Castelfranco Charter: Cloud Computing For Public Health

Castelfranco Charter: Cloud Computing For Public Health

A new revolution is occurring in communication and information technology, and that is cloud computing. People are becoming familiar with social networks and emails which are some of the services being offered by cloud computing. The main thrust of this revolution is to use the same concept being used in email and social networking to business so that applications and data can be shifted to the clouds. Great savings as well as better efficiency in both public and private sectors are expected to be generated if business entities shift to the clouds.

Asolo Ulss, a local public entity in Venice, Italy came up with a charter called Castelfranco Charter for public health. The charter offers suggestions for public entities when they shift to cloud computing. The recommendations were presented in an international conference tour.

The Castelfranco Charter recommends:

  • Use of a redundant broadband network to connect the company, the cloud service providers, and the clients.
  • Make sure the cloud service provider can offer use of a private cloud as an initial step before switching to a public cloud.
  • A roadmap must be presented when moving applications and data to the clouds under sustainable security, management, and economic conditions.
  • Ensure that the datacenters where the entity’s data will be stores are located in a country which guarantees regulations and laws are complied with.
  • Data portability and interoperability must be guaranteed by the cloud service providers if the entity wishes to take advantage of the offers of another service provider.
  • The cloud service provider must be able to ensure continuous operations while in the clouds.
  • Backup/data storage activities must be included in the cloud provider’s management policy.
  • The cloud service provider must put in writing its liability for interoperability failures, downtime, outages, theft and/or loss, and data misplacement.
  • The information and communication technology infrastructure must be modified for service management skills.
  • The entity must appoint a risk and privacy manager who will supervise security, protection, and data management.

Small and medium-scale companies as well as local public entities can also take advantage of the recommendations in order to move their applications and data safely to the clods. The benefits of cloud computing is highly depended on how fast business and public entities can adopt cloud computing therefore policymakers must be able to promote rapid adoption. These entities may have difficulties in overcoming data privacy, data portability, and reorganizations but these can be resolved by coming up with strategies before moving the systems to the clouds.

Cloud computing is continuously evolving and currently focused in providing software as a service, platform as a service, and infrastructure as a service. Because of this movement, software and hardware companies are creating a lot of services and data centers.

Compared to traditional platforms, cloud platforms can support various users through the internet and therefore becoming cost-efficient. Traditional platforms, on the other hand, are still founded on the use of the operating system on various infrastructure services as well as on custom and packaged applications.

Business organizations and public authorities can have great financial benefits when they take advantage of cloud computing because on a general scale, fixed costs are reduced because the entities do not need to spend heavily on fixed capital IT expenditures. SMEs can greatly benefit on cloud computing because money which is saved from capital expenditures can now be used on other more important projects.

By Florence de Borja

Sorry, comments are closed for this post.

Comics
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…