SlideShare a Scribd company logo
1 of 51
What does the future look like?
Simon May,
Client and Cloud Evangelist




@simonster
http://simon-may.com
Change is faster than ever
1   2   3   4   5
Disclaimer
The future is subject to change
Everything you’re about to see / hear might be wrong
Everything you’re about to see / hear might be right
Some of what you’re about to see / hear might happen
Social
App Internet
Devices
Cloud computing
BIG Data
34 hours per week
average time Chinese millennials spend
using social tools



                     People




                                         People
Applications
Productivity

               Integration with
               external social
               networks



               Internal social
               computing
               tools                    Online meetings          Presence & IM



                          Social networking               Voice & video




               Productivity will                 And best-in-class
               great on Windows                  on other devices
Devices in the data center
Services




           Services
Consumer




    1   ,000,000,000
    Hours spent per month
    playing on Xbox Live
Business




     28,000
     Mailboxes the Royal Mail
     have in the cloud
Mobility
Security and Management
Tools That Help IT to Protect the Enterprise

    Central, unified                       Access control based on the level of trust
  management platform
                                                             Level of business impact
                                                                (means of access)


                                                                       Low              Unmanaged
                                                                      (Web)
                                             Managed


                                                                     Medium
                                                                   (VDI/Citrix)




                                                                       High
  Single, end-to-end security                                      (DirectAccess,
                                                                  enterprise VPN)
  and management platform



                                With System Center 2012, manage any mobile

A look                          device that connects through Exchange ActiveSync,
                                including Windows-, iOS-, Symbian-, and Android-
                                based devices
ahead…                          • Will manage Windows devices best and be best-
                                  in-class on other devices


                                Achieve the same management results as with on-
                                premises solutions at a lower cost
Cloud definition
              What is a cloud?

Cloud computing is a model for enabling
convenient, on-demand network access to a shared
pool of configurable computing resources
(e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released
with minimal management effort or service provider
interaction. This cloud model promotes availability and
is composed of five essential characteristics, three
service models, and four deployment models.

             The NIST Definition of Cloud Computing
Public?


The cloud infrastructure is made available to the
general public or a large industry group and is
owned by an organization selling cloud services.
Private?


The cloud infrastructure is operated solely for an
organization. It may be managed by the organization
or a third party and may exist on premise or off
premise.
Hybrid?
The cloud infrastructure is a composition of two
or more clouds (private, community, or public)
that remain unique entities but are bound
together by standardized or proprietary
technology that enables data and application
portability (e.g., cloud bursting for load-
balancing between clouds).
Small businesses can act big
Big business can act small
Flexibility is key
AA0000s0s1
Unexpected error occurred
Please contact your system administrator

     ...................................,::::::::::~:................................
     ...................................:::::~~~~~~~~~...............................
     ..................................~:::~~~~~~~~~~=..==............=..............
     ..................................:~~~~~~=======,.+=~~~:~~:::,,:,=..............
     .................................~~~~~==========..+===~~~~:::::,:...............
     .................................~~~~========+=~.~++====~~~:::::~...............
     ................................:~~~=====++++++,.+++++===~~~::::................
     ................................~~~~====++++++=,~?+++++==~~~~::~................
     ................................~,......,,,~=+,.????+++===~~~::,................
     .................................~=+++???I=..,,=????++++==~~~:=.................
     ...............................~===+++??IIII7...,???++++==~~~~:.................
     ..............................=~===+++??IIII?,=I..,,,=++~,,.....................
     ..............................~~~===++???III,,III??,......+=++..................
     .............................=~~~===+++????I,:IIII??????+++++...................
     .............................~~~~~===++++??,,III???????++++=+...................
     ............................=~~~~~~====++++,.????????++++++=....................
     ............................~~~~~~~~=====+:,???????++++++==+....................
     ...........................:~=:,.....:~===,.+++++++++++====.....................
     ........................................,~.?+++++++++=====+.....................
     ...........................................~++++==========~.....................
     ..............................................~+=======~,.......................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
Some things don’t belong
Some are obvious choices
Massive scale
WMV HD 9.82mb (1372935x)
                       AVCHD 23.3mb (195689447x)




JPG 3.68mb (514501x)
RAW 16mb (2236962x)
Connectivity
Cloud Security




      Robust security controls:
      Do you have these
      attestations?
Users care

Less dependence


Agnostic

Implicit control of infrastructure by app manager
Ownership divestment
Some new jobs
Cloud integrator
Connecting public and private clouds together

                                                                    Dev-Op
                                            Ensures smooth application operation

Cloud resource manager
Expert in understanding cost implications and placing workload accordingly
Jobs with more focus


IT Marketeer
Internally markets the IT departments capabilities

                                                        Security Analyst
                                           Understands and mitigates business risk

UX engineer
Delivers solid user experience fundamentals to IT systems
Budget the move from CapEx to OpEx
Closer
More
Shift
Flexibility
340 Undecillion
The future might look like this


        Available here:
        http://www.youtube.com/watch?v=a6cNdhOKwi0
My Blog:
http://simon-may.com

UK TechNet Blog:
http://aka.ms/UKTechNet


Cloud for IT Pros:
http://aka.ms/TNCloud

More Related Content

What's hot

A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Uni Systems S.M.S.A.
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDICitrix
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Uni Systems S.M.S.A.
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetDavid J Rosenthal
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds EMC
 
Voyss Cloud
Voyss CloudVoyss Cloud
Voyss Cloudpswaim
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft Private Cloud
 
OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)dyanger
 
IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012Uni Systems S.M.S.A.
 
Cloud services full description
Cloud services full descriptionCloud services full description
Cloud services full descriptionJason Caras
 
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...University of Technology, Sydney
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Nuno Alves
 

What's hot (20)

A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds
 
Voyss Cloud
Voyss CloudVoyss Cloud
Voyss Cloud
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
 
OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)
 
ExertionMaxx, LLC
ExertionMaxx, LLC ExertionMaxx, LLC
ExertionMaxx, LLC
 
IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012
 
Cloud services full description
Cloud services full descriptionCloud services full description
Cloud services full description
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28
 

Similar to How the Future of Technology May Look

IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
TechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsTechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsHarold Wong
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
Wmware Joe Baguley - enabling it as a service - emc-forum 2013
Wmware   Joe Baguley - enabling it as a service  - emc-forum 2013Wmware   Joe Baguley - enabling it as a service  - emc-forum 2013
Wmware Joe Baguley - enabling it as a service - emc-forum 2013EMC Nederland
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet Ericom Software
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Little.story.it.architecture
Little.story.it.architectureLittle.story.it.architecture
Little.story.it.architectureÉric Grall
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Microsoft cloud strategic_overview_vu
Microsoft cloud strategic_overview_vuMicrosoft cloud strategic_overview_vu
Microsoft cloud strategic_overview_vuPham Anh Vu
 
How Cloud Changes Business Expectations
How Cloud Changes Business ExpectationsHow Cloud Changes Business Expectations
How Cloud Changes Business Expectationstimhill2000
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENDaron Walker
 
Elements Of Cloud Computing 09
Elements Of Cloud Computing 09Elements Of Cloud Computing 09
Elements Of Cloud Computing 09Geeks
 
Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09dhanya.sumeru
 
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)Microsoft Norge AS
 
Cloud Essentials
Cloud EssentialsCloud Essentials
Cloud EssentialsChris Avis
 
Computo en la nube moda o valor de negocio v2
Computo en la nube   moda o valor de negocio v2Computo en la nube   moda o valor de negocio v2
Computo en la nube moda o valor de negocio v2anapelizondo
 

Similar to How the Future of Technology May Look (20)

IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
TechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsTechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud Essentials
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
Wmware Joe Baguley - enabling it as a service - emc-forum 2013
Wmware   Joe Baguley - enabling it as a service  - emc-forum 2013Wmware   Joe Baguley - enabling it as a service  - emc-forum 2013
Wmware Joe Baguley - enabling it as a service - emc-forum 2013
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Little.story.it.architecture
Little.story.it.architectureLittle.story.it.architecture
Little.story.it.architecture
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Microsoft cloud strategic_overview_vu
Microsoft cloud strategic_overview_vuMicrosoft cloud strategic_overview_vu
Microsoft cloud strategic_overview_vu
 
How Cloud Changes Business Expectations
How Cloud Changes Business ExpectationsHow Cloud Changes Business Expectations
How Cloud Changes Business Expectations
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
Elements Of Cloud Computing 09
Elements Of Cloud Computing 09Elements Of Cloud Computing 09
Elements Of Cloud Computing 09
 
Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09
 
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
 
Cloud Essentials
Cloud EssentialsCloud Essentials
Cloud Essentials
 
Computo en la nube moda o valor de negocio v2
Computo en la nube   moda o valor de negocio v2Computo en la nube   moda o valor de negocio v2
Computo en la nube moda o valor de negocio v2
 

More from Simon May

Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft IntuneSimon May
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsSimon May
 
Designing office 2010 deployment
Designing office 2010 deploymentDesigning office 2010 deployment
Designing office 2010 deploymentSimon May
 
Collaborate better
Collaborate betterCollaborate better
Collaborate betterSimon May
 
7th cloud circle forum keynote
7th cloud circle forum keynote7th cloud circle forum keynote
7th cloud circle forum keynoteSimon May
 
Cloud for IT Apprentices
Cloud for IT ApprenticesCloud for IT Apprentices
Cloud for IT ApprenticesSimon May
 
The changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of ITThe changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of ITSimon May
 

More from Simon May (7)

Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in Leeds
 
Designing office 2010 deployment
Designing office 2010 deploymentDesigning office 2010 deployment
Designing office 2010 deployment
 
Collaborate better
Collaborate betterCollaborate better
Collaborate better
 
7th cloud circle forum keynote
7th cloud circle forum keynote7th cloud circle forum keynote
7th cloud circle forum keynote
 
Cloud for IT Apprentices
Cloud for IT ApprenticesCloud for IT Apprentices
Cloud for IT Apprentices
 
The changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of ITThe changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of IT
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

How the Future of Technology May Look

  • 1. What does the future look like? Simon May, Client and Cloud Evangelist @simonster http://simon-may.com
  • 2. Change is faster than ever
  • 3. 1 2 3 4 5
  • 4. Disclaimer The future is subject to change Everything you’re about to see / hear might be wrong Everything you’re about to see / hear might be right Some of what you’re about to see / hear might happen
  • 5.
  • 6.
  • 12.
  • 13. 34 hours per week average time Chinese millennials spend using social tools People People
  • 14.
  • 16. Productivity Integration with external social networks Internal social computing tools Online meetings Presence & IM Social networking Voice & video Productivity will And best-in-class great on Windows on other devices
  • 17.
  • 18. Devices in the data center
  • 19. Services Services
  • 20. Consumer 1 ,000,000,000 Hours spent per month playing on Xbox Live
  • 21. Business 28,000 Mailboxes the Royal Mail have in the cloud
  • 23. Security and Management Tools That Help IT to Protect the Enterprise Central, unified Access control based on the level of trust management platform Level of business impact (means of access) Low Unmanaged (Web) Managed Medium (VDI/Citrix) High Single, end-to-end security (DirectAccess, enterprise VPN) and management platform With System Center 2012, manage any mobile A look device that connects through Exchange ActiveSync, including Windows-, iOS-, Symbian-, and Android- based devices ahead… • Will manage Windows devices best and be best- in-class on other devices Achieve the same management results as with on- premises solutions at a lower cost
  • 24.
  • 25. Cloud definition What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. The NIST Definition of Cloud Computing
  • 26. Public? The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
  • 27. Private? The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.
  • 28. Hybrid? The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load- balancing between clouds).
  • 30. Big business can act small
  • 32. AA0000s0s1 Unexpected error occurred Please contact your system administrator ...................................,::::::::::~:................................ ...................................:::::~~~~~~~~~............................... ..................................~:::~~~~~~~~~~=..==............=.............. ..................................:~~~~~~=======,.+=~~~:~~:::,,:,=.............. .................................~~~~~==========..+===~~~~:::::,:............... .................................~~~~========+=~.~++====~~~:::::~............... ................................:~~~=====++++++,.+++++===~~~::::................ ................................~~~~====++++++=,~?+++++==~~~~::~................ ................................~,......,,,~=+,.????+++===~~~::,................ .................................~=+++???I=..,,=????++++==~~~:=................. ...............................~===+++??IIII7...,???++++==~~~~:................. ..............................=~===+++??IIII?,=I..,,,=++~,,..................... ..............................~~~===++???III,,III??,......+=++.................. .............................=~~~===+++????I,:IIII??????+++++................... .............................~~~~~===++++??,,III???????++++=+................... ............................=~~~~~~====++++,.????????++++++=.................... ............................~~~~~~~~=====+:,???????++++++==+.................... ...........................:~=:,.....:~===,.+++++++++++====..................... ........................................,~.?+++++++++=====+..................... ...........................................~++++==========~..................... ..............................................~+=======~,....................... ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................
  • 34. Some are obvious choices
  • 36.
  • 37. WMV HD 9.82mb (1372935x) AVCHD 23.3mb (195689447x) JPG 3.68mb (514501x) RAW 16mb (2236962x)
  • 39. Cloud Security Robust security controls: Do you have these attestations?
  • 40.
  • 41. Users care Less dependence Agnostic Implicit control of infrastructure by app manager
  • 43.
  • 44.
  • 45.
  • 46. Some new jobs Cloud integrator Connecting public and private clouds together Dev-Op Ensures smooth application operation Cloud resource manager Expert in understanding cost implications and placing workload accordingly
  • 47. Jobs with more focus IT Marketeer Internally markets the IT departments capabilities Security Analyst Understands and mitigates business risk UX engineer Delivers solid user experience fundamentals to IT systems
  • 48. Budget the move from CapEx to OpEx Closer More Shift Flexibility
  • 50. The future might look like this Available here: http://www.youtube.com/watch?v=a6cNdhOKwi0
  • 51. My Blog: http://simon-may.com UK TechNet Blog: http://aka.ms/UKTechNet Cloud for IT Pros: http://aka.ms/TNCloud

Editor's Notes

  1. Rate of change is now faster than it’s every beenExamples: Time spent online in 2000 = 2.7h/week, 2010 = 18h/week or 666% increase!Examples: Active blogs 2000 = 12,000 , 2010 = 141 millionExamples: Daily SMS 2000 = 400,000, 2010 = 4.5 billionExamples: Storage 2000 = $10/gb, 2010 = 6c
  2. What we’re seeing is that sharing is essential, sharing with both those internally and externally –it’s no good if they send a business proposal to a client and they can’t open the document.It’s essential to be able to express ideas with the clarity with which they intended, it’s life or death, mortgage payment or default at times. It’s not good getting a graph that looks like it was created in 2000 when everyone else is pitching in 2011.
  3. Timing: 3 minutes Key Points:Microsoft strives to be first and best on the Windows platform and best-in-class on other devices to deliver the best possible productivity experience. We believe that the key to delivering the best experience is to deliver a connected experience whenever possible, with rich content creation capabilities available when offline.Social computing represents an opportunity to make the productivity experience more collaborative while providing the kind of user experience that people love.Office 365 is where Microsoft Office meets the cloud, for anywhere access to people, information, and productivity tools.
  4. 2013 1/3rd of the worlds workforce will be mobileChinese millennials spend 34 hours a week using social toolsData is expanding at 40x per year, IT professionals by just 1.4x
  5. Agility and responsiveness are becoming more overwhelming drivers than simply saving moneyMoving into new markets in new parts of the world is simpleNiels Bohr once said – “making predictions is difficult – especially about the future” Businesses can easily explore a new market because the attendant risk of doing so is greatly reduced as a result of not having to invest in infrastructure to enable the explorationExample: Esri a company that creates complex geographic relationship models for industry and government has been able to move into new markets because they haven’t had to invest in infrastructure in each region they want to explore
  6. One man in a container can have the appearance of a massive company and he’s able to enter markets and do things.Exceedra – a start up that helps manufacturers feeding supply chains to know what to sell in and at what price is helping companies like Hiniken, Pirelli and Revlon understand what they need to place into the channel. They’re small with staff count countable on fingers and toes, but they act like a massive company attracting massive clients.
  7. Massive companies can do things that would have been very difficult previously because of their scale, like exploit a new market where once it would have been too expensive.Clear Channel entering Turkey with Office 365
  8. The ability to expand and contract resources is the only way to enable that need to grow and shrink and it’s the only way to deal with Risk metrics, bursting into the cloud to do Monte Carlo simulations – working out the risks that can affect asset prices over a variety of time horizons.
  9. UnpredictabilityCloud bursting, Air Products uses as solution built on premises using HPC Server to “cloud burst” when they need to model specific business needs
  10. Lets be honest compliance policies and legislation haven’t quite caught up yet.Enter Hybrid as a deployment method
  11. Front end web services are an obvious choice to move to cloud technology as are email systems. Royal Mail have moved over 28,000 employees to the Microsoft BPOS as have small companies like Shine Therapies who provide occupational, speech and language therapies in the NW of england
  12. If I were going to be in one business that has to be ultra efficient it’s going to be this one.By 2015 20% of the Fortune 500 will be cloud -Service Providers
  13. A city in developed nation uses about 10MW of power, a global class DC uses about 30MW If you want one you can buy for about $19mUsers don’t expect downtime any more, it gets in the way and it gets ugly fast.
  14. In 2011 the internet transfers 50 Exabytes of data, every day.I did some maths, take that data write it to a DVD, put the DVDs in a 747 and fly them and you’ll still have to do that 13,000 more times to move an Exabyte
  15. You tube video of GFS DC tour
  16. People and Devices
  17. Flexibility first approach
  18. Internet of things