SlideShare une entreprise Scribd logo
1  sur  15
Business Perspectives on
                Cloud Computing
                       John Rhoton
                  Digital Trends 2011, Athens
                Green ICT and Cloud Computing


30/11/2011            John Rhoton – Digital Trends 2011   1
Agenda
 • Assessment
      – Financial, Risk, Strategic
 • Adoption
 • Challenges
 • Guidance



30/11/2011             John Rhoton – Digital Trends 2011   2
Business Perspective on Definition
Cloud Computing is a set of technologies that
help to achieve three business objectives:
 • Cost reduction
      – Virtualization, Multi-tenancy, Automation, ...
 • Business flexibility
      – On-demand, Utility-pricing, Elasticity, ...
 • Focus on core competency
      – Internet delivery, Off-premise execution, Outsourced
        operation, ...

30/11/2011               John Rhoton – Digital Trends 2011     3
Two views of technology evolution
 No pivotal innovation                 vs.         Very disruptive impact
                                                               Network effects
                                                                                   Competitive
 THEN                                  Economy                                        Price
 • Application Service Provider         of Scale
 • Web Hosting Service
 • Managed Hosting Service
 NOW                                                                               Accelerated
 • Software-as-a-Service                   Improved                                development
 • Platform-as-a-Service                 functionality
 • Infrastructure-as-a-Service

 Multi-tenancy. Virtualization.
 Utility billing. These aren’t new –                          Increased Adoption
 just a gradual evolution.                   The right conditions can create market
                                             disruption for evolutionary improvements.
30/11/2011                     John Rhoton – Digital Trends 2011                            4
Financial Assessment
•   Software
•   Hardware
•   Facilities
•   Operations




30/11/2011        John Rhoton – Digital Trends 2011   5
Risk Assessment
 •    Data leakage                         • Rogue clouds
 •    Data loss                                   – Employee dissatisfaction
 •    Service loss                                – Unmanaged applications
                                                  – Insecure data
 •    Compliance
 •    Lock-in                              • Competitive disadvantage
                                           • Internal risks
     Many organizations greatly underestimate the capability and
     motivation of the cloud providers to address these risks.
     They also overestimate their own ability to eliminate these risks
     from internal implementations.
30/11/2011                   John Rhoton – Digital Trends 2011                 6
Strategic Assessment
 • IT Support
      – Intellectual Property
      – Knowledge Management
      – Service Delivery
 • Agile Enterprise
      – Core competency
      – Modular services
      – Ecosystem
30/11/2011           John Rhoton – Digital Trends 2011   7
Private to hybrid evolution


 • Resource Efficiencies
 • Operational Efficiencies
 • Sourcing Efficiencies



30/11/2011           John Rhoton – Digital Trends 2011   8
Candidate applications
 Low risk, high return
 • Test and Development
 • Externalised applications
      – Isolate threats, malware
 • Redundancy
      – Geographical
      – Organizational
      – Technological

30/11/2011               John Rhoton – Digital Trends 2011   9
Design challenges
 •   Integration
 •   User management
 •   Reliability
 •   Governance / SLAs
 •   Security
              The most common cause of failure
             is underestimating these challenges

30/11/2011        John Rhoton – Digital Trends 2011   10
Concerns and risk mitigation
      Risk           Mitigation
      Data leakage   Encryption
      Data loss      Multi-source, backup
      Vendor         Standards, multi-source,
      lock-in        backup, exit strategy
      Service loss   SLA, audit, certifications
      Compliance     SLA, audit, certifications

30/11/2011           John Rhoton – Digital Trends 2011   11
New trust basis
                               Employees                      Contractors

  • Personal observation                                                    Physical
  • Personal experience                                                       Segmentation
                                                                            Access controls
  • Human Insight
                                   Partners             Suppliers



                                        Auditors
  • Public verification                                                      Virtual
                                        Public Scrutiny                        Segmentation
  • Contracts
                                                                             Encryption
  • Compensation                   Experts                                   Access controls
                                   Legal Counsel
30/11/2011                John Rhoton – Digital Trends 2011                               12
Words of Advice
 • Start early
 • Engage everyone
      – Users, HR, Legal, Procurement,…
 • Be skeptical of the skeptics
 • Find Quick wins
      – Cheap, low-risk
 • Prepare for the long term
30/11/2011            John Rhoton – Digital Trends 2011   13
Summary
 • Assess cloud computing from financial, risk
   and strategic perspectives
 • Be prepared for disruption
      – Requires new trust strategy
 • Don’t underestimate the challenges
 • Accept the inevitable


30/11/2011            John Rhoton – Digital Trends 2011   14
Thank you!

      John Rhoton

      john_rhoton@symantec.com, john.rhoton@gmail.com
      xing.com/profile/John_Rhoton
      linkedin.com/in/rhoton
      amazon.com/John-Rhoton/e/B001K8TFW0
      slideshare.net/rhoton


30/11/2011                  John Rhoton – Digital Trends 2011   15

Contenu connexe

Tendances

Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Architecture of data mining system
Architecture of data mining systemArchitecture of data mining system
Architecture of data mining systemramya marichamy
 
Introduction to Data Warehouse
Introduction to Data WarehouseIntroduction to Data Warehouse
Introduction to Data WarehouseShanthi Mukkavilli
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Ravindra Dastikop
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 
Data mining & data warehousing (ppt)
Data mining & data warehousing (ppt)Data mining & data warehousing (ppt)
Data mining & data warehousing (ppt)Harish Chand
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11koolkampus
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
Metadata in data warehouse
Metadata in data warehouseMetadata in data warehouse
Metadata in data warehouseSiddique Ibrahim
 
Data warehousing and data mart
Data warehousing and data martData warehousing and data mart
Data warehousing and data martAmit Sarkar
 
Data warehouse architecture
Data warehouse architecture Data warehouse architecture
Data warehouse architecture janani thirupathi
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data VisualizationRaffael Marty
 
Parallel Programming
Parallel ProgrammingParallel Programming
Parallel ProgrammingUday Sharma
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecturepcherukumalla
 
Distributed database system
Distributed database systemDistributed database system
Distributed database systemM. Ahmad Mahmood
 
Advance database systems (part 1)
Advance database systems (part 1)Advance database systems (part 1)
Advance database systems (part 1)Abdullah Khosa
 

Tendances (20)

Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Different data models
Different data modelsDifferent data models
Different data models
 
web mining
web miningweb mining
web mining
 
Architecture of data mining system
Architecture of data mining systemArchitecture of data mining system
Architecture of data mining system
 
Introduction to Data Warehouse
Introduction to Data WarehouseIntroduction to Data Warehouse
Introduction to Data Warehouse
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Data mining & data warehousing (ppt)
Data mining & data warehousing (ppt)Data mining & data warehousing (ppt)
Data mining & data warehousing (ppt)
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Nosql data models
Nosql data modelsNosql data models
Nosql data models
 
Metadata in data warehouse
Metadata in data warehouseMetadata in data warehouse
Metadata in data warehouse
 
Data warehousing and data mart
Data warehousing and data martData warehousing and data mart
Data warehousing and data mart
 
Data warehouse architecture
Data warehouse architecture Data warehouse architecture
Data warehouse architecture
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
Parallel Programming
Parallel ProgrammingParallel Programming
Parallel Programming
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Distributed database system
Distributed database systemDistributed database system
Distributed database system
 
Advance database systems (part 1)
Advance database systems (part 1)Advance database systems (part 1)
Advance database systems (part 1)
 
ETL Technologies.pptx
ETL Technologies.pptxETL Technologies.pptx
ETL Technologies.pptx
 

En vedette

AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches StudyAMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches StudyAMD
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingCBOD ANR project U-PSUD
 
Cloud computing and SME
Cloud computing and SMECloud computing and SME
Cloud computing and SMEDhayis A.abdul
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologiessveldanda
 
Cloud Computing for the SME
Cloud Computing for the SMECloud Computing for the SME
Cloud Computing for the SMEhyther
 
MDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAMMDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAMPoh Lee
 
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...Patrick Chanezon
 
A Cloud Decision making Framework
A Cloud Decision making FrameworkA Cloud Decision making Framework
A Cloud Decision making FrameworkAndy Marshall
 

En vedette (8)

AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches StudyAMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches Study
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Cloud computing and SME
Cloud computing and SMECloud computing and SME
Cloud computing and SME
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
 
Cloud Computing for the SME
Cloud Computing for the SMECloud Computing for the SME
Cloud Computing for the SME
 
MDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAMMDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAM
 
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
 
A Cloud Decision making Framework
A Cloud Decision making FrameworkA Cloud Decision making Framework
A Cloud Decision making Framework
 

Similaire à Business Perspectives on Cloud Computing

Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapJohn Rhoton
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateJTLeekley
 
Guiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessGuiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessPerficient, Inc.
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerJohn Rhoton
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Grenville Lannon
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Alan McSweeney
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsJohn Rhoton
 
Monitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysisMonitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysisEsri
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 
Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotoninevitablecloud
 
Visualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical ReportingVisualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical ReportingPatrick Spedding
 
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...Krishnan Parasuraman
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionCorey O'Neal
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12wstippich
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idmNormand Sauve
 

Similaire à Business Perspectives on Cloud Computing (20)

Digital trends rhoton-20111205
Digital trends rhoton-20111205Digital trends rhoton-20111205
Digital trends rhoton-20111205
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 Update
 
Guiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessGuiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment Readiness
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
 
Monitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysisMonitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysis
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
 
Query at Speed of Thought
Query at Speed of ThoughtQuery at Speed of Thought
Query at Speed of Thought
 
Visualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical ReportingVisualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical Reporting
 
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing Disruption
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
 

Plus de John Rhoton

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Plus de John Rhoton (17)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Dernier

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Business Perspectives on Cloud Computing

  • 1. Business Perspectives on Cloud Computing John Rhoton Digital Trends 2011, Athens Green ICT and Cloud Computing 30/11/2011 John Rhoton – Digital Trends 2011 1
  • 2. Agenda • Assessment – Financial, Risk, Strategic • Adoption • Challenges • Guidance 30/11/2011 John Rhoton – Digital Trends 2011 2
  • 3. Business Perspective on Definition Cloud Computing is a set of technologies that help to achieve three business objectives: • Cost reduction – Virtualization, Multi-tenancy, Automation, ... • Business flexibility – On-demand, Utility-pricing, Elasticity, ... • Focus on core competency – Internet delivery, Off-premise execution, Outsourced operation, ... 30/11/2011 John Rhoton – Digital Trends 2011 3
  • 4. Two views of technology evolution No pivotal innovation vs. Very disruptive impact Network effects Competitive THEN Economy Price • Application Service Provider of Scale • Web Hosting Service • Managed Hosting Service NOW Accelerated • Software-as-a-Service Improved development • Platform-as-a-Service functionality • Infrastructure-as-a-Service Multi-tenancy. Virtualization. Utility billing. These aren’t new – Increased Adoption just a gradual evolution. The right conditions can create market disruption for evolutionary improvements. 30/11/2011 John Rhoton – Digital Trends 2011 4
  • 5. Financial Assessment • Software • Hardware • Facilities • Operations 30/11/2011 John Rhoton – Digital Trends 2011 5
  • 6. Risk Assessment • Data leakage • Rogue clouds • Data loss – Employee dissatisfaction • Service loss – Unmanaged applications – Insecure data • Compliance • Lock-in • Competitive disadvantage • Internal risks Many organizations greatly underestimate the capability and motivation of the cloud providers to address these risks. They also overestimate their own ability to eliminate these risks from internal implementations. 30/11/2011 John Rhoton – Digital Trends 2011 6
  • 7. Strategic Assessment • IT Support – Intellectual Property – Knowledge Management – Service Delivery • Agile Enterprise – Core competency – Modular services – Ecosystem 30/11/2011 John Rhoton – Digital Trends 2011 7
  • 8. Private to hybrid evolution • Resource Efficiencies • Operational Efficiencies • Sourcing Efficiencies 30/11/2011 John Rhoton – Digital Trends 2011 8
  • 9. Candidate applications Low risk, high return • Test and Development • Externalised applications – Isolate threats, malware • Redundancy – Geographical – Organizational – Technological 30/11/2011 John Rhoton – Digital Trends 2011 9
  • 10. Design challenges • Integration • User management • Reliability • Governance / SLAs • Security The most common cause of failure is underestimating these challenges 30/11/2011 John Rhoton – Digital Trends 2011 10
  • 11. Concerns and risk mitigation Risk Mitigation Data leakage Encryption Data loss Multi-source, backup Vendor Standards, multi-source, lock-in backup, exit strategy Service loss SLA, audit, certifications Compliance SLA, audit, certifications 30/11/2011 John Rhoton – Digital Trends 2011 11
  • 12. New trust basis Employees Contractors • Personal observation Physical • Personal experience Segmentation Access controls • Human Insight Partners Suppliers Auditors • Public verification Virtual Public Scrutiny Segmentation • Contracts Encryption • Compensation Experts Access controls Legal Counsel 30/11/2011 John Rhoton – Digital Trends 2011 12
  • 13. Words of Advice • Start early • Engage everyone – Users, HR, Legal, Procurement,… • Be skeptical of the skeptics • Find Quick wins – Cheap, low-risk • Prepare for the long term 30/11/2011 John Rhoton – Digital Trends 2011 13
  • 14. Summary • Assess cloud computing from financial, risk and strategic perspectives • Be prepared for disruption – Requires new trust strategy • Don’t underestimate the challenges • Accept the inevitable 30/11/2011 John Rhoton – Digital Trends 2011 14
  • 15. Thank you! John Rhoton john_rhoton@symantec.com, john.rhoton@gmail.com xing.com/profile/John_Rhoton linkedin.com/in/rhoton amazon.com/John-Rhoton/e/B001K8TFW0 slideshare.net/rhoton 30/11/2011 John Rhoton – Digital Trends 2011 15