SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
@pdewost
Sovereignty in the Digital Age
Sovereignty noun
Sovereignty (over something) :
complete power to govern a country
The state of being a country with
freedom to govern itself
Such supreme power implies
exclusive domestic competency
(internal sovereignty) and full
international independancy where
the only limits are set by
commitments and treaties (external
sovereignty).
Sovereignty is about mastering one’s destiny
digital Sovereignty
Sovereignty is a core governing lever
Power is nothing
without control
Sovereignty
2.0
En 2007, Estonia, that
had heavily invested in
digital government,
was exposed to heavy
cyber attacks.
In 2014, the country
unveiled a plan to
migrante all of its
digital infrastructures
in the cloud in order
to withstand further
foreign cyberattacks.
Silicon > brothers in ARM ? (Baïkal)
Hardware > The Open Compute Elephant
Network > root server anybody ?
Operating Systems > choose your battlefield
Sovereign Cloud > At what cost & scale ?
Cybersecurity > CitizenFour vs. NSA vs. legal
Regulation > acceptability
a 7 layers model ?
In a world where alignment derives more
from speed and less from power
Open Compute
-30% in CAPEX & OPEX
$1Bn revenues in the US
Europe is next
The main difference between
opensourcing software and
hardware is that atoms do not
move at zero marginal cost…
Paradoxes
Acceleration
1700
generations ago,
modern man
emerges and starts
developing
language
300 generations
ago, he develops
writing
35 generations ago,
he develops priting
2013 Internet of Things
2010 Tablets
2007 smartphones
2000 Always on / Web
1985 PC / Networking
1970 Fax / Electronics
1955 Television / Mass Media
1940 Radio / Talking films
1925 Telephone / Silent films
1910 Telegraph / Photographyand then...
représentation©DerrickdeKerckhove2008-2012

adaptationetmiseàjour@pdewost
• Moore
• Metcalfe
• Duplication
Laws at stake
Technology 50 million users in
Books 400 years
Radio 38 years
TV 13 years
Cable 10 years
Internet 5 years
iPod 3 years
facebook 2 years
Angry Birds 35 days
©HoraceDediu@asymco—Racetoabillion(January2013)
Questions ?
@pdewost ©2014

Weitere ähnliche Inhalte

Andere mochten auch

"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I..."La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...Philippe DEWOST
 
Une Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesUne Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesPhilippe DEWOST
 
les IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriqueles IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriquePhilippe DEWOST
 
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe DEWOST
 
20150702 usi keynote - open compute - philippe dewost caisse des depots
20150702   usi keynote - open compute  - philippe dewost caisse des depots20150702   usi keynote - open compute  - philippe dewost caisse des depots
20150702 usi keynote - open compute - philippe dewost caisse des depotsPhilippe DEWOST
 
Open Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynoteOpen Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynotePhilippe DEWOST
 
De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)Philippe DEWOST
 

Andere mochten auch (7)

"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I..."La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
 
Une Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesUne Breve Histoire d'Interfaces
Une Breve Histoire d'Interfaces
 
les IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriqueles IHM dans l'entreprise numerique
les IHM dans l'entreprise numerique
 
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
 
20150702 usi keynote - open compute - philippe dewost caisse des depots
20150702   usi keynote - open compute  - philippe dewost caisse des depots20150702   usi keynote - open compute  - philippe dewost caisse des depots
20150702 usi keynote - open compute - philippe dewost caisse des depots
 
Open Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynoteOpen Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynote
 
De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)
 

Ähnlich wie Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost

Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudMrsAlways RigHt
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019GoQA
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018Axis Communications
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 

Ähnlich wie Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost (20)

Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 

Kürzlich hochgeladen

OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 

Kürzlich hochgeladen (20)

OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 

Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost

  • 2. Sovereignty noun Sovereignty (over something) : complete power to govern a country The state of being a country with freedom to govern itself Such supreme power implies exclusive domestic competency (internal sovereignty) and full international independancy where the only limits are set by commitments and treaties (external sovereignty). Sovereignty is about mastering one’s destiny
  • 3. digital Sovereignty Sovereignty is a core governing lever Power is nothing without control
  • 4. Sovereignty 2.0 En 2007, Estonia, that had heavily invested in digital government, was exposed to heavy cyber attacks. In 2014, the country unveiled a plan to migrante all of its digital infrastructures in the cloud in order to withstand further foreign cyberattacks.
  • 5. Silicon > brothers in ARM ? (Baïkal) Hardware > The Open Compute Elephant Network > root server anybody ? Operating Systems > choose your battlefield Sovereign Cloud > At what cost & scale ? Cybersecurity > CitizenFour vs. NSA vs. legal Regulation > acceptability a 7 layers model ? In a world where alignment derives more from speed and less from power
  • 6. Open Compute -30% in CAPEX & OPEX $1Bn revenues in the US Europe is next The main difference between opensourcing software and hardware is that atoms do not move at zero marginal cost…
  • 8. Acceleration 1700 generations ago, modern man emerges and starts developing language 300 generations ago, he develops writing 35 generations ago, he develops priting 2013 Internet of Things 2010 Tablets 2007 smartphones 2000 Always on / Web 1985 PC / Networking 1970 Fax / Electronics 1955 Television / Mass Media 1940 Radio / Talking films 1925 Telephone / Silent films 1910 Telegraph / Photographyand then... représentation©DerrickdeKerckhove2008-2012
 adaptationetmiseàjour@pdewost
  • 9. • Moore • Metcalfe • Duplication Laws at stake Technology 50 million users in Books 400 years Radio 38 years TV 13 years Cable 10 years Internet 5 years iPod 3 years facebook 2 years Angry Birds 35 days ©HoraceDediu@asymco—Racetoabillion(January2013)