project
fthit.peddyi2Running Head: CLOUD COMPUTING IN WIPRO 1
CLOUD COMPUTING IN WIPRO 2
Cloud Computing in Wipro
IT Policy and Strategy IST 7100
Bilal Ahmed Syed
Nirup Naidu Sama
Wilmington University
Table of Contents
Abstract..............................................................................................................................4
Introduction.......................................................................................................................5
Background........................................................................................................................6
Product Life Cycle Management........................................................................................6
Wipro through Cloud computing........................................................................................8
Teamcenter’s data security assessment...............................................................................9
Need for the research..........................................................................................................10
Plan of Action.....................................................................................................................11
Proposed Budget................................................................................................................12
Tentative Schedule..............................................................................................................14
Evaluation...........................................................................................................................15
Conclusion & Recommendations........................................................................................16
References...........................................................................................................................18
List Of Figures
Figure 1. Budget Parameters table....................................................................................13
Figure 2. Demonstrates tentative time schedule ..............................................................14
Abstract
Cloud computing is the way of the future and this paper describes the concept of cloud computing and product life cycle management in the Information Technology field. This paper explores Team centers data security assessment and how cloud computing is implemented in Wipro Technologies (Indian based IT company). Different aspects like background, plan of action, budget, evaluation, schedule with respect to cloud computing are discussed after identifying the need for research and provides answers to what an organization needs to do in embracing the right cloud strategy and security.
Introduction
cloud computing has been bringing on part of buzz in the business sector for the sort of effect it has made in the field of data innovation. For organizations to combat growing competition on the global landscape, it has become all the more essential that it develops competencies to develop and innovate business products and practices, and an unbeatable capacity to respond effectively to changes occurring in the market. In order to solve the consistent inefficiencies in the product life management, IT bellwether Wipro has been forging ahead to introduce Cloud Computing services to promote business transformation by exploiting the potential of technology. The company strongly believes that with Cloud Computation adoption in its product lifecycle management (PLM), it would be able to eliminate various issues occurring throughout the process whilst actively participating in the innovating ecosystem around cloud applications. However, there are potential challenges in successfully incorporating the integrated solution to draw expected results in the company. This report is aimed to study high risk exposure with product life cycle management’s (PLM’s) cloud adoption in Wipro’s cloud computing services through ‘Teamcenter’. The report has been structured in a systematic manner, within which data security risks in cloud computing would be defined and analyzed to find tangible solutions. In addition, there would be a recommended plan of action to avert the potentially damaging repercussions for the company. The report would also include a tentative financial budget consideration which forms a tangible part of the report. It is expected that this report would be able to assist the company as well as academic researchers and practitioners to conduct in-depth research for deriving advanced solutions for the to be discussed organizational problem.
Background
Product Life Cycle Management
Product lifecycle administration has developed to be a key apparatus for organizations that permits them to streamline all the procedures related with item.A typical PLM includes a range of concepts, tools and technologies especially meant for research & development, innovations, design, development, testing, launching and sustaining products/services whilst pursuing a business endeavor. Every single phase of product life cycle involves specific rules, procedures and information vital for the next phase. In short, it is interconnected in such a way that all the required data is processed effectively to develop a system for complete lifecycle management with product data management (PDM) as its foundation (Staisch et al, 2012). However, before going further, it is essential that the concept of product lifecycle management is discussed to develop a comprehensive understanding about how cloud computing would help it grow more resulted oriented. Irrespective of what a company intends to launch, it would have to go through a well-designed product life cycle, which has to be managed thoroughly. Though the term product appears to be limited to products and services in general, the way companies are expanding in different industrial segments, the focus has been broadened in general under product data management. Also, defining product life is another challenge as it depends more or less on the context as well as its users (Staisch et al, 2012).
Product related data is generated throughout different phases of a product lifecycle. Nevertheless, PLM is connected to different areas of a company in link with the product or the service including its related processes and resources such as organizational structure, methods, supporting IT systems and more (Eigner & Stelzer 2009). All in all, the objective of PLM is very comprehensive which would require project-wide information management along with comprehensive process automation and an eventual harmonization of all the participating members (Staisch et al, 2012). With the rampant advancements in the field of information and technology, various technologies have emerged that could integrate product lifecycle management is such a way that all the inefficiencies are dithered away, thereby streamlining the entire business process. In order to do effective PLM, it must be ensured that the PLM is scaled to meet the business needs. Cloud computing is one of the fast emerging technology trends that has revolutionize the PLM of companies. This has allowed companies to easily access IT services and data over the internet (Staisch et al., 2012). In fact, cloud computing has become such a driving force in the industry that companies in the likes of Wipro, Infosys and many more have adopted it to improve their efficiency. Cloud computing in last few years has created such an irrepressible interest across all customer segments, including such large, small and medium business that it has drawn the attention of service providers across the industry to deliver industry driven solutions. Instead of offering a generalized solution, companies are striving hard to develop business-centric solutions so that market scenario could be transformed for the benefit of the customers by and large. Also, research substantiates that cloud computing could be a lot more cost effective as compared to other in-house IT solutions(Parihar, 2012). There are plenty of other benefits association with Cloud computing in PLM: cost saving, effective utilization of resources, easy maintenance, increased cooperation and more (Halpern et al., 2012).
The use of Big Data and data analytics is growing, value retained in the personal information that organizations store in the cloud also increase (Merrill, 2014). In addition, the definition of personally identifiable information (PII) is also likely to change with time. Henceforth, it becomes all the more imperative for the organization adopting cloud computing to consider the data security risk they may face in future.
Wipro through Cloud computing
In the current business environment, organizations are adopting various strategic routes in order to trim down its inefficiencies and increase it competitive element. Cloud Computing is fast emerging as an internet-based IT model which can assist companies dealing with some of the most pressing issues. Wipro leverages its domain expertise and years of experience in implementing IT solutions for various industries such as Banking, Telecom, Manufacturing, Healthcare, etc. Wipro strives to continue innovating its Cloud Computing services which would help the company achieve its commitment towards achieving customer satisfaction. Wipro InfoTech’s Cloud Computing Services provide effective IT solutions to cater to the customer requirements on a pay-peruse model. It is through Wipro's Tier 3 Data Centers that the organization has been giving its Cloud Computing administrations to its clients (Ramakrishnana, 2010).The comprehensive IT infrastructure is closely monitored under Wipro’s remote delivery center, GSMC. All the refined arrangements allow the company to build such confidence in its services that it continue to forge ahead to achieve more milestones. With Infrastructure as a Service (IaaS), associations get the adaptability to make a control on their venture design utilizing pay-per-use estimating by picking a Service Level Agreement (SLA)- driven virtualized IT foundation so as to meet their business prerequisites without owing it(Ramakrishnana, 2010).In addition, Software as a Service (SaaS) allows organizations to use pay-per-use pricing for business applications hosted in Wipro’s Enterprise Data Centres (Ramakrishnana, 2010). Both the cloud applications have varied pricing models that are modified according to the customer needs.
While nothing could contest the data security threats involved in Cloud Computing, there are ways and means to be adopted so that such scenarios are averted in the first place. Wipro's cloud based item lifecycle administration has been taken as a subject of study, for this report, which will give backing to Siemens PLM Software's Teamcenter portfolio (CIOReview, n.d.).This business move has been directed towards supporting electronics and semiconductor customers to deploy Teamcenter on the Cloud platform, there improving the product development process (CIOReview, n.d.). Wipro’s seasoned experience in PLM implementations and cloud technologies would likely provide more scope of growth for Teamcenter. Delivered through IaaS platform with a pay-as-you-go model, this is a cost efficient PLM that allows reduction in costs during every stage of product processes (Guta, 2014). This new venture has further strengthened the professional association between Wipro and Siemens whilst enhancing customer value through Teamcenter.
Team center’s data security assessment
Today’s companies are combating a dilemma as to how they respond to varying and dynamic business environment. Wipro has been striving hard to create more business opportunities for itself, whilst engaging itself in global partnerships so as to promote its commercial initiatives. In order to expand its reach in a varied forms of industries, Wipro has been strategically aligning with partners and new suppliers so as to exploit the domestic and international competencies. The secured PLM environment allows suppliers as well as customer to share intellectual capital without getting worried about any form of security leak. In order to strengthen data security protection, following security-related features have been incorporated in Team center (Siemens, 2011).
Need for the research
Among different difficulties in connection of Cloud Computing, information security and protection is one of the combative concerns hampering Cloud selection in India.Even though attention is paid to ensure no data risk security threat, a lot depends on the service providers to ensure that any such unwarranted scenario does not occur where confidential data leaks causing tangible damage to the stakeholders. Data privacy and data security are fast emerging parameters for Wipro as well to consider as it has been expanding its Cloud Computing services in its product life cycle management through Teamcenter. Be it the authorization of IT (Amendment) Act, 2008 (ITAA 2008) or nonappearance of encryption strategy under ITAA 2008, the difficulties are developing for the Cloud Computing to grow its points of view. Though this has strengthen the company to provide integrated solutions to its business problems, it has also exposed Wipro to potential data security risk. There are growing concerns that PLM in the cloud computing could expose Wipro to various data security risks. There is dire need that the lingering concerns around data security are not left unattended and are addressed accordingly. Since the need for research has been established, the next section would discuss the data security parameters incorporated in Teamcenter to provide high level of protection to external partners, suppliers and customer so as to facilitate different services in a secure PLM environment.
Migrating from an exceptionally secured data center to Internet-based Cloud framework would necessitate security and privacy concerns. Data loss or any kind of data leakage could have a detrimental impact, and so is the case of intellectual property of the business (Data Security Council of India, 2010). With global concerns around hacking, the confidential data saved on Cloud is under severe threat of being illegally and unethically accessed by third parties or other notorious elements. In this context, Wipro’s Cloud Computing services would also require in depth assessment so that data security and privacy could be strengthened.
Plan of Action
Define Business Problem and its proposed solution
Whilst Teamcenter has established itself as one of the most preferred PLM software around the world to meet varying needs of industries, data security would continue to be one of its primary concern. With growing business complexities and quantum of data exchanged around, it has come to the fore that product manager and engineers would have more intricate data protection needs in specific industries. However, sharing such confidential and potentially vulnerable information could be extremely detrimental. In order to cater to the refine levels of data security, the company needs to incorporate certain changes wherein global companies can collaborate on product designs in the actual document formats itself instead of asking for regular conversions. This would allow the users to continue with the processing on its native level instead of seeking another format. This would not only improve administrative function but would enhance customer experience. In order to do so, the company needs to conduct in-depth research to incorporate this security feature to develop a comprehensive data security framework. For such refine requirements to be met and eventual analytics developed based on the same so as to conduct a comparative analysis in varying scenarios, it would require IT infrastructure to be modified in a refined way. For the same, service oriented architecture (SOA) modifications would have to be made which could get very complex and refined considering the definition of the problem (Siemens, 2011). However, it has to be evaluated in such a way that the modifications do not let the system get weak in terms of data security and other regulatory compliances. Following steps would briefly explain the steps to be incorporated for implementing the proposed changes:
1. Selecting right mix of IT team members comprising of supporting specialists or consultants.
2. Searching and finalizing the list of all the IT resource requirements in consultation with the IT vendors.
3. Defining Centralized service model implementation for the proposed business solution.
4. Preparation of tentative budget for the proposed business solution.
5. Preparation of tentative Schedule for the proposed business solution.
6. Defining evaluation models/methods/techniques to verify the actual outcomes and its comparison from the desired results.
After conceptualizing all the details of the proposed business solution, a tentative estimate regarding the budget and total duration would be developed. This would give a fair picture as to how the project would pan out and help Wipro enhance its data security protection.
Proposed Budget
For the said business problem to improve data security at a refined business level, SOA modifications would have to be accessed, and according to the same, a list of technical requirements would be listed out with a tentative costing attached. Such additional modifications to adjust the business needs demand significant proportion of budget to be incorporate to define the boundaries. Also, the data security would be of utmost importance in this scenario. This primarily entails refined IT infrastructure that caters to business need whilst maintaining same data security feature. In order to do so, Cloud Computing service provider would have to clearly define the required SOA changes to escalate the issue further up to Wipro’s concerned IT security department.
For the said business solution, following budget parameters would be configured:
S.No |
Expenses |
Tentative estimate |
1. |
Hardware cost |
-$50,000 |
2 |
Software cost ( including software maintenance) |
$1,00,000 |
3 |
Data Center |
$ 30, 000 |
4 |
Data Network |
$ 20,000 |
5 |
Infrastructure deployment |
$15,000 |
6 |
Salaries ( IT team) |
$30,000 |
7 |
Salaries ( IT vendors) |
$15,000 |
8 |
Software licenses |
$10,000 |
9 |
Training |
$10,000 |
10 |
Software Maintenance Contract Fees |
$25,000 |
Figure 1. Budget parameters table.
From the above drafted tentative budget required for various resources required for the implementation of proposed business solution. This would primarily form the basis for the proposed business solution to be accepted or not by the concerned authority (IT manager). All the funding would be managed by the company’s financial department based on the projected return on investment and the potential benefits that could be accrued from the proposed business solution.
Tentative Schedule
Since the business needs are complex, it would take the concerned office to arrange and actualize the whole procedure in around 1 year 2 months from the date of endorsement.A tentative schedule would be prepared alongside which would help the company get a fair idea about how long this business need would get its integrated solution within the comprehensive IT framework. This tentative schedule would allow the service provider to get its designated data security team on incorporating the required changes. However, data security and other regulatory challenges would have to be kept on the utmost level throughout.
Jul-15 |
Aug-15 |
Sept--15 |
Oct-15 |
Nov-15 |
Dec-15 |
Jan-16 |
Feb-16 |
Mar-16 |
April-16 |
May-16 |
Jun-16 |
Jul-16 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Plan and analyse business problem |
|
|
|
|
|
|
|
|
|
|||
Detailed Project Proposal |
|
|
|
|
|
|
|
|
|
|
||
|
|
|
System Designing ( SOA) |
|
|
|
|
|
|
|
||
|
|
|
|
|
Building System Changes |
|
|
|
|
|||
|
|
|
|
|
|
|
Evaluation Model Design |
|
|
|
||
|
|
|
|
|
|
|
Training |
|
|
|||
|
|
|
|
|
|
|
|
|
Amendments |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Go Live |
Figure 2. Demonstrates tentative time schedule.
This tentative time schedule would give a fair picture as to how the proposed business solution would pan out in terms of duration.
Evaluation
Business solutions are required to be evaluated based on the expected results. For the existing business case, following steps would be taken to evaluate the proposed business solution:
1. Defining the quantifiable parameters to create the basis for evaluation.
2. Finding suitable methods or tools to determine the value of evaluation parameters.
3. Comparing the extracted values with the desired value of the selected parameters.
4. Assessing the possible reasons causing the received gap between the intended and actual value of the evaluation parameters.
5. Devising techniques to eliminate or manage the causes behind the deviated results.
Through following steps, evaluation of the proposed business solution would be done so as to verify if it has brought the deserving changes in the gross outcomes.
Conclusion and Recommendations
From the proposed solution and assessment of the existing security features in Teamcenter, it was found that the PLA software could easily incorporate the intricate security feature along with meeting the proposed refined details. Now customers would be able to manage refine data needs in their native formats instead of seeking transformation. This comprehensively helped the company develop a consolidated framework within which it develop the confidence to manage such small customer needs without compromising on the data security features. In fact, such refined business requirements allow the company to bring out required out of box solutions to meet a diverse range of business needs of clients.
Since data security is such a major challenge for the today’s organizations, it has become a growing need for the IT service providers to keep on working out possible solutions to upgrade business solutions for organizations, irrespective of their size, nature, and business needs. With the kind of data complications global businesses face, PLM software such as Teamcenter should be promoted and furthermore be incorporated in various industries. While Cloud Computing has been transforming global business landscape, there lies a bigger need to provide the best possible security features for protecting the confidential data of various users. While Wipro is expanding its reach across lengths and breadths, it has become a growing need that IT initiatives such as Cloud Computing get the much desired boost in the Indian market as well in the way it has revolutionized the international market. Security standards and certifications especially serving the Cloud environments should be formed to achieve successful implementation of Cloud services.
In addition, the user organizations should incorporate their IT and legal team during the contract making process. There is dire need to develop high standards for information security practices, and various other techniques. It is of utmost important that both the user organizations and Cloud service providers work jointly to form a robust information security system so as to derive effective business solutions without compromising on the data security needs.
References
CIOReview. Wipro Releases Cloud Based Product Lifecycle Management Services for Siemens. Retrieved 12 june, 2016, from http://travel-hospitality.cioreview.com/news/wipro-releases-cloud-based-product-lifecycle-management-services-for-siemens-nid-1907-c. (n.d.).
Eigner, M., & Stelzer, R. (2009). Product Lifecycle Management. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg.
Guta, M. (2014). Wipro to Support Siemens Teamcenter Portfolio. Msptoday.com. Retrieved 14 June, 2016, from http://www.msptoday.com/topics/msp-today/articles/372607-wipro-support-siemens-teamcenter-portfolio.htm.
Halpern, M., Dominy, M., Scheibenreif, D. and Jacobson S., (2012). A Quick Look at Cloud Computing in Manufacturing Industries, 2012. Gartner, Inc., 1-13. Joseph, M. (2015). Cloud in business - adoption drivers. Wipro.com. Retrieved from http://www.wipro.
Merrill, T. (2014). CLOUD COMPUTING: IS YOUR COMPANY WEIGHING BOTH BENEFITS & RISKS.
Parihar, A., 2012. PLM and Cloud Computing .Retrieved from http://www.infosys.com/engineering-services/features-opinions/Documents/social-plm.pdf.
Ramakrishnan, Anand. (2010). Cloud: The Technology Enabler for Enterprises. Retrieved from http://www.wipro.com/documents/cloud-eGov_362010_194056.pdf.
Siemens (2011), Security Management [White Paper]. Retrieved from http://m.plm.automation.siemens.com/en_us/Images/Siemens-PLM-Teamcenter-Security-Management-wp_tcm1224-127429.pdf.
Staisch, A., Peters, G., Stueckl, T., & Sergua, J. (2012). Current Trends in Product Lifecycle Management. 23Rd Australasian Conference on Information Systems. WIPRO, (2010). Security and Privacy in Cloud Computing. Retrieved from https://www.dsci.in/site.