Find all about S.I

mardi 21 mai 2013

Cost effectiveness of commercial computing clouds


This paper presents the procedure for comparing costs of leasing IT resources in a commercial computing cloud against those incurred in using on-premise resources. The procedure starts with calculating the number of computers as depending on parameters that describe application's features and execution conditions. By measuring required execution time for different parameter values, we determined that this dependence is a second-order polynomial. Polynomial coefficients were calculated by processing the results of fractional factorial design. On that basis we calculated costs of computing and storage resources required for the application to run. The same calculation model can be applied to both a personal user and a cloud provider. The results will differ because of different hardware exploitation levels and the economy of scale effects. Such calculation enables cloud providers to determine marginal costs in their services' price, and allows users to calculate costs they would incur by executing the same application using their own resources.
Leasing in cloud establishes a business relationship: buyer wants to reduce costs, and cloud provider wants to generate profit. This relationship will be realized if the buyer and the provider agree on a mutually acceptable fair price that can be determined by the symmetric mediation plan.
All the steps in this procedure are integrated into CCCE method and represented as a process model.

Highlights

► Commercial cloud computing cost benefit analysis is presented. ► The methodology considers cloud parameters and gives timeframe for the return of investment. ► Cloud execution time is approximated by second-order polynomial. ► The fair price is given in the context of symmetric mediation plan from game theory.

Keywords

  • Cloud computing
  • Cost effectiveness
  • Fractional factorial design
  • Symmetric mediation plan

Dynamic Services for Infrastructure Computing power at the push of a button


Time and again, companies  need to increase their computing power for test and development projects, training purposes or to meet peak loads. Companies can book and cancel extra capacity from the cloud as needed.
Companies used to have to set up their computing and storage capacities at a maximum right from the start or be able to quickly increase those capacities. That is expensive since it also involves costs for operation, maintenance and updates. IDC and Forrester calculate that energy costs per 1,000 servers add up to € 270.000 per year, for example. What's more, test and development projects are costly in terms of funding and personnel and require companies to modify their corporate structures.
With Dynamic Services for Infrastructure (DSI), T-Systems offers large enterprises computing and storage capacities from a private cloud as infrastructure as a service (IaaS). Customers can use a self-service portal to configure the virtual servers they need themselves, to adjust the number of resources at any time and to manage users and user rights. They only pay for capacities they actually use. Cloud resources are connected to the intranet via a dedicated, secure MPLS connection, which guarantees high availability.

ARE FINANCIAL INSTITUTIONS READY FOR CLOUD COMPUTING?


The rapid growth in the availability and sophistication of cloud computing services — on-demand, scalable information technology services provided over the internet — presents significant opportunities for cloud computing hosts and users alike. For potential users, cloud computing can offer a number of important benefits, including very significant cost savings and operational efficiencies, flexibility in deployment, ready access to systems, applications and data, better backup services, and faster and more responsive upgrade functionalities. Potential hosts such as major IT service providers correctly see significant business opportunities in cloud computing, whereas potential users of cloud services recognize the cost efficiencies and technological and business flexibility offered by potential cloud solutions. As a result, the interest in, and demand for, cloud computing services has increased dramatically over the past several years. IT industry surveys point to the likelihood of a continuing significant migration away from “hard” IT platforms towards internet based services as a solution for hardware, infrastructure and software needs alike.1
Financial services firms (e.g., banks, securities firms, asset managers and insurance companies) are among the business organizations that see significant potential benefits in cloud-based systems. Many banking and other financial services firms are closely examining cloud-based IT solutions, and several major technology services providers (TSPs) are creating cloud computing systems that are aimed at financial services firms.2 For regulated firms such as banks, investment banks and money managers who may be tempted to move all or part of their IT infrastructure into the cloud, however, there are significant legal and regulatory challenges that they must consider and resolve before they do so. In turn, the issue that financial firms face today is whether the state of cloud computing has developed to a point where these challenges can be cost-efficiently and successfully addressed.
Cloud computing is an IT delivery model that covers a number of business/IT processes and activities, and the issues that financial firms may encounter will be affected by the nature and scope of cloud computing activities that are being contemplated. Through cloud computing services, users, including financial institutions, can effectively outsource all or part of their IT hardware architecture (infrastructure as a service, or IaaS), operating systems and platforms (platform as a service, or PaaS), or software applications (software as a service, or SaaS) as they individually choose. Further, financial institutions may choose from various methods in which these services may be delivered: Public clouds, where the IT services are delivered in a pure utility style to multiple customers using completely non-customized materials, methods and processes; private clouds, where such services are highly customized for one or a small number of customers using selected materials, methods and processes; and hybrid clouds, which is a combination of the two.
Because the choices are so individualized, the challenges and solutions that financial institutions face will vary significantly across the range of financial institutions. Thus, a small U.S. community bank that is thinking about outsourcing its IT infrastructure, systems and applications to a third-party web services host that offers multi-tenant cloud computing services will encounter challenges that can in many significant ways be quite different than those faced by a global financial services firm that is thinking about loading core customer or financial management systems into a private cloud.

FINANCIAL SERVICES LEGAL, REGULATORY LANDSCAPE

Regulated financial firms that have spent any substantial time thinking about cloud computing implementation issues have quickly recognized several key concerns that must be addressed before cloud computing becomes a viable solution, including data privacy, data and systems security, business continuity and contingency planning, and liability/risk management concerns. Adding concerns over regulatory oversight of cloud computing activities to the list of issues makes “going into the cloud” a complex undertaking.
Authoritative financial regulatory guidance on cloud computing activities for regulated financial firms is still somewhat sparse but is developing. In general, there is substantial regulatory guidance on financial firm third-party technology outsourcing activities,3 and the financial regulatory agencies have indicated that they will apply to cloud computing activities the same regulatory requirements and standards that apply to IT outsourcing activities in general. To this end, earlier this summer the Federal Financial Institutions Examination Council (FFIEC) issued a joint interagency statement (Cloud Statement) on the use by financial institutions of outsourced cloud computing services, and the key risks associated with such services.4 The Cloud Statement, the substance of which is also being incorporated into the FFIEC’s IT Handbook,5 is the first formal federal financial agency statement on the matter of cloud computing.
The Federal banking agencies — the Office of the Comptroller of the Currency (OCC); the Federal Reserve Board; and the Federal Deposit Insurance Corporation (FDIC) — have been explicit about their expectations when a regulated banking organization chooses to outsource technology services to a third-party TSP. Federal securities regulators and self-regulators for the most part also have issued guidance for regulated securities firms that is substantively similar, albeit less detailed, than the guidance provided by the banking regulars, although securities regulators have limited the authority of securities firms to outsource functions and services that would require registration or qualification of the TSP under the Federal securities laws.6 Because the banking agencies’ guidance on TSP outsourcing activities is most specific, however, a summary of banking agency expectations is instructive.
In general, the banking agencies’ major expectations on IT outsourcing activities include the following core elements:
  • Effective oversight and risk management of IT outsourcing arrangements. The board of directors and executive management of a financial institution are expected to establish and approve, and assure compliance with, risk-based policies that govern the IT outsourcing process. These policies must recognize the risks to the financial institution of its outsourcing relationships and be appropriate for the size and complexity of the financial institution. This expectation is fully consistent with general financial regulatory agency expectations that the board of directors and senior management of a financial institution have ultimate legal responsibility for the condition and operations of the financial institution.
  • Risk assessment and requirements. The financial institution, under the oversight of management, is expected to assess the risks from outsourcing, reduce this assessment to suitable written policies, and use these written policies to govern the outsourcing process. Risk identification includes identifying the nature and quantity of relevant risks, taking into account the functions and activities to be outsourced, and from there developing definitions of business requirements that will govern the selection of a TSP, the outsourcing standards and requirements of the financial institution, and the controls that will be needed to manage the risks in question.
  • Service provider selection. A financial institution must evaluate TSP proposals in light of the institution’s needs, and conduct a suitable due diligence on prospective TSPs.7
  • Contract issues. A financial institution’s outsourcing arrangements must be memorialized in a written agreement that, among other things, (i) defines the parties’ rights and responsibilities, (ii) contains adequate and measurable service level agreements (SLAs), (iii) is properly priced, taking into account the financial institution’s needs, (iv) does not contain inappropriate or unsafe inducements for the financial institution, and (v) is reviewed by competent legal counsel.
  • Ongoing monitoring. Financial institution management is expected to monitor the performance of the service provider during the life of the contract, taking into account changes in the financial institution’s needs that may occur during the contract period. Proper monitoring will include (i) key SLAs, (ii) the vendor’s financial condition and capacity to perform its obligations, (iii) verification through appropriate audit reports and other internal control reviews, of the vendor’s control environment, and (iv) the financial institution’s and vendor’s ability to address and respond to changes in the external environment affecting the outsourcing arrangements.8

The basic principles underlying these standards and requirements are relatively straightforward, and stem from the fundamental proposition that the management of a regulated financial institution is risk-based, as is the regulatory agencies’ regulation and supervision of financial institutions under their regulatory jurisdictions. Accordingly, the risk management principles and expectations of the financial regulators that apply to the activities and supervision of regulated financial institutions in general will apply equally to technology based-activities and services, and their regulatory oversight, whether they are cloud-based or not.
From the regulatory perspective, the risks associated with technology outsourcing arrangements fall into the following principal categories:
  • Operational (or transaction) risk, or the risk to earnings or capital arising from problems with service or product delivery.
  • Legal/compliance risk, or the risk to earnings or capital arising from violations of laws, rules, or regulations, or from nonconformance with internal policies and procedures or ethical standards.
  • Strategic risk, or the risk to earnings or capital arising from adverse business decisions or improper implementation of those decisions.
  • Reputation risk, or the risk to earnings or capital arising from negative public opinion of a financial institution.
  • Credit risk, or the risk to earnings or capital arising from an obligor’s failure to meet the terms of any contract with the bank or otherwise to perform as agreed.9

Of the categories of risk summarized above, the regulatory literature that applies to technology outsourcing activities tends to focus most specifically on operational and compliance risk. In the case of operational risk, regulators tend to focus on operational risks arising from (i) the nature and scope (criticality of service, sensitivity of data, volume of transactions outsourced) of the financial institution functions and services that are outsourced, (ii) the service provider (technological platforms used, financial condition and stability, experience with services being outsourced, reporting and MIS capabilities, business continuity capabilities, etc.) and (iii) the type of technology used in performing the services (reliability, scalability, security). By the same token, compliance risk tends to center around data security, privacy and integrity issues, as well as the TSP’s ability and/or willingness to comply, and assist the financial institution in complying, with legal and regulatory standards applicable to the financial institution. In this regard, compliance with financial privacy and data protection requirements under the Federal banking laws10 ranks very high on the list of financial regulators’ compliance risk concerns. In addition, Federal regulators place substantial emphasis on their legal right under the Bank Service Company Act to examine or inspect a TSP’s activities performed on behalf of the financial institution,11 and the TSP’s willingness to accommodate this regulatory oversight.12 Federal financial regulators will conduct formal reviews of TSPs, with enhanced review procedures used for Multi-Regional Data Processing Servicers (MDPS) that have technology services relationships with multiple financial institutions of a size and scope as to present possible systemic risks to the financial institutions community.13
In turn, the processes through which financial institutions are expected to manage these risks is through (i) the creation and enforcement of technology services risk management policies and procedures, (ii) effective due diligence of TSPs, (iii) execution of strong technology services agreements with suitable protections for the financial institution, and (iv) effective monitoring of TSP performance in light of the financial institution’s requirements and needs over the term of the contractual relationship.

CHALLENGES, SOLUTIONS IN ACCESSING THE CLOUD: COMING TO GRIPS WITH LEGAL, COMMERCIAL ISSUES

Cloud computing is nothing more — and nothing less — than the furnishing or procurement of IT services through a new delivery channel. Therefore, the risk management, compliance and liability reduction principles that apply to financial institutions’ technology services activities across the board logically apply with equal force to financial institutions’ cloud computing activities, regardless of the types of services or applications that financial institutions may want to access through the cloud, or the public, private or hybrid nature of the cloud platform that financial firms would seek to access.
In turn, the legal, regulatory and transactional issues for financial institutions looking at a cloud delivery model will largely be the same as is the case for financial institutions obtaining IT services utilizing more traditional models, but the technology and the commercial environment for the delivery of cloud-based services make the solutions to those issues in many cases quite different. What may also be different about cloud-based services are the utilitarian nature of the services being provided, and the level of operational and MIS control that a financial institution may have to cede to a TSP that provides cloud-based services to it. It might be entirely possible for a financial institution to close down its servers, operating systems and applications, and purchase its entire IT architecture over the internet, but doing so plainly presents risk management issues of a different level of importance.
Can the technology issues currently associated with the cloud environment be resolved in a way that financial institutions across the board can comfortably avail themselves of cloud delivery solutions? There are significant legal and regulatory issues that will challenge a financial institution’s efforts to avail itself of cloud service models, in particular public and hybrid models.
In prior publications on cloud computing activities, we have highlighted several major issues that are particularly associated with cloud computing activities, including privacy, data protection/integrity, and TSP negotiation issues, and how users of cloud services may need to approach these concerns.14 These issues are just as real, if not more so, for financial institution users of cloud services, given the developing state of cloud technology, and the strong regulatory requirements and expectations associated with risk management of financial institutions’ technology and business process outsourcing activities in general. In turn, the legal and regulatory environment in which financial institutions operate require a thoughtful and disciplined approach to the outsourcing of financial business processes “into the cloud.”
So what should that approach look like? It means, first of all, following the risk identification and management, due diligence, vendor selection and documentation processes summarized above, and covered in existing regulatory guidance. In this regard, the banking agencies’ Cloud Statement has highlighted several areas that the agencies believe are of particular interest for banking organizations that are users of third-party cloud computing services, including: (i) due diligence of cloud IT vendors; (ii) management of cloud IT vendors; (iii) auditing the vendor and its delivery of services; (iv) information security; (v) legal, regulatory and reputational risks; and (vi) business continuity planning. Those financial institutions that are familiar with the Agencies’ existing IT guidance on outsourcing in general will find nothing new in these broad areas, but the Statement does highlight a number of specific issues that arise in the cloud IT environment.
Taking into account these various considerations, we offer some observations on the preferred path forward for financial institutions that are considering the acquisition of cloud-based IT services.
1. Develop a strong understanding of the business and legal risks specifically associated with cloud IT services. By IT industry standards, cloud-based services are still relatively new, although they are evolving and expanding very rapidly. In some respects, the nature of the key business risks associated with cloud computing – privacy of financial institution and financial institution customer information, security of cloud based data, business interruption/continuity issues – are really no different than they are traditional application or server-based IT systems, where these issues have long been just as real. But coming to grips and resolving these issues requires a solid understanding of the specific technological features, advantages and drawbacks of cloud-based technology platforms, and the risks specifically associated with these services.
What has probably slowed the expansion of cloud-based services in the financial institutions community more than anything else are financial institution concerns about compliance with the regulatory requirements that apply to privacy of financial customer information, and the integrity and protection of that information. These requirements are relatively rigorous, and financial institutions cannot simply negotiate them away, as the Cloud Statement makes clear. At this time, TSP vendors in general may not have made the necessary strides in cloud technology development, or have not acquired a suitable appreciation of the demands that financial institutions face in this regard, to respond effectively to these core privacy and data protection concerns, although recent press reports suggest that some vendors are focusing specifically on these issues and attempting to offer solutions to them.15
  • Financial privacy issues. Regulated financial institutions across the board are subject to Federal and state financial privacy requirements that generally require the protection of customers’ personal financial information, and limit the ability of financial institutions to share that information with third parties. While the Federal Gramm-Leach-Bliley Act and state laws generally will permit a financial institution to share customer information with a TSP provider in connection with the TSP providing services to the financial institution, in a cloud-based environment customer data may not be stored or retained at any specific location, or may be moved from one location to another by the TSP. In turn, the particular regulatory requirements applicable to a financial institution’s customer data may be affected by where that data is stored. Moreover, the regulatory complications that may arise from where data is stored may become more complicated if that data can be stored outside of the United States, especially in a region such as the European Union, which has strict privacy and data protection regulatory regimens.

Financial institutions contemplating the acquisition of cloud-based services that include customer information therefore must address the impact of the cloud delivery model on their financial privacy obligations. One possible way to do is to negotiate geographic limitations on where the TSP may store customer data, or obtain appropriate assurances that the TSP will comply with legal restrictions applicable to the financial institution with respect to its customer data. Obtaining these vendor commitments and assurances, however, may be easier said than done, because many cloud service providers thus far have been reluctant to agree to terms and conditions that sufficiently address these concerns.
  • Customer data protection issues. Federal law (again, the Gramm-Leach Bliley Act) requires financial institutions to adopt and implement measures that are reasonably designed to protect the integrity of, and safeguard, their customer data. In turn, current supervisory policies require regulated banking organizations and other financial institutions to take affirmative action to remedy breaches of data security, including notifications of customers affected by data breaches. The laws of almost every state have similar requirements, with the difference being that state laws often specifically require customer notification in the case of data breaches.

Cloud-based IT services are equally subject to these requirements, with the practical difference being that, in the case of cloud-based IT services, a financial institution’s customer data may be housed in one or more remote locations, and may be able to move more freely across state lines or other jurisdictional boundaries. But if there is a breach of customer data security in the TSP’s cloud, it doesn’t matter whether the breach occurred in Portland, ME or Portland, OR, because the financial institution probably will have notification and other remedial obligations to its customers.
In part due to concerns such as these, a number of financial institutions may elect to limit their acquisition to cloud-based services to those services that do not relate to customers’ personal financial data, or may see if they can obtain an agreement from a TSP to identify specific locations where cloud-based data will be maintained. But getting that agreement, as noted above, may be difficult to achieve. At the same time, regulatory expectations in this area are quite explicit, in that financial institutions are expected to adapt their information security policies, standards, and practices to incorporate the activities related to a cloud TSP. In this regard, specific information security measures such as continuous monitoring of high-risk situations, maintenance of comprehensive data inventories, the implementation of a suitable data classification process, and limiting access to customer data through effective identity and access management (particularly in public cloud environments), are key information security measures from the regulatory perspective.16
  • Business continuity issues. One of the key risks associated with any IT services is the risk of service interruption. This issue is no less important for cloud-based IT services, and unlike issues associated with privacy and data breach, business continuity risks are not limited to services involving customers’ personal financial information. And, the risk of service interruptions may give financial institutions further pause about procuring cloud-based IT services, especially services that are core or “mission critical” to the financial institution.

Are cloud-based operating environments more susceptible to interruptions of services? The answer to this question currently may be inconclusive, but what may differ is the degree to which a service interruption may impact multiple organizations and affect the service restoration priority given to the financial institution — especially in the case of large providers of public cloud financial IT services — and the need to ensure the presence of cloud-specific response strategies and backup environments. These are important questions that financial institutions need to address early in the procurement process and for which a financial institution will absolutely need to have satisfactory answers. For example, a financial institution may need to arrange for independent backup data storage capabilities to protect against a wholesale loss of data in the event its cloud services “go dark.”
2. Know what you are buying. Understanding the features of cloud-based services also means understanding, and consciously deciding upon, the types of cloud services the financial institution is buying. A public (multi-tenant) cloud platform has definite advantages in terms of cost and conservation of financial institution resources, as well as ready access to scalable services. A public cloud, however, may deprive the financial institution of flexibility and corporate leverage in its efforts to negotiate the types of services and data, business continuity and liability protections that it needs. By the same token, flexibility and leverage, and the ability to protect data and business processes, may be more available in a hybrid or private cloud environment, but almost certainly will entail higher costs for the financial institution.
Similarly, a financial institution’s business needs will influence the types of cloud services a financial institution acquires: infrastructure, systems or applications. There naturally are significant differences in these services, and it is important that the financial institution take steps to assure that its business needs align properly with the types of services a TSP is able and willing to offer.
3. Your regulators will want to fly inside the cloud. One basic regulatory requirement for financial institutions that purchase any IT services from a TSP is the right of the financial institution’s primary regulator to examine and supervise the provision of those services. This supervision right includes the regulator’s right, under the Bank Service Company Act and other regulatory requirements, to inspect and audit the TSP’s activities and systems, and the level of risk that a TSP may pose to those financial institutions with which it does business.
In the realm of cloud computing services, this access right will be just as, if not more, important for financial institution regulatory agencies, especially if the delivery of cloud-based IT services becomes concentrated among a small number of large TSPs that each do business with hundreds of financial institution clients, and where the IT infrastructure and risk management systems of a single TSP may become a priority risk management issue for the financial regulatory agencies. Accordingly, a financial institution that wants to purchase cloud-based IT services will need to assure that its TSP understands and is willing to comply with these regulatory requirements. Similarly, a financial institution’s right to audit cloud services, or request adequate assurances of the integrity of a TSP’s internal controls environment, is another important consideration that a cloud services purchaser must address at the inception of an IT cloud services relationship. Audit rights, in particular, may be a challenge for a technology model such as the cloud platform, where financial data may be dispersed among various locations, and moved from location to location.
On top of these access requirements may be regulatory requirements — e.g., such as those imposed by FINRA on its member firms — that require financial institutions to formally oversee or supervise certain activities being performed on their behalf.17 Being able to do so in a cloud-based IT environment may be more challenging, and is an issue that financial institutions need to explore with their TSPs at the outset of an IT services relationship.
4. Kick the tires before entering the cloud. What the foregoing considerations mean, in large part, is that financial institutions need to identify and resolve at an early stage the various legal, regulatory and risk mitigation issues embedded in a cloud-base IT relationship. This is a process that must be completed at the outset of a TSP relationship, not while the financial institution is well into the relationship. In turn, this requires a thoughtful, well-organized due diligence process that will assure not only that the right questions get asked, but also that any prospective TSP is able to answer these questions to the financial institution’s satisfaction. In other words, the financial institution will want to know if the TSP will be able to provide the level of service and support that the financial institution requires to satisfy its risk mitigation and regulatory responsibilities to the financial institution’s and its regulator’s satisfaction. In this regard, the Cloud Statement highlights several particular areas that the bank regulators want a financial institution to address during the due diligence process, including (i) data classification, (ii) data segregation and (iii) data recovery.
5. Your TSP agreement is the foundation for a good cloud solution, but can you get the terms that you need? A financial institution that enters into a cloud IT services relationship not only must understand the relevant technology and associated legal and regulatory issues, but also the commercial and regulatory objectives and risks of a particular TSP relationship. In turn, the financial institution must select its TSP and negotiate its agreement with its objectives and risks firmly in mind.
A financial institution is best-positioned to protect its commercial and regulatory interests through the negotiation of a sound and enforceable technology services agreement that affords it adequate risk and liability protections, assurances of suitable service levels standards and performance, and sufficient and timely remedies if things go wrong with the TSP relationship. Current experience, however, suggest that many public and hybrid cloud system TSPs have not reached the point of fully accommodating the particular business and regulatory obligations of highly-regulated financial institutions. In most TSP relationships, vendor terms and conditions are apt to be tilted in favor of the vendor on core matters (including service levels, business continuity responsibilities, rights of termination without cause, remedies for damages, and limitations on indemnifications). Vendors also will offer up standardized forms of agreements where their willingness to negotiate institution-specific terms and conditions may be relatively low. In turn, many financial institutions may lack the size or economic clout to negotiate terms that fully satisfy their commercial and legal/regulatory risk tolerances.
This vendor landscape, however, may change as regulatory expectations make plain that cloud technology vendors must be prepared to adapt to the regulatory environment in which financial institutions operate. For example, the Cloud Statement says that banking organization contracts with cloud IT service providers should address the parties’ obligations with respect to compliance with privacy laws, for responding to and reporting about security incidents, and for fulfilling regulatory requirements to notify customers and regulators of any breaches.
To sum up, at least in the short term the financial institution market for broad-scale cloud IT services may be limited primarily to those financial institutions that are prepared to purchase a highly-customized but significantly more expensive private or semi-private cloud platform. But cloud technology offers the promise of very significant economies, and ready access to a wide array of on-demand IT services, that are strongly attractive to the financial institution community, and there are some indications that the TSP community may be waking up to the need to adapt their products and services to the demands of their regulated financial institution clients. Therefore, vendors that are able to focus on the needs and requirements of this highly promising client community will find themselves the winners in bidding for and obtaining this community’s business.
Charles Horn is a regulatory and transactional attorney whose practice focuses primarily on banking and financial services matters. Mr. Horn represents domestic and global financial services firms of all sizes on regulatory and transactional issues affecting their organization, structure, governance, management and operations. In addition, he provides regulatory counseling to banks and other financial services firms relative to federal and state financial regulation, supervision, and compliance matters affecting their corporate, institutional, wealth/asset management, and retail business activities.
Chris Ford is the Chair of Morrison & Foerster’s firm wide Global Sourcing Group. His practice focuses on advising customers on the full life cycle of their complex information technology and business process outsourcing transactions. Mr. Ford also advises large clients on joint ventures, telecommunications, technology procurement and sophisticated licensing transactions, as well as Enterprise Resource Planning and other systems integration projects.

Cloud Information Systems: What is "The Cloud"?


Some background to what "The Cloud" is....

Cloud computing covers many facets and means different things to different people. Maybe the quickest way to learn more is to provide a Glossary of Terms so we can at least use the same phrases! One of the challengers being faced by suppliers in the sector is that there isn't a single published standard for Cloud Computing.
Types of Cloud

There are generally acknowledged to be three primary types of Cloud:
Public Cloud

This is the delivery of applications and information through externally hosted systems via the Internet.
Private Cloud

Virtualization vendors are now hyping their product offering as a Private Cloud. Therefore a Private Cloud is usually thought of as physical servers that are within the company's network architecture.
Hybrid Cloud
A mixture of both public and private cloud-based solutions.
Components of a Cloud-based Information System
  • Hardware - Platform As a Service
  • Network - Infrastructure As a Service
  • Application - Software As a Service

Cloud Architecture

lundi 20 mai 2013

Financial Markets with Information Systems

The course aims to provide advanced instruction and training in financial markets and instruments, financial engineering, and in the techniques and methodologies of information systems design and prototyping. The taught modules provide in-depth knowledge of the theoretical and applied aspects of the subject matter. The dissertation introduces participants to alternative research strategies and methodological issues, and provides training in the management and reporting of a research project in the area of finance and the relevant computing application.

Careers
The course will be particularly useful to recent graduates seeking careers in, or already employed in, the design and specification of information systems as applied to derivatives trading, finance, financial risk management, and treasury departments of national and international corporations. Existing systems designers who wish to move further towards activity in the financial markets will also find the course of interest.

Information Systems for Global Financial Markets: Emerging Developments and Effects


Description

Financial markets around the world can affect each other in a matter of seconds as financial information systems are programmed to buy or sell stocks and financial derivatives automatically when activated by sudden changes in global market trends and conditions.
Information Systems for Global Financial Markets: Emerging Developments and Effects offers focused research on the systems and technologies that provide intelligence and expertise to traders and investors and facilitate the agile ordering processes, networking, and regulation of global financial electronic markets. How these systems work to manipulate, move, and provide intelligence to the stock market is still a mystery to many students, and it is the intent of this book to provide real-world cases and examples that can unveil these systems to business students interested in financial trading, the dynamics of financial electronic markets, and the tactical technologies that facilitate the trading process and trading decisions.
Information Systems for Global Financial Markets: Emerging Developments and Effects

Enterprise Cloud 101

Takeaway: Enterprise cloud computing brings a lot of advantages to a business, but a lot of research and planning is required to make it work well.
Enterprise Cloud 101
Source: Flickr/Dell Official Flickr Page
There are many different definitions of what the enterprise cloud really means and how it benefits an enterprise. In fact, what makes up an enterprise cloud can be as disparate and varied as enterprises themselves. Not to mention the fact that many service providers and vendors tend to distort their own definitions of the enterprise cloud to encompass the services they provide. Here we'll take a look at enterprise cloud computing and try to nail down a definition.

Cloud Computing in the Enterprise

First, let's take a look at cloud computing. The United States National Institute of Standards and Technology has come up with what is probably the best definition of cloud computing, which is a model that enables convenient, ubiquitous and on-demand network access to a collective pool of computing resources. That pool is configurable, including servers, storage, networks, services and applications. These resources may be released and appropriated with minimal service provider interaction or management effort.

So, in effect, cloud computing allows an enterprise to access IT resources easily, anywhere and anytime with minimal need for supervision or oversight. Enterprise cloud is a way of deploying cloud computing for businesses, and allowing them to take advantage of the cost savings and other benefits of cloud computing. (For some background reading, check out Cloud Computing: Why the Buzz?)

What Enterprise Cloud Computing Can Do

Enterprise cloud computing allows a business to benefit from cloud computing while appealing to the specific needs of an enterprise, such as cost reduction, efficiency and collaboration. Its key benefits include:

  • It helps companies to cut down on costs by reducing the need for hardware as well as tying costs directly to services used.
  • Because there is no need for upfront investment, business owners can be emboldened to try out new ideas and see what works for them. Unlike hardware-based solutions, cloud setups are also easy to switch to a new provider or shut down entirely.
  • Cloud computing can help companies collaborate with suppliers, trading partners, knowledge partners and other affiliated businesses, as well as help employees work together more effectively and efficiently.

What Are the Types of Cloud Computing Businesses Can Use?

Cloud computing can be classified in two ways. The first involves the location of the cloud computing infrastructure, such as:

  • Public Cloud Computing
    This is when resources such as storage and applications are provided to the general public for a fee or for free. Enterprises are generally powerless, in terms of controlling where the behind-the-scenes infrastructure is hosted, and they usually share the infrastructure with other businesses. Examples of public cloud services include Google Docs, Dropbox, IBM's Blue Cloud and Amazon Elastic Compute Cloud.

  • Private Cloud Computing
    Private cloud computing is when a business has a dedicated computing structure for its exclusive use. It may be hosted on-site or with a third party. Similarly, it may be managed by the organization itself or another organization. Private cloud computing is generally much more expensive than public cloud computing but it is also more secure.

  • Hybrid Cloud Computing
    Because of the tradeoff between cost and security, many organizations are moving toward hybrid cloud computing services. This is when enterprises use both private and public clouds. Usually, applications that are critical to operations or that contain sensitive data are run on a private cloud, while less important processes and services are on the public cloud.

  • Community Cloud Computing
    There is a fourth type of cloud computing, community cloud computing, where the computing infrastructure is shared between two enterprises or institutions that belong to the same community. For example, universities often share computing infrastructure with a nearby school..
Another way to classify cloud computing is by services provided. In this sense, there are three main types:

  • Infrastructure as a Service (IaaS)
    IaaS offers hardware-related services on the cloud. This includes storage services or the provision of virtual servers similar to those provided by Flexiscale, Amazon and Rackspace Cloud Servers.

  • Platform as a Service (PaaS)
    PaaS provides a solution stack and computing platform for the enterprise. Basically, the enterprise creates software using the service provider's libraries or tools. The provider is also responsible for the network, storage and servers.

  • Software as a Service
    SaaS providers offer complete software solutions on the cloud. These services include things like online customer relationship management software, or even Web mail.

Concerns and Challenges for the Enterprise Cloud

Just imagine having your website down for an hour or longer, or perhaps not being able to do any work for an extended period. These are problems that can plague cloud-operated systems. It isn't that this doesn't happen in other systems too, but the problem can be magnified for companies that rely on cloud services; it may be magnified even more when many large companies rely on the same cloud service provider. Just like an technology solution, cloud computing isn't without its drawbacks. Here are the key challenges:

  • Cost
    While reducing costs is one of the most attractive features of enterprise cloud computing, finding the right balance between services and cost is a prime concern. As you can imagine, a company needs to give up a degree of control over IT resources to get the most cost-effective cloud services. This is clearly illustrated when opting for a private cloud.

  • Security
    By putting data, information and other sensitive material out on the cloud, companies essentially lose a bit of control over them. As such, companies need to know how to maintain data security. In public or hybrid clouds, this is compounded by the fact that the data is being hosted on the same servers as data from other companies. That means that even if a hacking attack is targeted at one company, it could affect all the companies hosted on the same server. This makes the security record of a potential enterprise cloud provider essential. Does the company have the latest security applications, data loss prevention measures and encrypted file systems? Does it have better security software and hardware in place than other providers? (Read more about some of the cloud's security problems in The Dark Side of the Cloud.)

  • The Lock-In Period
    Cloud providers often require a lock-in period to help them recoup their costs, but this also prevents clients being able to transfer to a better or more cost-effective provider if one becomes available. In a sense, a company can become married to the provider it chooses. For example, it may be less expensive to purchase add-ons to for the platform already being used (from the same provider) than to find another service provider to fulfill the company's operational requirements.

  • Budget
    Remember that enterprise cloud allows companies to access the services they need when they need them. However, that also means that it can be very difficult to pinpoint exactly what quantities will be required and how much they will cost. This makes it very difficult to set a budget - and stick to it.

  • Continuity
    Finally, what happens when a cloud service provider is acquired by another company, or suffers an attack? Again, because information out of the cloud is somewhat out of a company's control, the company may also have less control over what happens to it in extraordinary circumstances.
Enterprise cloud computing brings a lot of advantages to a business, but as with any business decision, a lot of research and planning is required to make it work well. The first step is understanding what the cloud has to offer and comparing it against a company's operational needs.

Information Systems Security

As world leader in Information and Communication Systems Security, Thales holds a unique position with an end-to-end security offering. Spanning the entire value chain in the security domain, Thales's offering includes risk analysis consulting, security architecture design, security and encryption product development, evaluation and certification preparation and through-life management services.
Thales has forty years of unrivalled track record in protecting information from Sensitive But Unclassified up to Top Secret and a comprehensive portfolio of security products and services, which includes network security products, application security products and secured telephony products.
The following chart presents the features of the security product range.This chart presents the features of the security product range.

What is Information Systems Management (ISM)?

Studying at E2
Information Systems Management (ISM) is the application of information technology to support the major functions and activities of either a private sector business or public sector institution. In the past, organizations recognized the importance of managing resources such as labor, capital, and raw materials. Today, it is widely accepted that managing the information resource is very often equally important. ISM supports the process of collection, manipulation, storage, distribution and utilization of an organization's information resources.
The Information Systems Management undergraduate major is a multi-disciplinary major that focuses on the fusion of information systems, technology, and business management for two purposes: the use of information systems to solve business problems and the management of technology, which includes new product development and enterprise management.
The vast majority of information systems are developed for and used by people in functional areas (e.g., manufacturing, human resources, accounting, finance and marketing). To develop information systems that address the needs of the organization, ISM professionals must possess a solid mix of business and technical knowledge. They must understand organizational structures, objectives, operations (including processes and the flows of data between processes) and the financial implications related to these factors. Only by understanding these factors can an ISM professional communicate effectively with users and then design systems that support their needs.
ISM managers and professionals must stay up-to-date with evolving information technologies and have a solid foundation of technical skills to select appropriate technologies and to implement computer-based information systems. Thus, ISM people must be well versed in topics such as systems development tools and techniques, information architecture, network configurations, databases, and systems integration.

The ISM Program of Study

The ISM program combines the fundamental intellectual content of both Computer Science and Business Management Economics. It will be a rigorous, challenging major for those students that want to pursue a career of solving business problems through the use of information technology. The ISM program is structured to enable students to accomplish this. To do so, they must gain the math and science fundamentals of computer science and an understanding of the environment in which information technology (IT) solutions will be applied through economics and business courses.
It is the integration of the two disciplines of Computer Science and Business Management Economics that is the essence of the ISM program. This also adds to the challenge of successfully completing the requirements of the major. ISM is a timely topic and the current demand for students is strong. The long term demand for students with these skills will continue to grow. An increasingly larger number of companies and institutions have concluded that their daily operations have an indispensable reliance on computer-based systems.

We Have Moved to the Cloud

Takeaway: Any new technology faces challenges, but the increasing pace of innovation suggests that those that face cloud computing can be solved in short order.
It
Source: Flickr/mansikka
Cloud computing is both a new and exciting way of using our technological resources in the most efficient way possible and a reminder that all innovation usually brings a downside - and one that must be planned for and dealt with in the least disruptive way possible.

"My data’s now stored in 'the cloud,’ right?"

"Yes - but do you really understand what that means?"

"Yes. ... No ... It’s 'up there’ some place, right? Is 'the cloud’ a real place or is it an imaginary one?"

"Yes!"


.. and therein lies the tale.

Computers process data and turn it into information. They must store the data/information that they process/create someplace. One of the first technological leaps with large computer systems was changing the method of input from punch cards to keyboard terminals. We called the large computers mainframes, and they stored the data on magnetic tape, large disks and drums. Users used the keyboard terminals for input and to view and analyze the data.

When personal computers arrived in the late 1970s and early '80s, they acted as little mainframes, doing all the processing and storing of data locally. They first used cassette tape as a storage medium, then removable floppy diskettes, which held between 140,000 and 320,000 characters. Finally, large hard disk drives arrived, and grew from early small capacities of around 1 million characters (10 MB) through to many billions of characters (500 GB) to multiple trillions of characters (2 TB). Storage has gotten bigger in capacity, smaller in physical size, and much, much cheaper.

Yet even with the breakthroughs in storage cost, capacity and size, there are still issues. We needed to share data with others; that led to networking and file servers, very high capacity disks that could be shared by groups. Businesses have dealt with these problems and today, they often use mainframes as their central servers.

What has, however, become a recent phenomena is multiple devices (desktop computer, laptop, tablet, smartphone) and users' desire to access data from all of their devices from anywhere. When there were only desktops and laptops, a user could carry around USB drives with reasonable certainty that they could be plugged into any computer and the information used.

There were, however, other approaches. One of the early services to store information on the Web was Hotmail, which was, at first, an independent operation and was then acquired by Microsoft. This service allowed users to keep their email processing online, rather than relying on programs such as Outlook or Eudora to bring mail from servers to local PCs. The Web-based service provided space for the storage of mail as well as mail-processing tools - and it was free. Yahoo Mail soon followed and, eventually, Google’s Gmail.

Announcement: We Have Moved to the Cloud

Yahoo added chat facilities and space to store photos. Other similar services emerges. And most of us didn’t stop to consider just where our mail actually was or where we were chatting. Without even knowing it, we had moved into the cloud! (Learn more about what that means in The 5 Ways Cloud Technology Will Change the IT Landscape.)

Google soon added other functionalities to its services, lumping word processing and spreadsheets (and later presentation software) under the umbrella of Google Docs (now Google Drive). The advent of smartphones and tablets added some urgency to the cloud movement, because these devices didn't provide a lot of options in terms of moving data. Apple’s iCloud, introduced in 2011, added elegance to the process automation and automatic uploading of predetermined files. Amazon entered the fray even earlier, starting its own cloud service in 2002. Even more recently, DropBox gained significant market share at a rapid pace.

A user could use any of these services at low or no cost. All of a sudden, we were all in the cloud, a fuzzy amorphous place that held our data in some unworldly digital corral - at least that’s how it is portrayed and how it feels to most of us.

The reality is that our data is stored on servers in massive data centers throughout the country, data centers maintained by Microsoft, Apple, Amazon, Google, and many others.

Where Things Get Cloudy

When we hear about the cloud, what we hear most are about its promise. It provides better interconnectivity and access, it's often less expensive for businesses and it requires much less hardware. But there are a few dark clouds on cloud computing's bright horizon too. The New York Times recently ran a two-part series pointing out environmental problems caused by the humongous data centers that make the cloud work. Writer James Glanz points to large-scale - and often wasteful - energy consumption and air pollution.

Of course, as pointed out in an InformationWeek rebuttal article by Charles Babcock, many of these difficulties are eliminated in new data centers with state-of-the-art energy management systems and more judicious use of diesel back-up power systems. Even so, this is not a problem that's been entirely resolved in all data centers.

For example, when Microsoft purchased a 75-acre site in Quincy, Washington, for a data center in 2006, the community saw it as a boon to the area, at least at first. But the bloom soon came off the rose and, as Glanz tells it, "the gee-whiz factor of such a prominent, high-tech neighbor wore off quickly." First, the community tackled the company about 40 giant diesel generators at the facility, which Microsoft had installed for backup power. Community members worried about their proximity to an elementary school.

Then, Microsoft went head-to-head with the local utility provider by proceeding to waste millions of watts of electricity in an effort to erase a $210,000 penalty it owed for overestimating its power use.

A Microsoft spokeswoman said the episode was "a one-time event that was quickly resolved," but the problems reveal a tug-of-war that's likely to continue as data centers get bigger and appear more place across the country.

The Pace of Change

Of course, any new technology faces challenges, and those around energy consumption and pollution seem like a bit of a throwback to the days of big factory manufacturing. Just as the resistance manufacturing faced was tamed by technological breakthroughs, the same is likely to happen in cloud computing. And, if the accelerating pace of innovation and change is any indicator, we won't have to wait nearly as long as we have in the past to see these problems resolved.

What is Information Systems Security (INFOSEC)

Definition - What does Information Systems Security (INFOSEC) mean?

Information systems security, more commonly referred to as INFOSEC, refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity.

It also refers to:

  • Access controls, which prevent unauthorized personnel from entering or accessing a system.
  • Protecting information no matter where that information is, i.e. in transit (such as in an email) or in a storage area.
  • The detection and remediation of security breaches, as well as documenting those events.

Techopedia explains Information Systems Security (INFOSEC)

Information systems security does not just deal with computer information, but also protecting data and information in all of its forms, such as telephone conversations.

Risk assessments must be performed to determine what information poses the biggest risk. For example, one system may have the most important information on it and therefore will need more security measures to maintain security. Business continuity planning and disaster recovery planning are other facets of an information systems security professional. This professional will plan for what could happen if a major business disruption occurs, but still allow business to continue as usual.

The term is often used in the context of the U.S. Navy, who defines INFOSEC as:

COMPUSEC + COMSEC + TEMPEST = INFOSEC

Where COMPUSEC is computer systems security, COMSEC is communications security, and TEMPEST is compromising emanations.

What is Financial Information System (FIS)

Definition - What does Financial Information System (FIS) mean?

A financial information system (FIS) accumulates and analyzes financial data used for optimal financial planning and forecasting decisions and outcomes. FIS is used in conjunction with a decision support system, and it helps a firm attain its financial objectives because they use a minimal amount of resources relative to a predetermined margin of safety. FIS can be thought of as a financial planner for electronic commerce that can also produce large amounts of market and financial data at once obtained from financial databases worldwide.

Techopedia explains Financial Information System (FIS)

Financial data analysis may be conducted through trend evaluations, ratio analyses and financial planning modeling. Data outputs that are produced by FIS can include operating and capital budgets, working capital reports, accounting reports and cash flow forecasts. The predictive analytics included in these applications may also narrow down exactly what could be expected from a business interaction or transaction that has yet to take place.

The management of financial information in an e-commerce business is paramount in order to gain maximum operating results in the shortest amount of time. An FIS can also yield huge amounts of data for daily business operations. Financial markets traders and salespeople have the greatest demand for FIS because they work in very fast environments and their on-demand computing systems must keep up with real-time activities in order to allow these professionals to operate in real time. Broker investigating, investment and trade data along with fiscal asset classes can be relayed through an FIS. This also works for smaller businesses that need to obtain financial data about local markets. FIS is a form of real-time operating system that works to enhance financial information exchanges.

Information Systems Specialist Salary

Average Information Systems Specialist salaries for job postings nationwide are 9% lower than average salaries for all job postings nationwide.

Jobs that may interest you

Ph.D. in Information Systems and Management

Information Systems (IS) encompasses the design, use, and evaluation of information and communication systems supported decision-making in business and policy settings. The doctoral program in information systems and management at Carnegie Mellon University's Heinz College prepares students with a firm understanding of the technical and organizational aspects of information systems and trains that with analytical tools to evaluate the challenges and opportunities of implementing information technology in a firm and policy setting.
The information systems program at Heinz College distinguishes itself from others in its interdisciplinary nature along with a strong emphasis on solving business and policy problems.

Research Areas

While our program is broad, some major areas of research are:
Economics and Information Systems: How information technologies and systems affect firm performances, market competition, and policy outcomes. Some major projects are examining the role of social media/networks, media piracy, digital distribution, broadband and mobile, and so on.

Some key faculty members working in this space are Vibhanshu Abhishek, Pedro Ferreira, Beibei Li, Ramayya Krishnan, Michael D Smith, and Rahul Telang. We have multiple research centers like IDEA, LARC and iLab for studying some of these issues.

Machine Learning and Large-Scale Data Analytics: Development and application of novel statistical and computational methods for data mining (including text and web mining), information retrieval, and pattern discovery in massive real-world datasets. These methods are applied to a variety of policy and management domains, including business analytics, health care/surveillance, social networks, crime prediction and many others. Some key faculty members working in this space are Jamie Callan, David Choi, Stephen Fienberg, Ramayya Krishnan, Daniel Neill, and Rema Padman.

Information Security and Privacy: Understanding users’ security and privacy decisions using economics, behavioral economics, data analytics framework. The faculty members are examining the models and data to understand the need for effectiveness of regulations and inform public policy. Alessandro Acquisti and Rahul Telang are key faculty members. This group also works closely with faculty from Cylab, an interdisciplinary research center.
Health Care and IT: The research is motivated by an important role of information technology in detecting outbreaks, providing superior quality of care at lower costs and in the prevention of adverse events. Some of the research examines the healthcare IT evaluations and adoption, IT-enabled healthcare decision making and event detection. Rema Padman, Daniel Neill, Marty Gaynor and Amelia Haviland are key faculty members.
Besides these areas we have many other faculty like Laura Dabbish and David Krackhardt who examine collaborating and organizing work through technology. This work is also supported by centers like Center for Future of Work.

Program Contact Information

Rahul Telang, Director
For information about applying to Heinz College, please contact Heinz College Admissions.
Download the Heinz College PhD Program Handbook (PDF) >>