SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Bringing

to Life !

February 22nd 2013

How to create value and control risks
when introducing new products & services
based on upcoming
communication technologies;

All in order to improve the Quality of Life!

Peter Maarten Westerhout
Hong Gie Ong

Course: Network Architectures and Business Models
ET4034, Prof. Dr. Ir. N.H.G. Baken
1 / 62
is sexy !
sexy?

2 / 62
Peter Maarten Westerhout

Hong Gie Ong
Hong Gie Ong

• Electrical Engineering (1994 - 2002)
• Internship in Beijing, China:

Microsoft Research

• Master Thesis in Singapore:

Center for Wireless Communication

2003  Product Manager

2002  Security Support

2008  Business Strategy

2004  Security Engineer

2012  Manager Wholesale
Cloud Services

2011  Security Architect

3 / 62
Portfolio Model:

the Technical portfolio does not stand alone, but
depends highly on the Commercial and Operational

portfolio for success of the total Portfolio

Technical
Portfolio

• Installation, Service & Maintainance
• Network Management
• Provisioning, capacity management

Operational
Portfolio
•
•
•
•

Technology assessment
Prototyping
Engineering
Technological Innovation

Commercial
Portfolio

• Product Development
• Marketing & Sales
• Forecasting

4 / 62
Bringing

to Life
Manage the game: Bringing Technology to Life

M

Technical

T
Operational

O

C
Commercial
5 / 62
Bringing

Tech …

Technical

Push

T

to Life

Manage

C

Commercial

Pull

M

Life …

6 / 62
Bringing

Tech …

Upcoming Technologies

… Innovation

Product or Service

M
+
Value
Creation

Risk
Control



Bringing

Push



T

to Life

Life …

C

Successful Deployment

… Adoption

Economical, Societal, Environmental
7 / 62
IMPACT of

on daily life
… Innovation

LTE

WiFi

VoIP
NFC

CLOUD

GPS

… Adoption
8 / 62
smaller, integrated
1983

, with cool looks
2013

… Innovation

… Adoption
9 / 62
IMPACT of

in a minute
… Innovation

… Adoption
10 / 62
Bringing

to Life

Assignment

Tech …

Assignment

T

Upcoming Technologies

1
1

2

Bringing

Product or Service

Life …

Choose Upcoming
… Innovation
Technology

Define New Service

2
3

M

4

Risk
Control

Identify Risks &
discuss Controls

4

+
Value
Creation

C

3

Predict Value
Creation

Successful Deployment
Economical, Societal, Environmental

5

5

Argue who will Pay for
… Adoption
the product or service
11 / 62

Más contenido relacionado

Destacado

Virginia Readers' Choice Booktalk
Virginia Readers' Choice BooktalkVirginia Readers' Choice Booktalk
Virginia Readers' Choice BooktalkJulie Esanu
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013Julie Esanu
 
Trio presentation-Jobs- Santa Matias
Trio presentation-Jobs- Santa MatiasTrio presentation-Jobs- Santa Matias
Trio presentation-Jobs- Santa MatiasSanta matias
 
Bringing-Technology-to-Life P.M. Westerhout Delft-University-of-Technology...
Bringing-Technology-to-Life   P.M. Westerhout  Delft-University-of-Technology...Bringing-Technology-to-Life   P.M. Westerhout  Delft-University-of-Technology...
Bringing-Technology-to-Life P.M. Westerhout Delft-University-of-Technology...Peter Maarten Westerhout
 

Destacado (8)

Cittadellarte
CittadellarteCittadellarte
Cittadellarte
 
2008 March G
2008 March G2008 March G
2008 March G
 
Virginia Readers' Choice Booktalk
Virginia Readers' Choice BooktalkVirginia Readers' Choice Booktalk
Virginia Readers' Choice Booktalk
 
INDES 2015 Schedule
INDES 2015 ScheduleINDES 2015 Schedule
INDES 2015 Schedule
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 
Trio presentation-Jobs- Santa Matias
Trio presentation-Jobs- Santa MatiasTrio presentation-Jobs- Santa Matias
Trio presentation-Jobs- Santa Matias
 
Jobs
JobsJobs
Jobs
 
Bringing-Technology-to-Life P.M. Westerhout Delft-University-of-Technology...
Bringing-Technology-to-Life   P.M. Westerhout  Delft-University-of-Technology...Bringing-Technology-to-Life   P.M. Westerhout  Delft-University-of-Technology...
Bringing-Technology-to-Life P.M. Westerhout Delft-University-of-Technology...
 

Similar a 2013 Delft Unifersity of Technology - course et4034 - Bringing Technology To Life - intro

Troubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IPTroubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IPLiving Online
 
Resume_Ching-Wen_Lin (29_June_2016)
Resume_Ching-Wen_Lin (29_June_2016)Resume_Ching-Wen_Lin (29_June_2016)
Resume_Ching-Wen_Lin (29_June_2016)Jessie Ching-Wen Lin
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Manolis Nikiforakis
 
Andrew Smith CV 28-11-16
Andrew Smith CV 28-11-16Andrew Smith CV 28-11-16
Andrew Smith CV 28-11-16Andrew Smith
 
James carroll curriculum vitae
James carroll   curriculum vitaeJames carroll   curriculum vitae
James carroll curriculum vitaeJames Carroll
 
Beng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CVBeng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CVBeng Chuan Lim
 
Matt Quinn CV Feb 2016
Matt Quinn CV Feb 2016Matt Quinn CV Feb 2016
Matt Quinn CV Feb 2016Matt Quinn
 
Website documents
Website documentsWebsite documents
Website documentsjayam19
 
GUDURU SWARUP - 8886345669
GUDURU SWARUP - 8886345669GUDURU SWARUP - 8886345669
GUDURU SWARUP - 8886345669Swarup Guduru
 
Matt Quinn CV May 2015
Matt Quinn CV May 2015Matt Quinn CV May 2015
Matt Quinn CV May 2015Matt Quinn
 
Parameshwar R_Profile JAN 2015
Parameshwar R_Profile  JAN  2015Parameshwar R_Profile  JAN  2015
Parameshwar R_Profile JAN 2015Parameshwar R
 
Industrial Training Report, Study of Power System of BEL
Industrial Training Report, Study of Power System of BELIndustrial Training Report, Study of Power System of BEL
Industrial Training Report, Study of Power System of BELHarsh Kumar Gautam
 
Anudeep nobleyeleti resume
Anudeep nobleyeleti resumeAnudeep nobleyeleti resume
Anudeep nobleyeleti resumeAnudeep Noble
 
Matt Brown - CV 2016 02 Rev A
Matt Brown - CV 2016 02 Rev AMatt Brown - CV 2016 02 Rev A
Matt Brown - CV 2016 02 Rev AMatt Brown
 
Muhammad Ishtiaq (Project Manager).2
Muhammad Ishtiaq (Project Manager).2Muhammad Ishtiaq (Project Manager).2
Muhammad Ishtiaq (Project Manager).2Ishtiaq Tabassum
 

Similar a 2013 Delft Unifersity of Technology - course et4034 - Bringing Technology To Life - intro (20)

Troubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IPTroubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IP
 
BRautenbach_CV
BRautenbach_CVBRautenbach_CV
BRautenbach_CV
 
Resume_Ching-Wen_Lin (29_June_2016)
Resume_Ching-Wen_Lin (29_June_2016)Resume_Ching-Wen_Lin (29_June_2016)
Resume_Ching-Wen_Lin (29_June_2016)
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
Andrew Smith CV 28-11-16
Andrew Smith CV 28-11-16Andrew Smith CV 28-11-16
Andrew Smith CV 28-11-16
 
James carroll curriculum vitae
James carroll   curriculum vitaeJames carroll   curriculum vitae
James carroll curriculum vitae
 
Beng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CVBeng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CV
 
Neha khadode
Neha khadodeNeha khadode
Neha khadode
 
Martin_Sabry_CV
Martin_Sabry_CVMartin_Sabry_CV
Martin_Sabry_CV
 
Matt Quinn CV Feb 2016
Matt Quinn CV Feb 2016Matt Quinn CV Feb 2016
Matt Quinn CV Feb 2016
 
Website documents
Website documentsWebsite documents
Website documents
 
GUDURU SWARUP - 8886345669
GUDURU SWARUP - 8886345669GUDURU SWARUP - 8886345669
GUDURU SWARUP - 8886345669
 
Matt Quinn CV May 2015
Matt Quinn CV May 2015Matt Quinn CV May 2015
Matt Quinn CV May 2015
 
Jerker Lessing & Rita Lavikka - Towards Sustainability Applying Industrialize...
Jerker Lessing & Rita Lavikka - Towards Sustainability Applying Industrialize...Jerker Lessing & Rita Lavikka - Towards Sustainability Applying Industrialize...
Jerker Lessing & Rita Lavikka - Towards Sustainability Applying Industrialize...
 
AEC Company profile 2015
AEC Company profile 2015AEC Company profile 2015
AEC Company profile 2015
 
Parameshwar R_Profile JAN 2015
Parameshwar R_Profile  JAN  2015Parameshwar R_Profile  JAN  2015
Parameshwar R_Profile JAN 2015
 
Industrial Training Report, Study of Power System of BEL
Industrial Training Report, Study of Power System of BELIndustrial Training Report, Study of Power System of BEL
Industrial Training Report, Study of Power System of BEL
 
Anudeep nobleyeleti resume
Anudeep nobleyeleti resumeAnudeep nobleyeleti resume
Anudeep nobleyeleti resume
 
Matt Brown - CV 2016 02 Rev A
Matt Brown - CV 2016 02 Rev AMatt Brown - CV 2016 02 Rev A
Matt Brown - CV 2016 02 Rev A
 
Muhammad Ishtiaq (Project Manager).2
Muhammad Ishtiaq (Project Manager).2Muhammad Ishtiaq (Project Manager).2
Muhammad Ishtiaq (Project Manager).2
 

Último

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

2013 Delft Unifersity of Technology - course et4034 - Bringing Technology To Life - intro

  • 1. Bringing to Life ! February 22nd 2013 How to create value and control risks when introducing new products & services based on upcoming communication technologies; All in order to improve the Quality of Life! Peter Maarten Westerhout Hong Gie Ong Course: Network Architectures and Business Models ET4034, Prof. Dr. Ir. N.H.G. Baken 1 / 62
  • 3. Peter Maarten Westerhout Hong Gie Ong Hong Gie Ong • Electrical Engineering (1994 - 2002) • Internship in Beijing, China: Microsoft Research • Master Thesis in Singapore: Center for Wireless Communication 2003  Product Manager 2002  Security Support 2008  Business Strategy 2004  Security Engineer 2012  Manager Wholesale Cloud Services 2011  Security Architect 3 / 62
  • 4. Portfolio Model: the Technical portfolio does not stand alone, but depends highly on the Commercial and Operational portfolio for success of the total Portfolio Technical Portfolio • Installation, Service & Maintainance • Network Management • Provisioning, capacity management Operational Portfolio • • • • Technology assessment Prototyping Engineering Technological Innovation Commercial Portfolio • Product Development • Marketing & Sales • Forecasting 4 / 62
  • 5. Bringing to Life Manage the game: Bringing Technology to Life M Technical T Operational O C Commercial 5 / 62
  • 7. Bringing Tech … Upcoming Technologies … Innovation Product or Service M + Value Creation Risk Control  Bringing Push  T to Life Life … C Successful Deployment … Adoption Economical, Societal, Environmental 7 / 62
  • 8. IMPACT of on daily life … Innovation LTE WiFi VoIP NFC CLOUD GPS … Adoption 8 / 62
  • 9. smaller, integrated 1983 , with cool looks 2013 … Innovation … Adoption 9 / 62
  • 10. IMPACT of in a minute … Innovation … Adoption 10 / 62
  • 11. Bringing to Life Assignment Tech … Assignment T Upcoming Technologies 1 1 2 Bringing Product or Service Life … Choose Upcoming … Innovation Technology Define New Service 2 3 M 4 Risk Control Identify Risks & discuss Controls 4 + Value Creation C 3 Predict Value Creation Successful Deployment Economical, Societal, Environmental 5 5 Argue who will Pay for … Adoption the product or service 11 / 62