SlideShare a Scribd company logo
Cloud Computing
                            Accenture Technology Vision 2008

                                                   whee.teck.ong@accenture.com
                                                         Partner, Technology Consulting

Copyright © 2008 Accenture. All rights reserved.
Eight Major Technology Trends
2009
1.     Cloud computing
2.     SI – Regular & Lite
3.     Enterprise intelligence at scale
4.     Continuous access to people and
       content
5.     Social computing
6.     User-generated content
7.     Industrialization of software
       development
8.     Green computing

Copyright © 2008 Accenture. All rights reserved.
Cloud Computing

Hardware Cloud                                     Desktop Cloud




  Services Cloud                                   SaaS Cloud



Copyright © 2008 Accenture. All rights reserved.                   3
Cloud Computing Enablers, e.g.
GigaSpaces operates as part of the
base infrastructure




Copyright © 2008 Accenture. All rights reserved.   4
Evolution of SaaS
                                                                              SaaS 3.0
                                                      SaaS 2.0
                                                                               Platform-
                   SaaS 1.0                         Application-                centric
                                                      centric
                         ASP                                                  Vendors provide
                                                   SaaS providers own          platforms for
                                                      the software           development, run-
                  SaaS providers
                                                                           time, and integration
                 sourced software                   Greater ability to
                                                                               as a service.
                   from 3rd party                  customize software
                software providers                 based on customer
                                                                            SIs/customers can
                                                         needs
                Ability to meet their                                      customize the SaaS
                 customers’ needs                                           offerings using the
                                                   More flexible pricing
                 was limited by the                                               platform.
                third-party software                 Key Providers:
                                                                             Key Providers:
                                                    SalesForce.com
                                                                            SalesForce.com
                                                       NetSuite
                                                                            NetSuite, Oracle,
                                                                               Microsoft


Copyright © 2008 Accenture. All rights reserved.                                                   5
Cloud Computing: Implications

• What’s the business case?

• Data – privacy & trust

• Data Integration

• Migration & Migration to what?


Copyright © 2008 Accenture. All rights reserved.   6
“Cloud Hype”
Stallman berates cloud computing 'hype‘

Keep your own data on your own machine, says Free Software Foundation chief

By Iain Thomson 02 Oct 2008

Richard Stallman, founder of the Free Software Foundation, has warned that
cloud computing is mainly quot;hypequot; and companies risk losing control of their data if
they buy into such systems.
Stallman told The Guardian that cloud computing posed a serious danger, as
businesses and individuals would lose direct control over their data by handing it
over to third parties.

quot;It's stupidity. It's worse than stupidity. It's a marketing hype campaign,quot; he said.


Source: http://www.vnunet.com/vnunet/news/2227326/stallman-berates-cloud


Copyright © 2008 Accenture. All rights reserved.
Is it for me?

                                                   He was
                                                   probably better
                                                   off without the
                                                   goggles –
                                                   Technology
                                                   needs to be
                                                   implemented
                                                   right!
Copyright © 2008 Accenture. All rights reserved.

More Related Content

What's hot

Solu technology partners cloud computing
Solu technology partners   cloud computingSolu technology partners   cloud computing
Solu technology partners cloud computingGeorge L. Smith
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks
 
Ea2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionEa2009 Cloud Computing Discussion
Ea2009 Cloud Computing Discussion
Marc Caltabiano
 
Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government Agencies
RightNow Technologies
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
NETSCOUT
 
Moving to AWS? Real Stories of BMC Customers that used Discovery to do that!
Moving to AWS?  Real Stories of BMC Customers that used Discovery to do that!Moving to AWS?  Real Stories of BMC Customers that used Discovery to do that!
Moving to AWS? Real Stories of BMC Customers that used Discovery to do that!
Bill Spinner
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Hot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsHot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsOpSource
 
Building cloud-ready Microservices
Building cloud-ready MicroservicesBuilding cloud-ready Microservices
Building cloud-ready Microservices
veredflis
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4
Duc Nguyen
 
Evident.io corp overview
Evident.io corp overviewEvident.io corp overview
Evident.io corp overviewMark Marquiss
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private Cloud
The World Bank
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
NETSCOUT
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
Seclore
 
Company presentation
Company presentationCompany presentation
Company presentation
arunkuri
 
Cloud Computing by D Douglas Chalk
Cloud Computing by D Douglas ChalkCloud Computing by D Douglas Chalk
Cloud Computing by D Douglas Chalk
krishnaontop
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
NETSCOUT
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 Minutes
Smarter.World
 

What's hot (20)

Solu technology partners cloud computing
Solu technology partners   cloud computingSolu technology partners   cloud computing
Solu technology partners cloud computing
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Ea2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionEa2009 Cloud Computing Discussion
Ea2009 Cloud Computing Discussion
 
Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government Agencies
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
Moving to AWS? Real Stories of BMC Customers that used Discovery to do that!
Moving to AWS?  Real Stories of BMC Customers that used Discovery to do that!Moving to AWS?  Real Stories of BMC Customers that used Discovery to do that!
Moving to AWS? Real Stories of BMC Customers that used Discovery to do that!
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Hot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in SystemsHot Cloud Companies: Tap in Systems
Hot Cloud Companies: Tap in Systems
 
Building cloud-ready Microservices
Building cloud-ready MicroservicesBuilding cloud-ready Microservices
Building cloud-ready Microservices
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4
 
Evident.io corp overview
Evident.io corp overviewEvident.io corp overview
Evident.io corp overview
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private Cloud
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Cloud Computing by D Douglas Chalk
Cloud Computing by D Douglas ChalkCloud Computing by D Douglas Chalk
Cloud Computing by D Douglas Chalk
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 Minutes
 

Viewers also liked

PM Weinfest-App.pdf
PM Weinfest-App.pdfPM Weinfest-App.pdf
PM Weinfest-App.pdf
unn | UNITED NEWS NETWORK GmbH
 
Crepúsculo do ídolos (Friedrich Nietzsche)
Crepúsculo do ídolos (Friedrich Nietzsche)Crepúsculo do ídolos (Friedrich Nietzsche)
Crepúsculo do ídolos (Friedrich Nietzsche)
Max Reygson
 
Pc
PcPc
Wstęp do UNet
Wstęp do UNet Wstęp do UNet
Wstęp do UNet
Marek Winiarski
 
Transporte ferroviario Ingenieria en Transporte (UPIICSA)
Transporte ferroviario Ingenieria en Transporte (UPIICSA)Transporte ferroviario Ingenieria en Transporte (UPIICSA)
Transporte ferroviario Ingenieria en Transporte (UPIICSA)
Arsen15
 
Iora Health
Iora HealthIora Health
Iora Health
Avado Inc.
 
Healthcare Digital Marketing Enabling Healthcare Firms for Digital Revolution
Healthcare Digital  Marketing Enabling Healthcare Firms for Digital RevolutionHealthcare Digital  Marketing Enabling Healthcare Firms for Digital Revolution
Healthcare Digital Marketing Enabling Healthcare Firms for Digital Revolution
InnoMind Technologies
 
OPEN BIM
OPEN BIMOPEN BIM
20080507 gute ergebnisse
20080507 gute ergebnisse20080507 gute ergebnisse
20080507 gute ergebnisse
Frank von Hagel
 
Eman Danial Resume - Exec. Secty 2015
Eman Danial Resume - Exec. Secty 2015Eman Danial Resume - Exec. Secty 2015
Eman Danial Resume - Exec. Secty 2015Eman Danial
 

Viewers also liked (12)

Certificate
CertificateCertificate
Certificate
 
PM Weinfest-App.pdf
PM Weinfest-App.pdfPM Weinfest-App.pdf
PM Weinfest-App.pdf
 
Crepúsculo do ídolos (Friedrich Nietzsche)
Crepúsculo do ídolos (Friedrich Nietzsche)Crepúsculo do ídolos (Friedrich Nietzsche)
Crepúsculo do ídolos (Friedrich Nietzsche)
 
Pc
PcPc
Pc
 
Wstęp do UNet
Wstęp do UNet Wstęp do UNet
Wstęp do UNet
 
Transporte ferroviario Ingenieria en Transporte (UPIICSA)
Transporte ferroviario Ingenieria en Transporte (UPIICSA)Transporte ferroviario Ingenieria en Transporte (UPIICSA)
Transporte ferroviario Ingenieria en Transporte (UPIICSA)
 
Iora Health
Iora HealthIora Health
Iora Health
 
Healthcare Digital Marketing Enabling Healthcare Firms for Digital Revolution
Healthcare Digital  Marketing Enabling Healthcare Firms for Digital RevolutionHealthcare Digital  Marketing Enabling Healthcare Firms for Digital Revolution
Healthcare Digital Marketing Enabling Healthcare Firms for Digital Revolution
 
Thainá
ThaináThainá
Thainá
 
OPEN BIM
OPEN BIMOPEN BIM
OPEN BIM
 
20080507 gute ergebnisse
20080507 gute ergebnisse20080507 gute ergebnisse
20080507 gute ergebnisse
 
Eman Danial Resume - Exec. Secty 2015
Eman Danial Resume - Exec. Secty 2015Eman Danial Resume - Exec. Secty 2015
Eman Danial Resume - Exec. Secty 2015
 

Similar to Accenture Computing In A Cloud

LotusLive
LotusLiveLotusLive
LotusLive
Chris Sparshott
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
Peter Coffee
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart Companies
Peter Coffee
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
IRJET Journal
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Novell
 
Midlands Data Center | Saas Whitepaper
Midlands Data Center | Saas WhitepaperMidlands Data Center | Saas Whitepaper
Midlands Data Center | Saas Whitepaper
Top10 SEO
 
White-paper : SaaS Application Development & Delivery using Alice
White-paper : SaaS Application Development & Delivery using AliceWhite-paper : SaaS Application Development & Delivery using Alice
White-paper : SaaS Application Development & Delivery using Alice
Ekartha Inc
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comDeepu S Nath
 
The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.
Peter Coffee
 
Cloud computing - was bringt's
Cloud computing - was bringt'sCloud computing - was bringt's
Cloud computing - was bringt's
thomas_ruemmler
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarSaif Ahmad
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
Peter Coffee
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Arrow ECS UK
 
Cloud Computing and Microsoft
Cloud Computing and MicrosoftCloud Computing and Microsoft
Cloud Computing and Microsoft
John Bristowe
 
Cloud computing
Cloud computingCloud computing
Cloud computing
abhijitmadhwaraj
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
 
AppViewX and Ansible
AppViewX and AnsibleAppViewX and Ansible
AppViewX and Ansible
AppViewX
 
Peter Coffee at share2010seattle
Peter Coffee at share2010seattlePeter Coffee at share2010seattle
Peter Coffee at share2010seattlePeter Coffee
 

Similar to Accenture Computing In A Cloud (20)

LotusLive
LotusLiveLotusLive
LotusLive
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart Companies
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Midlands Data Center | Saas Whitepaper
Midlands Data Center | Saas WhitepaperMidlands Data Center | Saas Whitepaper
Midlands Data Center | Saas Whitepaper
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
White-paper : SaaS Application Development & Delivery using Alice
White-paper : SaaS Application Development & Delivery using AliceWhite-paper : SaaS Application Development & Delivery using Alice
White-paper : SaaS Application Development & Delivery using Alice
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.com
 
The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.
 
Cloud computing - was bringt's
Cloud computing - was bringt'sCloud computing - was bringt's
Cloud computing - was bringt's
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Cloud Computing and Microsoft
Cloud Computing and MicrosoftCloud Computing and Microsoft
Cloud Computing and Microsoft
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
AppViewX and Ansible
AppViewX and AnsibleAppViewX and Ansible
AppViewX and Ansible
 
Peter Coffee at share2010seattle
Peter Coffee at share2010seattlePeter Coffee at share2010seattle
Peter Coffee at share2010seattle
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Accenture Computing In A Cloud

  • 1. Cloud Computing Accenture Technology Vision 2008 whee.teck.ong@accenture.com Partner, Technology Consulting Copyright © 2008 Accenture. All rights reserved.
  • 2. Eight Major Technology Trends 2009 1. Cloud computing 2. SI – Regular & Lite 3. Enterprise intelligence at scale 4. Continuous access to people and content 5. Social computing 6. User-generated content 7. Industrialization of software development 8. Green computing Copyright © 2008 Accenture. All rights reserved.
  • 3. Cloud Computing Hardware Cloud Desktop Cloud Services Cloud SaaS Cloud Copyright © 2008 Accenture. All rights reserved. 3
  • 4. Cloud Computing Enablers, e.g. GigaSpaces operates as part of the base infrastructure Copyright © 2008 Accenture. All rights reserved. 4
  • 5. Evolution of SaaS SaaS 3.0 SaaS 2.0 Platform- SaaS 1.0 Application- centric centric ASP Vendors provide SaaS providers own platforms for the software development, run- SaaS providers time, and integration sourced software Greater ability to as a service. from 3rd party customize software software providers based on customer SIs/customers can needs Ability to meet their customize the SaaS customers’ needs offerings using the More flexible pricing was limited by the platform. third-party software Key Providers: Key Providers: SalesForce.com SalesForce.com NetSuite NetSuite, Oracle, Microsoft Copyright © 2008 Accenture. All rights reserved. 5
  • 6. Cloud Computing: Implications • What’s the business case? • Data – privacy & trust • Data Integration • Migration & Migration to what? Copyright © 2008 Accenture. All rights reserved. 6
  • 7. “Cloud Hype” Stallman berates cloud computing 'hype‘ Keep your own data on your own machine, says Free Software Foundation chief By Iain Thomson 02 Oct 2008 Richard Stallman, founder of the Free Software Foundation, has warned that cloud computing is mainly quot;hypequot; and companies risk losing control of their data if they buy into such systems. Stallman told The Guardian that cloud computing posed a serious danger, as businesses and individuals would lose direct control over their data by handing it over to third parties. quot;It's stupidity. It's worse than stupidity. It's a marketing hype campaign,quot; he said. Source: http://www.vnunet.com/vnunet/news/2227326/stallman-berates-cloud Copyright © 2008 Accenture. All rights reserved.
  • 8. Is it for me? He was probably better off without the goggles – Technology needs to be implemented right! Copyright © 2008 Accenture. All rights reserved.