SlideShare a Scribd company logo
1 of 23
Download to read offline
Let’s Get Cirrus
About Personal Clouds
pCloud & VRM Day
21 October 2013, Mountain View, CA

T.Rob Wyatt - t.rob@ioptconsulting.com and @tdotrob
And yes, I know those are not cirrus clouds. But I took the photo and I own the rights.
These are: My. Personal. Clouds.
IBM 4381 - 1987

•
•
•
•

Up to Dual 32-Bit CPU
Up to 64k Cache
Up to 32-Bit I/O Bus
Up to 3 MBs I/O Channels

•
•
•
•

15 MHz CPU (68 ns cycle)
Math co-processor available
Up to 64 MB memory
$890,000 and up

I started my career in IT as a Computer Operator on one of these.
Photo & specs source: http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP4381.html
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 2
Motorola Razr Maxx HD - 2013

•
•
•
•
•

Dual 32-Bit CPU
32k L1 Cache
1MB L2 Cache
1GB RAM
32-Bit I/O Bus

•
•
•
•
•

1.7 GHz CPU (1.7 ns cycle)
60 MBs USB 2.0
Graphics co-processor
Up to 64 GB memory
$199 and up

I currently own one of these.
Source: http://www.phonearena.com/phones/Motorola-DROID-RAZR-MAXX-HD_id7484
http://www.qualcomm.com/snapdragon/processors/800-600-400-200/specs
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 3
Development and Operation Costs

•
•
•
•
•
•

$$ - OS/390
$$ - DB2
$$ - COBOL
$$ - Disk
$$ - Channel Controller
$$ - Networking

Android OS
MySQL
Java
Micro SDHC
USB 2.0
4G LTE

Included in price

Millions of $$
10/21/2013 Mountain View, CA

•
•
•
•
•
•

pCloud & VRM Day, IIW XVII

Page 4
Wait! What?

•
•
•
•
•
•

CICS – Transaction processing
UPC Codes – Retail checkout
SAP – CRM
MAPPER – Decision Support
SABRE – Travel booking
SAS – Business analytics

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

•
•
•
•
•
•

Angry Birds
Pandora
Netflix
Twitter
Facebook
Ben the talking dog

Page 5
Evolutionary software model
Vacuum Tube

Today’s data &
control model…

Transistor
Integrated Circuit

VLSI

…was designed on the constraints of
yesteryear’s technology.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 6
Evolutionary legacy
• Business software run by
business, for business.
• Your data is held by the
business for their use.
• You have no say over what is
collected or how it is used.

When all this started, it could not
have worked any other way.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 7
Revolutionary opportunity
What would the data & control model
for business software
have looked like
if it was designed at a time
when ordinary people
had access to a mainframe
in their pocket?

Let’s find out!
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 8
It’s our turn!
Mainframe business software transformed
commerce on a global scale.
Personal computing software
applied to business applications
can transform commerce on a global scale
again.

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 9
But wait, there’s more!

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 10
Privacy, sovereignty
Personal computing software,
in the hands of individuals,
that collects and processes their data locally,
and honors the owner’s access policies
opens the door to applications
that you would not dare
to farm out to a 3rd party.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 11
Hey! Wait a minute!
Where do personal clouds
fit into all of this?
The session agenda said
“Personal Clouds,” dammit!
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 12
Fair enough. But before we go on…
Please write down your name and the answers to 5 or so of
these questions and pass them forward to me.

Have you ever
been arrested

How much money
do you make?

What medications do you
take regularly?
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 13
That’s personal!
The phrase “that’s
personal” is universally
understood.

It means “that
information is none of
your business.”

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 14
“Personal” is that which you control!
What makes a cloud personal is
that the owner, that’s YOU if it is
your personal cloud, has the
ultimate say over the data stored
there, how that data is used, and
who it is shared with.
A big part of the attraction is that you can decide what to
share, with whom to share it and can revoke that access later.
But an oft overlooked aspect is that you are no longer
dependent on the vendor for every fix, enhancement, or
integration. Personal Cloud invites innovation.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 15
So, what is a “cloud”?
A computer system with…
• Elasticity: Dynamic allocation of
resources.
• Redundancy: Increased availability.
• Resiliency: Survives loss of some
components.
• Run-time resolution: Resources, identities and addresses
are resolved dynamically.
• Ubiquity: Accessible from all points within a given scope.
• Abstraction. Logical connection destination.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 16
Personal + Cloud =

If you know what personal is and you know what cloud is,
just stick them together and you get Personal Cloud.
It really is that simple.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 17
For the skeptics in the room…
Forget about business apps for a moment.
Soon, even the most mundane of objects
will be instrumented.
Who should own and
benefit from all that
personal data collected
about you? Shouldn’t YOU
be the primary stakeholder in your own data?
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 18
IoT current trajectory

Because, at least for now, you are definitely not the primary stakeholder of your own data.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 19
Personal Cloud can be:
•
•
•
•
•
•
•
•

Commercial transactions
Providing signal back to vendors
Experiential data (job history, health data)
Digital model of real-world state (social graph)
Quantified Self
Instrumented devices
Decision Support
Personal and Business Analytics
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 20
Personal Cloud Opportunities
•
•
•
•
•
•

Hosting software
Applications
Data aggregation & integration
Hosted apps & plugins
Retro-fit
Identity and authentication frameworks

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 21
Thank you!
Questions? Comments? Rotten tomatoes?
T.Rob Wyatt
t.rob@ioptconsulting.com
https://ioptconsulting.com
https://t-rob.net
https://linkedin.com/in/tdotrob
https://facebook.com/tdotrob
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 22
http://personal-clouds.org
http://pde.cc
http://customercommons.org
http://projectvrm.org

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

23

More Related Content

What's hot

Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureLuis Grangeia
 
Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)alengadan
 
Prototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of ThingsPrototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of Thingsalengadan
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...Tokyo University of Science
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsSecuRing
 
Prototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of ThingsPrototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of Thingsalengadan
 
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Howto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  WepHowto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  Wep
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy WepPraveen Kumar Sinha
 
The Web of Things in Practice
The Web of Things in PracticeThe Web of Things in Practice
The Web of Things in PracticeDominique Guinard
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyPrasanna Kumar Valluri
 
Web of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the WebWeb of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the WebDominique Guinard
 
Weiqi and InfoSec
Weiqi and InfoSecWeiqi and InfoSec
Weiqi and InfoSecChuan Lin
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 

What's hot (18)

Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)
 
Prototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of ThingsPrototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of Things
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
 
Prototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of ThingsPrototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of Things
 
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Howto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  WepHowto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  Wep
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
 
The Web of Things in Practice
The Web of Things in PracticeThe Web of Things in Practice
The Web of Things in Practice
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective Study
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Web of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the WebWeb of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the Web
 
Weiqi and InfoSec
Weiqi and InfoSecWeiqi and InfoSec
Weiqi and InfoSec
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
Security
SecuritySecurity
Security
 

Viewers also liked

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)T.Rob Wyatt
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityT.Rob Wyatt
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0Matthew White
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
 

Viewers also liked (8)

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of Mediocrity
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
 
IBM MQ V8 Security
IBM MQ V8 SecurityIBM MQ V8 Security
IBM MQ V8 Security
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep Dive
 

Similar to Let’s Get Cirrus About Personal Clouds

Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Boris Adryan
 
3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge Computing3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge ComputingBernard Marr
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology TrendsSynergisIT
 
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...Dana Gardner
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Bernard Marr
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Guido Schmutz
 
Big Data
Big DataBig Data
Big DataBBDO
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-dataglittaz
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013Brian Crotty
 
Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10Simon Wardley
 
Situation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesdaySituation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesdaySimon Wardley
 
The Impact of the Cloud On BC
The Impact of the Cloud On BCThe Impact of the Cloud On BC
The Impact of the Cloud On BCTonya Tronco
 
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud -  Click Digital Expo 2016 - Jamin AndrewsBeyond the Cloud -  Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud - Click Digital Expo 2016 - Jamin AndrewsJamin Andrews
 
Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019Abdel Moneim Emad
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsRamakant Gawande
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 

Similar to Let’s Get Cirrus About Personal Clouds (20)

Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16
 
3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge Computing3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge Computing
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
 
Big Data - CRM's Promise Land
Big Data - CRM's Promise LandBig Data - CRM's Promise Land
Big Data - CRM's Promise Land
 
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
 
Big Data
Big DataBig Data
Big Data
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-data
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
 
Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10
 
Situation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesdaySituation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesday
 
The Impact of the Cloud On BC
The Impact of the Cloud On BCThe Impact of the Cloud On BC
The Impact of the Cloud On BC
 
Simon Wardley
Simon WardleySimon Wardley
Simon Wardley
 
Internet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazineInternet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazine
 
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud -  Click Digital Expo 2016 - Jamin AndrewsBeyond the Cloud -  Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
 
Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019
 
Pdf docu
Pdf docuPdf docu
Pdf docu
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
 
Security that works
Security that worksSecurity that works
Security that works
 

Recently uploaded

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Tecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for RotogravureTecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for RotogravureAntonio de Llamas
 
Tetracrom printing process for packaging with CMYK+
Tetracrom printing process for packaging with CMYK+Tetracrom printing process for packaging with CMYK+
Tetracrom printing process for packaging with CMYK+Antonio de Llamas
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Transport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MITransport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MIRomil Mishra
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2DianaGray10
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Transcript: Green paths: Learning from publishers’ sustainability journeys - ...
Transcript: Green paths: Learning from publishers’ sustainability journeys - ...Transcript: Green paths: Learning from publishers’ sustainability journeys - ...
Transcript: Green paths: Learning from publishers’ sustainability journeys - ...BookNet Canada
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The work to make the piecework work: An ethnographic study of food delivery w...
The work to make the piecework work: An ethnographic study of food delivery w...The work to make the piecework work: An ethnographic study of food delivery w...
The work to make the piecework work: An ethnographic study of food delivery w...stockholm university
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?Rustici Software
 

Recently uploaded (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Tecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for RotogravureTecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for Rotogravure
 
Tetracrom printing process for packaging with CMYK+
Tetracrom printing process for packaging with CMYK+Tetracrom printing process for packaging with CMYK+
Tetracrom printing process for packaging with CMYK+
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Transport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MITransport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MI
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Transcript: Green paths: Learning from publishers’ sustainability journeys - ...
Transcript: Green paths: Learning from publishers’ sustainability journeys - ...Transcript: Green paths: Learning from publishers’ sustainability journeys - ...
Transcript: Green paths: Learning from publishers’ sustainability journeys - ...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The work to make the piecework work: An ethnographic study of food delivery w...
The work to make the piecework work: An ethnographic study of food delivery w...The work to make the piecework work: An ethnographic study of food delivery w...
The work to make the piecework work: An ethnographic study of food delivery w...
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?
 

Let’s Get Cirrus About Personal Clouds

  • 1. Let’s Get Cirrus About Personal Clouds pCloud & VRM Day 21 October 2013, Mountain View, CA T.Rob Wyatt - t.rob@ioptconsulting.com and @tdotrob And yes, I know those are not cirrus clouds. But I took the photo and I own the rights. These are: My. Personal. Clouds.
  • 2. IBM 4381 - 1987 • • • • Up to Dual 32-Bit CPU Up to 64k Cache Up to 32-Bit I/O Bus Up to 3 MBs I/O Channels • • • • 15 MHz CPU (68 ns cycle) Math co-processor available Up to 64 MB memory $890,000 and up I started my career in IT as a Computer Operator on one of these. Photo & specs source: http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP4381.html 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 2
  • 3. Motorola Razr Maxx HD - 2013 • • • • • Dual 32-Bit CPU 32k L1 Cache 1MB L2 Cache 1GB RAM 32-Bit I/O Bus • • • • • 1.7 GHz CPU (1.7 ns cycle) 60 MBs USB 2.0 Graphics co-processor Up to 64 GB memory $199 and up I currently own one of these. Source: http://www.phonearena.com/phones/Motorola-DROID-RAZR-MAXX-HD_id7484 http://www.qualcomm.com/snapdragon/processors/800-600-400-200/specs 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 3
  • 4. Development and Operation Costs • • • • • • $$ - OS/390 $$ - DB2 $$ - COBOL $$ - Disk $$ - Channel Controller $$ - Networking Android OS MySQL Java Micro SDHC USB 2.0 4G LTE Included in price Millions of $$ 10/21/2013 Mountain View, CA • • • • • • pCloud & VRM Day, IIW XVII Page 4
  • 5. Wait! What? • • • • • • CICS – Transaction processing UPC Codes – Retail checkout SAP – CRM MAPPER – Decision Support SABRE – Travel booking SAS – Business analytics 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII • • • • • • Angry Birds Pandora Netflix Twitter Facebook Ben the talking dog Page 5
  • 6. Evolutionary software model Vacuum Tube Today’s data & control model… Transistor Integrated Circuit VLSI …was designed on the constraints of yesteryear’s technology. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 6
  • 7. Evolutionary legacy • Business software run by business, for business. • Your data is held by the business for their use. • You have no say over what is collected or how it is used. When all this started, it could not have worked any other way. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 7
  • 8. Revolutionary opportunity What would the data & control model for business software have looked like if it was designed at a time when ordinary people had access to a mainframe in their pocket? Let’s find out! 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 8
  • 9. It’s our turn! Mainframe business software transformed commerce on a global scale. Personal computing software applied to business applications can transform commerce on a global scale again. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 9
  • 10. But wait, there’s more! 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 10
  • 11. Privacy, sovereignty Personal computing software, in the hands of individuals, that collects and processes their data locally, and honors the owner’s access policies opens the door to applications that you would not dare to farm out to a 3rd party. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 11
  • 12. Hey! Wait a minute! Where do personal clouds fit into all of this? The session agenda said “Personal Clouds,” dammit! 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 12
  • 13. Fair enough. But before we go on… Please write down your name and the answers to 5 or so of these questions and pass them forward to me. Have you ever been arrested How much money do you make? What medications do you take regularly? 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 13
  • 14. That’s personal! The phrase “that’s personal” is universally understood. It means “that information is none of your business.” 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 14
  • 15. “Personal” is that which you control! What makes a cloud personal is that the owner, that’s YOU if it is your personal cloud, has the ultimate say over the data stored there, how that data is used, and who it is shared with. A big part of the attraction is that you can decide what to share, with whom to share it and can revoke that access later. But an oft overlooked aspect is that you are no longer dependent on the vendor for every fix, enhancement, or integration. Personal Cloud invites innovation. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 15
  • 16. So, what is a “cloud”? A computer system with… • Elasticity: Dynamic allocation of resources. • Redundancy: Increased availability. • Resiliency: Survives loss of some components. • Run-time resolution: Resources, identities and addresses are resolved dynamically. • Ubiquity: Accessible from all points within a given scope. • Abstraction. Logical connection destination. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 16
  • 17. Personal + Cloud = If you know what personal is and you know what cloud is, just stick them together and you get Personal Cloud. It really is that simple. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 17
  • 18. For the skeptics in the room… Forget about business apps for a moment. Soon, even the most mundane of objects will be instrumented. Who should own and benefit from all that personal data collected about you? Shouldn’t YOU be the primary stakeholder in your own data? 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 18
  • 19. IoT current trajectory Because, at least for now, you are definitely not the primary stakeholder of your own data. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 19
  • 20. Personal Cloud can be: • • • • • • • • Commercial transactions Providing signal back to vendors Experiential data (job history, health data) Digital model of real-world state (social graph) Quantified Self Instrumented devices Decision Support Personal and Business Analytics 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 20
  • 21. Personal Cloud Opportunities • • • • • • Hosting software Applications Data aggregation & integration Hosted apps & plugins Retro-fit Identity and authentication frameworks 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 21
  • 22. Thank you! Questions? Comments? Rotten tomatoes? T.Rob Wyatt t.rob@ioptconsulting.com https://ioptconsulting.com https://t-rob.net https://linkedin.com/in/tdotrob https://facebook.com/tdotrob 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 22