This document discusses the benefits and realities of cloud computing. It argues that true cloud computing provides major advantages over traditional on-premise software like lower costs, easier upgrades, and world-class security. However, some current cloud offerings do not provide true cloud benefits if they still require installing software or hardware. The document outlines how cloud computing can enable knowledge-based organizations and discusses examples of large companies successfully using cloud technologies.
It's About The Citizen - Changing Needs and Rising ExpectationsPeter Coffee
Presented as keynote to GTEC 2014 in Ottawa, 28 October 2014 by Peter Coffee of Salesforce
A “cloud computing” conversation used to be a plan to cut IT costs and accelerate project schedules. Today, it’s becoming a citizen-driven discussion of improving the visibility, availability and accountability of every institution of modern life — in a world where people have a whole new level of power to discover, share, and collaborate in identifying and confronting challenges as well as pursuing new opportunities. Not merely the execution, but even the basic mission, of government and other organs of society is in the crosshairs. Peter Coffee brings salesforce.com’s global perspective, as thrice-named “World’s Most Innovative Company” (Forbes), to share with theGTEC community and to offer opportunities for action.
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...SocialBiz UserGroup
In this tip, speaker Scott Padget explains how socialytics provides customer and competitive insights as well as real-time operational insights. He introduces the SIFT (Social Intelligence Fusion Toolkit) Solution that funnels big social data into actionable business intelligence. Scott also describes the lifecycle of socialytics and gives a live demo. Obviously, the slides don’t capture the exact live demo, but they do show some screenshot examples of the SIFT Solution in action.
The CLOUD. For techies - it is as real as an ashtray - to the non technical - it is invisible - can't be held in your hand or described - find out what all the chatter is about!
User Experience of AI - How to marry the two for ultimate success?Koru UX Design
Want UX and AI to mean more than just buzz words? Download our whitepaper on how to combine the two to create scalable enterprise products at a fast pace. Learn from real-life examples on how smart adoption solved crucial business challenges across various industries. Download now using this link, https://www.koruux.com/uxfreebies/ux-of-ai/
The survival kit for your digital transformationrun_frictionless
To go digital, you need an IT organization, an enterprise architecture, IT processes, and tools that allow for new projects to go live tomorrow instead of next week. The ability to do this will give you a competitive advantage and it will also reduce costs. But how do you get there? This white paper will get you there.
https://runfrictionless.com/b2b-white-paper-service/
It's About The Citizen - Changing Needs and Rising ExpectationsPeter Coffee
Presented as keynote to GTEC 2014 in Ottawa, 28 October 2014 by Peter Coffee of Salesforce
A “cloud computing” conversation used to be a plan to cut IT costs and accelerate project schedules. Today, it’s becoming a citizen-driven discussion of improving the visibility, availability and accountability of every institution of modern life — in a world where people have a whole new level of power to discover, share, and collaborate in identifying and confronting challenges as well as pursuing new opportunities. Not merely the execution, but even the basic mission, of government and other organs of society is in the crosshairs. Peter Coffee brings salesforce.com’s global perspective, as thrice-named “World’s Most Innovative Company” (Forbes), to share with theGTEC community and to offer opportunities for action.
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...SocialBiz UserGroup
In this tip, speaker Scott Padget explains how socialytics provides customer and competitive insights as well as real-time operational insights. He introduces the SIFT (Social Intelligence Fusion Toolkit) Solution that funnels big social data into actionable business intelligence. Scott also describes the lifecycle of socialytics and gives a live demo. Obviously, the slides don’t capture the exact live demo, but they do show some screenshot examples of the SIFT Solution in action.
The CLOUD. For techies - it is as real as an ashtray - to the non technical - it is invisible - can't be held in your hand or described - find out what all the chatter is about!
User Experience of AI - How to marry the two for ultimate success?Koru UX Design
Want UX and AI to mean more than just buzz words? Download our whitepaper on how to combine the two to create scalable enterprise products at a fast pace. Learn from real-life examples on how smart adoption solved crucial business challenges across various industries. Download now using this link, https://www.koruux.com/uxfreebies/ux-of-ai/
The survival kit for your digital transformationrun_frictionless
To go digital, you need an IT organization, an enterprise architecture, IT processes, and tools that allow for new projects to go live tomorrow instead of next week. The ability to do this will give you a competitive advantage and it will also reduce costs. But how do you get there? This white paper will get you there.
https://runfrictionless.com/b2b-white-paper-service/
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthBMC Software
BMC, the global leader in IT solutions for the digital enterprise, has teamed with PSFK, one of the world’s leading think tanks, to develop The Digital Transformation Playbook. This guide provides key insights and actionable steps for business executives and public sector organizations to follow as they seek to enhance customer experiences, processes, and business models through digital transformation. To download a complimentary copy of The Digital Transformation Playbook, visit http://www.bmc.com/playbook.
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Kevin Neal
This is a presentation on Lending and how document scanning and Enterprise Content Management (ECM) can help improve efficiency and decrease operational costs.
This Webcast, hosted by TechIQ Editor-in-Chief Joe Panettieri, explores five emerging technologies for solutions providers:
1. Ubuntu Linux
2. Open Source CRM
3. Municipal Wireless
4. Video Surveillance
5. Managed Services
CompTIA’s 2nd Annual Trends in Enterprise Mobility study builds on previous CompTIA research in the mobility space and further explores mobility trends, challenges and opportunities. Understand the variables and trade-offs involved in a company’s decision on provisioning devices; ascertain benefits realized from using mobile/remote work solutions; identify the challenges in supporting and managing mobile/remote work; and
gauge the need for training and/or standards.
Mobile Banking Security: Challenges, SolutionsCognizant
With the proliferation of online mobile banking services, security is a key issue. We offer a primer on security challenges and applicable controls/remedies. This includes solutions such as Trusteer Mobile SDK, Arxon's EnsureIT and Dexguard.
Trends such as Big Data and BYOD have made the network more critical than ever. Research shows the pain points IT departments are experiencing with network infrastructure—and the investments they’re making to improve capacity , scalability and flexibility.
If you build it, will they come? Debunking the myths of social software adoptionSuzanne Livingston
IBM Connections can improve your organization's effectiveness through transparent communication, open collaboration and knowledge sharing - but only if people use it. Social software adoption is one of the most important first steps in building a community. In this session, we'll discuss real world strategies that clients have utilized to build thriving social environments online. We'll focus on practical tips that enable your community managers to grow vibrant, healthy, self-sustaining communities.
An example of a Product Marketing asset for companies that want to highlight use cases for their product in a simple and convenient manner. A great sales asset.
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
The potential trillion dollar Internet of Things (IoT) business opportunity rests precariously on one critical factor – security. 71% of executives in our survey agreed that security concerns will influence customers’ purchase decision for IoT products. However, despite increasing cyber attacks and ample warning from security experts, most organizations do not provide adequate security and privacy safeguards for their IoT products. In fact, only 33% of IoT executives in our survey believe that the IoT products in their industry are highly resilient to cyber security attacks. Further, despite rising consumer concerns regarding data privacy, 47% of organizations do not provide any privacy related information regarding their IoT products.
So, why are organizations lagging behind in securing their IoT products and systems? Key reasons for this include an expanded attack surface, inefficiencies in the IoT product development process, and the lack of specialized security skill-sets. For instance, our survey showed that only 48% of companies focus on securing their IoT products from the beginning of the product development phase. Building a secure IoT system begins with the recognition that security needs to be as much of a priority as the features and functionality of an IoT product. The report highlights the key measures that organizations must take in order to put security at the core of their IoT value proposition.
Resilience Engineering as an IT Cultural DisciplineCognizant
To enable always-on and always-available digital business, IT organizations must become more operationally resilient to enhance system and application stability, which fuels service reliability and boosts reputational integrity.
Thomas Plennert: Brand Promoter 2.0. Lecture at Summer School 2010 (TU Braunschweig) on Corporate Communications 2.0.
Braunschweig, 2010-07-23.
Institut für Wirtschaftsinformatik, Abteilung Informationsmanagement (wi2)
Inside Out and Upside Down - FOO Camp 2016 - Peter CoffeePeter Coffee
Four "truths" of IT are still true enough to yield ROI by pursuing their further development -- but you'll never realize how much you left on the table by failing to appreciate their transformation in a massively connected world.
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthBMC Software
BMC, the global leader in IT solutions for the digital enterprise, has teamed with PSFK, one of the world’s leading think tanks, to develop The Digital Transformation Playbook. This guide provides key insights and actionable steps for business executives and public sector organizations to follow as they seek to enhance customer experiences, processes, and business models through digital transformation. To download a complimentary copy of The Digital Transformation Playbook, visit http://www.bmc.com/playbook.
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Kevin Neal
This is a presentation on Lending and how document scanning and Enterprise Content Management (ECM) can help improve efficiency and decrease operational costs.
This Webcast, hosted by TechIQ Editor-in-Chief Joe Panettieri, explores five emerging technologies for solutions providers:
1. Ubuntu Linux
2. Open Source CRM
3. Municipal Wireless
4. Video Surveillance
5. Managed Services
CompTIA’s 2nd Annual Trends in Enterprise Mobility study builds on previous CompTIA research in the mobility space and further explores mobility trends, challenges and opportunities. Understand the variables and trade-offs involved in a company’s decision on provisioning devices; ascertain benefits realized from using mobile/remote work solutions; identify the challenges in supporting and managing mobile/remote work; and
gauge the need for training and/or standards.
Mobile Banking Security: Challenges, SolutionsCognizant
With the proliferation of online mobile banking services, security is a key issue. We offer a primer on security challenges and applicable controls/remedies. This includes solutions such as Trusteer Mobile SDK, Arxon's EnsureIT and Dexguard.
Trends such as Big Data and BYOD have made the network more critical than ever. Research shows the pain points IT departments are experiencing with network infrastructure—and the investments they’re making to improve capacity , scalability and flexibility.
If you build it, will they come? Debunking the myths of social software adoptionSuzanne Livingston
IBM Connections can improve your organization's effectiveness through transparent communication, open collaboration and knowledge sharing - but only if people use it. Social software adoption is one of the most important first steps in building a community. In this session, we'll discuss real world strategies that clients have utilized to build thriving social environments online. We'll focus on practical tips that enable your community managers to grow vibrant, healthy, self-sustaining communities.
An example of a Product Marketing asset for companies that want to highlight use cases for their product in a simple and convenient manner. A great sales asset.
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
The potential trillion dollar Internet of Things (IoT) business opportunity rests precariously on one critical factor – security. 71% of executives in our survey agreed that security concerns will influence customers’ purchase decision for IoT products. However, despite increasing cyber attacks and ample warning from security experts, most organizations do not provide adequate security and privacy safeguards for their IoT products. In fact, only 33% of IoT executives in our survey believe that the IoT products in their industry are highly resilient to cyber security attacks. Further, despite rising consumer concerns regarding data privacy, 47% of organizations do not provide any privacy related information regarding their IoT products.
So, why are organizations lagging behind in securing their IoT products and systems? Key reasons for this include an expanded attack surface, inefficiencies in the IoT product development process, and the lack of specialized security skill-sets. For instance, our survey showed that only 48% of companies focus on securing their IoT products from the beginning of the product development phase. Building a secure IoT system begins with the recognition that security needs to be as much of a priority as the features and functionality of an IoT product. The report highlights the key measures that organizations must take in order to put security at the core of their IoT value proposition.
Resilience Engineering as an IT Cultural DisciplineCognizant
To enable always-on and always-available digital business, IT organizations must become more operationally resilient to enhance system and application stability, which fuels service reliability and boosts reputational integrity.
Thomas Plennert: Brand Promoter 2.0. Lecture at Summer School 2010 (TU Braunschweig) on Corporate Communications 2.0.
Braunschweig, 2010-07-23.
Institut für Wirtschaftsinformatik, Abteilung Informationsmanagement (wi2)
Inside Out and Upside Down - FOO Camp 2016 - Peter CoffeePeter Coffee
Four "truths" of IT are still true enough to yield ROI by pursuing their further development -- but you'll never realize how much you left on the table by failing to appreciate their transformation in a massively connected world.
Proline Promag D 400. Electromagnetic flow measuring system
The lightweight, compact wafer style flowmeter for basic water
applications. Email: lam.nguyen@vietan-enviro.com HP: 0945 293292
Game of Phones - Becoming the Architects of Connection (Midwest Dreamin' Clos...Peter Coffee
Over a span of 30-something years, the CPU speed of a mainstream personal computer has grown by less than a factor of one thousand -- while the connectivity bandwidth that people expect (in workplace, home, and even in mobile activities) has grown 200 times that much. If we called them "(inter)personal connectors," we might be capturing more correctly the role of the "PC" and its descendants in our lives -- but in most organizations, we still treat IT more as a discipline of automation and calculation and archival than as a medium of connection and collaboration. Peter Coffee shares current research and a global perspective on what it means for the Salesforce community to take the lead in repurposing and reculturing the modern era's defining technology.
Peter Coffee at Southland Technology ConferencePeter Coffee
Cloud computing should do much more than merely relocate the current delays, risks, and costs of application development. Peter Coffee, former Technology Editor of eWEEK, explores the status and prospects of the multi-product, multi-vendor cloud, where complementary services offer proven development leverage and enable next-generation business processes.
Peter Coffee joined salesforce.com in January of 2007, after spending 18 years as an analyst and columnist at the enterprise technology journal eWEEK (including time under its former title PC Week). Based near Los Angeles, he works with corporate and commercial application developers to establish an international community of best practices on Force.com: the salesforce.com cloud computing Platform-as-a-Service (PaaS).
Peter Coffee of salesforce.com summarizes the state of the cloud after a decade of enterprise assimilation, and lays out the upside value opportunities of the reconceived Cloud 2 -- combining cloud economy with connected community
Social Enterprise: Trust; Vision; RevolutionPeter Coffee
Becoming a social enterprise is not a technical evolution, but a business transformation. Technologies enable it, but only a cultural commitment will achieve it. Doing it is not optional, unless going out of business is also considered an OK option.
Welcome to the Internet of Customers.
It's an Internet of Customers, and we need to reassess how we connect with our customers in a whole new way. Everyone and everything is connected.
You see, some companies pivot to their shareholders. Some companies pivot to their competitors. Some companies pivot to their partners. But at salesforce.com, we pivot to our customers, and we have one message to our customers: Pivot to your customers.
Your customers have the answers. There's never been a more important time to listen and interact and engage with your customers. That is what the new world is about. That is what we are doing here when we talk about the third wave of computing it’s not an Internet of Things, it’s an Internet of Customers.
Crowdsourced topic rankings at Snowforce 2017 in Salt Lake City drove this one-hour "Top 10" -- from evolving role of CIO, up through AI-leveraged connection, into a culture of innovation. (Peter Coffee, VP for Strategic Research at Salesforce)
Big Data Goes to Work - Liberating Latent Value in a Connected World - P.CoffeePeter Coffee
Material presented to a session of the Mathematical Sciences Colloquium series at University of Montana - Missoula on 7 December 2015: opportunities, challenges, enabling technologies, practices and impacts of "big data" strategies
Unleash innovation on the Customer Success PlatformPeter Coffee
It's not about being just an "implementation partner." What the customer wants is a transformation advisor. On an enterprise cloud platform, the tech is part of the service -- which makes more time for more interesting things.
Security is too often discussed in terms of what it prevents rather than what it assures. Too much trust in narrowly focused technology, combined with too much fear of the unknown in areas like adoption of the cloud, combine to make many enterprise and other IT systems unnecessarily expensive and inadequately trustworthy.
Connected things are quickly expanding, beyond their traditional scope of industrial plumbing and their recent emergence as lifestyle novelty, to become a global and everyday norm. After the revolution comes the need for sustainable operation: what's involved in assuring that today's Internet of Factories, Internet of Transactions, and emerging Internet of Personal Devices can scale to the demands of billions of people and tens of billions of everythings? Peter Coffee, VP for Strategic Research at salesforce.com inc., examines the challenges and highlights the opportunities for robust and responsible leadership in the world that's taking shape today.
The Rising Floor of Platform - MIT Platform Summit 2014Peter Coffee
If someone thinks that they can create differentiating value by starting at the level of what you sell, at a cost that enables them to sell the result, then you are - to them - a platform. Too much lower, you're plumbing. Above that level, you're a competitor or an irrelevant product. What should a platform provide today, as 24x7 connected people want trustworthy access to data and command of useful function?
New Services, No Silos: The Next 15 YearsPeter Coffee
The cloud is now the mainstream. Congratulations. That means it’s no longer special to be cloudy. What’s needed now is a re-thinking of what IT does. Let legacy IT incumbents relocate the past century’s silos to the past decade’s server farms. The salesforce.com community is already re-inventing business processes, around the informed and elevated expectations of cloud-native collaborative customers and their connected things. Peter Coffee shares a global perspective on present facts, near-term implications, and the opportunities and challenges of continued leadership above the cloud.
Presented as opening keynote at Midwest Dreamin' 2014 in Chicago by Peter Coffee of salesforce.com inc.
How To Thrive In A World of Connected CustomersPeter Coffee
What it means to be customer-centric; how mobile devices, apps and social networks transform behaviors of customers and require new analytics and new commitments from organizations
Looking Back at the Next Ten Years - Fusion Symposium 2024Peter Coffee
In 2024, what will we say we should have seen coming ten years before? Opening keynote to Fusion Symposium in Madison, Wisconsin by Peter Coffee of salesforce.com inc.
Presentation to CleanTech Future Conference II in San Francisco, 4 November 2013, on multi-tenancy's 95% reduction of IT CO2 footprint - versus timid incrementalism of virtual-machine approach
Better, faster and cheaper can be exactly the wrong thing to do when fundamentally different models are enabled and compelled by the revolutions of social connection, mobile connection and big-data discovery. Annual end-of-summer address to joint meeting of L.A. chapters of ACM and AITP, 19 September 2013
Future Normal - Why Every IT Trend Points to PaaSPeter Coffee
Presented by Peter Coffee of salesforce.com to the Platform Strategy Executive Symposium of the MIT Center for Digital Business at the MIT Sloan School of Management, 26 July 2013
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Building the Global "Cloud 2"
1. Building the Global Cloud
Beyond IT Migration: the Enterprise
Peter CoffeePeter Coffee
Head of Platform Research
salesforce.com inc.
2. Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may
contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ
materially from the results expressed or implied by the forward-looking statements we make. All statements
other than statements of historical fact could be deemed forward-looking, including any projections of
subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or
plans of management for future operations, statements of belief, any statements concerning new, planned, or
upgraded services or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing
and delivering new functionality for our service, our new business model, our past operating losses, possible
fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach offluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of
our security measures, risks associated with possible mergers and acquisitions, the immature market in which
we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees
and manage our growth, new releases of our service and successful customer deployment, our limited history
reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further
information on potential factors that could affect the financial results of salesforce.com, inc. is included in our
annual report on Form 10-Q for the most recent fiscal quarter: this document and others are available on the
SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other press releases or public statements are not
currently available and may not be delivered on time or at all. Customers who purchase our services should
make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes
no obligation and does not intend to update these forward-looking statements.
3. Drucker Had It Right
“The typical large organization, twenty years hence, will
be composed largely of specialists who direct and
discipline their own performance through organized
feedback from colleagues and customers.”
“It will be a knowledge-based organization.”
Peter F. Drucker, in The New Realities
…in 1989
4. Barriers to Becoming Knowledge-Based
Complex legacy IT portfolios can make the simplest
data integration an overwhelming task
Cumbersome, brittle integrations demote end users to
information consumers
Path of least resistance
over-emphasizes rear-
view mirror views of
historical data
5. “Why aren’t enterprise apps as easy to use as Amazon.com?”
– Straightforward to discover and evaluate
– Negligible cost of adoption
– Non-disruptive upgrades
– World-class infrastructure robustness and security for all
Myths require busting
Cloud Apps Enable Knowledge-Centered Systems
– Multi-tenancy does not preclude top-tier security
– Packaged services can still enable deep customization
– Remotely operated systems can integrate with legacy assets
– Individual customers can still accept or defer upgrades at will
These cloud truths are still “new news”
If you have to buy new hardware, it is not a cloud
If you have to install, patch, and disruptively update software, it is not a cloud
6. Login… Authenticate…
Apply Data
Security Rules… View Filtered Content
Bottom-Up Design to be “Shared and Secure”
Password security policies
Rich Sharing Rules
User Profiles
SSO/2-factor solutions
8. Governments Must Play Their Role
Data protection regulations
– Where can it be stored?
– Who’s allowed to see it?
– Issues with US border protection
• Biometrics and e-passports• Biometrics and e-passports
• “Everyone has the right to the protection of personal data ”
(Article 8 of the EU Charter of Fundamental Rights)
Intellectual property issues
– EU and Google Books
9. Cloud Integration: Not an All-or-Nothing Choice
Mash-ups from
Web and
AppExchange
Native
Desktop
Connectors
Integration
Partner
Ecosystem
Developer
Toolkits
Native ERP
Connectors
10. Trust Attainment Enables Cloud Adoption
Robust infrastructure security
Rigorous operational security
Granular customer controls
– Role-based privilege sets
– Convenient access control & audit– Convenient access control & audit
“Sum of all fears” scrutiny and response
– Multi-tenancy reduces opportunities for error
– The most demanding customer sets the bar
11. Your Clicks
Your Code
User Interface
Logic
Database
Build strategic applications
Customize any aspect
Upgrade when convenient
Preserve IP control
The Metadata Model: Cloud + Customization
Coherent Code Base and Managed Infrastructure
Metadata representations:
Rigorously partitioned data, logic and customizations for multiple customers
12. Shrinking Devices Accelerating Product Cycles
“The Portable Intelligence
Platform is built on Force.com
cloud computing application
environment.
“The development environment
enables easy integration via
web services with your
company's existing softwarecompany's existing software
platforms (e.g. ERP, CRM,
Finance etc.).
“It is also an ideal environment
for the development for the P.I.
iPad, Mobile and Developer
APIs.”
www.portable-intelligence.com
13. “If you take the ideal
world, everything is
done as a service:
computing, storage,
software and
operations.”
“The risk for enterprises
that don't start a SaaS
migration strategy soon
is that their IT
www.networkworld.com/news/2008/102908-bechtel.html
is that their IT
organizational
structures will be a
competitive
disadvantage.”
Geir Ramleth
CIO, Bechtel Corp.
14. Cloud Computing Shrinks IT’s Carbon Footprint
CO2 Emissions
(grams CO2 per transaction)
0.2
1.35
On-premise Software
0.2 0.03
* “Cloud Computing Emissions Comparison,” Nucleus Research, 2 Sept 2010
Watt-hrs per transaction statistics converted to CO2 / transaction by salesforce.com
using U.S. carbon output ratios computed by region by EPA
15. If we talk about cost reduction, the most I can do for you is cut your
IT spending by 100%. Then we’re done.
If we talk about value creation, I can keep on delivering value with no
upper bound. That’s a much more interesting conversation.
The Cloud’s Lower Cost is Compelling. So What?
If you want cheap IT, go ahead. You won’t be
in business next year. Your competitors will
do projects with attractive ROI, while you
spend less, and you won’t be competitive in
service or performance.
Demand curves slope downwards. Better
apps at lower cost will expand demand and
grow total IT spending. And that’s OK.
16. Supply Chain Clouds are Global
Electronic components made in China…
Have their specifications imported into software that’s
written in Sydney…
That’s used to lay out circuit boards in Europe and the
Middle East…Middle East…
With ID numbers burned into each board that enable
lifetime, Internet-accessible audit of testing and
performance of components…
By a company that’s just switched from MS Office to
Google Apps…and shrunk its data center by ½
17. 1999: Why isn’t all enterprise software like Amazon.com?
2010: Why isn’t all enterprise software like Facebook?
18. True Cloud Storage as a Service
– No one can sell you a hard drive that tells you when your data’s out of date
– In the cloud, your storage can be self-cleaning
True Cloud Customer Support as a Service
– No one can build you a call center that knows everything your customers
know…and everything they’re saying to each other about you
Let’s Not Settle for Parity
know…and everything they’re saying to each other about you
– In the cloud, your service center can embrace and interact with social nets
True Cloud Application Platform as a Service
– No one can give you a local development platform that automatically deploys
your applications onto every new portable device
– In the cloud, apps can acquire new features and support new devices at zero
cost to the developer
19. Addressing Data Quality:
A Cloud that Maintains the Cloud
Largest, Most Accurate Database:
22 million+ B2B contacts
Massive, Engaged Community:
1.2 million+ community adds 36,000 new contacts1.2 million+ community adds 36,000 new contacts
per day
Real-time Updates:
Community updates 12,000 contacts per day
20. Yesterday’s Model Doesn’t Connect with Customers Today
Contact Center
…while customers do this:Assuming this…
Community Sites
21. Join the Conversations
32 nations, 350,000 visitors, and only
one month to launch a global call
center. South African Tourism went live
on multiple channels—phone, email, Web
self-service, Twitter, and Facebook.
Customer feedback on IdeaStorm led
Dell to build select consumer notebooks
and desktops pre-installed with the Linuxand desktops pre-installed with the Linux
platform.
“Ideas has been an unbelievable home
run. We are loving it: the voice of the
customer is totally present at
Starbucks in a brand new way”
(Chris Bruzzo, CTO)
22. 2009: Social Networking Surpasses Email
Social Networking Users
Surpass Email Users on 7/09
Email Users
Social Networking Users
Source: Morgan Stanley Internet Mobile Report, December 2009
Data is for unique, monthly users of social networking and email usage.
23. It’s hard to add security to a tool that shares by default
It’s possible to add social tools to a proven trust model
Enterprise Clouds Enable Secure Communities
24. Social Business Processes
Collaborative
process creation &
maintenance
Best practice
sharing
Andrew Leigh. I need to create a
new customer service process for
Integration with
feeds and other
social channels
Social process
monitoring
Steve Wood. Great – I can help
with the case escalation by linking
in the Apple Escalation Process.
New process created: iPad Tier 1
Support Process (Goals: Run
time, 5 min)
new customer service process for
the iPad, can you guys help?
Varadarajan Rajaram. Yes, I know
this product well – there are a
bunch of solutions I can build into
this process.
25. Real-Time Device Interactions
Instant updates, not
limited by human
speed or attention
Effective integration
of hardware speedof hardware speed
& human judgment
The next new
application
opportunity
public String CloudThoughts{ get; set;}
Mike Leach, www.embracingthecloud.com
26. Measured Results: Far Superior to Process Migration
2009 IDC Research Report
Savings with Force.com
Staffing 76%-85%
Development Time 76%
Time to Make Changes 75%
Total Cost 54%
27. Qualcomm Opens New Support Channel In One Week
20,000 customers (engineers) that require 24/7 support
Deployed first customer portal in 1 week
Retired 40 servers and 11 databases
Mark Silber
IT Systems Architect
$11B Chip Manufacturer
Retired 40 servers and 11 databases
Reduced IT CRM support costs by 60%
100,000 self-service portal users
28. New Capabilities Added At Will…
…Not When the Capital Budget Allows
Chatter PlatformChatter Platform
Profiles
Check to Enable
FeedsFeeds
Status Updates
Groups
Apps
Document Sharing
Social Apps
29. Customers Building Cloud Apps:
5X Faster at Half the Cost
Departmental
Apps
Business
Process Apps
Data-Driven
Web Sites
Lotus Notes
Replacement
Franchise Management
App
1/3 the cost of .Net
Medical Research
Apps
Added 11 New
Products in 12 Months
Community Web Site
10 Million Users
Built in 3 Weeks
Replaced 5,000
Notes Seats
5X Faster
1/5 the Cost
30. From Korea to Spain: 100% Cloud Cover
Google Search traffic for the phrase “Cloud Computing”
31. “Enterprise apps can be as easy to use as Amazon.com!”
– Straightforward to discover and evaluate
– Negligible cost of adoption
– Non-disruptive upgrades
– World-class infrastructure robustness and security for all
Myths are dispelled by demonstrations
Even After a Decade of SaaS
– Multi-tenancy has not compromised security
– Service composition accelerates customization
– Cloud integration adds value to legacy assets
– Almost all customers welcome rapid upgrades
These cloud truths are still “new news”
– If you have to buy new hardware, it is not a cloud
– If you have to install, patch, and disruptively update software, it is not a cloud
32. Why True Clouds are Different
Application service providers
They flew the airplanes for you, but every plane offered its own
separate opportunity to crash.
Limited economies of scale: to move 2,000 people with
DC-3s required 100 pilots and the costly maintenance of 200
engines.
True CloudsTrue Clouds
The providers fly the planes; the planes are designed, from the first
stroke of the pen, to be large-scale movers of massive workloads.
Enormous efficiencies and savings: move 2,000 people
with four pilots + four copilots and maintain just 16 (simpler) engines.
Continual improvement and rigorous maintenance included in price
of the service.
False Clouds
You buy the same kind of technology that’s used by true cloud
service providers, but you fly it. You maintain it. You deal with any
unexpected costs or operational issues.
You’d better have an awfully good reason.
33. Yes, There Is a True Cloud
Mash-ups from
Web and
AppExchange
Native
Desktop
ConnectorsNative ERP
Connectors
34. Peter Coffee
Head of Platform Research
pcoffee@salesforce.com
facebook.com/peter.coffee
twitter.com/petercoffee
Q&A?
35. Currently used in critical service sectors
– 53% of high-tech firms
– 40% of financial services firms
– 37% of legal services providers
– 35% of retail firms
– 32% of health care providers
– 32% of manufacturers
Broad Cloud Services Adoption
– 29% of educational institutions
Plans for expanded use across the board
– 73% of health care providers
– 75% of government agencies
– 75% of high-tech firms
– 70% of all current users
Sources: Accenture, Mimecast surveys of US/Canada IT decision makers
36. 4 Months
(Oct ’06- Feb ’07)
1 Month
Deployments
“This is process lite. It gives my business users what they want,
a unique app for each sales team, fundamentally reflecting their own personality.
“And yes, I get a single standard SAP integration. It’s a terrific success.”
–CIO, Fortune 500 Firm
Sales
Distributors
Sales
Distributors
Cloud Integration: New Leverage for Knowledge
1 Month
(Dec ’06)
5 Months
(Dec ’06 – May ’07)
2Q07
SAP Back-end
Integration
Customized for
Diverse Sales Groups
EMEA
Inside Sales
EMEA
Inside Sales
AFS Global
Sales
AFS Global
Sales
FLPR Field
Sales
FLPR Field
Sales
37. Live System Status
Security Best Practices
Historical Performance
Full Public Disclosure
Trust through openness
Excellent…and improving
• 99.997% of planned
availability
• Continually narrower
maintenance windows
Historical Performance
Amazon
Google