SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Cloud Computing:
Why should the Finance
     Community Care?
           Kevin L. Jackson
           Vice President
           General Manager
           NJVC Cloud Services
           Kevin.jackson@njvc.com
The New IT Era




  IDC September 2008


                       rev date 3/25/2012
Data Processing Explosion
Cloud Computing
 Not a new technology but a new approach in the provisioning and consumption of
  information technology
 A services oriented architecture (SOA) implemented typically on a virtualized infrastructure
  (compute, storage, networks) using commodity components coupled with highly automated
  controls enable the five essential characteristics of cloud computing.


                   Key Benefits                              Key Concerns
           Significant cost reductions                   Standards
           Reduced time to capability                    Portability
           Increased flexibility                         Control/Availability
           Elastic scalability                           Security
           Increase service quality                      IT Policy
           Increased security                            Management /
           Ease of technology refresh                     Monitoring
           Ease of collaboration                         Ecosystem
           Increased efficiency
Cloud Computing: Value and Capabilities

 Time
    Reduce time to deliver/execute mission
    Increased responsiveness/flexibility/availability
 Cost
    Optimizing cost to deliver/execute mission
    Optimizing cost of ownership (lifecycle cost)
    Increased efficiencies in capital/operational expenditures
 Quality
    Environmental improvements
    Experiential improvements
Relational Databases and the Cloud
                                                                                German, BMW,
                                                                                    Truck
                                   Truck   The economics of data
                                           storage led to the use of
                      BMW          Car     content addressable                  German, BMW,
                                                                                    Car
                                           storage, flat storage
                                   SUV     architectures and internet
                                                                                German, BMW,
                                           scaling.                                 SUV
          Germany                   …

                    Volkswagen      …                                               German
                                                                               Volkswagen, Truck
                      Audi          …

                                                                 Search               …
                      Toyota
Country
           Japan      Honda
                                                                                      …
                      Mazda
                                            Database design,
                       Ford                 database tuning no                        …
                                            longer required with
            US       Chrysler
                                            infinite scalability and
                                            consistent                                …
                       GM           …
                                            responsiveness
                                                                                 US, GM, SUV




                              3t                                          1t                       6
Traditional Analytics
                               Traditionally, lexical searches, filtering or
                               Boolean search attributes are used to
•••••••••••                    reduce data to a “working set”.
                               Analytical tools are then applied to this
                               “working set”.
•••••••••••
•••••••••••
•••••••••••
•••••••••••                         Tools/Analysis               Reports/Conclusions

•••••••••••
    All Data Sources / Types




                                                                                 7
Cloud Enables Searching All the Data, All the Time


•••••••••••
•••••••••••
•••••••••••
•••••••••••
•••••••••••                                          Reports/Conclusions


•••••••••••


                                                                       8
Computing


                                                                                                        Malicious Insiders


                                                      Data Loss or Leakage


Unknown Risk Profile
                                                                             Shared Technology Issues
                                                                                                                             Insecure Interfaces and APIs




                       Account or Service Hijacking
                                                                                                                                                            Abuse and Nefarious Use of Cloud
                                                                                                                                                                                                       Top Threats to
                                                                                                                                                                                                      Cloud Computing
                                                                                                                                                                                               Governance and
                                                                                                                                                                                               Enterprise Risk
                                                                                                                                                                                               Management
                                                                                                                                                                                               Legal and
                                                                                                                                                                                               Electronic Discovery

                                                                                                                                                                                               Compliance and Audit
                                                                                                                                                                                                                        Governance




                                                                                                                                                                                               Information
                                                                                                                                                                                               Lifecycle Management

                                                                                                                                                                                               Portability and
                                                                                                                                                                                               Interoperability

                                                                                                                                                                                               Traditional
                                                                                                                                                                                               Security, Business
                                                                                                                                                                                               Continuity,
                                                                                                                                                                                               Data Center
                                                                                                                                                                                               and Disaster Recovery
                                                                                                                                                                                               Operations

                                                                                                                                                                                               Incident Response,
                                                                                                                                                                                               Notification and
                                                                                                                                                                                               Remediation
                                                                                                                                                                                               Application
                                                                                                                                                                                               Security
                                                                                                                                                                                                                        Operational




                                                                                                                                                                                               Encryption and
                                                                                                                                                                                               Key Management

                                                                                                                                                                                               Identity and
                                                                                                                                                                                               Access Management

                                                                                                                                                                                               Virtualization
IT Auditing

  Collecting and evaluating evidence to determine weather a computer system
  (information system) safeguards asset, maintains data integrity, achieves
  organizational goals effectively and consumes resources efficiently.
 Finance and Commercial
     PCI
     Gramm-Leach-Bliley Act
 Social and Labor
     Sarbanes-Oxley (SOX)
     SAS70
     HIPAA
 Public Safety
     Data Protection Act (UK)
     Federal Information Security Management Act (FISMA)
 Security
     ISO27000
Auditing the Cloud

Areas for Audit
    Compliance
    Governance and Risk
    Security
Auditing Challenges
    1:1 mapping no longer exists
    Dynamic, global environments
    Requirement to retrieve, correlate and extract meaningful data
     from an ever increasing number of data sources
    Auditing as a service spreads the audit trail across multiple
     domains
Data Confidentiality, Privacy, Integrity

Data stored, transmitted and processed outside of
 the organization
Shared computing environments
No physical control of data
Physical and logical access managed by provider
No controls to prevent data modification
No logging events on data (access, modification,
 transmission)
Regulation and Compliance

Data subject to new laws
Exposure to foreign governments and subpoenas
Retention requirements vay among jurisdictions
Audit of provider’s environment
Increased complexity to comply with standards
Sli
de
14
Sli
de
15
Summary
 Cloud computing is a technological evolution
 “Drive for scale” (Internet) and “Drive for cheap” (Commodity
  components, Extensive automation) and the economics of Moore’s Law
  (Cheap storage) led to a business model revolution
 Fiscal realities and business model economics are driving rapid adoption
  of cloud computing
 Cloud computing can enable significant application enhancements
 Security: Same threat vectors. Same attacks but faster, broader and
  automated using “resource concentration
 Audit issues still need to be addressed.
 A Prediction: “FedRAMP for Finance” is coming


                                                                         16
Thank You !
Kevin L. Jackson
Vice President
General Manager
NJVC Cloud Services
(703) 335-0830
Kevin.jackson@NJVC.com
http://www.NJVC.com
http://kevinljackson.blogspot.com
http://govcloud.ulitzer.com

Weitere ähnliche Inhalte

Was ist angesagt?

Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
 Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBMMobile Monday Brussels
 
Cloud Computing Potentials
Cloud Computing PotentialsCloud Computing Potentials
Cloud Computing Potentialsabta
 
493144 infosys slides_v5
493144 infosys slides_v5493144 infosys slides_v5
493144 infosys slides_v5Accenture
 
C bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationC bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationMegan Irvine
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automationsubtitle
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PColloquium
 
Dancing With Clouds
Dancing With CloudsDancing With Clouds
Dancing With Cloudsjnoelatpna
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
 
Clouds:Random Thoughts
Clouds:Random ThoughtsClouds:Random Thoughts
Clouds:Random Thoughtschaganti
 
Le cloud microsoft - PrĂŠsentation "fourre-tout" - Base
Le cloud microsoft - PrĂŠsentation "fourre-tout" - BaseLe cloud microsoft - PrĂŠsentation "fourre-tout" - Base
Le cloud microsoft - PrĂŠsentation "fourre-tout" - BaseNicolas Georgeault
 
Track 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproTrack 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproEMC Forum India
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumTom Crombez
 
IBM Cloud Provocative Statements Whitepaper
IBM Cloud Provocative Statements WhitepaperIBM Cloud Provocative Statements Whitepaper
IBM Cloud Provocative Statements WhitepaperHarley Capewell
 
Intalio|Cloud Overview
Intalio|Cloud OverviewIntalio|Cloud Overview
Intalio|Cloud OverviewIntalio
 

Was ist angesagt? (17)

Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
 Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
 
Cloud Slam Co D Presentation
Cloud Slam Co D PresentationCloud Slam Co D Presentation
Cloud Slam Co D Presentation
 
Yahoo & Hadoop
Yahoo & HadoopYahoo & Hadoop
Yahoo & Hadoop
 
Cloud Computing Potentials
Cloud Computing PotentialsCloud Computing Potentials
Cloud Computing Potentials
 
493144 infosys slides_v5
493144 infosys slides_v5493144 infosys slides_v5
493144 infosys slides_v5
 
C bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationC bu06 planning_your_cloud_education
C bu06 planning_your_cloud_education
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automation
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
Dancing With Clouds
Dancing With CloudsDancing With Clouds
Dancing With Clouds
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
Clouds:Random Thoughts
Clouds:Random ThoughtsClouds:Random Thoughts
Clouds:Random Thoughts
 
Le cloud microsoft - PrĂŠsentation "fourre-tout" - Base
Le cloud microsoft - PrĂŠsentation "fourre-tout" - BaseLe cloud microsoft - PrĂŠsentation "fourre-tout" - Base
Le cloud microsoft - PrĂŠsentation "fourre-tout" - Base
 
Track 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproTrack 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wipro
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuum
 
IBM Cloud Provocative Statements Whitepaper
IBM Cloud Provocative Statements WhitepaperIBM Cloud Provocative Statements Whitepaper
IBM Cloud Provocative Statements Whitepaper
 
Intalio|Cloud Overview
Intalio|Cloud OverviewIntalio|Cloud Overview
Intalio|Cloud Overview
 

Andere mochten auch

Dataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry LynnDataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry LynnGovCloud Network
 
NCOIC Enterprise Cloud Computing - Kevin Jackson
NCOIC Enterprise Cloud Computing - Kevin JacksonNCOIC Enterprise Cloud Computing - Kevin Jackson
NCOIC Enterprise Cloud Computing - Kevin JacksonGovCloud Network
 
Appistry How Google Overcame Wp
Appistry How Google Overcame WpAppistry How Google Overcame Wp
Appistry How Google Overcame WpGovCloud Network
 
Netflix Aws Startup Tour 090617134938 Phpapp02
Netflix Aws Startup Tour 090617134938 Phpapp02Netflix Aws Startup Tour 090617134938 Phpapp02
Netflix Aws Startup Tour 090617134938 Phpapp02GovCloud Network
 
The Economic Gains of Cloud Computing
The Economic Gains of Cloud ComputingThe Economic Gains of Cloud Computing
The Economic Gains of Cloud ComputingGovCloud Network
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationGovCloud Network
 
Grids Clouds Computation Steven Armentrout
Grids Clouds Computation Steven ArmentroutGrids Clouds Computation Steven Armentrout
Grids Clouds Computation Steven ArmentroutGovCloud Network
 
FedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsFedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsGovCloud Network
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateGovCloud Network
 
Vietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil OverviewVietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil OverviewGovCloud Network
 
NJVC The Economic Benefit of Cloud Computing
NJVC The Economic Benefit of Cloud ComputingNJVC The Economic Benefit of Cloud Computing
NJVC The Economic Benefit of Cloud ComputingGovCloud Network
 
Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02GovCloud Network
 
Unisys Service Oriented Self Adaptive Systems
Unisys Service Oriented Self Adaptive SystemsUnisys Service Oriented Self Adaptive Systems
Unisys Service Oriented Self Adaptive SystemsGovCloud Network
 
Moving Ahead With the Cloud—Enterprise Options and Implications
Moving Ahead With the Cloud—Enterprise Options and ImplicationsMoving Ahead With the Cloud—Enterprise Options and Implications
Moving Ahead With the Cloud—Enterprise Options and ImplicationsGovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 

Andere mochten auch (17)

Dataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry LynnDataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry Lynn
 
NCOIC Enterprise Cloud Computing - Kevin Jackson
NCOIC Enterprise Cloud Computing - Kevin JacksonNCOIC Enterprise Cloud Computing - Kevin Jackson
NCOIC Enterprise Cloud Computing - Kevin Jackson
 
Appistry How Google Overcame Wp
Appistry How Google Overcame WpAppistry How Google Overcame Wp
Appistry How Google Overcame Wp
 
FOSE Cloudbursting
FOSE CloudburstingFOSE Cloudbursting
FOSE Cloudbursting
 
Netflix Aws Startup Tour 090617134938 Phpapp02
Netflix Aws Startup Tour 090617134938 Phpapp02Netflix Aws Startup Tour 090617134938 Phpapp02
Netflix Aws Startup Tour 090617134938 Phpapp02
 
The Economic Gains of Cloud Computing
The Economic Gains of Cloud ComputingThe Economic Gains of Cloud Computing
The Economic Gains of Cloud Computing
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
 
Grids Clouds Computation Steven Armentrout
Grids Clouds Computation Steven ArmentroutGrids Clouds Computation Steven Armentrout
Grids Clouds Computation Steven Armentrout
 
FedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsFedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conops
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) Template
 
Team Thunder Cloud
Team Thunder CloudTeam Thunder Cloud
Team Thunder Cloud
 
Vietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil OverviewVietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil Overview
 
NJVC The Economic Benefit of Cloud Computing
NJVC The Economic Benefit of Cloud ComputingNJVC The Economic Benefit of Cloud Computing
NJVC The Economic Benefit of Cloud Computing
 
Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02
 
Unisys Service Oriented Self Adaptive Systems
Unisys Service Oriented Self Adaptive SystemsUnisys Service Oriented Self Adaptive Systems
Unisys Service Oriented Self Adaptive Systems
 
Moving Ahead With the Cloud—Enterprise Options and Implications
Moving Ahead With the Cloud—Enterprise Options and ImplicationsMoving Ahead With the Cloud—Enterprise Options and Implications
Moving Ahead With the Cloud—Enterprise Options and Implications
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 

Ähnlich wie Why Should the Financial Community Care About Cloud - Cobis2020

Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...GovCloud Network
 
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systemsSolutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systemsGanesan Narayanasamy
 
AWS O&G Day - Ambyint and AWS
AWS O&G Day - Ambyint and AWSAWS O&G Day - Ambyint and AWS
AWS O&G Day - Ambyint and AWSAWS Summits
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Open Data Center Alliance
 
The IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessThe IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessAleksandar Francuz
 
Become a Machine Learning Developer with AWS Services
Become a Machine Learning Developer with AWS ServicesBecome a Machine Learning Developer with AWS Services
Become a Machine Learning Developer with AWS ServicesAmazon Web Services
 
Become a Machine Learning developer with AWS (Avril 2019)
Become a Machine Learning developer with AWS (Avril 2019)Become a Machine Learning developer with AWS (Avril 2019)
Become a Machine Learning developer with AWS (Avril 2019)Julien SIMON
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...Club Alliances
 
AWS re:Invent 2018 - AIM302 - Machine Learning at the Edge
AWS re:Invent 2018 - AIM302  - Machine Learning at the Edge AWS re:Invent 2018 - AIM302  - Machine Learning at the Edge
AWS re:Invent 2018 - AIM302 - Machine Learning at the Edge Julien SIMON
 
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Stuart Charlton
 
Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)ippei_suzuki
 
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Amazon Web Services
 
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...Amazon Web Services
 
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018Amazon Web Services
 
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...Amazon Web Services
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingMartin Hingley
 
Building an Edge Computing Strategy - Distributed infrastructure.pptx
Building an Edge Computing Strategy - Distributed infrastructure.pptxBuilding an Edge Computing Strategy - Distributed infrastructure.pptx
Building an Edge Computing Strategy - Distributed infrastructure.pptxMandakini Kumari
 
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Samy Fodil
 

Ähnlich wie Why Should the Financial Community Care About Cloud - Cobis2020 (20)

Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...
 
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systemsSolutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
 
AWS O&G Day - Ambyint and AWS
AWS O&G Day - Ambyint and AWSAWS O&G Day - Ambyint and AWS
AWS O&G Day - Ambyint and AWS
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach
 
The IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessThe IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for business
 
Become a Machine Learning Developer with AWS Services
Become a Machine Learning Developer with AWS ServicesBecome a Machine Learning Developer with AWS Services
Become a Machine Learning Developer with AWS Services
 
Become a Machine Learning developer with AWS (Avril 2019)
Become a Machine Learning developer with AWS (Avril 2019)Become a Machine Learning developer with AWS (Avril 2019)
Become a Machine Learning developer with AWS (Avril 2019)
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
AI in the enterprise
AI in the enterprise AI in the enterprise
AI in the enterprise
 
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
 
AWS re:Invent 2018 - AIM302 - Machine Learning at the Edge
AWS re:Invent 2018 - AIM302  - Machine Learning at the Edge AWS re:Invent 2018 - AIM302  - Machine Learning at the Edge
AWS re:Invent 2018 - AIM302 - Machine Learning at the Edge
 
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
 
Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)
 
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
 
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
 
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
 
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud Computing
 
Building an Edge Computing Strategy - Distributed infrastructure.pptx
Building an Edge Computing Strategy - Distributed infrastructure.pptxBuilding an Edge Computing Strategy - Distributed infrastructure.pptx
Building an Edge Computing Strategy - Distributed infrastructure.pptx
 
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
 

Mehr von GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easyGovCloud Network
 

Mehr von GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 

KĂźrzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

KĂźrzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Why Should the Financial Community Care About Cloud - Cobis2020

  • 1. Cloud Computing: Why should the Finance Community Care? Kevin L. Jackson Vice President General Manager NJVC Cloud Services Kevin.jackson@njvc.com
  • 2. The New IT Era IDC September 2008 rev date 3/25/2012
  • 4. Cloud Computing  Not a new technology but a new approach in the provisioning and consumption of information technology  A services oriented architecture (SOA) implemented typically on a virtualized infrastructure (compute, storage, networks) using commodity components coupled with highly automated controls enable the five essential characteristics of cloud computing. Key Benefits Key Concerns  Significant cost reductions  Standards  Reduced time to capability  Portability  Increased flexibility  Control/Availability  Elastic scalability  Security  Increase service quality  IT Policy  Increased security  Management /  Ease of technology refresh Monitoring  Ease of collaboration  Ecosystem  Increased efficiency
  • 5. Cloud Computing: Value and Capabilities  Time  Reduce time to deliver/execute mission  Increased responsiveness/flexibility/availability  Cost  Optimizing cost to deliver/execute mission  Optimizing cost of ownership (lifecycle cost)  Increased efficiencies in capital/operational expenditures  Quality  Environmental improvements  Experiential improvements
  • 6. Relational Databases and the Cloud German, BMW, Truck Truck The economics of data storage led to the use of BMW Car content addressable German, BMW, Car storage, flat storage SUV architectures and internet German, BMW, scaling. SUV Germany … Volkswagen … German Volkswagen, Truck Audi … Search … Toyota Country Japan Honda … Mazda Database design, Ford database tuning no … longer required with US Chrysler infinite scalability and consistent … GM … responsiveness US, GM, SUV 3t 1t 6
  • 7. Traditional Analytics Traditionally, lexical searches, filtering or Boolean search attributes are used to ••••••••••• reduce data to a “working set”. Analytical tools are then applied to this “working set”. ••••••••••• ••••••••••• ••••••••••• ••••••••••• Tools/Analysis Reports/Conclusions ••••••••••• All Data Sources / Types 7
  • 8. Cloud Enables Searching All the Data, All the Time ••••••••••• ••••••••••• ••••••••••• ••••••••••• ••••••••••• Reports/Conclusions ••••••••••• 8
  • 9. Computing Malicious Insiders Data Loss or Leakage Unknown Risk Profile Shared Technology Issues Insecure Interfaces and APIs Account or Service Hijacking Abuse and Nefarious Use of Cloud Top Threats to Cloud Computing Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit Governance Information Lifecycle Management Portability and Interoperability Traditional Security, Business Continuity, Data Center and Disaster Recovery Operations Incident Response, Notification and Remediation Application Security Operational Encryption and Key Management Identity and Access Management Virtualization
  • 10. IT Auditing Collecting and evaluating evidence to determine weather a computer system (information system) safeguards asset, maintains data integrity, achieves organizational goals effectively and consumes resources efficiently.  Finance and Commercial  PCI  Gramm-Leach-Bliley Act  Social and Labor  Sarbanes-Oxley (SOX)  SAS70  HIPAA  Public Safety  Data Protection Act (UK)  Federal Information Security Management Act (FISMA)  Security  ISO27000
  • 11. Auditing the Cloud Areas for Audit  Compliance  Governance and Risk  Security Auditing Challenges  1:1 mapping no longer exists  Dynamic, global environments  Requirement to retrieve, correlate and extract meaningful data from an ever increasing number of data sources  Auditing as a service spreads the audit trail across multiple domains
  • 12. Data Confidentiality, Privacy, Integrity Data stored, transmitted and processed outside of the organization Shared computing environments No physical control of data Physical and logical access managed by provider No controls to prevent data modification No logging events on data (access, modification, transmission)
  • 13. Regulation and Compliance Data subject to new laws Exposure to foreign governments and subpoenas Retention requirements vay among jurisdictions Audit of provider’s environment Increased complexity to comply with standards
  • 16. Summary  Cloud computing is a technological evolution  “Drive for scale” (Internet) and “Drive for cheap” (Commodity components, Extensive automation) and the economics of Moore’s Law (Cheap storage) led to a business model revolution  Fiscal realities and business model economics are driving rapid adoption of cloud computing  Cloud computing can enable significant application enhancements  Security: Same threat vectors. Same attacks but faster, broader and automated using “resource concentration  Audit issues still need to be addressed.  A Prediction: “FedRAMP for Finance” is coming 16
  • 17. Thank You ! Kevin L. Jackson Vice President General Manager NJVC Cloud Services (703) 335-0830 Kevin.jackson@NJVC.com http://www.NJVC.com http://kevinljackson.blogspot.com http://govcloud.ulitzer.com