SlideShare a Scribd company logo
Why Telcos need to think like their 
customers when it comes to 
providing SaaS infrastructure 
David Strom 
Telco Cloud 10/14
Agenda 
My background 
Journey to the customer 
4 key infrastructure choices 
4 key metrics 
How two enterprises moved into the cloud 
Takeaways and lessons learned
My background 
• Analyst at Gigaom Research 
• Former Editor-in-Chief at 
Network Computing, Tom’s 
Hardware.com 
• Toiled in end-user computing 
back in the mid 1980s 
• Written two computer technology 
books
Journey to the customer
The evolution of the cloud 
On-premises apps running on their company-owned physical servers 
Virtualize these servers to in-house hypervisors 
Move apps to the public cloud 
Build hybrid clouds 
Use co-lo or managed services facilities
4 key infrastructure choices 
Can your current internal apps be converted into something with a Web 
front end? 
Can your business logic be hosted elsewhere and be made more 
scalable? 
Can you provide security as a service layer for your apps? 
Can you virtualize each of your servers without losing performance, 
security and reliability?
4 key metrics 
What is your response time for issue resolution and other internal 
support needs? 
Can you calculate your app-level return on investment? 
What is your end-to-end app latency? 
What is the frequency of overall infrastructure outages?
Case study: Engagency.com
Case study: CrazyForEducation.com
Takeaways 
It is all about speed of app delivery 
The rate of evolution varies tremendously for each business, and for departments 
within each business 
There is no single monolithic app 
There is also no single cloud situation 
Mobile devices have become the defacto computing endpoint 
IT staffs will have to evolve and become more collaborative 
Everything becomes browser-based, even mainframe apps 
Availability and disaster recovery needs to be baked into everything 
Self-service portals are critical

More Related Content

What's hot

Scense introduction deck
Scense introduction deckScense introduction deck
Scense introduction deckHesselWellema
 
Network transformation - cloud native networking
Network transformation - cloud native networkingNetwork transformation - cloud native networking
Network transformation - cloud native networking
Stefan Johansson
 
The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...
The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...
The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...
Integra
 
[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...
[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...
[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...
WSO2
 
Tech You Oughta Know Tuesday - Automox
Tech You Oughta Know Tuesday - AutomoxTech You Oughta Know Tuesday - Automox
Tech You Oughta Know Tuesday - Automox
PHilMoroni
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saaskavinalli
 
The Cloud 101: Benefits, Risks, & Budgeting for 2016
The Cloud 101: Benefits, Risks, & Budgeting for 2016The Cloud 101: Benefits, Risks, & Budgeting for 2016
The Cloud 101: Benefits, Risks, & Budgeting for 2016
Net at Work
 
Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015
Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015
Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015
TAUS - The Language Data Network
 
Securing the Cloud Native stack
Securing the Cloud Native stackSecuring the Cloud Native stack
Securing the Cloud Native stack
Hector Tapia
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box Overview
SimonFenech
 
Cloud vs. Self Hosted Software Options
Cloud vs. Self Hosted Software OptionsCloud vs. Self Hosted Software Options
Cloud vs. Self Hosted Software Options
The Echo Group
 
The Case for Application Driven Cloud Computing
The Case for Application Driven Cloud ComputingThe Case for Application Driven Cloud Computing
The Case for Application Driven Cloud Computing
Adam Davis
 
Technology trends 2015
Technology trends 2015Technology trends 2015
Technology trends 2015
Henry Jacob
 
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
WSO2
 
Alfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + Demo
Alfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + DemoAlfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + Demo
Alfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + Demo
Alfresco Software
 
IBM Relay 2015: Expect More From Private Cloud
IBM Relay 2015: Expect More From Private CloudIBM Relay 2015: Expect More From Private Cloud
IBM Relay 2015: Expect More From Private Cloud
IBM
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologies
digitallibrary
 
Introduction to Integration Technologies
Introduction to Integration TechnologiesIntroduction to Integration Technologies
Introduction to Integration Technologies
BizTalk360
 

What's hot (20)

Scense introduction deck
Scense introduction deckScense introduction deck
Scense introduction deck
 
Network transformation - cloud native networking
Network transformation - cloud native networkingNetwork transformation - cloud native networking
Network transformation - cloud native networking
 
The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...
The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...
The CIOs new Job: Drive Customer-Centric Innovation Throughout Your Business ...
 
[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...
[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...
[WSO2Con EU 2017] Continuous Integration, Delivery and Deployment: Accelerate...
 
Tech You Oughta Know Tuesday - Automox
Tech You Oughta Know Tuesday - AutomoxTech You Oughta Know Tuesday - Automox
Tech You Oughta Know Tuesday - Automox
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
The Cloud 101: Benefits, Risks, & Budgeting for 2016
The Cloud 101: Benefits, Risks, & Budgeting for 2016The Cloud 101: Benefits, Risks, & Budgeting for 2016
The Cloud 101: Benefits, Risks, & Budgeting for 2016
 
Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015
Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015
Eric Blassin (Lionbridge) at the Industry Leaders Forum 2015
 
Securing the Cloud Native stack
Securing the Cloud Native stackSecuring the Cloud Native stack
Securing the Cloud Native stack
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box Overview
 
Cloud vs. Self Hosted Software Options
Cloud vs. Self Hosted Software OptionsCloud vs. Self Hosted Software Options
Cloud vs. Self Hosted Software Options
 
The Case for Application Driven Cloud Computing
The Case for Application Driven Cloud ComputingThe Case for Application Driven Cloud Computing
The Case for Application Driven Cloud Computing
 
Abiquo
AbiquoAbiquo
Abiquo
 
Technology trends 2015
Technology trends 2015Technology trends 2015
Technology trends 2015
 
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
 
Alfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + Demo
Alfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + DemoAlfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + Demo
Alfresco Day Amsterdam 2015 - Alfresco One Product Suite Update + Demo
 
IBM Relay 2015: Expect More From Private Cloud
IBM Relay 2015: Expect More From Private CloudIBM Relay 2015: Expect More From Private Cloud
IBM Relay 2015: Expect More From Private Cloud
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologies
 
Introduction to Integration Technologies
Introduction to Integration TechnologiesIntroduction to Integration Technologies
Introduction to Integration Technologies
 

Viewers also liked

Advanced Firewalls Progress Report
Advanced Firewalls Progress ReportAdvanced Firewalls Progress Report
Advanced Firewalls Progress Report
David Strom Inc.
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom
 
Dell social media
Dell social mediaDell social media
Dell social media
David Strom
 
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITPWIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
David Strom
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
David Strom
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom
 
Social Media Research at Comms Service Providers
Social Media Research at Comms Service ProvidersSocial Media Research at Comms Service Providers
Social Media Research at Comms Service Providers
David Strom
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
David Strom
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom
 

Viewers also liked (10)

Advanced Firewalls Progress Report
Advanced Firewalls Progress ReportAdvanced Firewalls Progress Report
Advanced Firewalls Progress Report
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Dell social media
Dell social mediaDell social media
Dell social media
 
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITPWIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
 
Social Media Research at Comms Service Providers
Social Media Research at Comms Service ProvidersSocial Media Research at Comms Service Providers
Social Media Research at Comms Service Providers
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 

Similar to Keeping the customer in mind: a lesson for Telco's

Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
Triaxil
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Ezhilarasan Natarajan
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
Cloud and analytics Lab
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
Sekhar Mohanty
 
Why companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloudWhy companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloud
Velocity Technology Solutions
 
Realizing Cloud POV
Realizing Cloud POVRealizing Cloud POV
Realizing Cloud POVRene Claudio
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
OneNeck
 
Epaper
EpaperEpaper
IBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation ENIBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation EN
Yves Bienenfeld
 
AWS May Webinar Series - Industry Trends and Best Practices for Cloud Adoption
AWS May Webinar Series - Industry Trends and Best Practices for Cloud AdoptionAWS May Webinar Series - Industry Trends and Best Practices for Cloud Adoption
AWS May Webinar Series - Industry Trends and Best Practices for Cloud Adoption
Amazon Web Services
 
Cloud Native IT Transformation - Whitepaper by RapidValue
Cloud Native IT Transformation - Whitepaper by RapidValueCloud Native IT Transformation - Whitepaper by RapidValue
Cloud Native IT Transformation - Whitepaper by RapidValue
RapidValue
 
The simplest cloud migration in the world by Webscale
The simplest cloud migration in the world by WebscaleThe simplest cloud migration in the world by Webscale
The simplest cloud migration in the world by Webscale
Webscale Networks
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloud
Sougata Mitra
 
Why businesses are moving Oracle applications to the cloud
Why businesses are moving Oracle applications to the cloudWhy businesses are moving Oracle applications to the cloud
Why businesses are moving Oracle applications to the cloud
Velocity Technology Solutions
 
Automation, Audits, and Apps Tour
Automation, Audits, and Apps TourAutomation, Audits, and Apps Tour
Automation, Audits, and Apps Tour
Chef
 
Adapting to a Hybrid World [Webinar on Demand]
Adapting to a Hybrid World [Webinar on Demand]Adapting to a Hybrid World [Webinar on Demand]
Adapting to a Hybrid World [Webinar on Demand]
ServerCentral
 
(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud
Amazon Web Services
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
Digital Realty
 
Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid Applications
Skytap Cloud
 
Q&A: Why cloud-native apps are better?
Q&A: Why cloud-native apps are better?Q&A: Why cloud-native apps are better?
Q&A: Why cloud-native apps are better?
CompatibL Technologies ltd
 

Similar to Keeping the customer in mind: a lesson for Telco's (20)

Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Why companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloudWhy companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloud
 
Realizing Cloud POV
Realizing Cloud POVRealizing Cloud POV
Realizing Cloud POV
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
Epaper
EpaperEpaper
Epaper
 
IBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation ENIBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation EN
 
AWS May Webinar Series - Industry Trends and Best Practices for Cloud Adoption
AWS May Webinar Series - Industry Trends and Best Practices for Cloud AdoptionAWS May Webinar Series - Industry Trends and Best Practices for Cloud Adoption
AWS May Webinar Series - Industry Trends and Best Practices for Cloud Adoption
 
Cloud Native IT Transformation - Whitepaper by RapidValue
Cloud Native IT Transformation - Whitepaper by RapidValueCloud Native IT Transformation - Whitepaper by RapidValue
Cloud Native IT Transformation - Whitepaper by RapidValue
 
The simplest cloud migration in the world by Webscale
The simplest cloud migration in the world by WebscaleThe simplest cloud migration in the world by Webscale
The simplest cloud migration in the world by Webscale
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloud
 
Why businesses are moving Oracle applications to the cloud
Why businesses are moving Oracle applications to the cloudWhy businesses are moving Oracle applications to the cloud
Why businesses are moving Oracle applications to the cloud
 
Automation, Audits, and Apps Tour
Automation, Audits, and Apps TourAutomation, Audits, and Apps Tour
Automation, Audits, and Apps Tour
 
Adapting to a Hybrid World [Webinar on Demand]
Adapting to a Hybrid World [Webinar on Demand]Adapting to a Hybrid World [Webinar on Demand]
Adapting to a Hybrid World [Webinar on Demand]
 
(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
 
Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid Applications
 
Q&A: Why cloud-native apps are better?
Q&A: Why cloud-native apps are better?Q&A: Why cloud-native apps are better?
Q&A: Why cloud-native apps are better?
 

More from David Strom

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
David Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
David Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
David Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
David Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
David Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
David Strom
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
David Strom
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies
David Strom
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaire
David Strom
 
Virtual machine security products
Virtual machine security productsVirtual machine security products
Virtual machine security products
David Strom
 

More from David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaire
 
Virtual machine security products
Virtual machine security productsVirtual machine security products
Virtual machine security products
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Keeping the customer in mind: a lesson for Telco's

  • 1. Why Telcos need to think like their customers when it comes to providing SaaS infrastructure David Strom Telco Cloud 10/14
  • 2. Agenda My background Journey to the customer 4 key infrastructure choices 4 key metrics How two enterprises moved into the cloud Takeaways and lessons learned
  • 3. My background • Analyst at Gigaom Research • Former Editor-in-Chief at Network Computing, Tom’s Hardware.com • Toiled in end-user computing back in the mid 1980s • Written two computer technology books
  • 4.
  • 5. Journey to the customer
  • 6.
  • 7. The evolution of the cloud On-premises apps running on their company-owned physical servers Virtualize these servers to in-house hypervisors Move apps to the public cloud Build hybrid clouds Use co-lo or managed services facilities
  • 8. 4 key infrastructure choices Can your current internal apps be converted into something with a Web front end? Can your business logic be hosted elsewhere and be made more scalable? Can you provide security as a service layer for your apps? Can you virtualize each of your servers without losing performance, security and reliability?
  • 9. 4 key metrics What is your response time for issue resolution and other internal support needs? Can you calculate your app-level return on investment? What is your end-to-end app latency? What is the frequency of overall infrastructure outages?
  • 12. Takeaways It is all about speed of app delivery The rate of evolution varies tremendously for each business, and for departments within each business There is no single monolithic app There is also no single cloud situation Mobile devices have become the defacto computing endpoint IT staffs will have to evolve and become more collaborative Everything becomes browser-based, even mainframe apps Availability and disaster recovery needs to be baked into everything Self-service portals are critical