The vision of DNB on the supervision of cloud-computing
|
|
|
- Warren Phillips
- 10 years ago
- Views:
Transcription
1 The vision of DNB on the supervision of cloud-computing CBCS: Information Technology Service Management Seminar Evert Koning, 18 November 2014
2 Financial industry in the Netherlands Institution type Number Banking 100 Insurance companies 300 Pension funds 350 Investment firms 350 Trust and payment firms 400 Total
3 Strategy Supervision focusses on protection of interests of creditors/consumers stability and integrity of the financial system This means that Supervision must be kept posted and understand what institutions are doing and how they manage and control the risks Timely identify relevant developments & threats and advise on them 3
4 Strategy of ICT supervision ICT Focus Strategy with differentation An institution of some magnitude is not viable without ICT Supervision needs to make certain that the institutions recognise and adequately manage ICT-related risks 4
5 Mission statement of EC-ICT Was To offer the maximum added value for general Supervision specific as for the Central Bank as a whole by means of effective and efficient use of people and tools with the focus on the different expertises within the department. Is To achieve, through effective and efficient means, adequate control of IT risks by supervised institutions 5
6 Supervision cycle 6
7 Assessment of risks 7
8 Organisation EC-ICT 10 IT examiners No hierarchy 3 levels of experience Flexibility Account structure T5 and T4 8
9 Cloud computing Cloud computing qualifies as a form of outsourcing. So the same legal requirements apply: risk s need to be demonstrably known and mitigated Outsourcing to third parties may not obstruct supervision by DNB 0cloud%20computing_tcm pdf 9
10 Legal Framework Outsourcing Specific rules for outsourcing (6 articles) Outsourcing is not allowed if it obstructs prudential supervision on the institution (art. 27) Outsourcing is not allowed if it harms the independent internal audit & compliance process (art. 28) The institution needs to have a sourcing strategy and detailed procedures in place to manage the outsourcing (art. 29) 10 10
11 Legal Framework Outsourcing Specific rules for outsourcing (6 articles) The institution needs to have sufficient procedures, knowledge & information to assess the outsourced processes (art. 30) a sufficient written outsource agreement is mandatory (art. 31) Above mentioned articles are not applicable if the processes are outsourced to a company in another country that is part of the group of the financial institution (art. 32) 11 11
12 Legal Framework Specific rules for risk management (4 articles) Policy regarding control of risks is documented in detailed procedures and measures to control risks (art. 23) Systematic and independent risks analysis (art. 23) Institution supervises compliance of procedures and measures as mentioned in art. 23 (art. 24) Internal developed models are assessed and validated (art. 25) The treasurer of the institution has procedures and measures in place to ensure the financial position (art. 26) 12 12
13 Definition cloud computing NIST definition of cloud computing (ref. SP ): Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. 13
14 Attentionpoints cloud computing Where are my (back-up) data? Who can access my data? How do I know that performance is as contracted? Exit from cloud provider: is all data wiped? Right to audit also for subcontractor? 14
15 Cloud computing / International aspects International agreement on cloud computing Letters on cloud computing: APRA, MAS, DNB, US, Spain and Canada All countries have the same attitude w.r.t. cloud computing Some countries are more strict Bron: 15 puting_tcm pdf
16 International agreement Common understanding ITSG Cloud computing qualifies as outsourcing Cloud computing is defined by NIST Right to audit of Supervisors is obliged in contracts is considered as part of critical business 16
17 Cloud computing & DNB Journey with Microsoft: circulaire cloud computing 6 December 2011 (English 10 January 2012*) Contact with financial institution about Microsoft cloud services. Contact with Microsoft Contact with Microsoft and financial institution Agreement with Microsoft NL -> involvement Microsoft EMEA and US Agreement with Microsoft US Implementing Microsoft office 365 Financial institution Visit Dublin datacentre Visit Microsoft Campus Redmond * 17
18 Agreement with Microsoft 18
19 DNB & Cloud computing Symposium Cloud Computing 2013 Regulator view Assurance Lessons learned by Service providers Lessons learned by Financial organisations Market perspective Risk analysis framework based on Enisa*: puting%20%20risicoanalyse_tcm pdf * 19
20 Cloud computing right to examine 20
21 Questions? Evert Koning Operational Risks & Data quality Telephone: Mobile: : [email protected]
Case Study Cloud Computing
Case Study Cloud Computing Rotterdam Juli 2013 Robeco Ton Ligtvoet, Manager IT Contracts and Infra Projects For institutional investors 1 Facts and figures Robeco IT Servicing Asset Management, Pension
Cloud Computing Guide & Handbook. SAI USA Madhav Panwar
Cloud Computing Guide & Handbook SAI USA Madhav Panwar Background 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011 A status report was presented and
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Developments in International IT-Supervision
Developments in International IT-Supervision CBCS: Information Technology Service Management Seminar Evert Koning, 18 November 2014 Agenda 1.Europe: ECB: SSM 2.World: ITSG 3.Other Supervisors 2 Banking
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT
What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Will Be Presented Today? My interest in cloud computing What is cloud computing? Who did I
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
KERALA STATE IT MISSION ICT Campus, Vellayambalam, Trivandrum 695 033. Phone: 0471 2726881, 2314307, 2725646. Fax: +91 471 2314284.
KERALA STATE IT MISSION ICT Campus, Vellayambalam, Trivandrum 695 033. Phone: 0471 2726881, 2314307, 2725646. Fax: +91 471 2314284. STATE DATA CENTRE-2 CLOUD HOSTING FAQ 1. What is cloud? Cloud computing
JOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
Cloud Computing--Efficiency and Security
Cloud Computing--Efficiency and Security Mick Atton, VP & Chief Architect Thomson Reuters--Legal July 22, 2013 Thomson Reuters Thomson Reuters is the leading source of intelligent information for the world's
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.
CLOUD BASED SCADA Removing Implementation and Deployment Barriers Liam Kearns Open Systems International, Inc. SCADA Traditional definition and application. SCADA DEFINITION Definition Supervisory Control
CSO Cloud Computing Study. January 2012
CSO Cloud Computing Study January 2012 Purpose and Methodology Survey Sample Survey Method Fielded Dec 20, 2011-Jan 8, 2012 Total Respondents Margin of Error +/- 7.3% Audience Base Survey Goal 178 security
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Federal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
CLOUD COMPUTING GUIDELINES FOR LAWYERS
INTRODUCTION Legal practices are increasingly using cloud storage and software systems as an alternative to in-house data storage and IT programmes. The cloud has a number of advantages particularly flexibility
Upgrading a computer to Windows 10 with PetLinx
25 August, 2015 Upgrading a computer to Windows 10 with PetLinx Microsoft have recently released Windows 10 and offered it as a free upgrade for user of Windows 7 and 8/8.1. In most cases, computers with
SFJCCAD2 Promote business continuity management
Overview This unit is about providing advice and assistance on business continuity management, including general advice for the business and voluntary sectors, and specific advice and assistance to individual
Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014
Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure
Cloud Computing Thunder and Lightning on Your Horizon?
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery
Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee
Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design December 17, 2012 Agenda TOPICS PRESENTER(S) 9:00 9:15 Opening Remarks and
Privacy and security in the cloud
Privacy and security in the cloud Challenges and solutions for our future information society Panel Building trust the technical challenges World Summit on the Information Society Forum 25-29 May 2015
A Secure System Development Framework for SaaS Applications in Cloud Computing
A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational
About iomart Group plc
About iomart Group plc iomart Group The iomart Group is one of Europe s leading providers of cloud computing and managed hosting services. The group specialises in the design, delivery and management of
Dynateam CRM Sync Migration made easy
Dynateam CRM Sync Migration made easy By Dynateam CRM Aps Denmark CVR: 33950535 Document content Indhold Document content... 1 The idea... 2 The solution... 3 Preparing the migration... 4 How?... 5 Step
Evolving Technology Issues: Cloud Computing
Evolving Technology Issues: Cloud Computing Michael Bennett October 16, 2011 2011 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Cloud Computing Does compliance with applicable laws fall to
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Strategic approach to cloud computing deployment
Strategic approach to cloud computing deployment Slavko Gajin, (GN3plus, SA7T1) Datacenter IaaS workshop 2014 11-12. September, 2014 Cloud and NRENs Cloud is the latest big thing affecting NREN users Do
SCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
Chapter3: Understanding Cloud Computing
Chapter3: Understanding Cloud Computing Nora Almezeini MIS Department, CBA, KSU A Brief History! The general public has been leveraging forms of Internetbased computer utilities since the mid-1990s.! In
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
Core Solutions of Microsoft Exchange Server 2013
EXCHANGE 2013 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Core Solutions of Microsoft Exchange Server 2013 Course Title Core Solutions of Microsoft Exchange Server 2013
Company Profile Outstanding data centres. Expertise you can trust. Europe s leading provider of premium carrier-neutral data centres.
Company Profile Outstanding data centres. Expertise you can trust. Europe s leading provider of premium carrier-neutral data centres. 02 / TelecityGroup Introduction Outstanding data centres. Expertise
Cloud Security checklist Are you really ready for Cloud
checklist Are you really ready for Cloud Introduction Once you have assessed the benefits of migrating a business system or its function to the Cloud (See our White Book of Cloud Adoption), the next step
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
Application management services that power business transformation
SOLUTION MAP Application management services that power business transformation Protecting business reputation and revenue through superior application performance Application management for IT and business
NATO s Journey to the Cloud Vision and Progress
NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,
Evaluating the Cloud An Executive Perspective
Evaluating the Cloud An Executive Perspective Terry Ginley, Socius Jason Rook, Microsoft Cloud is front and center In This Session Why is the cloud gaining traction? Types of Cloud Deployments IAAS Hosted
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
iso20000templates.com
iso20000templates.com Public IT Limited 2011 IT Service Policy Document Ref. ITSM01001 Version: 1.0 Draft 1 Document Author: Document Owner: V 1.0 Draft 1 Page 1 of 11 Revision History Version Date RFC
Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro
Cloud definitions you've been pretending to understand Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro You keep using that word cloud. I do not think it means what you think it
Security in the Cloud: Visibility & Control of your Cloud Service Providers
Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,
The process of. The Software-as-a- Cloud-Based Software Model. Service Model
In recent years, financial institutions (FIs) have become accustomed to the idea of outsourcing aspects of their operations through cloud computing partnerships in order to increase efficiency, reduce
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Cloud Computing. Introduction
Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between
ICT Strategy Consulting Services for Schools. Helping schools to establish a clear vision for ICT.
ICT Strategy Consulting Services for Schools. Helping schools to establish a clear vision for ICT. ICT Strategy Consulting Services for Schools. ICT has transformed the way that children learn and teachers
Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT...
Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT... Venkata Sravan Kumar Maddineni, Blekinge Institute of Technology IT Security for the Next Generation European Cup, Prague
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Bank of Israel. 1. Background. In recent years, cloud. environmentally. from. aspects in. these. 2. Applicability. Directive ). 3.
Bank of Israel Supervisor of Banks Jerusalem, 12 Tammuz 5775 June 29, 2015 15LM2087 To: The Banking Corporations Attn: Chief Executive Officer Re: Risk management in a cloud computing environment 1. Background
The reality of cloud. Go beyond the hype and make a better choice. t 0845 5055 365 e [email protected]. www.365itms.co.uk
The reality of cloud Go beyond the hype and make a better choice www. The meaning of cloud 1. Cloud means different things to different people, something that s reflected in the many definitions of what
Quality Manual ISO 9001:2015 Quality Management System
Quality management input comprises the standard requirements from ISO 9001:2015 which are deployed by our organization to achieve customer satisfaction through process control. Quality Manual ISO 9001:2015
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
The HIPAA Security Rule: Cloudy Skies Ahead?
The HIPAA Security Rule: Cloudy Skies Ahead? Presented and Prepared by John Kivus and Emily Moseley Wood Jackson PLLC HIPAA and the Cloud In the past several years, the cloud has become an increasingly
Managing Outsourcing Arrangements
Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS
Contracting for Cloud Computing
Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 [email protected] April 5th 2011 Mayer Brown is a global legal services organization comprising legal
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
Core Solutions of Microsoft Exchange Server 2013 MOC 20341
Core Solutions of Microsoft Exchange Server 2013 MOC 20341 Course Outline Module 1: Deploying and Managing Exchange Server 2013 This module explains how to plan and perform deployment and management of
Islamic Relief Worldwide ICT Desktop Support Technician
Islamic Relief Worldwide ICT Desktop Support Technician BASE LOCATION: REPORTING TO: LINE MANAGEMENT RESPONSIBILITIES: Waterloo, London ICT Service Delivery None PURPOSE OF DIVISION: ICT is part of the
WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod
WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
Cloud Computing Best Practices and Considerations for Project Managers Mike Lamoureux, PMP, MBA. Page 1
Cloud Computing Best Practices and Considerations for Project Managers Mike Lamoureux, PMP, MBA Page 1 Cloud Computing is the 5 th Utility Water Electricity Gas Telephone Computing Page 2 Why does a Project
Cloud powered services composition using Public Cloud PaaS platform
Cloud powered services composition using Public Cloud PaaS platform Student: Andrey Afanasyev Supervisor: Yuri Demchenko Graduate School of Informatics University of Amsterdam 3 February 2015 What is Cloud
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
