SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
REGULATORY
IMPLICATIONS
CLOUD
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 2
Ericsson Cloud System
Overview: Concepts
Ericsson cloud System offering
Ericsson Cloud Execution Environment
Network & Data Center Infrastructure
Ericsson
Cloud
Manager
Virtualized Applications
The Ericsson Cloud System
is made up of three main parts;
Networking and Datacenter
Infrastructure, Cloud Execution
Environment, and Cloud
Manager.
All of these parts are required
to create a cloud platform, but
not all of the parts need to
supplied by Ericsson in order to
deploy any of our virtualized
applications.
This segmentation of the
Ericsson offering follows an
industry benchmarking making
it more generic for policy
implication analysis.
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 3
Native System
Overview: Concepts
Virtualization I
Application
Hardware
Native
Application
Understanding Virtualization is key to
understanding the Cloud System.
In a native deployment the application
software has direct control over the
hardware on which it is running. This
means that dedicated hardware is
required to run each application.
In a virtualized platform like the Ericsson
Cloud System, each hardware
component is turned into a virtual
resource by a piece of software called
the Hypervisor.
The Virtualized applications now run on
virtual machines rather than on specific
hardware and are given resources as
required by the Hypervisor.
Cloud System
Cloud
Hardware
Virtualized
Application
Virtualization
Software
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 4
Native System
1
Overview: Concepts
Virtualization II
Application
Hardware
Native
Application 1 With the Hypervisor in-between the
application and the hardware resources
the application software is now said to be
Decoupled from the hardware. This
means, for instance, that multiple
applications can share the same piece of
hardware.
It is up to the Hypervisor and the rest of
the Execution Environment to distribute
the hardware resources as efficiently as
possible to the applications that require
them. This dynamic allocation of
resources by the execution environment
is called Elasticity.
In the Ericsson Cloud System, the
Hypervisor is included in the Ericsson
Cloud Execution Environment.Cloud System
Cloud Hardware
Virtualized
Application
1
Virtualization Software
Virtualized
Application
2
Virtualized
Application
3
Native System
2
Application
Hardware
Native
Application 2
Native System
3
Application
Hardware
Native
Application 3
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 5
Overview: Virtualization
REGULATORY IMPLICATIONS
Decoupling (D) per see should not
result in any new regulatory
implications or for new policy
interventions.
Decoupling and outsourcing results
in regulatory implications such as
conditions defining possibilities of
transferring statutory liabilities.
Localization, e.g. off-shoring of
outsourcing will result in regulatory
considerations.
LOCALIZATION
OUTSOURCING
D
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 6
Overview: Outsourcing & Cross-border flows
REGULATORY IMPLICATIONS
Outsourcing:
Statutory Responsibilities
Enforcement
Localization:
Type of data processing:
- Commercial
- Public Institutions
- Law enforcement
National standards of privacy regulation
Extra territorial implications
Data Transfers
Trade barriers / Forced localization
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 7
Overview: Deployment Scenarios
regulatory implications
Public cloud deployments raise
policy issues regarding intermediary
liability and immunities for
intermediaries which are
conditional for service providers
offering public clouds.
Conditions and immunities
contribute to the cost and risk
associated with such service
provisioning.
Network offerings underpinning
telecom private cloud solutions that
are subsequently a part of a
consumer offering might potentially
face issues regarding traffic
management and traffic
differentiation.
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 8
Ericsson Cloud System
Overview: Applications & Services
REGULATORY IMPLICATIONS
Ericsson Cloud Execution Environment
Network & Data Center Infrastructure
Ericsson
Cloud
Manager
Virtualized Applications
Different types of user applications,
hosted in a cloud, may be used in a
specific context/sector and hence
this use becomes subjected to sector
specific regulation such as telecom,
media/content, e-commerce, health
etc. above and beyond consumer
protection law.
These “applications” will then add an
additional layer of regulatory
consideration that are not specific to
the implementation architecture e.g.
native or decoupled.
Sector specific regulation might have
additional regulatory implications not
on virtualization per see but indirectly if
virtualization is followed by outsourcing
and/ off-shoring localization.
REGULATORY
CONSIDERATIONS
CLOUD
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 10
WHY, WHAT and HOW to Regulate?
CLOUD REGULATORY Challenges
Global nature of connectivity/processing
Quantum jump in scale/scope of processing
Distributed nature of control SCALE/CONTROL
Law/Hierarchy
Architecture/Code/Design IMPLEMENTATION
How to Enforce
When to Enforce
Convergence / Services & Sectors
ENFORCEMENT
CONGRUENCE
Norms/Values
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 11
Addressing Scale & Control Issues:
› Commercial Data Processing
› Public Institutions Data Processing
› Law Enforcement Data Processing
› National Security Data Processing
› Cyber Security
Devising Effective Regulatory Frameworks
REGULATORY Targeting
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 12
Holistic Regulation
REGULATORY Convergence
Wire line
Voice & data
TV & Media Internet
Wireless
Voice & data
Broadcast
Internet Apps
/ASP/ Cloud
Fixed
Mobile
Source: Heavy Reading, Telecom in TV Land, 20070710
APPLICATIONS & SERVICES
PLATFORMS
WHEN NECESSARY REGULATE SERVICES NOT PLATFORMS
PLATFORM & TECHNOLOGY NEUTRAL APPROACH
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 13
Co-/Self-Regulation
› Privacy by design
› Accountable company
› Self Regulation with
substance
› Cooperation with agencies
and facilitated knowledge-
sharing
Command-Control
› Outcome oriented
› Clear roles and
responsibilities in the value
chain
› Risk-based approach
› Efficient tools managing
Cross-border flows
How to Implement
Implementation Strategy
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 14
INTENDED
INFORMEDWELL
ILL
ILL
ACCOUNTABLE
COMPANY
EVIL
COMPANY
UNINFORMED
COMPANY
DECEPTIVE
COMPANY PUNITIVE
DETERRENCE
PARTICIPATORY
COMPLIANCE
How to Enforce
Enforcement Strategy
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 15
When to Enforce
Enforcement Strategy
FOCUS ON
ENFORCEMENT
FOCUS ON
AVERSION
PREVENTIONACTHARM
PERSUASION
WARNING
CIVIL PENALTY/
ADMINISTRATIVE NOTICE
OPERATIONAL
INTERVENTION
CRIMINAL PENALTY
CONTROL OF COMPANY /
LIQUIDATION
DETERRENCE
COMPLIANCE
CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 16
Convergence – Platform Equality
Information Management – Data Protection
Information Management – Cross Border Data Flows
Copyright - Enforcement
Network Regulation – Traffic Management
Related Regulatory Topics
ERICSSON’S POLICY advise
ICT Policy for the Networked Society
Cloud regulatory impact

Weitere ähnliche Inhalte

Was ist angesagt?

Role of Satellite Technology in Supporting Connectivity to Vehicles - Intelsat
Role of Satellite Technology in Supporting Connectivity to Vehicles - IntelsatRole of Satellite Technology in Supporting Connectivity to Vehicles - Intelsat
Role of Satellite Technology in Supporting Connectivity to Vehicles - IntelsattechUK
 
Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-insEricsson
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected VineyardsEricsson
 
Private Radio CDMA Network for Smart Metering
Private Radio CDMA Network for Smart MeteringPrivate Radio CDMA Network for Smart Metering
Private Radio CDMA Network for Smart Meteringandriesvandermeulen
 
Aggregating IOT data for operators NFV cloud
Aggregating IOT data for operators NFV cloudAggregating IOT data for operators NFV cloud
Aggregating IOT data for operators NFV cloudEricsson
 
Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Rafael Maranon
 
Presentation big data
Presentation   big dataPresentation   big data
Presentation big dataxKinAnx
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of ThingsEricsson
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industryAkankshaPathak27
 
IoT in Rail: Trains, Metro Rail and Light/Urban Rail
IoT in Rail: Trains, Metro Rail and Light/Urban RailIoT in Rail: Trains, Metro Rail and Light/Urban Rail
IoT in Rail: Trains, Metro Rail and Light/Urban RailAlcatel-Lucent Enterprise
 
"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growthMestizo Enterprises
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsM2M Alliance e.V.
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu
 
Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...
Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...
Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...Ericsson
 
The Evolution of Edge computing
The Evolution of Edge computingThe Evolution of Edge computing
The Evolution of Edge computingDESMOND YUEN
 

Was ist angesagt? (20)

IoT in ITS: Network Impacts
IoT in ITS: Network ImpactsIoT in ITS: Network Impacts
IoT in ITS: Network Impacts
 
Role of Satellite Technology in Supporting Connectivity to Vehicles - Intelsat
Role of Satellite Technology in Supporting Connectivity to Vehicles - IntelsatRole of Satellite Technology in Supporting Connectivity to Vehicles - Intelsat
Role of Satellite Technology in Supporting Connectivity to Vehicles - Intelsat
 
EENA 2021 - Implementing Public Warning Systems (3/3)
EENA 2021 - Implementing Public Warning Systems (3/3)EENA 2021 - Implementing Public Warning Systems (3/3)
EENA 2021 - Implementing Public Warning Systems (3/3)
 
Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-ins
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
 
Private Radio CDMA Network for Smart Metering
Private Radio CDMA Network for Smart MeteringPrivate Radio CDMA Network for Smart Metering
Private Radio CDMA Network for Smart Metering
 
Aggregating IOT data for operators NFV cloud
Aggregating IOT data for operators NFV cloudAggregating IOT data for operators NFV cloud
Aggregating IOT data for operators NFV cloud
 
Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014
 
Presentation big data
Presentation   big dataPresentation   big data
Presentation big data
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of Things
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industry
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
IoT in Rail: Trains, Metro Rail and Light/Urban Rail
IoT in Rail: Trains, Metro Rail and Light/Urban RailIoT in Rail: Trains, Metro Rail and Light/Urban Rail
IoT in Rail: Trains, Metro Rail and Light/Urban Rail
 
"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
 
Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...
Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...
Multilayer Transport SDN - In the Broader Context of Service Provider SDN Tra...
 
The Evolution of Edge computing
The Evolution of Edge computingThe Evolution of Edge computing
The Evolution of Edge computing
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 

Andere mochten auch

ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...
ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...
ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...Moez Chakchouk
 
Day 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter AfricaDay 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter AfricaMyles Freedman
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingMichelle Holley
 
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightBT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightParitosh Sharma
 
Tech Book: WAN Optimization Controller Technologies
Tech Book: WAN Optimization Controller Technologies  Tech Book: WAN Optimization Controller Technologies
Tech Book: WAN Optimization Controller Technologies EMC
 
Insaat kursu-arnavutkoy
Insaat kursu-arnavutkoyInsaat kursu-arnavutkoy
Insaat kursu-arnavutkoysersld54
 
Banana test -_english-fun_funky[1].com_
Banana test -_english-fun_funky[1].com_Banana test -_english-fun_funky[1].com_
Banana test -_english-fun_funky[1].com_Chandan Dubey
 
Amazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsAmazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsChandan Dubey
 
Confluence performance testing
Confluence performance testingConfluence performance testing
Confluence performance testingAleksandr Zhuikov
 
Bar and Circle Graphs
Bar and Circle GraphsBar and Circle Graphs
Bar and Circle GraphsDan Etz
 
Insaat kursu-tuzla
Insaat kursu-tuzlaInsaat kursu-tuzla
Insaat kursu-tuzlasersld54
 
Monopsony market structure
Monopsony market structureMonopsony market structure
Monopsony market structureTravis Klein
 
Presentazione Servizi Federmanager Bologna 11 marzo 2013
Presentazione Servizi Federmanager Bologna 11 marzo 2013Presentazione Servizi Federmanager Bologna 11 marzo 2013
Presentazione Servizi Federmanager Bologna 11 marzo 2013Marco Frullanti
 
Manage vm’s and services across private clouds and windows azure with system ...
Manage vm’s and services across private clouds and windows azure with system ...Manage vm’s and services across private clouds and windows azure with system ...
Manage vm’s and services across private clouds and windows azure with system ...Microsoft TechNet - Belgium and Luxembourg
 
Aplicaciones modernas con React.js
Aplicaciones modernas con React.jsAplicaciones modernas con React.js
Aplicaciones modernas con React.jsOctavio Luna Bernal
 

Andere mochten auch (20)

ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...
ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...
ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing...
 
Day 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter AfricaDay 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
 
Ericsson и Openstack
Ericsson и OpenstackEricsson и Openstack
Ericsson и Openstack
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet Processing
 
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightBT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
 
Tech Book: WAN Optimization Controller Technologies
Tech Book: WAN Optimization Controller Technologies  Tech Book: WAN Optimization Controller Technologies
Tech Book: WAN Optimization Controller Technologies
 
Insaat kursu-arnavutkoy
Insaat kursu-arnavutkoyInsaat kursu-arnavutkoy
Insaat kursu-arnavutkoy
 
Windows Server 8 Deduplication
Windows Server 8 DeduplicationWindows Server 8 Deduplication
Windows Server 8 Deduplication
 
Banana test -_english-fun_funky[1].com_
Banana test -_english-fun_funky[1].com_Banana test -_english-fun_funky[1].com_
Banana test -_english-fun_funky[1].com_
 
Amazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsAmazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firms
 
2.nd world war
2.nd world war2.nd world war
2.nd world war
 
Confluence performance testing
Confluence performance testingConfluence performance testing
Confluence performance testing
 
Bar and Circle Graphs
Bar and Circle GraphsBar and Circle Graphs
Bar and Circle Graphs
 
Insaat kursu-tuzla
Insaat kursu-tuzlaInsaat kursu-tuzla
Insaat kursu-tuzla
 
Monopsony market structure
Monopsony market structureMonopsony market structure
Monopsony market structure
 
Presentazione Servizi Federmanager Bologna 11 marzo 2013
Presentazione Servizi Federmanager Bologna 11 marzo 2013Presentazione Servizi Federmanager Bologna 11 marzo 2013
Presentazione Servizi Federmanager Bologna 11 marzo 2013
 
Manage vm’s and services across private clouds and windows azure with system ...
Manage vm’s and services across private clouds and windows azure with system ...Manage vm’s and services across private clouds and windows azure with system ...
Manage vm’s and services across private clouds and windows azure with system ...
 
Magazine pitch
Magazine pitchMagazine pitch
Magazine pitch
 
Aplicaciones modernas con React.js
Aplicaciones modernas con React.jsAplicaciones modernas con React.js
Aplicaciones modernas con React.js
 
Antarctica music
Antarctica musicAntarctica music
Antarctica music
 

Ähnlich wie Cloud regulatory impact

Cloud evolution and realizing the network enabled cloud
Cloud evolution and realizing the network enabled cloudCloud evolution and realizing the network enabled cloud
Cloud evolution and realizing the network enabled cloudEricsson
 
5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systems5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systemslebarka
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptxGopalThapa9
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computingck4eric
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationKeynote Mobile Testing
 

Ähnlich wie Cloud regulatory impact (20)

Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Clouding the Networked Society
Clouding the Networked SocietyClouding the Networked Society
Clouding the Networked Society
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cloud evolution and realizing the network enabled cloud
Cloud evolution and realizing the network enabled cloudCloud evolution and realizing the network enabled cloud
Cloud evolution and realizing the network enabled cloud
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systems5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systems
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computing
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
 

Mehr von Rene Summer

China Industrial Policy Brief
China Industrial Policy BriefChina Industrial Policy Brief
China Industrial Policy BriefRene Summer
 
A Digital Eurovision for European Union
A Digital Eurovision for European UnionA Digital Eurovision for European Union
A Digital Eurovision for European UnionRene Summer
 
BENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband PlansBENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband PlansRene Summer
 
Mobile Broadband For Everyone
Mobile Broadband For Everyone Mobile Broadband For Everyone
Mobile Broadband For Everyone Rene Summer
 
ICT Enabled Policy for National Development
ICT Enabled Policy for National DevelopmentICT Enabled Policy for National Development
ICT Enabled Policy for National DevelopmentRene Summer
 
Transforming to a networked society guide for policy makers
Transforming to a networked society guide for policy makersTransforming to a networked society guide for policy makers
Transforming to a networked society guide for policy makersRene Summer
 
National broadband Plans - Maximizing Economic Impact
National broadband Plans - Maximizing Economic ImpactNational broadband Plans - Maximizing Economic Impact
National broadband Plans - Maximizing Economic ImpactRene Summer
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformationRene Summer
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Rene Summer
 
Ict policy for networked society
Ict policy for networked societyIct policy for networked society
Ict policy for networked societyRene Summer
 
Business impact restrictions on cross border data
Business impact restrictions on cross border dataBusiness impact restrictions on cross border data
Business impact restrictions on cross border dataRene Summer
 
Privacy in networked society guiding data protection principles
Privacy in networked society guiding data protection principlesPrivacy in networked society guiding data protection principles
Privacy in networked society guiding data protection principlesRene Summer
 
Digital content promotion q1 2013
Digital content promotion q1 2013Digital content promotion q1 2013
Digital content promotion q1 2013Rene Summer
 
Copyright enforcement for the digital age q1 2013
Copyright enforcement for the digital age q1 2013Copyright enforcement for the digital age q1 2013
Copyright enforcement for the digital age q1 2013Rene Summer
 
Connected tv conference rene summer
Connected tv conference rene summerConnected tv conference rene summer
Connected tv conference rene summerRene Summer
 
Ceps task force on copyright in the eu digital single market 14 nov 2012
Ceps task force on copyright in the eu digital single market 14 nov 2012Ceps task force on copyright in the eu digital single market 14 nov 2012
Ceps task force on copyright in the eu digital single market 14 nov 2012Rene Summer
 

Mehr von Rene Summer (17)

China Industrial Policy Brief
China Industrial Policy BriefChina Industrial Policy Brief
China Industrial Policy Brief
 
A Digital Eurovision for European Union
A Digital Eurovision for European UnionA Digital Eurovision for European Union
A Digital Eurovision for European Union
 
BENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband PlansBENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband Plans
 
Mobile Broadband For Everyone
Mobile Broadband For Everyone Mobile Broadband For Everyone
Mobile Broadband For Everyone
 
ICT Enabled Policy for National Development
ICT Enabled Policy for National DevelopmentICT Enabled Policy for National Development
ICT Enabled Policy for National Development
 
Transforming to a networked society guide for policy makers
Transforming to a networked society guide for policy makersTransforming to a networked society guide for policy makers
Transforming to a networked society guide for policy makers
 
National broadband Plans - Maximizing Economic Impact
National broadband Plans - Maximizing Economic ImpactNational broadband Plans - Maximizing Economic Impact
National broadband Plans - Maximizing Economic Impact
 
ICT Benefits
ICT BenefitsICT Benefits
ICT Benefits
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformation
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013
 
Ict policy for networked society
Ict policy for networked societyIct policy for networked society
Ict policy for networked society
 
Business impact restrictions on cross border data
Business impact restrictions on cross border dataBusiness impact restrictions on cross border data
Business impact restrictions on cross border data
 
Privacy in networked society guiding data protection principles
Privacy in networked society guiding data protection principlesPrivacy in networked society guiding data protection principles
Privacy in networked society guiding data protection principles
 
Digital content promotion q1 2013
Digital content promotion q1 2013Digital content promotion q1 2013
Digital content promotion q1 2013
 
Copyright enforcement for the digital age q1 2013
Copyright enforcement for the digital age q1 2013Copyright enforcement for the digital age q1 2013
Copyright enforcement for the digital age q1 2013
 
Connected tv conference rene summer
Connected tv conference rene summerConnected tv conference rene summer
Connected tv conference rene summer
 
Ceps task force on copyright in the eu digital single market 14 nov 2012
Ceps task force on copyright in the eu digital single market 14 nov 2012Ceps task force on copyright in the eu digital single market 14 nov 2012
Ceps task force on copyright in the eu digital single market 14 nov 2012
 

Kürzlich hochgeladen

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Kürzlich hochgeladen (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Cloud regulatory impact

  • 2. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 2 Ericsson Cloud System Overview: Concepts Ericsson cloud System offering Ericsson Cloud Execution Environment Network & Data Center Infrastructure Ericsson Cloud Manager Virtualized Applications The Ericsson Cloud System is made up of three main parts; Networking and Datacenter Infrastructure, Cloud Execution Environment, and Cloud Manager. All of these parts are required to create a cloud platform, but not all of the parts need to supplied by Ericsson in order to deploy any of our virtualized applications. This segmentation of the Ericsson offering follows an industry benchmarking making it more generic for policy implication analysis.
  • 3. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 3 Native System Overview: Concepts Virtualization I Application Hardware Native Application Understanding Virtualization is key to understanding the Cloud System. In a native deployment the application software has direct control over the hardware on which it is running. This means that dedicated hardware is required to run each application. In a virtualized platform like the Ericsson Cloud System, each hardware component is turned into a virtual resource by a piece of software called the Hypervisor. The Virtualized applications now run on virtual machines rather than on specific hardware and are given resources as required by the Hypervisor. Cloud System Cloud Hardware Virtualized Application Virtualization Software
  • 4. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 4 Native System 1 Overview: Concepts Virtualization II Application Hardware Native Application 1 With the Hypervisor in-between the application and the hardware resources the application software is now said to be Decoupled from the hardware. This means, for instance, that multiple applications can share the same piece of hardware. It is up to the Hypervisor and the rest of the Execution Environment to distribute the hardware resources as efficiently as possible to the applications that require them. This dynamic allocation of resources by the execution environment is called Elasticity. In the Ericsson Cloud System, the Hypervisor is included in the Ericsson Cloud Execution Environment.Cloud System Cloud Hardware Virtualized Application 1 Virtualization Software Virtualized Application 2 Virtualized Application 3 Native System 2 Application Hardware Native Application 2 Native System 3 Application Hardware Native Application 3
  • 5. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 5 Overview: Virtualization REGULATORY IMPLICATIONS Decoupling (D) per see should not result in any new regulatory implications or for new policy interventions. Decoupling and outsourcing results in regulatory implications such as conditions defining possibilities of transferring statutory liabilities. Localization, e.g. off-shoring of outsourcing will result in regulatory considerations. LOCALIZATION OUTSOURCING D
  • 6. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 6 Overview: Outsourcing & Cross-border flows REGULATORY IMPLICATIONS Outsourcing: Statutory Responsibilities Enforcement Localization: Type of data processing: - Commercial - Public Institutions - Law enforcement National standards of privacy regulation Extra territorial implications Data Transfers Trade barriers / Forced localization
  • 7. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 7 Overview: Deployment Scenarios regulatory implications Public cloud deployments raise policy issues regarding intermediary liability and immunities for intermediaries which are conditional for service providers offering public clouds. Conditions and immunities contribute to the cost and risk associated with such service provisioning. Network offerings underpinning telecom private cloud solutions that are subsequently a part of a consumer offering might potentially face issues regarding traffic management and traffic differentiation.
  • 8. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 8 Ericsson Cloud System Overview: Applications & Services REGULATORY IMPLICATIONS Ericsson Cloud Execution Environment Network & Data Center Infrastructure Ericsson Cloud Manager Virtualized Applications Different types of user applications, hosted in a cloud, may be used in a specific context/sector and hence this use becomes subjected to sector specific regulation such as telecom, media/content, e-commerce, health etc. above and beyond consumer protection law. These “applications” will then add an additional layer of regulatory consideration that are not specific to the implementation architecture e.g. native or decoupled. Sector specific regulation might have additional regulatory implications not on virtualization per see but indirectly if virtualization is followed by outsourcing and/ off-shoring localization.
  • 10. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 10 WHY, WHAT and HOW to Regulate? CLOUD REGULATORY Challenges Global nature of connectivity/processing Quantum jump in scale/scope of processing Distributed nature of control SCALE/CONTROL Law/Hierarchy Architecture/Code/Design IMPLEMENTATION How to Enforce When to Enforce Convergence / Services & Sectors ENFORCEMENT CONGRUENCE Norms/Values
  • 11. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 11 Addressing Scale & Control Issues: › Commercial Data Processing › Public Institutions Data Processing › Law Enforcement Data Processing › National Security Data Processing › Cyber Security Devising Effective Regulatory Frameworks REGULATORY Targeting
  • 12. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 12 Holistic Regulation REGULATORY Convergence Wire line Voice & data TV & Media Internet Wireless Voice & data Broadcast Internet Apps /ASP/ Cloud Fixed Mobile Source: Heavy Reading, Telecom in TV Land, 20070710 APPLICATIONS & SERVICES PLATFORMS WHEN NECESSARY REGULATE SERVICES NOT PLATFORMS PLATFORM & TECHNOLOGY NEUTRAL APPROACH
  • 13. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 13 Co-/Self-Regulation › Privacy by design › Accountable company › Self Regulation with substance › Cooperation with agencies and facilitated knowledge- sharing Command-Control › Outcome oriented › Clear roles and responsibilities in the value chain › Risk-based approach › Efficient tools managing Cross-border flows How to Implement Implementation Strategy
  • 14. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 14 INTENDED INFORMEDWELL ILL ILL ACCOUNTABLE COMPANY EVIL COMPANY UNINFORMED COMPANY DECEPTIVE COMPANY PUNITIVE DETERRENCE PARTICIPATORY COMPLIANCE How to Enforce Enforcement Strategy
  • 15. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 15 When to Enforce Enforcement Strategy FOCUS ON ENFORCEMENT FOCUS ON AVERSION PREVENTIONACTHARM PERSUASION WARNING CIVIL PENALTY/ ADMINISTRATIVE NOTICE OPERATIONAL INTERVENTION CRIMINAL PENALTY CONTROL OF COMPANY / LIQUIDATION DETERRENCE COMPLIANCE
  • 16. CLOUD - REGULATORY IMPACT | Public | © Ericsson AB 2013 | 2013-09-10 | Page 16 Convergence – Platform Equality Information Management – Data Protection Information Management – Cross Border Data Flows Copyright - Enforcement Network Regulation – Traffic Management Related Regulatory Topics ERICSSON’S POLICY advise ICT Policy for the Networked Society