SlideShare a Scribd company logo
1 of 13
Software 2.0 - Transformation of Software Services by  Abhishek  Rungta Founder / CEO Indus Net Technologies
Why do we need transformation? ,[object Object],[object Object],Source: Richard Heeks. 2003. “ Most e-Government-for-Development Projects Fail: How Can Risks be Reduced ?”.  e-Government initiatives in  Developing Countries Partial  Failures  50% Total Failures 35% Successes 15%
Nobody likes to fail. Then.. Source: http://www.arraspeople.co.uk  – 2010 Project Management Benchmark Report
Why projects fail? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Software / Web 2.0 fix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So what is Software 2.0? ,[object Object],[object Object],[object Object],[object Object]
Software 2.0 = IaaS, PaaS and SaaS Don’t forget: Private Cloud!
Centralized control ,[object Object],[object Object],[object Object]
Lower Infrastructure / Manpower Cost ,[object Object],[object Object]
Open Standards / Platforms ,[object Object],[object Object],[object Object],[object Object]
Pay As You Go ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

The Immediate Results of Purview - Application Analytics
The Immediate Results of Purview - Application AnalyticsThe Immediate Results of Purview - Application Analytics
The Immediate Results of Purview - Application AnalyticsExtreme Networks
 
Why SaaS BI
Why SaaS BIWhy SaaS BI
Why SaaS BIBirst
 
Java Embedded System
Java Embedded SystemJava Embedded System
Java Embedded Systemmarksmith6183
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Making the case for OFFICE365 (1)
Making the case for OFFICE365 (1)Making the case for OFFICE365 (1)
Making the case for OFFICE365 (1)Norman Di Pasquale
 
CA Unified Endpoint Management
CA Unified Endpoint ManagementCA Unified Endpoint Management
CA Unified Endpoint ManagementCA Technologies
 
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015Extreme Networks
 
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...ManageEngine, Zoho Corporation
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
Product Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSightProduct Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSightBeAnywhere
 
Ubiquitous information capture
Ubiquitous information captureUbiquitous information capture
Ubiquitous information captureKevin Neal
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumLai Yoong Seng
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Leveraging Hospital Network Analytics
Leveraging Hospital Network AnalyticsLeveraging Hospital Network Analytics
Leveraging Hospital Network AnalyticsExtreme Networks
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 

What's hot (20)

The Immediate Results of Purview - Application Analytics
The Immediate Results of Purview - Application AnalyticsThe Immediate Results of Purview - Application Analytics
The Immediate Results of Purview - Application Analytics
 
Why SaaS BI
Why SaaS BIWhy SaaS BI
Why SaaS BI
 
Java Embedded System
Java Embedded SystemJava Embedded System
Java Embedded System
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Making the case for OFFICE365 (1)
Making the case for OFFICE365 (1)Making the case for OFFICE365 (1)
Making the case for OFFICE365 (1)
 
CA Unified Endpoint Management
CA Unified Endpoint ManagementCA Unified Endpoint Management
CA Unified Endpoint Management
 
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
Product Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSightProduct Sheet - BeAnywhere InSight
Product Sheet - BeAnywhere InSight
 
Ubiquitous information capture
Ubiquitous information captureUbiquitous information capture
Ubiquitous information capture
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Leveraging Hospital Network Analytics
Leveraging Hospital Network AnalyticsLeveraging Hospital Network Analytics
Leveraging Hospital Network Analytics
 
Data Quality Solution
Data Quality SolutionData Quality Solution
Data Quality Solution
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 

Similar to Software 2.0 - Transformation of Software Services

Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...RapidValue
 
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018UX Antwerp Meetup
 
ACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-webACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-webPaul Plaquette
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities ManagementOmer Dawelbeit
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
PCF_Soln_Brief-New
PCF_Soln_Brief-NewPCF_Soln_Brief-New
PCF_Soln_Brief-Newkarunbakshi
 
Sims presentation
Sims presentationSims presentation
Sims presentationEduGeek.net
 
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET Journal
 
Smart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexitySmart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexityMohit Mehrotra
 
Software application architecture
Software application architectureSoftware application architecture
Software application architectureanwitat
 
Tim willoughby open source-in-local-government
Tim willoughby open source-in-local-governmentTim willoughby open source-in-local-government
Tim willoughby open source-in-local-governmentOpenSourceLGMA
 
Unit 1.4 working of cloud computing
Unit 1.4 working of cloud computingUnit 1.4 working of cloud computing
Unit 1.4 working of cloud computingeShikshak
 
Data to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilitiesData to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilitiesAsanka Abeysinghe
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
Iaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd Iaetsd
 
Advanced Communication over LAN AJCSE Advanced Communication over LAN
Advanced Communication over LAN AJCSE Advanced Communication over LANAdvanced Communication over LAN AJCSE Advanced Communication over LAN
Advanced Communication over LAN AJCSE Advanced Communication over LANBRNSSPublicationHubI
 
WSO2 Integration Platform: Vision and Roadmap
WSO2 Integration Platform: Vision and RoadmapWSO2 Integration Platform: Vision and Roadmap
WSO2 Integration Platform: Vision and RoadmapWSO2
 

Similar to Software 2.0 - Transformation of Software Services (20)

Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
 
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018
 
ACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-webACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-web
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities Management
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
PCF_Soln_Brief-New
PCF_Soln_Brief-NewPCF_Soln_Brief-New
PCF_Soln_Brief-New
 
Sims presentation
Sims presentationSims presentation
Sims presentation
 
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
 
Smart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexitySmart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexity
 
Software application architecture
Software application architectureSoftware application architecture
Software application architecture
 
Tim willoughby open source-in-local-government
Tim willoughby open source-in-local-governmentTim willoughby open source-in-local-government
Tim willoughby open source-in-local-government
 
Unit 1.4 working of cloud computing
Unit 1.4 working of cloud computingUnit 1.4 working of cloud computing
Unit 1.4 working of cloud computing
 
Windows for IOT
Windows for IOTWindows for IOT
Windows for IOT
 
Data to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilitiesData to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilities
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Iaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd efficient file transferring in
Iaetsd efficient file transferring in
 
Advanced Communication over LAN AJCSE Advanced Communication over LAN
Advanced Communication over LAN AJCSE Advanced Communication over LANAdvanced Communication over LAN AJCSE Advanced Communication over LAN
Advanced Communication over LAN AJCSE Advanced Communication over LAN
 
WSO2 Integration Platform: Vision and Roadmap
WSO2 Integration Platform: Vision and RoadmapWSO2 Integration Platform: Vision and Roadmap
WSO2 Integration Platform: Vision and Roadmap
 
iot
iotiot
iot
 

More from Indus Net Technologies Private Limited (12)

Does your Business Really Need a Mobile App?
Does your Business Really Need a Mobile App?Does your Business Really Need a Mobile App?
Does your Business Really Need a Mobile App?
 
Will FinTech Eat Banking?
Will FinTech Eat Banking? Will FinTech Eat Banking?
Will FinTech Eat Banking?
 
FinTech Maturity Model
FinTech Maturity Model FinTech Maturity Model
FinTech Maturity Model
 
Why Everyone wants to become a CIO?
Why Everyone wants to become a CIO?Why Everyone wants to become a CIO?
Why Everyone wants to become a CIO?
 
Digital Marketing Demystified
Digital Marketing DemystifiedDigital Marketing Demystified
Digital Marketing Demystified
 
Social mobile enterpise
Social mobile enterpiseSocial mobile enterpise
Social mobile enterpise
 
Outsourcing for Profit - A book outlining best practices in offshore outsourcing
Outsourcing for Profit - A book outlining best practices in offshore outsourcingOutsourcing for Profit - A book outlining best practices in offshore outsourcing
Outsourcing for Profit - A book outlining best practices in offshore outsourcing
 
Best Practices in Offshore Outsourcing for Digital Agencies
Best Practices in Offshore Outsourcing for Digital AgenciesBest Practices in Offshore Outsourcing for Digital Agencies
Best Practices in Offshore Outsourcing for Digital Agencies
 
Blog Monetization
Blog MonetizationBlog Monetization
Blog Monetization
 
3D Internet Strategy Model
3D Internet Strategy Model3D Internet Strategy Model
3D Internet Strategy Model
 
Strategies for tackling recession
Strategies for tackling recessionStrategies for tackling recession
Strategies for tackling recession
 
Dedicated Hiring Model
Dedicated Hiring ModelDedicated Hiring Model
Dedicated Hiring Model
 

Software 2.0 - Transformation of Software Services

  • 1. Software 2.0 - Transformation of Software Services by Abhishek Rungta Founder / CEO Indus Net Technologies
  • 2.
  • 3. Nobody likes to fail. Then.. Source: http://www.arraspeople.co.uk – 2010 Project Management Benchmark Report
  • 4.
  • 5.
  • 6.
  • 7. Software 2.0 = IaaS, PaaS and SaaS Don’t forget: Private Cloud!
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.