SlideShare a Scribd company logo
1 of 45
What does the future look like?
Simon May,
Client and Cloud Evangelist




@simonster
http://simon-may.com
Change is faster than ever
Competition is ever tougher
Possibility
Social
App Internet
Devices
Cloud computing
People




         People
Applications
Productivity

               Integration with
               external social
               networks



               Internal social
               computing
               tools                    Online meetings          Presence & IM



                          Social networking               Voice & video




               Productivity will be              And best-in-class
               best on Windows                   on other devices
Devices in the data center
Services




           Services
Consumer




    1   ,000,000,000
    Hours spent per month
    playing on Xbox Live
Business




     28,000
     Mailboxes the Royal Mail
     have in the cloud
Mobility
Security and Management
Tools That Help IT to Protect the Enterprise

    Central, unified                       Access control based on the level of trust
  management platform
                                                             Level of business impact
                                                                (means of access)


                                                                       Low              Unmanaged
                                                                      (Web)
                                             Managed


                                                                     Medium
                                                                   (VDI/Citrix)




                                                                       High
  Single, end-to-end security                                      (DirectAccess,
                                                                  enterprise VPN)
  and management platform



                                With System Center 2012, manage any mobile

A look                          device that connects through Exchange ActiveSync,
                                including Windows-, iOS-, Symbian-, and Android-
                                based devices
ahead…                          • Will manage Windows devices best and be best-
                                  in-class on other devices


                                Achieve the same management results as with on-
                                premises solutions at a lower cost
Cloud definition
               What is a cloud?

Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.
This cloud model promotes availability and is
composed of five essential characteristics, three service
models, and four deployment models.

             The NIST Definition of Cloud Computing
Public?


The cloud infrastructure is made available to the
general public or a large industry group and is
owned by an organization selling cloud services.
Private?


The cloud infrastructure is operated solely for an
organization. It may be managed by the organization
or a third party and may exist on premise or off
premise.
Hybrid?
The cloud infrastructure is a composition of two
or more clouds (private, community, or public)
that remain unique entities but are bound
together by standardized or proprietary
technology that enables data and application
portability (e.g., cloud bursting for load-
balancing between clouds).
Entering new markets is easy
Small businesses can act big
Big business can act small
Flexibility is critical
AA0000s0s1
Unexpected error occurred
Please contact your system administrator

     ...................................,::::::::::~:................................
     ...................................:::::~~~~~~~~~...............................
     ..................................~:::~~~~~~~~~~=..==............=..............
     ..................................:~~~~~~=======,.+=~~~:~~:::,,:,=..............
     .................................~~~~~==========..+===~~~~:::::,:...............
     .................................~~~~========+=~.~++====~~~:::::~...............
     ................................:~~~=====++++++,.+++++===~~~::::................
     ................................~~~~====++++++=,~?+++++==~~~~::~................
     ................................~,......,,,~=+,.????+++===~~~::,................
     .................................~=+++???I=..,,=????++++==~~~:=.................
     ...............................~===+++??IIII7...,???++++==~~~~:.................
     ..............................=~===+++??IIII?,=I..,,,=++~,,.....................
     ..............................~~~===++???III,,III??,......+=++..................
     .............................=~~~===+++????I,:IIII??????+++++...................
     .............................~~~~~===++++??,,III???????++++=+...................
     ............................=~~~~~~====++++,.????????++++++=....................
     ............................~~~~~~~~=====+:,???????++++++==+....................
     ...........................:~=:,.....:~===,.+++++++++++====.....................
     ........................................,~.?+++++++++=====+.....................
     ...........................................~++++==========~.....................
     ..............................................~+=======~,.......................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
     ................................................................................
Some things don’t belong
Some are obvious choices
Service Providers
Massive scale
Connectivity
Cloud Security




      Robust security controls:
      Do you have these
      attestations?
GFS Data Center video


       Available here:
       http://www.youtube.com/watch?v=hOxA1l1pQIw
Adopt a “cloud first” approach
Workloads that can’t move will remain on-prem

                                      Get closer to the business
                                    Work as one as technical barriers come down

Become app centric
Focus time and resource around managing apps, not infrastructure

                                                Will divest ownership
                                                 To the right parts of the business
Managing apps
Expert in marrying applications, experience and knowlage

                                                       Enable flexibility
                                            Through managing the environement

Manage resource
Expert in understanding cost implications and placing workload accordingly

                                                                       STOP!
                   Doing non-value add, like patching and hardware maintainance
Cloud integrator
Connecting public and private clouds together

                                                                    Dev-Op
                                            Ensures smooth application operation

Cloud resource manager
Expert in understanding cost implications and placing workload accordingly
IT Marketeer
Internally markets the IT departments capabilities

                                                        Security Analyst
                                           Understands and mitigates business risk
340 Undecillion
The future might look like this


        Available here:
        http://www.youtube.com/watch?v=a6cNdhOKwi0
My Blog:
http://simon-may.com

UK TechNet Blog:
http://aka.ms/UKTechNet


Cloud for IT Pros:
http://aka.ms/TNCloud

More Related Content

What's hot

Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computingnik_053
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudMicrosoft Private Cloud
 
Cloud for dummies easycloud
Cloud for dummies   easycloudCloud for dummies   easycloud
Cloud for dummies easycloudAlessandro Greco
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...
All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...IBM India Smarter Computing
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1Sagar Kumar
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleAlan Quayle
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Mark Skilton
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 

What's hot (20)

Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computing
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
 
Cloud for dummies easycloud
Cloud for dummies   easycloudCloud for dummies   easycloud
Cloud for dummies easycloud
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...
All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop Sample
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 

Similar to The Future of IT

Zsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmZsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmzslmarketing
 
Cloud native computing
Cloud native computingCloud native computing
Cloud native computingAnsar Gill
 
CFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingCFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingTGO Consulting
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetDavid J Rosenthal
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat BodageBharat Bodage
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingPriyodarshini Dhar
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Polysynthetic Data Center Vision v1.2
Polysynthetic Data Center Vision v1.2Polysynthetic Data Center Vision v1.2
Polysynthetic Data Center Vision v1.2Christopher Williams
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriManuela Moroncini
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
Cloud computing
Cloud computingCloud computing
Cloud computingAjit Yadav
 
A Brief Introducton to Cloud Computing
A Brief Introducton to Cloud ComputingA Brief Introducton to Cloud Computing
A Brief Introducton to Cloud ComputingR2Labs
 
External IT Intro Presentation
External IT Intro PresentationExternal IT Intro Presentation
External IT Intro Presentationkgarber
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 

Similar to The Future of IT (20)

Zsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmZsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scm
 
Cloud native computing
Cloud native computingCloud native computing
Cloud native computing
 
cloude computing
cloude computingcloude computing
cloude computing
 
CFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingCFO Summit Series - Cloud Computing
CFO Summit Series - Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat Bodage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Polysynthetic Data Center Vision v1.2
Polysynthetic Data Center Vision v1.2Polysynthetic Data Center Vision v1.2
Polysynthetic Data Center Vision v1.2
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Brief Introducton to Cloud Computing
A Brief Introducton to Cloud ComputingA Brief Introducton to Cloud Computing
A Brief Introducton to Cloud Computing
 
External IT Intro Presentation
External IT Intro PresentationExternal IT Intro Presentation
External IT Intro Presentation
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 

More from Simon May

Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft IntuneSimon May
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsSimon May
 
Designing office 2010 deployment
Designing office 2010 deploymentDesigning office 2010 deployment
Designing office 2010 deploymentSimon May
 
Collaborate better
Collaborate betterCollaborate better
Collaborate betterSimon May
 
7th cloud circle forum keynote
7th cloud circle forum keynote7th cloud circle forum keynote
7th cloud circle forum keynoteSimon May
 
Cloud for IT Apprentices
Cloud for IT ApprenticesCloud for IT Apprentices
Cloud for IT ApprenticesSimon May
 
The changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of ITThe changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of ITSimon May
 

More from Simon May (7)

Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in Leeds
 
Designing office 2010 deployment
Designing office 2010 deploymentDesigning office 2010 deployment
Designing office 2010 deployment
 
Collaborate better
Collaborate betterCollaborate better
Collaborate better
 
7th cloud circle forum keynote
7th cloud circle forum keynote7th cloud circle forum keynote
7th cloud circle forum keynote
 
Cloud for IT Apprentices
Cloud for IT ApprenticesCloud for IT Apprentices
Cloud for IT Apprentices
 
The changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of ITThe changing IT landscape and the evolving role of IT
The changing IT landscape and the evolving role of IT
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

The Future of IT

  • 1. What does the future look like? Simon May, Client and Cloud Evangelist @simonster http://simon-may.com
  • 2. Change is faster than ever
  • 3.
  • 4.
  • 11. People People
  • 13. Productivity Integration with external social networks Internal social computing tools Online meetings Presence & IM Social networking Voice & video Productivity will be And best-in-class best on Windows on other devices
  • 14.
  • 15. Devices in the data center
  • 16. Services Services
  • 17. Consumer 1 ,000,000,000 Hours spent per month playing on Xbox Live
  • 18. Business 28,000 Mailboxes the Royal Mail have in the cloud
  • 20. Security and Management Tools That Help IT to Protect the Enterprise Central, unified Access control based on the level of trust management platform Level of business impact (means of access) Low Unmanaged (Web) Managed Medium (VDI/Citrix) High Single, end-to-end security (DirectAccess, enterprise VPN) and management platform With System Center 2012, manage any mobile A look device that connects through Exchange ActiveSync, including Windows-, iOS-, Symbian-, and Android- based devices ahead… • Will manage Windows devices best and be best- in-class on other devices Achieve the same management results as with on- premises solutions at a lower cost
  • 21.
  • 22. Cloud definition What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. The NIST Definition of Cloud Computing
  • 23. Public? The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
  • 24. Private? The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.
  • 25. Hybrid? The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load- balancing between clouds).
  • 28. Big business can act small
  • 30. AA0000s0s1 Unexpected error occurred Please contact your system administrator ...................................,::::::::::~:................................ ...................................:::::~~~~~~~~~............................... ..................................~:::~~~~~~~~~~=..==............=.............. ..................................:~~~~~~=======,.+=~~~:~~:::,,:,=.............. .................................~~~~~==========..+===~~~~:::::,:............... .................................~~~~========+=~.~++====~~~:::::~............... ................................:~~~=====++++++,.+++++===~~~::::................ ................................~~~~====++++++=,~?+++++==~~~~::~................ ................................~,......,,,~=+,.????+++===~~~::,................ .................................~=+++???I=..,,=????++++==~~~:=................. ...............................~===+++??IIII7...,???++++==~~~~:................. ..............................=~===+++??IIII?,=I..,,,=++~,,..................... ..............................~~~===++???III,,III??,......+=++.................. .............................=~~~===+++????I,:IIII??????+++++................... .............................~~~~~===++++??,,III???????++++=+................... ............................=~~~~~~====++++,.????????++++++=.................... ............................~~~~~~~~=====+:,???????++++++==+.................... ...........................:~=:,.....:~===,.+++++++++++====..................... ........................................,~.?+++++++++=====+..................... ...........................................~++++==========~..................... ..............................................~+=======~,....................... ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................ ................................................................................
  • 32. Some are obvious choices
  • 35.
  • 37. Cloud Security Robust security controls: Do you have these attestations?
  • 38. GFS Data Center video Available here: http://www.youtube.com/watch?v=hOxA1l1pQIw
  • 39. Adopt a “cloud first” approach Workloads that can’t move will remain on-prem Get closer to the business Work as one as technical barriers come down Become app centric Focus time and resource around managing apps, not infrastructure Will divest ownership To the right parts of the business
  • 40. Managing apps Expert in marrying applications, experience and knowlage Enable flexibility Through managing the environement Manage resource Expert in understanding cost implications and placing workload accordingly STOP! Doing non-value add, like patching and hardware maintainance
  • 41. Cloud integrator Connecting public and private clouds together Dev-Op Ensures smooth application operation Cloud resource manager Expert in understanding cost implications and placing workload accordingly
  • 42. IT Marketeer Internally markets the IT departments capabilities Security Analyst Understands and mitigates business risk
  • 44. The future might look like this Available here: http://www.youtube.com/watch?v=a6cNdhOKwi0
  • 45. My Blog: http://simon-may.com UK TechNet Blog: http://aka.ms/UKTechNet Cloud for IT Pros: http://aka.ms/TNCloud

Editor's Notes

  1. Intro:NowThen  Looking at the current Cloud Computing market small business and ISPs and end user emergent trends and adoption rates
  2. Rate of change is now faster than it’s every beenExamples: Time spent online in 2000 = 2.7h/week, 2010 = 18h/week or 666% increase!Examples: Active blogs 2000 = 12,000 , 2010 = 141 millionExamples: Daily SMS 2000 = 400,000, 2010 = 4.5 billionExamples: Storage 2000 = $10/gb, 2010 = 6c
  3. Growth and cost saving
  4. 3 out 5 employees don’t believe they need to be in the office to be productive95% of information workers report that they use a personal device at work – now45% of millennials world wide say they use social networking at work REGARDLESS of whether they are permitted or not!Enabled by not-quite ubiquitous connectivityDriven by user desires to do everything in the most convenient way for themDriven by user desire to be able to do what the person next to them doesDriven by user desire to work togetherDriven by user expectation that things are easy
  5. What we’re seeing is that sharing is essential to them, sharing with both those internally and externally –it’s no good if they send a business proposal to a client and they can’t open the document.It’s essential to be able to express ideas with the clarity with which they intended, it’s life or death, mortgage payment or default at times. It’s not good getting a graph that looks like it was created in 2000 when everyone else is pitching in 2011.
  6. Timing: 3 minutes Key Points:Microsoft strives to be first and best on the Windows platform and best-in-class on other devices to deliver the best possible productivity experience. We believe that the key to delivering the best experience is to deliver a connected experience whenever possible, with rich content creation capabilities available when offline.Social computing represents an opportunity to make the productivity experience more collaborative while providing the kind of user experience that people love.Office 365 is where Microsoft Office meets the cloud, for anywhere access to people, information, and productivity tools. Script:From the very beginning, when our focus was on delivering core word processing, spreadsheet software, and presentation software, we always strived to provide the best experience on the Windows platform. As Microsoft Office has matured, it has progressively grown to include a set of back-end services that extend and enhance the user experience—our commitment to delivering the best experience has never wavered. The Microsoft Office applications and services are the tools that people globally use to communicate, collaborate, and create compelling materials. Moving forward, we recognize that people want that experience regardless of what device they’re running. We’ll always focus on being first and best on the Windows platform, but we’re also delivering best-in-class experiences on other devices. For example, Office for Mac is a highly popular and successful program; in fact, it’s one of the best-selling applications for Apple computers. As other devices become increasingly more important in people’s lives—such as the iPhone and iPad, as well as Android-based devices—we’re looking at how we extend the Office platform to them as well. A great example is Lync, which will be available for all major smartphone platforms. And across all of the devices—and the applications they run—we believe that a key to delivering the best productivity experience is to make that experience a connected one whenever possible, with rich content creation capabilities available when offline.Another key aspect of the consumerization of IT is the popularity of social computing. Online social tools can make the productivity experience more collaborative and help people connect more easily with each other. Bringing the power and potential of social computing technologies into the enterprise—whether by integrating consumer social apps into your business processes or providing enterprise-equivalent apps that add the necessary privacy and security capabilities—can help directly boost productivity while providing the kind of user experience that people love.We’ll jump a little deeper into those topics in just a moment, but before we move on I’d just like to mention Office 365. Office 365 is where Microsoft Office meets the cloud. We believe the cloud is really the future of IT, and it’s a key enabler of a lot of the consumerization trend, providing anywhere connectivity to people, information, and applications, unrelated to a specific device. Office 365 brings together Microsoft Office, Microsoft SharePoint Online, Microsoft Exchange Online, and Microsoft Lync Online in an always-up-to-date service. In keeping with our goal to deliver best-in-class experiences across devices and platforms, Office 365 supports mobile use as well as use on a Mac client. Office 365 also offers the best service level agreement policies in the industry, along with robust disaster recovery capabilities, globally redundant backups, and extensive privacy features. Additional Information:“Office for Mac 2011 To Get the ‘Ribbon’ UI,” Redmond Channel Partner, February 11, 2010, http://rcpmag.com/articles/2010/02/11/office-for-mac-2011-to-get-the-ribbon-ui.aspx“Steve Ballmer: Office 365 Launch,” June 28, 2011, http://www.microsoft.com/presspass/exec/steve/2011/06-28Office365.mspx
  7. 2013 1/3rd of the worlds workforce will be mobileChinese millennials spend 34 hours a week using social toolsData is expanding at 40x per year, IT professionals by just 1.4x
  8. Timing: 2 minutes Key Points:Microsoft offers a centralized, unified management platform to enable you to manage your infrastructure from a single pane of glass. The key to maximizing security and productivity is to control access based on the user, the level of trust you have in the device, and the business impact of the information.Microsoft investments in systems management will extend the types of devices that you can manage with a single platform and increasingly provide you with a choice between on-premises and cloud-based management. Script:With more and more devices in use in the enterprise, IT professionals must deal with an increasingly complex IT environment, making security and management likewise more complex. Microsoft delivers a security and management platform that will help IT to protect the enterprise while supporting today’s changing workstyle:We offer a single, end-to-end security and management platform, providing an integrated, extensible environment for managing IT resources from the desktop to the data center and enabling you to use the same consoles and tools for managing physical, virtual and cloud IT environments. Looking specifically at client management, this means having a single pane of glass for asset intelligence, desired configuration management, software update management, software distribution, operating system deployment, and power management.Enabling access from different devices based on the user, the level of trust in the device (managed or unmanaged), and the business impact of the information will help ensure the security of your information and network while maximizing productivity. I’ll talk in a little more detail about those two points in a moment, but I’d just like to highlight a couple of areas that we are investing in with our systems management platform, to help further simplify management:We are extending the platform to support an increasing range of devices. We want to support the devices your people are using—regardless of the platform each device uses. With Microsoft System Center Configuration Manager 2012, you’ll be able to manage any mobile device that connects through Exchange ActiveSync, including devices based on Windows Phone, iOS (iPhone or iPad), Symbian, and Android.We think you should have the option to manage your systems from either on-premises or the cloud, and we’ll continue to make more cloud options available.
  9. Agility and responsiveness are becoming more overwhelming drivers than simply saving moneyMoving into new markets in new parts of the world is simpleNiels Bohr once said – “making predictions is difficult – especially about the future” Businesses can easily explore a new market because the attendant risk of doing so is greatly reduced as a result of not having to invest in infrastructure to enable the explorationExample: Esri a company that creates complex geographic relationship models for industry and government has been able to move into new markets because they haven’t had to invest in infrastructure in each region they want to explore
  10. One man in a container can have the appearance of a massive company and he’s able to enter markets and do things.Exceedra – a start up that helps manufacturers feeding supply chains to know what to sell in and at what price is helping companies like Hiniken, Pirelli and Revlon understand what they need to place into the channel. They’re small with staff count countable on fingers and toes, but they act like a massive company attracting massive clients.
  11. Massive companies can do things that would have been very difficult previously because of their scale, like exploit a new market where once it would have been too expensive.Associated Press – built the News Reader application to try to attract readers from traditional paper press to digital, they wouldn’t have been able to try something like that with an unproven record without the ability to control scale and cost with the cloud
  12. The ability to expand and contract resources is the only way to enable that need to grow and shrink and it’s the only way to deal with Risk metrics, bursting into the cloud to do Monte Carlo simulations – working out the risks that can affect asset prices over a variety of time horizons.
  13. UnpredictabilityCloud bursting, Air Products uses as solution built on premises using HPC Server to “cloud burst” when they need to model specific business needs
  14. Lets be honest compliance policies and legislation haven’t quite caught up yet.Enter Hybrid as a deployment method
  15. Front end web services are an obvious choice to move to cloud technology as are email systems. Royal Mail have moved over 28,000 employees to the Microsoft BPOS as have small companies like Shine Therapies who provide occupational, speech and language therapies in the NW of england
  16. If I were going to be in one business that has to be ultra efficient it’s going to be this one.By 2015 20% of the Fortune 500 will be cloud -Service Providers
  17. A city in developed nation uses about 10MW of power, a global class DC uses about 30MW If you want one you can buy for about $19mUsers don’t expect downtime any more, it gets in the way and it gets ugly fast.
  18. In 2011 the internet transfers 50 Exabytes of data, every day.I did some maths, take that data write it to a DVD, put the DVDs in a 747 and fly them and you’ll still have to do that 13,000 more times to move an Exabyte
  19. You tube video of GFS DC tour
  20. Internet of things