SlideShare a Scribd company logo
My 2 cents
Paul Quickenden,
Strategy Manager Gen-i
@paulq
@geni_ICT
A provocative look at the
Proprietary vs Open source
debate in cloud computing
Setting the scene
There is considerable discussion within
cloud circles about Opensource
..some (including me) predicting that
proprietary software is in big trouble
… OSS pundits are building platforms
and attempting to build standards
…and some downright vilification
of some vendors
Cloud ‘Developers’ are making
choices based on their world view
…seeing some of their partners
start to go direct…
Obviously, AT&T, Peer1, and Hosted Solutions weren't
overjoyed about competing with their storage vendor, which
is undoubtedly a major reason why EMC shut down Atmos
Online.
…hearing some of their peers being
caught out by company failures or
acquisitions
While being bombarded with
FUD…
..or bringing their own ‘religious’
beliefs
Which are all valid concerns, but they tend
to ignore customers and what they want
..customers have long since abandoned
even the pretence of caring about the
definitions….
Proprietary vs Open source
…instead they are making decisions using
the same trusted criteria they always have
…Technology they know and trust
…are trained in (and have built their careers around)
…have already business cased (and put their
heads on the block)
…or taking the least risk approach…
“In the enterprise, Private cloud will Mature First, and it
will be built on the technology already in the data centre”
Why is there such a big divide?
Proprietary Open Source
You got open
source on my
proprietary cloud
You got
proprietary on
my open source
cloud
Well… lets view this from an
client adoption of innovation
Point Of View
Cloud computing is still early in
the product lifecycle
Which means there is lots to DO to get the
majority clients over the line
Source : http://pharmtech.findpharma.com/pharmtech/Manufacturing/Nanotechnology-the-next-silver-
bullet/ArticleStandard/Article/detail/605695
16%
34%34%13.5%
2.5%
90%
And the key things to ‘DO’ from a client
POV are mainly about service reliability
“Availability and performance were tied at #2 last year,
and are there again this year.
So… how do you build in performance,
availability and dependability into your product?
….you build your products using
proprietary, interdependent architectures
— This approach
gives you control
of the entire
system…
— And this control
improves the
reliability
• Source: Http://www.authorstream.com/Presentation/aSGuest9801-134609-christensen-education-ppt-
powerpoint/
Good enough line
And you keep at it until you get past the
good enough line….
• Source: Http://www.authorstream.com/Presentation/aSGuest9801-134609-christensen-education-ppt-
powerpoint/
Good enough line
…and competition changes, in order to
differentiate you need to provide more
choice, customisation and speed.
Good enough line
And to deliver these you need
modular, open architectures….or
OSS
25January 29, 2015©Copyright Gen-i 2009
Where are we seeing this?
Strong growth of Opensource in commodity areas
and ….
…Funnily enough proprietary PaaS…which appears
to deliver the speed, choice and customisation
Conclusions…
— In general, all big debates that the clouderati are having
don’t mean much to clients
— Cloud might be a new, but all the old rules apply (innovation
adoption, profit, channel dynamics, human dimension, who wins and
who looses)
— The whole debate of proprietary and OS is just a question
of timing… and customers dictate that not us.
— Watch for when the ‘good enough’ line is crossed…
— The customer outcome that PaaS & open source
architectures provides are pretty much the same…
— Flexibility, agility, customisation
— If you are a developer you are going to have to place your
bets, but pick a big player…
— And expect to eventually compete with them at the high end
29January 29, 2015©Copyright Gen-i 2009

More Related Content

Similar to Proprietary vs opensourcecloudcomputing

Leveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk AnalyticsLeveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk Analytics
Precisely
 
Disruption: Designing Successful Startups
Disruption: Designing Successful StartupsDisruption: Designing Successful Startups
Disruption: Designing Successful Startups
Julian Scaff
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
FraudBusters
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
sllongo3
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
Analyst field reports on top 20 MDM and Data Governance implementation partne...
Analyst field reports on top 20 MDM and Data Governance implementation partne...Analyst field reports on top 20 MDM and Data Governance implementation partne...
Analyst field reports on top 20 MDM and Data Governance implementation partne...
Aaron Zornes
 
Designing a secure software development process with DevOps
Designing a secure software development process with DevOpsDesigning a secure software development process with DevOps
Designing a secure software development process with DevOps
Mike Long
 
Continuous acceleration devopsdaysdc2015_corman
Continuous acceleration devopsdaysdc2015_cormanContinuous acceleration devopsdaysdc2015_corman
Continuous acceleration devopsdaysdc2015_corman
daachi
 
Taking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying ProcessTaking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying Process
LinkedIn
 
LinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech ResearchLinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech Research
LinkedIn
 
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisAn_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisMicheal Walsh
 
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Mighty Guides, Inc.
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
AIIM International
 
Making cd happen thought works talks tech 27 march 2019
Making cd happen   thought works talks tech 27 march 2019Making cd happen   thought works talks tech 27 march 2019
Making cd happen thought works talks tech 27 march 2019
Sriram Narayanan
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
Peter Bihr
 
; 458234httpsbookshelf.vitalsource.com Sy
; 458234httpsbookshelf.vitalsource.com Sy; 458234httpsbookshelf.vitalsource.com Sy
; 458234httpsbookshelf.vitalsource.com Sy
TatianaMajor22
 
MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406Elliot Tally
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
Rikki Wright
 
Surge engr 245 lean launchpad stanford 2020
Surge engr 245 lean launchpad stanford 2020Surge engr 245 lean launchpad stanford 2020
Surge engr 245 lean launchpad stanford 2020
Stanford University
 

Similar to Proprietary vs opensourcecloudcomputing (20)

Leveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk AnalyticsLeveraging Mainframe Machine and Log Data in Splunk Analytics
Leveraging Mainframe Machine and Log Data in Splunk Analytics
 
Disruption: Designing Successful Startups
Disruption: Designing Successful StartupsDisruption: Designing Successful Startups
Disruption: Designing Successful Startups
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
Analyst field reports on top 20 MDM and Data Governance implementation partne...
Analyst field reports on top 20 MDM and Data Governance implementation partne...Analyst field reports on top 20 MDM and Data Governance implementation partne...
Analyst field reports on top 20 MDM and Data Governance implementation partne...
 
Designing a secure software development process with DevOps
Designing a secure software development process with DevOpsDesigning a secure software development process with DevOps
Designing a secure software development process with DevOps
 
Continuous acceleration devopsdaysdc2015_corman
Continuous acceleration devopsdaysdc2015_cormanContinuous acceleration devopsdaysdc2015_corman
Continuous acceleration devopsdaysdc2015_corman
 
Taking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying ProcessTaking a Deeper Look at Today's Tech Buying Process
Taking a Deeper Look at Today's Tech Buying Process
 
LinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech ResearchLinkedIn Tech Marketer's Event - Tech Research
LinkedIn Tech Marketer's Event - Tech Research
 
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisAn_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
 
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
 
Making cd happen thought works talks tech 27 march 2019
Making cd happen   thought works talks tech 27 march 2019Making cd happen   thought works talks tech 27 march 2019
Making cd happen thought works talks tech 27 march 2019
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
; 458234httpsbookshelf.vitalsource.com Sy
; 458234httpsbookshelf.vitalsource.com Sy; 458234httpsbookshelf.vitalsource.com Sy
; 458234httpsbookshelf.vitalsource.com Sy
 
MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
Surge engr 245 lean launchpad stanford 2020
Surge engr 245 lean launchpad stanford 2020Surge engr 245 lean launchpad stanford 2020
Surge engr 245 lean launchpad stanford 2020
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Proprietary vs opensourcecloudcomputing

  • 1. My 2 cents Paul Quickenden, Strategy Manager Gen-i @paulq @geni_ICT A provocative look at the Proprietary vs Open source debate in cloud computing
  • 3. There is considerable discussion within cloud circles about Opensource
  • 4. ..some (including me) predicting that proprietary software is in big trouble
  • 5. … OSS pundits are building platforms and attempting to build standards
  • 6. …and some downright vilification of some vendors
  • 7. Cloud ‘Developers’ are making choices based on their world view
  • 8. …seeing some of their partners start to go direct… Obviously, AT&T, Peer1, and Hosted Solutions weren't overjoyed about competing with their storage vendor, which is undoubtedly a major reason why EMC shut down Atmos Online.
  • 9. …hearing some of their peers being caught out by company failures or acquisitions
  • 10. While being bombarded with FUD…
  • 11. ..or bringing their own ‘religious’ beliefs
  • 12. Which are all valid concerns, but they tend to ignore customers and what they want
  • 13. ..customers have long since abandoned even the pretence of caring about the definitions…. Proprietary vs Open source
  • 14. …instead they are making decisions using the same trusted criteria they always have …Technology they know and trust …are trained in (and have built their careers around) …have already business cased (and put their heads on the block)
  • 15. …or taking the least risk approach… “In the enterprise, Private cloud will Mature First, and it will be built on the technology already in the data centre”
  • 16. Why is there such a big divide? Proprietary Open Source You got open source on my proprietary cloud You got proprietary on my open source cloud
  • 17. Well… lets view this from an client adoption of innovation Point Of View
  • 18. Cloud computing is still early in the product lifecycle
  • 19. Which means there is lots to DO to get the majority clients over the line Source : http://pharmtech.findpharma.com/pharmtech/Manufacturing/Nanotechnology-the-next-silver- bullet/ArticleStandard/Article/detail/605695 16% 34%34%13.5% 2.5% 90%
  • 20. And the key things to ‘DO’ from a client POV are mainly about service reliability “Availability and performance were tied at #2 last year, and are there again this year.
  • 21. So… how do you build in performance, availability and dependability into your product?
  • 22. ….you build your products using proprietary, interdependent architectures — This approach gives you control of the entire system… — And this control improves the reliability • Source: Http://www.authorstream.com/Presentation/aSGuest9801-134609-christensen-education-ppt- powerpoint/ Good enough line
  • 23. And you keep at it until you get past the good enough line…. • Source: Http://www.authorstream.com/Presentation/aSGuest9801-134609-christensen-education-ppt- powerpoint/ Good enough line
  • 24. …and competition changes, in order to differentiate you need to provide more choice, customisation and speed. Good enough line
  • 25. And to deliver these you need modular, open architectures….or OSS 25January 29, 2015©Copyright Gen-i 2009
  • 26. Where are we seeing this?
  • 27. Strong growth of Opensource in commodity areas and ….
  • 28. …Funnily enough proprietary PaaS…which appears to deliver the speed, choice and customisation
  • 29. Conclusions… — In general, all big debates that the clouderati are having don’t mean much to clients — Cloud might be a new, but all the old rules apply (innovation adoption, profit, channel dynamics, human dimension, who wins and who looses) — The whole debate of proprietary and OS is just a question of timing… and customers dictate that not us. — Watch for when the ‘good enough’ line is crossed… — The customer outcome that PaaS & open source architectures provides are pretty much the same… — Flexibility, agility, customisation — If you are a developer you are going to have to place your bets, but pick a big player… — And expect to eventually compete with them at the high end 29January 29, 2015©Copyright Gen-i 2009

Editor's Notes

  1. Test notes here ©© Copyright Gen-i 2009 Copyright Gen-I Group 2009