Keynote by Peter Coffee of salesforce.com for Phorum 2012 event of Philadelphia Alliance for Capital and Technologies (PACT) - Revolutions in cloud services enabling reinvention of enterprise collaboration and social engagement through teams, customer communities, and socially enabled products
This chapter discusses how information technology supports organizational performance in turbulent business environments. It defines key terms like information systems, information technology, and the digital economy. It also explains how business pressures, organizational responses, and IT are related and how IT can provide competitive advantage through strategies like supply chain management, data analytics, and social computing. The chapter outlines concepts that will be covered in more detail later like Porter's value chain, social networks, and managerial issues related to IT.
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business ValueThe 2.0 Adoption Council
The document discusses metrics for measuring the success of internal communities and social software implementations at United Business Media and The MITRE Corporation. It provides examples of quantitative metrics like page views, logins, and contributor counts. It also discusses qualitative metrics like surveys to measure user experience and gather feedback. The document advocates using a mix of numbers, surveys, and stories ("wins") to evaluate communities and look for progress over time through benchmarking against prior performance.
This document summarizes key points from Chapter 1 of the textbook "IT Supports Organizational Performance in Turbulent Business Environments" by Turban and Volonino. It discusses how Toyota used innovative IT strategies like social media, virtual worlds, and customized websites to successfully market and promote its Scion brand. It also provides an overview of concepts like the digital economy, information systems, how businesses use IT to gain competitive advantages, and emerging technologies like social computing and virtual worlds. Learning objectives, figures, and examples are included to illustrate these topics.
1. The email marketing industry is performing strongly, with email bringing in $40.56 for every dollar spent on it.
2. Marketers are capturing opt-ins and customer data everywhere through techniques like popovers, social media signups, QR codes, and in-store kiosks.
3. Marketers are shifting from broadcast messaging to more automated and personalized campaigns triggered by customer behavior and preferences in order to improve engagement rates.
The document discusses opportunities for carriers and OTT providers in the changing mobile ecosystem. It notes that OTTs are accelerating changes in user behavior and the shift from voice to data revenues. However, the real threat to core revenues comes from local broadband competition rather than OTTs. While OTTs in voice and messaging represent zero new revenue, the overall OTT model provides opportunities to leverage infrastructure, gain closer access to customers, and offer new services like quality of experience guarantees. Telecom companies need to redefine their core assets and value proposition in order to capture new opportunities in this evolving landscape.
This document discusses the impact of climate change on the tourism industry and the role of technology in addressing it. It notes that the tourism industry significantly contributes to greenhouse gas emissions, particularly carbon dioxide, and this creates costly changes to regional climates. New regulations through cap-and-trade programs will soon affect the tourism industry. This will pose challenges for data management across the tourism value chain and require technological solutions for emission data collection, storage, and reporting. Service providers will also need to transform operations and culture to align with climate policies.
Open Networks, Trusted Clouds: Peter Coffee at Cloud Expo 7 Nov 2011Peter Coffee
Beyond cloud as IT replacement, to cloud as assumed environment for radical acceleration of business process and global expansion of customer community
Social Advocacy- The Next Big Thing. People Trust People More Than Brands™Ajit K Nair
This document discusses the opportunity for social advocacy and outlines plans to develop a social advocacy product. Key points:
- Social advocacy, where customers advocate for brands on social media, is an emerging opportunity as customers increasingly trust peer recommendations over brand messaging.
- The document proposes developing an all-in-one social advocacy platform app that brands can use to engage employees, customers, and influencers to promote the brand on social media.
- Potential early adopter industries are identified, and a business model is proposed where the app is initially free to seed the market and generate awareness.
This chapter discusses how information technology supports organizational performance in turbulent business environments. It defines key terms like information systems, information technology, and the digital economy. It also explains how business pressures, organizational responses, and IT are related and how IT can provide competitive advantage through strategies like supply chain management, data analytics, and social computing. The chapter outlines concepts that will be covered in more detail later like Porter's value chain, social networks, and managerial issues related to IT.
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business ValueThe 2.0 Adoption Council
The document discusses metrics for measuring the success of internal communities and social software implementations at United Business Media and The MITRE Corporation. It provides examples of quantitative metrics like page views, logins, and contributor counts. It also discusses qualitative metrics like surveys to measure user experience and gather feedback. The document advocates using a mix of numbers, surveys, and stories ("wins") to evaluate communities and look for progress over time through benchmarking against prior performance.
This document summarizes key points from Chapter 1 of the textbook "IT Supports Organizational Performance in Turbulent Business Environments" by Turban and Volonino. It discusses how Toyota used innovative IT strategies like social media, virtual worlds, and customized websites to successfully market and promote its Scion brand. It also provides an overview of concepts like the digital economy, information systems, how businesses use IT to gain competitive advantages, and emerging technologies like social computing and virtual worlds. Learning objectives, figures, and examples are included to illustrate these topics.
1. The email marketing industry is performing strongly, with email bringing in $40.56 for every dollar spent on it.
2. Marketers are capturing opt-ins and customer data everywhere through techniques like popovers, social media signups, QR codes, and in-store kiosks.
3. Marketers are shifting from broadcast messaging to more automated and personalized campaigns triggered by customer behavior and preferences in order to improve engagement rates.
The document discusses opportunities for carriers and OTT providers in the changing mobile ecosystem. It notes that OTTs are accelerating changes in user behavior and the shift from voice to data revenues. However, the real threat to core revenues comes from local broadband competition rather than OTTs. While OTTs in voice and messaging represent zero new revenue, the overall OTT model provides opportunities to leverage infrastructure, gain closer access to customers, and offer new services like quality of experience guarantees. Telecom companies need to redefine their core assets and value proposition in order to capture new opportunities in this evolving landscape.
This document discusses the impact of climate change on the tourism industry and the role of technology in addressing it. It notes that the tourism industry significantly contributes to greenhouse gas emissions, particularly carbon dioxide, and this creates costly changes to regional climates. New regulations through cap-and-trade programs will soon affect the tourism industry. This will pose challenges for data management across the tourism value chain and require technological solutions for emission data collection, storage, and reporting. Service providers will also need to transform operations and culture to align with climate policies.
Open Networks, Trusted Clouds: Peter Coffee at Cloud Expo 7 Nov 2011Peter Coffee
Beyond cloud as IT replacement, to cloud as assumed environment for radical acceleration of business process and global expansion of customer community
Social Advocacy- The Next Big Thing. People Trust People More Than Brands™Ajit K Nair
This document discusses the opportunity for social advocacy and outlines plans to develop a social advocacy product. Key points:
- Social advocacy, where customers advocate for brands on social media, is an emerging opportunity as customers increasingly trust peer recommendations over brand messaging.
- The document proposes developing an all-in-one social advocacy platform app that brands can use to engage employees, customers, and influencers to promote the brand on social media.
- Potential early adopter industries are identified, and a business model is proposed where the app is initially free to seed the market and generate awareness.
Technology & Information Technology trends 2012Mozammel Rony
Global IT trends are shifting delivery platforms to mobility, cloud, and social technologies. Communication and collaboration channels are also being reinvented through various digital platforms. Consumer technologies are driving enterprise innovation. Data is exploding from numerous connected devices and sensors. Revolutionary trends include cloud computing, unified communications, mobile applications, IT security, social media, and automation. The cloud computing model provides infrastructure, platforms, and software as services. Tablets and mobile devices are increasingly used for work. Apps are delivered through application stores and accessed on various devices. Social media has surpassed email for communication and is merging into business processes. Automation links disparate systems for self-regulation but has limitations. Bangladesh's growing IT industry is led by domestic outsour
PATEO - Automobile Artificial Intelligence (AI) in China, a Digital Marketing...Kate Gilchrist
A Digital Marketing Case Study of IT corporation PATEO (based in Shanghai), exploring the market for smart automobiles and the emergence of AI in the automobile industry.
This document discusses managing digital business transformation and growth hacking. It provides learning outcomes on critically analyzing an organization's transformation journey, reviewing approaches for digital transformation, and producing growth hacking and analytics plans. The document also defines key terms, presents frameworks for digital transformation and growth hacking, and discusses measuring the effectiveness of digital businesses.
Does the Internet of Things make or break your business model?Oliver Koeth
How today‘s „Generation Kickstarter“ shapes tomorrow‘s customer relation. A journey from NTT Group's holistic Technology Foresight to 16h hardware hack for a cloud connected pet health gadget.
Presented by Jamie Donoghue, Principal Consultant, UXC Consulting at ISS-UXC Seminar: Move IT from Cost to Value Centre using IT Service Management and COBIT on 25 July 2014.
The document discusses two major technology trends in Thailand for 2012: consumerization and predictive analytics. Consumerization refers to consumer technologies being adopted for business use, such as employees using their personal devices for work. This brings challenges around security, applications, and lost control for companies. Predictive analytics uses statistical techniques to analyze data and predict future events. It has applications in various industries for tasks like customer relationship management, medical decisions, fraud detection, and retention programs. The document provides examples and context around both of these trends in technology for Thailand.
An informative presentation on current Automotive Industry conditions, dealership issues, social media's role in business, and the impact of legislation changes for reportable write-offs
The document discusses how digital disruption is accelerating change across all industries through the forces of the Internet of Everything/Things, modern consumers and employees. It summarizes the results of a study that ranked 12 industries based on their proximity to the "center" of this digital vortex. The study found that digital disruption could displace 40% of top incumbents within 3 years, yet only 32% of companies are actively transforming. It concludes that industries will split and recombine, and that any company that does not transform digitally risks being disrupted.
Right on Pivot, 2021
2 out of 5 unicorns today pivoted at least once in their journey. This document digs deeper to understand the art and science of successful pivots.
Here is what's inside:
What is a pivot? Is it only for startups? Is it only for tech?
Is a pivot something I need to consider for my organization?
Who pivoted and how?
How do I do a pivot the right way?
It contains showcases & deep-dives of some of the best known brands like Dropbox, Flickr, Instagram, Microsoft, Netflix, Practo, Shopify, Udaan, YouTube, Zetwerk.
IIT D Case study Competition | Art of War devarkfirst
College: XIMB
Team Name: Art of War
Team Leader: Devark Chauhan
Email: UM19152@stu.ximb.ac.in
Mobile: 9466670234
The team presented solutions to improve growth, scalability, engagement and integration of the MX TakaTak app. Their multifaceted approach focuses on leveraging technology, targeting tier 2/3 cities and rural areas, implementing UI/UX changes, and integrating additional MX services to overcome competitors and become the leading short video app.
The Agile Manifesto was published in 2001 and much has changed since then. Read on for an opportunity to rethink the Agile Manifesto. View Agile in a new light and deconstruct which concepts were home runs and which still need to evolve.
A Hmat Ta Ra is a mobile app that allows users to record and share life events and moments. Key activities include app development, data security, and partnerships. Key resources are the app platform and user content/network. The app aims to create memorable stories by promoting experience sharing and relationships. It targets ages 18-55 across 137 countries. Revenue comes mainly from payments and fees, while costs relate to platform maintenance, R&D, marketing, and customer service. The goal is to global connectivity through easy sharing while appreciating life's precious moments.
IBM Academy of Technology & Cognitive ComputingNico Chillemi
I delivered this presentation at University at Chieti-Pescara in Abruzzo (Italy) in September 2015, introducing IBM Academy of Technology and talking about Cognitiva Computing and Analytics with IBM Watson and IBM IT Operations Analytics Log Analysis (ITOA). The video in Italian is available on YouTube, please contact me if you are interested. Thanks to Amanda Tenedini for the help with Social Media and to Piero Leo for the help with IBM Watson.
Sercomtel presentation at IBM Connect 2014Flávio Mendes
Sercomtel is a telecommunications company in Brazil that provides voice and data services to over 300,000 customers across 13 cities. Seeking to improve customer service and reduce call times, Sercomtel purchased IBM Connections to replace its outdated internal document search and knowledge base tool. The deployment and training process took two months. Since adopting IBM Connections, Sercomtel has seen a 50% reduction in document search time, leading to a 9% reduction in average call time. This has resulted in estimated annual savings of $41,670 USD.
Deck used in the opening keynote presentation I gave to the "Global Social Media Summit: The Authentic Social Enterprise" of the Arthur W. Page Society in London on October 3, 2012.
Event info: http://www.awpagesociety.com/events/globalsmsummit2012/
Discussion: #PageGlobal2012
Demonetization, IoT and related thoughts! by "Sherlin Mathew" from "Cogizant" The presentation was done at #doppa17 DevOps++ Global Summit 2017. All the copyrights are reserved with the author
Social Enterprise: Trust; Vision; RevolutionPeter Coffee
Becoming a social enterprise is not a technical evolution, but a business transformation. Technologies enable it, but only a cultural commitment will achieve it. Doing it is not optional, unless going out of business is also considered an OK option.
The Evolution of Cloud Computing - Sydney Social Enterprise BreakfastDerek Laney
you cant just put social in front of business activities, you need to embed social processes and technology in your business - Kate Carruthers
#socentanz
Related presentation http://www.slideshare.net/carruthk/the-power-of-social-business
The document discusses Peter Drucker's view that the only valid definition of a business's purpose is to create and keep customers, as customers are the only true profit centers for a business, not any internal departments or divisions which are merely cost centers, and the goal of any organization should be attracting customers whose payments do not bounce.
Crowdsourced topic rankings at Snowforce 2017 in Salt Lake City drove this one-hour "Top 10" -- from evolving role of CIO, up through AI-leveraged connection, into a culture of innovation. (Peter Coffee, VP for Strategic Research at Salesforce)
More Related Content
Similar to Clouds of Revolution - Reinventing the Social Enterprise
Technology & Information Technology trends 2012Mozammel Rony
Global IT trends are shifting delivery platforms to mobility, cloud, and social technologies. Communication and collaboration channels are also being reinvented through various digital platforms. Consumer technologies are driving enterprise innovation. Data is exploding from numerous connected devices and sensors. Revolutionary trends include cloud computing, unified communications, mobile applications, IT security, social media, and automation. The cloud computing model provides infrastructure, platforms, and software as services. Tablets and mobile devices are increasingly used for work. Apps are delivered through application stores and accessed on various devices. Social media has surpassed email for communication and is merging into business processes. Automation links disparate systems for self-regulation but has limitations. Bangladesh's growing IT industry is led by domestic outsour
PATEO - Automobile Artificial Intelligence (AI) in China, a Digital Marketing...Kate Gilchrist
A Digital Marketing Case Study of IT corporation PATEO (based in Shanghai), exploring the market for smart automobiles and the emergence of AI in the automobile industry.
This document discusses managing digital business transformation and growth hacking. It provides learning outcomes on critically analyzing an organization's transformation journey, reviewing approaches for digital transformation, and producing growth hacking and analytics plans. The document also defines key terms, presents frameworks for digital transformation and growth hacking, and discusses measuring the effectiveness of digital businesses.
Does the Internet of Things make or break your business model?Oliver Koeth
How today‘s „Generation Kickstarter“ shapes tomorrow‘s customer relation. A journey from NTT Group's holistic Technology Foresight to 16h hardware hack for a cloud connected pet health gadget.
Presented by Jamie Donoghue, Principal Consultant, UXC Consulting at ISS-UXC Seminar: Move IT from Cost to Value Centre using IT Service Management and COBIT on 25 July 2014.
The document discusses two major technology trends in Thailand for 2012: consumerization and predictive analytics. Consumerization refers to consumer technologies being adopted for business use, such as employees using their personal devices for work. This brings challenges around security, applications, and lost control for companies. Predictive analytics uses statistical techniques to analyze data and predict future events. It has applications in various industries for tasks like customer relationship management, medical decisions, fraud detection, and retention programs. The document provides examples and context around both of these trends in technology for Thailand.
An informative presentation on current Automotive Industry conditions, dealership issues, social media's role in business, and the impact of legislation changes for reportable write-offs
The document discusses how digital disruption is accelerating change across all industries through the forces of the Internet of Everything/Things, modern consumers and employees. It summarizes the results of a study that ranked 12 industries based on their proximity to the "center" of this digital vortex. The study found that digital disruption could displace 40% of top incumbents within 3 years, yet only 32% of companies are actively transforming. It concludes that industries will split and recombine, and that any company that does not transform digitally risks being disrupted.
Right on Pivot, 2021
2 out of 5 unicorns today pivoted at least once in their journey. This document digs deeper to understand the art and science of successful pivots.
Here is what's inside:
What is a pivot? Is it only for startups? Is it only for tech?
Is a pivot something I need to consider for my organization?
Who pivoted and how?
How do I do a pivot the right way?
It contains showcases & deep-dives of some of the best known brands like Dropbox, Flickr, Instagram, Microsoft, Netflix, Practo, Shopify, Udaan, YouTube, Zetwerk.
IIT D Case study Competition | Art of War devarkfirst
College: XIMB
Team Name: Art of War
Team Leader: Devark Chauhan
Email: UM19152@stu.ximb.ac.in
Mobile: 9466670234
The team presented solutions to improve growth, scalability, engagement and integration of the MX TakaTak app. Their multifaceted approach focuses on leveraging technology, targeting tier 2/3 cities and rural areas, implementing UI/UX changes, and integrating additional MX services to overcome competitors and become the leading short video app.
The Agile Manifesto was published in 2001 and much has changed since then. Read on for an opportunity to rethink the Agile Manifesto. View Agile in a new light and deconstruct which concepts were home runs and which still need to evolve.
A Hmat Ta Ra is a mobile app that allows users to record and share life events and moments. Key activities include app development, data security, and partnerships. Key resources are the app platform and user content/network. The app aims to create memorable stories by promoting experience sharing and relationships. It targets ages 18-55 across 137 countries. Revenue comes mainly from payments and fees, while costs relate to platform maintenance, R&D, marketing, and customer service. The goal is to global connectivity through easy sharing while appreciating life's precious moments.
IBM Academy of Technology & Cognitive ComputingNico Chillemi
I delivered this presentation at University at Chieti-Pescara in Abruzzo (Italy) in September 2015, introducing IBM Academy of Technology and talking about Cognitiva Computing and Analytics with IBM Watson and IBM IT Operations Analytics Log Analysis (ITOA). The video in Italian is available on YouTube, please contact me if you are interested. Thanks to Amanda Tenedini for the help with Social Media and to Piero Leo for the help with IBM Watson.
Sercomtel presentation at IBM Connect 2014Flávio Mendes
Sercomtel is a telecommunications company in Brazil that provides voice and data services to over 300,000 customers across 13 cities. Seeking to improve customer service and reduce call times, Sercomtel purchased IBM Connections to replace its outdated internal document search and knowledge base tool. The deployment and training process took two months. Since adopting IBM Connections, Sercomtel has seen a 50% reduction in document search time, leading to a 9% reduction in average call time. This has resulted in estimated annual savings of $41,670 USD.
Deck used in the opening keynote presentation I gave to the "Global Social Media Summit: The Authentic Social Enterprise" of the Arthur W. Page Society in London on October 3, 2012.
Event info: http://www.awpagesociety.com/events/globalsmsummit2012/
Discussion: #PageGlobal2012
Demonetization, IoT and related thoughts! by "Sherlin Mathew" from "Cogizant" The presentation was done at #doppa17 DevOps++ Global Summit 2017. All the copyrights are reserved with the author
Social Enterprise: Trust; Vision; RevolutionPeter Coffee
Becoming a social enterprise is not a technical evolution, but a business transformation. Technologies enable it, but only a cultural commitment will achieve it. Doing it is not optional, unless going out of business is also considered an OK option.
The Evolution of Cloud Computing - Sydney Social Enterprise BreakfastDerek Laney
you cant just put social in front of business activities, you need to embed social processes and technology in your business - Kate Carruthers
#socentanz
Related presentation http://www.slideshare.net/carruthk/the-power-of-social-business
Similar to Clouds of Revolution - Reinventing the Social Enterprise (20)
The document discusses Peter Drucker's view that the only valid definition of a business's purpose is to create and keep customers, as customers are the only true profit centers for a business, not any internal departments or divisions which are merely cost centers, and the goal of any organization should be attracting customers whose payments do not bounce.
Crowdsourced topic rankings at Snowforce 2017 in Salt Lake City drove this one-hour "Top 10" -- from evolving role of CIO, up through AI-leveraged connection, into a culture of innovation. (Peter Coffee, VP for Strategic Research at Salesforce)
Game of Phones - Becoming the Architects of Connection (Midwest Dreamin' Clos...Peter Coffee
Over a span of 30-something years, the CPU speed of a mainstream personal computer has grown by less than a factor of one thousand -- while the connectivity bandwidth that people expect (in workplace, home, and even in mobile activities) has grown 200 times that much. If we called them "(inter)personal connectors," we might be capturing more correctly the role of the "PC" and its descendants in our lives -- but in most organizations, we still treat IT more as a discipline of automation and calculation and archival than as a medium of connection and collaboration. Peter Coffee shares current research and a global perspective on what it means for the Salesforce community to take the lead in repurposing and reculturing the modern era's defining technology.
Inside Out and Upside Down - FOO Camp 2016 - Peter CoffeePeter Coffee
Four "truths" of IT are still true enough to yield ROI by pursuing their further development -- but you'll never realize how much you left on the table by failing to appreciate their transformation in a massively connected world.
Big Data Goes to Work - Liberating Latent Value in a Connected World - P.CoffeePeter Coffee
Material presented to a session of the Mathematical Sciences Colloquium series at University of Montana - Missoula on 7 December 2015: opportunities, challenges, enabling technologies, practices and impacts of "big data" strategies
Fusion Trumps Confusion discusses how connection and collaboration can help companies adapt to changing customer expectations and competitive landscapes. As customers gain more information access and control, companies must shift from siloed activities to genuine customer focus, awareness of their environment, and analytics that look forward instead of backward. Thriving in the future will require cloud-native thinking, innovation at high speed, and adding value through connection rather than non-value-adding complexities.
Unleash innovation on the Customer Success PlatformPeter Coffee
It's not about being just an "implementation partner." What the customer wants is a transformation advisor. On an enterprise cloud platform, the tech is part of the service -- which makes more time for more interesting things.
It's About The Citizen - Changing Needs and Rising ExpectationsPeter Coffee
Presented as keynote to GTEC 2014 in Ottawa, 28 October 2014 by Peter Coffee of Salesforce
A “cloud computing” conversation used to be a plan to cut IT costs and accelerate project schedules. Today, it’s becoming a citizen-driven discussion of improving the visibility, availability and accountability of every institution of modern life — in a world where people have a whole new level of power to discover, share, and collaborate in identifying and confronting challenges as well as pursuing new opportunities. Not merely the execution, but even the basic mission, of government and other organs of society is in the crosshairs. Peter Coffee brings salesforce.com’s global perspective, as thrice-named “World’s Most Innovative Company” (Forbes), to share with theGTEC community and to offer opportunities for action.
The document discusses how connectivity and mobile devices are changing communities and businesses. It notes that 1/5 of the world owns a smartphone and over 10 billion devices are generating data. It argues that companies must adapt to connected customers who have greater access to information and can collaborate online. Challenges mentioned include ensuring security of personal data and building trust as connections increase.
Security is too often discussed in terms of what it prevents rather than what it assures. Too much trust in narrowly focused technology, combined with too much fear of the unknown in areas like adoption of the cloud, combine to make many enterprise and other IT systems unnecessarily expensive and inadequately trustworthy.
Connected things are quickly expanding, beyond their traditional scope of industrial plumbing and their recent emergence as lifestyle novelty, to become a global and everyday norm. After the revolution comes the need for sustainable operation: what's involved in assuring that today's Internet of Factories, Internet of Transactions, and emerging Internet of Personal Devices can scale to the demands of billions of people and tens of billions of everythings? Peter Coffee, VP for Strategic Research at salesforce.com inc., examines the challenges and highlights the opportunities for robust and responsible leadership in the world that's taking shape today.
The Rising Floor of Platform - MIT Platform Summit 2014Peter Coffee
If someone thinks that they can create differentiating value by starting at the level of what you sell, at a cost that enables them to sell the result, then you are - to them - a platform. Too much lower, you're plumbing. Above that level, you're a competitor or an irrelevant product. What should a platform provide today, as 24x7 connected people want trustworthy access to data and command of useful function?
New Services, No Silos: The Next 15 YearsPeter Coffee
The cloud is now the mainstream. Congratulations. That means it’s no longer special to be cloudy. What’s needed now is a re-thinking of what IT does. Let legacy IT incumbents relocate the past century’s silos to the past decade’s server farms. The salesforce.com community is already re-inventing business processes, around the informed and elevated expectations of cloud-native collaborative customers and their connected things. Peter Coffee shares a global perspective on present facts, near-term implications, and the opportunities and challenges of continued leadership above the cloud.
Presented as opening keynote at Midwest Dreamin' 2014 in Chicago by Peter Coffee of salesforce.com inc.
How To Thrive In A World of Connected CustomersPeter Coffee
What it means to be customer-centric; how mobile devices, apps and social networks transform behaviors of customers and require new analytics and new commitments from organizations
Looking Back at the Next Ten Years - Fusion Symposium 2024Peter Coffee
In 2024, what will we say we should have seen coming ten years before? Opening keynote to Fusion Symposium in Madison, Wisconsin by Peter Coffee of salesforce.com inc.
Presentation to CleanTech Future Conference II in San Francisco, 4 November 2013, on multi-tenancy's 95% reduction of IT CO2 footprint - versus timid incrementalism of virtual-machine approach
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Clouds of Revolution - Reinventing the Social Enterprise
1. Clouds of Revolution
Reinventing the (Social) Enterprise
@PeterCoffee
Peter Coffee
VP & Head of Platform Research
salesforce.com inc.
2. Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking
statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions
In Other Words:
proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-
looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including
any projections of subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or
plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services
Everything That
or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering
new functionality for our service, our new business model, our past operating losses, possible fluctuations in our operating results
and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, risks associated with possible
You See Here
mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to
expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer
deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers.
Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual
is Real
report and on our Form 10-Q for the most recent fiscal quarter: these documents and others are available on the SEC Filings
section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon
features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-
looking statements.
@PeterCoffee
3. Revolution 1: Breakout Speed & Efficiency
• Silicon Photonics
– performance/watt has been flat over time (Google Labs, ’05)
– Ge lasers 100 times faster than intra-chip wires (MIT)
– reduced power losses, easier to cool
– ‘seed & melt’ detector fab: cheaper than vapor deposition (IBM)
• Memristors (HP, IBM, Hynix)
– roughly twice the density of flash
– more than 1,000 times faster
– millions of rewrite cycles
• Metamaterials (Purdue)
– new semiconductors ‘steer’ light with electric fields
– aluminum and gallium doping agents reduce optical losses
@PeterCoffee
4. Revolution 2: Precise Control of Trust
• Formally verified operating system (National ICT Australia)
• Application ‘whitelisting’
• Facebook “Custom” button
– What do they have in common?
– Finally, a trend toward granting specific permissions rather than
trying to anticipate and block attacks and errors
@PeterCoffee
5. Revolution 3: Massive Analytics & Insight
• Big Data
– “Time is lost, confusion results and money is spent.”
(1917 complaint about the telephone)
– ‘volume, velocity, variety’ (Gartner)
– beyond scientific computing
• Bigger Tools
– Hadoop (Facebook / Cloudera)
– Informatica
• Improving Informatica
Algorithms &
Visualizations
@PeterCoffee
6. Revolutions 4-?: Connecting Everything
• Bandwidth pooling
– BitMate (Pakistan) effectively doubles connection speed
– downloaded by users in 173 countries
• Tagged-packet networking (USC / GM)
– instead of sending packets to an address,
label with data attributes
• ‘This is what I’m about’
• ‘This is where I’m useful’
• ‘This is when I’m outdated’
• Task-inferring search (Siri)
• Data security and robustness (RSA)
• Pervasive Social Networking
@PeterCoffee
7. Social Revolution:
Social Networking Surpasses Email
So what?
1.1
Social Users billion
social
users
Email Users
2007 2008 2009 2010 2011
Source: Comscore, June 2011
@PeterCoffee
8. Social Networks: More Than Just ‘Sum of the People’
(Arcs Represent Number • Distance of Facebook ‘Friend’ Links)
@PeterCoffee
Pop quiz: where is Beijing?
9. ‘Digital’=Evolution; ‘Connected’=Revolution
Replacing doctors’ clipboards with smartphones?
– Does not make current health care model sustainable
– Connectivity lets patients stay in sensor-enriched homes
• Radically reduce office visits and hospital admissions
Replacing students’ textbooks with iPads?
– Does not make current higher education model sustainable
– Connectivity turns the campus inside out
• Most of students’ time spent in ‘intern’ environment
• Instructors can tailor presentation sequence to work demands
• Return to campus for seminars, research colloquia…and graduation
@PeterCoffee
10. Networks are More Than Webs
Webs are woven; networks emerge
– A web is just a collection of connections
– The arcs of a network have direction,
magnitude, quality, and value
‘Friend’ is bilateral; ‘Follow’ is not
– Counting followers → ego rewards, but what do they do for you?
• Followers may be just as entertained by your failure
– A critic whose input is acknowledged becomes an advisor
• When input → results, advisors feel invested → advocates and zealots
Products have buyers; brands have fans
@PeterCoffee
11. Fans Arise from ‘+1’ Customer Experience
Engineers get to write spec sheets…
Assembly workers get to build and ship…
Lawyers get to write the terms of service…
Call centers get to compile call statistics…
…but only the customers get to say what kind of
experience they had – and they say it to the world
Is every employee in the company equipped to
make that experience excellent?
@PeterCoffee
12. Collaboration is Key
A social workplace is ‘relative’
– Not statically defined by org chart
– Reshaped by knowledge
– Accelerated by events
All Force.com applications are
socially enabled by Chatter
– Older apps simply acquired
the new behavior
– Social behaviors are pervasive,
not isolated in social silo
@PeterCoffee
14. ‘Product’ = Vehicle of Ongoing Experience
Chatter for 320,000 Toyota Vehicles
Employees Social Customer
Profile
Dealers/Distributo
Toyota Friend
rs
Mobile
Toyota Friend
1-800-4-My- Website
Toyota
Manufacturing/ Toyota Friend
Finance on Youtube
Toyota Friend on
Toyota Friend
Toyota Friend Facebook
on mixi
on Twitter
@PeterCoffee
15. Experience Creation → Profit Preservation
“One automaker’s chief financial officer told Sun
COO Jonathan Schwartz that his company could
give a car away for free, if it could charge a
customer $220 per month for a subscription.”
www.zdnet.com/news/sun-puts-java-into-gear-for-cars/136886
“CE device margins are razor thin, and the promise of
maintaining an always-on connection to the customer after the
point of sale is mighty enticing… Simply put, connected
devices make connected customers.”
Richard Schwartz, President and CEO, Macheen
“The retail cloud has reached critical mass: everything from DVD
players to TVs, from car entertainment to alarm clocks, comes with
some sort of cloud service to support that device.”
David Linthicum, 18 January 2012
@PeterCoffee
16. Experience = Interaction → Adaptation
Where are customers & influencers having conversations?
What facilities exist for tapping that stream?
What are the cultural norms of that community?
When should you be present?
How should you participate?
Who will represent you?
How will that process scale?
What will you learn?
How will you change?
@PeterCoffee
18. Experience Delivery: a Model, not an App
• Collaborative
process creation &
maintenance
• Best practice
Andrew Leigh. I need to create a new
sharing customer service process for the iPad, can
you guys help?
• Integration with
New process created: iPad Tier 1 Support
feeds and other Process (Goals: Run time, 5 min)
social channels
• Social
Steve Wood. Great – I can help with the
case escalation by linking in the Apple
Escalation Process.
process Varadarajan Rajaram. Yes, I know this
product well – there are a bunch of
management solutions I can build into this process.
@PeterCoffee
19. Enterasys Devices Are Social
Network
congestion
in Asia.
Facebook, Twitter, and Chatter
notifications
Users receive alarms
and alerts
Enables rapid response
Reduces system downtime
@PeterCoffee
20. The Value of Velocity
New Devices → New Use Environments → New Moments of Opportunity & Decision
CIO Tablet Intentions
“
2011
Employee-
...fastest ramping
Not Allowed Purchased for Employees
owned
mobile device
”
ever.
2010
Morgan Stanley, “Tablet Demand and Disruption”, February 14, 2011.
@PeterCoffee
21. The Value of Velocity
Legacy Stack-Based Process – Wherever It Is
Install & Write Deploy & Monitor Patch and
Configure Load & Tune Regression
Code
Stack Test Test
You Your
App
Average time to build a custom app with software is 8 months.
IDC White Paper sponsored by Salesforce.com: “Force.com Cloud Platform Drives Huge Time to Market and Cost Savings”, Doc # 219965, September, 2009
By late 2009, Qualcomm/Android cycle time had dropped to 4.5 months.
Computerworld, “Is 'Quadroid' the new 'Wintel'?,” 2 December 2010
@PeterCoffee
22. The Value of Velocity
One developer with no prior
Force.com training built a patient
admission app in just 4 days
Deployed to Medical Directors and
Program Directors in hospitals on
iPhones and iPads
• Eliminated paper forms;
• Workflow reduced response time
“We’re blown away…a mobile healthcare by more than 60%;
app on Force.com with one person in just 4
• Cut process time from 18 hours
days… The same app built in [previous
models] would have taken over 3 months” to less than 60 minutes
@PeterCoffee
23. Social Velocity Leads to The Cloud
• Old Cloud: Centralization + Automation → Cost Reduction
– Distant resources: considered to be a tolerable nuisance
– Security: assumed to be a challenge, and compliance a barrier
– ‘Cloudwashing’ of legacy products: tempting and easy
• New Cloud: Connection + Simplification → Acceleration
– Data and process in cloud are closer to everything else you need
– Security is part of the service; audit trails are easy to provide
– You can’t ‘connectwash’ a server, no matter how much
virtualization you apply or how many ‘private clouds’ you proclaim
– In false clouds, you pay for resources…
…in true clouds, you pay for opportunities
@PeterCoffee
24. Trust Attainment Enables Cloud
Adoption
• Robust infrastructure security
• Rigorous operational security
• Granular customer controls
– Role-based privilege sets
– Convenient access control & audit
• “Sum of all fears” scrutiny
– Multi-tenancy shrinks attack surface; slashes opportunities for error
– The most demanding customer sets the bar
– FISMA: FIPS 199 LOW and MODERATE
– PCI DSS Compliance Level 1
– Comprehensive and continuing audit and certification
@PeterCoffee
25. Best Practices Matter More than Data Location
"There are five common factors that lead
to the compromise of database
information":
• ignorance
• poor password management
• rampant account sharing
• unfettered access to data
• excessive portability of data
DarkReading.com, October 2009
@PeterCoffee
26. All Assets Secured, All the Time
Despite resource sharing, multitenancy will often
improve security. Most current enterprise security
models are perimeter-based, making you
vulnerable to inside attacks. Multitenant services
secure all assets at all times, since those within the
main perimeter are all different clients…
Multitenancy is here to stay. Our research and
analysis indicates that multitenancy is not a less
secure model — quite the opposite!
@PeterCoffee
27. “Do it yourself” vs. “Who you gonna call?”
Po t e nt ia l
b e ne f it s f r o m
t r a ns it io ning
t o a p ub l ic
c l o ud
c o mp ut ing
e nv ir o nme nt :
• St a f f
Sp e c ia l iz a t io n
• Pl a t f o r m
St r e ng t h
• Re s o ur c e
Av a il a b il it y
• Ba c k up a nd
@PeterCoffee
Re c o v e r y
• Mo b il e
28. Public Clouds of Public Trust:
No More ‘Forbidden Zones’
General Economic Health & Defense &
Transportation
Government Development Human Services Public Safety
Science &
Environment
@PeterCoffee
29. The Cloud Experience: It’s About Results
• ‘The cloud’ does use technology
• Virtualization
• Dynamic provisioning
• 4G wireless
• SOA
These enable; they don’t guarantee
• ‘Cloud’ is a business commitment
– Negligible up-front capital
– Alignment of cost with value
– Maximal stakeholder engagement
@PeterCoffee
31. Velocity is a Vector
‘Social’ has both magnitude and direction
– If you’re going the wrong way, it doesn’t help to go faster
– The Social Revolution offers ~ unlimited ways to go wrong
Trust takes a long time to win; ~ zero time to lose
– Unhappy customers used to call you and wait for action
– Today, they can give the world hourly updates while they wait
– Never a headline, “X Corp.’s customer data uncracked today”
It’s not enough to evolve
– Where must you be in three years?
– What should you have been doing today?
@PeterCoffee
32. Thank You
@petercoffee
cloudblog.salesforce.com
pcoffee@salesforce.com
@PeterCoffee