1 Dec. 3, 2009 COMP660L Fall 2009 HKUST Lin Gu Topics in Computer and Communication Networks: Cloud Computing.

Slides:



Advertisements
Similar presentations
Producing and Marketing Goods and Services
Advertisements

Methodology Conducted from March 16 – 22, 2006
1 Dr. Michael D. Featherstone Introduction to e-Commerce What the Heck is Cloud Computing?
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Dawn Pedersen Art Institute. What Is Branding? Branding is the sum total of a company’s identity—from its name and logo to every piece of communication,
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
Real world application  Protocols  Paul Simmonds ICI Plc. & Jericho Forum Board.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Global Software II Introduction Paving the Way to the US Market For Finnish Software Companies Copyright Global Software II
1 Security Architecture and Analysis Management of System Development and Implementation –The System Development Process –Issues and Risks –Mitigation.
Roles of IT Personnel Unit Customer Service This is a facility that helps customers with wide-ranging questions relating to a specific company,
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
We Help you in Managing your Business BETTER. What Is Eventbizonline ? A Single Comprehensive Event Management Software Solution In India Data Management.
Be able to plan e-commerce strategies. Hosting When setting up an e-commerce site, there are two issues of hosting which need to be decided - who will.
Virtual Private Network
Data Protection Act. Lesson Objectives To understand the data protection act.
Design For Failure Is The Path To Success In Cloud Ashay Chaudhary.
CLOUD COMPUTING. A general term for anything that involves delivering hosted services over the Internet. And Cloud is referred to the hardware and software.
Hosting P6.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Management of Source Code Integrity Presented by O/o the Accountant General (A&E), Jammu and Kashmir.
Legacy systems overview DT Legacy System definition “Legacy system is deficiency in a system in terms of its suitability to the business, its Platform.
Enterprise Storage A New Approach to Information Access Darren Thomas Vice President Compaq Computer Corporation.
J.D.-Client Services o Strong Client Focus: troubleshooting and follow-up skills; commitment to continuous improvement. o Previous Analyst experience a.
IT Infrastructure for Business
TECHNOLOGY GUIDE THREE
In the name of God :).
CLOUD COMPUTING Internet And Online Community Week 6.
Finding and Hiring A+ Talent Dan Howell | Justin Kent.
CHAPTER 6 Business-to-Business Markets: How and Why Organizations Buy M A R K E T I N G Real People, Real Choices Fourth Edition.
PPTTEST 10/24/ :07 1 IT Ron Williams Business Innovation Through Information Technology IS Organization.
Database Analysis and the DreamHome Case Study
8 Key Indicators Answers and Explanations. 1. Do you believe that people are basically good and want to do the right things, even if they sometimes don’t.
CLOUD COMPUTING cloud computing and its importance to large scale firms such as Apple and Microsoft.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Cloud Computing, Business Users & Google Raju Gulabani Director of Product Management, Google Apps Feb 25, 09.
Why should I as a small business owner have a web site?
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Enterprise Technology & Analysis for Enterprise ETI 6134 Dr. Karla Moore.
Chapter 13 The Management of Information and Knowledge for Better Decisions.
 Express ideas about a difficult topic  Convince audience members your opinion is correct  Practice research skills  Build communication skills.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Turning Software into a Service – The Critique Paul Kopacz Brian Moore.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
Any business is suitable to have a sales tracking software that will be utilized during operations. A deal tracking software is considered as a sales tracking.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Enterprise Managed Services: Key Issues Facing Today’s CIO
6-1 Business-to-Business Marketing Marketing of goods and services that businesses and organizations buy for purposes other than personal consumption –Manufacturers.
Understanding The Cloud
Lecture-5 Implementation of Information System Part - I Thepul Ginige
Evolution of Microsoft Windows: 1985 ~ 2009
An Introduction to Cloud Computing
Cloud adoption NECOOST Advisory | June 2017.
RUBIDEX Blockchain Overview RUBIDEX.NET-A reliable Blockchain Solution.
Presentation transcript:

1 Dec. 3, 2009 COMP660L Fall 2009 HKUST Lin Gu Topics in Computer and Communication Networks: Cloud Computing

2 Do we trust the cloud?

3 Cloud and Trust Debate on the Economist: “This house believes that the cloud can't be entirely trusted” –Nearly 2,500 visitors cast their vote. –Agree with the statement? 47% Yes53% No

4 Cloud and Trust –Nearly all expect that computing will migrate online –What they differ on is how fast this shift will occur “The idea is that computing will increasingly be delivered as a service, over the internet, from vast warehouses of shared machines. … companies are also moving some of their applications into the cloud. But is this a good idea? Can providers of these computing clouds be trusted? Are these mainframes in the sky reliable enough? What happens if data get lost? What about privacy and lock-in? Will switching to another cloud be difficult?”

5 Cloud and Trust Ludwig Siegele: –“The degree of trust will, at the end of the day, decide how much of computing will move into the cloud.” –“… only a few (cloud providers) will have the necessary resources to meet the complex requirements of large organisations.”

6 Cloud and Trust Stephen Elop: –“As we move to a new paradigm, I believe strongly that the only responsible choice is to give customers the power of choice: a software plus services approach that allows customers to reflect their assessment of cloud trustworthiness in the choices they make.” –“… I believe the cloud can or ultimately will be trusted; yet I still maintain that the cloud will not trusted to be all things to all businesses.”

7 Cloud and Trust Marc Benioff: –“Simplicity plus complexity does not sound like a better deal than simplicity to me. Will services coexist with software? Sure. That is how transitions work. And as we mentioned previously, one paradigm rarely completely replaces another in technology. But roles and influence do change.” –“Client-server systems are not inherently more secure than cloud services.”

8 Cloud and Trust Audience: –“It's still very much wishful thinking at this stage to think that enterprises are going get 100% on the cloud and have such huge dependency outside of their control.” –“Would any CIO want their entire corporate accounting on some server somewhere? Today, I doubt it. They'd want that information on a tamper-proof in-house resident system.“ –“Public clouds will never be used for mission critical systems until issues with encryption and privacy can be resolved in a non-intrusive manner. Until these issues are addressed public clouds will remain consumer- centric and be less likely to be used for enterprise computing.”

9 “In many cases, trust will indeed have to be earned.”