Global trends in Management, IT and Governance in an e-world

Size: px
Start display at page:

Download "Global trends in Management, IT and Governance in an e-world"

Transcription

1 Global trends in Management, IT and Governance in an e-world An International Conference co-hosted by the Open University of Mauritius (OU), Mauritius and the College of Law and Management Studies at the University of KwaZulu-Natal (UKZN), South Africa. [ e-mig 2017 ] 08 th to 10 th November, 2017 Intercontinental Resort Mauritius, Balaclava, Mauritius

2 The application of Cloud Computing in the Tanzania Education Sector: Case study of Ministry of Education, Science and Technology (MoEST) By: Ms. Tumaini Mwendile Kabudi Rhodes University

3 Outline Introduction Problem Statement Research objectives Methodology Findings and Discussion Proposed Cloud Computing In Education Sector Simulation of the Model using CloudSim Conclusions and Recommendations

4 Introduction Cloud computing is a vital and popular technology that has rapidly improved and enhanced the application of IT in the education sector. For the purpose of this paper, cloud computing is defined as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Mell and Grance, 2011, p.3)

5 Introduction Most developed countries, universities and famous branded companies have applied cloud computing in the education sector. These universities use Google Apps and FolderWave, to admit students, as collaboration tools and system management.

6 Introduction The usage and adoption of cloud computing in Sub-Saharan African educational institutions is at its infant stage. Few educational institutions in Africa have applied and utilized cloud computing

7 Introduction MoEST had various projects computing in education. dealing with developing cloud For instance, in 2010, MoEST signed a collaboration agreement with International Business Machines Corporation (IBM). The main aim of the partnership was to support the adoption of information technologies key sectors of Tanzania s development. Therefore, Cloud computing seems to be an emerging field in Tanzania that needs research to establish its application in the education sector

8 Purpose and Research Objectives The purpose of the research was to examine the development, access and application of cloud computing in the day-to-day operations of the MoEST with a view to suggesting its effective use at MoEST. The specific objectives of the research were to: investigate the methods in which cloud computing was acquired; examine the ways in which cloud computing was being used; factors that influenced its use at MoEST; and suggest a cloud computing model that is suitable in education sector

9 Methodology RESEARCH PARADIGM: RESEARCH DESIGN: Qualitative design In depth single case study INTERPRETIVIST PARADIGM QUALITATIVE AREA OF STUDY: MoEST Furthermore, MoEST sets the vision, mission and policy of the education in Tanzania. It is also responsible for providing facilities that assist in acquiring education in Tanzania TARGET POPULATION: The target population of the research was management, administration, technical staff and support staff at MoEST. SAMPLING TECHNIQUES: Non Probability Purposive Sampling Purposive sampling was utilized in order to get the right sample population that will provide the best information to answer the objectives of the study

10 Methodology QUALITATIVE DATA COLLECTION: Semi- structured interviews It is believed to help collect in-depth data from the target population Enable to obtain the perceptions and feelings Observation QUALITATIVE DATA ANALYSIS CONTENT ANALYSIS TRIANGULATION: Validate reliability of the data collected and analyzed Seek research permission from the Research department at the MoEST. Ensure informed consent, privacy and anonymity of the research participants.

11 Findings and Discussion The researcher interviewed the heads of department at MoEST. The selected departments were Secondary Education, Higher Education, ICT Unit, and the Research. The age of the departmental heads and technical staff were across the range of 26 to 60 years. The departmental heads had teaching experience, varying from 3 to 32 years. The technical staff had an experience of working at MoEST from one to ten years

12 On the aspect of cloud computing introduction, one of the departmental head said The idea of cloud computing to be applied in education sector started with the Tanzania beyond Tomorrow (TBT) Programme. Application of cloud computing in education sector is still an abstract. One departmental head said Cloud computing is quite advanced. So its security challenges need to be addressed first. It was observed that there was only one departmental head actually knew about cloud computing. This was so because he was involved in the strategically making in the Ministry. On this aspect, one of the technical staff said, We are not told about new IT projects till the managerial staff informs us. It is the departmental heads that are aware. They are involved with the strategic decision making of the ministry. The researcher had to explain to the rest of the staff what cloud computing.

13 Proposed Cloud Computing Model in Education Sector The Hybrid model terms of deployment and SaaS in terms of service model are the recommended models to be applied in education sector in Tanzania

14 Proposed Cloud Computing Model in Education Sector The researcher recommends the hybrid model. With regard to public cloud, it can be created and managed by the MoEST, academic institution(s), or combination. Benefits of applying public cloud in education sector include customized pricing, data sharing, available storage space and provision of free updated productivity tools.

15 Proposed Cloud Computing Model in Education Sector The recommended cloud service model to be applied in the education sector is SaaS. In SaaS model environment, the Tanzanian educational institutions can outsource the educational contents by remotely accessing them via internet. The educational institutions thus utilizes applications and software provided through various users devices via thin client interfaces (e.g. web browser).

16 Simulation of the Model using CloudSim For simulation, CloudSim was used as a framework for modelling and simulating cloud computing. For the GUI part, CloudReports application was used. Higher education sector was taken as a scenario to demonstrate how cloud computing model can be used and the procedures involved in their utilization. The Higher Education scenario will elucidate universities and colleges with IT infrastructure Which should meet the needs of management, lecturers, students, research staff and IT staff. The proposed cloud model will provide users with the needed software and hardware.

17 Simulation of the Model using CloudSim

18 Simulation of the Model using CloudSim As a limiting factor, Simulation was of cloud model that will be applied in part of education sector i.e. High Education Sector. The researcher chose Ardhi University, IFM University, Mzumbe University, SUA University and University of Dar-es-Salaam.

19 Simulation of the Model using CloudSim To start the experiment in CloudReports, Configure data centres, host configurations Then add user characteristics Configuration Tab of CloudReports

20 Simulation of the Model using CloudSim The results obtained after simulating the proposed cloud model based on the parameters The total time for each cloudlet to successfully be executed on the data centre

21 Simulation of the Model using CloudSim Total operational costs

22 Simulation of the Model using CloudSim Number of cloudlets which have been effectively executed on the data centre

23 Simulation of the Model using CloudSim Utilization of different cloud resources such as CPU, RAM and bandwidth

24 Conclusion and Recommendations Cloud computing has a vital role in changing and improving the education system in Tanzania. The findings obtained are significant in developing cloud computing applications It will assist in the provision of education in Tanzania Recommends the government to recruit consultants and auditors to propose the best educational applications that can be kept in an efficient cloud. Recommends adopters of the cloud model should plan and ensure smooth uniform transition for these educational institutions. Data protection mechanisms, data location configuration of SaaS provide should be analysed

25

26 References Aljawarneh, S., Cloud security engineering: Avoiding security threats the right way. Cloud Comput.Adv.Des.Implementation, Technol., pp.147. Aljenaa, E., Al-Anzi, F. and Alshayeji, M., eds Proceedings of the Second Kuwait Conference on e-services and e-systems ACM. Al Noor, S., Mustafa, G., Chowdhury, S.A., Hossain, M.Z. and Jaigirdar, F.T., A proposed architecture of cloud computing for education system in Bangladesh and the impact on current education system. IJCSNS International Journal of Computer Science and Network Security, 10 (10), pp Calheiros, R.,, Ranjan, R., and Beloglazov, A., CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice. Ercan, T., Effective use of cloud computing in educational institutions. Procedia-Social and Behavioral Sciences. Fan, X.,, Cao, J., and Mao, H., A survey of mobile cloud computing. In: ZTE Corp pp Hayes, B., Cloud computing. Communications of the ACM. Jain, A., and Pandey, U.S., Role of cloud computing in higher education. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), p.pp Komba, A., Relevance of schooling in Tanzania. Culturally Responsive Education: Reflections from the Global South and North, p.95. Kshetri, N., Cloud computing in developing economies. Computer, 43(10), pp Lennon, R.G., Bring your own device (BYOD) with Cloud 4 education. In: Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity - SPLASH 12. p.171. Lwoga, E., Making learning and Web 2.0 technologies work for higher learning institutions in Africa. Campus-Wide Information Systems, 29(2), pp Mell, P., and Grance, T., The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. Nist Special Publication, 145, p.7. Mtebe, J., and Raisamo, R., 2014a. elearning Cost Analysis of On-Premise versus Cloud-hosted Implementation in Sub-Saharan Countries. The African Journal of Information Systems, 6(2), p.2.

Simulation of Cloud Computing Environments with CloudSim

Simulation of Cloud Computing Environments with CloudSim Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.

More information

Association of Cloud Computing in IOT

Association of Cloud Computing in IOT , pp.60-65 http://dx.doi.org/10.14257/astl.2017.147.08 Association of Cloud Computing in IOT K.Asish Vardhan 1, Eswar Patnala 2 and Rednam S S Jyothi 3 2,3 Assistant Professor, Dept. of Information Technology,

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results Keyun Ruan, Joe Carthy, Tahar Kechadi, Ibrahim Baggili Digital Investigation 10, No.1, pp

More information

ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast

ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast 21 ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards

More information

Modernising the public sector through the cloud

Modernising the public sector through the cloud Modernising the public sector through the cloud Alison Gillwald (PhD) & Mpho Moyo Executive Director: Research ICT Africa RIA Associate Adjunct Professor: University of Cape Town RIA Workshop RANICTP2

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Full Name of Centre:... Date of establishment:... Address: Telephone No:... Fax No: (Please include area codes)

Full Name of Centre:... Date of establishment:... Address: Telephone No:... Fax No: (Please include area codes) APPLICATION for AIES CENTRE REGISTRATION 2017/18 2512 Chambers Road, Tustin CA 92780, USA Tel: 949-501-3701 Email: info@aiesus.org Website: www.aiesus.org Please read the instructions and terms of contract

More information

INFORMATION TECHNOLOGY ONE-YEAR PLAN

INFORMATION TECHNOLOGY ONE-YEAR PLAN INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

Public Sector Cloud Service Adoption: The Nigerian Case

Public Sector Cloud Service Adoption: The Nigerian Case Public Sector Cloud Service Adoption: The Nigerian Case Dr. Olayinka David-West & Immanuel Umukoro Department of Operations, Marketing and Information Systems Email: ydavid-west@lbs.edu.ng Outline v Introduction

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Factors Affecting Adoption of Cloud Computing Technology in Educational Institutions (A Case Study of Chandigarh)

Factors Affecting Adoption of Cloud Computing Technology in Educational Institutions (A Case Study of Chandigarh) American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-7, Issue-3, pp-358-364 www.ajer.org Research Paper Open Access Factors Affecting Adoption of Cloud Computing

More information

An introductory look. cloud computing in education

An introductory look. cloud computing in education An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With

More information

2017 USER SURVEY EXECUTIVE SUMMARY

2017 USER SURVEY EXECUTIVE SUMMARY 2017 USER SURVEY EXECUTIVE SUMMARY INTRODUCTION Survey methodology 2017 NODE.JS USER SURVEY The primary objective of the research was to profile Node.js users, understand usage patterns and trends and

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

New Zealand Government IbM Infrastructure as a service

New Zealand Government IbM Infrastructure as a service New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact An IDC InfoBrief April 2016 Sponsored by: In This InfoBrief Overview This IDC InfoBrief explores

More information

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission

More information

China: User Perceptions and Plans for PCs and PDAs in 2003

China: User Perceptions and Plans for PCs and PDAs in 2003 End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not

More information

Cloud Computing and Its Impact on Software Licensing

Cloud Computing and Its Impact on Software Licensing Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared

More information

GUIDELINES. student. Wi-Fi network. consultation with. 2. Research. BYOD were: devices. world. to be used the school. The BYO. of devices.

GUIDELINES. student. Wi-Fi network. consultation with. 2. Research. BYOD were: devices. world. to be used the school. The BYO. of devices. STUDENTT BRING YOUR OWN DEVICE (BYOD) GUIDELINES 1. Introduction The Bring Your Own Devicee (BYOD) guidelines contain information for schools that choose to allow student use of personal mobile electronic

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Summary - Review of the legal conditions when using cloud computing in the municipal sector feasibility study

Summary - Review of the legal conditions when using cloud computing in the municipal sector feasibility study KS FoU-project 144008: Summary - Review of the legal conditions when using cloud computing in the municipal sector feasibility study April 2015 Advokatfirmaet Føyen Torkildsen AS -1- 1 Introduction Use

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Understanding IT Budgets

Understanding IT Budgets Understanding IT Budgets Michael Pinnella Director of Network Operations Holmes District Schools - Bonifay, Florida MBA - Information Management, Microsoft Certified Systems Administrator (MCSA), CompTIA

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

Abu Dhabi e Government Strategy and ICT Standardization. Abu Dhabi, November 2014

Abu Dhabi e Government Strategy and ICT Standardization. Abu Dhabi, November 2014 0 Abu Dhabi e Government Strategy and ICT Standardization Abu Dhabi, November 2014 The Abu Dhabi e-government vision is driven by 4 strategic themes towards modernizing the Government services in the Emirate

More information

Participation Cultures and Homelessness:

Participation Cultures and Homelessness: Participation Cultures and Homelessness: New questions for researchers of mobile phones and mobile internet amongst socially excluded groups Justine Humphry Digital Cultures University of Sydney Outline

More information

Transfer of Ncomputing Technology in Education Sectors The Economy Context

Transfer of Ncomputing Technology in Education Sectors The Economy Context Transfer of Ncomputing Technology in Education Sectors The Economy Context Renatus Michael Assistant Lecturer The Institute of Finance Management P.O. Box 3918 Dar es salaam, Tanzania. michael.renatus@ifm.ac.tz

More information

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai

More information

A LOAD BALANCING ALGORITHM FOR SELECTION OF COMPETENT SERVER IN CLOUD ENVIRONMENT BASED ON CAPACITY, LOAD AND ENERGY

A LOAD BALANCING ALGORITHM FOR SELECTION OF COMPETENT SERVER IN CLOUD ENVIRONMENT BASED ON CAPACITY, LOAD AND ENERGY A LOAD BALANCING ALGORITHM FOR SELECTION OF COMPETENT SERVER IN CLOUD ENVIRONMENT BASED ON CAPACITY, LOAD AND ENERGY Annwesha Banerjee Majumder* Department of Information Technology Dipak Kumar Shaw Department

More information

Cloud Computing, SaaS and Outsourcing

Cloud Computing, SaaS and Outsourcing Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud

More information

Using Mobile Phones for Teaching and Learning Purposes in Higher Learning Institutions: the Case of Sokoine University of Agriculture in Tanzania

Using Mobile Phones for Teaching and Learning Purposes in Higher Learning Institutions: the Case of Sokoine University of Agriculture in Tanzania Using Mobile Phones for Teaching and Learning Purposes in Higher Learning Institutions: the Case of Sokoine University of Agriculture in Tanzania 1 Authors Wulystan P. Mtega (wmtega@gmail.com) Ronald Bernard

More information

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing 1 Outline 1. A brief history 2. Definition 3. Motivation, Benefit, Risk 4. Concepts 2 Outline 1. A brief history 2. Definition 3. Motivation, Benefit, Risk 4. Concepts 3

More information

MASTER OF SCIENCE IN COMPUTER SCIENCE

MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at

More information

A Journey Towards Digital Learning Environment

A Journey Towards Digital Learning Environment A Journey Towards Digital Learning Environment Gerrit Bahlman, Ricky Cheong, David Chiu The Hong Kong Polytechnic University 1937 1947 1972 1994 Government Trade School Hong Kong Technical College The

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

Spreading the ICT Gospel With Cisco Network Academy Program

Spreading the ICT Gospel With Cisco Network Academy Program Spreading the ICT Gospel With Cisco Network Academy Program 1. Introduction By Shahab Meshki Educators and policymakers agree that student learning occurs best when highquality curriculum, instruction,

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

PERTS Default Privacy Policy

PERTS Default Privacy Policy PERTS Default Privacy Policy Version 1.3 2017-07-15 About PERTS PERTS is a center at Stanford University that helps educators apply evidence-based strategies in order to increase student engagement and

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Multitiered Architectures & Cloud Services. Benoît Garbinato

Multitiered Architectures & Cloud Services. Benoît Garbinato Multitiered Architectures & Cloud Services Benoît Garbinato Learning objectives Learn about enterprise computing Learn about multitiered architectures Learn about Java Enterprise Services Learn about cloud

More information

Curriculum Catalog

Curriculum Catalog 2017-2018 Curriculum Catalog Career and Technical Education Series: Information Technology Introduction to Information Technology Support 2017 Glynlyon, Inc. Table of Contents INTRODUCTION TO INFORMATION

More information

Intro - Authenticating the Campus and Beyond Pg 1. University of Groningen Pg 3. Pennsylvania State University Pg 4. Document Centric Solutions Pg 5

Intro - Authenticating the Campus and Beyond Pg 1. University of Groningen Pg 3. Pennsylvania State University Pg 4. Document Centric Solutions Pg 5 REFERENCES Intro - Authenticating the Campus and Beyond Pg 1 University of Groningen Pg 3 Pennsylvania State University Pg 4 Document Centric Solutions Pg 5 Goethe Pg 6 UZ Leuven Pg 7 Rotterdam University

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented

More information

HCL GRC IT AUDIT & ASSURANCE SERVICES

HCL GRC IT AUDIT & ASSURANCE SERVICES HCL GRC IT AUDIT & ASSURANCE SERVICES Overview The immense progress made in information and communications technology offers enterprises outstanding benefits. However this also results in making the risk

More information

Community Clouds And why you should care about them

Community Clouds And why you should care about them Community Clouds And why you should care about them Matt Johnson, Ed Zedlewski, Eduserv Introduction What is Cloud Computing? National Institute of Standards & Technology (NIST) a model for enabling convenient,

More information

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya Lucky Waindi waindi@cck.go.ke Mwende Njiraini Njiraini@cck.go.ke 1 Content Part 1: Introduction Part 2: Developing

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,

More information

Digital Health & The Tools You May Not Be Using, But Should!

Digital Health & The Tools You May Not Be Using, But Should! Digital Health & The Tools You May Not Be Using, But Should! Krissy Celentano, USAID Adele Waugaman, USAID Rachel Fowler, USAID Steve Ollis, MCSP/JSI Alanna Nelson, DIAL 1 Agenda - Introductions - Overview

More information

WAN/LAN PLANNING AND DESIGN

WAN/LAN PLANNING AND DESIGN WAN/LAN PLANNING AND DESIGN GRADUATE PROJECT BY ABHISHEK R. SHARMA SUBMITTED ON: 04/24/2008 SUBMITTED TO: Prof. Ron Fulle GRADUATE PROJECT DESCRIPTION THE MISSION: Indian Universities constitute one of

More information

Infrastructure PA Stephen Lecce

Infrastructure PA Stephen Lecce PA Stephen Lecce Ministry of Stephen Lecce, Parliamentary Assistant Meeting: Topics: Topics: PA Stephen Lecce, MPP Monday, August 20, 2018 9:15 am 9:45 am Shaw Centre, Room 107, Level 1 National Centre

More information

Prepared for: June 18, 2014

Prepared for: June 18, 2014 Prepared for: June 18, 2014 Changing Student Expectations Innovative Technology Trends: BYOD Networks & Security Cloud Computing Video Network Security Design Guidelines Questions welcome throughout! Differing

More information

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING 17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion

More information

NEPAD ICT BROADBAND INFRASTRUCTURE PROGRAMME

NEPAD ICT BROADBAND INFRASTRUCTURE PROGRAMME NEPAD ICT BROADBAND INFRASTRUCTURE PROGRAMME Presentation at the Public & Private Sectors Partnership Forum: Promoting Infrastructure Sharing and Low Cost Solutions for Africa Dr. Edmund Katiti, Policy

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

WHO ITU Toolkit. Derrick Muneene, WHO AFRO,

WHO ITU Toolkit. Derrick Muneene, WHO AFRO, WHO ITU Toolkit Derrick Muneene, WHO AFRO, muneened@who.int Outline of keys issues in presentation Policy instruments for the elaboration of ehealth strategies Progress made in the region Illustration

More information

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p South Africa-VINNOVA Workshop Date: 22 October 2015 N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p The ICT R&D and

More information

If you have further questions, please send them to me at Kellett School Association Limited

If you have further questions, please send them to me at Kellett School Association Limited Dear Parent, The IT network at Kowloon Bay supports the Senior School s BYOD (Bring Your Own Device) model of technology provision for students. This model gives families a choice over the device their

More information

Strengthening telecommunications infrastructure for economic growth and security: A case for Zambia

Strengthening telecommunications infrastructure for economic growth and security: A case for Zambia Strengthening telecommunications infrastructure for economic growth and security: A case for Zambia By: Gertrude Mwangala Akapelwa Ehueni Board Chairperson ZICTA 1 Presentation Outline Introduction to

More information

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya,

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory

More information

Plone development in UNEP Country Environmental Profiles Gerard.Cunningham@unep.org Capacity Building and Partnerships Section Division of Early Warning and Assessment United Nations Environment Programme

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International

More information

Ferrous Metal Transfer Privacy Policy

Ferrous Metal Transfer Privacy Policy Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and

More information

Cloud Computing in Learning

Cloud Computing in Learning Cloud Computing in Learning Magdy S. Aqel Instructional technology department Islamic University of Gaza (IUG) masaaq@hotmail.com 2011 2 What is Cloud Computing? 3 What is Cloud Computing? Cloud computing

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

HOSPITALS 5 NATIONAL & SPECIALIST 5 ZONAL 22 REGIONAL (6 SPECIALISTS EACH) 126 DISTRICT (2 MOs, NO SPECIALISTS) > 480 HEALTH CENTRES

HOSPITALS 5 NATIONAL & SPECIALIST 5 ZONAL 22 REGIONAL (6 SPECIALISTS EACH) 126 DISTRICT (2 MOs, NO SPECIALISTS) > 480 HEALTH CENTRES HOSPITALS 5 NATIONAL & SPECIALIST 5 ZONAL 22 REGIONAL (6 SPECIALISTS EACH) 126 DISTRICT (2 MOs, NO SPECIALISTS) > 480 HEALTH CENTRES > 4800 DISPENSARIES NO GRADUATE PROFESSIONALS LOWER CADRES WILL CONTINUE

More information

CREATIVITY MAKES THE DIFFERENCE

CREATIVITY MAKES THE DIFFERENCE CREATIVITY MAKES THE DIFFERENCE Your school has a big challenge: preparing Generation Z for a rapidly changing world and jobs that don t yet exist. Along with learning digital skills, your students need

More information

Mobile Technology Strategy

Mobile Technology Strategy Page 1 of 7 Mobile Technology Strategy For Stellenbosch University 24 February 2012 Contents Mobile Technology Strategy... 1 Authors... 1 Scope... 2 Definitions... 2 Governance... 2 Informing the strategy

More information

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:

More information

Does Research ICT KALRO? Transforming education using ICT

Does Research ICT KALRO? Transforming education using ICT Does Research ICT Matter @ KALRO? What is Our Agenda The Status of Research Productivity and Collaboration of KE Research Institutions Is the research productivity of KARLO visible to the world? Discovery

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

A4AI-Nigeria Multi-stakeholder Coalition Objectives and Plans. Sonia Jorge, Executive Director Alliance for Affordable Internet

A4AI-Nigeria Multi-stakeholder Coalition Objectives and Plans. Sonia Jorge, Executive Director Alliance for Affordable Internet A4AI-Nigeria Multi-stakeholder Coalition Objectives and Plans Sonia Jorge, Executive Director Alliance for Affordable Internet www.a4ai.org Agenda What is A4AI? The A4AI national multi-stakeholder coalition

More information

Data Security and Privacy at Handshake

Data Security and Privacy at Handshake Data Security and Privacy at Handshake Introduction 3 A Culture of Security 3 Employee Background Checks 3 Dedicated Security and Privacy Teams 3 Ongoing Team Training 4 Compliance 4 FERPA 4 GDPR 4 Security

More information

Better skilled workforce

Better skilled workforce Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style

More information

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial Ofqual Ofqual Supporting a Cloud-First Programme Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed in this document, including

More information

Sustainability of R&E Networks: A Bangladesh Perspective

Sustainability of R&E Networks: A Bangladesh Perspective Sustainability of R&E Networks: A Bangladesh Perspective Md. Mamun Or Rashid, PhD Professor, Department of CSE University of Dhaka Former Consultant, BdREN Agenda Introduction Definition and Perception

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This

More information

HWDSB s Journey to the Cloud

HWDSB s Journey to the Cloud IBM Canada K-12 Education HWDSB s Journey to the Cloud Michael Hiltz, Manager of Computer Services, HWDSB Brad Klinck, Senior IT Specialist, IBM K-12 Education Facts at a Glance Elementary Schools 95 Secondary

More information

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement; Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions

More information

Experimental Model for Load Balancing in Cloud Computing Using Throttled Algorithm

Experimental Model for Load Balancing in Cloud Computing Using Throttled Algorithm Experimental Model for Load Balancing in Cloud Computing Using Throttled Algorithm Gema Ramadhan 1, Tito Waluyo Purboyo 2, Roswan Latuconsina 3 Research Scholar 1, Lecturer 2,3 1,2,3 Computer Engineering,

More information

Liberia ICT Policy

Liberia ICT Policy Liberia ICT Policy 2017-2021 Initial Stakeholders Consultation Eleanor Sarpong Head of Policy and Advocacy November 23, 2016 a4ai.org Goals of consultation To convene under the auspices of the GoL (MoPT

More information

Vault Systems. Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud. Overview. IBM Systems & Technology Case Study

Vault Systems. Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud. Overview. IBM Systems & Technology Case Study Vault Systems Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud Overview The need Vault Systems was established in partnership with software provider JN Solutions to build

More information

IPv6 Migration Framework Case of Institutions in Ethiopia

IPv6 Migration Framework Case of Institutions in Ethiopia IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information