SlideShare a Scribd company logo
1 of 23
Let’s Get Cirrus
About Personal Clouds
pCloud & VRM Day
21 October 2013, Mountain View, CA

T.Rob Wyatt - t.rob@ioptconsulting.com and @tdotrob
And yes, I know those are not cirrus clouds. But I took the photo and I own the rights.
These are: My. Personal. Clouds.
IBM 4381 - 1987

•
•
•
•

Up to Dual 32-Bit CPU
Up to 64k Cache
Up to 32-Bit I/O Bus
Up to 3 MBs I/O Channels

•
•
•
•

15 MHz CPU (68 ns cycle)
Math co-processor available
Up to 64 MB memory
$890,000 and up

I started my career in IT as a Computer Operator on one of these.
Photo & specs source: http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP4381.html
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 2
Motorola Razr Maxx HD - 2013

•
•
•
•
•

Dual 32-Bit CPU
32k L1 Cache
1MB L2 Cache
1GB RAM
32-Bit I/O Bus

•
•
•
•
•

1.7 GHz CPU (1.7 ns cycle)
60 MBs USB 2.0
Graphics co-processor
Up to 64 GB memory
$199 and up

I currently own one of these.
Source: http://www.phonearena.com/phones/Motorola-DROID-RAZR-MAXX-HD_id7484
http://www.qualcomm.com/snapdragon/processors/800-600-400-200/specs
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 3
Development and Operation Costs

•
•
•
•
•
•

$$ - OS/390
$$ - DB2
$$ - COBOL
$$ - Disk
$$ - Channel Controller
$$ - Networking

Android OS
MySQL
Java
Micro SDHC
USB 2.0
4G LTE

Included in price

Millions of $$
10/21/2013 Mountain View, CA

•
•
•
•
•
•

pCloud & VRM Day, IIW XVII

Page 4
Wait! What?

•
•
•
•
•
•

CICS – Transaction processing
UPC Codes – Retail checkout
SAP – CRM
MAPPER – Decision Support
SABRE – Travel booking
SAS – Business analytics

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

•
•
•
•
•
•

Angry Birds
Pandora
Netflix
Twitter
Facebook
Ben the talking dog

Page 5
Evolutionary software model
Vacuum Tube

Today’s data &
control model…

Transistor
Integrated Circuit

VLSI

…was designed on the constraints of
yesteryear’s technology.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 6
Evolutionary legacy
• Business software run by
business, for business.
• Your data is held by the
business for their use.
• You have no say over what is
collected or how it is used.

When all this started, it could not
have worked any other way.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 7
Revolutionary opportunity
What would the data & control model
for business software
have looked like
if it was designed at a time
when ordinary people
had access to a mainframe
in their pocket?

Let’s find out!
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 8
It’s our turn!
Mainframe business software transformed
commerce on a global scale.
Personal computing software
applied to business applications
can transform commerce on a global scale
again.

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 9
But wait, there’s more!

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 10
Privacy, sovereignty
Personal computing software,
in the hands of individuals,
that collects and processes their data locally,
and honors the owner’s access policies
opens the door to applications
that you would not dare
to farm out to a 3rd party.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 11
Hey! Wait a minute!
Where do personal clouds
fit into all of this?
The session agenda said
“Personal Clouds,” dammit!
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 12
Fair enough. But before we go on…
Please write down your name and the answers to 5 or so of
these questions and pass them forward to me.

Have you ever
been arrested

How much money
do you make?

What medications do you
take regularly?
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 13
That’s personal!
The phrase “that’s
personal” is universally
understood.

It means “that
information is none of
your business.”

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 14
“Personal” is that which you control!
What makes a cloud personal is
that the owner, that’s YOU if it is
your personal cloud, has the
ultimate say over the data stored
there, how that data is used, and
who it is shared with.
A big part of the attraction is that you can decide what to
share, with whom to share it and can revoke that access later.
But an oft overlooked aspect is that you are no longer
dependent on the vendor for every fix, enhancement, or
integration. Personal Cloud invites innovation.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 15
So, what is a “cloud”?
A computer system with…
• Elasticity: Dynamic allocation of
resources.
• Redundancy: Increased availability.
• Resiliency: Survives loss of some
components.
• Run-time resolution: Resources, identities and addresses
are resolved dynamically.
• Ubiquity: Accessible from all points within a given scope.
• Abstraction. Logical connection destination.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 16
Personal + Cloud =

If you know what personal is and you know what cloud is,
just stick them together and you get Personal Cloud.
It really is that simple.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 17
For the skeptics in the room…
Forget about business apps for a moment.
Soon, even the most mundane of objects
will be instrumented.
Who should own and
benefit from all that
personal data collected
about you? Shouldn’t YOU
be the primary stakeholder in your own data?
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 18
IoT current trajectory

Because, at least for now, you are definitely not the primary stakeholder of your own data.
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 19
Personal Cloud can be:
•
•
•
•
•
•
•
•

Commercial transactions
Providing signal back to vendors
Experiential data (job history, health data)
Digital model of real-world state (social graph)
Quantified Self
Instrumented devices
Decision Support
Personal and Business Analytics
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 20
Personal Cloud Opportunities
•
•
•
•
•
•

Hosting software
Applications
Data aggregation & integration
Hosted apps & plugins
Retro-fit
Identity and authentication frameworks

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 21
Thank you!
Questions? Comments? Rotten tomatoes?
T.Rob Wyatt
t.rob@ioptconsulting.com
https://ioptconsulting.com
https://t-rob.net
https://linkedin.com/in/tdotrob
https://facebook.com/tdotrob
10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

Page 22
http://personal-clouds.org
http://pde.cc
http://customercommons.org
http://projectvrm.org

10/21/2013 Mountain View, CA

pCloud & VRM Day, IIW XVII

23

More Related Content

What's hot

Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureLuis Grangeia
 
Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)alengadan
 
Prototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of ThingsPrototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of Thingsalengadan
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...Tokyo University of Science
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsSecuRing
 
Prototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of ThingsPrototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of Thingsalengadan
 
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Howto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  WepHowto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  Wep
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy WepPraveen Kumar Sinha
 
The Web of Things in Practice
The Web of Things in PracticeThe Web of Things in Practice
The Web of Things in PracticeDominique Guinard
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyPrasanna Kumar Valluri
 
Web of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the WebWeb of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the WebDominique Guinard
 
Weiqi and InfoSec
Weiqi and InfoSecWeiqi and InfoSec
Weiqi and InfoSecChuan Lin
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 

What's hot (18)

Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)
 
Prototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of ThingsPrototyping Online Components(Part 01)_Internet of Things
Prototyping Online Components(Part 01)_Internet of Things
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
 
Prototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of ThingsPrototyping Online Components(Part 02)_Internet of Things
Prototyping Online Components(Part 02)_Internet of Things
 
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Howto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  WepHowto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  Wep
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
 
The Web of Things in Practice
The Web of Things in PracticeThe Web of Things in Practice
The Web of Things in Practice
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective Study
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Web of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the WebWeb of Things - Connecting People and Objects on the Web
Web of Things - Connecting People and Objects on the Web
 
Weiqi and InfoSec
Weiqi and InfoSecWeiqi and InfoSec
Weiqi and InfoSec
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
Security
SecuritySecurity
Security
 

Viewers also liked

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)T.Rob Wyatt
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityT.Rob Wyatt
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0Matthew White
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
 

Viewers also liked (8)

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of Mediocrity
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
 
IBM MQ V8 Security
IBM MQ V8 SecurityIBM MQ V8 Security
IBM MQ V8 Security
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep Dive
 

Similar to Let’s Get Cirrus About Personal Clouds

Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Boris Adryan
 
3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge Computing3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge ComputingBernard Marr
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology TrendsSynergisIT
 
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...Dana Gardner
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Bernard Marr
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Guido Schmutz
 
Big Data
Big DataBig Data
Big DataBBDO
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-dataglittaz
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013Brian Crotty
 
Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10Simon Wardley
 
Situation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesdaySituation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesdaySimon Wardley
 
The Impact of the Cloud On BC
The Impact of the Cloud On BCThe Impact of the Cloud On BC
The Impact of the Cloud On BCTonya Tronco
 
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud -  Click Digital Expo 2016 - Jamin AndrewsBeyond the Cloud -  Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud - Click Digital Expo 2016 - Jamin AndrewsJamin Andrews
 
Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019Abdel Moneim Emad
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsRamakant Gawande
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 

Similar to Let’s Get Cirrus About Personal Clouds (20)

Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16
 
3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge Computing3 Advantages (And 1 Disadvantage) Of Edge Computing
3 Advantages (And 1 Disadvantage) Of Edge Computing
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
 
Big Data - CRM's Promise Land
Big Data - CRM's Promise LandBig Data - CRM's Promise Land
Big Data - CRM's Promise Land
 
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
Legacy IT Evolves: How Cloud Choices Like Microsoft Azure Can Conquer the VMw...
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
 
Big Data
Big DataBig Data
Big Data
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-data
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
 
Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10Situation Normal - UKUUG Mar'10
Situation Normal - UKUUG Mar'10
 
Situation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesdaySituation Normal - Presentation at NottTuesday
Situation Normal - Presentation at NottTuesday
 
The Impact of the Cloud On BC
The Impact of the Cloud On BCThe Impact of the Cloud On BC
The Impact of the Cloud On BC
 
Simon Wardley
Simon WardleySimon Wardley
Simon Wardley
 
Internet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazineInternet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazine
 
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud -  Click Digital Expo 2016 - Jamin AndrewsBeyond the Cloud -  Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
 
Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019Intercom Engineers Careers 23-03-2019
Intercom Engineers Careers 23-03-2019
 
Pdf docu
Pdf docuPdf docu
Pdf docu
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
 
Security that works
Security that worksSecurity that works
Security that works
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Let’s Get Cirrus About Personal Clouds

  • 1. Let’s Get Cirrus About Personal Clouds pCloud & VRM Day 21 October 2013, Mountain View, CA T.Rob Wyatt - t.rob@ioptconsulting.com and @tdotrob And yes, I know those are not cirrus clouds. But I took the photo and I own the rights. These are: My. Personal. Clouds.
  • 2. IBM 4381 - 1987 • • • • Up to Dual 32-Bit CPU Up to 64k Cache Up to 32-Bit I/O Bus Up to 3 MBs I/O Channels • • • • 15 MHz CPU (68 ns cycle) Math co-processor available Up to 64 MB memory $890,000 and up I started my career in IT as a Computer Operator on one of these. Photo & specs source: http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP4381.html 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 2
  • 3. Motorola Razr Maxx HD - 2013 • • • • • Dual 32-Bit CPU 32k L1 Cache 1MB L2 Cache 1GB RAM 32-Bit I/O Bus • • • • • 1.7 GHz CPU (1.7 ns cycle) 60 MBs USB 2.0 Graphics co-processor Up to 64 GB memory $199 and up I currently own one of these. Source: http://www.phonearena.com/phones/Motorola-DROID-RAZR-MAXX-HD_id7484 http://www.qualcomm.com/snapdragon/processors/800-600-400-200/specs 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 3
  • 4. Development and Operation Costs • • • • • • $$ - OS/390 $$ - DB2 $$ - COBOL $$ - Disk $$ - Channel Controller $$ - Networking Android OS MySQL Java Micro SDHC USB 2.0 4G LTE Included in price Millions of $$ 10/21/2013 Mountain View, CA • • • • • • pCloud & VRM Day, IIW XVII Page 4
  • 5. Wait! What? • • • • • • CICS – Transaction processing UPC Codes – Retail checkout SAP – CRM MAPPER – Decision Support SABRE – Travel booking SAS – Business analytics 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII • • • • • • Angry Birds Pandora Netflix Twitter Facebook Ben the talking dog Page 5
  • 6. Evolutionary software model Vacuum Tube Today’s data & control model… Transistor Integrated Circuit VLSI …was designed on the constraints of yesteryear’s technology. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 6
  • 7. Evolutionary legacy • Business software run by business, for business. • Your data is held by the business for their use. • You have no say over what is collected or how it is used. When all this started, it could not have worked any other way. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 7
  • 8. Revolutionary opportunity What would the data & control model for business software have looked like if it was designed at a time when ordinary people had access to a mainframe in their pocket? Let’s find out! 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 8
  • 9. It’s our turn! Mainframe business software transformed commerce on a global scale. Personal computing software applied to business applications can transform commerce on a global scale again. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 9
  • 10. But wait, there’s more! 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 10
  • 11. Privacy, sovereignty Personal computing software, in the hands of individuals, that collects and processes their data locally, and honors the owner’s access policies opens the door to applications that you would not dare to farm out to a 3rd party. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 11
  • 12. Hey! Wait a minute! Where do personal clouds fit into all of this? The session agenda said “Personal Clouds,” dammit! 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 12
  • 13. Fair enough. But before we go on… Please write down your name and the answers to 5 or so of these questions and pass them forward to me. Have you ever been arrested How much money do you make? What medications do you take regularly? 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 13
  • 14. That’s personal! The phrase “that’s personal” is universally understood. It means “that information is none of your business.” 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 14
  • 15. “Personal” is that which you control! What makes a cloud personal is that the owner, that’s YOU if it is your personal cloud, has the ultimate say over the data stored there, how that data is used, and who it is shared with. A big part of the attraction is that you can decide what to share, with whom to share it and can revoke that access later. But an oft overlooked aspect is that you are no longer dependent on the vendor for every fix, enhancement, or integration. Personal Cloud invites innovation. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 15
  • 16. So, what is a “cloud”? A computer system with… • Elasticity: Dynamic allocation of resources. • Redundancy: Increased availability. • Resiliency: Survives loss of some components. • Run-time resolution: Resources, identities and addresses are resolved dynamically. • Ubiquity: Accessible from all points within a given scope. • Abstraction. Logical connection destination. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 16
  • 17. Personal + Cloud = If you know what personal is and you know what cloud is, just stick them together and you get Personal Cloud. It really is that simple. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 17
  • 18. For the skeptics in the room… Forget about business apps for a moment. Soon, even the most mundane of objects will be instrumented. Who should own and benefit from all that personal data collected about you? Shouldn’t YOU be the primary stakeholder in your own data? 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 18
  • 19. IoT current trajectory Because, at least for now, you are definitely not the primary stakeholder of your own data. 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 19
  • 20. Personal Cloud can be: • • • • • • • • Commercial transactions Providing signal back to vendors Experiential data (job history, health data) Digital model of real-world state (social graph) Quantified Self Instrumented devices Decision Support Personal and Business Analytics 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 20
  • 21. Personal Cloud Opportunities • • • • • • Hosting software Applications Data aggregation & integration Hosted apps & plugins Retro-fit Identity and authentication frameworks 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 21
  • 22. Thank you! Questions? Comments? Rotten tomatoes? T.Rob Wyatt t.rob@ioptconsulting.com https://ioptconsulting.com https://t-rob.net https://linkedin.com/in/tdotrob https://facebook.com/tdotrob 10/21/2013 Mountain View, CA pCloud & VRM Day, IIW XVII Page 22