ࡱ> b >jbjb qmm6,U,U,U,UDpU|UVVVVW"W Xrtttttt,!Rs! XWW X XAXVVAXAXAX X"VVrAXdt XrAXAXJF\^U ,U+XB^ׯ0z'AX'^AXd(.$'.Cloud Computing: Impact on Your Library Presented by Rita Gavelis November 19, 2013 1st section  What is Cloud Computing Cloud computing noun ( The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. What does it really mean? Your photos, files, and music are saved on a computer somewhere other than your computer You can access your images, files, and music from any computer, anywhere in the world. You can share your files easily by providing links/URLS You can access same information from any kind of device: computer, tablet, or smartphone. You can use any kind of software, whether it is for word processing, creating slideshows, or photo editing, without having to download or install it on your computer. The software is updated automatically You can increase or decrease services depending on your need Disadvantages of Cloud Computing Possible downtime where you are unable to access your files online The security of your files is in another companys hands There is a cost involved If your Cloud host has their own proprietary software or formats for storing information, can you get your information back if you choose to move. Some cloud hosts do not have a good history of customer support Companies sometimes get bought out or go under. You need a backup plan. Architecture How does cloud computing work? Your cloud host, the company housing all your files, needs to have the following: Enough servers not only to house your information, software, & networks, but extras to take over incase one server goes down. Backup servers to house copies of your files, just in case there is a problem, this is referred to as Redundancy, which is a good thing. A central server administering and monitoring the other servers, as well as monitor security Software, known as Middleware, to help your computers communicate with their servers Internet connectivity with high bandwidth to handle all the computer traffic and data For your library to use cloud computing, you need the following: A cloud host. This is a company that provides whatever cloud services you need A reliable internet connection Some kind of device, whether it is a computer, tablet, or smartphone that can access the internet (Optional) server to house copies of email or files. The Types of Cloud Computing Services Software as a Service (SaaS) You are provided access to application software often referred to as on-demand software. You don't have to worry about the installation, setup and running of the application. Service provider will do that for you. You just have to pay and use it through some client. Benefits of the SaaS model include: Easier administration Automatic updates and HYPERLINK "http://searchenterprisedesktop.techtarget.com/definition/patch-management" patch management Compatibility: All users will have the same version of software. Easier HYPERLINK "http://whatis.techtarget.com/definition/collaboration" collaboration, for the same reason Global accessibility. Examples: Google docs, Microsoft-office 365, Prezi.com Platform as a Service (Paas) Your computing platforms, such as operating system, programming language execution environment, database, web server etc., are all based in the Cloud. PaaS has several advantages for developers. Operating system features can be changed and upgraded frequently Teams can work together on software development regardless of distance Services can be obtained from diverse sources that cross international boundaries. Initial and ongoing costs can be reduced by using a single vendor Multiple projects can use the same developers Examples: AWS Elastic Beanstalk, Heroku SalesForce.com Google App Engine IBM. Infrastructure as a Service (IAAS) Your library out-sources the equipment used, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. Characteristics of IaaS include: Utility service and billing model. Automation of administrative tasks. Dynamic scaling.  HYPERLINK "http://searchvirtualdesktop.techtarget.com/definition/desktop-virtualization" Desktop virtualization. Policy-based services. Examples: Aws.amazon.com : EC2, S3 Cloud.google.com  HYPERLINK "http://www.windowsazure.com" www.windowsazure.com  HYPERLINK "http://www.hpcloud.com" www.hpcloud.com www-935.ibm.com/services/us/en/cloud-enterprise/index.html rackspace.com Development as a service (DAAS) Development as a service is using a company to create or develop applications for your library all done online. Examples: Cloud9IDE https://c9.io/ For java script developing IBM ; Almaden Research Center software Northwoods:  HYPERLINK "http://www.northwoodsoft.com/Software-Development/Software-Development-Services.htm" http://www.northwoodsoft.com/Software-Development/Software-Development-Services.htm Identity as a Service (IDaaS) IDaaS is using a service to manage you online identity such as logins, passwords, and software licenses. It also can control user and computer accounts. Examples: OpenID.net AOL.com FaceBook.com Google.com Twitter.com Paypal.com Verisign.com Yahoo.com Compliance as a Service CAAS These are companies that assist you in complying with various regulations or privacy guidelines. If you work in a hospital setting. You might be familiar with AthenaHealth. Other examples: Bankserv.com For Banks ClearPoint PCI for Credit Cards FedCloud For government 2nd section Security and Cloud Computing Security Overview Types of common cyber crime are: Hacking, Identity Theft, Spamming, Viruses. These cause The loss of intellectual property and business confidential information The loss of sensitive business information, including possible stock market manipulation Service disruptions The additional cost of securing networks, insurance, and recovery from cyber attacks Reputation damage to the hacked company Cloud Services Providers spend billions in securing their data. They afford more protection than an individual library. Among the types of security your library can use are: Afirewallto act as a barrier to between the public Internet and any private network (like at your enterprise). Encryptionto protect your sensitive data from hackers; only the computer that you send it to should have the key to decode the data. Scan all files with anti-virus software. Know who in the library is accessing what files and software Consider providing your own back up for emergencies What to keep out of the Cloud Anything that actually requires hardware to run i.e. an HVAC system that has to be plugged in. Anything critical that you could not function without Electronic door access Financial systems 3rd section Cost Pricing Models You price may vary depending on whether you are for-profit or educational. Also the types of service and number of people accessing the information will alter the rate. A good comparison chart can be found at:  HYPERLINK "http://www.techrepublic.com/blog/the-enterprise-cloud/side-by-side-comparisons-of-iaas-service-providers/5717/" http://www.techrepublic.com/blog/the-enterprise-cloud/side-by-side-comparisons-of-iaas-service-providers/5717/ Types of Plans Pay-as-you-go: You pay for what you use. Good For applications with short-term, spiky, or otherwise unpredictable usage, a pay-as-you-go pricing model, where you pay only for what you use, and with no upfront commitment Upfront or Pre-payment: You pay for what you think you will use in advance: For applications with steady state or otherwise predictable usage, you should be able to make a low, one-time, upfront payment and get a significant discount to the hourly rate and a capacity reservation in the cloud. This can be done monthly, by semester, by the year. Avoiding Unneeded Expenditures Here are some steps to avoid surprises. Figure out how much you will most likely use in a month Check Usage against any bills or statements Try to negotiate a good price break Go On A "Diet." Cut back on usage if you cannot afford the bill. Look for waste: Computers running overnight, people not logging off the system. Computing Cost of Ownership There is more to cost of ownership than the price of the equipment or the subscription to the cloud host. Your operational costs consist of some of the following factors: Labor = Salary + benefits Utilities Rent Software / licensing Figure your costs: Monthly Labor Cost: Salary + Benefits x % of time spent on task = labor cost. Adjustments: Salary + Benefits of temporary help x time spend on task = added cost Utilities: (wattage of equipment x hours running ) divided by 1000 x $ charged per KH = electric cost Rent: ( Length x Width of room) x $ per sq foot = rent Software/Licensing: Any fees charged per software license or subscription 4th section Cloud Service Providers Data Storage Box.com 10gb free, 100 GB for $5 / mo Dropbox.com starts at 2GB-16 gb Free, 200GB for $200/yr Google Drive 5 GB free, 200 GB for $120/ year Microsoft Skydrive 7 gb free, 200 GB for $100/year SugarSync.com 5gb free, 100 gb for $100/year Productivity Software Apple iCloud - word processing, Spreadhsheets, Presentation, calendars software Free Beta IBM Lotus live complete software package - $5 / per user / Month Google Drive word processing, Spreadhsheets, Presentation, calendars software Free Microsoft Office 365 complete office package Educational, Govt & non-profit discounts start at $0 to $3.50 per user per month Zoho.com complete office products, plus calendars, invoices, finance starting at $0 - $35 per user / month Webmail Amazon SES Simple Email Services Free if you have an EC2 account or $.10 per thousand messages Elasticemail.com email hosting - Starting at $.08 / thousand messages Rackspace.com Email hosting - $2 / mailbox / month Zoho Mail email hosting lite version is free for 5 mailboxes Communication Adobe Connect online meeting $45 / $55 per month, Educational discounts available IBM Lotus LiveMeeting Web conferencing -  HYPERLINK "http://www.meetingconnect.net/lotuslive/" http://www.meetingconnect.net/lotuslive/ Panterra networks Cloud Phone system -  HYPERLINK "http://www.panterranetworks.com/products/voice/index.php" http://www.panterranetworks.com/products/voice/index.php RingCentral Cloud Phone System -  HYPERLINK "http://www.ringcentral.com/" http://www.ringcentral.com/ YouSendIt.com 2 gb free, 5gb $10 / for sending & tracking files w/ return receipts Media Streaming Flickr.com upload photos and video Free 1 TB of storage Sproutvideo.com video hosting accounts range from $10 - $750 / month Vimeo.com video hosting accounts range from $0-$200 / year Vzaar.com Video hosting accounts range form $20 - $400 / month free 30 day trial Wistia.com video hosting accounts range from $0-$300 / month Mobile Cloud The mobile cloud is Internet-based data, applications and related services accessed through smartphones, laptop computers, tablets and other portable devices. You can find mobile apps at iTunes and Google Play/ Some great cloud apps: Box Dropbox Google Drive Mobile office 365 RingCentral Skydrive Zoho 5th section Transitioning the Library to the Cloud Planning for Change If you are considering moving your library to the cloud, here are issues to consider: Which applications or services are considering moving to the cloud? These could include: Software many in your library use such as word processing, spreadsheets etc Email services Storage for your documents Do a cost analysis to see if it is worth moving to the cloud Decide on which vendor you will use. Some of the determining factors will include: Security Performance Compliance Support Cost Billing Flexibility Vendor Lock-in Things to consider for preparing for the cloud Who will be involved with planning & preparation Compatibility of hardware & software Are software tools or other assistance available for move How much data needs to be weeded or converted to new format How much times will your staff be tied up preparing for the move? Who will train the staff once the new service is in place What new roles or tasks will your IT now cover Maintenance How often does the cloud host perform maintenance on the service or servers? Does the Maintenance require the service to go down? Monitor your bills and usage Archiving There are two types of archiving. Private only those with logins and passwords have access Public everyone can access the information There are a number of Cloud Archiving services available. When choosing a service, you want to consider: Are the they compliant with regulations your organization must follow Should the archive reside in the public or private cloud space How will they notify you of a security breach How easy is it to move your data to a different service Is the company gets sold, can you get your data back Other reading Above the Clouds: A Berkeley View of Cloud Computing  HYPERLINK "http://www.cs.columbia.edu/~roxana/teaching/COMS-E6998-7-Fall-2011/papers/armbrust-tr09.pdf" http://www.cs.columbia.edu/~roxana/teaching/COMS-E6998-7-Fall-2011/papers/armbrust-tr09.pdf MSP TV Finance: Getting Ready for Cloud Computing: Pricing Cloud Services  HYPERLINK "http://www.msptv.net/whitepapers/channel-112911-wp.pdf" http://www.msptv.net/whitepapers/channel-112911-wp.pdf Rackspace: Cloud U: Planning a Move to the Cloud  HYPERLINK "http://broadcast.rackspace.com/hosting_knowledge/whitepapers/planning-a-move-to-the-cloud.pdf" http://broadcast.rackspace.com/hosting_knowledge/whitepapers/planning-a-move-to-the-cloud.pdf Server Calculator:  HYPERLINK "http://networking.ringofsaturn.com/Tools/serverpowerusage.php" http://networking.ringofsaturn.com/Tools/serverpowerusage.php R"h m n { LrsoeYD)h'h'CJ_HaJfHq h'h'5_HaJh'h'5CJ!h'h'B*CJOJQJph h'h'h'h'5h'h'CJ^J_H aJ"h'h'6CJ]^J_H aJh'h'5CJ^J_H aJ@h'h'5CJ\h'h'5CJH*\h'h'5CJ\h'h'CJh'h'CJh'h'CJ R$fhP 7 8 ^ d hh-DM  & Fgd'gd'h^hgd' & Fgd' 1$7$8$H$gd'$a$gd'> 8 Q $ m n { | oWEF & F gd' & Fgd'gd' & Fd [$\$^gd'LrsZ "#-\]z{@ & F d-DM ^gd'd3@-DM gd'gd' & F gd'FGHXY"]z{KLӪӪ󌂌mKmBh'h'0JOJQJ_HaJeh@fHq r@)h'h'CJ_HaJfHq h'h'5\h'h'CJ\'jh'h'CJU_HaJ(h'h'0J>*B*CJ_HaJph'jh'h'CJU_HaJ!jh'h'CJU_HaJh'h'0JCJ_HaJh'h'CJ_HaJ@^ & F dh-DM ^gd'd3@-DM gd'h^hgd' & Fgd'gd' & Fgd':KQdeoh^hgd' & F gd'gd'dh-DM gd' & F -DM ^gd'L9:;OPQRvwx;<=ι󯠯}k}_M}"jh'h'CJU\h'h'5CJ\"jh'h'CJU\ h'h'0JB*CJ\ph"jh'h'CJU\jh'h'CJU\h'h'CJ\(h'h'0J>*B*CJ_HaJph!jh'h'CJU_HaJ'jh'h'CJU_HaJh'h'CJ_HaJPQ]^iq~h^hgd' & F gd'gd'-z { | " "*"""""""""###a$b$c$ȾȳȾș􏃏{n^njLh'h'CJUjh'h'CJUh'h'5h'h'CJH*\h'h'CJ\h'h'CJ_HaJh'h'0JOJQJh'h'OJQJh'h'5CJh'h'CJh'h'5CJH*\h'h'5CJ\h'h'CJ\h'h'5CJ\!-.}~1GC D z q!! & F-DM [$\$gd'gd' $^a$gd'h^hgd'!! " "*"+""""""""######$$^ $^a$gd'^gd' & F p**^*gd'gd' & F-DM [$\$gd'c$$$$$$$%%%!'"'A'B'j'''''''3(4(((((4+5+7+Z+ڻڜttttth[hh'h'5CJH*\h'h'5CJ\$h'h'5B*CJOJQJph(h'h'0J5B*CJOJQJph!h'h'B*CJOJQJphh'h'5CJ_HaJh'h'CJ_HaJh'h'5CJh'h'5h'h'CJjh'h'CJUh'h'0JB*CJph$$$%% '!'"'A'B'j''''4(((((()P)j)t)y) & Fgd' & FdP[$\$gd' dP[$\$gd'y))))))H***2+3+4+Z+h++++/,^,_,u,,- & F^gd' & F ^gd' $^a$gd' & Fgd'gd' & Fgd'Z+h+++++++.,/,],^,_,u,--l-m---].^._.g...//I/J/////00S0T0U0}0~00000000*1+1,1N1O1P1y1۸۸h'h'CJ"j@ h'h'CJU\ h'h'0JB*CJ\ph"j}h'h'CJU\jh'h'CJU\h'h'CJ\h'h'5CJ\6-m--^._.g../J/////0,11111;2 & F ^gd'^gd' & F^gd' 8^8gd' & F  ^gd'gd' & F^gd'y1z1{1111111:2;2222233[3j3>4U4V44444444488J9T9n;|;;;ĸĸĸĸĸĸĸĸĸwwwm`jh'h'CJUh'h'6CJh'h'5CJh'h'5h'h'5CJH*\h'h'5CJ\h'h'CJh'h'CJ_HaJh'h'5CJ\h'h'CJ\ h'h'0JB*CJ\phjh'h'CJU\"j h'h'CJU\%;2223\3]3j3>4U4V4W4[4c4p444444444 $^a$gd'^gd'8^8gd'd3@-DM gd'gd' & F ^gd'4444A55556O666666666666&7W7 & F^gd' & Fgd' & Fgd' & Fgd' & Fgd'gd'8^8gd'W7|77748n88888,9I9J9T9x9999M::: & F^gd' & Fgd'8^8gd' 8^8gd' & F ^gd'gd' & F^gd':;8;m;n;|;;}<~<<H=J={=I>J>]>>>>gd'p^pgd' & F^gd';<<<z<{<<<<===F=G=S={=|====F>G>]>^>>>>>>>jh'h'CJUjh'h'CJUjc h'h'CJUh'h'6CJh'h'0JB*CJphjh'h'CJUj~ h'h'CJUh'h'CJ/ =!"#$%; 0:p'/ =!"#$% P0xx 0/ =!"#$%E 0:p'/ =!"#$% P0` ` ` % 0:p'/ =!"#$%E 0:p'/ =!"#$% P0` ` `  0/ =!"#$%; 0:p'/ =!"#$% P0xx% 0:p'/ =!"#$%DyK yK http://searchenterprisedesktop.techtarget.com/definition/patch-managementDyK yK lhttp://whatis.techtarget.com/definition/collaboration DyK yK http://searchvirtualdesktop.techtarget.com/definition/desktop-virtualizationDyK www.windowsazure.comyK 8http://www.windowsazure.comDyK www.hpcloud.comyK .http://www.hpcloud.comDyK Thttp://www.northwoodsoft.com/Software-Development/Software-Development-Services.htmyK http://www.northwoodsoft.com/Software-Development/Software-Development-Services.htm1DyK ohttp://www.techrepublic.com/blog/the-enterprise-cloud/side-by-side-comparisons-of-iaas-service-providers/5717/yK http://www.techrepublic.com/blog/the-enterprise-cloud/side-by-side-comparisons-of-iaas-service-providers/5717/DyK yK Rhttp://www.meetingconnect.net/lotuslive/YDyK 9http://www.panterranetworks.com/products/voice/index.phpyK rhttp://www.panterranetworks.com/products/voice/index.phpDyK http://www.ringcentral.com/yK 8http://www.ringcentral.com/DyK \http://www.cs.columbia.edu/~roxana/teaching/COMS-E6998-7-Fall-2011/papers/armbrust-tr09.pdfyK http://www.cs.columbia.edu/~roxana/teaching/COMS-E6998-7-Fall-2011/papers/armbrust-tr09.pdfQDyK 7http://www.msptv.net/whitepapers/channel-112911-wp.pdfyK nhttp://www.msptv.net/whitepapers/channel-112911-wp.pdfDyK ^http://broadcast.rackspace.com/hosting_knowledge/whitepapers/planning-a-move-to-the-cloud.pdfyK http://broadcast.rackspace.com/hosting_knowledge/whitepapers/planning-a-move-to-the-cloud.pdfmDyK >http://networking.ringofsaturn.com/Tools/serverpowerusage.phpyK |http://networking.ringofsaturn.com/Tools/serverpowerusage.php@@@ NormalCJ_HaJmH sH tH R@R Heading 2$<@&56CJOJQJaJB@B a5A Heading 3 $x@& 5\_HDA@D Default Paragraph FontRi@R  Table Normal4 l4a (k@(No List r^@r a5A Normal (Web)!dd-DM [$\$B*CJOJQJ_HaJphBOB apple-converted-space6U@6 Hyperlink >*B*ph:b@!: HTML CodeCJOJPJQJRO2R first-paradd[$\$CJOJQJ_HaJ(W@A( Strong5OQ h3@V@a@ 'FollowedHyperlink>*B* ^W,,..6 p p [p |p p p 1q Rq q !z"zzzzzzK^~4 )W,p,,,...16bQl)CUV|}34NO78^8Q$mn{|oWEF L r s Z " # - \ ] z {   @ ^:KQdeoPQ]^iq~-.}~1GCDzq  *+ !"ABj4 !P!j!t!y!!!!!!H"""2#3#4#Z#h####/$^$_$u$$%m%%^&_&g&&'J'''''(,)))));***+\+]+j+>,U,V,W,[,c,p,,,,,,,,,,,,A----.O............&/W/|///40n00000,1I1J1T1x1111M222383m3n3|33}4~44H5J5{5I6J6]6666000`0ࡀ0ࡀ0ࡀ0ࡀ0ࡀ 0ࡀ0ࡀ0ࡀ0ࡀ 0ࡀ 0ࡀ 0ࡀ 0ࡀ 0ࡀ 0ࡀ 0ࡀ(0ࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ `0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 o@0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 `0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 o@0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oЀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 o`0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0 oࡀ0 oࡀ0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ 0 oࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ0ooࡀ0ooࡀ 0$ooࡀ 0$ooࡀ 0$ooࡀ 0$ooࡀ 0$ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ0ooࡀ0ooࡀ 0'ooࡀ 0'ooࡀ 0'ooࡀ 0'ooࡀ 0'ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0-ooࡀ 0-ooࡀ 0-ooࡀ 0ooࡀ 0ooࡀ`0ooࡀ 0#.ooࡀ 0#.ooࡀ 0#.ooࡀ 0#.ooࡀ 0#.ooࡀ 0#.ooࡀ 0#.ooࡀ0ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ0ooࡀ0ooࡀ 0.ooࡀ 0.ooࡀ 0.ooࡀ0ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0ooࡀ0ooࡀ0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ 0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀ0ooࡀUV|}34NO78^8Q$mn{|oWEF L r s Z " # - \ ] z {   @ ^:KQdeoPQ]^iq~-.}~1GCDzq  *+ !"ABj4 !P!j!t!y!!!!!!H"""2#3#4#Z#h####/$^$_$u$$%m%%^&_&g&&'J'''''(,)))));***+\+]+j+>,U,V,W,[,c,p,,,,,,,,,,,,A----.O...........&/W/|///40n0000,1J1T1x1111M222n3|33}4~44H5J5{5I6]66660@0@0@0@0@0@ 0@0@0@0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@*0@ 0A@ 0A@ 0A@0A@0A@ 0A@0A@0A@0A@0A@0A@0A@0A@ 0A@ 0A@ 0A@ 0A@ 0A@0A@0A@0A@0A@ 0A@ 0A@ 0A@0A@0A@0A@0A@0A@0A@0A@0A@ 0A@ 0A@ 0A@ 0A@ 0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@ 0A@ 0A@ 0A@ 0A@ 0A@0A@0A@ 0A@ 0A@ 0A@ 0A@ 0A@0A@0A@0A@0A@@0A@@ 0A@@ 0A@@ 0A@@ 0A@@ 0A@@ 0A@0A@0A@0A@ 0A@ 0A@ 0A@ 0A@ 0A@ 0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@0A@ 0A@ 0A@ 0A@0A@0A@0A@0A@0A@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@0A@@ 0A@@ 0A@@ 0A@@ 0A@@ 0A@@0A@@0A@@0A@@0A@@0A@@0A@A 0A@@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@0A3m@0A3m@0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@0A3m@0A3m@0A3m@0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@0A3m@0A3m@ 0H&A3m@ 0H&A3m@ 0H&A3m@ 0H&A3m@ 0H&A3m@0A3m@0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@0A3m@0A3m@ 0d)A3m@ 0d)A3m@ 0d)A3m@ 0d)A3m@ 0d)A3m@0A3m@0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@0A3m@ 0A3m@ 0]/A3m@ 0]/A3m@ 0]/A3m@ 0A3m@ 0A3m@`0A3m@ 0k0AA@ 0k0A3m@ 0k0A3m@ 0k0A3m@ 0k0A3m@ 0k0A3m@ 0k0A3m@0AA@0AA@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 0A3m@ 04A3m@ 04A3m@ 04A3m@ 0A3m@0A3m@ 0A3m@ 0A3m@ 0. 0. 0. 0. 0. 0. 0.0ݛ0b0 0.0ߥ0ݛ @0.0 0. 0. 0.Lc$Z+y1;> %(*-027 @!$y)-;24W7:>!#$&')+,./13456>" G X K:OQw<b(T(}(((*)O)z))34z445F5{55F6]6666XXXXXXXXXXXXXX8@0(  B S  ? _Hlt245190435@ 6@B 6;BHH6CT6?,LBb.l ؈JH$>2a!5L^>{iDKF?`wRhP&2fCxMf /%˔4D*$LDs*j?+l.Tg.&-04nMov:dFy#8BfQ1N?1V2bG&Vk7r]P\D_LiTi(L*Tmb 0nP p$;]xqi?y]xh P~ h^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hHh^`OJQJo(hHhpp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hHh^`OJQJo(hHh ^ `OJQJo(hHh  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`o(hH.^`5o() pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`OJQJo(hHhp^p`OJQJ^Jo(hHoh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hHh^`OJQJo(hHhp^p`OJQJ^Jo(hHoh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hHh^`OJQJo(hHhp^p`OJQJ^Jo(hHoh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hHh^`OJQJo(hH^`OJPJQJRJo(-hpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hHh ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.^`5o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. @ ^@ `OJQJo(hH ^`OJQJo(hHo pp^p`OJQJo(hH @ @ ^@ `OJQJo(hH ^`OJQJo(hHo ^`OJQJo(hH ^`OJQJo(hH ^`OJQJo(hHo PP^P`OJQJo(hH8@ ^@ `OJQJo(hH8@ @ ^@ `OJQJo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJo(hHo8^`OJQJo(hH8PP^P`OJQJo(hH8  ^ `OJQJo(hHo8^`OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`OJQJo(hHhp^p`OJQJ^Jo(hHoh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h ^`hH.h ^ `OJQJo(hHh  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.8@ ^@ `OJQJo(hH8@ @ ^@ `OJQJo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJo(hHo8^`OJQJo(hH8PP^P`OJQJo(hH8  ^ `OJQJo(hHo8^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(pp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hH8^`OJQJo(hH8^`OJQJo(hHo8pp^p`OJQJo(hH8@ @ ^@ `OJQJo(hH8^`OJQJo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJo(hHo8PP^P`OJQJo(hH8@ ^@ `OJQJo(hH8@ @ ^@ `OJQJo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJo(hHo8^`OJQJo(hH8PP^P`OJQJo(hH8  ^ `OJQJo(hHo8^`OJQJo(hH^`CJOJQJo(^`CJOJQJo(pp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h88^8`OJQJo(hHh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(iDBL-0P&H$ pF?xqn7r]CxD_?,!5Mov:Tg.h P~bG&VTiDs*/%#8B1V?y4D*?+1N*Tm.l                                    wjCl7֓'.HQ X                                     <                                           2xHЫ΃`؍Dhttp://networking.ringofsaturn.com/Tools/serverpowerusage.phpW$^http://broadcast.rackspace.com/hosting_knowledge/whitepapers/planning-a-move-to-the-cloud.pdf/8!7http://www.msptv.net/whitepapers/channel-112911-wp.pdfi \http://www.cs.columbia.edu/~roxana/teaching/COMS-E6998-7-Fall-2011/papers/armbrust-tr09.pdf*@http://www.ringcentral.com/[9http://www.panterranetworks.com/products/voice/index.phpN)http://www.meetingconnect.net/lotuslive/{3ohttp://www.techrepublic.com/blog/the-enterprise-cloud/side-by-side-comparisons-of-iaas-service-providers/5717/hRThttp://www.northwoodsoft.com/Software-Development/Software-Development-Services.htm%x http://www.hpcloud.comgU http://www.windowsazure.comMhttp://searchvirtualdesktop.techtarget.com/definition/desktop-virtualization[y6http://whatis.techtarget.com/definition/collaborationX<Jhttp://searchenterprisedesktop.techtarget.com/definition/patch-management  !"#$%&'()*+,-./012345678:;<=>?@ABDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FnbData 91TableCWordDocumentqSummaryInformation(DocumentSummaryInformation8CompObjX FMicrosoft Word DocumentNB6WWord.Document.8