Cloud Computing Rodney Petersen – EDUCAUSE Steven J

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Computing Rodney Petersen – EDUCAUSE Steven J Partly Cloudy? What a CBO Should Know about Cloud Computing Rodney Petersen – EDUCAUSE Steven J. McDonald –Rhode Island School of Design Alternative IT Sourcing Strategies The range of options institutions have for providing technology services or operating technology functions aside from doing these things themselves. It includes traditional outsourcing of all or part of the IT organization, accessing externally managed applications, development environments, or hardware via the Internet, and support from consortia (e.g., open source). Survey: IT Services Sourcing –November 2008 EDUCAUSE Center for Applied Research (ECAR) Sourcing IT in Higher Education College/Departmental Infrastructure Central IT Infrastructure Shared Higher Education Infrastructure Third Party Infrastructure Cloud Computing (Gartner) ". a style of computing where massively scaleable IT‐enabled capabilities are delivered 'as a service' to external customers using Internet technologies." Gartner, Inc. Cloud Computing (Berkeley) Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. The services themselves have long been referred to as Software as a Service (SaaS). The datacenter hardware and software is what we will call a Cloud. When a Cloud is made available in a pay‐as‐ you‐go manner to the general public, we call it a Public Cloud; the service being sold is Utility Computing. We use the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public. Thus, Cloud Computing is the sum of SaaS and Utility Computing, but does not include Private Clouds. Above the Clouds: A Berkeley View of Cloud Computing February 10, 2009 Software as a Service (SaaS) Delivery Platforms • Managed hosting – contracting with hosting provider to host or manage an infrastructure (IBM, OpSource) • Cloud computing –using an on‐demand cloud‐based infrastructure to deploy an infrastructure or applications (Amazon Elastic Cloud) Development Platforms • Cloud computing –using an on‐demand cloud based development environment to provide a general purpose programming language (Bungee Labs, Coghead) Application‐led Platforms • SaaS applications –using platforms of popular SaaS applications to develop and deploy application (Salesforce.com, NetSuite, Cisco‐Webex)2 Cloud Computing in Higher Education Richard Katz, Phil Goldstein, and Ron Yanosky Why Cloud Computing is Appealing Cost Consumerization of IT Scalability and availability of services Sustainability or green IT Enabling the Cloud Economic Value Full connectivity Open Access Reliability Security Privacy Interoperability and User Choice Sustainability Envisioning the Cloud: The Next Computing Paradigm Marketspace Point of View (March 20, 2009) Public Policy "If, as argued, cloud computing represents a potentially transformative democratization of technology by making the same computing power available to individuals and small‐ and medium‐sized businesses that the largest enterprises enjoy, elected officials have the opportunity to help deliver its enormous benefits to the full diversity of their constituents." Envisioning the Cloud: The Next Computing Paradigm Marketspace Point of View (March 20, 2009) Let's Make a Deal All of the things that you have to worry about when you do it, they should be worrying about when they do it But it may not be in their business model Or they may not even be aware of it Trust, but verify Ignore: • "No one's ever complained about that before" • "We can't do that –it's 'free'" Contracts 101: What Doesn't It Take to Make a Contract? A negotiation • Non‐negotiable forms (like EULAs) are still enforceable • Courts will strike out terms of non‐negotiable contracts only if they are "unconscionable" A written document (usually) A written document that is consistent with your negotiations A written document that you have read A signature (usually) Terms that are "fair" and "reasonable" All that matters is that you have "manifested your mutual assent" to the contract Legal (and Contractual) Issues to Watch Out For FERPA/Privacy/Confidentiality Data security and data breach responsibilities E‐discovery Patent infringement Incorporated URL terms that are modifiable at will Responsibility for end users Export controls Service level agreements Suspension/Termination and their aftermath Warranties (and lack thereof) Indemnification (both ways) Choice of law and jurisdiction FERPA "'Education records' . means those records that are: (1) Directly related to a student; and (2) Maintained by an educational agency or institution or by a party acting for the agency or institution" FERPA "'Education records' . means those records that are: (1) Directly related to a student; and (2) Maintained by an educational agency or institution or by a party acting for the agency or institution" FERPA "'Record' means any information recorded in any way, including, but not limited to, handwriting, print, computer media, video or audio tape, film, microfilm, and microfiche" FERPA In general, a record is "directly related" to a student if it contains "personally identifiable information" about that student (broadly defined), including: • Name • Address • ID number • Biometric identifier • Indirect identifier such as date or place of birth or mother's maiden name • Collection of demographic data • . FERPA "Maintain" is not defined! Supreme Court: • "FERPA implies that education records are institutional records kept by a single central custodian, such as a registrar." • "The ordinary meaning of the word 'maintain' is 'to keep in existence or continuance; preserve; retain.'" Requires conscious decision on the part of the institution? E‐mail? Record? Directly related? • E‐mail address in the "to" or "from" line • Student name, address, ID number, or other identifying information (broadly defined) within the body of a message • Not every message will be personally identifiable, but do you really want to look? Maintained? • Messages residing in student accounts • Messages residing in faculty and staff accounts FERPA "A contractor, consultant, volunteer, or other party to whom an . institution has outsourced institutional services or functions may be considered a school official . provided that the outside party – • Performs an institutional service or function for which the agency or institution would otherwise use employees; • Is under the direct control of the agency or institution with respect to the use and maintenance of education records; and • Is subject to the requirements . governing the use and redisclosure of personally identifiable information from education records." Data Security/Breach FERPA – student records HIPAA –medical records Gramm‐Leach‐Bliley – "financial" records PCI‐DSS –credit card records "Personal information" under a state data protection statute • Especially "personal information" about Massachusetts residents, wherever located . Data Security/Breach All have "safeguarding" requirements of varying degrees of intensity In general, must specifically require vendors to comply with them on your behalf by contract (not to mention monitor them as well) Who is responsible/liable in the event of a breach? E‐Discovery It's 3 a.m., and you've just received notice of a possible lawsuit. Do you know where your data is, and how to access it? It's your data, and ultimately your responsibility, regardless of where it's located Do you have ready access to it, and the tools you need to review and produce it? Patent Infringement Blackboard v. Desire2Learn Acacia Media Technologies v. The World Is your vendor willing to warrant that it actually owns what it's selling? URL Terms "This Agreement, and all documents referenced herein, is the parties' entire agreement relating to its subject and supersedes any prior or contemporaneous agreements on that subject. The terms located at a URL and referenced in this Agreement are hereby incorporated by this reference." Typically "as may be modified from time to time at vendor's sole discretion" . • Translation: "This document is meaningless" Responsibility for End Users Institution shall be responsible for ensuring that its users comply with the terms of this agreement (which is confidential, and which it therefore may not tell them about) Institution shall use its best efforts to ensure that its users comply with the terms of this agreement Institution shall use reasonable efforts to ensure that its users comply with the terms of this agreement Institution shall inform its users of their obligations under this agreement Institution shall not authorize its users to engage in actions that violate this agreement Vendor may establish reasonable rules of conduct for users Export Controls 1.7. Data Transfer. As part of providing the Service, Google may store and process Customer Data in the United States or any other country in which Google or its agents maintain facilities. By using the Services, Customer consents to this transfer, processing and storage of Customer Data. Service Level Agreements How much "uptime" do you need? • How many "9's" after the "99."? What is the penalty/remedy for violation? Suspension/Termination and Their Aftermath How fast, and for what reasons, can the vendor suspend or terminate service? Will you have time to make the necessary transition to another vendor? Will you have access to your data?
Recommended publications
  • Education for a Smarter Planet: the Future of Learning CIO Report on Enabling Technologies
    Front cover Education for a Smarter Planet: The Future of Learning CIO Report on Enabling Technologies Redguides for Business Leaders Dr. Jim Rudd Christopher Davia Patricia Sullivan Guidance to aid CIOs in strategic investment efforts The value of consumer IT, open platforms, and cloud computing in the future of education Practical examples of how enabling technologies are used today Introduction This IBM® Redguide™ publication is a supplement to the Future of Learning: Executive Insights Report. It provides an in-depth investigation into three enabling technologies and provides actionable guidance to aid CIO strategic and investment planning efforts. Specifically it discusses the value and role of consumer IT, open technologies, and cloud computing in the future of education. In addition, this guide provides real-world examples of the how these technologies work. This guide includes the following topics: Executive overview Exploring the technologies that enable the educational continuum Consumer IT Open platforms Cloud computing Creating Education for a Smarter Planet A roadmap for enabling a future vision Other resources for more information © Copyright IBM Corp. 2009. All rights reserved. 1 Executive overview Over the next decade, educational institutions will face significant change, transforming their relationships with students, teachers, and the workers of tomorrow. Signposts for the future are already visible, signaling significant changes to all segments of education as well as to their funders. These five signposts, which are technology immersion, personalized learning paths, knowledge skills, global integration, and economic alignment, are rapidly converging to produce a new and transformative paradigm that we call the educational continuum. This continuum dissolves the traditional boundaries between academic levels, education providers, and economic development initiatives to provide a single system for life-long learning, skills development, and workforce training.
    [Show full text]
  • Cloud Computing Really Means
    What Cloud Computing Really Means By Eric Knorr, Galen Gruman April 2008 loud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) C everyone seems to have a different definition. As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers [1] available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing. Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) [6] providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging. InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing.
    [Show full text]
  • An Applied Evaluation and Assessment of Cloud Computing Platforms
    An Applied Evaluation and Assessment of Cloud Computing Platforms Daniel H¨ogberg January 21, 2012 Master's Thesis in Computing Science, 30 credits Supervisor at CS-UmU: Mikael R¨annar Examiner: Fredrik Georgsson Ume˚a University Department of Computing Science SE-901 87 UMEA˚ SWEDEN Abstract Cloud computing is an emerging paradigm with the potential to change the way computing resources are used by enabling the long held idea of utility computing. This thesis aims to conduct a survey of the cloud computing platforms that are currently available and to com- pare and evaluate the alternatives. Criteria that are important to consider when choosing between cloud platforms are defined and used to compare a set of selected platforms. A case management application called Wera is also migrated to platforms to test the migration processes and the platforms in practice. An experience gained from performing migrations to several Infrastructure-as-a-Service platforms is that they are very much alike. The storage models and features available may differ but the functionality offered is essentially the same. The fact that the area is still new is very visible when working with the platforms, but even though the platforms are still evolving, they are useful. Disruptions in the availability are rare and it is surprisingly easy to migrate an application to an Infrastructure-as-a-Service platform and have it run in the cloud. Employing Platform-as-a-Service offerings requires a greater effort to get started but using them there is even more to gain by tasks like patching and automatic scaling being transferred to the provider.
    [Show full text]
  • The Legal and Regulatory Implications of Internet Privacy April 21, 2009
    The Legal and Regulatory Implications of Internet Privacy April 21, 2009 Benjamin Duranske - Pillsbury Rocco Grillo - Protiviti Wayne Matus - Pillsbury Pillsbury Winthrop Shaw PiPittmanttman LLP and Protiviti, Inc. Agenda Social Networking Virtual Worlds Cloud Computing 1 | Internet Privacy Social Networking 2 | Internet Privacy Discussion Topics Social Networking Evolution Risks Deception Prevention Balance 3 | Internet Privacy Social Networking Evolution Some of the Favorites: à Linkedin 03’ à MySpace 03’ à Facebook 05’ à Twitter 06’ Social Networking is Becoming Commonplace Leveraging Sites for More Than Just Communicating à Exchanging Media à Sharing Documents (We hope not sensitive or confidential) à Distributing Resumes à Developing and Sharing Custom Applications Social Networking as a Business Tool à Human Resources Leveraging Social Networking Sites to Recruit Candidates à Leveraging Open Source Solutions à Open Forums for Customers & Partners 4 | Internet Privacy Social Networking Risks Potential Data Leakage of Sensitive Information Unintentional Download of Trojans or Viruses to Employee Computers (i.e. MySpace Koobface Virus, 08’) ~ Ripped from the Headlines ~ Social Networking Becomes a “Social Engineering Incubator.” Increased Targeting of the Organization: à Corporate Governance à Customers / Employees à Affiliates Reduced Productivity 5 | Internet Privacy Social Networking Deception - Prevention Spamming Takes Center Stage Profile Spoofing Prevention à Don't include common verification such as your date of birth or your mother’s maiden name à Set up privacy on your profile so only close friends can view your information à If you are going on holiday or you will be left in your home alone, don't put it on your site. This could leave you vulnerable to break ins à Potential partners and employers are often searching names on these sites.
    [Show full text]
  • Lost in the Cloud: Information Flows and the Implications of Cloud Computing for Trade Secret Protection
    Mitchell Hamline School of Law Mitchell Hamline Open Access Faculty Scholarship 2014 Lost in the Cloud: Information Flows and the Implications of Cloud Computing for Trade Secret Protection Sharon Sandeen Mitchell Hamline School of Law, [email protected] Publication Information 19 Virginia Journal of Law and Technology 1 (2014) This article orginally appeared on the Virginia Journal of Law and Technology (VJOLT) website: www.vjolt.net Repository Citation Sandeen, Sharon, "Lost in the Cloud: Information Flows and the Implications of Cloud Computing for Trade Secret Protection" (2014). Faculty Scholarship. 405. http://open.mitchellhamline.edu/facsch/405 This Article is brought to you for free and open access by Mitchell Hamline Open Access. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. Lost in the Cloud: Information Flows and the Implications of Cloud Computing for Trade Secret Protection Abstract As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The dva ent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection. While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the ability to upload and store information and data remotely via the Internet (hereinafter “cloud storage services”).
    [Show full text]
  • A Service Broker for Intercloud Computing
    A Service Broker for Intercloud Computing Zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften bei der Fakultat¨ fur¨ Informatik des Karlsruher Instituts fur¨ Technologie (KIT) genehmigte Dissertation von Dipl.-Ing. Foued Jrad aus Monastir Datum der mundlichen¨ Prufung:¨ 10. Juli 2014 Erster Gutachter: Prof. Dr. Achim Streit Zweiter Gutachter: Priv.-Doz. Dr. Ivona Brandic Abstract With the advantages of pay-per-use, easy access and on-demand resource customiza- tion, the Cloud computing concept was quickly adopted by both the industry and the academia. Over the last decade, the many Cloud infrastructures that have been built have distinguished themselves in the variety of offered services, access inter- faces, costs and Service Level Agreement (SLA). On the other hand, “vendor lock-in” issues and the lack of common Cloud standards hinder the interoperability across Cloud providers. Thus, Cloud users have to manually make decisions about which Cloud to choose in order to meet their functional and non-functional service require- ments while keeping the payment low. This task is clearly a burden for the users because they have to go through web pages of Cloud providers to compare their ser- vices and pricing policies. Furthermore, it is hard for them to collect and maintain all the needed information from current commercial Clouds to make accurate deci- sions. The aim of the work presented in this thesis is to facilitate users’ ability to find the most suitable Cloud services by taking their functional and non-functional SLA re- quirements into account. A key contribution of the thesis is the design of a multi- Cloud service broker framework acting as a mediator between consumers and mul- tiple Cloud providers to automate the service selection and deployment.
    [Show full text]
  • The Emerging Market for Web-Based Enterprise Software ARCHI-ES
    The Emerging Market for Web-based Enterprise Software by Andreas Goldi lic. oec. HSG University of St.Gallen, Switzerland Submitted to the MIT Sloan Fellows Program in Innovation and Global Leadership in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management of Technology At the Massachusetts Institute of Technology June 2007 ©2007 Andreas G1oldi. All rights reserved. The author grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author Andreas Gildi MIT Sloan School of Management May 11, 2007 Certified by , q - Michael A. Cusumano Thesis Supervisor Sloan Management Review Distinguished Professor of Management Accepted by _ I -t,_ , _,%,_xI Stephen Sacca Program Director MASSACHUSETTS INSTITUTE. OF TECHNOLOGY MIT Sloan Fellows Program in Innovation and Global Leadership JUL 0 2 2007 LIBRARIES ARCHI-ES The Emerging Market for Web-based Enterprise Software by Andreas GOldi Submitted to the MIT Sloan Fellows Program in Innovation and Global Leadership on May 11, 2007 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management of Technology Abstract Web-based enterprise software - sometimes referred to as "Software as a Service" (SaaS) or "on demand software" - is a major wave of innovation that introduces a new technical and economic model to enterprise software. The defining characteristics of web-based enterprise software are: a fully web-based user interface, hosted application deployment, a SaaS-based business model, and the use of a service-oriented architecture for integra- tion.
    [Show full text]
  • Leveraging Cloud Computing for Optimized Storage Management
    Leveraging Cloud Computing For Optimized Storage Management IncludingEMC Proven EMC Professional Proven™ ProfessionalKnowledge Sharing Certification 2009 Information Storage & Management (EMCPA) Mohammed Hashim Rejaneesh Sasidharan Escalations & Training Manager Technical Lead-SME Global Technical Support Global Technical Support PSE Lab, Bangalore PSE Lab, Bangalore Wipro Technologies Wipro Technologies [email protected] [email protected] Leveraging Cloud Computing For Optimized Storage Management Mohammed Hashim Rejaneesh Sasidharan Escalations & Training Manager Technical Lead-SME Global Technical Support Global Technical Support PSE Lab, Bangalore PSE Lab, Bangalore Wipro Technologies Wipro Technologies [email protected] [email protected] Information Storage & Management (EMCPA) 2009 EMC Proven Professional Knowledge Sharing 1 Table of Contents Leveraging Cloud Computing For Optimized Storage Management.......................................... 1 Introduction.................................................................................................................................. 3 Cloud Computing and Data Storage ............................................................................................ 3 Industry Relevance and Article Overview................................................................................... 4 SOA.............................................................................................................................................. 4 SaaS.............................................................................................................................................
    [Show full text]
  • ERP for Small Businesses a Buyer’S Guide ERP for Small Businesses: a Buyer’S Guide Table of Contents
    Sponsored by ERP for Small Businesses A Buyer’s Guide ERP for Small Businesses: A Buyer’s Guide Table of Contents 5 Preface by Sidney Hill, Principal, SJR Communications 6 ERP for Small Businesses: A Buyer’s Guide by Gabriel Gheorghiu and Aleksey Osintsev, TEC analysts Spotlight on SaaS 27 Thought Leadership from SAP How Small and Midsize Businesses Reap Benefits by Using Software as a Service 31 SAP Case Study Tam Ceramics SAP® Solution Perfect Fit for Post-Acquisition Ceramics Specialist 33 NetSuite Case Study NetSuite: Distribution Video & Audio 37 NetSuite Case Study NetSuite : Cartridge World Spotlight on Manufacturing and Distribution 42 Thought Leadership from Sage Sage ERP Solutions 45 Pronto Software Case Study Pronto Software | Success never tasted so good 49 Pronto Software Case Study Parksite | Laying a growth foundation with Pronto Software 53 ABAS Case Study J. Schmalz GmbH user report 58 ABAS Case Study User Report: Weinig Group 61 SYSPRO Case Study SYSPRO Case Study: Daprano & Company Spotlight on Financials 65 Corefino Case Study Corefino Case Study—CHPCC 69 Intacct Case Study OpSource Improves Global Business Management and Streamlines Revenue Recognition with Intacct 73 Sage Case Study Sage Accpac Extended Enterprise Suite Enables Island Lake Resort to Grow Despite Stiff Competition 77 Sage Case Study Sage MAS 90 is the Perfect Profile for Digital Signal Corporation 82 Vendor Directory Preface by Sidney Hill, Principal, SJR Communications The nature of business has changed dramatically in the Internet On the surface, that’s a difficult question for small business age. And small businesses may be feeling the greatest impact.
    [Show full text]
  • Tech M&A Monthly
    Tech M&A Monthly 1 TECH M&A MONTHLY ….starts in 2 minutes 2 www.corumgroup.com 3 Past Attendees Include: 4 Past Conferences & Reports . Private Equity Panel . 10 Key Terms in an M&A Contract . Google Acquisition Strategy . Deal Structures Today . Disruptive Tech Trend Reports: IoT Software, Majority Mobilization, Sports & Gaming, etc. Special Reports: Patents, New Buyers, M&A Process, Increasing Deal Value… 5 TECH M&A MONTHLY ….starts in 1 minute 6 Merge Briefing . 90 Minutes . Industry Update . Overview of the M&A Process . Upcoming events in: . Nashville . Barcelona . Cincinnati . Dublin . East Brunswick . Berlin . Wilmington . Paris 7 Selling Up, Selling Out . Half-Day . Tech M&A Bootcamp . The most attended tech executive conference in history . Upcoming events in: . Atlanta . Salt Lake City . Denver . Phoenix . Berlin 8 8 Stages for an Optimal Outcome 1 Due Preparation Research Contact Discovery Negotiation Closing Integration Diligence 9 Typical Negotiation Flow Seller Buyer Seller Discovery presents delivers an delivers process is valuation opening counter complete guidance offer offer 10 AVOIDING THE DEAL DISASTERS 11 Upcoming Conference Schedule Selling Up Selling Out (SUSO) - Ready to go to market? During this half-day workshop, learn to prepare, position, research, value, negotiate, and execute due diligence for maximum price and structure. This is the most attended Tech M&A event ever – participants have done over $1 trillion in transaction value. Merge Briefing (MB) - The Merge Briefing is a 90-minute executive briefing providing a current M&A market update (trends, valuations, etc.), as well as a brief overview of the Tech M&A process: “8 Steps To An Optimal Outcome.” Sep.
    [Show full text]
  • The Talkin' Cloud™ 50
    The Talkin’ Cloud™ 50: 2011 Edition Meet the top VARs and MSPs working in cloud computing Research Contact: Joe Panettieri, Editorial Director, Nine Lives Media Inc. 631-423-3536 or joe [at] ninelivesmediainc [dot] com Sales Contact: Amy Katz, CEO, Nine Lives Media Inc. 978-468-0092 or amy [at] ninelivesmediainc [dot] com Table of Contents About Nine Lives Media Inc. and Talkin’ Cloud........................................... 3 Executive Summary/Survey Methodology................................................... 4 Top Nine Trends Worth Noting…................................................................ 5 The Talkin’ Cloud 50 • Ranked 1-50....................................................................................... 7 • Alphabetized company profiles, links and more................................. 9 Talkin’ Cloud 50 Project Conclusions………………………………………... 20 Research Schedule and Project Overviews…………………………………. 20 • MSPmentor 100 • MSPmentor 250 • Talkin’ Cloud 50 • Talkin’ Cloud Stock Index • The VAR Guy’s Channel Finance 25 Contact Information................................................................................... 20 Talkin’ Cloud, MSPmentor, MSPtweet, The VAR Guy, VARtweet, and brand extensions are trademarks and service 2 marks of Nine Lives Media Inc. The Talkin’ Cloud 50 and this report are copyright © 2011 Nine Lives Media Inc. About Talkin’ Cloud Talkin’ Cloud (www.talkincloud.com), owned by Nine Lives Media Inc. (www.NineLivesMediaInc.com), covers the convergence of cloud computing and the channel. The
    [Show full text]