SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
THE CLOUD
in 2014
Predictions from Greylock Partners
and its Portfolio Companies
1.  Cloud and mobile security risks will
frustrate CIOs in 2014
As enterprises continue their march towards mobile
cloud computing, data security will become a top CIO
issue in 2014. Many organizations will attempt to solve
these problems with poorly suited tools, such as legacy
security appliances with bolt-on cloud and mobile
updates. Many of those same organizations will
suffer through major penetrations and data
breaches as a result. !
"
Organizations everywhere are migrating their front-ends
to mobile (smart phones, tablets, laptops), and their
back-ends to cloud infrastructures. As these trends
accelerate, organizations will continue to lose control
over data. Confidential data, intellectual property, and
customer information will all be more exposed to risk.
These types of data were previously classified and
tracked, but are rapidly becoming unmanageable. IT is
losing control. Because of that, data security will be a
Asheem Chandna
headline-grabbing topic throughout 2014, but those
Partner
headlines will be negative more often than not."
2.  IT stops blocking cloud services for
no good reason

Rajiv Gupta
Founder and CEO

There will be big change in 2014 on how IT copes with cloud
risks. The status quo is based on outdated arguments and
limited visibility. Today, IT generally blocks what it knows
(Facebook, YouTube, ESPN.com). Many of these sites are
blocked in order to prioritize productivity (and often to
conserve bandwidth). And what IT does not know today
generally gets through, which is often risky."
"
This approach is pointless at best, since it’s so easy to find
workarounds, and counterproductive at worst, since IT often
blocks services that will boost productivity. According to our
2013 Cloud Adoption & Risk Report, which compiled data
from more than 3 million users across more than 100
companies in various industries, IT still blocks what it
knows, not necessarily what puts organizations at risk.!
 "
In 2014, IT will get the visibility needed to feel comfortable
loosening the reigns, helping employees evaluate and
understand the risk of these services, rather than simply
blocking them. "
3.  Incumbents go on cloud buying sprees
to reclaim lost market share
Those who doubt that cloud computing is the future are
on the lunatic fringe, yet there are plenty of lunatics out
there. The cloud continues its march throughout
enterprises in nearly every industry -- a reality that
incumbents can no longer ignore or deny. Microsoft
continues to push Office 365, even if that strategy risks
eroding Office revenues, and even long-time cloud
skeptic Larry Ellison is on board, with the cloud
featured prominently at Oracle OpenWorld 2013.

"
Industry incumbents such as Oracle and SAP will
accelerate acquisitions of innovative cloud
software companies to buy their way into the
future. In 2014, IT decision makers must be more
vigilant than ever about choosing vendors that have
long-term viability — or risk getting locked into an
incumbent’s stack all over again. "
Frederic Kerrest
Co-Founder and COO
4.  Enterprise cloud apps will become
mainstream, sparking the rise of niche apps

In 2014, expect to see increased cloud adoption
in nearly every industry. Combined with the
economics of the cloud model that make it
cheaper to develop and spread applications on a
massive scale, this trend will ultimately result in
an exponential increase in the number of
enterprise cloud applications and services. "
!
What’s more, 2014 will be the year that niche,
industry-specific cloud applications and
services will take off. These applications simply
weren’t economical in the past, but 2013 proved
that’s no longer true. Veeva Systems experienced
one of the most successful IPOs of 2013, with a
reported $4.4 billion valuation. 2014 will be the
year that successful (and profitable) niche cloud
companies become the norm. "
Frederic Kerrest
Co-Founder and COO
5.  IaaS and PaaS are the final two nails
in the coffin of the traditional firewall
The traditional firewall isn’t dead, and probably won’t be for a
while, but it’s on life support. In 2014, IT will more actively
phase out legacy perimeter security tools. Two new cloud
technologies, IaaS and PaaS, will be the final nails in the
traditional firewall’s coffin. "
"
IaaS and PaaS are both mainly being used by small startups,
while large enterprises have only tested them for new
projects and front-end applications without a significant data
footprint. In 2014 we will see the beginning of heavy
backend data systems/applications moving into the
cloud. This will be a significant shift, showing that enterprises
are now comfortable enough to have their core (their blood)
move outside the walls of their corporation. Not all industries
will do that, e.g. finance and health will probably not make the
switch in 2014, but other industries will in 2014, such as
retail, telecommunications, CPG, and automotive. "
"
However, as companies make this shift, they will need to
rethink their security in order to protect data rather than
borders. !

Amr Awadallah
CTO
6.  Revenge of the CIO - CIO’s will
transition from CI-No’s to tech enablers

Rajiv Gupta
Founder and CEO

As IT departments become more strategic, the CIO’s
role will change drastically too. CIOs are tired of being
“CI-No’s.” It’s not a fun job. Fortunately, they no longer
have to fill that role. As IT pros evolve into internal tech
consultants who identify, evaluate, and oversee
technologies (and not necessarily the ones who have
to develop, deliver, or operate these technologies),
CIOs will be tasked with figuring out how new
technologies deliver competitive advantages."
"
CIOs will look at cloud, mobile, social media, and
whatever other new technology comes along to
discern how these cloud services will benefit the
business, operationally and strategically. This
means the background of CIOs will change as well.
Organizations will value pure IT backgrounds less and
less, instead prioritizing business and operational
experience. "
6.  CIOs who aren’t comfortable with cloud,
mobile, and social will be on the hot seat
By the end of 2014, CIOs who don’t understand the
strategic importance of social, mobile, analytics and
cloud will be considered old school and less relevant
to the organization. CIOs who “just say no” and
fail to adapt will face criticism from everyone
from board members who can’t live without
access to corporate data on their personal
tablets to developers who demand access to
services like AWS.!
"
Moreover, in 2014 CMOs will continue to infringe
on areas of responsibility that used to belong
solely to the CIO. Those CIOs who continue to
block cloud services that deliver business value will
place their organizations at a competitive
disadvantage, and once the rest of the C-suite
wakes up to that fact, it will be the CMO, not the CIO,
driving the future of technology within those slow-toadapt organizations. "

Rajiv Gupta
Founder and CEO
More Slideshares You May Like

Brought to you by "

Weitere ähnliche Inhalte

Andere mochten auch

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaSkyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Manufacturing Saas
Manufacturing SaasManufacturing Saas
Manufacturing SaasAllen Miller
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 

Andere mochten auch (10)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Manufacturing Saas
Manufacturing SaasManufacturing Saas
Manufacturing Saas
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 

Kürzlich hochgeladen

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Kürzlich hochgeladen (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

The Cloud in 2014 - Predictions from Greylock Partners

  • 1. THE CLOUD in 2014 Predictions from Greylock Partners and its Portfolio Companies
  • 2. 1.  Cloud and mobile security risks will frustrate CIOs in 2014 As enterprises continue their march towards mobile cloud computing, data security will become a top CIO issue in 2014. Many organizations will attempt to solve these problems with poorly suited tools, such as legacy security appliances with bolt-on cloud and mobile updates. Many of those same organizations will suffer through major penetrations and data breaches as a result. ! " Organizations everywhere are migrating their front-ends to mobile (smart phones, tablets, laptops), and their back-ends to cloud infrastructures. As these trends accelerate, organizations will continue to lose control over data. Confidential data, intellectual property, and customer information will all be more exposed to risk. These types of data were previously classified and tracked, but are rapidly becoming unmanageable. IT is losing control. Because of that, data security will be a Asheem Chandna headline-grabbing topic throughout 2014, but those Partner headlines will be negative more often than not."
  • 3. 2.  IT stops blocking cloud services for no good reason Rajiv Gupta Founder and CEO There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky." " This approach is pointless at best, since it’s so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.!  " In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them. "
  • 4. 3.  Incumbents go on cloud buying sprees to reclaim lost market share Those who doubt that cloud computing is the future are on the lunatic fringe, yet there are plenty of lunatics out there. The cloud continues its march throughout enterprises in nearly every industry -- a reality that incumbents can no longer ignore or deny. Microsoft continues to push Office 365, even if that strategy risks eroding Office revenues, and even long-time cloud skeptic Larry Ellison is on board, with the cloud featured prominently at Oracle OpenWorld 2013.
 " Industry incumbents such as Oracle and SAP will accelerate acquisitions of innovative cloud software companies to buy their way into the future. In 2014, IT decision makers must be more vigilant than ever about choosing vendors that have long-term viability — or risk getting locked into an incumbent’s stack all over again. " Frederic Kerrest Co-Founder and COO
  • 5. 4.  Enterprise cloud apps will become mainstream, sparking the rise of niche apps In 2014, expect to see increased cloud adoption in nearly every industry. Combined with the economics of the cloud model that make it cheaper to develop and spread applications on a massive scale, this trend will ultimately result in an exponential increase in the number of enterprise cloud applications and services. " ! What’s more, 2014 will be the year that niche, industry-specific cloud applications and services will take off. These applications simply weren’t economical in the past, but 2013 proved that’s no longer true. Veeva Systems experienced one of the most successful IPOs of 2013, with a reported $4.4 billion valuation. 2014 will be the year that successful (and profitable) niche cloud companies become the norm. " Frederic Kerrest Co-Founder and COO
  • 6. 5.  IaaS and PaaS are the final two nails in the coffin of the traditional firewall The traditional firewall isn’t dead, and probably won’t be for a while, but it’s on life support. In 2014, IT will more actively phase out legacy perimeter security tools. Two new cloud technologies, IaaS and PaaS, will be the final nails in the traditional firewall’s coffin. " " IaaS and PaaS are both mainly being used by small startups, while large enterprises have only tested them for new projects and front-end applications without a significant data footprint. In 2014 we will see the beginning of heavy backend data systems/applications moving into the cloud. This will be a significant shift, showing that enterprises are now comfortable enough to have their core (their blood) move outside the walls of their corporation. Not all industries will do that, e.g. finance and health will probably not make the switch in 2014, but other industries will in 2014, such as retail, telecommunications, CPG, and automotive. " " However, as companies make this shift, they will need to rethink their security in order to protect data rather than borders. ! Amr Awadallah CTO
  • 7. 6.  Revenge of the CIO - CIO’s will transition from CI-No’s to tech enablers Rajiv Gupta Founder and CEO As IT departments become more strategic, the CIO’s role will change drastically too. CIOs are tired of being “CI-No’s.” It’s not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages." " CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience. "
  • 8. 6.  CIOs who aren’t comfortable with cloud, mobile, and social will be on the hot seat By the end of 2014, CIOs who don’t understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who “just say no” and fail to adapt will face criticism from everyone from board members who can’t live without access to corporate data on their personal tablets to developers who demand access to services like AWS.! " Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-toadapt organizations. " Rajiv Gupta Founder and CEO
  • 9. More Slideshares You May Like Brought to you by "