SlideShare une entreprise Scribd logo
1  sur  57
Télécharger pour lire hors ligne
CloudAsia 2013
Highlights
May 23rd 2013
www.alanquayle.com/blog
Conference Highlights
• Strong Government Support to leapfrog the APAC IT gap
o Cloud Computing Policy in Korea
o Overview of Cloud Adoption in Singapore
• Case Studies in Cloud Adoption
o Steps in Cloud Adoption in SATS (Singapore Airport)
o Diners World Travel’s Experience
o Unified Communications in Healthcare
• Technologies and Frameworks
o Cloud Security Alliance’s Open Security Framework
o 2013 Data Break Report by Verizon
o Role of Identity management
o Complex Analytics using Array DBMS
2
3
Seong Il Seo gave a 5 min review of the state of cloud computing in Korea as part
of the panel session I ran. Bottom-line, cloud computing is growing fast across
most of developed APAC countries.
4
Like most APAC governments they see cloud computing as a way of leapfroging
the IT gap compared with some western nations.
5
Khoong Hock Yun gave a 5 min review of the state of cloud computing in
Singapore as part of the panel session I ran. Bottom-line, cloud computing is
growing fast across most of developed APAC.
6
The Singapore government has tax incentives that have accelerated cloud
adoption in many small and medium businesses in Singapore. The later Diners
World Travel case study will explain this in more detail.
7
All of the APAC countries on the panel (Korea, HK, Thailand and Singapore)
where claiming similar cloud computing penetration rates across enterprise.
8
As always the difference between the figures presented is who does the measuring
and the questions asked and whether a technically strict (see NIST slides in Cloud
Asia 2012 summary) or loose marketing definition is used for cloud computing.
9
10
Focus is security, but security can not be looked at just from just the cloud, need
an end to end approach. Often security is an excuse for the underlying and much
more difficult issue of business case.
11
Great update on SATS Cloud Migration (Singapore Airport). See Cloud Asia 2012
Highlights for last year’s presentation.
12
13
The move to a hybrid cloud was a theme throughout Cloud Asia – which means
security must be viewed end to end and not just within the cloud.
14
15
Most enterprises are using a mix of public cloud (analytics workloads), private
cloud (trading systems) and hybrid cloud (CRM workloads)
16
These are very common issues. Partner selection is everything, PoC (Proof of
Concept) beats any amount of tendering and RFI/P/Qs (Request For Information
/ Product / Quote), Business units want to retain control, and the migration to
cloud is not simple as discussed in my Workshop on Cloud Computing.
17
Another great case studies in Cloud Computing adoption
18
I’ve seen many similar incremental migrations, analytics, then some desktop
applications (cost saving and mobilization) and then CRM. Sometimes Unified
Communications will be the first or second step, especially when a Telco Cloud
provider is used.
19
20
21
22
23
24
25
26
This is a key point – there’s a BIG tax incentive to adopt cloud computing in
Singapore!!!
27
Unified Communication is also a popular workload to move to the cloud.
28Users of the UC Cloud
29
30
Maxis plays an important role in this solution
31
32
A trend over the past year has been the creation of security frameworks, security
certifications and auditing around cloud computing
33
34
35
36
This is true, and security is sometimes used as an excuse when the underlying
reason is lack of clarity around the business case of moving a specific workload
onto the cloud.
37
38
But regardless of the your cloud providers certification, every enterprise must
have an end to end security framework . Next slides highlight some interesting
results from Verizon on Data Breaches
39
http://www.verizonenterprise.com/DBIR/2013/
This is an excellent report, URL shown above. It came up in many of the
discussions around security in the conference.
40
41
42
43
44
45
46
47
Vocabulary for Event Recording and Incident Sharing (VERIS) is a set of metrics
designed to provide a common language for describing security incidents in a
structured and repeatable manner.
48
And in taking an end to end approach to ecurity Identity management becomes
critical
49
50
51
52
Great review on the emergence of complex analytics and the challenges we’re
seeing with Hadoop for some complex analytic tasks
53
54
55
56
I am seeing with some implementations the limitations of Hadoop being
discovered as organizations start looking within their data for covariance to better
predict customer behavior and addressable services.
57
Granted Michael is selling his technology, but I am seeing a gap emerging
between RDBMS and Hadoop as the analytics gets more sophisticated, and
correlation between variables becomes a topic of study. Whether an Array DBMS
fills the gap, or the ecosystems extend their capabilities to better fill this gap will
likely take a few years to resolve. As always nothing remains still… All we can do
is focus on solving today’s problems without locking ourselves in.

Contenu connexe

Tendances

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&AMichel de Goede
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloudTalentLMS
 
Here are highlights from a CIO survey that shows the changing IT landscape in...
Here are highlights from a CIO survey that shows the changing IT landscape in...Here are highlights from a CIO survey that shows the changing IT landscape in...
Here are highlights from a CIO survey that shows the changing IT landscape in...NetApp
 
What is next for cloud computing?
What is next for cloud computing?What is next for cloud computing?
What is next for cloud computing?Ahmed Banafa
 
7 steps to cloud transformation
7 steps to cloud transformation7 steps to cloud transformation
7 steps to cloud transformationSingtel
 
Top 5 benefits of using cloud computing for business
Top 5 benefits of using cloud computing for businessTop 5 benefits of using cloud computing for business
Top 5 benefits of using cloud computing for businessCQ Infotech
 
Cloud computing certification in chennai
Cloud computing certification in chennaiCloud computing certification in chennai
Cloud computing certification in chennaiTHINK IT Training
 
Cloud & Mobile Computing
Cloud & Mobile ComputingCloud & Mobile Computing
Cloud & Mobile ComputingRichard Masters
 
Oris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloudOris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloudJim Robins
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Davis Blair
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integrationMichel de Goede
 
Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010rkasai
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesRamneek Kalra
 
Cloud vs. on premise
Cloud vs. on premiseCloud vs. on premise
Cloud vs. on premiseAndrew Das
 
Hybrid cloud decisions
Hybrid cloud decisionsHybrid cloud decisions
Hybrid cloud decisionsMarc Den Held
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in ThailandValiente Veera
 

Tendances (20)

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
Here are highlights from a CIO survey that shows the changing IT landscape in...
Here are highlights from a CIO survey that shows the changing IT landscape in...Here are highlights from a CIO survey that shows the changing IT landscape in...
Here are highlights from a CIO survey that shows the changing IT landscape in...
 
What is next for cloud computing?
What is next for cloud computing?What is next for cloud computing?
What is next for cloud computing?
 
7 steps to cloud transformation
7 steps to cloud transformation7 steps to cloud transformation
7 steps to cloud transformation
 
Top 5 benefits of using cloud computing for business
Top 5 benefits of using cloud computing for businessTop 5 benefits of using cloud computing for business
Top 5 benefits of using cloud computing for business
 
Cloud computing certification in chennai
Cloud computing certification in chennaiCloud computing certification in chennai
Cloud computing certification in chennai
 
Cloud & Mobile Computing
Cloud & Mobile ComputingCloud & Mobile Computing
Cloud & Mobile Computing
 
Cloud Management and Automation, Highlights from 451 Research
Cloud Management and Automation, Highlights from 451 ResearchCloud Management and Automation, Highlights from 451 Research
Cloud Management and Automation, Highlights from 451 Research
 
Oris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloudOris4 white paper ecm and the cloud
Oris4 white paper ecm and the cloud
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integration
 
Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all Industries
 
HCL Ace Case Solution
HCL Ace Case SolutionHCL Ace Case Solution
HCL Ace Case Solution
 
Cloud vs. on premise
Cloud vs. on premiseCloud vs. on premise
Cloud vs. on premise
 
Hybrid cloud decisions
Hybrid cloud decisionsHybrid cloud decisions
Hybrid cloud decisions
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
FINAL PRINTED VER - 29102014
FINAL PRINTED VER - 29102014FINAL PRINTED VER - 29102014
FINAL PRINTED VER - 29102014
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in Thailand
 

En vedette

Architecting a Private Cloud - Cloud Expo
Architecting a Private Cloud - Cloud ExpoArchitecting a Private Cloud - Cloud Expo
Architecting a Private Cloud - Cloud Exposmw355
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAlessandro Iudica
 
Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...
Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...
Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...Rex Wang
 
Enterprise Cloud Adoption Strategies
Enterprise Cloud Adoption StrategiesEnterprise Cloud Adoption Strategies
Enterprise Cloud Adoption StrategiesLee Atchison
 
Future Stack NY - Monitoring the Dynamic Nature of the Cloud
Future Stack NY - Monitoring the Dynamic Nature of the CloudFuture Stack NY - Monitoring the Dynamic Nature of the Cloud
Future Stack NY - Monitoring the Dynamic Nature of the CloudLee Atchison
 
IDC Directions 2014 in Nordics - IT Service challenges and new sourcing models
IDC Directions 2014 in Nordics - IT Service challenges and new sourcing modelsIDC Directions 2014 in Nordics - IT Service challenges and new sourcing models
IDC Directions 2014 in Nordics - IT Service challenges and new sourcing modelsJohan Hallberg
 
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum ResultsMulti-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum ResultsRightScale
 
Cloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseCloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseAmazon Web Services
 
Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...
Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...
Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...WSO2
 
Roadmap to Enterprise Cloud Computing
Roadmap to Enterprise Cloud ComputingRoadmap to Enterprise Cloud Computing
Roadmap to Enterprise Cloud ComputingRex Wang
 

En vedette (10)

Architecting a Private Cloud - Cloud Expo
Architecting a Private Cloud - Cloud ExpoArchitecting a Private Cloud - Cloud Expo
Architecting a Private Cloud - Cloud Expo
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...
Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...
Cloud Expo Santa Clara Nov 2010 General Session: Roadmap to Enterprise Cloud ...
 
Enterprise Cloud Adoption Strategies
Enterprise Cloud Adoption StrategiesEnterprise Cloud Adoption Strategies
Enterprise Cloud Adoption Strategies
 
Future Stack NY - Monitoring the Dynamic Nature of the Cloud
Future Stack NY - Monitoring the Dynamic Nature of the CloudFuture Stack NY - Monitoring the Dynamic Nature of the Cloud
Future Stack NY - Monitoring the Dynamic Nature of the Cloud
 
IDC Directions 2014 in Nordics - IT Service challenges and new sourcing models
IDC Directions 2014 in Nordics - IT Service challenges and new sourcing modelsIDC Directions 2014 in Nordics - IT Service challenges and new sourcing models
IDC Directions 2014 in Nordics - IT Service challenges and new sourcing models
 
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum ResultsMulti-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
 
Cloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseCloud Adoption in the Enterprise
Cloud Adoption in the Enterprise
 
Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...
Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...
Roadmap to the Clouds - How to Easily Migrate to the Cloud Platform Using WSO...
 
Roadmap to Enterprise Cloud Computing
Roadmap to Enterprise Cloud ComputingRoadmap to Enterprise Cloud Computing
Roadmap to Enterprise Cloud Computing
 

Similaire à Cloud Asia 2013 Highlights

CloudAsia 2012 Highlights
CloudAsia 2012 HighlightsCloudAsia 2012 Highlights
CloudAsia 2012 HighlightsAlan Quayle
 
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Yew Weisin
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsShaun Thomas
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...Samia Kenley
 
Migrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-finalMigrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-finaleng999
 
Running head SESSION HIJACKING & CLOUD COMPUTING .docx
Running head SESSION HIJACKING & CLOUD COMPUTING                 .docxRunning head SESSION HIJACKING & CLOUD COMPUTING                 .docx
Running head SESSION HIJACKING & CLOUD COMPUTING .docxcharisellington63520
 
CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?karlmotz
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - CloudSonovate
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First EnterprisesOpsRamp
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 

Similaire à Cloud Asia 2013 Highlights (20)

CloudAsia 2012 Highlights
CloudAsia 2012 HighlightsCloudAsia 2012 Highlights
CloudAsia 2012 Highlights
 
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
 
Epaper
EpaperEpaper
Epaper
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
 
Migrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-finalMigrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-final
 
Running head SESSION HIJACKING & CLOUD COMPUTING .docx
Running head SESSION HIJACKING & CLOUD COMPUTING                 .docxRunning head SESSION HIJACKING & CLOUD COMPUTING                 .docx
Running head SESSION HIJACKING & CLOUD COMPUTING .docx
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 

Plus de Alan Quayle

Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Alan Quayle
 
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Alan Quayle
 
What makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelWhat makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelAlan Quayle
 
eSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasaleSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasalAlan Quayle
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeAlan Quayle
 
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...Alan Quayle
 
Programmable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigProgrammable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigAlan Quayle
 
How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...Alan Quayle
 
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisLatest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisAlan Quayle
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...Alan Quayle
 
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Alan Quayle
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleAlan Quayle
 
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuOpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuAlan Quayle
 
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoTADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoAlan Quayle
 
What happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleWhat happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleAlan Quayle
 
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichStacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichAlan Quayle
 
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...Alan Quayle
 
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateFounding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateAlan Quayle
 
How to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciHow to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciAlan Quayle
 

Plus de Alan Quayle (20)

What is a vCon?
What is a vCon?What is a vCon?
What is a vCon?
 
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
 
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
 
What makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelWhat makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias Goebel
 
eSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasaleSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João Casal
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin Sime
 
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
 
Programmable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigProgrammable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas Granig
 
How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...
 
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisLatest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
 
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan Quayle
 
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuOpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
 
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoTADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
 
What happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleWhat happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan Quayle
 
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichStacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
 
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
 
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateFounding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
 
How to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciHow to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro Gauci
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Cloud Asia 2013 Highlights

  • 1. CloudAsia 2013 Highlights May 23rd 2013 www.alanquayle.com/blog
  • 2. Conference Highlights • Strong Government Support to leapfrog the APAC IT gap o Cloud Computing Policy in Korea o Overview of Cloud Adoption in Singapore • Case Studies in Cloud Adoption o Steps in Cloud Adoption in SATS (Singapore Airport) o Diners World Travel’s Experience o Unified Communications in Healthcare • Technologies and Frameworks o Cloud Security Alliance’s Open Security Framework o 2013 Data Break Report by Verizon o Role of Identity management o Complex Analytics using Array DBMS 2
  • 3. 3 Seong Il Seo gave a 5 min review of the state of cloud computing in Korea as part of the panel session I ran. Bottom-line, cloud computing is growing fast across most of developed APAC countries.
  • 4. 4 Like most APAC governments they see cloud computing as a way of leapfroging the IT gap compared with some western nations.
  • 5. 5 Khoong Hock Yun gave a 5 min review of the state of cloud computing in Singapore as part of the panel session I ran. Bottom-line, cloud computing is growing fast across most of developed APAC.
  • 6. 6 The Singapore government has tax incentives that have accelerated cloud adoption in many small and medium businesses in Singapore. The later Diners World Travel case study will explain this in more detail.
  • 7. 7 All of the APAC countries on the panel (Korea, HK, Thailand and Singapore) where claiming similar cloud computing penetration rates across enterprise.
  • 8. 8 As always the difference between the figures presented is who does the measuring and the questions asked and whether a technically strict (see NIST slides in Cloud Asia 2012 summary) or loose marketing definition is used for cloud computing.
  • 9. 9
  • 10. 10 Focus is security, but security can not be looked at just from just the cloud, need an end to end approach. Often security is an excuse for the underlying and much more difficult issue of business case.
  • 11. 11 Great update on SATS Cloud Migration (Singapore Airport). See Cloud Asia 2012 Highlights for last year’s presentation.
  • 12. 12
  • 13. 13 The move to a hybrid cloud was a theme throughout Cloud Asia – which means security must be viewed end to end and not just within the cloud.
  • 14. 14
  • 15. 15 Most enterprises are using a mix of public cloud (analytics workloads), private cloud (trading systems) and hybrid cloud (CRM workloads)
  • 16. 16 These are very common issues. Partner selection is everything, PoC (Proof of Concept) beats any amount of tendering and RFI/P/Qs (Request For Information / Product / Quote), Business units want to retain control, and the migration to cloud is not simple as discussed in my Workshop on Cloud Computing.
  • 17. 17 Another great case studies in Cloud Computing adoption
  • 18. 18 I’ve seen many similar incremental migrations, analytics, then some desktop applications (cost saving and mobilization) and then CRM. Sometimes Unified Communications will be the first or second step, especially when a Telco Cloud provider is used.
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26 This is a key point – there’s a BIG tax incentive to adopt cloud computing in Singapore!!!
  • 27. 27 Unified Communication is also a popular workload to move to the cloud.
  • 28. 28Users of the UC Cloud
  • 29. 29
  • 30. 30 Maxis plays an important role in this solution
  • 31. 31
  • 32. 32 A trend over the past year has been the creation of security frameworks, security certifications and auditing around cloud computing
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36 This is true, and security is sometimes used as an excuse when the underlying reason is lack of clarity around the business case of moving a specific workload onto the cloud.
  • 37. 37
  • 38. 38 But regardless of the your cloud providers certification, every enterprise must have an end to end security framework . Next slides highlight some interesting results from Verizon on Data Breaches
  • 39. 39 http://www.verizonenterprise.com/DBIR/2013/ This is an excellent report, URL shown above. It came up in many of the discussions around security in the conference.
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47 Vocabulary for Event Recording and Incident Sharing (VERIS) is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner.
  • 48. 48 And in taking an end to end approach to ecurity Identity management becomes critical
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 52 Great review on the emergence of complex analytics and the challenges we’re seeing with Hadoop for some complex analytic tasks
  • 53. 53
  • 54. 54
  • 55. 55
  • 56. 56 I am seeing with some implementations the limitations of Hadoop being discovered as organizations start looking within their data for covariance to better predict customer behavior and addressable services.
  • 57. 57 Granted Michael is selling his technology, but I am seeing a gap emerging between RDBMS and Hadoop as the analytics gets more sophisticated, and correlation between variables becomes a topic of study. Whether an Array DBMS fills the gap, or the ecosystems extend their capabilities to better fill this gap will likely take a few years to resolve. As always nothing remains still… All we can do is focus on solving today’s problems without locking ourselves in.