SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
Principales conclusions

■ Les tendances de l'informatique client ont changé le marché d'une focalisation
sur les ordinateurs personnels à une perspective plus large qui comprend
smartphones, les tablettes et d’autres appareils grand public.

■ Les services émergents du Cloud relient par le réseau des différents appareils
que les utilisateurs choisissent à différents moments de leur vie quotidienne.

■ L'ère du Cloud personnel marquera un changement de point d’équilibre des
appareils vers les services.

■ Les applications et les appareils deviennent plus simples à utiliser en premier
abord par les utilisateurs. Toute les interfaces avec une courbe d'apprentissage
forte resteront réservées aux experts et ne seront que difficilement acceptés
massivement.




                                                                                    1
Dans la plupart des secteurs les organisations sont confrontées à des ruptures venant de
technologies émergentes, de l'environnement politique et légal, de modèles économiques
nouveaux ou encore de changements sociaux et culturels. La prospective stratégique et la
veille stratégique essaient d'identifier, d'anticiper et de gérer ces ruptures ainsi que de se
préparer à agir dans ce futur incertain.

Nous fournissons des ateliers, des présentations, des rapports et des méthodes permettant de
mieux cerner l'impact des changements de technologie et de société. Citons comme exemple le
domaine du e-Gouvernement avec des éléments tels que le Référentiel e-Société ou le rapport
Administration Demain.

Nous sommes aussi acteurs dans la stratégie des SI de l'État de Genève pour y apporter une
aide active dans la rédaction et l'animation, ainsi que des valeurs centrales comme: la technologie
au service de la société, l'ouverture vers les citoyens et les entreprises, l'information comme
ressource stratégique et la maîtrise des systèmes d'information. L'objectif étant bien entendu de
pouvoir tendre vers un écosystème d'information ouvert qui soit flexible, efficace et résilient.

Concepts clé:
•Veille sociétale et technologique
•Prospective stratégique
•Conseil stratégique à l'État de Genève au niveau des technologies, des métiers de
l'administration publique et du changement de société
•Partenariat actif avec des organisations internes, para-étatiques externes et internationales
•Journée de rencontre: Réseaux de personnes et d'objets, Villes numériques, Données publiques
ouvertes, Innovation dans le service public, Confiance à l'ère du numérique, etc.




                                                                                                      2
3
L'évolution de l'informatique et des systèmes d'information se relit à travers des
grandes époques relativement rapides d'environ 10 ans. Les systèmes de chaque
époque connaissent de acteurs dominants qui innovent et provoquent généralement
le basculement vers un nouveau paradigme. Les nouvelles technologies ne balayent
pas de façon drastique celles préexistantes, mais celles-ci se stratifient. Ces
nouvelles technologies sont souvent en rupture par rapport aux précédentes et les
sous-tendent aussi parfois.




                                                                                     4
5
6
7
Les géants deviennent minuscules.


Suspects: microprocesseur, ordinateur quantique.
Disque dur, Processeur, Mémoire (Gordon Moore)


Les grand ordinateurs mastodontes nés au milieu du 20e siècle on vu leur taille
se réduire jusqu'à devenir invisibles à l'œil humain tandis que leurs
performances, leur mémoire, leur vitesse ne cessaient de croître de manière
exponentielle.


UNIVAC (1952) – 13 tons – 5200 Vaccuum tubes – 1000 word of 12 characters –
2000 operations per second 2.25 MHz clock


IBM PC XT (1983) 128 KB Mem – 360 KB Floppy disk 5 ¼ in – 10 MB Hard disk
– Intel 8088 4.77 Mhz (8087 math co-proc)


FXI Cotton Candy (2012) – Packed inside its tiny little frame is a 1GHz ARM
Cortex-A9 processor built by Samsung, along with an ARM Mali-400 GPU. It also
packs HDMI-out, WiFi and a Micro USB port— and comes with Android or
Ubuntu pre-loaded as the OS. It also handles MPEG-4 and H.264 video formats,
so you could plug it into a TV and use it as a rudimentary media PC.




                                                                                  8
L'ordinateur se dérobe.


Suspect: informatique ubiquitaire.


Design (Steve Jobs)


Peu à peu l'ordinateur se cache. Devenu esthétique grâce au soin apporté à son
design, il se fond dans le décor. Il se dissimule dans les objets de tous les jours
et dans l'environnement domestique. Il devient calculatrice, machine à écrire,
téléphone portable, télévision.


Exemples: Roomba iRobot, Nabaztag, Nabaztag/tag, Karotz




                                                                                      9
L'informatique n'est plus qu'un souvenir.


Oubli: Réalité augmentée, GPS, Immersion


Les progrès en informatique graphique ont ouvert la voie à d'autres dimensions
plongeant l'utilisateur dans des mondes imaginaire et symboliques. Aujourd'hui
les techniques de communication mettent en relation quasi physique les
correspondants éloignés faisant oublier comment s'opère ce miracle. Le mélange
entre réalité et éléments fictifs achève de brouiller les pistes.


Suspects: réalité virtuelle et réalité augmentée.


Exemples: Layar, Tango, SixthSense, WordLens, Google Earth, ConditionONE




                                                                                 10
L'informatique se dématérialise.


Internet, Web, Cloud (Vint Cerf, Tim Berners Lee) – l’informatique se
dématérialise.


Les premiers ordinateurs ont été reliés à des terminaux, eux-mêmes bientôt
remplacés par des micro-ordinateurs. Ces derniers ont été connectés entre eux
par des réseaux, puis par des réseaux de réseaux. Tel un morceau de sucre qui
se dissout dans une tasse de thé, l'ordinateur se dématérialise dans un nuage
informatique.


Suspect: Internet.


Exemples: Computer lab 1960, 1970, 1980, 1990, 2000, 2010




                                                                                11
L'ordinateur se prend pour l'homme.


Principaux suspects: intelligence artificielle, hybridation homme machine.


Intuitivité, Simplicité, Interface, Intelligence artificielle (Joseph Weizenbaum –>
Judea Pearl)


L'homme commence par dialoguer avec l'ordinateur par le biais de langages de
plus en plus évolués. Plus tard la machine reconnaît sa voix et la synthétise. Puis
elle interagit avec l'homme par l'intermédiaire d'interfaces et accroît ses
perceptions par le biais d'implants. Désormais elle rivalise avec l'intelligence
humaine.


Exemples: Doug Engelbart (1968), Xerox Alto (1973), Deep Blue v Kasparov
(1997), IBM Watson (2011) , Asimo (2000), Microsoft Clippy (1998), Wolfram
Alpha (2009), Apple Siri (2011)




                                                                                      12
15
16
IBM a annoncé Blue Cloud, un service basé sur Linux, Hadoop, Xen et PowerVM. RightScale
et 3Tera offrent des outils d'administration pour gérer facilement des machines basées dans
des centres de calculs différents; opsource offre également un service similaire.
Google App Engine a été présenté en avril 2008 et permet à des applications web en Python
d'être déployées sur l'infrastructure de Google.
Microsoft a annoncé récemment Windows Azure et Azure Services Platform, une offre
similaire d'infrastructure de Cloud Computing.
Rackspace propose aussi une plateforme de Cloud computing sous la marque Mosso, qui
inclut Cloud Sites, Cloud Files et Cloud Servers tandis que ServePath fait de même sous la
marque GoGrid.
Des compagnies comme RightScale fournissent un interface pour gérer et accéder plus
simplement la plateforme de Cloud Computing de Amazon Web Services.


Five Refining Attributes of Public and Private Cloud Computing, Gartner, ID:G00167182, 5
May 2009. http://www.gartner.com/it/page.jsp?id=1035013

The NIST Definition of Cloud Computing, Recommendations of the National Institute
of Standards and Technology, Peter Mell, Timothy Grance, Special Publication (800-145),
September 2011. http://csrc.nist.gov/publications/PubsSPs.html#800-145


Stratégie Cloud Computing des autorités suisses, Version pour consultation, USIC, 14
novembre 2011. http://www.isb.admin.ch/themen/strategien/00071/01452/index.html?lang=fr



                                                                                              17
D’après le National Institute of Standards and Technology (NIST) les caractéristiques
principales de ce type de service sont qu’il est (1) à la demande, (2) accessible depuis le
réseau, (3) concentrateur de ressources, (4) grandement élastique, (5) offre un service
mesuré. Dans ce contexte, trois types des services sont proposés (1) Software as a Service
(SaaS), (2) Platform as a Service (PaaS) et (3) Infrastructure as a Service (IaaS). Les
modèles de déploiement peuvent être publics, privés, réservés à une communauté ou
hybrides. Voir le site NIST Cloud Computing http://csrc.nist.gov/groups/SNS/cloud-
computing/index.html


Plusieurs solutions sont offertes par les fournisseurs comme Google, Amazon, IBM ou
Microsoft, mais certaines solutions open source permettent aussi d’expérimenter l’usage de
Clouds privés comme par exemple Eucalyptus utilisé notamment par la NASA sur Nebula.
D’autres offres sont certainement en préparation dans ce domaine.


http://open.eucalyptus.com/wiki/Documentation
http://nebula.nasa.gov/about/


Le sujet du Cloud Computing est largement couvert par les médias, les fournisseurs et les
consultances et se trouve au sommet des attentes exagérées d’après Gartner. Toutefois
l’avancement de cette technologie semble rapide car sa phase de maturité sera atteinte dans
2 à 5 ans.




                                                                                              18
19
20
The Mobility Shift — Wherever and Whenever You Want


The march of computing and communications over time has been governed by a series of so-called laws.
Moore's Law and Metcalfe's Law have led to the mobile environment we have today. One important result
has been the race to ever smaller, more portable and power-efficient electronic devices. What filled a
desktop a decade ago now fits in your pocket — only with much more capability. This plays on another
truism — people like to move around. Users don't want technology dictating where and when they can
access information, talk to someone or play a game. They want it whenever and wherever they happen to
be.


The reality is that many of the traditional form factors for computing simply do not lend themselves to these
kinds of computing needs. In the past, we made excuses about tradeoffs in processing power or weight, but
today mobile devices combined with the cloud can fulfill most computing tasks, and any tradeoffs are
outweighed in the minds of the user by the convenience and flexibility provided by the mobile devices.
One area where smaller has not always been better has been in user interaction.


Small devices mean small buttons and difficult-to-use interfaces. While keyboards and mice have been
essential to bringing computing to the masses, they now serve to hold back computing by tying us to our
desks. However, the emergence of more natural user interface experiences is making mobility practical.
Touch- and gesture-based user experiences, coupled with speech and contextual awareness, are enabling
rich interaction with devices and a much greater level of freedom. The addition of sensors is making the
devices richer platforms for applications, and is enabling locationspecific or context-specific operation.


While mobile devices aren't killing the PC, they are shifting the focus for developers and users. Mobility
raises new concerns about security.


While, technically, "companion" is a great term for these newer devices, the term has been imbued with a
connation that the devices "need" the PC to be truly useful. This is certainly not the case at all. These
systems are fully useful on their own. They do not require using a PC to sync with user data (stored in the
cloud) or complete any transaction. These devices are full peers. At any point in time, and depending on the
scenario, any given device will take on the role of the user's primary device — the one at the center of the
user's constellation of devices.


                                                                                                                21
22
23
24
25
26
"App-ification" — From Applications to Apps


The Apple App Store was the first app distribution service which set the standard and continues to do so for the other
app distribution services, it opened on July 10, 2008, and as of January 2011, reported over 10 billion downloads. Until
June 6, 2011, there are 425,000 third-party apps available, which are downloaded by 200 million iOS users. During
Apple's 2012 Worldwide Developer's Conference, Apple CEO Tim Cook announced that the App Store has 650,000
available apps to download as well as "an astounding 30 billion apps" downloaded from the app store until that date.


The ultimate goal of all IT is to deliver some service or application to a user. Users run applications, not operating
systems or even devices — those are just a means to an end. When the way that applications are designed, delivered
and consumed by users changes, it has a dramatic impact on all other aspects of the market. There is an application
metamorphosis under way:


■ Changing packaging — Bite-sized, narrowly focused chunks rather than large, all encompassing systems. We will
always need big applications for certain things, but increasingly small, cost-effective targeted applets will cover many
users' needs and provide more flexibility.
■ Changing price model — Users have come to expect software at much lower prices, even free. App stores have
become the equivalent of the dollar store, offering low-cost goods of acceptable quality to those who just need to get a
task done.
■ Changing delivery models — Today, the vast majority of user-facing application development is Web based.
Microsoft's new Metro-style applications for Windows 8 will be Web based and
will use HTML5, JavaScript and CSS. Even when applications are not totally Web-based, they often leverage these
cross-platform tools to provide a wider audience.


These changes will have a profound impact on how applications are written and managed in corporate environments.
They also raise the prospect of greater cross-platform portability as small user experience (UX) apps are used to adjust a
server- or cloud-resident application to the unique characteristics of a specific device or scenario. One application can
now be exposed in multiple ways and used in varying situations by the user.


On the downside, there is the real possibility of incompatibility between tools as various users select different apps to do
similar functions and discover they can't effectively share data. Of course, there is also the ever-present specter of
security issues as applications move and store corporate data in potentially unknown locations hosted by organizations
of unknown stability or means. Companies will have to get ahead of these issues or spend the next decade unraveling
the problems that will crop up.




                                                                                                                               28
29
30
31
32
33
34
Eric Schmidt (PDG Google): "Every 2 Days We Create As Much Information As
We Did Up To 2003"




                                                                            35
36
37
38
39
Consumerization — You Ain't Seen Nothing Yet

■ Users are more technologically savvy and have very different expectations of technology. Users may not
understand the details of how technology works, but they certainly understand what technology can do.

■ Internet and social media have empowered and emboldened users. Today, consumers provide instant
feedback on what they like to anyone who happens to be listening. They no longer rely on just a small group
of specialist intermediaries to tell them what and how things are, but rather can chose their own unique set
of information channels.

■ The rise of powerful, affordable mobile devices changes the equation for users. They now have the
technology in their hands — devices that are truly portable and powerful enough to do real work. However,
to appeal to the consumerist masses and get the kind of broad adoption they need, vendors have been
forced to simplify how these devices work.

■ Users have become innovators. New devices and applications have become the basic building blocks of
a new wave of innovation. Users are familiar with discovering a new gadget and turning it into a tool —
sometimes playful, sometimes useful. Corporate data is making its way onto devices and into applications
dictated by users, and there may be no way to stop it. Consumerization is leading to a whole new wave of
unexpected consequences.

■ The democratization of technology, as users of all types and status within organizations can now have
similar technology available to them. Organizations that today rely on high-end concierge services for senior
executives are being forced to expand those services to all users and, therefore, must rethink how to
support this managed diversity.

Not all aspects of consumerization are positive when viewed through a corporate lens. Users aren't very
good at dealing with the details of keeping technology working and secure. They are easily frustrated when
something breaks or is difficult to use, and they don't like when something they want to use doesn't live up to
their expectations. Consumers are also easily swayed by style and fads, rather than function, and this can
lead to disappointment. What's hot today may be forgotten tomorrow. While this may be fine for individuals,
this could prove devastatingly expensive for enterprises. Furthermore, it reinforces a culture in which
manufacturers are more interested in selling the next device than supporting the last one, resulting in a
continual churn of features and capabilities. This makes it tough for IT planners to build around specific
devices with any level of confidence. Further, supporting and optimizing around the churn adds cost and
complexity to nearly every IT function.




                                                                                                                  40
This new personal cloud supports the characteristics demanded by users, such as:
■ Being highly mobile.
■ Being always available.
■ Being user directed — the user is in control of what he or she uses, how he or she uses it, and what he or
she shares with others.
■ Embracing multiple experiences and device classes — the device becomes secondary to the service:
                   ■ The user can switch between devices based on situation and need.
                   ■ No device can be considered essential all the time.
■ Providing rich interactions and content.
■ Providing a seamless shift between computing and communicating.
■ Supporting both private and public clouds, thus providing resources when a user needs it, not when IT
can get around to delivering it. The personal cloud will be a federated blending of different services and
cloud offerings, presented to the user as a single environment.
■ Providing contextual awareness to deliver the services and content to users that are appropriate to their
situation or immediate needs, rather than overwhelming them.
■ Providing operationally obvious computing — no training required:
                   ■ Well-designed, straightforward UXs are respected and craved by users.
                   ■ Simple, task-focused, bite-sized applets.
                  ■ The learning curve is dead. If it takes training, it will be relegated to the specialists and
not be broadly adopted.




                                                                                                                    41
Recommendations for Enterprises
Faced with these major changes, enterprises must take the following steps to ensure they are not caught
off-guard as user expectations and demands shift:

■ Stop building for physical environments — Select techniques and designs that will support multiple
operating environments. This includes developing expertise with desktop virtualization technologies, but
extends to application design and operations. Ensure that user-focused operations embrace the concept of
managed diversity (see "Use Managed Diversity to Support the Growing Variety of Endpoint Devices").

■ Get ahead of the curve on "bring your own devices" (BYODs) — Users will increasingly be using devices
not provided by the enterprise to assist them in their daily work. Catching up to and, ultimately, getting
ahead of the users in this area is critical if IT is to provide any leadership in the user area. Companies need
to establish a BYOD program, including policies and processes (see "Gartner's View on 'Bring Your Own' in
Client Computing").

■ Embrace a self-service culture for users — Where possible, enable users to make their own decisions
about technology in order to gain a higher level of self-sufficiency without the need for unnecessary hand-
holding by IT personnel. Where it isn't possible, work to make it possible. While the IT organization will
always play a role in directing users, providing them guidance and assistance with technology decisions,
users are increasingly capable of dealing with many dayto-day needs on their own.

■ Look for ways to abstract and secure applications and data, not devices (see "How Will Users Access the
PC Apps They Need on Their Alternative Devices?").

■ Move corporate resources to a secure cloud — A move to a secure corporate cloud (either internally
managed or leveraging public cloud services) makes applications and services available to users across the
organization and from multiple locations and devices. This doesn't mean a free-for-all approach to corporate
data or services. Restrictions will always be necessary for certain types of sensitive data. For example,
access to customer credit card or patient data must be tightly controlled.

■ Adopt browser-based applications with local assistance — the "app" model. While not every app lends
itself to decomposition into smaller chunks or delivery through the browser, companies need to get away
from device-dependent, locally-installed applications. At the same time, companies should look for new
delivery techniques to ease the burden of administration (for example, moving away from application
installation by using App-V or other techniques to eliminate the need to store or manage devices).




                                                                                                                  42

Weitere ähnliche Inhalte

Was ist angesagt?

Itm ppt daniel-prefinal ii
Itm ppt daniel-prefinal iiItm ppt daniel-prefinal ii
Itm ppt daniel-prefinal iixtina87_05
 
Virtual worlds, So what?
Virtual worlds, So what?Virtual worlds, So what?
Virtual worlds, So what?Atman Patel
 
Itm ppt daniel-prefinal ii
Itm ppt daniel-prefinal iiItm ppt daniel-prefinal ii
Itm ppt daniel-prefinal iixtina87_05
 
Quest 2 and the future of metaverse v2.0 210908
Quest 2 and the future of metaverse v2.0  210908Quest 2 and the future of metaverse v2.0  210908
Quest 2 and the future of metaverse v2.0 210908Michael Lesniak
 
Designing for an internet of things
Designing for an internet of thingsDesigning for an internet of things
Designing for an internet of thingsTimo Arnall
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudsallysogeti
 
Viewpoints Cloud Computing
Viewpoints Cloud ComputingViewpoints Cloud Computing
Viewpoints Cloud Computinglaurenfortune
 
Nmc 2007 Publish
Nmc 2007 PublishNmc 2007 Publish
Nmc 2007 Publishurauch
 
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed Brill
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed BrillAusLUG - Australian Lotus User Group - "Social Business at Work" by Ed Brill
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed BrillEd Brill
 
Fjord@ The Future of Broadcasting
Fjord@ The Future of BroadcastingFjord@ The Future of Broadcasting
Fjord@ The Future of BroadcastingFjord
 
Metaverses lifelong learning in a changing world
Metaverses lifelong learning in a changing worldMetaverses lifelong learning in a changing world
Metaverses lifelong learning in a changing worldBaltasar Fernández-Manjón
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 

Was ist angesagt? (13)

Itm ppt daniel-prefinal ii
Itm ppt daniel-prefinal iiItm ppt daniel-prefinal ii
Itm ppt daniel-prefinal ii
 
Virtual worlds, So what?
Virtual worlds, So what?Virtual worlds, So what?
Virtual worlds, So what?
 
Itm ppt daniel-prefinal ii
Itm ppt daniel-prefinal iiItm ppt daniel-prefinal ii
Itm ppt daniel-prefinal ii
 
Quest 2 and the future of metaverse v2.0 210908
Quest 2 and the future of metaverse v2.0  210908Quest 2 and the future of metaverse v2.0  210908
Quest 2 and the future of metaverse v2.0 210908
 
Designing for an internet of things
Designing for an internet of thingsDesigning for an internet of things
Designing for an internet of things
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
Viewpoints Cloud Computing
Viewpoints Cloud ComputingViewpoints Cloud Computing
Viewpoints Cloud Computing
 
Nmc 2007 Publish
Nmc 2007 PublishNmc 2007 Publish
Nmc 2007 Publish
 
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed Brill
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed BrillAusLUG - Australian Lotus User Group - "Social Business at Work" by Ed Brill
AusLUG - Australian Lotus User Group - "Social Business at Work" by Ed Brill
 
Fjord@ The Future of Broadcasting
Fjord@ The Future of BroadcastingFjord@ The Future of Broadcasting
Fjord@ The Future of Broadcasting
 
Metaverses lifelong learning in a changing world
Metaverses lifelong learning in a changing worldMetaverses lifelong learning in a changing world
Metaverses lifelong learning in a changing world
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 

Andere mochten auch

Innovation dans le secteur public
Innovation dans le secteur publicInnovation dans le secteur public
Innovation dans le secteur publicGiorgio Pauletto
 
Government and the citizen: from information to transformation
Government and the citizen: from information to transformationGovernment and the citizen: from information to transformation
Government and the citizen: from information to transformationGiorgio Pauletto
 
Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2
Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2
Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2Valtech
 
Giorgio_Pauletto_Gamification
Giorgio_Pauletto_GamificationGiorgio_Pauletto_Gamification
Giorgio_Pauletto_GamificationGiorgio Pauletto
 
Tendances IT et eAdministration
Tendances IT et eAdministrationTendances IT et eAdministration
Tendances IT et eAdministrationGiorgio Pauletto
 
Giorgio_Pauletto_Leading_for_Creativity
Giorgio_Pauletto_Leading_for_CreativityGiorgio_Pauletto_Leading_for_Creativity
Giorgio_Pauletto_Leading_for_CreativityGiorgio Pauletto
 
Giorgio_Pauletto_Design_Thinking_Action_Lab
Giorgio_Pauletto_Design_Thinking_Action_LabGiorgio_Pauletto_Design_Thinking_Action_Lab
Giorgio_Pauletto_Design_Thinking_Action_LabGiorgio Pauletto
 

Andere mochten auch (9)

Innovation dans le secteur public
Innovation dans le secteur publicInnovation dans le secteur public
Innovation dans le secteur public
 
Government and the citizen: from information to transformation
Government and the citizen: from information to transformationGovernment and the citizen: from information to transformation
Government and the citizen: from information to transformation
 
Green IT
Green ITGreen IT
Green IT
 
Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2
Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2
Valtech - Quel ROI pour ma transformation Agile ? PARTIE 2
 
Giorgio_Pauletto_Gamification
Giorgio_Pauletto_GamificationGiorgio_Pauletto_Gamification
Giorgio_Pauletto_Gamification
 
Tendances IT et eAdministration
Tendances IT et eAdministrationTendances IT et eAdministration
Tendances IT et eAdministration
 
attestation-futuribles
attestation-futuriblesattestation-futuribles
attestation-futuribles
 
Giorgio_Pauletto_Leading_for_Creativity
Giorgio_Pauletto_Leading_for_CreativityGiorgio_Pauletto_Leading_for_Creativity
Giorgio_Pauletto_Leading_for_Creativity
 
Giorgio_Pauletto_Design_Thinking_Action_Lab
Giorgio_Pauletto_Design_Thinking_Action_LabGiorgio_Pauletto_Design_Thinking_Action_Lab
Giorgio_Pauletto_Design_Thinking_Action_Lab
 

Ähnlich wie Le PC est mort. Vive le PC!

Coming Of Calm Technology
Coming Of Calm TechnologyComing Of Calm Technology
Coming Of Calm TechnologyChuka Okoye
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computingschroedinger
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computingclcewing
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computerVivek Kumar
 
Computing History Part2
Computing History Part2Computing History Part2
Computing History Part2Ritesh Nayak
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 
Disruptive enterprise communications technologies
Disruptive enterprise communications technologiesDisruptive enterprise communications technologies
Disruptive enterprise communications technologiesMartin Geddes
 
Tech Careers 101 - Empowering Your Tech Journey
Tech Careers 101 - Empowering Your Tech JourneyTech Careers 101 - Empowering Your Tech Journey
Tech Careers 101 - Empowering Your Tech JourneySFSupport
 
Decline Of Apple Essay
Decline Of Apple EssayDecline Of Apple Essay
Decline Of Apple EssayJamie Boyd
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Thrive in a New Economy
Thrive in a New EconomyThrive in a New Economy
Thrive in a New EconomyRupak Parajuli
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesStreym IT Solutions
 

Ähnlich wie Le PC est mort. Vive le PC! (20)

Coming Of Calm Technology
Coming Of Calm TechnologyComing Of Calm Technology
Coming Of Calm Technology
 
THE World WHITE
THE World WHITETHE World WHITE
THE World WHITE
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computing
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
 
Computing History Part2
Computing History Part2Computing History Part2
Computing History Part2
 
IT Trends – A Personal Perspective
IT Trends – A Personal PerspectiveIT Trends – A Personal Perspective
IT Trends – A Personal Perspective
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Disruptive enterprise communications technologies
Disruptive enterprise communications technologiesDisruptive enterprise communications technologies
Disruptive enterprise communications technologies
 
Tech Careers 101 - Empowering Your Tech Journey
Tech Careers 101 - Empowering Your Tech JourneyTech Careers 101 - Empowering Your Tech Journey
Tech Careers 101 - Empowering Your Tech Journey
 
Io t 22
Io t 22Io t 22
Io t 22
 
Decline Of Apple Essay
Decline Of Apple EssayDecline Of Apple Essay
Decline Of Apple Essay
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Thrive in a New Economy
Thrive in a New EconomyThrive in a New Economy
Thrive in a New Economy
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
IoT : Whats in it for me?
IoT : Whats in it for me? IoT : Whats in it for me?
IoT : Whats in it for me?
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing Services
 

Mehr von Giorgio Pauletto

IDEOU From Ideas To Action
IDEOU From Ideas To ActionIDEOU From Ideas To Action
IDEOU From Ideas To ActionGiorgio Pauletto
 
Giorgio Pauletto - Design Thinking - Unow
Giorgio Pauletto - Design Thinking - UnowGiorgio Pauletto - Design Thinking - Unow
Giorgio Pauletto - Design Thinking - UnowGiorgio Pauletto
 
Giorgio Pauletto - Innovation de rupture - MOOC Unow
Giorgio Pauletto - Innovation de rupture - MOOC UnowGiorgio Pauletto - Innovation de rupture - MOOC Unow
Giorgio Pauletto - Innovation de rupture - MOOC UnowGiorgio Pauletto
 
Giorgio Pauletto - Design Kit Facilitator's Guide
Giorgio Pauletto - Design Kit Facilitator's GuideGiorgio Pauletto - Design Kit Facilitator's Guide
Giorgio Pauletto - Design Kit Facilitator's GuideGiorgio Pauletto
 
Giorgio_Pauletto_A_Crash_Course_on_Creativity
Giorgio_Pauletto_A_Crash_Course_on_CreativityGiorgio_Pauletto_A_Crash_Course_on_Creativity
Giorgio_Pauletto_A_Crash_Course_on_CreativityGiorgio Pauletto
 
Giorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_Up
Giorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_UpGiorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_Up
Giorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_UpGiorgio Pauletto
 
Entreprise agile de demain 2013-11
Entreprise agile de demain 2013-11Entreprise agile de demain 2013-11
Entreprise agile de demain 2013-11Giorgio Pauletto
 
Tendances technolgiques, business et société - 10-2014
Tendances technolgiques, business et société - 10-2014Tendances technolgiques, business et société - 10-2014
Tendances technolgiques, business et société - 10-2014Giorgio Pauletto
 
Tendances technolgiques, business et société - 04-2015
Tendances technolgiques, business et société - 04-2015Tendances technolgiques, business et société - 04-2015
Tendances technolgiques, business et société - 04-2015Giorgio Pauletto
 
Tendances futures dans la santé
Tendances futures dans la santéTendances futures dans la santé
Tendances futures dans la santéGiorgio Pauletto
 
4 tendances de 2014 qui vont refaire le monde
4 tendances de 2014 qui vont refaire le monde4 tendances de 2014 qui vont refaire le monde
4 tendances de 2014 qui vont refaire le mondeGiorgio Pauletto
 
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...Giorgio Pauletto
 
makeopendata.ch 30 & 31 mars Genève
makeopendata.ch 30 & 31 mars Genèvemakeopendata.ch 30 & 31 mars Genève
makeopendata.ch 30 & 31 mars GenèveGiorgio Pauletto
 
Génération Y et sécurité: quels risques, quelles opportunités?
Génération Y et sécurité: quels risques, quelles opportunités?Génération Y et sécurité: quels risques, quelles opportunités?
Génération Y et sécurité: quels risques, quelles opportunités?Giorgio Pauletto
 
Ouverture des données publiques: une tendance globale vers la transparence
Ouverture des données publiques: une tendance globale vers la transparenceOuverture des données publiques: une tendance globale vers la transparence
Ouverture des données publiques: une tendance globale vers la transparenceGiorgio Pauletto
 
Smart Gouvernance 2011-12-16
Smart Gouvernance 2011-12-16Smart Gouvernance 2011-12-16
Smart Gouvernance 2011-12-16Giorgio Pauletto
 
Introduction au Data Mining et Méthodes Statistiques
Introduction au Data Mining et Méthodes StatistiquesIntroduction au Data Mining et Méthodes Statistiques
Introduction au Data Mining et Méthodes StatistiquesGiorgio Pauletto
 
Administration et nouvelle économie
Administration et nouvelle économieAdministration et nouvelle économie
Administration et nouvelle économieGiorgio Pauletto
 

Mehr von Giorgio Pauletto (20)

IDEOU From Ideas To Action
IDEOU From Ideas To ActionIDEOU From Ideas To Action
IDEOU From Ideas To Action
 
Giorgio Pauletto - Design Thinking - Unow
Giorgio Pauletto - Design Thinking - UnowGiorgio Pauletto - Design Thinking - Unow
Giorgio Pauletto - Design Thinking - Unow
 
Giorgio Pauletto - Innovation de rupture - MOOC Unow
Giorgio Pauletto - Innovation de rupture - MOOC UnowGiorgio Pauletto - Innovation de rupture - MOOC Unow
Giorgio Pauletto - Innovation de rupture - MOOC Unow
 
Giorgio Pauletto - Design Kit Facilitator's Guide
Giorgio Pauletto - Design Kit Facilitator's GuideGiorgio Pauletto - Design Kit Facilitator's Guide
Giorgio Pauletto - Design Kit Facilitator's Guide
 
Giorgio_Pauletto_A_Crash_Course_on_Creativity
Giorgio_Pauletto_A_Crash_Course_on_CreativityGiorgio_Pauletto_A_Crash_Course_on_Creativity
Giorgio_Pauletto_A_Crash_Course_on_Creativity
 
t
tt
t
 
Giorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_Up
Giorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_UpGiorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_Up
Giorgio_Pauletto_Scaling_Up_Your_Venture_Without_Screwing_Up
 
Entreprise agile de demain 2013-11
Entreprise agile de demain 2013-11Entreprise agile de demain 2013-11
Entreprise agile de demain 2013-11
 
Tendances technolgiques, business et société - 10-2014
Tendances technolgiques, business et société - 10-2014Tendances technolgiques, business et société - 10-2014
Tendances technolgiques, business et société - 10-2014
 
Tendances technolgiques, business et société - 04-2015
Tendances technolgiques, business et société - 04-2015Tendances technolgiques, business et société - 04-2015
Tendances technolgiques, business et société - 04-2015
 
Tendances futures dans la santé
Tendances futures dans la santéTendances futures dans la santé
Tendances futures dans la santé
 
4 tendances de 2014 qui vont refaire le monde
4 tendances de 2014 qui vont refaire le monde4 tendances de 2014 qui vont refaire le monde
4 tendances de 2014 qui vont refaire le monde
 
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...
Comment les réseaux sociaux peuvent-ils favoriser la créativité et l'innovati...
 
makeopendata.ch 30 & 31 mars Genève
makeopendata.ch 30 & 31 mars Genèvemakeopendata.ch 30 & 31 mars Genève
makeopendata.ch 30 & 31 mars Genève
 
Génération Y et sécurité: quels risques, quelles opportunités?
Génération Y et sécurité: quels risques, quelles opportunités?Génération Y et sécurité: quels risques, quelles opportunités?
Génération Y et sécurité: quels risques, quelles opportunités?
 
Ouverture des données publiques: une tendance globale vers la transparence
Ouverture des données publiques: une tendance globale vers la transparenceOuverture des données publiques: une tendance globale vers la transparence
Ouverture des données publiques: une tendance globale vers la transparence
 
Smart Gouvernance 2011-12-16
Smart Gouvernance 2011-12-16Smart Gouvernance 2011-12-16
Smart Gouvernance 2011-12-16
 
Introduction au Data Mining et Méthodes Statistiques
Introduction au Data Mining et Méthodes StatistiquesIntroduction au Data Mining et Méthodes Statistiques
Introduction au Data Mining et Méthodes Statistiques
 
Administration et nouvelle économie
Administration et nouvelle économieAdministration et nouvelle économie
Administration et nouvelle économie
 
Administration Demain
Administration DemainAdministration Demain
Administration Demain
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Le PC est mort. Vive le PC!

  • 1. Principales conclusions ■ Les tendances de l'informatique client ont changé le marché d'une focalisation sur les ordinateurs personnels à une perspective plus large qui comprend smartphones, les tablettes et d’autres appareils grand public. ■ Les services émergents du Cloud relient par le réseau des différents appareils que les utilisateurs choisissent à différents moments de leur vie quotidienne. ■ L'ère du Cloud personnel marquera un changement de point d’équilibre des appareils vers les services. ■ Les applications et les appareils deviennent plus simples à utiliser en premier abord par les utilisateurs. Toute les interfaces avec une courbe d'apprentissage forte resteront réservées aux experts et ne seront que difficilement acceptés massivement. 1
  • 2. Dans la plupart des secteurs les organisations sont confrontées à des ruptures venant de technologies émergentes, de l'environnement politique et légal, de modèles économiques nouveaux ou encore de changements sociaux et culturels. La prospective stratégique et la veille stratégique essaient d'identifier, d'anticiper et de gérer ces ruptures ainsi que de se préparer à agir dans ce futur incertain. Nous fournissons des ateliers, des présentations, des rapports et des méthodes permettant de mieux cerner l'impact des changements de technologie et de société. Citons comme exemple le domaine du e-Gouvernement avec des éléments tels que le Référentiel e-Société ou le rapport Administration Demain. Nous sommes aussi acteurs dans la stratégie des SI de l'État de Genève pour y apporter une aide active dans la rédaction et l'animation, ainsi que des valeurs centrales comme: la technologie au service de la société, l'ouverture vers les citoyens et les entreprises, l'information comme ressource stratégique et la maîtrise des systèmes d'information. L'objectif étant bien entendu de pouvoir tendre vers un écosystème d'information ouvert qui soit flexible, efficace et résilient. Concepts clé: •Veille sociétale et technologique •Prospective stratégique •Conseil stratégique à l'État de Genève au niveau des technologies, des métiers de l'administration publique et du changement de société •Partenariat actif avec des organisations internes, para-étatiques externes et internationales •Journée de rencontre: Réseaux de personnes et d'objets, Villes numériques, Données publiques ouvertes, Innovation dans le service public, Confiance à l'ère du numérique, etc. 2
  • 3. 3
  • 4. L'évolution de l'informatique et des systèmes d'information se relit à travers des grandes époques relativement rapides d'environ 10 ans. Les systèmes de chaque époque connaissent de acteurs dominants qui innovent et provoquent généralement le basculement vers un nouveau paradigme. Les nouvelles technologies ne balayent pas de façon drastique celles préexistantes, mais celles-ci se stratifient. Ces nouvelles technologies sont souvent en rupture par rapport aux précédentes et les sous-tendent aussi parfois. 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. Les géants deviennent minuscules. Suspects: microprocesseur, ordinateur quantique. Disque dur, Processeur, Mémoire (Gordon Moore) Les grand ordinateurs mastodontes nés au milieu du 20e siècle on vu leur taille se réduire jusqu'à devenir invisibles à l'œil humain tandis que leurs performances, leur mémoire, leur vitesse ne cessaient de croître de manière exponentielle. UNIVAC (1952) – 13 tons – 5200 Vaccuum tubes – 1000 word of 12 characters – 2000 operations per second 2.25 MHz clock IBM PC XT (1983) 128 KB Mem – 360 KB Floppy disk 5 ¼ in – 10 MB Hard disk – Intel 8088 4.77 Mhz (8087 math co-proc) FXI Cotton Candy (2012) – Packed inside its tiny little frame is a 1GHz ARM Cortex-A9 processor built by Samsung, along with an ARM Mali-400 GPU. It also packs HDMI-out, WiFi and a Micro USB port— and comes with Android or Ubuntu pre-loaded as the OS. It also handles MPEG-4 and H.264 video formats, so you could plug it into a TV and use it as a rudimentary media PC. 8
  • 9. L'ordinateur se dérobe. Suspect: informatique ubiquitaire. Design (Steve Jobs) Peu à peu l'ordinateur se cache. Devenu esthétique grâce au soin apporté à son design, il se fond dans le décor. Il se dissimule dans les objets de tous les jours et dans l'environnement domestique. Il devient calculatrice, machine à écrire, téléphone portable, télévision. Exemples: Roomba iRobot, Nabaztag, Nabaztag/tag, Karotz 9
  • 10. L'informatique n'est plus qu'un souvenir. Oubli: Réalité augmentée, GPS, Immersion Les progrès en informatique graphique ont ouvert la voie à d'autres dimensions plongeant l'utilisateur dans des mondes imaginaire et symboliques. Aujourd'hui les techniques de communication mettent en relation quasi physique les correspondants éloignés faisant oublier comment s'opère ce miracle. Le mélange entre réalité et éléments fictifs achève de brouiller les pistes. Suspects: réalité virtuelle et réalité augmentée. Exemples: Layar, Tango, SixthSense, WordLens, Google Earth, ConditionONE 10
  • 11. L'informatique se dématérialise. Internet, Web, Cloud (Vint Cerf, Tim Berners Lee) – l’informatique se dématérialise. Les premiers ordinateurs ont été reliés à des terminaux, eux-mêmes bientôt remplacés par des micro-ordinateurs. Ces derniers ont été connectés entre eux par des réseaux, puis par des réseaux de réseaux. Tel un morceau de sucre qui se dissout dans une tasse de thé, l'ordinateur se dématérialise dans un nuage informatique. Suspect: Internet. Exemples: Computer lab 1960, 1970, 1980, 1990, 2000, 2010 11
  • 12. L'ordinateur se prend pour l'homme. Principaux suspects: intelligence artificielle, hybridation homme machine. Intuitivité, Simplicité, Interface, Intelligence artificielle (Joseph Weizenbaum –> Judea Pearl) L'homme commence par dialoguer avec l'ordinateur par le biais de langages de plus en plus évolués. Plus tard la machine reconnaît sa voix et la synthétise. Puis elle interagit avec l'homme par l'intermédiaire d'interfaces et accroît ses perceptions par le biais d'implants. Désormais elle rivalise avec l'intelligence humaine. Exemples: Doug Engelbart (1968), Xerox Alto (1973), Deep Blue v Kasparov (1997), IBM Watson (2011) , Asimo (2000), Microsoft Clippy (1998), Wolfram Alpha (2009), Apple Siri (2011) 12
  • 13. 15
  • 14. 16
  • 15. IBM a annoncé Blue Cloud, un service basé sur Linux, Hadoop, Xen et PowerVM. RightScale et 3Tera offrent des outils d'administration pour gérer facilement des machines basées dans des centres de calculs différents; opsource offre également un service similaire. Google App Engine a été présenté en avril 2008 et permet à des applications web en Python d'être déployées sur l'infrastructure de Google. Microsoft a annoncé récemment Windows Azure et Azure Services Platform, une offre similaire d'infrastructure de Cloud Computing. Rackspace propose aussi une plateforme de Cloud computing sous la marque Mosso, qui inclut Cloud Sites, Cloud Files et Cloud Servers tandis que ServePath fait de même sous la marque GoGrid. Des compagnies comme RightScale fournissent un interface pour gérer et accéder plus simplement la plateforme de Cloud Computing de Amazon Web Services. Five Refining Attributes of Public and Private Cloud Computing, Gartner, ID:G00167182, 5 May 2009. http://www.gartner.com/it/page.jsp?id=1035013 The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, Peter Mell, Timothy Grance, Special Publication (800-145), September 2011. http://csrc.nist.gov/publications/PubsSPs.html#800-145 Stratégie Cloud Computing des autorités suisses, Version pour consultation, USIC, 14 novembre 2011. http://www.isb.admin.ch/themen/strategien/00071/01452/index.html?lang=fr 17
  • 16. D’après le National Institute of Standards and Technology (NIST) les caractéristiques principales de ce type de service sont qu’il est (1) à la demande, (2) accessible depuis le réseau, (3) concentrateur de ressources, (4) grandement élastique, (5) offre un service mesuré. Dans ce contexte, trois types des services sont proposés (1) Software as a Service (SaaS), (2) Platform as a Service (PaaS) et (3) Infrastructure as a Service (IaaS). Les modèles de déploiement peuvent être publics, privés, réservés à une communauté ou hybrides. Voir le site NIST Cloud Computing http://csrc.nist.gov/groups/SNS/cloud- computing/index.html Plusieurs solutions sont offertes par les fournisseurs comme Google, Amazon, IBM ou Microsoft, mais certaines solutions open source permettent aussi d’expérimenter l’usage de Clouds privés comme par exemple Eucalyptus utilisé notamment par la NASA sur Nebula. D’autres offres sont certainement en préparation dans ce domaine. http://open.eucalyptus.com/wiki/Documentation http://nebula.nasa.gov/about/ Le sujet du Cloud Computing est largement couvert par les médias, les fournisseurs et les consultances et se trouve au sommet des attentes exagérées d’après Gartner. Toutefois l’avancement de cette technologie semble rapide car sa phase de maturité sera atteinte dans 2 à 5 ans. 18
  • 17. 19
  • 18. 20
  • 19. The Mobility Shift — Wherever and Whenever You Want The march of computing and communications over time has been governed by a series of so-called laws. Moore's Law and Metcalfe's Law have led to the mobile environment we have today. One important result has been the race to ever smaller, more portable and power-efficient electronic devices. What filled a desktop a decade ago now fits in your pocket — only with much more capability. This plays on another truism — people like to move around. Users don't want technology dictating where and when they can access information, talk to someone or play a game. They want it whenever and wherever they happen to be. The reality is that many of the traditional form factors for computing simply do not lend themselves to these kinds of computing needs. In the past, we made excuses about tradeoffs in processing power or weight, but today mobile devices combined with the cloud can fulfill most computing tasks, and any tradeoffs are outweighed in the minds of the user by the convenience and flexibility provided by the mobile devices. One area where smaller has not always been better has been in user interaction. Small devices mean small buttons and difficult-to-use interfaces. While keyboards and mice have been essential to bringing computing to the masses, they now serve to hold back computing by tying us to our desks. However, the emergence of more natural user interface experiences is making mobility practical. Touch- and gesture-based user experiences, coupled with speech and contextual awareness, are enabling rich interaction with devices and a much greater level of freedom. The addition of sensors is making the devices richer platforms for applications, and is enabling locationspecific or context-specific operation. While mobile devices aren't killing the PC, they are shifting the focus for developers and users. Mobility raises new concerns about security. While, technically, "companion" is a great term for these newer devices, the term has been imbued with a connation that the devices "need" the PC to be truly useful. This is certainly not the case at all. These systems are fully useful on their own. They do not require using a PC to sync with user data (stored in the cloud) or complete any transaction. These devices are full peers. At any point in time, and depending on the scenario, any given device will take on the role of the user's primary device — the one at the center of the user's constellation of devices. 21
  • 20. 22
  • 21. 23
  • 22. 24
  • 23. 25
  • 24. 26
  • 25. "App-ification" — From Applications to Apps The Apple App Store was the first app distribution service which set the standard and continues to do so for the other app distribution services, it opened on July 10, 2008, and as of January 2011, reported over 10 billion downloads. Until June 6, 2011, there are 425,000 third-party apps available, which are downloaded by 200 million iOS users. During Apple's 2012 Worldwide Developer's Conference, Apple CEO Tim Cook announced that the App Store has 650,000 available apps to download as well as "an astounding 30 billion apps" downloaded from the app store until that date. The ultimate goal of all IT is to deliver some service or application to a user. Users run applications, not operating systems or even devices — those are just a means to an end. When the way that applications are designed, delivered and consumed by users changes, it has a dramatic impact on all other aspects of the market. There is an application metamorphosis under way: ■ Changing packaging — Bite-sized, narrowly focused chunks rather than large, all encompassing systems. We will always need big applications for certain things, but increasingly small, cost-effective targeted applets will cover many users' needs and provide more flexibility. ■ Changing price model — Users have come to expect software at much lower prices, even free. App stores have become the equivalent of the dollar store, offering low-cost goods of acceptable quality to those who just need to get a task done. ■ Changing delivery models — Today, the vast majority of user-facing application development is Web based. Microsoft's new Metro-style applications for Windows 8 will be Web based and will use HTML5, JavaScript and CSS. Even when applications are not totally Web-based, they often leverage these cross-platform tools to provide a wider audience. These changes will have a profound impact on how applications are written and managed in corporate environments. They also raise the prospect of greater cross-platform portability as small user experience (UX) apps are used to adjust a server- or cloud-resident application to the unique characteristics of a specific device or scenario. One application can now be exposed in multiple ways and used in varying situations by the user. On the downside, there is the real possibility of incompatibility between tools as various users select different apps to do similar functions and discover they can't effectively share data. Of course, there is also the ever-present specter of security issues as applications move and store corporate data in potentially unknown locations hosted by organizations of unknown stability or means. Companies will have to get ahead of these issues or spend the next decade unraveling the problems that will crop up. 28
  • 26. 29
  • 27. 30
  • 28. 31
  • 29. 32
  • 30. 33
  • 31. 34
  • 32. Eric Schmidt (PDG Google): "Every 2 Days We Create As Much Information As We Did Up To 2003" 35
  • 33. 36
  • 34. 37
  • 35. 38
  • 36. 39
  • 37. Consumerization — You Ain't Seen Nothing Yet ■ Users are more technologically savvy and have very different expectations of technology. Users may not understand the details of how technology works, but they certainly understand what technology can do. ■ Internet and social media have empowered and emboldened users. Today, consumers provide instant feedback on what they like to anyone who happens to be listening. They no longer rely on just a small group of specialist intermediaries to tell them what and how things are, but rather can chose their own unique set of information channels. ■ The rise of powerful, affordable mobile devices changes the equation for users. They now have the technology in their hands — devices that are truly portable and powerful enough to do real work. However, to appeal to the consumerist masses and get the kind of broad adoption they need, vendors have been forced to simplify how these devices work. ■ Users have become innovators. New devices and applications have become the basic building blocks of a new wave of innovation. Users are familiar with discovering a new gadget and turning it into a tool — sometimes playful, sometimes useful. Corporate data is making its way onto devices and into applications dictated by users, and there may be no way to stop it. Consumerization is leading to a whole new wave of unexpected consequences. ■ The democratization of technology, as users of all types and status within organizations can now have similar technology available to them. Organizations that today rely on high-end concierge services for senior executives are being forced to expand those services to all users and, therefore, must rethink how to support this managed diversity. Not all aspects of consumerization are positive when viewed through a corporate lens. Users aren't very good at dealing with the details of keeping technology working and secure. They are easily frustrated when something breaks or is difficult to use, and they don't like when something they want to use doesn't live up to their expectations. Consumers are also easily swayed by style and fads, rather than function, and this can lead to disappointment. What's hot today may be forgotten tomorrow. While this may be fine for individuals, this could prove devastatingly expensive for enterprises. Furthermore, it reinforces a culture in which manufacturers are more interested in selling the next device than supporting the last one, resulting in a continual churn of features and capabilities. This makes it tough for IT planners to build around specific devices with any level of confidence. Further, supporting and optimizing around the churn adds cost and complexity to nearly every IT function. 40
  • 38. This new personal cloud supports the characteristics demanded by users, such as: ■ Being highly mobile. ■ Being always available. ■ Being user directed — the user is in control of what he or she uses, how he or she uses it, and what he or she shares with others. ■ Embracing multiple experiences and device classes — the device becomes secondary to the service: ■ The user can switch between devices based on situation and need. ■ No device can be considered essential all the time. ■ Providing rich interactions and content. ■ Providing a seamless shift between computing and communicating. ■ Supporting both private and public clouds, thus providing resources when a user needs it, not when IT can get around to delivering it. The personal cloud will be a federated blending of different services and cloud offerings, presented to the user as a single environment. ■ Providing contextual awareness to deliver the services and content to users that are appropriate to their situation or immediate needs, rather than overwhelming them. ■ Providing operationally obvious computing — no training required: ■ Well-designed, straightforward UXs are respected and craved by users. ■ Simple, task-focused, bite-sized applets. ■ The learning curve is dead. If it takes training, it will be relegated to the specialists and not be broadly adopted. 41
  • 39. Recommendations for Enterprises Faced with these major changes, enterprises must take the following steps to ensure they are not caught off-guard as user expectations and demands shift: ■ Stop building for physical environments — Select techniques and designs that will support multiple operating environments. This includes developing expertise with desktop virtualization technologies, but extends to application design and operations. Ensure that user-focused operations embrace the concept of managed diversity (see "Use Managed Diversity to Support the Growing Variety of Endpoint Devices"). ■ Get ahead of the curve on "bring your own devices" (BYODs) — Users will increasingly be using devices not provided by the enterprise to assist them in their daily work. Catching up to and, ultimately, getting ahead of the users in this area is critical if IT is to provide any leadership in the user area. Companies need to establish a BYOD program, including policies and processes (see "Gartner's View on 'Bring Your Own' in Client Computing"). ■ Embrace a self-service culture for users — Where possible, enable users to make their own decisions about technology in order to gain a higher level of self-sufficiency without the need for unnecessary hand- holding by IT personnel. Where it isn't possible, work to make it possible. While the IT organization will always play a role in directing users, providing them guidance and assistance with technology decisions, users are increasingly capable of dealing with many dayto-day needs on their own. ■ Look for ways to abstract and secure applications and data, not devices (see "How Will Users Access the PC Apps They Need on Their Alternative Devices?"). ■ Move corporate resources to a secure cloud — A move to a secure corporate cloud (either internally managed or leveraging public cloud services) makes applications and services available to users across the organization and from multiple locations and devices. This doesn't mean a free-for-all approach to corporate data or services. Restrictions will always be necessary for certain types of sensitive data. For example, access to customer credit card or patient data must be tightly controlled. ■ Adopt browser-based applications with local assistance — the "app" model. While not every app lends itself to decomposition into smaller chunks or delivery through the browser, companies need to get away from device-dependent, locally-installed applications. At the same time, companies should look for new delivery techniques to ease the burden of administration (for example, moving away from application installation by using App-V or other techniques to eliminate the need to store or manage devices). 42