IT solutions for SMEs to improve production and management efficiency. Typical applications: Field work app, wage app, Skyeye, cloud monitoring, and property management Leverage cutting-edge IT technologies of the cloud platform to keep SMEs abreast of customer information, seize business opportunities, and scientifically and quantitatively manage marketing activities. Typical applications: PSI, CRM, and cloud sales Page 11

13 Using the Platform to Serve SMEs (4/4) Promote effective information resource utilization and improve enterprise efficiency and productivity Arrive at the site and sign on via the field work app Record customer visits and give feedback Log in to a mobile office app Check to-dos 10:00 Process s 7:50 8:30 Instant communication Hold a call meeting with colleagues 10:30 11:00 Invite customers to dinner Submit an expense request Determine the next visit Sign off via the field work app 12:00 18:00 Arrange work for the next day 17:00 15:00 Check the PSI View real-time operation data Log in to the enterprise portal Check the wage via the wage app 20:00 Learn about latest information 21:30 Page 12

14 Platform Highlights (1/3) Complete operation support Service integrator (SI) News Unit User isoftstone & Huawei SME Service Platform Customer Application Log Responsibilities Position Subscription Product Resource Basic data Vault mode Menu Complete user and rights management Basic system data management Complaint Appraisal Customer, subscription, complaint, demand, and application assessment management, statistical report Demand Application assessment Statistical report Settlement Troubleshooting SI, application, product, resources, appraisal, settlement, and troubleshooting management Page 13

15 Cloud security support system Cloud security level specifications Platform Highlights (2/3) Platform features: more secure and robust Data security: Perform rights management, data encryption, periodical archiving, and internal backup or backup to external storage devices. Network security: Leverage multiple network security technologies, such as firewall, antivirus, vulnerability scanning; and technical measures to restrain inter-network access. Periodical backup: Perform online and offline data backup at regular intervals, and holistic remote backup. System security: Use latest security technologies to ensure system security and perform timely updates; and provide 24/7 system O&M to detect and rectify problems. Application security Terminal security Cloud security model Authentication & access control Internet Cloud terminal user Content audit Platform security Authentication & access control Monitoring & warning Data protection IPS Firewall Virtual isolation Physical security Cloud audit Monitoring & warning Physical protection Infrastructure protection Cloud computing center Cloud storage system Cloud security system Page 14

16 Real-time monitoring and log service Security testing and analysis Cloud security protection system service Technical support System support Platform Highlights (3/3) Provide holistic security protection services for SMEs 4A management: Perform equipment room, password, risk assessment, security audit, contingency plan, and backup management. Vault mode: To prevent information leakage, the system triggers "vault" management operations when operators perform data maintenance. Only authorized and verified operators can continue operations. Network security: Implement 24/7 monitoring to detect major security events in a timely manner. Security protection: Support network access through an encrypted VPN. Monitoring system: Perform vulnerability scanning, web page tamper resistance, and Internet content audit. Terminal security: Provide a unified authentication platform; complete account lifecycle management; and diverse security authentication modes, including static/dynamic passwords and SMS. Advanced security service Access control Tenant isolation Sharing among tenants Collaboration Role management Data security Key management Data encryption Ciphertext search Hybrid coding Virtual resource management Fault diagnosis Service backup & recovery Responsibility identification Vulnerability analysis Basic security service Account management Authorization management Rights management Data verification Privacy protection Fault tolerance Behavior recognition Resource monitoring Security audit Page 15 Cloud platform Cloud storage Cloud VM Cloud service Cloud data

17 THANK YOU Copyright 2014 Huawei Technologies Co., Ltd. All Rights Reserved. The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.

Public Sector Cloud Services - The Telecom Perspective

Public Sector Cloud Services - The Telecom Perspective Cloud for Europe Conference Berlin, November 14-15, 2013 www.huawei.com www.huawei.com Public Sector Cloud Services - The Telecom Perspective Abdellatif Benjelloun Touimi, Corporate Industry & Standards

More information

Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu. Pan Yang Deputy Director of Promotion Division, Chengdu, PRC

Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu. Pan Yang Deputy Director of Promotion Division, Chengdu, PRC Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu Pan Yang Deputy Director of Promotion Division, Chengdu, PRC Overview of IT and Industry Convergence (1/2) March 2013 According

More information

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Deploying a Geospatial Cloud

Deploying a Geospatial Cloud Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size

More information

How To Create A Network Access Control (Nac) Solution

How To Create A Network Access Control (Nac) Solution Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication

More information

20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in

20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in ho2099@sib.co.in A monthly publication from South Indian Bank 20 th Year of Publication Experience

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

United Security Technology White Paper

United Security Technology White Paper United Security Technology White Paper United Security Technology White Paper 1 Challenges...6 1.1 Security Problems Caused by Mobile Communication...6 1.2 Security Fragmentation Problems...8 2 United

More information

Cloud Computing. Cloud computing:

Cloud Computing. Cloud computing: Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:

More information

Credit Unions and The Cloud. By: Chris Sachse

Credit Unions and The Cloud. By: Chris Sachse Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

Security Level: HUAWEI TECHNOLOGIES CO., LTD.

Security Level: HUAWEI TECHNOLOGIES CO., LTD. Security Level: www.huawei.com Pedro Gomez Miranda Enterprise Chief Technology Officer Huawei Enterprise Northern Latin America Region pedro.gomez@huawei.com HUAWEI TECHNOLOGIES CO., LTD. Understanding

More information

Time to Value: Successful Cloud Software Implementation

Time to Value: Successful Cloud Software Implementation Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified

More information

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO. Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

Fujitsu s Approach to Platform as a Service (PaaS)

Fujitsu s Approach to Platform as a Service (PaaS) Fujitsu s Approach to Platform as a Service (PaaS) Shoji Wajima Software as a service (SaaS) has been deployed primarily for general-purpose applications, but recently it has been increasingly used for

More information

Electronic Records Storage Options and Overview

Electronic Records Storage Options and Overview Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for

More information

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications 2010 Ashton, Metzler, & Associates. All rights reserved. Executive Summary Given the technological and organizational risks

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Quattra s Cloud Vision & Framework Value

Quattra s Cloud Vision & Framework Value Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

SaaS A Product Perspective

SaaS A Product Perspective SaaS A Product Perspective Software-as-a-Service (SaaS) is quickly gaining credibility and market share against traditional packaged software. This presents new opportunities for product groups and also

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

cloud computing by Orange séminaire Aristote 17/12/2009

cloud computing by Orange séminaire Aristote 17/12/2009 cloud computing by Orange séminaire Aristote 17/12/2009 Orange and the cloud vision and strategy cloud computing - what is it about? cloud computing is a model for enabling convenient on-demand network

More information

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication

More information

OnX Oracle Cloud Services

OnX Oracle Cloud Services OnX Oracle Cloud Services BUSINESS CHALLENGES There are several business challenges that drive the cloud discussion and cloud infrastructure market. These business challenges are very different from the

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

Cloud Standards - A Telco Perspective

Cloud Standards - A Telco Perspective Cloud Standards - A Telco Perspective Abdellatif Benjelloun Touimi abdellatif.benjelloun@huawei.com Corporate Standards Department www.huawei.com TEN YEARS OF CONNECTING EUROPE HUAWEI TECHNOLOGIES CO.,

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader

IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader Cloud Getting hold Computing of the cloud: for a & Cloud Computing Smarter Planet John Easton UK & Ireland Cloud Computing Technical Leader Copyright Corporation 2010 Cloud is important to Corporation

More information

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Cloud Computing: The atmospheric jeopardy Unique Approach Unique Solutions Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Background Cloud computing has its place in company computing strategies,

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

CLOUD COMPUTING. A Primer

CLOUD COMPUTING. A Primer CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to

More information

CLOUD COMPUTING OVERVIEW

CLOUD COMPUTING OVERVIEW CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Fujitsu s Approach to Cloud Computing

Fujitsu s Approach to Cloud Computing Fujitsu s Approach to Cloud Computing Kenta Miyazawa Cloud computing (hereafter cloud or clouds) has come to be specifically used in various fields. Private clouds are used in enterprises. Groups and individuals

More information

SAP HANA Cloud Platform Frequently Asked Questions - Business

SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform 1. What is SAP HANA Cloud Platform? SAP HANA Cloud Platform, the in-memory Platform-as-a-Service offering from SAP,

More information

CLOUD COMPUTING DEMYSTIFIED

CLOUD COMPUTING DEMYSTIFIED CLOUD COMPUTING DEMYSTIFIED Definitions you ve been pretending to understand JACK DANIEL, CCSK, CISSP, MVP ENTERPRISE SECURITY Definitions Words have meaning, professionals need to understand them. We

More information

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Huawei Enterprise UC&C Product and Solution Guide. -Mobility, Video Integration, and Cloud Collaboration HUAWEI TECHNOLOGIES CO., LTD.

Huawei Enterprise UC&C Product and Solution Guide. -Mobility, Video Integration, and Cloud Collaboration HUAWEI TECHNOLOGIES CO., LTD. Huawei Enterprise UC&C Product and Solution Guide -Mobility, Video Integration, and Cloud Collaboration HUAWEI TECHNOLOGIES CO., LTD. A Better Way UC&C Product Line Huawei enterprise service business group

More information

ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT

ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT 2 CLOUD SOLUTION Cloud/hosted software spending by nonprofits and associations increased by 43% while technology hardware

More information

Table of Contents. About the book. Copyright. Preface. About the author. Cloud Computing. Amazing Types of Cloud Computing

Table of Contents. About the book. Copyright. Preface. About the author. Cloud Computing. Amazing Types of Cloud Computing Table of Contents About the book Copyright Preface About the author Cloud Computing Amazing Types of Cloud Computing Top Reasons Why Should We Adopt Cloud Pros and Cons of Business Cloud Computing 5 Tips

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud

Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud Index Index... 2 Overview... 3 What is cloud computing?... 3 The benefit to businesses... 4 The downsides of public

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

Huawei Smart Education Solution

Huawei Smart Education Solution Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Oracle Cloud Computing Strategy

Oracle Cloud Computing Strategy Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

NET ACCESS HIPAA COMPLIANT FLEXCloud

NET ACCESS HIPAA COMPLIANT FLEXCloud Page 0 2015 SOLUTION BRIEF NET ACCESS HIPAA COMPLIANT FLEXCloud A Managed Infrastructure Solution that Meets the Regulatory Demands of the Health Care Industry NET ACCESS LLC 9 Wing Drive Cedar Knolls,

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Innovative Architectures For Cloud Data Centers

Innovative Architectures For Cloud Data Centers Innovative Architectures For Cloud Data Centers Cloud computing has ushered in a new era for data centers. Huawei offers efficient, flexible, and innovative cloud data centers and delivers extensive project

More information

The Private Cloud Your Controlled Access Infrastructure

The Private Cloud Your Controlled Access Infrastructure White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,

More information

Communications in the Cloud Why It Makes Sense for Today s Business

Communications in the Cloud Why It Makes Sense for Today s Business Communications in the Cloud Why It Makes Sense for Today s Business Unified communications delivered in the cloud can help businesses of all sizes address many collaboration and communications challenges.

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

Cloud computing: benefits, risks and recommendations for information security

Cloud computing: benefits, risks and recommendations for information security Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation

More information

Cloud computing and SAP

Cloud computing and SAP Cloud computing and SAP Next Generation SAP Technologies Volume 1 of 2010 Table of contents Document history 1 Overview 2 SAP Landscape challenges 3 Infrastructure as a Service (IaaS) 4 Public, Private,

More information

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud

More information

EAaaS Cloud Security Best Practices

EAaaS Cloud Security Best Practices EAaaS Cloud Security Best Practices A Technical White Paper by Sennovate Inc Jan 2013 EAaaS Cloud Security Best Practices Page 1 Introduction: Cloud security is an ever evolving subject that is difficult

More information

Cloud Infrastructure Security

Cloud Infrastructure Security Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria dvelev@unwe.acad.bg 2 Institute of Control and

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

Trust but Verify. Vincent Campitelli. VP IT Risk Management

Trust but Verify. Vincent Campitelli. VP IT Risk Management Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify

More information

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models A Guide to Cloud Computing Costs, Server Costs, Pricing Plans, and Chargeback Implementation and Systems Introduction

More information

Oracle Database Security Services

Oracle Database Security Services Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include

More information

The Partnership. You Can Count On. Seth Pomeroy, Partner NDH Group, Ltd May, 2015

The Partnership. You Can Count On. Seth Pomeroy, Partner NDH Group, Ltd May, 2015 The Partnership You Can Count On Seth Pomeroy, Partner NDH Group, Ltd May, 2015 1 Proposed Agenda The Value of Cloud Financial Management Systems & Reporting Prospective Review: Gain a mutual understand

More information

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform

More information

The Enterprise Journey to a Cloud based Data Centre

The Enterprise Journey to a Cloud based Data Centre Security Level: The Enterprise Journey to a Cloud based Data Centre www.huawei.com Author/ Email: Neo Teck Guan/ teckguan.neo@huawei.com Version: V1.0 (20131113) HUAWEI TECHNOLOGIES CO., LTD. Content 1.

More information

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing. Bringing the Cloud into Focus Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice

More information

Trademark Notice. General Disclaimer

Trademark Notice. General Disclaimer Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

Public, Private, Hybrid:

Public, Private, Hybrid: Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud

More information

Cloud Computing - Benefits and Barriers for Retail Adoption

Cloud Computing - Benefits and Barriers for Retail Adoption Original Published Research from Cobweb Solutions - Europe s Leading Cloud Services Provider Cloud Computing - Benefits and Barriers for Retail Adoption 28022011 v1.5 written by Ed Dixon Director of Enterprise

More information

Building a SaaS Application. ReddyRaja Annareddy CTO and Founder

Building a SaaS Application. ReddyRaja Annareddy CTO and Founder Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings

More information

Location Information Services Web Portal from AT&T. Workforce Management Industry Brief. Mobile Marketing Portfolio

Location Information Services Web Portal from AT&T. Workforce Management Industry Brief. Mobile Marketing Portfolio Location Information Services Web Portal from AT&T Workforce Management Industry Brief Mobile Marketing Portfolio Employee Asset Tracking in the Palm of Your Hand The AT&T Location Information Services

More information