Business value of cloud services and business models

December 18-19th 2014 (12th) Conference held in Beijing China’s Internet economy. In “Internet economic-cloud service of commercial value and commercial mode” stage, website Deputy Editor-in-Chief Shen Jiangying and huayun data Senior Deputy President Yu Lijuan, qingyun joint founder OASIS, trend technology enterprise level products development President Liu Shuochen, Dawn cloud computing technology Corporation strategy technology Director Zhang guozheng, Tencent morning Deputy General Manager Li Wentao and century interconnected Deputy Director Wang Mr, on “cloud service ‘ of application, and development and future prospects, problem started has discussion.

Business value of cloud services and business models

Following is a video:
Shen Jiangying: this website activity continued for two days. Yesterday was invited a large group of economists to talk I listen quite addictive, have a little regret, I would like to make a cross-border problem and later questions were too warm, nothing. So very happy today, to my regret in this field be made up. “The cloud” is very important. Two were introduced, and 5 in the afternoon, my good luck, because the first “cloud” is the biggest difficulty. I first invited us guests. They are Hua Yun Yu Lijuan, senior data, the second is a qingyun co-founder OASIS. Trend micro enterprise product development Chief Liu Shuochen, shuguang Zhang guozheng, Director of strategic technology of cloud computing technology Corporation, Tencent Vice General Manager Li Wentao in the morning, Vianet Wang Xu, the Deputy Director.
I’m in this industry for two years, “cloud” the most difficult, most easy for everyone to discuss, dangerous, foggy. |||| We were getting ready to go out with Duke after noon, as moderator, I woke everyone. If you can participate in the annual meeting of the Internet economy, it is big on meetings, 5 Forum this afternoon. This afternoon, sitting in the first field is the highest level of guest because “the cloud” is the most difficult. Give us the business group I have prepared 3 questions, I don’t see the manuscript. 1.0 times is basically the Facilitator asked the guests to answer, 2.0 times, guests can interact. 3.0 we do today, people mobilized. I’ll throw a topic, you first interact. The “cloud” discussion is very much, I usually hear very much, business discussions, and a lot, and also a lot when doing business. I still have a problem, want to ask many of you, I’ll pick the audience respond to, those of you who aren’t going. Everyone here could use a word for me to express what “cloud”?
Yu Lijuan: If a word it if it says to the public, I would like to say, hardware and software are not bought, was through an Internet buying service, cheap and 1%.
OASIS: the concept of cloud computing a lot of abuse, and being a generalization. After such a long time, the concept of cloud computing, as far as we are concerned, nothing had changed in fact, cloud computing, we did not change anything. Cloud computing is doing new calculations interactively.
Shen Jiangying: IDC with “cloud” what is the essential difference and the same?
Wang: in the cloud, there are a lot of levels, we in the industry specializing in surgery of the angle, we inside the cloud, our position is quite simple, and is relatively simple, we provide chassis business, we provide cloud chassis, we hope that after we put up the stage and let the other cloud service providers and even friends in our wonderful performances on the stage. This is our Vianet and other relationships, the relationship and service we provide.
Zhang guozheng: computer is a device that provides computing resources and storage resources, “cloud” is a service. Its traditional hardware purchase, use the network and ways and means to build a platform into widespread use, users, on-demand cloud services model.
Li Wentao: we understand what is cloud computing? Obtained through networked on-demand according to the volume of applications and computing services, new business models. If we say that has nothing to do with instant messaging? Really doesn’t matter, instant messaging application is a service, and must rely on the underlying cloud service support capability, to complete instant messaging capabilities.
Liu Shuochen: my answer to your first question. From roles in charge of security, “the cloud” security for us is you need to deploy, test, configure all hardware and software, all work needs to be done into an account in the past, I can very quickly used to take a lot of time and a lot of energy to do work, put it all into an immediate implementation of a service.
Shen Jiangying: I do not know if you listened to the speeches of several guests, do you understand? I asked the audience to respond to what is called “the cloud”? It seems that everyone was rather humble. Government says the “cloud” and services. The current “cloud” services what is the business model?
Zhang guozheng: from ISSA for Cloud architecture layer, for example, sell hardware and storage resources, PSSA provide platform and SAAS to provide software as a service model. (Transliteration)
Shen Jiangying: the topic we are discussing today is not too professional. We use angles, for example, is much talk now about public clouds are clouds, about private cloud or for start-ups, the “cloud” could provide the kind of service. I went to a zone, the development zone says do cloud services, I do a bit of introduction. Then I tell him about it. I said you all, the introduction of enterprise, business owners worried about now, employees quit the current ratio is very large, a walk later, had taken possession of company information. Provides services in the future, there are cloud data can. Several other guests we talked in this Chamber, for example, is what benefit to large companies, what are the benefits for small businesses, what benefit to individuals, “the cloud” and what will be the real service?
Yu Lijuan: I think cloud applications a great shock to me. Many Silicon Valley start-ups, most of his students in business, so why are they so low cost business? Because without taking into account infrastructure so demanding of technical services, regardless of the network you want to tune all about? Spend just a few dollars a month to buy infrastructure services, he was directly applied. Students in their junior year when seniors can get hundreds of dollars in Silicon Valley start-ups. Magic camera background 90% in diffuse clouds, this application is there are tens of millions of users of mobile phone Apps. This globalization of deployed applications, almost entirely in the background is the “cloud” support. If we are entrepreneurs, “cloud” can bring a very low threshold applications. Huayun offers 10 bucks you can do Internet applications, tens of users if you want to do, just like magic man camera case, clouds can also be used.
In the absence of the “cloud” before we spend on infrastructure services, two senior engineers, more than 200,000 a year, infrastructure investment, “cloud”, will not exceed 50,000 dollars a year, to complete a full application deployment. From this point of view, the “cloud” application does change the whole pattern will give you a lot of opportunities.
Liu Shuochen: Let me talk about individual cases. I use described in individual cases. In 2000, when I was in Silicon Valley, venture with a friend at that time, when we raise $ 3 million dollars. At that time I remember most clearly, our infrastructure, and spent 500,000 dollars at once tantamount to saying one-sixth venture capital you need put on the infrastructure. I figured we should use existing cloud infrastructure to be, we now will cost how much? From 500,000 to hundreds of dollars, so this is a very large gap. So in other words, if I was at that time the business with these goals, moved to today, most likely these scale we now would have more success than ever before.
Li Wentao: answer the issues referred to in general port Dickson, include that enterprises and individuals, there are security and privacy. Cloud services, in particular start-ups and infrastructure can save you a lot, but I think this shows up on the capital, non-capital side still has a lot of valuable things have not been excavated. If I want to start a business, then, in the course of business, in addition to funding, there are a lot of technical environment, and your market segmentation, and business products how were you do after promotion? Now public cloud services market, there are many enterprises, such as Ali, Tencent, in fact there are a lot of intangible value added services can give entrepreneurs, but how much money do these things there is no way to measure. These things directly in the business environment or development environment, or are promoting a number of corresponding support in it.
Now of course many cloud providers with investors, in partnership or investment companies. This solves the problem of capital. Cloud service providers themselves to solve various problems a lot in the promotion of research and development.
Shen always refers to just about individual privacy. Personally, everyone in the Web2.0 that already have “cloud” concept, but not so hot now. The Web2.0 era, all in the cloud. I believe that none of the email please raise their hands? Should have. The email service itself is in fact a SAAS service, you have an account, you don’t have to worry, I can log on computer and IPAD, personal application in early. Enterprise applications, we focus on goals and focus on ISSA (transliteration).
Shen Jiangying: now mobile Internet is more and more developed, but when more developed, I was more worried, I use lots of applications every day, sometimes need to use, sometimes from work when I apply, when calling the contact and location information. This involves a privacy issue, and when you do cloud services, while calls to contacts or address, there is no supporting protection of privacy a whole set of measures, some of you here are there?
Li Wentao: privacy is not an absolute first, and then the mobile Internet era, the way the App, not exactly “cloud” way.
Shen Jiangying: I would like to know, you guys are with “cloud” related, security, raise your hand? I guess no one dare not raise their hands.
Li Wentao: I just answered your question. Inside the enterprise, there are many developing and or employees have resigned today, don’t do, in fact, this is another one of those “cloud” business model, you can pass now to the way desktop, client terminal can be used to solve it. There might be some friends do not know, it is kind of a pattern. I’ll give an example, we will aggressively is clear. Everyone can operate ATMs, but everything with no local money, as long as the data center and the cloud can have the network.
Wang: from the technical architecture of the cloud’s point of view on this question, I from a different perspective, from a business model. Because of the “cloud” appears later, make a lot of good people or people who have ideas, or ideas easier landing that ideal. We in the financial sector, for example. Our traditional thinking, there must be financial firms to provide services of the financial sector. At this moment may not be the case. Balance of the Ma Po, MA began to do business, but he balances the treasure behind the tianhong Fund growth rate is fast.
Shen Jiangying: I myself use balances when treasure, many of my colleagues asked me, an insecure?
Wang: I think this problem so, certain new things show up, safety must be a gradual process.
Shen Jiangying: there are many factors of insecurity, but the future will be more secure.
Wang: I totally agree with your opinion, not because there is no ready, kill it.
Liu Shuochen: we have been in this field for years. Safety for us is a risk assessment, an unsafe, you say? Are not guaranteed. We have to make it as safe as possible. Security is a standard, standards compliance, the so-called compliance there are lots of security requirements listed.
Shen Jiangying: what you said is relatively safe, I am sure all of you are educated, safety is a relative concept. When a user reaches a certain level, when I pulled some of my friends, the use of micro-payment, pay with credit cards bound together, if it is safe, use a numeric probability scale, while I got the paper, the error rate of 1 per thousand, four out of 10,000, have you ever done quantitative research?
Liu Shuochen: now there is such research also confirms the safety of, like I have said something, that is, compliance. Did you comply with existing safety rules, you must comply with the safety regulations, and now we can say you are safe, protect your data security, you have enough and that your server is protection, in accordance with the existing rules of the industry. If the financial industry, PCI compliance is very important. It is also a set of rules, every enterprise has an obligation, under the rules of its security planning.
Shen Jiangying: here are the guests, come in so many people. This afternoon to get more substantive knowledge, now you tell everyone that you pay with what financial, which apply when safety is no problem, when which service to use, you should take care, safety is the existence of hidden? Now put this concept can, and do you have done quantitative research? Use trend products without any problems, with Dawn assured, whiz also has promise, others are not so sure.
Liu Shuochen: if any vendor to be able to say, I do all the things that are completely safe, it is not responsible for manufacturer.
Shen Jiangying: not totally relative.
Liu Shuochen: we can do it, best under the current rules, comply with this rule, and this can be measured out. Industry has a set of rules, and if you follow these rules to do so, it is within our power, to achieve the best.
Shen Jiangying: you did not understand?
Yu Lijuan: this is a subject that has no solution, no one could do to 100%.
Shen Jiangying: because I came out of the communications industry, latest media attack on the communications industry, which is typical of the Internet’s biggest pursuit, do your best, I’ve put in maximum effort, but communications were not so to solve the problem. For example today we meet here, we want to ensure the live broadcast, Conference level is very high, there must be no error may occur. Take a back up of the communications industry, two backup three times is enough. Next, we will discuss, the presence of the audience ever willing to ask a question?
Question: ladies and gentlemen are you! I’m not a bulletin, but I’m learning Chinese, but as a user, I feel that our relationship is closely related to cloud computing and cloud. I don’t know Lee from Tencent would come, I have a very simple question, one of my friends gave me a QQ number, now lost, and now I can’t get it back, from a security perspective and point cloud and cloud computing, please security experts to help us do something about it?
Li Wentao: I answer my friend’s question. Just prior to we also chatted, QQ system as a whole is very complex, first of all, the crux of the problem, first of all, I wouldn’t go to the QQ is yours or you, but I have to make sure is that you must have your, not you-you do not see, this is the core of the idea. So this has a lot of problems, including our own internal staff, I was once a QQ number, but I do not get it back, I used a dozen years ago, and contains the QQ number and all of the personal information.
I lost my QQ number is divided into many levels, you may forgot password, QQ in the end being dismounted his horse and so on in many ways. But first, you have to look at the chain of all actions to this point. When you say you want to appeal, you can cite to ten, he was my friend, and the friend can tell the service end, the QQ number is his, this time, it is in the whole process of QQ numbers to find, first and foremost to solve way. You are saying that QQ number is my first are friends, not friends, it didn’t work. In the appeals process, can you at least confirm the identity of, know your QQ number that is. Your odds of success may be 80%.
Wang: this I wanted to help the company and tell you, I have QQ number stolen when surfing at the coffee shop. I set up the phone-bound, Tencent has a telephone, can call to Shenzhen directly through your phone to reset your password. In fact, this is quite easy, as long as you take some measures, there is still hope to find your QQ number.
Shen Jiangying: recently we quarrel, discuss issues that dimension sometimes the Internet is not uniform. With “the cloud” is tied with two other words, a tube is an end. Our “tubes” together industry chains, ended a sentence from the “cloud” what angle to provide services.
Yu Lijuan: an idea that I want to say is, do we care about mobile Internet? If you are concerned please raise your hand. We are very concerned, because mobile Internet on our cell phones, has changed our lives, but how can it change our lives? Cloud computing because the background a lot of processing power to support changes in your phone, so if you are concerned about the mobile Internet, please be sure to use the same attitude, to care for cloud computing, which will give you opportunities to bring more change and more and more growth.
Liu Shuochen: because we are doing safety well, I add a little bit. Now the trade when using the “cloud”, especially when there is a new concept of public clouds, security is a shared responsibility. We want to see, which is a cloud service provider’s responsibility for security, which is an individual, or the users responsibility. This perception will be crucial in the future on both sides of security architecture.
OASIS: we QingCloud ISSA cloud-based services to do everything we can to make the biggest security effort to. Next we’ll be working with trend micro, at the operational level, to provide better security.
Zhang guozheng: we started by dawn is a traditional computer server, in fact, we are very confident in the future of cloud computing, we now have 8 nationwide Cloud Computing Centre provides services for local governments and enterprises. We hope that in the future in the cloud computing trend, we are better able to provide mobile Internet developers, entrepreneurs, and provide more and better services to SMEs.
Li Wentao: Shen total I would like to mention in your question. “End” and “the cloud” relationship back on the essence, and we fully believe, or could do to 100%.
Shen Jiangying: the development of the Internet, is actually quite interesting, original telecom network is a complex of Terminal phone is simple. From the standpoint of popularity is difficult, Internet, on the contrary, the network protocol is the public is simple, but the Terminal complex. Now there is “the cloud” in the future, there is another trend, Terminal a lot to “cloud” loaded. You, as President of Tencent’s business, you say in the future direction of our terminals, to a simple terminal or a complex intelligent?
Li Wentao: simple and intelligent, data complexity of cloud applications.
Wang: we have a network of data centres, we have a network, offer cloud platforms, provide, our network system. Then end of this piece, Vianet exploration is relatively small, we do with friends, we work together to “cloud” eco-system built, everyone is making money, we took the cake done growing.
Shen Jiangying: thank you ladies and gentlemen today. Tencent is we do communication links, the trend of our future, a light, bright, thank you our guest here, and thank you for the all the audience. We have this conversation is over, thank you.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.