SlideShare a Scribd company logo
Technology update

Presented
by James
Sturgess –
  Owner/
 Director
Sturgclan
Consulting
    16/06/2011
James@sturgclan.co.uk
    0800 058 8929
Contents

1.   Introduction
2.   Changing perceptions
3.   Internet Presence
4.   Hardware/software
     1. PC vs.. Mac
     2. Android vs. IOS
     3. Battle of the browsers
5. Security
6. Conclusion
Introduction
 Thanks for having me

 Today's talk – Technology update – I want to keep you abreast of the ever
  changing world of technology.

 There a a few sections, however as the technology itself you will see that
  everything is starting to link together.

 Cloud services have become a big player in the business world with SAAS
  (software as a service) becoming the new internet in many sectors.

 As a result virtualisation has saved many businesses, large and small, time
  and money as well as increasing productivity due to less downtime and tighter
  controls.

 Advancements in hardware mean more and more power hungry applications
  can run at higher speeds offering previously unheard of performance to suit all
  budgets.
Changing perceptions

                    Facts
 Internet usage has almost doubled
  over the last 6 years March 2005,
  13.9% of world population (about 888
  million) used the internet, in March
  2011 this has increased to 30% (2,072
  million).
 In 2010 every single day around 294
  billion emails were sent, that’s about
  107 trillion over however over 80% of
  these were Spam 
Changing perceptions

Interesting stats but what does that
mean for business?
An effective online presence is vital.
People know what they want and are
more savvy.
E-commerce was like the proverbial talking dog. It wasn’t about how well the dog could talk, it was
amazing that the dog could talk at all.
                 Quote from <http://venturebeat.com/2010/12/03/5-top-trends-in-consumer-based-internet-
                                           businesses-for-2011/>
Internet presence

What is an Internet presence?
How much Management does it
require?
Do you know where you rank?
Do you have more than your website?
Is your site compliant to W3C
standards?
Where else are you listed?
Hardware/software
Hardware
Hardware is evolving faster than ever at present.
• Processors have traded speed per unit
  advancements for multiprocessing (eg. Dual
  core/quad core, and now hex-core)
• Solid state hard drives are starting to become a
  viable option, offering faster read speeds.
• Mobile phones now have at least as much function
  as a computer, often allowing greater flexibility due to
  their portable nature
• Cloud and virtualisation has meant that costs have
  come down for your end users, allowing no more
  than a dumb terminal with limited resources to run all
  the functions you require from a central server.
Hardware/software

Software
•Windows 7 has meant that even lower spec
devices such as net books can offer outstanding
performance.
•HTML5 is finally incorporating all of the elements
such as video, audio and images into the main
markup without having to use memory hungry 3rd
party code (eg. JavaScript, Flash, PHP)
•“The cloud” has allowed users to collaborate on
projects like never from before, everyone from
musicians, scientists, sales people to
accountants can all work more efficiently.
PC vs Mac
 For a long time, the PC has been the least secure option.
 This meant that a number of users switched to Apple,
  allowing more interoperability with the infamous I-phone.
 The focus of the cyber-criminals has now shifted to Apple
  technology.
 Modern PC security is thorough and requires little
  management.
 PC’s are much more flexible as Apple use a closed garden
  approach
 The majority of software and hardware manufacturers still
  focus mainly on the PC market
 Windows 7 dominates the operating system market, with
  the 64 bit version many designers are also switching their
  allegiances.
Android vs IOS

Android                                          IOS
•   Android is a totally open source platform    • I-phone is the most successful
    offering developers and manufacturers
    freedom.                                       handheld device in history.
•   Android is used a number of high end           Having an almost cult
    devices, but will happily run on low end
    phones as well                                 following.
•   Android is open-source allowing              • IOS is used only on Apple
    developers to create whatever their
    imagination allows.                            products, you cannot change
•   This in turn makes Android more                the OS even if you want to.
    susceptible to security attacks, however
    there is adequate free software for          • Apple control the content
    protection.                                    available
•   Every part of the Android UI is editable
•   Android is the best solution for 3rd party   • The I-phone is very secure, but
    applications using cloud technology            is limited in its capabilities
                                                 • You cannot change the UI on
                                                   an I-phone.
Security

As a Windows user, today       As a Mac user, you can no
   you need look no further       longer rely on the built in
   than Microsoft for all of      software, choosing which
   your security needs. For       package is a minefield.
   any business with up to        Interestingly more and
   10 networked PC’s              more users are installing
   Microsoft Security             windows on their Mac with
   Essentials is free of          their Bootcamp partition,
   charge and offers              they can then download
   unrivalled protection.         MSE and an additional
                                  driver to scan the Mac
                                  partition.
Security

• The cloud used to be a great security
  concern – rather than having to get into
  each individual host machine, all a cyber-
  criminal would need to do is access the
  server. They could do this by logging into
  any of the host machines, meaning the
  security of the whole network depended
  on each individual user, now the
  protection is loaded directly into the cloud,
  protecting both internal and external
  attacks.

More Related Content

What's hot

facebookl
facebooklfacebookl
facebookl
MahaburRahaman3
 
AMI - Bringing Your Own Device to ITAM
AMI - Bringing Your Own Device to ITAMAMI - Bringing Your Own Device to ITAM
AMI - Bringing Your Own Device to ITAM
AMI - Asset Management International
 
PIXEOM
PIXEOMPIXEOM
PIXEOM
Hyn Michael
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
Dejan Pogačnik
 
Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...
Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...
Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...
Petri Rouvinen
 
Microsoft nokia acquisition
Microsoft nokia acquisitionMicrosoft nokia acquisition
Microsoft nokia acquisitionibrahimzk3
 
A case study On Microsoft
A case study On MicrosoftA case study On Microsoft
A case study On Microsoft
Eklavya Sharma
 
Samsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOXSamsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOX
Samsung Business USA
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
David Rogers
 
BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...
BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...
BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...
Chris Miller
 
Lessons of Steve Jobs
Lessons of Steve JobsLessons of Steve Jobs
Lessons of Steve Jobs
Guy Kawasaki
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
Denim Group
 
The Future of eLearning
The Future of eLearningThe Future of eLearning
The Future of eLearning
Mindgrub Technologies
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power ManagementNilay Mishra
 
Analysis on Tizen Operating System
Analysis on Tizen Operating SystemAnalysis on Tizen Operating System
Analysis on Tizen Operating System
Riri Kusumarani
 
Rance
RanceRance

What's hot (19)

facebookl
facebooklfacebookl
facebookl
 
AMI - Bringing Your Own Device to ITAM
AMI - Bringing Your Own Device to ITAMAMI - Bringing Your Own Device to ITAM
AMI - Bringing Your Own Device to ITAM
 
PIXEOM
PIXEOMPIXEOM
PIXEOM
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...
Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...
Microsoft's Acquisition of Nokia's Phone Business marks "the failure of both ...
 
Microsoft nokia acquisition
Microsoft nokia acquisitionMicrosoft nokia acquisition
Microsoft nokia acquisition
 
Pixeom
PixeomPixeom
Pixeom
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
A case study On Microsoft
A case study On MicrosoftA case study On Microsoft
A case study On Microsoft
 
Samsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOXSamsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOX
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...
BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...
BP303 Empowering ICS Communities for SocialBizUG with IBM Connections - IBM C...
 
Lessons of Steve Jobs
Lessons of Steve JobsLessons of Steve Jobs
Lessons of Steve Jobs
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
ZSS03120USEN.PDF
ZSS03120USEN.PDFZSS03120USEN.PDF
ZSS03120USEN.PDF
 
The Future of eLearning
The Future of eLearningThe Future of eLearning
The Future of eLearning
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
 
Analysis on Tizen Operating System
Analysis on Tizen Operating SystemAnalysis on Tizen Operating System
Analysis on Tizen Operating System
 
Rance
RanceRance
Rance
 

Viewers also liked

Meva biografia angles xavicid
Meva biografia angles xavicidMeva biografia angles xavicid
Meva biografia angles xavicid
xavi1090
 
SobiPro - More than a business directory extension
SobiPro - More than a business directory extensionSobiPro - More than a business directory extension
SobiPro - More than a business directory extension
Peter Bui
 
Review of work in progress October 2012 Part 2
Review of work in progress   October 2012 Part 2Review of work in progress   October 2012 Part 2
Review of work in progress October 2012 Part 2
Peter Missen
 
Samplerightlgiht
SamplerightlgihtSamplerightlgiht
Samplerightlgihtadambcarney
 
kan resume
kan resumekan resume
kan resumeKan Mani
 
Joomla World Conference 2013 - Joomla Ignite Presentation
Joomla World Conference 2013 - Joomla Ignite PresentationJoomla World Conference 2013 - Joomla Ignite Presentation
Joomla World Conference 2013 - Joomla Ignite Presentation
Peter Bui
 
Review of work in progress March 2012 - Part 3
Review of work in progress   March 2012 - Part 3Review of work in progress   March 2012 - Part 3
Review of work in progress March 2012 - Part 3
Peter Missen
 
Pro Lingua Expert
Pro Lingua ExpertPro Lingua Expert
Pro Lingua Expert
Oana Munteanu
 
Review of work in progress March 2012 - Part 1
Review of work in progress   March 2012 - Part 1Review of work in progress   March 2012 - Part 1
Review of work in progress March 2012 - Part 1
Peter Missen
 
Dinamikakelompokprajab3
Dinamikakelompokprajab3Dinamikakelompokprajab3
Dinamikakelompokprajab3
acep bambang
 
Portugalequestre catalogo 2011
Portugalequestre catalogo 2011Portugalequestre catalogo 2011
Portugalequestre catalogo 2011hitogomes
 
Complan introduceert Greeen
Complan introduceert GreeenComplan introduceert Greeen
Complan introduceert Greeen
kimsarucco
 
Denuncia M Rosa Acal-4-b
Denuncia M Rosa Acal-4-bDenuncia M Rosa Acal-4-b
Denuncia M Rosa Acal-4-bgalofix
 
Краткое руководство по обучению пользователей веб-приложений
Краткое руководство по обучению пользователей веб-приложенийКраткое руководство по обучению пользователей веб-приложений
Краткое руководство по обучению пользователей веб-приложений
Oleg Goncharenko
 

Viewers also liked (16)

Meva biografia angles xavicid
Meva biografia angles xavicidMeva biografia angles xavicid
Meva biografia angles xavicid
 
SobiPro - More than a business directory extension
SobiPro - More than a business directory extensionSobiPro - More than a business directory extension
SobiPro - More than a business directory extension
 
Review of work in progress October 2012 Part 2
Review of work in progress   October 2012 Part 2Review of work in progress   October 2012 Part 2
Review of work in progress October 2012 Part 2
 
Samplerightlgiht
SamplerightlgihtSamplerightlgiht
Samplerightlgiht
 
kan resume
kan resumekan resume
kan resume
 
Joomla World Conference 2013 - Joomla Ignite Presentation
Joomla World Conference 2013 - Joomla Ignite PresentationJoomla World Conference 2013 - Joomla Ignite Presentation
Joomla World Conference 2013 - Joomla Ignite Presentation
 
Review of work in progress March 2012 - Part 3
Review of work in progress   March 2012 - Part 3Review of work in progress   March 2012 - Part 3
Review of work in progress March 2012 - Part 3
 
Pro Lingua Expert
Pro Lingua ExpertPro Lingua Expert
Pro Lingua Expert
 
Review of work in progress March 2012 - Part 1
Review of work in progress   March 2012 - Part 1Review of work in progress   March 2012 - Part 1
Review of work in progress March 2012 - Part 1
 
Dinamikakelompokprajab3
Dinamikakelompokprajab3Dinamikakelompokprajab3
Dinamikakelompokprajab3
 
Hintarea
HintareaHintarea
Hintarea
 
Portugalequestre catalogo 2011
Portugalequestre catalogo 2011Portugalequestre catalogo 2011
Portugalequestre catalogo 2011
 
Complan introduceert Greeen
Complan introduceert GreeenComplan introduceert Greeen
Complan introduceert Greeen
 
Denuncia M Rosa Acal-4-b
Denuncia M Rosa Acal-4-bDenuncia M Rosa Acal-4-b
Denuncia M Rosa Acal-4-b
 
Heal from within
Heal from withinHeal from within
Heal from within
 
Краткое руководство по обучению пользователей веб-приложений
Краткое руководство по обучению пользователей веб-приложенийКраткое руководство по обучению пользователей веб-приложений
Краткое руководство по обучению пользователей веб-приложений
 

Similar to Technology update

Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2lunarfall
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
DivyaKS12
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Samit Kumar Kapat
 
Report
ReportReport
Report
Vrishab Ml
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
Abbadabbajabba1
 
Basic android-ppt
Basic android-pptBasic android-ppt
Basic android-ppt
Srijib Roy
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting systemAj Maurya
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
Aj Maurya
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
Chris Pepin
 
Javanowandfuture Chihuahua
Javanowandfuture ChihuahuaJavanowandfuture Chihuahua
Javanowandfuture Chihuahua
SiliconExpert Technologies
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
Sana Nasar
 
Jisc RSC Eastern Technical Managers forum oct 2013 'Microsoft Windows 8'
Jisc RSC Eastern Technical Managers forum oct 2013  'Microsoft Windows 8'Jisc RSC Eastern Technical Managers forum oct 2013  'Microsoft Windows 8'
Jisc RSC Eastern Technical Managers forum oct 2013 'Microsoft Windows 8'
JISC RSC Eastern
 
CloudBerry
CloudBerryCloudBerry
CloudBerry
Susmitha M
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
Nextbrain
 
ICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdfICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdf
CastilloLanz
 
Up in the clouds sdd 2012
Up in the clouds sdd 2012Up in the clouds sdd 2012
Up in the clouds sdd 2012
Andrea Ginsky
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 

Similar to Technology update (20)

Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2
 
POWERPOINT2
POWERPOINT2POWERPOINT2
POWERPOINT2
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Report
ReportReport
Report
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
 
Basic android-ppt
Basic android-pptBasic android-ppt
Basic android-ppt
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Javanowandfuture Chihuahua
Javanowandfuture ChihuahuaJavanowandfuture Chihuahua
Javanowandfuture Chihuahua
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Jisc RSC Eastern Technical Managers forum oct 2013 'Microsoft Windows 8'
Jisc RSC Eastern Technical Managers forum oct 2013  'Microsoft Windows 8'Jisc RSC Eastern Technical Managers forum oct 2013  'Microsoft Windows 8'
Jisc RSC Eastern Technical Managers forum oct 2013 'Microsoft Windows 8'
 
CloudBerry
CloudBerryCloudBerry
CloudBerry
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
 
ICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdfICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdf
 
Up in the clouds sdd 2012
Up in the clouds sdd 2012Up in the clouds sdd 2012
Up in the clouds sdd 2012
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Mobile Computing By Naveen
Mobile Computing By NaveenMobile Computing By Naveen
Mobile Computing By Naveen
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Technology update

  • 1. Technology update Presented by James Sturgess – Owner/ Director Sturgclan Consulting 16/06/2011 James@sturgclan.co.uk 0800 058 8929
  • 2. Contents 1. Introduction 2. Changing perceptions 3. Internet Presence 4. Hardware/software 1. PC vs.. Mac 2. Android vs. IOS 3. Battle of the browsers 5. Security 6. Conclusion
  • 3. Introduction  Thanks for having me  Today's talk – Technology update – I want to keep you abreast of the ever changing world of technology.  There a a few sections, however as the technology itself you will see that everything is starting to link together.  Cloud services have become a big player in the business world with SAAS (software as a service) becoming the new internet in many sectors.  As a result virtualisation has saved many businesses, large and small, time and money as well as increasing productivity due to less downtime and tighter controls.  Advancements in hardware mean more and more power hungry applications can run at higher speeds offering previously unheard of performance to suit all budgets.
  • 4. Changing perceptions Facts  Internet usage has almost doubled over the last 6 years March 2005, 13.9% of world population (about 888 million) used the internet, in March 2011 this has increased to 30% (2,072 million).  In 2010 every single day around 294 billion emails were sent, that’s about 107 trillion over however over 80% of these were Spam 
  • 5. Changing perceptions Interesting stats but what does that mean for business? An effective online presence is vital. People know what they want and are more savvy. E-commerce was like the proverbial talking dog. It wasn’t about how well the dog could talk, it was amazing that the dog could talk at all. Quote from <http://venturebeat.com/2010/12/03/5-top-trends-in-consumer-based-internet- businesses-for-2011/>
  • 6. Internet presence What is an Internet presence? How much Management does it require? Do you know where you rank? Do you have more than your website? Is your site compliant to W3C standards? Where else are you listed?
  • 7. Hardware/software Hardware Hardware is evolving faster than ever at present. • Processors have traded speed per unit advancements for multiprocessing (eg. Dual core/quad core, and now hex-core) • Solid state hard drives are starting to become a viable option, offering faster read speeds. • Mobile phones now have at least as much function as a computer, often allowing greater flexibility due to their portable nature • Cloud and virtualisation has meant that costs have come down for your end users, allowing no more than a dumb terminal with limited resources to run all the functions you require from a central server.
  • 8. Hardware/software Software •Windows 7 has meant that even lower spec devices such as net books can offer outstanding performance. •HTML5 is finally incorporating all of the elements such as video, audio and images into the main markup without having to use memory hungry 3rd party code (eg. JavaScript, Flash, PHP) •“The cloud” has allowed users to collaborate on projects like never from before, everyone from musicians, scientists, sales people to accountants can all work more efficiently.
  • 9. PC vs Mac  For a long time, the PC has been the least secure option.  This meant that a number of users switched to Apple, allowing more interoperability with the infamous I-phone.  The focus of the cyber-criminals has now shifted to Apple technology.  Modern PC security is thorough and requires little management.  PC’s are much more flexible as Apple use a closed garden approach  The majority of software and hardware manufacturers still focus mainly on the PC market  Windows 7 dominates the operating system market, with the 64 bit version many designers are also switching their allegiances.
  • 10. Android vs IOS Android IOS • Android is a totally open source platform • I-phone is the most successful offering developers and manufacturers freedom. handheld device in history. • Android is used a number of high end Having an almost cult devices, but will happily run on low end phones as well following. • Android is open-source allowing • IOS is used only on Apple developers to create whatever their imagination allows. products, you cannot change • This in turn makes Android more the OS even if you want to. susceptible to security attacks, however there is adequate free software for • Apple control the content protection. available • Every part of the Android UI is editable • Android is the best solution for 3rd party • The I-phone is very secure, but applications using cloud technology is limited in its capabilities • You cannot change the UI on an I-phone.
  • 11. Security As a Windows user, today As a Mac user, you can no you need look no further longer rely on the built in than Microsoft for all of software, choosing which your security needs. For package is a minefield. any business with up to Interestingly more and 10 networked PC’s more users are installing Microsoft Security windows on their Mac with Essentials is free of their Bootcamp partition, charge and offers they can then download unrivalled protection. MSE and an additional driver to scan the Mac partition.
  • 12. Security • The cloud used to be a great security concern – rather than having to get into each individual host machine, all a cyber- criminal would need to do is access the server. They could do this by logging into any of the host machines, meaning the security of the whole network depended on each individual user, now the protection is loaded directly into the cloud, protecting both internal and external attacks.