Présentation prospective sur l'avenir du poste de travail informatique et du PC à travers les tendances technologiques et sociétales présentes et à venir.
SNViz: Analysis-oriented Visualization for the Internet of Thingsbenaam
The Internet is evolving from a network of comput- ers to a network of devices, e.g., phones, smart meters, traffic cameras, and air quality sensors. In this Internet of Things, large amounts of data generated by everyday objects can often be organized into data streams, where each data stream is a time series of sensor values sampled together. Visualization is an easy-to-use, efficient, and effective method to present this heterogeneous data to large and diverse audiences, and enable its analysis by users without programming background. Although general data-storage and sharing systems for the Internet of Things, like Pachube and Sensor.Network, offer some basic visualizations, they do little to help users understand relations and patterns hidden in the data, nor do they support live updates to the underlying data streams. Other systems, like Biketastic and the Copenhagen Wheel, feature more complex visualizations but are tailored for a specific application domain and do not address heterogeneous data streams. In this paper, we present SNViz, a Web browser-based AJAX application built using Protovis for visual analysis of large, heterogeneous, and live data streams in the Internet of Things. Besides offering panning and zooming for a detailed look at smaller data subsets, SNViz offers brush-and- linking across multiple visualizations. The latter is invaluable in helping users understand and analyze relationships and patterns hidden in the data. Although SNViz currently works by accessing JSON representations of data streams from Sensor.Network over HTTP, it can be extended to work with other data sources (e.g., wireless sensor network devices or smartphones) and even customized for specific applications.
This work was presented at the Internet of Things conference (www.iot2010.org).
SNViz: Analysis-oriented Visualization for the Internet of Thingsbenaam
The Internet is evolving from a network of comput- ers to a network of devices, e.g., phones, smart meters, traffic cameras, and air quality sensors. In this Internet of Things, large amounts of data generated by everyday objects can often be organized into data streams, where each data stream is a time series of sensor values sampled together. Visualization is an easy-to-use, efficient, and effective method to present this heterogeneous data to large and diverse audiences, and enable its analysis by users without programming background. Although general data-storage and sharing systems for the Internet of Things, like Pachube and Sensor.Network, offer some basic visualizations, they do little to help users understand relations and patterns hidden in the data, nor do they support live updates to the underlying data streams. Other systems, like Biketastic and the Copenhagen Wheel, feature more complex visualizations but are tailored for a specific application domain and do not address heterogeneous data streams. In this paper, we present SNViz, a Web browser-based AJAX application built using Protovis for visual analysis of large, heterogeneous, and live data streams in the Internet of Things. Besides offering panning and zooming for a detailed look at smaller data subsets, SNViz offers brush-and- linking across multiple visualizations. The latter is invaluable in helping users understand and analyze relationships and patterns hidden in the data. Although SNViz currently works by accessing JSON representations of data streams from Sensor.Network over HTTP, it can be extended to work with other data sources (e.g., wireless sensor network devices or smartphones) and even customized for specific applications.
This work was presented at the Internet of Things conference (www.iot2010.org).
Quest 2 and the future of metaverse v2.0 210908Michael Lesniak
Brief overview of the impact of the Quest 2 launch in S. Korea on the development of the metaverse here, and the near future of the metaverse worldwide.
Note:
Michael's Metaverse for Dummies by Michael A. Lesniak is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at http://www.malesniak.com/2020/09/blog-post.html.
Metaverse has become ae buzzword in the tech industry. Not a single day goes by without a mention of it
in the media, especially around investments, startups building components, new platforms being
announced and large companies entering this world of digital engagement. There is undeniably a huge momentum of an almost real 3D virtual world, and the clarion call was perhaps Facebook rebranding itself
as Meta which will perhaps be remembered as a red letter moment in the evolution of the Metaverse.
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed BrillEd Brill
Ed Brill's keynote presentation at the Australian Lotus User Group, 29/30 August 2011 in Sydney. Covers high level themes of social business, Lotus Notes/Domino 8.5.3, and future directions for Lotus Notes/Domino.
Fjord CEO Olof Schybergson spoke at Marketforce's Future of Broadcasting conference in London in June 2011 on the changing media landscape. Learn more about Fjord at www.fjordnet.com. Follow us on Twitter @fjord
L’informatique verte est identifiée comme l’un des sujets stratégiques pour 2008. Le sujet offre des opportunités certaines mais est aussi lourdement repris comme argument marketing. Est-ce une mode ? Quels domaines présentent des opportunités pour nos organisations ? Quelle analyse faire pour y voir plus clair ? Quelques pistes seront proposées à travers une présentation qui permet de prendre conscience des enjeux.
Cours donné à la Haute École de Gestion aux collaborateurs de l’État de Genève sur les tendances informatiques et sociétales qui rompent les habitudes de gestion classique de l’informatique et qui modifient les relations avec l’administration.
Les principaux thèmes abordés sont :
- eGouvernement, eDemocracie et eAdministration
- Web 2.0
- Open Source
- Mobile
- Cloud Computing
- Net Generation (Natifs Digitaux)
Quest 2 and the future of metaverse v2.0 210908Michael Lesniak
Brief overview of the impact of the Quest 2 launch in S. Korea on the development of the metaverse here, and the near future of the metaverse worldwide.
Note:
Michael's Metaverse for Dummies by Michael A. Lesniak is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at http://www.malesniak.com/2020/09/blog-post.html.
Metaverse has become ae buzzword in the tech industry. Not a single day goes by without a mention of it
in the media, especially around investments, startups building components, new platforms being
announced and large companies entering this world of digital engagement. There is undeniably a huge momentum of an almost real 3D virtual world, and the clarion call was perhaps Facebook rebranding itself
as Meta which will perhaps be remembered as a red letter moment in the evolution of the Metaverse.
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed BrillEd Brill
Ed Brill's keynote presentation at the Australian Lotus User Group, 29/30 August 2011 in Sydney. Covers high level themes of social business, Lotus Notes/Domino 8.5.3, and future directions for Lotus Notes/Domino.
Fjord CEO Olof Schybergson spoke at Marketforce's Future of Broadcasting conference in London in June 2011 on the changing media landscape. Learn more about Fjord at www.fjordnet.com. Follow us on Twitter @fjord
L’informatique verte est identifiée comme l’un des sujets stratégiques pour 2008. Le sujet offre des opportunités certaines mais est aussi lourdement repris comme argument marketing. Est-ce une mode ? Quels domaines présentent des opportunités pour nos organisations ? Quelle analyse faire pour y voir plus clair ? Quelques pistes seront proposées à travers une présentation qui permet de prendre conscience des enjeux.
Cours donné à la Haute École de Gestion aux collaborateurs de l’État de Genève sur les tendances informatiques et sociétales qui rompent les habitudes de gestion classique de l’informatique et qui modifient les relations avec l’administration.
Les principaux thèmes abordés sont :
- eGouvernement, eDemocracie et eAdministration
- Web 2.0
- Open Source
- Mobile
- Cloud Computing
- Net Generation (Natifs Digitaux)
A recap of interesting points and quotes from the May 2024 WSO2CON opensource application development conference. Focuses primarily on keynotes and panel sessions.
"Toward Cognitive-IoT Applications -- Integrating AI with Fog Computing" by Dr. Frank C. D. Tsai, Workshop of Mobile IoT with Edge Computing and Artificial Intelligence, sponsored by Ministry of Education, Taiwan
We have never lived in a world of faster and more wide-reaching technology innovations.
Our jobs, businesses, and how we operate as societies are being transformed by
technology, and the current global pandemic is only fast-tracking the digital
transformation. With this post, I want to delve into the top 10 tech trends that are driving the 4th Industrial Revolution, and that will define the next decade.
What are the technologies that could significantly change the future of enterprise communications? This short presentation suggests a dozen possible game-changers.
Tech Careers 101 - Empowering Your Tech JourneySFSupport247
No matter if you're a student, career switcher, professional aiming for an upgrade, or an aspiring entrepreneur, this course opens the door to a fulfilling future in technology. Embrace this chance to transform your aspirations into achievements in the digital age. Let's make your tech career dreams a reality together!
In this presentation, Prateek introduces what he calls "Internet of Everything" and talks about building IoT applications that aid in water/energy conservation.
Slides for talk by Prof Christopher Millard on "Cloud computing: identifying and managing legal risks" at Google's Oxford Internet Institute Learned Lunches, Brussel, February 2011
This slide was presented for the fulfillment of the course Bachelor in Information Management, Affiliated to TU, Kathmandu Nepal at Thames International College, Old-Baneshwor, KTM, Nepal.
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
Slides for talk by Prof Christopher Millard on "Cloud Computing Contracts and Services:
What's Really Happening Out There?", at the Sixth bi-annual conference on the economics of intellectual property, software and the Internet – Toulouse, Jan 2011
The Internet-Of-Things (IoT) is no longer a hype, but a reality. Connecting ANY devices, ANY place, ANY thing will transform the way we live. However from an engineers point of view how can he gain benefit from this? Here are some of the key technology trends that will play an important role.
Apprendre à conduire un projet d’innovation grâce au Design Thinking
Expérimenter les étapes clés de la méthode de Design Thinking
Imaginer des services innovants de manière simple et opérationnelle
Appréhender les bases du Design d’expérience pour faire adhérer vos clients
Giorgio Pauletto - Innovation de rupture - MOOC UnowGiorgio Pauletto
Définir et identifier une innovation de rupture
• Comprendre tout ce qui freine l'innovation et ce que cela implique
• Comprendre ce qui favorise l'entrée de nouveaux acteurs et les failles possibles
• Relever les défis de l'innovation de rupture et identifier les nombreux écueils à éviter
Giorgio Pauletto - Design Kit Facilitator's GuideGiorgio Pauletto
Design Kit: Facilitator's Guide is a self-paced course that trains participants in introducing others to the human-centered design process to create innovative, effective, and sustainable solutions for social change.
Les entreprises doivent se transformer dans un monde plus volatile et incertain où l'agilité, l'innovation et le numérique jouent un rôle toujours plus fort. Comment y parviendront-elles?
Tendances technolgiques, business et société - 10-2014Giorgio Pauletto
Comment comprendre les modèles économiques en rupture provenant du numérique et du partage? Uber, AirBnB, Crowdfunding, Sharing Economy, Plateformes, etc.
Tendances technolgiques, business et société - 04-2015Giorgio Pauletto
Quelles sont les 3 grandes tendances qui vont transformer notre société et notre économie à l'ère numérique? Des observations pointues qui débouchent sur les changements impactants dans les 3 à 5 années à venir.
Quelles sont les grandes tendances émergentes de 2014 qui vont avoir un impact dans le long terme? Une revue et une sélection basée sur les analyses de grandes consultances et des exemples choisis qui montrent que le changement est déjà là. Un article détaillant ces aspects est disponible sur http://www.ot-lab.ch/?p=4828
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...Giorgio Pauletto
Les réseaux sociaux sont en train d’inventer une nouvelle économie. Cette économie créative
se définit autour du concept de net-up, à savoir des projets, des entreprises faisant appel
aux réseaux sociaux comme principal ingrédient de leur activité. Le coworking, les groupes
d’émergence, les communautés de pratique, le copyleft, le capital social, les nouveaux business
modèles et les centres créatifs sont autant de termes qui définissent l’environnement des net-ups.
On parle alors de conditions cadres atypiques par opposition à celles connues de l’économie
traditionnelle comme le capital-risque, les business plans, le transfert technologique, le copyright
et les brevets, les technopôles et les incubateurs, le coaching et les clusters. Les résultats du
sondage présentés dans cet article, réalisé auprès des membres du réseau social Rezonance,
montrent un large mouvement qui évolue de la sphère des start-ups vers celle des net-ups.
makeopendata.ch
Synthèse de la journée du 30
Résultats du brainstorming et regroupement des idées en grandes catégories sur le thème principal de la mobilité
Génération Y et sécurité: quels risques, quelles opportunités?Giorgio Pauletto
Présentation sur la génération Y (et aussi les boomers, generation X, generation Z, etc.) et les stéréotypes qui sont véhiculés pour l'évènement "La cybersécurité dans 5 ans" du Clusis du 27 janvier 2012.
Ils ont grandi avec la révolution digitale des années 90, alors que le web voyait le jour. Nous les cherchons partout, mais ils sont déjà parmi nous: ce sont nos enfants, nos voisins, nos amis et aussi... nos collaborateurs. Dites bonjour à la génération Y des natifs digitaux. Ils sont à l'aise dans le monde du Net et leur approche de celui-ci est différente, ils utilisent plus les sms et les réseaux sociaux que l'email ou les outils classiques qu'on leur propose.
Inutile d'interdire l'usage de leurs sites favoris, ils sont de toute façon connectés par leur téléphone et leur ordinateur portable. Ils arrivent en masse comme les utilisateurs de nos organisations, de nos entreprises, de notre société. Mais sont-ils si différents que les stéréotypes des médias veulent bien nous le faire croire? Leurs approches sont-elles une opportunité ou un risque pour les entreprises?
Ouverture des données publiques: une tendance globale vers la transparenceGiorgio Pauletto
L'ouverture des données publiques constitue une tendance majeure dans le contexte de la transparence et de la protection des données pour les gouvernements et les administration publiques. Cette présentation donne les enjeux principaux du phénomène Opendata.
Présentation donnée le 9 février 2012 à la conférence des préposées à la protection des données et à la transparence du canton de Genève. http://www.ge.ch/ppdt/
L’administration vit actuellement une grande révolution. Sous l'effet massif des technologies issues du Web et de l'Internet, les relations avec les citoyens, les entreprises et la société se transforment.
En utilisant un modèle explicatif de cette (r)évolution, huit grands enjeux sont illustrés concrètement par des exemples et des explications afin de comprendre ce sujet complexe.
Après l'administration électronique, bienvenue dans l'ère de la smart gouvernance.
Présentation données aux 5èmes Assises de l'Intelligence Economique et de la Veille Stratégique, Alger, 27 novembre 2011.
Trois volets sont abordés: de la donnée vers la connaissance, l'innovation dans les modèles économiques et l'évolution de l'administration à l'ère du numérique.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. Principales conclusions
■ Les tendances de l'informatique client ont changé le marché d'une focalisation
sur les ordinateurs personnels à une perspective plus large qui comprend
smartphones, les tablettes et d’autres appareils grand public.
■ Les services émergents du Cloud relient par le réseau des différents appareils
que les utilisateurs choisissent à différents moments de leur vie quotidienne.
■ L'ère du Cloud personnel marquera un changement de point d’équilibre des
appareils vers les services.
■ Les applications et les appareils deviennent plus simples à utiliser en premier
abord par les utilisateurs. Toute les interfaces avec une courbe d'apprentissage
forte resteront réservées aux experts et ne seront que difficilement acceptés
massivement.
1
2. Dans la plupart des secteurs les organisations sont confrontées à des ruptures venant de
technologies émergentes, de l'environnement politique et légal, de modèles économiques
nouveaux ou encore de changements sociaux et culturels. La prospective stratégique et la
veille stratégique essaient d'identifier, d'anticiper et de gérer ces ruptures ainsi que de se
préparer à agir dans ce futur incertain.
Nous fournissons des ateliers, des présentations, des rapports et des méthodes permettant de
mieux cerner l'impact des changements de technologie et de société. Citons comme exemple le
domaine du e-Gouvernement avec des éléments tels que le Référentiel e-Société ou le rapport
Administration Demain.
Nous sommes aussi acteurs dans la stratégie des SI de l'État de Genève pour y apporter une
aide active dans la rédaction et l'animation, ainsi que des valeurs centrales comme: la technologie
au service de la société, l'ouverture vers les citoyens et les entreprises, l'information comme
ressource stratégique et la maîtrise des systèmes d'information. L'objectif étant bien entendu de
pouvoir tendre vers un écosystème d'information ouvert qui soit flexible, efficace et résilient.
Concepts clé:
•Veille sociétale et technologique
•Prospective stratégique
•Conseil stratégique à l'État de Genève au niveau des technologies, des métiers de
l'administration publique et du changement de société
•Partenariat actif avec des organisations internes, para-étatiques externes et internationales
•Journée de rencontre: Réseaux de personnes et d'objets, Villes numériques, Données publiques
ouvertes, Innovation dans le service public, Confiance à l'ère du numérique, etc.
2
4. L'évolution de l'informatique et des systèmes d'information se relit à travers des
grandes époques relativement rapides d'environ 10 ans. Les systèmes de chaque
époque connaissent de acteurs dominants qui innovent et provoquent généralement
le basculement vers un nouveau paradigme. Les nouvelles technologies ne balayent
pas de façon drastique celles préexistantes, mais celles-ci se stratifient. Ces
nouvelles technologies sont souvent en rupture par rapport aux précédentes et les
sous-tendent aussi parfois.
4
8. Les géants deviennent minuscules.
Suspects: microprocesseur, ordinateur quantique.
Disque dur, Processeur, Mémoire (Gordon Moore)
Les grand ordinateurs mastodontes nés au milieu du 20e siècle on vu leur taille
se réduire jusqu'à devenir invisibles à l'œil humain tandis que leurs
performances, leur mémoire, leur vitesse ne cessaient de croître de manière
exponentielle.
UNIVAC (1952) – 13 tons – 5200 Vaccuum tubes – 1000 word of 12 characters –
2000 operations per second 2.25 MHz clock
IBM PC XT (1983) 128 KB Mem – 360 KB Floppy disk 5 ¼ in – 10 MB Hard disk
– Intel 8088 4.77 Mhz (8087 math co-proc)
FXI Cotton Candy (2012) – Packed inside its tiny little frame is a 1GHz ARM
Cortex-A9 processor built by Samsung, along with an ARM Mali-400 GPU. It also
packs HDMI-out, WiFi and a Micro USB port— and comes with Android or
Ubuntu pre-loaded as the OS. It also handles MPEG-4 and H.264 video formats,
so you could plug it into a TV and use it as a rudimentary media PC.
8
9. L'ordinateur se dérobe.
Suspect: informatique ubiquitaire.
Design (Steve Jobs)
Peu à peu l'ordinateur se cache. Devenu esthétique grâce au soin apporté à son
design, il se fond dans le décor. Il se dissimule dans les objets de tous les jours
et dans l'environnement domestique. Il devient calculatrice, machine à écrire,
téléphone portable, télévision.
Exemples: Roomba iRobot, Nabaztag, Nabaztag/tag, Karotz
9
10. L'informatique n'est plus qu'un souvenir.
Oubli: Réalité augmentée, GPS, Immersion
Les progrès en informatique graphique ont ouvert la voie à d'autres dimensions
plongeant l'utilisateur dans des mondes imaginaire et symboliques. Aujourd'hui
les techniques de communication mettent en relation quasi physique les
correspondants éloignés faisant oublier comment s'opère ce miracle. Le mélange
entre réalité et éléments fictifs achève de brouiller les pistes.
Suspects: réalité virtuelle et réalité augmentée.
Exemples: Layar, Tango, SixthSense, WordLens, Google Earth, ConditionONE
10
11. L'informatique se dématérialise.
Internet, Web, Cloud (Vint Cerf, Tim Berners Lee) – l’informatique se
dématérialise.
Les premiers ordinateurs ont été reliés à des terminaux, eux-mêmes bientôt
remplacés par des micro-ordinateurs. Ces derniers ont été connectés entre eux
par des réseaux, puis par des réseaux de réseaux. Tel un morceau de sucre qui
se dissout dans une tasse de thé, l'ordinateur se dématérialise dans un nuage
informatique.
Suspect: Internet.
Exemples: Computer lab 1960, 1970, 1980, 1990, 2000, 2010
11
12. L'ordinateur se prend pour l'homme.
Principaux suspects: intelligence artificielle, hybridation homme machine.
Intuitivité, Simplicité, Interface, Intelligence artificielle (Joseph Weizenbaum –>
Judea Pearl)
L'homme commence par dialoguer avec l'ordinateur par le biais de langages de
plus en plus évolués. Plus tard la machine reconnaît sa voix et la synthétise. Puis
elle interagit avec l'homme par l'intermédiaire d'interfaces et accroît ses
perceptions par le biais d'implants. Désormais elle rivalise avec l'intelligence
humaine.
Exemples: Doug Engelbart (1968), Xerox Alto (1973), Deep Blue v Kasparov
(1997), IBM Watson (2011) , Asimo (2000), Microsoft Clippy (1998), Wolfram
Alpha (2009), Apple Siri (2011)
12
15. IBM a annoncé Blue Cloud, un service basé sur Linux, Hadoop, Xen et PowerVM. RightScale
et 3Tera offrent des outils d'administration pour gérer facilement des machines basées dans
des centres de calculs différents; opsource offre également un service similaire.
Google App Engine a été présenté en avril 2008 et permet à des applications web en Python
d'être déployées sur l'infrastructure de Google.
Microsoft a annoncé récemment Windows Azure et Azure Services Platform, une offre
similaire d'infrastructure de Cloud Computing.
Rackspace propose aussi une plateforme de Cloud computing sous la marque Mosso, qui
inclut Cloud Sites, Cloud Files et Cloud Servers tandis que ServePath fait de même sous la
marque GoGrid.
Des compagnies comme RightScale fournissent un interface pour gérer et accéder plus
simplement la plateforme de Cloud Computing de Amazon Web Services.
Five Refining Attributes of Public and Private Cloud Computing, Gartner, ID:G00167182, 5
May 2009. http://www.gartner.com/it/page.jsp?id=1035013
The NIST Definition of Cloud Computing, Recommendations of the National Institute
of Standards and Technology, Peter Mell, Timothy Grance, Special Publication (800-145),
September 2011. http://csrc.nist.gov/publications/PubsSPs.html#800-145
Stratégie Cloud Computing des autorités suisses, Version pour consultation, USIC, 14
novembre 2011. http://www.isb.admin.ch/themen/strategien/00071/01452/index.html?lang=fr
17
16. D’après le National Institute of Standards and Technology (NIST) les caractéristiques
principales de ce type de service sont qu’il est (1) à la demande, (2) accessible depuis le
réseau, (3) concentrateur de ressources, (4) grandement élastique, (5) offre un service
mesuré. Dans ce contexte, trois types des services sont proposés (1) Software as a Service
(SaaS), (2) Platform as a Service (PaaS) et (3) Infrastructure as a Service (IaaS). Les
modèles de déploiement peuvent être publics, privés, réservés à une communauté ou
hybrides. Voir le site NIST Cloud Computing http://csrc.nist.gov/groups/SNS/cloud-
computing/index.html
Plusieurs solutions sont offertes par les fournisseurs comme Google, Amazon, IBM ou
Microsoft, mais certaines solutions open source permettent aussi d’expérimenter l’usage de
Clouds privés comme par exemple Eucalyptus utilisé notamment par la NASA sur Nebula.
D’autres offres sont certainement en préparation dans ce domaine.
http://open.eucalyptus.com/wiki/Documentation
http://nebula.nasa.gov/about/
Le sujet du Cloud Computing est largement couvert par les médias, les fournisseurs et les
consultances et se trouve au sommet des attentes exagérées d’après Gartner. Toutefois
l’avancement de cette technologie semble rapide car sa phase de maturité sera atteinte dans
2 à 5 ans.
18
19. The Mobility Shift — Wherever and Whenever You Want
The march of computing and communications over time has been governed by a series of so-called laws.
Moore's Law and Metcalfe's Law have led to the mobile environment we have today. One important result
has been the race to ever smaller, more portable and power-efficient electronic devices. What filled a
desktop a decade ago now fits in your pocket — only with much more capability. This plays on another
truism — people like to move around. Users don't want technology dictating where and when they can
access information, talk to someone or play a game. They want it whenever and wherever they happen to
be.
The reality is that many of the traditional form factors for computing simply do not lend themselves to these
kinds of computing needs. In the past, we made excuses about tradeoffs in processing power or weight, but
today mobile devices combined with the cloud can fulfill most computing tasks, and any tradeoffs are
outweighed in the minds of the user by the convenience and flexibility provided by the mobile devices.
One area where smaller has not always been better has been in user interaction.
Small devices mean small buttons and difficult-to-use interfaces. While keyboards and mice have been
essential to bringing computing to the masses, they now serve to hold back computing by tying us to our
desks. However, the emergence of more natural user interface experiences is making mobility practical.
Touch- and gesture-based user experiences, coupled with speech and contextual awareness, are enabling
rich interaction with devices and a much greater level of freedom. The addition of sensors is making the
devices richer platforms for applications, and is enabling locationspecific or context-specific operation.
While mobile devices aren't killing the PC, they are shifting the focus for developers and users. Mobility
raises new concerns about security.
While, technically, "companion" is a great term for these newer devices, the term has been imbued with a
connation that the devices "need" the PC to be truly useful. This is certainly not the case at all. These
systems are fully useful on their own. They do not require using a PC to sync with user data (stored in the
cloud) or complete any transaction. These devices are full peers. At any point in time, and depending on the
scenario, any given device will take on the role of the user's primary device — the one at the center of the
user's constellation of devices.
21
25. "App-ification" — From Applications to Apps
The Apple App Store was the first app distribution service which set the standard and continues to do so for the other
app distribution services, it opened on July 10, 2008, and as of January 2011, reported over 10 billion downloads. Until
June 6, 2011, there are 425,000 third-party apps available, which are downloaded by 200 million iOS users. During
Apple's 2012 Worldwide Developer's Conference, Apple CEO Tim Cook announced that the App Store has 650,000
available apps to download as well as "an astounding 30 billion apps" downloaded from the app store until that date.
The ultimate goal of all IT is to deliver some service or application to a user. Users run applications, not operating
systems or even devices — those are just a means to an end. When the way that applications are designed, delivered
and consumed by users changes, it has a dramatic impact on all other aspects of the market. There is an application
metamorphosis under way:
■ Changing packaging — Bite-sized, narrowly focused chunks rather than large, all encompassing systems. We will
always need big applications for certain things, but increasingly small, cost-effective targeted applets will cover many
users' needs and provide more flexibility.
■ Changing price model — Users have come to expect software at much lower prices, even free. App stores have
become the equivalent of the dollar store, offering low-cost goods of acceptable quality to those who just need to get a
task done.
■ Changing delivery models — Today, the vast majority of user-facing application development is Web based.
Microsoft's new Metro-style applications for Windows 8 will be Web based and
will use HTML5, JavaScript and CSS. Even when applications are not totally Web-based, they often leverage these
cross-platform tools to provide a wider audience.
These changes will have a profound impact on how applications are written and managed in corporate environments.
They also raise the prospect of greater cross-platform portability as small user experience (UX) apps are used to adjust a
server- or cloud-resident application to the unique characteristics of a specific device or scenario. One application can
now be exposed in multiple ways and used in varying situations by the user.
On the downside, there is the real possibility of incompatibility between tools as various users select different apps to do
similar functions and discover they can't effectively share data. Of course, there is also the ever-present specter of
security issues as applications move and store corporate data in potentially unknown locations hosted by organizations
of unknown stability or means. Companies will have to get ahead of these issues or spend the next decade unraveling
the problems that will crop up.
28
37. Consumerization — You Ain't Seen Nothing Yet
■ Users are more technologically savvy and have very different expectations of technology. Users may not
understand the details of how technology works, but they certainly understand what technology can do.
■ Internet and social media have empowered and emboldened users. Today, consumers provide instant
feedback on what they like to anyone who happens to be listening. They no longer rely on just a small group
of specialist intermediaries to tell them what and how things are, but rather can chose their own unique set
of information channels.
■ The rise of powerful, affordable mobile devices changes the equation for users. They now have the
technology in their hands — devices that are truly portable and powerful enough to do real work. However,
to appeal to the consumerist masses and get the kind of broad adoption they need, vendors have been
forced to simplify how these devices work.
■ Users have become innovators. New devices and applications have become the basic building blocks of
a new wave of innovation. Users are familiar with discovering a new gadget and turning it into a tool —
sometimes playful, sometimes useful. Corporate data is making its way onto devices and into applications
dictated by users, and there may be no way to stop it. Consumerization is leading to a whole new wave of
unexpected consequences.
■ The democratization of technology, as users of all types and status within organizations can now have
similar technology available to them. Organizations that today rely on high-end concierge services for senior
executives are being forced to expand those services to all users and, therefore, must rethink how to
support this managed diversity.
Not all aspects of consumerization are positive when viewed through a corporate lens. Users aren't very
good at dealing with the details of keeping technology working and secure. They are easily frustrated when
something breaks or is difficult to use, and they don't like when something they want to use doesn't live up to
their expectations. Consumers are also easily swayed by style and fads, rather than function, and this can
lead to disappointment. What's hot today may be forgotten tomorrow. While this may be fine for individuals,
this could prove devastatingly expensive for enterprises. Furthermore, it reinforces a culture in which
manufacturers are more interested in selling the next device than supporting the last one, resulting in a
continual churn of features and capabilities. This makes it tough for IT planners to build around specific
devices with any level of confidence. Further, supporting and optimizing around the churn adds cost and
complexity to nearly every IT function.
40
38. This new personal cloud supports the characteristics demanded by users, such as:
■ Being highly mobile.
■ Being always available.
■ Being user directed — the user is in control of what he or she uses, how he or she uses it, and what he or
she shares with others.
■ Embracing multiple experiences and device classes — the device becomes secondary to the service:
■ The user can switch between devices based on situation and need.
■ No device can be considered essential all the time.
■ Providing rich interactions and content.
■ Providing a seamless shift between computing and communicating.
■ Supporting both private and public clouds, thus providing resources when a user needs it, not when IT
can get around to delivering it. The personal cloud will be a federated blending of different services and
cloud offerings, presented to the user as a single environment.
■ Providing contextual awareness to deliver the services and content to users that are appropriate to their
situation or immediate needs, rather than overwhelming them.
■ Providing operationally obvious computing — no training required:
■ Well-designed, straightforward UXs are respected and craved by users.
■ Simple, task-focused, bite-sized applets.
■ The learning curve is dead. If it takes training, it will be relegated to the specialists and
not be broadly adopted.
41
39. Recommendations for Enterprises
Faced with these major changes, enterprises must take the following steps to ensure they are not caught
off-guard as user expectations and demands shift:
■ Stop building for physical environments — Select techniques and designs that will support multiple
operating environments. This includes developing expertise with desktop virtualization technologies, but
extends to application design and operations. Ensure that user-focused operations embrace the concept of
managed diversity (see "Use Managed Diversity to Support the Growing Variety of Endpoint Devices").
■ Get ahead of the curve on "bring your own devices" (BYODs) — Users will increasingly be using devices
not provided by the enterprise to assist them in their daily work. Catching up to and, ultimately, getting
ahead of the users in this area is critical if IT is to provide any leadership in the user area. Companies need
to establish a BYOD program, including policies and processes (see "Gartner's View on 'Bring Your Own' in
Client Computing").
■ Embrace a self-service culture for users — Where possible, enable users to make their own decisions
about technology in order to gain a higher level of self-sufficiency without the need for unnecessary hand-
holding by IT personnel. Where it isn't possible, work to make it possible. While the IT organization will
always play a role in directing users, providing them guidance and assistance with technology decisions,
users are increasingly capable of dealing with many dayto-day needs on their own.
■ Look for ways to abstract and secure applications and data, not devices (see "How Will Users Access the
PC Apps They Need on Their Alternative Devices?").
■ Move corporate resources to a secure cloud — A move to a secure corporate cloud (either internally
managed or leveraging public cloud services) makes applications and services available to users across the
organization and from multiple locations and devices. This doesn't mean a free-for-all approach to corporate
data or services. Restrictions will always be necessary for certain types of sensitive data. For example,
access to customer credit card or patient data must be tightly controlled.
■ Adopt browser-based applications with local assistance — the "app" model. While not every app lends
itself to decomposition into smaller chunks or delivery through the browser, companies need to get away
from device-dependent, locally-installed applications. At the same time, companies should look for new
delivery techniques to ease the burden of administration (for example, moving away from application
installation by using App-V or other techniques to eliminate the need to store or manage devices).
42