On cloud computing the dominance and governance on the computing landscape
Download
1 / 87

On - PowerPoint PPT Presentation


  • 223 Views
  • Updated On :

On Cloud Computing: The Dominance and Governance on The Computing Landscape. By Shang-Sheng Jeng March 22 2010. Baseline Consideration:. A New Dimension: Cyberspace A New Identity: Cybog A New Relationship and Asset. Baseline Consideration:. Information  Intelligence  Instruction

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'On ' - Mercy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
On cloud computing the dominance and governance on the computing landscape l.jpg

On Cloud Computing: The Dominance and Governance on The Computing Landscape

By Shang-Sheng Jeng

March 22 2010


Baseline consideration l.jpg
Baseline Consideration:

  • A New Dimension: Cyberspace

  • A New Identity: Cybog

  • A New Relationship and Asset


Baseline consideration3 l.jpg
Baseline Consideration:

  • Information  Intelligence  Instruction

  • This is a Competitive World

  • From Profitability to Survivability

  • Computing Paradigm Shift

  • The Next Thirty Years of World


The first priority object to destroy for tanks is not the enemy but the anti tank weapons l.jpg

“The first priority object to destroy for tanks is not the enemy but the anti-tank weapons.”

“The will to survival”


Presentation objectives l.jpg
Presentation Objectives: enemy but the anti-tank weapons.”

  • Offensive:

    • To Manipulate the “Cloud Computing” Landscape

      • Opportunity & Capability

    • To Balance the “Cloud Computing” Competition

      • IBM (Oracle+Sun), Google (MS+Yahoo)

    • To Dominate the Government Cloud in Taiwan and China

    • To Lead the Reform of “Software Industry”


Presentation objectives6 l.jpg
Presentation Objectives: enemy but the anti-tank weapons.”

  • Defensive:

    • Make Taiwan’s Computer Industry survive in Computing Paradigm Shift

    • Take the financial and technological benefit for Taiwan’s Cloud Computing Users (Institutional or Personal)

    • Minimize the lost of Taiwan’s software industry

    • Find a Way to Keep Taiwan’s Software Industry Survive


Content l.jpg
Content enemy but the anti-tank weapons.”

  • 1. Origins

  • 2. Players

  • 3. Trends

  • 4. Response


1 origins l.jpg
1. Origins enemy but the anti-tank weapons.”

  • 1.1 Industry Restructuring

  • 1.2 Technology Maturity

  • 1.3 Issue, Innovation and Competition


1 1 industry restructuring old vertical l.jpg
1.1 Industry Restructuring enemy but the anti-tank weapons.”(old, vertical)

  • Network CISCO

  • Server Sun Micro, HP

  • DB Oracle

  • Services IBM

  • Business SAP


1 1 industry restructuring now integration l.jpg
1.1 Industry Restructuring enemy but the anti-tank weapons.”(now, integration)

  • Market Overlapping

  • Market Saturation

  • Requirement Dynamics and Technology Complexity pushed Outsourcing (for users) and M&A (for suppliers)


1 2 technology maturity l.jpg
1.2 Technology Maturity enemy but the anti-tank weapons.”

  • Producer

    • Processing

    • Communication

    • Storage

  • Consumer

    • Web based Services

  • Architecture

    • Clustering, Grid, Data Center


1 3 issue innovation and competition l.jpg
1.3 Issue, Innovation, and Competition enemy but the anti-tank weapons.”

  • Open Source Movement

  • Software as a Service  Hardware, Infrastructure, Platform, as a Service

  • Web 2.0 Push

  • Concept of Utility Computing (Nicholas Carr, “IT doesn’t Matter”, “Big Switch”)


1 3 issue innovation and competition13 l.jpg
1.3 Issue, Innovation, and Competition enemy but the anti-tank weapons.”

  • Data as Asset Biz Model

  • Prosumer (producer as consumer and vice versa) Biz Model

  • SOA & Event-driven Computing (C4KISR, SOA-R, Cloud Computing)

  • Functional Cloud Integrated Service (example: Chiang’s memorial pages)


Web 2 0 push l.jpg
Web 2.0 Push enemy but the anti-tank weapons.”

  • The Characteristics of Web 2.0

  • Virtual Disk Xdriver, iDisk

  • Note BuzzWord

  • Blogger WordPress

  • FeedReader Rojo, Bloglines

  • Photo Flickr, Photobucket

  • Video YouTube, Joost


Web 2 0 push15 l.jpg
Web 2.0 Push enemy but the anti-tank weapons.”

  • eMail gmail. Hotmail

  • iPhone skype

  • Social network MySpace, Facebook

  • Virtual ID Second Life, World of Warcraft


2 player l.jpg
2. Player enemy but the anti-tank weapons.”

  • 2.1 Type 1 Service: Serve to Government and Large Institutions

  • 2.2 Type 2 Service: Serve to Mass Individual User, and Small Business

  • 2.3 Type 3 Service: Serve for Special Purpose


2 1 type 1 player oriented l.jpg
2.1 Type 1 Player Oriented enemy but the anti-tank weapons.”

  • IBM* (Key Player)

  • Oracle

  • EMC

  • HP

  • SAP


Slide18 l.jpg
IBM enemy but the anti-tank weapons.”

  • Outsourcing Service: Applications Outsourcing, Business Process Outsourcing, IT Outsourcing and Hosting

  • Service Science

  • Mainframe Computer and Services Integrated Datacenter (GIE)


Ibm blue cloud l.jpg
IBM Blue Cloud enemy but the anti-tank weapons.”

  • Almaden Research Center:

    • Xen, PowerVM, Linux, Hadoop File System (Open Source)

    • Tivoli, DB2, WebSphere, x86 Blade (Cash Cow)


Services sciences l.jpg
Services Sciences enemy but the anti-tank weapons.”

  • Customer Insights

  • Social Analytics

  • Services Software Engineering

  • Systems Management and Service Management

  • Social Simulation


Service science l.jpg
Service Science enemy but the anti-tank weapons.”

  • Service Science, Management, and Engineering

  • IBM System Journal, Volume 47, Number 1, 2008


Ibm penetration l.jpg
IBM Penetration enemy but the anti-tank weapons.”

  • IBM Software Available Pay-As-You-Go on EC2

  • Monday, February 23, 2009


Oracle l.jpg
Oracle enemy but the anti-tank weapons.”

  • Oracle Business OnLine

  • Siebel

  • Sun Micro: Java, Virtual On-demand Data Center, Blackbox


Slide24 l.jpg
EMC enemy but the anti-tank weapons.”

  • VMware, Pi, Smarts, Berkeley Data Systems, Mozy


2 2 type 2 player oriented l.jpg
2.2 Type 2 Player Oriented enemy but the anti-tank weapons.”

  • Amazon

  • Google* (Key Player)

  • Salesforce

  • Microsoft

  • Yahoo


Amazon l.jpg
Amazon enemy but the anti-tank weapons.”

  • Redundant Resources

  • Services as a control tool

  • Amazon Web Services (AWS): Simple Storage Service (S3), Elastic Compute Cloud (EC2), Simple Queuing Service, SimpleDB


Google l.jpg
Google enemy but the anti-tank weapons.”

  • Enterprise Cloud and Consumer Cloud

  • Google App Engine

  • Google File System, Map/Reduce, Chubby, BigTable。


Salesforce l.jpg
Salesforce enemy but the anti-tank weapons.”

  • Software as a Service, Platform as a Service

  • AppExchange: Customer Relationship Management (CRM), Enterprise Content Management (ECM)

  • First excess 100M company of only cloud type services


Microsoft l.jpg
Microsoft enemy but the anti-tank weapons.”

  • Dynamics CRM Online, Exchange Online, Office Communications Online

  • Windows Live, Office Live, Xbox Live


Yahoo l.jpg
Yahoo enemy but the anti-tank weapons.”

  • Hadoop Core (Open Source): a subproject of Apache


2 3 type 3 player oriented l.jpg
2.3 Type 3 Player Oriented enemy but the anti-tank weapons.”

  • Trend Micro

  • Panda Cloud Antivirus

  • PRC


Trend micro l.jpg
Trend Micro enemy but the anti-tank weapons.”

  • Security Cloud

  • Smart Protection Network, In-the-Cloud service


Panda cloud antivirus l.jpg
Panda Cloud Antivirus enemy but the anti-tank weapons.”

  • Light, Secure, Ease

  • CloudAntivirus.exe (19,014,048 byte, May 10 2009) it need to uninstall Norton 360.


3 trends l.jpg
3. Trends enemy but the anti-tank weapons.”

  • 3.1 What is Cloud Computing

  • 3.2 For Type 1 Oriented Cloud Computing

  • 3.3 For Type 2 Oriented Cloud Computing

  • 3.4 For Type 3 Oriented Cloud Computing

  • 3.5 McKinsey’s Recent Findings (April 2009)

  • 3.6 Forrester’s Opinions (April 13 2009)

  • 3.7 US Government IT Spending


Trends l.jpg
Trends enemy but the anti-tank weapons.”

  • 3.8 The US Cyber Challenge


3 1 what is cloud computing l.jpg
3.1 What is Cloud Computing enemy but the anti-tank weapons.”

  • Defined by

    • Reliable, Adaptable, Distributed Systems Lab, UC Berkeley (RAID, RISC) (sponsor: Sun, Google, Microsoft)

    • NIST

    • Open Cloud Manifesto


What is cloud computing a berkeley view of cloud computing feb 2009 l.jpg
What is Cloud Computing? enemy but the anti-tank weapons.”A Berkeley View of Cloud Computing (Feb 2009)

  • Old idea: Software as a Service (SaaS)

    • Def: delivering applications over the Internet

  • Recently: “[Hardware, Infrastrucuture, Platform] as a service”

    • Poorly defined so we avoid all “X as a service”


What is cloud computing berkeley l.jpg
What is Cloud Computing? enemy but the anti-tank weapons.”(Berkeley)

  • Utility Computing: pay-as-you-go computing

    • Illusion of infinite resources

    • No up-front cost

    • Fine-grained billing (e.g. hourly)


Spectrum of clouds berkeley l.jpg
Spectrum of Clouds enemy but the anti-tank weapons.”(Berkeley)

Lower-level,

Less management

Higher-level,

More management

EC2

Azure

AppEngine

Force.com

39

  • Instruction Set VM (Amazon EC2, 3Tera)

  • Bytecode VM (Microsoft Azure)

  • Framework VM

    • Google AppEngine, Force.com


A working definition of cloud computing nist l.jpg
A Working Definition of Cloud Computing enemy but the anti-tank weapons.”(NIST)

  • Cloud computing is a pay-per-use model for enabling convenient, on-demand network access to a shared pool of configurable and reliable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal consumer management effort or service provider interaction.


A working definition of cloud computing nist41 l.jpg
A Working Definition of Cloud Computing enemy but the anti-tank weapons.”(NIST)

  • The cloud model is comprised of five key characteristics, three delivery models, and four deployment models.


5 key cloud characteristics l.jpg
5 Key Cloud Characteristics enemy but the anti-tank weapons.”

  • On-demand self-service

  • Ubiquitous network access

  • Resource pooling

  • Rapid elasticity

  • Pay per use


3 cloud delivery models l.jpg
3 Cloud Delivery Models enemy but the anti-tank weapons.”

  • Cloud Software as a Service (SaaS)

    • –Use provider’s applications over a network

  • Cloud Platform as a Service (PaaS)

    • Deploy customer-created applications to a cloud

  • Cloud Infrastructure as a Service (IaaS)

    • Rent processing, storage, network capacity, and other fundamental computing resources


3 cloud delivery models44 l.jpg
3 Cloud Delivery Models enemy but the anti-tank weapons.”

  • To be considered “cloud” they must be deployed on top of cloud infrastructure that enables the key characteristics


4 cloud deployment models l.jpg
4 Cloud Deployment Models enemy but the anti-tank weapons.”

  • Private cloud

    • enterprise owned or leased

  • Community cloud

    • shared infrastructure for specific community

  • Public cloud

    • Sold to the public, mega-scale infrastructure

  • Hybrid cloud

    • composition of two or more clouds


4 cloud deployment models46 l.jpg
4 Cloud Deployment Models enemy but the anti-tank weapons.”

  • Two types: internal and external (my opinion)


Common cloud characteristics nist l.jpg
Common Cloud Characteristics enemy but the anti-tank weapons.”(NIST)

  • Cloud computing often leverages:

    • Massive scale

    • Virtualization

    • Free software

    • Autonomic computing

    • Multi-tenancy

    • Geographically distributed systems

    • Advanced security technologies


What is cloud computing the open cloud manifesto l.jpg
What is Cloud Computing enemy but the anti-tank weapons.”The Open Cloud Manifesto

  • The key characteristics of the cloud are the ability to scale and provision computing power dynamically in a cost efficient way and the ability of the consumer (end user, organization or IT staff) to make the most of that power without having to manage the underlying complexity of the technology. The cloud architecture itself can be private (hosted within an organization’s firewall) or public (hosted on the Internet).


The goals of an open cloud l.jpg
The Goals of an Open Cloud enemy but the anti-tank weapons.”

  • Choice

  • Flexibility

  • Speed and Agility

  • Skills


Choice anti lock in l.jpg
Choice (anti-lock-in) enemy but the anti-tank weapons.”

  • As an organization chooses a provider or architecture or usage model, an open cloud will make it easy for them to use a different provider or architecture as the business 5 environment changes. If the organization needs to change providers because of new partnerships, acquisition, customer requests or government regulations, they can do so easily. If the organization deploys a private cloud, they can choose between providers as they extend their capacity and/or functional capabilities. Resources that would have been spent on a difficult migration can instead be spent on innovation.


Flexibility inter communication and operation l.jpg
Flexibility (inter communication and operation) enemy but the anti-tank weapons.”

  • No matter which cloud provider and architecture an organization uses, an open cloud makes it easy for them to work with other groups, even if those other groups choose different providers and architectures. An open cloud will make it easy for organizations to interoperate between different cloud providers.


Speed and agility open interface l.jpg
Speed and Agility (open interface) enemy but the anti-tank weapons.”

  • One of the value propositions of cloud computing is the ability to scale hardware and software as needed. Using open interfaces allows organizations to build new solutions that integrate public clouds, private clouds and current IT systems. As the conditions of the organization change, an open cloud lets the organization respond with speed and agility.


Skills open development paradigm l.jpg
Skills (open development paradigm) enemy but the anti-tank weapons.”

  • A side effect of an open cloud is the availability of skilled professionals. If there are many proprietary programming models, a given IT professional is unlikely to know more than a few of them. In an open cloud, there is a small set of new technologies to learn (especially when existing technologies are utilized), greatly enhancing the chances that the organization can find someone with the necessary skills.


Open cloud supporter l.jpg
Open Cloud Supporter enemy but the anti-tank weapons.”

  • Akami, AMD, AT&T, Cisco, CSC, The Eclipse Foundation, EMC, IBM, Juniper Networks, Novell, Red Hat, SAP, Siemens AG, Software AG, Sun Microsystems, VMWare

  • No: Microsoft, Oracle, Amazon, Yahoo, Google, HP,… Why? (May 08 2009)


3 2 for type 1 oriented cloud computing l.jpg
3.2 For Type 1 Oriented Cloud Computing enemy but the anti-tank weapons.”

  • Redefine the Function and Structure of Institutional Data Center

  • International interoperability Push of Institutional or Governmental Workflow (mil)

  • The Shrinking of (all kinds of) IT Consulting Company


For type 1 oriented cloud computing l.jpg
For Type 1 Oriented Cloud Computing enemy but the anti-tank weapons.”

  • The New Issue of Survivability and Profitability of Traditional Software Industry

  • Security as the most important Key Issue of Cloud Computing Penetration


3 3 for type 2 oriented cloud computing l.jpg
3.3 For Type 2 Oriented Cloud Computing enemy but the anti-tank weapons.”

  • When “the free lunch end”? What’s the impact? How we should face it?

  • What’s the real Value of Data (personal and personal generated)?

  • The Technology of Data Mining, Information Fusion and (dealing with intelligence and instruction)…as a new Disruptive Technology


For type 2 oriented cloud computing l.jpg
For Type 2 Oriented Cloud Computing enemy but the anti-tank weapons.”

  • The Rise of Mass Communication to Mass Control, Cloud computing as a Data-Information-Intelligence-Instruction Chain Experimental Battlefield

  • Mass Individual Ignorance of Data-Information-Intelligence chain will be a Business Competition and National Security Issue


3 4 for type 3 oriented cloud computing l.jpg
3.4 For Type 3 Oriented Cloud Computing enemy but the anti-tank weapons.”

  • Security Cloud

  • Internal Cloud


Security cloud l.jpg
Security Cloud enemy but the anti-tank weapons.”

  • National or Government Security Cloud

  • Enterprise Security Cloud

  • End Users Security Cloud


Internal cloud l.jpg
Internal Cloud enemy but the anti-tank weapons.”

  • Backup Cloud

  • Testing and Development Cloud

  • Heterogeneous Working Environment Cloud

  • Load Balance Cloud

  • Security Cloud


3 5 mckinsey s recent findings l.jpg
3.5 McKinsey’s Recent Findings enemy but the anti-tank weapons.”


Mckinsey s recent findings l.jpg
McKinsey’s Recent Findings enemy but the anti-tank weapons.”


3 6 forrester s opinions deliver cloud benefits inside your walls l.jpg
3.6 Forrester’s Opinions: enemy but the anti-tank weapons.”Deliver Cloud Benefits Inside Your Walls

  • While the excitement about cloud computing centers on Amazon Elastic Compute Cloud (EC2) and other public infrastructure-as-a-service products, many enterprise infrastructure and operations professionals are taking this concept in-house and building their own internal clouds.


Deliver cloud benefits inside your walls l.jpg
Deliver Cloud Benefits Inside Your Walls enemy but the anti-tank weapons.”

  • These pools of virtual machines can be built upon either virtual server or high-performance computing (HPC) grid foundations and can be operated according to the specific security and process requirements of the business. But to deliver the fundamentally better economic value of cloud architectures within your walls,


Deliver cloud benefits inside your walls66 l.jpg
Deliver Cloud Benefits Inside Your Walls enemy but the anti-tank weapons.”

  • these clouds require a dynamic platform (or automated workload management) and developer self-service interfaces. There’s a growing list of vendors eager to help you deploy an internal cloud, but be sure you understand that these solutions are more building blocks than complete solutions and must be customized to your specific needs.


3 7 us government it spending july 10 2009 l.jpg
3.7 US Government IT Spending enemy but the anti-tank weapons.” July 10, 2009

  • Comprehensive INPUT report identifies key developments shaping federal IT investment.

  • Using the fiscal year 2010 budget request released by the Office of Management and Budget (OMB), the report predicts significant growth in cloud computing, green technologies, healthcare IT, and cyber security.


Us government it spending l.jpg
US Government IT Spending enemy but the anti-tank weapons.”

  • INPUT projects that federal government demand for IT products and services will grow at a compounded annual rate of 3.5 percent over the next five years, reaching $90 billion in total market value by 2014, up from $76 billion in 2009.


Us government it spending69 l.jpg
US Government IT Spending enemy but the anti-tank weapons.”

  • The Obama Administration's broad initiatives will drive technology adoption in the healthcare, energy and green building markets. Increased adoption of cloud computing, Service Oriented Architecture (SOA), and cyber security projects will also shape the federal IT market.


Cloud computing l.jpg
Cloud Computing enemy but the anti-tank weapons.”

  • The cloud computing market is expected to grow nearly 30 percent over the next five years, to over $1 billion, transforming the federal IT infrastructure. Exploration of cloud-based projects is a top administration priority because of expected cost savings and increased efficiencies.


Cloud computing71 l.jpg
Cloud Computing enemy but the anti-tank weapons.”

  • The National Institute of Standards & Technology (NIST) helped create the momentum for cloud initiatives on a federal level by crafting security standards and definitions for cloud projects. SOA implementations by the Air Force, Navy, Army and other government agencies are helping to drive the adoption of cloud computing.


Cyber security l.jpg
Cyber Security enemy but the anti-tank weapons.”

  • The federal government will increase information security spending from $8.2 billion in 2009 to $12.2 billion by 2014 at a compound annual growth rate (CAGR) of 8.3%.


Cyber security73 l.jpg
Cyber Security enemy but the anti-tank weapons.”

  • Even still, according to INPUT research and analysis, less than 1 out of 10 dollars in federal government IT budgets goes to securing systems and data, and new initiatives such as the DoD's cyber command and other ongoing government wide cyber initiatives.


3 8 the us cyber challenge july 24 2009 l.jpg
3.8 The US Cyber Challenge enemy but the anti-tank weapons.”July 24, 2009

  • The U.S. Cyber Challenge, a triathlon of competitions designed to inspire students to learn the technical skills needed to defend--and, in some cases, attack--computer networks.

  • DC3 Digital Forensics Challenge

    • DoD Cyber Crime Center

    • An Air Force Association national high school cyber defense competition


The us cyber challenge l.jpg
The US Cyber Challenge enemy but the anti-tank weapons.”

  • CyberPatriot Defense Competition

    • Cyber Patriot

    • A Department of Defense Cyber Crime Center competition focusing on cyber investigation and forensics

  • Netwars Capture-the-Flag Competition

    • SANS Institute Netwars Capture-the-Flag

    • A SANS Institute challenge testing mastery of vulnerabilities


4 response l.jpg
4. Response enemy but the anti-tank weapons.”

  • Data Center for Government of IBM in Taiwan

  • “Data as Value” Technology Development

  • Individual User Experience of Google

  • Business User Experience of Amazon or Salesforce

  • A Team to study “Hadoop Core” and Related Application (open source)


4 response77 l.jpg
4. Response enemy but the anti-tank weapons.”

  • Government Sponsored Personal Financial Cloud Computing

  • Government Sponsored Personal Health Cloud Computing

  • Government Sponsored Public Services Cloud Computing

  • Government Sponsored Disaster On-demand Cloud Computing


4 response alternatives l.jpg
4. Response (alternatives) enemy but the anti-tank weapons.”

  • [email protected] as an anti or collaborate or complementary to Cloud Computing

  • On Demand Vs. Prefetch based Computing

  • Intelligence based Cloud Computing

  • Instruction based Cloud Computing

  • Open Cloud Computing Legal Enforcement


4 response alternatives79 l.jpg
4. Response (alternatives) enemy but the anti-tank weapons.”

  • Opportunity for Hardware Manufactures

  • Opportunity for Green Considerations

  • Opportunity for Environmental Extreme Conditions

  • Compiler Technology: Multi-core Programming, Architecture Security,…

  • Cloud Openness Certification


Action plan l.jpg
Action Plan enemy but the anti-tank weapons.”

  • Research Group

    • Cloud (cluster, grid) Vs. Supercomputer

    • SOA, Cloud Computing, Cyber Command

    • Data and Transactions as Asset (Data and Transactions generated Value): philosophy, architecture, science, engineering and pragmatics

    • Privacy in Cloud Computing


Action plan81 l.jpg
Action Plan enemy but the anti-tank weapons.”

  • Research Group

    • Security of Cloud Computing and Cloud Computing Security

    • Openness Cloud Computing for Software Industry of Taiwan


Action plan82 l.jpg
Action Plan enemy but the anti-tank weapons.”

  • Watching Group

    • US Push Impact (transparency and interoperability in mil and gov)

    • Department of National Development & Government Cloud

    • Open Cloud Computing: Organization, Technology, Standards, Legal Actions


Action plan83 l.jpg
Action Plan enemy but the anti-tank weapons.”

  • Action Group

    • Cloud News and Blog Publish

    • Internal Cloud Pilot

    • Open Cloud Computing Organization Construction

    • Experimental User Experience Study

    • Contact with Key Player


Appendix 1 l.jpg
Appendix 1 enemy but the anti-tank weapons.”

  • In “IT Doesn’t Matter” Carr’s suggestions:

    • Spend Less

    • Follow, Don’t Lead

    • Innovate When Risks Are Low

    • Focus More on Vulnerabilities than Opportunities


Appendix 2 l.jpg
Appendix 2 enemy but the anti-tank weapons.”

  • SOA and Cloud Computing


Slide86 l.jpg
Quiz enemy but the anti-tank weapons.”

  • Who care “Cloud Computing”?

  • Who create the term “Cloud Computing” and Why?

  • How “Cloud Computing” impact the “Computer Industry”?

  • How “Cloud Computing” impact the jobs of Computer Industry?


Slide87 l.jpg
Quiz enemy but the anti-tank weapons.”

  • What is the security issues about “Cloud Computing”?

  • How “Cloud Computing” create new service type and biz model?


ad