Cloud Computing--Efficiency and Security
|
|
|
- Claude Robbins
- 10 years ago
- Views:
Transcription
1 Cloud Computing--Efficiency and Security Mick Atton, VP & Chief Architect Thomson Reuters--Legal July 22, 2013
2 Thomson Reuters Thomson Reuters is the leading source of intelligent information for the world's businesses and professionals Headquarters Thomson Reuters 3 Times Square New York, NY 2012 Revenues $US 12.4Billion Americas: 58% EMEA: 30% Asia: 12% Footprint Approximately 60,000 employees in more than 100 countries 2
3 What is Cloud Computing? "A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (i.e., hardware and software) that can be rapidly provisioned and released with minimal management effort or service provider interaction" from NIST Special Publication The NIST Definition of Cloud Computing (Sept. 2011) 3
4 How is Cloud Computing used? Deployment options PUBLIC (Available to everyone) Cost efficient & scalable, but information is more vulnerable to security breaches PRIVATE (Available to a single org.) More secure and configurable, but higher start-up & on-going costs HYBRID (Public and Private) Using Public cloud for interaction with citizens, and Private Cloud for storing confidential data COMMUNITY (Shared) Computing resources are shared between orgs. with common needs Service options SaaS (software as a service) Shared use of standard software such as Concourse, Case Logistix, Case Notebook, Box, Office365 PaaS (platform as a service) Shared use of technology platforms like Amazon Web Services, Windows Azure IaaS (infrastructure as a service) Shared use of hardware such as Rack Space, EMC Atmos Storage, Skydrive 4
5 Where could Cloud Computing be applied? Top services or applications moving to the Cloud (Feb. 14, 2013) 40% FEDERAL STATE AND LOCAL 0% 39% 37% 33% Conferencing Messaging Office and and Productivity Collaboration Suites 19% 17% 15% Storage Conferencing and Collaboration Messaging / Business Process Apps / Compute Power Internal Assessment Conduct internal review of IT asset portfolio--age/sophistication/interdependence, organizational readiness and management processes before forming a strategy Make realistic assessment of usability of initial cloud hosted services concentrating on low complexity to implement especially with respect to legacy integration Identify & engage a trusted technology partner in legal & professional workflow rather than a purely commercial cloud supplier 5
6 What issues are being faced in Cloud Computing? Ensuring security of systems and data 68% Compatibility with legacy systems, processes 51% Lack of expertise/experience in this area Standards are still evolving 31% 29% Lack of government framework 24% Cloud products/services still unproven Cultural resistance within agency or IT department Establishing a compelling business case Lack of acquisition vehicle for cloud services Other 17% 15% 10% 4% 4% 0% 70% Note: Three responses allowed Base: 83 respondents in September 2012 and 108 in February 2011 using or assessing cloud services Data: Information Week Federal Government Cloud Computing Survey of federal government technology professionals 6
7 Cloud Computing--balancing risk & benefit Benefits Lower operational costs due to resource pooling and metered consumption On-demand self-service & rapid expansion/contraction of capacity Sophisticated, secure infrastructure approach offered by commercial providers (look for NIST , ISO 27001, SOC2 attestation) Reliable disaster backup & recovery Consistent workflow integration Risks Advanced persistent security threat Ability to manage complex environments across the cloud Loss-of-control of IT infrastructure Incompatibility or inability to integrate with legacy products Nascent government & professional standards Cultural and technical resistance from IT department 7
8 Cloud Computing industry example-thomson Reuters Concourse A SECURE, CLOUD-HOSTED SUITE OF PRODUCTS TO HELP GOVERNMENT LAW DEPARTMENTS BE MORE EFFICIENT Manage matters with features such as integrated legal research and Outlook synchronization Organize, share & repurpose documents Collaborate with individuals inside and outside the department Apply new workflow tools across entire matter collection CONCOURSE DATA IS HOUSED AT THOMSON REUTERS' WORLD-CLASS DATACENTERS OPERATED IN EAGAN, MINNESOTA Concourse's AES 256-bit encryption is at the highest industry & defense standard ensuring that confidential documents are protected against unauthorized access The infrastructure and operating policies protecting your sensitive data follow the same strict standards and audited compliance that has served government, legal and corporate organizations for many years 8
9 Thomson Reuters a trusted partner in legal technology [email protected]
Mark Bluhm CTO Shared Services, TR Professional Mick Atton Chief Architect, TR Legal 4 March 2011
Thomson Reuters MISRC Presentation ti on "" Mark Bluhm CTO Shared Services, TR Professional Mick Atton Chief Architect, TR Legal 4 March 2011 Abstract difficult to ignore the impact of cloud computing
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT
What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Will Be Presented Today? My interest in cloud computing What is cloud computing? Who did I
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Big Data & Its Bigger Possibilities In The Cloud
Big Data & Its Bigger Possibilities In The Cloud Chhavi Gupta Software Engineer, EMC Corporation Sai Pattem Professional MBA Candidate 2013 August 15 th, 9:30 10:30 AM Session 13860 Room 200 (Hynes Convention
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15
CLOUD IN HEALTHCARE CURRENT STATE AND STRATEGIES THAT IMPACT THE BOTTOM LINE EXECUTIVE SUMMARY As healthcare organizations struggle with competing priorities such as HITECH/ARRA, Meaningful Use, ICD-10,
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
<Insert Picture Here> Enterprise Cloud Computing: What, Why and How
Enterprise Cloud Computing: What, Why and How Andrew Sutherland SVP, Middleware Business, EMEA he following is intended to outline our general product direction. It is intended for
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
Cloud Based Solutions for Media and Entertainment
Tech Forum 2012 Cloud Based Solutions for Media and Entertainment by Ron Clifton Globecomm Tech Forum 2012 Hauppauge, NY 7 August 2012 RWC Rev Page: 120804 1 The Program 10:30 Cloud Solutions Part 1: Cloud
Leveraging the Cloud. September 22, 2011. Digital Government Institute Cloud-Enabled Government Conference Washington, DC
Leveraging the Cloud September 22, 2011 Digital Government Institute Cloud-Enabled Government Conference Washington, DC General Dynamics Information Technology Aerospace Combat Systems $29.3 billion in
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Strategic approach to cloud computing deployment
Strategic approach to cloud computing deployment Slavko Gajin, (GN3plus, SA7T1) Datacenter IaaS workshop 2014 11-12. September, 2014 Cloud and NRENs Cloud is the latest big thing affecting NREN users Do
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod
WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED
Security Inspection Inc. Solutions to secure your network
Security Inspection Inc. TM Solutions to secure your network Secure Cloud Utilization Strategies! responsibilities Out of 127 cloud providers surveyed, a recently released study showed that only 25% of
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
How to Keep a Cloud Environment Current, Secure and Available October 16, 2014
How to Keep a Cloud Environment Current, Secure and Available October 16, 2014 Brought to you by Vivit Cloud Builders Special Interest Group www.vivit-worldwide.org Hosted by Sumit Sengupta Information
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
INTRODUCING CLOUD POWER
INTRODUCING CLOUD POWER WHAT IF YOU COULD TAKE YOUR EXISTING IT INFRASTRUC- TURE AND MAKE IT MORE FLEXIBLE, MORE PRODUCTIVE, AND MORE POWERFUL ALL FOR LESS MONEY THAN YOU RE CUR- RENTLY SPENDING? Introducing
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Computing: Background, Risks and Audit Recommendations
Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Fundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
Making Leaders Successful Every Day
Making Leaders Successful Every Day Why & How Enterprises Are Adopting the Cloud James Staten, VP, Principal Analyst The bottom line 1. Public cloud adoption is driven by the business, not IT Empowered
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.
CLOUD BASED SCADA Removing Implementation and Deployment Barriers Liam Kearns Open Systems International, Inc. SCADA Traditional definition and application. SCADA DEFINITION Definition Supervisory Control
A Hotel in the Cloud. Bruno Albietz. [email protected] 079 308 3056
A Hotel in the Cloud Bruno Albietz [email protected] 079 308 3056 Cloud Computing: Any interest for the hospitality industry? The new paradigm for hosting and delivering services over the internet?
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Trends in Business Intelligence
Trends in Business Intelligence The Impact of SaaS and Social Data Shawn P. Rogers Vice President Research ~ Business Intelligence Practice Enterprise Management Associates décembre 16, 2010 Speaker Shawn
Building Private & Hybrid Cloud Solutions
Solution Brief: Building Private & Hybrid Cloud Solutions WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction When most
Cloud Computing/ Semantic Web Initiatives & Tutorial
Cloud Computing/ Semantic Web Initiatives & Tutorial Chuck Vollmer March 2011 The Cloud & Semantic Web 1990s 2010s Mainframe Computing Personal Computing Cloud Computing Cloud computing is as big a paradigm
10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015
10 Considerations for a Cloud Procurement Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 www.lbmctech.com [email protected] Purpose: Cloud computing provides public sector organizations
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
HARNESSING THE POWER OF THE CLOUD
HARNESSING THE POWER OF THE CLOUD Demystifying Cloud Computing Everyone is talking about the cloud nowadays. What does it really means? Indeed, cloud computing is the current stage in the Internet evolution.
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
Software Systems Architecture in a World of Cloud Computing. Christine Miyachi SDM Entering Class 2000
Software Systems Architecture in a World of Cloud Computing Christine Miyachi SDM Entering Class 2000 Copyright Christine Miyachi 2013 Outline Overview of cloud computing The business of cloud The process
DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES
DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES Sreekala P.K., Jayasree V & Dr. M D Baby Sreekala P.K. is working as Professional Assistant at Cochin University of Science
<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012
Cloud Archive Trends and Challenges PASIG Winter 2012 Raymond A. Clarke Enterprise Storage Consultant, Oracle Enterprise Solutions Group How Is PASIG Pronounced? Is it PASIG? Is it
Oracle Applications and Cloud Computing - Future Direction
Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy [email protected] Vijay Tirumalai [email protected]
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
