Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cloud computing strategies
Bookmark Share

Text

Cloud computing strategies

Chorafas, Dimitri N. - Personal Name;

Contents

1. The Cloud Computing Market 3
1.1. For and Against Cloud Computing / 3
1.2. OnDemand versus onPremise IT / 6
1.3. The Four Pillars of Cloud Computing / 10
1.4. A Birdseye View of Cloud Computing Vendors / 14
1.5. A New Industry Is Being Born / 18
1.6. Competition in the Cloud Is Asymmetric / 22
1.7. The Multibillion Opportunity: Income from Advertising / 25

2. What Cloud Computing Has On Offer 29
2.1. Public Clouds, Private Clouds and Clients / 29
2.2. Cloud Applications and Platforms / 33
2.3. Providing the Cloud Infrastructure / 36
2.4. Cloud Computing, Spectral Efficiency, Sensors and Perspiration / 40
2.5. The Technology of Enabling Services / 44
2.6. At the Core of the Cloud Is Virtualization / 48
2.7. Strategic Products and Tactical Products 52

3. Strategic Inflection Points 57
3.1 Strategic Inflection Points in Information Technology / 57
3.2. Cloud Computing and IT Slogans / 62
3.3. User-Centered Solutions and Cloud Computing / 66
3.4. For Cloud Vendors, an Inflection Point Is Threat and Opportunity / 70
3.5. Cost Is One of the Dragons / 74
3.6. The Opaque Problems of Costs and of Pricing / 78
3.7. Salesforce.com. A Case Study on Pricing onDemand Services / 81

4. User Organizations of Cloud Computing 85
4.1. Potential Customers of Cloud Technology / 85
4.2. The Cloud Interests Small and Medium Enterprises / 88
4.3. Virtual Companies and the Cloud / 92
4.4. Using Virtual Networked Objects / 95
4.5. Consumer Technologies and the Cloud / 99
4.6. Social Networking and Multimedia Messaging / 103
5. Risks and Opportunities with The Cloud 109
5.1. The Computer as We Know It Today May Disappear / 109
5.2. The CIO's Career Is at Stake / 112
5.3. Centralization May Be a Foe, Not a Friend / 116
5.4. Budgeting for Cloud Computing / 119
5.5. Outsourcing, Infrastructural Interdependencies and the Cloud / 122
5.6. Service Level Agreements / 125
5.7. Is Cloud Computing a Lock-In Worst Than Mainframes? / 128

6. Reengineering the User Organization 133
6.1. Strategic Decisions and Reengineering / 135
6.2. Organizational Solutions Are No Sacred Cows / 137
6.3. The No. 1 Asset Is Human Resources / 140
6.4. Promoting Greater Productivity Through Reorganization / 144
6.5. The Transition from Legacy to Competitive Systems / 148
6.6. Avoiding the Medieval "EDP" Mentality / 151

7. Inside the Cloud of the Competitors 159
7.1. The Controllability of Computer Applications / 159
7.2. Platforms Rising. Google Tries to Be a Frontrunner / 162
7.3. Salesforce.com and Its Force / 164
7.4. Microsoft is Now on the Defensive / 167
7.5. Amazon.com Leverages Its Infrastructure / 170
7.6. EMC, VMWare and Virtual Arrays of Inexpensive Disks / 173
7.7. Wares of Other Cloud Challengers / 175

8. The Saga of an Open Architecture 181
8.1. Searching for an Open Architecture / 181
8.2. Challenges Posed by Big Systems / 185
8.3. Infrastructure as a Utility / 188
8.4. The Cloud’s System Architecture and Its Primitives / 191
8.5. The User Organization’s Business Architecture / 194
8.6. Financial Services Application Architecture; a Case Study / 198
8.7. The Architect’s Job: Elegance, Simplicity and Integration / 201

9. Internet and Cloud Security 205
9.1. Who Owns Whose Information in the Cloud? / 205
9.2. When Responsibility for Security Takes a Leave, Accountability Goes Along / 208
9.3. Data Fills the Air and Many Parties Are Listening / 211
9.4. Many of the Cloud’s Security Problems Date Back to the Internet / 214
9.5. Security-as-a-Service by Cloud Providers / 218
9.6. Fraud Theory and Intellectual Property / 220
9.7. A Brief Review of Security Measures and Their Weaknesses / 223
9.8. Security Engineering. Outwitting the Adversary / 226

10. Cloud Reliability, Fault Tolerance and Response Time 231
10.1. Business Continuity Management in the Cloud / 231
10.2. System Reliability, Human Factors and Cloud Computing / 234
10.3. Case Studies on Designing for Reliability / 237
10.4. The Concept of Fault Tolerance in Cloud Computing / 241
10.5. With the Cloud, Response Time Is More Important Than Ever Before / 244
10.6. Improving the Availability of Cloud Services / 246
10.7. The Premium for Lifecycle Maintainability / 250

11. Open Source Software and On-Demand Services 255
11.1. The Advent of Open Source Software / 255
11.2. An Era of Partnerships in onDemand Software / 258
11.3. Frameworks, Platforms and the New Programming Culture / 261
11.4. Finding Better Ways to Build IT Services / 264
11.5. The Case of Software Dependability / 268
11.6. Auditing the Conversion to Software as a Service / 271
11.7. Software Piracy Might Enlarge the Open Source’s Footprint / 274

12. Leadership in Logistics 277
12.1. Logistics Defined / 277
12.2. Customer Relationship Management / 280
12.3. Enterprise Resource Planning / 283
12.4. Wal-Mart. A Case Study in Supply Chain Management / 286
12.5. Just in Time Inventories / 289
12.6. Machine-to-Machine and RFID Communications / 294
12.7. Challenges Presented by Organization and Commercial Vision / 296
13. High Technology for Private Banking and Asset Management 301
13.1. Cloud Software for Private Banking / 301
13.2. Leadership Is Based on Fundamentals / 304
13.3. Cloud Software For Asset Management / 308
13.4. Cloud Technology Can Improve Fund Management / 311
13.5. Criteria for Success in Asset Management Technology / 313
13.6. Functionality Specifics Prized by the Experts / 316
13.7. Institutional Investors, High Net Worth Individuals and the Cloud / 320


Availability
#
Perpustakaan Poltek SSN (Rak 000) 004.6782 CHO c
b0000595
Available - Available
Detail Information
Series Title
--
Call Number
004.6782 CHO c
Publisher
Florida : Taylor & Francis Group., 2011
Collation
xiii, 340 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9781439834534
Classification
004.6782
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Internet
Network services
Cloud computing
Web services
Specific Detail Info
--
Statement of Responsibility
Dimitri N. Chorafas
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?