Blockchain, Artificial Intelligence & Quantum Computing (FIN4721) Session 7 Mid-Term Exam & API Banking Professor Sarat Mohanty Sep-2022 Lesson overview 1.LearningHave you downloaded the assessment file in your objectives laptop? 2. Start time is 6.45pm 3. End time is 7.45pm 4. Answer upload deadline is 8.45pm Lesson overview Learning objectives Topics - Group project brief - Mid-Term Student Survey Brief ************************************************* API Banking ************************************************* Lesson overview Learning objectives Group Project Clarifications/Questions/Issues Lesson overview THE API BANKING @ FINANCIAL INSTITUTIONS API VIDEO Lesson overview https://youtu.be/r8DRt7wORHE API BANKING Lesson overview What is Application Programming Interface (API) In Banking API Benefits In Financial Institutions, APIs are becoming a common method of data exchange to facilitate a realtime banking transaction 1) between customer & Bank, 2) between Bank to Bank, 3) between Bank & 3rd party platforms, 4) between Bank & regulators. Banks are opening up the access to their systems by external partners. Speed & Efficiency: Products & Services Offered In API Banking Industry Standard: Foreign Exchange Buy & Sell Cash Payments & Collection API Connectivity Real-Time Bank Balance API Connectivity Bank Reconciliation Data Transaction Status API integration allows data or instructions to be executed on a real-time basis Customer/FIs/3rd Party platform/Regulators all on a single integration architecture facilitates synchronised transaction processing Productivity: Eliminates IT setup, maintenance & monitoring activities. API Connectivity Improved IT ROI: Reduced IT investment on different integration needs. Supports cloud computing strategy on cost reduction. Financial Institutions Government Agencies Customer Ecosystem Financing Platforms What is API? • Application Programming Interface • RPC (XML, JSON) • REST (Representational State Transfer) • SOAP (Simple Object Access Protocol) • Query, Aggregation, etc. • REST is an architectural style API where messages are sent in a single direction. • SOAP is a messaging language that allows for two-way communication. • REST and SOAP provide different benefits to businesses, such as scalability, security, and data transmission efficiency. However, integrating a banking app or website with an API is easy and quick–making it simple for businesses to take advantage of all the benefits these platforms have to offer! API and Banking • Convenience, Customization • Private, Partner, Open / Public API • Regulators, Third party companies, FinTech • Data Aggregation • Payments • Value Added Services Bank Mobile / Internet Apps Fintech Apps API Layer Bank Customer Data Open, Partner & Private API Open API • • Open/Public APIs are publicly available for anyone to use. Out of all the types of API, these are the most commonly used API types. Some of them may require the developer to register to obtain an OAuth or an API key to use the API. Otherwise, they are entirely open. The publisher controls which data or content is exposed, and they typically expose content available publicly and not copyrighted. Museum, Library etc. use Public APIs which allow their users to access their information from other applications. Partner API • • • • The second types of API in our article is Partner APIs. Partner APIs are APIs used to communicate between two strategic business partners. Most companies have public APIs that their partners can connect to easily. However, there could also be situations where the partners are sharing sensitive data among them, requiring the access to the API to be restricted. Most of the time the API owners take care of access management. But they can also involve a third-party API gateway to do the access management job. These types of API almost always perform a specific task. Partner APIs provide value addition for a business as well as an upsell, thus making it a must-have for many businesses. Private API • Private APIS are used within one organization. Companies that develop multiple products use these types of API widely to communicate with their own different products. For example, in a bank, customer channel platform system communicates with its core banking system via APIs. • Internal APIs use custom business logics which are unique to that business. Even though they are used internally, they are still vulnerable to attacks. This can be overcome by exposing them to an internal API developer portal, which connects to an internal IAM system to authenticate users, and ensure they have access to the correct set of APIs. Design and Architecture Internet • Content Delivery Networks (CDN) • Firewalls • API Gateways • Aggregator services • Microservices • Event Streaming /Message Queues • Core Banking and Databases CDN Firewalls , Webservers API Gateway Aggregator Svc Demilitarized Zones Internal Network Microservices Microservices Event Streaming/ Message Queues Core Banking Databases Security and Compliance • Certificates, Mutual TLS • Authentication and Authorization (OAuth, JWT, etc.) • Penetration Testing • Privacy Impact Assessments • Regional and Group Compliance Mutual transport layer security(TLS), is a method for mutual authentication. This ensures that the parties at each end of a network verify using the correct private key. OAuth / JWT let application developers securely get access to your users' data without sharing their passwords. Scalability and Observability • Cloud hosting • Scalability • Availability zones (Compliances) • Monitoring and Observability • Managing Upgrades OBSERVABILITY Metrics Tracing Monitoring Logging Monetizing API • Licensing / Subscription revenue • Transaction fees • Revenue sharing with partners • Revenue from services or products (Payment channels, Loan origination, KYC) Blockchain, Artificial Intelligence & Quantum Computing (FIN4721) Session 8 Quantum Computing Professor Sarat Mohanty Oct-2022 Lesson overview Learning objectives Topics - Recap last class - Group project, presentation template - Introduction to Quantum Computing ************************************************* Guest Speaker – Mr. Subrat Kumar Kanungo, Kyndryl, IBM India **************************************************************** Recapoverview of last Lesson class - API Banking 1. Client server model ver API model Internet 2. RESTobjectives & SOAP Learning CDN 3. Public API, private API & Partner API 4. Content Delivery Networks (CDN) 5. Firewalls & API Gateways 6. Aggregator services 7. Microservices 8. Event Streaming /Message Queues 9. Core Banking and Databases Firewalls , Webservers API Gateway Aggregator Svc Demilitarized Zones Internal Network Microservices Microservices Event Streaming/ Message Queues Core Banking Databases 10.Monetization of APIs (Licensing / Subscription revenue/Transaction fees/Revenue sharing with partners/Revenue from services or products (Payment channels, Loan origination, KYC) Lesson overview Learning objectives Group Project – Important Information Total allotted group presentation time – 30min (changed from 20 min) Actual Presentation Time: 20 min Q&A, Feedback/Challenge Time: 10 min Submission deadline: 1. Submission deadline – 2 Nov, 6pm, section A1 2. Submission deadline – 3 Nov, 6pm, section A2 Point Weightage: 1. 60% on presentation 2. 40% on challenge, & constructive feedback to other groups Submission Instructions 1. File Name: Section No+Group No.ppt (example: A1-Group 1.ppt) 2. Submission Folder: LumiNUS→Files→Group Project Groups will be split into 2 sessions st Group schedule will be announced during class 11(1 nd session of group presentation), 2 Nov – Section A1, rd 3 Nov – Section A2 Feedback/challenge group number will be announced just before the start of the presentation. Lesson overview Learning objectives Group Project – Presentation Template Cover Slide Digital Banking Transformation - Group Project Group No: Group Members (Name & ID): a. Current state b. Legacy systems, manual operations, longer lead-time & threat of Fintechs etc. c. External demand (customer, regulator etc.) No of slides: 1 a. New digital trend, adoption of new technologies, changing of banking landscape i.e. Fintech/AI/Blockchain etc, b. External changes (customer, regulator, industry etc.) No of slides: 3 No of slides: 3 a. Cloud computing, API Banking, Blockchain, AI/IoT/ML, DeFi, Fintech Collaboration models etc. b. Meeting customer’s digital expectations, automating internal processes & safe guarding Cyber threats/AML/Fraud a. Transition path for the bank over 3-5 years(new talent, new technology, change management etc.) b. Risks, challenges & how to overcome them? No of slides: 2 a. Why should bank implement your proposal? No of slides: 1 Introduction to Quantum Computing Video Video recap 1. Problems that can take upto billion year to solve by normal computers 2. You can solve these problem in seconds by quantum computer 3. Rotating Donut 4. Industries i.e. medical, supply chain etc 5. Superconductors, IBM & Google 6. Chandelier to cool down the quantum chip 7. Breaking the complex encryption faster 8. Complex AI algorithms 9. We are not there yet, waiting for the powerful quantum computer to arrive to do all the above What is Quantum Computing Conventional computing relies on the principles called “Boolean algebra”; usually Operates with a 3 or 7-mode logic gate principle. In conventional computing, data must be processed in an exclusive binary state at any point in time; either 0 (off / false) or 1 (on / true) . Classical computers store data in memory and process stored data with simple mathematical operations i.e. add & subtract. Storage and processing task is performed using switches called transistors, which are like microscopic versions of the switches you have on your wall for turning on and off the lights. A transistor can either be on or off, just as a light can either be lit or unlit. If it's on, we can use a transistor to store a number one (1); if it's off, it stores a number zero (0). More complex processing is performed by stringing together the simple operations into a series called an algorithm . Quantum computing is the new generation high processing computer system that uses the principles of quantum theory of energy and material on the atomic and subatomic levels. Quantum computing uses subatomic particles, such as electrons or photons. Quantum computing uses Quantum bits, or QUBIT that allows these particles to exist in more than one state (i.e., 1 and 0) at the same time. In physics, a quantum is the smallest possible unit of any physical property. It usually refers to properties of atomic or subatomic particles, such as electrons, neutrinos, and photons. A QUBIT is the basic unit of information in quantum computing. Qubit plays a similar role in quantum computing as bits play in conventional computing, but they behave very differently. Classical bits are binary and can hold only a position of 0 or 1, but qubit can hold 1,0 or 1 and 0 simultaneously with overlapping(superposition) and intertwining(entanglement) as per the law of physics. In another words, they’re both on and off at the same time, or somewhere on a spectrum between the two. Superposition & Entanglement Superposition In superposition, quantum particles are a combination of all possible states. They fluctuate until they're observed and measured. One way to picture the difference between binary position and superposition is to imagine a coin. Classical bits are measured by "flipping the coin" and getting heads or tails. However, if you were able to look at a coin and see both heads and tails at the same time, as well as every state in between, the coin would be in superposition. Entanglement Entanglement is the ability of quantum particles to correlate their measurement results with each other. When qubits are entangled, they form a single system and influence each other. We can use the measurements from one qubit to draw conclusions about the others. By adding and entangling more qubits in a system, quantum computers can calculate exponentially more information and solve more complicated problems. 3 Lesson STEPoverview APPROACH OF QUANTUM COMPUTING Area that holds QBITS • For some methods of qubits storage, the unit that houses the qubits is kept at a temperature just above absolute zero to maximize their coherence and reduce interference. Other types of qubit housing use a vacuum chamber to help minimize vibrations and stabilize the qubits. Method to transfer signals to QUBITS • Signals can be sent to the qubits using a variety of methods, including microwaves, laser, and voltage. Conventional computer to run a program and send instructions Why Quantum computing The amount of data being created every day is gigantic – and current computers will not be able to keep pace for much longer. Modern super computers are still too slow to perform some of the most important scientific tasks like testing the effects of new medicines at the molecular level. With the ability to perform very complicated calculations more quickly, or to even model those drugs at the molecular level, quantum computers provide a much-needed performance boost. Most data scientists agree that quantum computers are our best chance to deal with the challenges of the 21st Century. Quantum computing and AI Another hot-topic is artificial intelligence. In its current most well-known implementations, artificial intelligence runs on vast servers, utilizing trillions of binary bits to run extremely complex neural networks and other AI algorithms. A large resource that many facets of AI rely on is parallel computing, which future quantum computers will be significantly better geared for doing than future binary machines. This does not mean that all AI will live only on quantum computers, but rather that the most complex workloads within large AI algorithms could be handled by quantum computers supplementing other core functions of binary-based workloads. Industry application of quantum computing Industry Healthcare Area Description Research/diagnostic/ treatment 1. Quantum computers will allow much larger molecules to be simulated. Researchers will be able to model and simulate interactions between drugs and all 20,000+ proteins encoded in the human genome, leading to greater advancements in pharmacology. 2. To provide faster, more accurate diagnostics with a variety of applications. Boosting AI capabilities will improve machine learning – something that is already being used to aid pattern recognition. High-resolution MRI machines will provide greater levels of detail and also aid clinicians with screening for diseases. 3. Certain treatments, such as radiotherapy, depend upon the ability to rapidly model and simulate complex scenarios to deliver the optimal treatment. Quantum computers would enable therapists to run more simulations in less time, helping to minimise radiation damage to healthy tissue. Finance Fraud detection/algorithmic trading 1. The use of complex algorithms to automatically trigger share dealings based on a wide variety of market variables. The advantages, especially for high-volume transactions, are significant. 2. Like diagnostics in healthcare, fraud detection is reliant upon pattern recognition. Quantum computers could deliver a significant improvement in machine learning capabilities; dramatically reducing the time taken to train a neural network and improving the detection rate. Marketing Big data analysis 1. Big data analytics using quantum computing method will allow commerce and government to precisely target individual consumers, or voters, with communications tailored to their preferences; helping to influence consumer spending and the outcome of elections. Logistics Supply chain efficiency Weather forecast 1. Improved data analysis and modelling will enable a wide range of industries to optimise workflows associated with transport, logistics and supply-chain management. The calculation and recalculation of optimal routes could impact on applications as diverse as traffic management, fleet operations, air traffic control, freight and distribution. Meteorology 1. With so many variables to consider, accurate weather forecasts are difficult to produce. Machine learning using quantum computers will result in improved pattern recognition, making it easier to predict extreme weather events and potentially saving thousands of lives a year. Climatologists will also be able to generate and analyse more detailed climate models; proving greater insight into climate change and how we can mitigate its negative impact. Quantum Computing & Financial Services 1. Financial institutions that can harness quantum computing are likely to see significant benefits. 2. Especially, they will be able to more effectively analyze large unstructured data sets. 3. Sharper insights into these domains could help banks make better decisions and improve customer service, for example through timelier or more relevant offers (perhaps a mortgage based on browsing history). There are equally powerful use cases in capital markets, corporate finance, portfolio management, and encryption-related activities. 4. In an increasingly commoditized environment, this can be a route to real competitive advantage. 5. Quantum computers are particularly promising where algorithms are powered by live data streams, such as real-time equity prices, which carry a high level of random noise. 6. Real-time experience dealing with significant data size can be made possible while delivering AI/Blockchain outcomes References used: 1. 2. 3. 4. Microsoft.com IBM.com Bbva.com McKinsey.com Blockchain, Artificial Intelligence & Quantum Computing (FIN4721) Session 9 Compliance/Fraud/Cybersecurity/Anti Money laundering Professor Sarat Mohanty Oct-2022 Lesson overview Learning objectives Topics - Recap last class - Group project, discussion points - Digital compliance, Fraud, AML ************************************************* Guest Speaker – Mr. Sheetal Kumar, DBS Singapore **************************************************************** Lesson overview Learning objectives Group Project Recap - Quantum Computing Quantum Computing is derived from the Quantum theory of physics (atoms & sub-atoms) In superposition, quantum particles are a combination of all possible states. They fluctuate until they're observed and measured. Superposition A QUBIT is the basic unit of information in quantum computing. Qubit plays a similar role in quantum computing as bits play in conventional computing, but they behave very differently. Classical bits are binary and can hold only a position of 0 or 1, but qubit can hold 1,0 or 1 and 0 simultaneously with overlapping(superposition) and intertwining(entanglement) as per the law of physics. In another words, they’re both on and off at the same time, or somewhere on a spectrum between the two. Entanglement Entanglement is the ability of quantum particles to correlate their measurement results with each other. When qubits are entangled, they form a single system and influence each other. By adding and entangling more qubits in a system, quantum computers can calculate exponentially more information and solve more complicated problems. Lesson overview DIGITAL COMPLIANCE @ FINANCIAL INSTITUTIONS Lesson overview Customer Facing DIGITAL COMPLIANCE Digital Banking @ FI Bank’s Internal Processes covers these 2 areas Regulatory & Social Governance DIGITAL COMPLIANCE VIDEO Lesson overview Learning objectives VIDEO RECAP Lesson overview 1. 2 out of 3 top issues for banks are: Digital Transformation & Regulation 2. Banks needed to be safe Learning objectives eg: compliance function 3. Tens of thousands of people in middle office doing manual work around DATA (processing, cleansing, duplication) 4. Huge cost to serve 5. Throwing loads of people doesn’t help, let’s automate……………Regulatory Technology or REGTECH 6. Delivering a better customer experience whilst dealing with compliance 7. Regulation & technology intersects…………. CONSEQUENCES OF WEAK COMPLIANCE Lesson overview UNDERSTANDING REGULATIONS ACROSS BORDERS Lesson overview Banking Regulated Activity • • • • eg: license to do corporate/retail/investment Licensing and Marketing banking from MAS. Only do marketing for these Data and Outsourcing products Conduct and Conflict of Interest Money Laundering, Sanctions & Bribery & Corruption risk Enforcement • Permissible, partially or not allowed • Higher scrutiny and monitoring eg: high risk countries • Risk appetite Control Measures • • • • Currency and conversion rules Export and Import restrictions & approval Mandated documents Monitoring and reporting of inflow and outflow eg: suspiciously large amount of inflow KEY CHALLENGES TODAY 1/2 Lesson overview Top 10 challenges today for banks 1.Cyber Security 2.Anti Money Laundering 3.Financial crime & Terrorist Financing 4.Fraudulent Transaction 5.Staff conduct 6.Sanction breach 7. Manual process 8. Shortage of good staff 9. In-adequate investment in automation 10. Digital threat (external) KEY CHALLENGES TODAY 2/2 Lesson overview single data source 1. Fragmented data across compliance functions and lines of businesses. Without a “golden source,” it is difficult for banks to process and analyze the required data for compliance and oversight. 2. Lack of an enterprise-wide single customer view. A single customer’s multiple relationships residing in multiple systems of the bank causes a challenge in holistic monitoring and analysis of customer behavior. incorrect alerts 3. High volume of false positive alerts in AML and fraud control. In the range of 90 percent or more for most large banks globally, this is one of the key pain points caused due to usage of legacy rule-based detection systems. This also exposes banks to slippages on true alerts, which is a compliance violation. 4. Manual, effort-intensive processes, like KYC activities and alert investigations. These activities are time-consuming, error-prone and costly, and they constitute a bulk of the compliance function in banks. 5. Legacy systems are incapable of combining structured and unstructured data. Unstructured data holds a huge amount of hidden information about customer behavior. Emails, chats, web and social media clips of customers, if analyzed in the right context, can generate early warning signals of suspicious behavior. https://www.corporatecomplianceinsights.com/emerging-technologies-banking-compliance/ RISK MANAGEMENT FRAMEWORK Lesson overview Controls Enablers Client due diligence CDD & KYC Assurance Sanctions compliance Risk assessment Surveillance Learning pro-active (using AI/ML) Anti-bribery & corruption Resources Governance Information & reporting INTRODUCTION TO DIGITAL COMPLIANCE Lesson overview eg: companies with many legal entities Analytics-based entity resolution can generate a single view of a customer maintaining multiple identities and relationships across the bank, without having to overhaul any of the bank’s disparate legacy systems holding the customer data. Sophisticated analytics are used for such matching, sometimes augmenting the bank’s data with that of external third-party data to arrive at accurate matches. AI-based network and linkage analysis is becoming an increasingly important tool for banks to identify hidden relationships and networks through which financial crimes might be committed. Banks are using such tools to generate insights on suspicious hidden relationships and criminal networks. These tools link the data available in the bank – including unstructured customer data in the form of mails and chats – with the data available in external sources, including social media, to unearth suspicious networks. Such networks can then be red flagged by the bank and subjected to greater scrutiny for detecting financial crimes. Machine Learning (ML) based platforms in optimizing alerts and reducing false positives. These platforms have already delivered great results in financial crimes detection and investigation. ML-based alert generation solutions can discover suspicious behavior leading to money laundering and fraud and can detect outliers even when they do not breach any defined alert triggering scenario – something rule-based platforms are incapable of. Some banks are also using ML tools to automatically discount false alerts generated by the rule-based systems using dynamic rules created by the ML algorithm. DIGITAL BANKING PAYABLE FINANCING Lesson overview Automated ID and document verification Using mobile image processing with deep-convolution biometric face matching, automated ID and document verification tools are enabling straight-through processing of KYC. After installing these applications in their phones, customers can operate them directly to upload ID documents and selfie videos as part of KYC during onboarding, as well as during periodic and ad-hoc reviews. Biometrics and computer vision technology for fraud prevention. These solutions are gathering momentum, even as online and card fraud continues to increase. Multi-factor authentication, using the customer’s fingerprint, face or iris scan, voice or keyboard dynamics is being enabled in various payment channels, as such inherent customer biometrics can be very difficult to steal or replicate and can help prevent payment fraud. Machines’ speech and visual recognition capability is steadily improving, and it is expected to exceed that of humans in the next few years! Robotic process automation (RPA) in KYC and AML functions like onboarding, alerts and case management are fast becoming the norm in FIs. The software robots are programmed to mimic human steps, which are repetitive and rule-based, and can complete tasks involving accessing multiple systems, data entry and collation, report generation and so on – just like humans, but at a fraction of the time and cost. Standard Bank, Africa’s largest bank, has used RPA combined with AI-based cognitive automation to bring down the client on-boarding and KYC timelines from 20 days to five minutes! DIGITAL COMPLIANCE Lesson overview https://boston-consulting-group-brightspot.s3.amazonaws.com/img-src/BCG-Transforming-Bank-Compliance-with-Smart-Technologies-July-2017-2_tcm9-164957.pdf REAL LIFE CASE STUDY – IMPORT INVOICE FINANCING Lesson overview Customer Submits Docs For financing of 5 mio USD Invoices 1. 2. 3. 4. 5. Copy of invoice Copy of packing list Copy of customs clearance Copy of purchase order Copy of Bill of lading Name Screening (Various Systems, Automatic & Manual) 1. 2. 3. 4. Sanction check Terrorist check PEP check Adverse Media Check Trade Operations Validated Docs (manual) 1. 2. 3. 4. Suspicious/Alerts/ Investigation (System + Manual) Trade Operations Creates financing request (System) Transaction Screening (Various System) Automatic & Manual) Checks PO ver Invoice for product/qty/price etc Checks market price for under or over valuation Logs in to customs portal to verify packing list as per Bill of lading Validated if the container was off-loaded and re-loaded with other goods etc? 1. 2. 3. 4. 1. 2. 3. 4. Interacts with customer Interacts with various authorities Physical verification at customer warehouse if reqd. Reporting to authority Importer’s entity name, biz activity Exporter’s entity name, biz activity, Bank details Authorised person name screening Validated if the container was off-loaded and re-loaded with other goods etc? Financing Approved/Rejected (System) FINTECH VIEW OF IMPORT INVOICE FINANCING COMPLIANCE FLOW Lesson overview manual system vs automated system Importer & Exporter Customer Submits Docs For financing of 5 mio USD Invoices 1. 2. 3. 4. 5. API Copy of invoice Copy of packing list Copy of customs clearance Copy of purchase order Copy of Bill of lading Data Collection Platform/Fintech (automatic & exceptions) Data Analysis Platform/Fintech (automatic & exceptions) 1. OCR tool 2. Voice & speech recognition tool 3. Image & facial recognition Multi Country Suppliers 1. Data Mining 2. Case based reasoning 3. Rule based expert system Fintech /3rd Party Platform Learning Platform/Fintech (automatic & exceptions) 1. 2. 3. 4. 5. Supervised learning Unsupervised learning Reinforcement learning Deep learning Recommender system API Bank 1 Action Platform/Fintech (automatic & exceptions) 1. 2. 3. 4. 5. 6. 7. Natural-language understanding Natural language generation Speech synthesis Machine translation Sentiment analysis Business process management RPA Bank Transaction Processing LEADING FINTECH PLATFORMS IN DIGITAL COMPLIANCE Lesson overview helps government agencies, cryptocurrency businesses, and financial institutions engage confidently with cryptocurrency. AI-Driven Risk Database Of Watchlists, PEPs & Adverse Media. Learn More. Monitor Customer Behaviour & Financial Crime Risk In Real Time. Regulatory Knowledge Automation platform generates a complete set of obligations targeted to your business, and keeps them up-to-date automatically. offers unmatched fraud prevention and protection with real-time automated decisions for all transactions. is a modern platform for managing compliance teams. We make compliance investigations agile, lightweight, and intelligent. The only data privacy platform your business will ever need. GDPR. CCPA. LGPD. ... For Data Privacy compliance with every regulation in the world. world's first end-to-end intelligent compliance platform. We want to change organisations' attitudes to compliance, making it a proactive strength is a behavioral biometrics company providing continuous authentication for end users based on their interactions with web and mobile apps. Fraud prevention solutions that enable your business to innovate & grow without increased risk. Protect your customers and commerce with Sift fraud Lesson overview GUEST SPEAKER MR. SHEETAL KUMAR DBS BANK Blockchain, Artificial Intelligence & Quantum Computing (FIN4721) Session 10 Cloud Computing Professor Sarat Mohanty Oct-2022 Lesson overview Learning objectives Topics - Recap last class - Group project, discussion points - Cloud Computing ************************************************* Guest Speaker – Mr. Jayanth Rao, AWS, Singapore **************************************************************** Lesson overview Learning objectives Group Project Introduction to cloud computing Cloud computing is a method of providing a set of shared computing resources that includes applications, computing, storage, networking, development, and deployment platforms as well as business processes under pay-as-you-go model. Cloud computing turns traditional siloed computing assets into shared pools of resources that are based on an underlying Internet foundation. Parameter On-Premise Upfront high investment Cost Resource deployment In-house resources Security Complete control on security In-house compliance Compliance Scalability & Flexibility Less flexible due to Cloud Pay as you go 3rd party resources deployment Loss of control & authority on Shared compliance model Scalability is higher physical servers etc 4 Cloud computing delivery models IaaS PaaS SaaS Infrastructure as a Service (Hardware, software, storage, data centre space, networking) Platform as a Service (Supplies an on-demand environment for developing, testing, delivering, and managing software applications. PaaS is designed to make it easier for developers to quickly create web or mobile apps) Software as a Service (Method for delivering software applications over the internet, on demand, and typically on a subscription basis. Hosts & manages the software application and underlying infrastructure) 5 Delivery channel Intersection SaaS PaaS IaaS Hosted application Development tools, database management, business analytics Operating systems Servers & storage Networking firewalls/security Data centre physical plant/building 6 Types of Cloud Computing Public cloud is cloud computing that’s delivered via the internet and shared across organizations. Private cloud is cloud computing that is dedicated solely to your organization. Hybrid cloud is any environment that uses both public and private clouds. TCO = total cost of ownership Cloud Computing adoption Enterprises have dramatically increased their use of cloud in the last two years and cloud has emerged as a positive force for change - but there are still barriers to adoption >50% >60% 50% of customers increased their usage of cloud as a result of the pandemic with 92% accelerating faster than anticipated1 of customers plan further increases over the next 1224 months1 will delay migration to cloud due to lack of insufficient cloud IaaS skills.2 1. https://blogs.microsoft.com/wp-content/uploads/prod/2022/01/Microsoft-Cloud-Survey-Results-Final.pdf 2. https://www.gartner.com/smarterwithgartner/4-trends-impacting-cloud-adoption-in-2020 8 Delivering Value Enabling digitalization introduces multiple converging challenges to IT. New business models Expected business benefits Shadow IT Cost efficiencies Security threats Always-on and resilience Digitalization impacts Cyber resilience IT transparency Business influence on IT Regulatory shifts Market forces Data privacy Consumerization of IT IT mobility Social computing IT drivers IT as business innovator Delivery velocity Tech-savvy users Mergers and acquisitions IT versatility DevSecOps Globalization Age pyramid Big data and AI Cloud sourcing Technology disruptors IT Leadership Skill shortages Workplace dynamics 9 Examine through Cloud-Centric lens Transformation journey through Core Cloud infrastructure, Hyperscaler, Multi-Cloud, and Hybrid IT environments Applications – Custom, packaged applications – Microservices e.g., booking engine, card processing Application-specific infrastructure (e.g.) – Azure VM, Azure SQL DB – AWS Lambda, AWS EC2, AWS Dynamo DB Cloud Platform / Shared infrastructure (e.g.) – Azure AD, AWS Control Tower, Kubernetes, Subscription and Logging – Amazon EKS, Azure AKS, Google GKE, VMware Tanzu, Red Hat OpenShift 10 Guide and Accelerate Cloud Transformation journey IT Consulting (Industry) Digital Strategy and Experience IT Consulting (General) Dynamic Architecture & Technology Capabilities are supported by quality software assets and tools. 11 Experience with Cloud Adoption Framework (Typical) Envision, Align, Launch and Scale - Application Workloads Capabilities aligned to Cloud Adoption Framework Business People Governance Align business and IT needs to accelerate your digital transformation with a trusted baseline to make fact-based decisions. Define your transformation journey tying roadmap goals to your business value. Accelerate your cloud journey by leveraging a technology partner organisation (preferably internal) to provide structure and leadership that helps you more rapidly evolve to a culture of continuous growth and learning where change becomes business-as-normal. Optimise service adoption and existing investments while evaluating business outcomes and minimizing transformation-related risks. Platform Security Operations Build an enterprise-grade, scalable, hybrid cloud platform, modernize existing workloads, and implement new cloud-native solutions. Embed infrastructure as code (IaC) into your landing zone design. Design landing zones and their guardrails to achieve the confidentiality, integrity, and availability of your data and cloud workloads. Assess maturity and apply modern operations best practices to optimize results. Ensure that your cloud services are delivered at a level that meets the needs of your business. 12 Cloud Adoption Framework Action Plan (An Example) Business Baseline consumption based budget Tax impact on CapEx to OpEx Strategy Guidance on Cloud Decisioning Framework AWS Compliance Certification Certification against Compliance Chargeback framework People Cloud roles requirement Cloud license strategy & options Pay differentials between old and new role Cloud skills assessment Cloud training & Certifications Organization change management framework Governance Agile project management capabilities Cloud license management How cloud impacts current Scorecard Update Scorecard with business metrics & KPI Cloud decision framework Platform Cloud Architect Patterns CI/CD options & designs Auto resourcing provisioning Approved development tools list Evaluate Cloud ML, AI tools against existing Security Cloud SSO options Update existing policy to reflect Cloud options Cloud HSM options ILP tools for the cloud Cloud Control equivalency Operations Application inventory tools Cloud Automation options & techniques Cloud services to improve BC/DR Cloud audit tools and improvements on existing Cloud Operation model 13 Platform – Assessment of Application Architecture (An Example) Application Feature Application Classification Cloud Architecture BOM BI Application Cloud Technology Stateless Application Data Processing Technology Public Facing Integration Infrastructure Application/ Endpoints Platform Technology Stateful Application Tier Application Enterprise Mobile Application Standard Marketplace Platform POC eCommerce portal 14 14 Platform – Assessment Data Architecture Transaction Data Sales Data Master Data Transform Customer Data Vendor Information Consolidate Review Financial Data 15 Hybrid and Multi-Cloud means multi-front challenges Managing the existing IT estate and the complexities of a hybrid, multi-cloud landscape Integration and data management requirements across the landscape Expanding and changing security, compliance and resiliency requirements Governance across the expanded ecosystem 16 Convert challenges to opportunities. Accelerate the Cloud Journey Modern Automation, Intelligence and Operations Service Advisory Services Public Cloud Services Azure Service Amazon Service GCP Service Implementation, Modernization & Design of Public Cloud Private Cloud Services Private Cloud IaaS / PaaS Multi-tenant IaaS / PaaS 1. Integrated building block approach minimize risk & improve success 2. Security is at the forefront of every engagement. 3. Modern automation and Advanced Delivery In Operations, Management, and Governance. Mgmt Services for Private Cloud Implementation, Modernization & Design of Private Cloud Traditional Distributed Server & Storage Managed Services Hybrid and Multi Cloud Services 17 Lesson overview GUEST SPEAKER MR. JAYANTH RAO AWS, SINGAPORE