SlideShare una empresa de Scribd logo
1 de 31
Managing Cloud Business
Solutions
Allison Miller, Vanguard Visions Consulting
Modbury & Salisbury
Session Overview
• What is the “Cloud”?
• Managing your Cloud Business Solutions
What is the “Cloud”?
Image: http://en.wikipedia.org/wiki/Cloud_computing
Cloud Computing aka “the Cloud”
Types of Cloud Services
Image: 'What Type of Cloud?: Private, Public or+Hybrid?' - http://www.flickr.com/photos/26072489@N08/5332731617
Some Examples of Public Cloud Services
Some Examples of Private Cloud Services
Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
A few ways of using the Cloud
1. Software as a Service (SAAS)
– Email and Word processing
– Accounting system
– Human Resource/Project Management
– Customer Service Management (CRM)
2. Platform as a service (PaaS)
– Operating Systems
– Web services
– Development Platforms
3. Infrastructure as a service (IaaS)
– Data storage
– Processing power
– Server virtualisation
Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
A few ways of using the Cloud
1. Other Cloud services :
– Desktop as a service (DaaS)
– Network as a service (NaaS) (VPNs)
– Storage as a service (STaaS)
– Security as a service (SECaaS) (Authentication,
Antivirus, Intrusion Detection)
– Data as a service (DaaS)
– Test environment as a service (TEaaS)
Pros:
• Anytime, anywhere, any device
• Quickly ‘scale up’
• Stronger security
• External backup-storage/services
• Reduced license costs
• Outsource ICT services
• Collaboration
• Synchronisation
• Greener computing
Cons:
• Where is the data?
Ownership/Privacy/Security
• Need internet connection
• Interoperability (Open standards)
• Vendor lock-in
• Internet required
Why use the Cloud?
Image: ‘Open Sky’ by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8496879398
Managing your Cloud
Business Solutions
Business Solutions Comparison
Identifying Cloud Opportunities
Source: Department of Finance and Deregulation
http://agimo.gov.au/2012/09/19/final-release-a-guide-to-implementing-cloud-services/
1. Assess suitability for
business needs
2. Consider timing and
drivers
3. Consider financial impacts
4. Consider organisational
capability
5. Manage change
6. Review governance
Implementing Cloud Services
Source: Department of Finance and Deregulation
agimo.gov.au/2012/09/19/final-release-a-guide-to-implementing-cloud-services/
1. Build a business model/case
2. Assess the risk
3. Determine requirements
• Functionality
• Standards
• Performance
• Manageability
• Security
• Compliance
4. Prepare an exit strategy
5. Determine contractual terms
6. Approach the market
7. Select a provider
8. Implementation / Maintenance
Cloud Computing
Security Considerations
Source: Department of Defence:
www.dsd.gov.au/infosec/cloudsecurity.htm
Maintaining Availability/
Functionality
1. Business data/functionality
2. Your Data back-up plan
3. Your continuity / disaster plan
4. Network connectivity
5. Impact of outages
6. Vendor continuity / disaster plan
7. Vendor guarantee
7. Service Level Agreement (SLA)
8. Compensation
9. Data integrity and availability
10.Data restoration
11.Scalability
12.Changing Vendors
Cloud Computing
Security Considerations
Source: Department of Defence:
www.dsd.gov.au/infosec/cloudsecurity.htm
Protecting data from
unauthorised access
1. Type of cloud computing service
2. Sensitivity of data
3. Legislative obligations (eg Privacy
Act, Archiving Act)
4. Countries which can access the data
(eg Patriots Act)
5. Data Encryption
6. Destruction of data
7. Remote monitoring / management
8. Data ownership
9. Gateway technologies /
certifications
10.Content filters
11.Security services
12.User authentication
13.Procurement processes
Why manage?
• Reduce possible risks
• Enables continuous improvement
• Informs planning/decision making
• Increases Stakeholder confidence
• Incorporates int/ext factors
• Identifies procedures/processes
• Ensures the right infrastructure
Barriers?
• Lack of commitment
• Lack of processes/planning
• Lack of resourcing/finances
• Others?
Managing your Cloud Business Solution
Image: ‘Dell in the Cloud Think Tank at the Skyloft, Millbank, London’ by DELL Inc - http://www.flickr.com/photos/dellphotos/8182050295/
Determine Internal/External Factors &
Stakeholders
INTERNAL
FACTORS
INTERNAL
STAKEHOLDERS
EXTERNAL
FACTORS
EXTERNAL
STAKEHOLDERS
SWOT Analysis – Implementing/Managing a
cloud business solution
STRENGTHS OPPORTUNITIES
WEAKNESSES THREATS
Risk Analysis
Likelihood vs Impact
Risk Matrix
Source: Chris Toselli – Elearning & Risk
Critical success factors of
managing a cloud
business solution
Business needs
Image: Cloud Accounting by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8859144815/
Security / Integration
Image: Cyber-Safety by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8859140775//
Ownership / Recovery
Image: Cyber-Safety by Vanguard Visions Consulting- http://www.flickr.com/photos/77018488@N03/8859746506/
Vendor capability / capacity
Image: Pumpkins by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8632002783/
Achievability
Image: Designing Learning in the Digital Age – Melb March 2013 – Vanguard Visions Consulting: http://www.flickr.com/photos/77018488@N03/8569652009/
What will you investigate
further?
Workshop evaluation
Want to know more?
More info: digitalcapability.com.au
Register for eUpdates: bit.ly/digitalcapability
Follow on:
Twitter - twitter.com/digitalcapabili
Facebook - facebook.com/digitalcapability
LinkedIn - bit.ly/DCLinkedIN
Google+ - bit.ly/DCGoogleplus
Pinterest - pinterest.com/vanguardvisions
vanguardvisionsconsulting.com.au
Allison Miller
0400 732 270
allison@vanguardvisions.com.au
vanguardvisionsconsulting.com.au

Más contenido relacionado

Más de Vanguard Visions

Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...Vanguard Visions
 
Tips and tools for working smarter
Tips and tools for working smarterTips and tools for working smarter
Tips and tools for working smarterVanguard Visions
 
Increase student motivation (and reduce cheating) using Moodle and Mahara
 Increase student motivation (and reduce cheating) using Moodle and Mahara  Increase student motivation (and reduce cheating) using Moodle and Mahara
Increase student motivation (and reduce cheating) using Moodle and Mahara Vanguard Visions
 
Increase student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using MaharaIncrease student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using MaharaVanguard Visions
 
Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...Vanguard Visions
 
Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...Vanguard Visions
 
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...Vanguard Visions
 
Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014Vanguard Visions
 
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10 Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10 Vanguard Visions
 
Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614Vanguard Visions
 
Driving customers to your website
Driving customers to your websiteDriving customers to your website
Driving customers to your websiteVanguard Visions
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Vanguard Visions
 
Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014Vanguard Visions
 
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214Vanguard Visions
 
Implementing workplace online training - 130214
Implementing workplace online training - 130214Implementing workplace online training - 130214
Implementing workplace online training - 130214Vanguard Visions
 
Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Vanguard Visions
 
E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214Vanguard Visions
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Vanguard Visions
 
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Vanguard Visions
 
How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113Vanguard Visions
 

Más de Vanguard Visions (20)

Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...
 
Tips and tools for working smarter
Tips and tools for working smarterTips and tools for working smarter
Tips and tools for working smarter
 
Increase student motivation (and reduce cheating) using Moodle and Mahara
 Increase student motivation (and reduce cheating) using Moodle and Mahara  Increase student motivation (and reduce cheating) using Moodle and Mahara
Increase student motivation (and reduce cheating) using Moodle and Mahara
 
Increase student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using MaharaIncrease student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using Mahara
 
Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...
 
Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...
 
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
 
Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014
 
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10 Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
 
Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614
 
Driving customers to your website
Driving customers to your websiteDriving customers to your website
Driving customers to your website
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614
 
Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014
 
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
 
Implementing workplace online training - 130214
Implementing workplace online training - 130214Implementing workplace online training - 130214
Implementing workplace online training - 130214
 
Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14
 
E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13
 
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
 
How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Enterprise power point managing cloud business solutions june 13

  • 1. Managing Cloud Business Solutions Allison Miller, Vanguard Visions Consulting Modbury & Salisbury
  • 2. Session Overview • What is the “Cloud”? • Managing your Cloud Business Solutions
  • 3. What is the “Cloud”?
  • 5. Types of Cloud Services Image: 'What Type of Cloud?: Private, Public or+Hybrid?' - http://www.flickr.com/photos/26072489@N08/5332731617
  • 6. Some Examples of Public Cloud Services
  • 7. Some Examples of Private Cloud Services
  • 8. Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 A few ways of using the Cloud 1. Software as a Service (SAAS) – Email and Word processing – Accounting system – Human Resource/Project Management – Customer Service Management (CRM) 2. Platform as a service (PaaS) – Operating Systems – Web services – Development Platforms 3. Infrastructure as a service (IaaS) – Data storage – Processing power – Server virtualisation
  • 9. Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 A few ways of using the Cloud 1. Other Cloud services : – Desktop as a service (DaaS) – Network as a service (NaaS) (VPNs) – Storage as a service (STaaS) – Security as a service (SECaaS) (Authentication, Antivirus, Intrusion Detection) – Data as a service (DaaS) – Test environment as a service (TEaaS)
  • 10. Pros: • Anytime, anywhere, any device • Quickly ‘scale up’ • Stronger security • External backup-storage/services • Reduced license costs • Outsource ICT services • Collaboration • Synchronisation • Greener computing Cons: • Where is the data? Ownership/Privacy/Security • Need internet connection • Interoperability (Open standards) • Vendor lock-in • Internet required Why use the Cloud? Image: ‘Open Sky’ by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8496879398
  • 13. Identifying Cloud Opportunities Source: Department of Finance and Deregulation http://agimo.gov.au/2012/09/19/final-release-a-guide-to-implementing-cloud-services/ 1. Assess suitability for business needs 2. Consider timing and drivers 3. Consider financial impacts 4. Consider organisational capability 5. Manage change 6. Review governance
  • 14. Implementing Cloud Services Source: Department of Finance and Deregulation agimo.gov.au/2012/09/19/final-release-a-guide-to-implementing-cloud-services/ 1. Build a business model/case 2. Assess the risk 3. Determine requirements • Functionality • Standards • Performance • Manageability • Security • Compliance 4. Prepare an exit strategy 5. Determine contractual terms 6. Approach the market 7. Select a provider 8. Implementation / Maintenance
  • 15. Cloud Computing Security Considerations Source: Department of Defence: www.dsd.gov.au/infosec/cloudsecurity.htm Maintaining Availability/ Functionality 1. Business data/functionality 2. Your Data back-up plan 3. Your continuity / disaster plan 4. Network connectivity 5. Impact of outages 6. Vendor continuity / disaster plan 7. Vendor guarantee 7. Service Level Agreement (SLA) 8. Compensation 9. Data integrity and availability 10.Data restoration 11.Scalability 12.Changing Vendors
  • 16. Cloud Computing Security Considerations Source: Department of Defence: www.dsd.gov.au/infosec/cloudsecurity.htm Protecting data from unauthorised access 1. Type of cloud computing service 2. Sensitivity of data 3. Legislative obligations (eg Privacy Act, Archiving Act) 4. Countries which can access the data (eg Patriots Act) 5. Data Encryption 6. Destruction of data 7. Remote monitoring / management 8. Data ownership 9. Gateway technologies / certifications 10.Content filters 11.Security services 12.User authentication 13.Procurement processes
  • 17. Why manage? • Reduce possible risks • Enables continuous improvement • Informs planning/decision making • Increases Stakeholder confidence • Incorporates int/ext factors • Identifies procedures/processes • Ensures the right infrastructure Barriers? • Lack of commitment • Lack of processes/planning • Lack of resourcing/finances • Others? Managing your Cloud Business Solution Image: ‘Dell in the Cloud Think Tank at the Skyloft, Millbank, London’ by DELL Inc - http://www.flickr.com/photos/dellphotos/8182050295/
  • 18. Determine Internal/External Factors & Stakeholders INTERNAL FACTORS INTERNAL STAKEHOLDERS EXTERNAL FACTORS EXTERNAL STAKEHOLDERS
  • 19. SWOT Analysis – Implementing/Managing a cloud business solution STRENGTHS OPPORTUNITIES WEAKNESSES THREATS
  • 21. Likelihood vs Impact Risk Matrix Source: Chris Toselli – Elearning & Risk
  • 22. Critical success factors of managing a cloud business solution
  • 23. Business needs Image: Cloud Accounting by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8859144815/
  • 24. Security / Integration Image: Cyber-Safety by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8859140775//
  • 25. Ownership / Recovery Image: Cyber-Safety by Vanguard Visions Consulting- http://www.flickr.com/photos/77018488@N03/8859746506/
  • 26. Vendor capability / capacity Image: Pumpkins by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8632002783/
  • 27. Achievability Image: Designing Learning in the Digital Age – Melb March 2013 – Vanguard Visions Consulting: http://www.flickr.com/photos/77018488@N03/8569652009/
  • 28. What will you investigate further?
  • 30. Want to know more? More info: digitalcapability.com.au Register for eUpdates: bit.ly/digitalcapability Follow on: Twitter - twitter.com/digitalcapabili Facebook - facebook.com/digitalcapability LinkedIn - bit.ly/DCLinkedIN Google+ - bit.ly/DCGoogleplus Pinterest - pinterest.com/vanguardvisions
  • 31. vanguardvisionsconsulting.com.au Allison Miller 0400 732 270 allison@vanguardvisions.com.au vanguardvisionsconsulting.com.au

Notas del editor

  1. iPadsWifiSurvey at end
  2. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation.(http://en.wikipedia.org/wiki/Cloud_computing)
  3. What terms do people know – how are they using these?What will you do differently in your business?
  4. One early SpiderOak Blue Private Cloud customer is the Department of Defense. Oberman says he can't discuss specifics of the deployment at the moment but notes that over 10,000 users are presently involved and that the deployment is likely to serve over 100,000 users eventually. "It's pretty significant," he said.http://www.informationweek.com/storage/data-protection/spideroak-encrypted-cloud-storage-dropbo/240005894
  5. 1. SaaSThis type of cloud computing delivers software applications through a browser to thousands of customers using a multitenant architecture. This means no upfront investment in servers or software licensing. EgSaaS"desktop" applications include Google Docs and Zoho Office2. Utility computingThisoffers online storage and virtual servers which you can access on demand. Useful for supplemental, non-mission-critical needs, and could replace parts of your computer storage needs. Eg Google Drive or Dropbox3. Platform as a serviceAnother SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. These services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. 4. Other cloud servicesLike all ‘as a service’ (aaS) services, these other services are based on the concept that the product can be provided on demand to the user regardless of their geographic or organisational separation of provider and theconsumer.Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031http://en.wikipedia.org/wiki/Cloud_computing
  6. 1. SaaSThis type of cloud computing delivers software applications through a browser to thousands of customers using a multitenant architecture. This means no upfront investment in servers or software licensing. EgSaaS"desktop" applications include Google Docs and Zoho Office2. Utility computingThisoffers online storage and virtual servers which you can access on demand. Useful for supplemental, non-mission-critical needs, and could replace parts of your computer storage needs. Eg Google Drive or Dropbox3. Platform as a serviceAnother SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. These services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. 4. Other cloud servicesLike all ‘as a service’ (aaS) services, these other services are based on the concept that the product can be provided on demand to the user regardless of their geographic or organisational separation of provider and theconsumer.Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031http://en.wikipedia.org/wiki/Cloud_computing
  7. Stronger security – latest updates, integrated management (SSO), better backup and recovery
  8. What business services do you currently use?Are any Cloud Services?What are the adv/disadv of both?Ask participants to undertake a Business Solutions Comparison (Handout) on computer based or Cloud Services (or hybrid)Business Solutions Comparison (Handout)Software/Service Computer/Server/Hard drive/USB Cloud Hybrid (Sync)Email XDoc Storage X X XDoc SharingOffice products eg Word, Excel etcAccounting SoftwareCRMHR/Personnel ManagementProject ManagementCalendarSpecialist SoftwareOthers?
  9. Maintaining Availability / Functionality of Business ServicesBusiness data/functionality – what is mission critical for your business?Your Data back-up plan – what does this look like now? Your continuity / disaster plan – what does this look like now?Network connectivity – how reliable is it?Impact of outages - Vendor continuity / disaster plan Vendor guaranteeService Level Agreement (SLA)CompensationData integrity and availability - Data restoration - ScalabilityChanging Vendors
  10. Protecting data from unauthorised accessType of cloud computing service – which would provide the best protection?Sensitivity of data – what will be the impact if data is accessed?Legislative obligations - Privacy Act, Archiving Act, Others? – how do they impact your business?Countries which can access the data (eg Patriots Act) – where is your data stored?Data Encryption – is this an imperative?Destruction of data – how is data removed from Vendor’s servers?Remote monitoring / management – can you have some control over your Cloud services?Data ownership – Who owns the data?Gateway technologies / certifications – what types of security measures does the Vendor have in place?Content filters – Will this impact your usage? Do they need to be strengthened?Security services – what are the Vendors policies/processes and technologies like?User authentication – what identity and access management systems are being used?Procurement processes – How can you verify the Vendor is legit and reliable?
  11. Why manage your cloud business solution?Identify and reduce possible risks – likelihood vs consequences – whether physical, emotional or financial harm, environmentalEnables continuous improvementEnables businesses to achieve their goals through informed planning and decision-making Increases stakeholder confidenceIncorporates internal/external factors eg cultural (attitude/embedded/integral part of the business) and legislationIdentifies procedures and processes to communicate, monitor and review Creates infrastructure to analyse, evaluate and treat riskBarriers?Lack of commitmentLack of processes/planningLack of financesOthers?
  12. Group analysis of internal/external factors and stakeholders for any existing or future Cloud Business Solutions
  13. Group SWOT Analysis of implementing/managing a cloud business solution for your business
  14. Complete the Risk Analysis table for 2 possible risks associated with using Cloud Services
  15. How will the cloud service better meet your business needs / objectives and improve your business operations?How will it meet your customer needs?Will you be getting value for money / improved productivity?What will the ROI be in changing to a cloud service?
  16. What security services does the vendor have?What security processes do you need to implement eg ‘password policy’?How will the service integrate with your existing systems/software?
  17. Who owns the data?How will the data be backed up?How can you get your data out?What recovery plans does your vendor have?What recovery plans will you need?
  18. What is the current track record of the vendor?Who else is using their services?
  19. What change management processes will you need to deploy?What requisite skills will you / your staff / your customers / your suppliers need?
  20. What will you investigate further and why?
  21. Ask participants to complete the online workshop evaluation