e crime symposium june 10

247
Situation normal, everything must change

Upload: simon-wardley

Post on 20-Aug-2015

1.154 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: E Crime Symposium June 10

Situation normal, everything must

change

Page 2: E Crime Symposium June 10

Sccott Beale/Laughing Squid : http://www.flickr.com/photos/laughingsquid/

Page 3: E Crime Symposium June 10

Pain

Page 4: E Crime Symposium June 10

No. Slides

Pain

Page 5: E Crime Symposium June 10

No. Slides

Pain

OK

20 slides

Page 6: E Crime Symposium June 10

No. Slides

Pain

OK

Severerisk of harm

246 slides

Page 8: E Crime Symposium June 10

Cloud?

Page 9: E Crime Symposium June 10

Note 1: Cloud computing is still an evolving paradigm. Its definitions, use cases, underlying technologies, issues, risks, and benefits will be refined in a spirited debate by the public and private sectors. These definitions, attributes, and characteristics will evolve and change over time.

Note 2: The cloud computing industry represents a large ecosystem of many models, vendors, and market niches. This definition attempts to encompass all of the various cloud approaches.Definition of Cloud Computing:

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

Essential Characteristics:On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines.Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.

Service Models:Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).

Deployment Models:Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise.Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).Note: Cloud software takes full advantage of the cloud paradigm by being service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability.

Page 10: E Crime Symposium June 10

Point 1Cloud computing is still an evolving

paradigm.

Page 12: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

We don’t know what “cloud” is yet.

Page 13: E Crime Symposium June 10

“The real thing to do today is to capture, what are the dimensions of the thing that literally, I will tell you, we’re betting our

company on, and I think pretty much everybody in the technology industry is

betting their companies on”

Microsoft CEO, Steve Ballmer

Page 14: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

We don’t know what “cloud” is yet

Page 15: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

We don’t know what “cloud” is yet

but bet your company on it

Page 16: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

We don’t know what “cloud” is yet

but bet your company on it

everybody else is.

Page 17: E Crime Symposium June 10

“open up exciting new prospects for the

employment of computers in ways and on a scale that would have seemed pure

fantasy only five year ago”

Page 18: E Crime Symposium June 10

“The challenge of the computer utility” Douglas Parkhill

1966

Page 19: E Crime Symposium June 10

http://www.flickr.com/photos/radioflyer007/http://upload.wikimedia.org/wikipedia/en/5/51/Metropolis.jpg

Page 21: E Crime Symposium June 10
Page 22: E Crime Symposium June 10

Computer Utility Cloud Computing

Page 23: E Crime Symposium June 10

Change

Page 24: E Crime Symposium June 10

ChangeWhy now?

Page 25: E Crime Symposium June 10

ChangeWhy now?

Benefits & Risk

Page 26: E Crime Symposium June 10

ChangeWhy now?

Benefits & RiskGeneral

Page 27: E Crime Symposium June 10

ChangeWhy now?

Benefits & RiskGeneral

Managing Change

Page 28: E Crime Symposium June 10

Ubiquity

Page 29: E Crime Symposium June 10

Certainty

Ubiquity

Page 30: E Crime Symposium June 10

Certainty

Ubiquity

TV’s, Phones & VCRS

Page 31: E Crime Symposium June 10

Certainty

Ubiquity

TV’s, Phones & VCRS

Page 32: E Crime Symposium June 10

InnovationCertainty

Ubiquity

Page 33: E Crime Symposium June 10

Commodity

Certainty

Ubiquity

Page 34: E Crime Symposium June 10

Innovation of early lists, 1980.

Certainty

Ubiquity

Page 35: E Crime Symposium June 10

Custom built, DB MarketingMid 80s

Certainty

Ubiquity

Page 36: E Crime Symposium June 10

ProductEarly 90s

Certainty

Ubiquity

Page 37: E Crime Symposium June 10

Utility Services of Salesforce

Certainty

Ubiquity

Page 38: E Crime Symposium June 10

Product

Custom builtInnovation

Commodity

Utility Services

Certainty

Ubiquity

Page 39: E Crime Symposium June 10

Innovation of Z3, 1941Certainty

Ubiquity

Page 40: E Crime Symposium June 10

Custom Built LEO, 1946

Certainty

Ubiquity

Page 41: E Crime Symposium June 10

Products IBM 650, 1954

Certainty

Ubiquity

Page 42: E Crime Symposium June 10

Commodity Hardware

Certainty

Ubiquity

Page 43: E Crime Symposium June 10

Utility services of Amazon EC2

Certainty

Ubiquity

Page 44: E Crime Symposium June 10

Innovation of W. H. Wollaston, 1821

Certainty

Ubiquity

Page 45: E Crime Symposium June 10

Early Products, Hippolyte Pixii, 1830s

Certainty

Ubiquity

Page 46: E Crime Symposium June 10

Certainty

Ubiquity

Utility Services of the National

Grid

Page 47: E Crime Symposium June 10

Certainty

Ubiquity

Accounts

Payroll

HR systems

Information market

Enterprise 2.0

InfrastructureCRM

ERP

VRM

Electricity

Search Engines

Web Portal

Page 48: E Crime Symposium June 10

Certainty

Ubiquity

Commodi

tisation

Page 49: E Crime Symposium June 10
Page 53: E Crime Symposium June 10

Demand (user competition)

Certainty

Ubiquity

Page 57: E Crime Symposium June 10

Improvement (supply competition)

Certainty

Ubiquity

Demand (user competition)

Page 58: E Crime Symposium June 10

Commodi

tisation

Certainty

Ubiquity

Improvement (supply competition)

Demand (user competition)

Page 59: E Crime Symposium June 10

Certainty

Ubiquity

Page 60: E Crime Symposium June 10

Certainty

Ubiquity

Page 61: E Crime Symposium June 10

Widespread(Demand)

Feature Complete(Improvement)

Certainty

Ubiquity

Page 62: E Crime Symposium June 10

Certainty

Ubiquity

Utility Services

Page 63: E Crime Symposium June 10

Database Framework

Operating System

CPU Memory I/O

Messaging

Application

Virtualisation

Page 64: E Crime Symposium June 10

Database Framework

Operating System

Memory I/O

Messaging

Application

Virtualisation

Page 65: E Crime Symposium June 10

Database Framework

Operating System

Memory I/O

Messaging

Application

Virtualisation Infrastructure

Page 66: E Crime Symposium June 10

Database Framework

Operating System

Memory I/O

Messaging

Application

Virtualisation Infrastructure

Platform

Page 67: E Crime Symposium June 10

Database Framework

Operating System

Memory I/O

Messaging

Application

Virtualisation Infrastructure

Platform

Software

Page 68: E Crime Symposium June 10

Infrastructure

Platform

Software

... as aProduct

... as aService

Certainty

Ubiquity

Page 69: E Crime Symposium June 10

ChangeWhy now?

Page 70: E Crime Symposium June 10

Concept

Page 71: E Crime Symposium June 10

Concept

Suitability

Page 72: E Crime Symposium June 10

Concept

Suitability

Technology?

Page 73: E Crime Symposium June 10

Gerald J. Popek (1947-2008)

Page 74: E Crime Symposium June 10

Concept

Suitability

Technology

Attitude

?

Page 75: E Crime Symposium June 10

http://www.strassmann.com/Paul Strassmann

Page 76: E Crime Symposium June 10

Nick Carr

Page 77: E Crime Symposium June 10

Diminis

hing

strateg

ic valu

e

Certainty

Ubiquity

Page 78: E Crime Symposium June 10
Page 79: E Crime Symposium June 10

Payroll

HR Systems

CRMERP

Infrastructure

Finance & Accounting

Sales Automation

Page 80: E Crime Symposium June 10

Certainty

Ubiquity

PayrollHR

Page 81: E Crime Symposium June 10

Certainty

Ubiquity

PayrollHR

Why are we spending $600M p.a. on customising

stuff has no strategic value?

Page 82: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

Customise your payroll system!

Page 83: E Crime Symposium June 10

Certainty

Ubiquity

Way back when ...

Page 84: E Crime Symposium June 10

Certainty

Ubiquity

Way back when ...

Now

Page 85: E Crime Symposium June 10

Certainty

Ubiquity

Standardised Service!

Page 86: E Crime Symposium June 10

Certainty

Ubiquity

Marketplace

Standardised Service!

Page 87: E Crime Symposium June 10

Concept

Suitability

Technology

Attitude

Page 88: E Crime Symposium June 10

Infrastructure

Platform

Software

... as aProduct

... as aService

Certainty

Ubiquity

Page 89: E Crime Symposium June 10

ChangeWhy now?

Benefits & Risk

Page 90: E Crime Symposium June 10

Certainty

Ubiquity

Early UtilityWestinghouse,

1890s

Product Hippolyte Pixii,

1830s

Page 91: E Crime Symposium June 10

Certainty

Ubiquity

Economies of scale(volume operations)

Page 92: E Crime Symposium June 10

Certainty

Ubiquity

Economies of scale(volume operations)

Focus on core (outsource)

Page 93: E Crime Symposium June 10

Certainty

Ubiquity

Economies of scale(volume operations)

Focus on core (outsource)

Pay per use (utility)

Page 94: E Crime Symposium June 10

Certainty

Ubiquity

Economies of scale(volume operations)

Focus on core (outsource)

Pay per use (utility)

Page 95: E Crime Symposium June 10

Certainty

Ubiquity

efficiency

Page 96: E Crime Symposium June 10

Certainty

Ubiquity

Agility (Self Service)

Page 97: E Crime Symposium June 10

New server

64 node cluster

Previous Time(mins)

72,000

130,000

Page 98: E Crime Symposium June 10

New server

64 node cluster

Previous Time(mins)

Cloud Time(mins)

72,000

130,000

7

15

Page 99: E Crime Symposium June 10

Certainty

Ubiquity

Agility (Self Service)

Innovation (creative destruction, componentisation)

Page 100: E Crime Symposium June 10

Joseph A. Schumpeter (1883 - 1950)

The fundamental impulse that sets and keeps the capitalist engine in motion comes from the new consumers, goods, the new methods of production or transportation, the new markets, the new forms of industrial organization that capitalist enterprise creates.

Page 101: E Crime Symposium June 10

The fundamental impulse that sets and keeps the capitalist engine in motion comes from the new consumers, goods, the new methods of production or transportation, the new markets, the new forms of industrial organization that capitalist enterprise creates.

Joseph A. Schumpeter (1883 - 1950)

newnew

newnew

Page 102: E Crime Symposium June 10

Joseph A. Schumpeter (1883 - 1950)

Creative Destruction

Page 103: E Crime Symposium June 10

Erodin

g Valu

e

Certainty

Ubiquity

Page 104: E Crime Symposium June 10

Erodin

g Valu

e

EnablesInnovation

Certainty

Ubiquity

Page 105: E Crime Symposium June 10

ElectricityInternet

Certainty

Ubiquity

Hardware

Page 106: E Crime Symposium June 10

Electricity

Hardware

Internet

Search

Certainty

Ubiquity

EnableInnovation

Page 107: E Crime Symposium June 10

Certainty

Ubiquity

EnableInnovation

Infrastructure

Platform

Software

Page 108: E Crime Symposium June 10

Theory of Hierarchy Componentisation

Herbert A. Simon (1916 - 2001)

Page 109: E Crime Symposium June 10

Rate of evolution of a system is

dependant upon the organisation of its subsystems.

Herbert A. Simon (1916 - 2001)

Page 110: E Crime Symposium June 10

Application

Page 111: E Crime Symposium June 10

Database Framework Messaging

Application

Page 112: E Crime Symposium June 10

Database Framework

Operating System

CPU Memory I/O

Messaging

Application

Virtualisation

Page 113: E Crime Symposium June 10

Database Framework

Operating System

CPU Memory I/O

Messaging

Application

Virtualisation

Page 114: E Crime Symposium June 10

CPU

Application

Orders of Magnitude

Page 115: E Crime Symposium June 10

Certainty

Ubiquity

AcceleratedInnovation

Infrastructure

Platform

Software

Page 116: E Crime Symposium June 10
Page 117: E Crime Symposium June 10

Henry Maudslay(1771 - 1831)

Page 118: E Crime Symposium June 10

Agility (Self Service)

Certainty

Opportunity(long tail, co-evolution, price elasticity)

Ubiquity

Innovation (creative destruction, componentisation)

Page 119: E Crime Symposium June 10

Projects

Impo

rtan

ce

Limit of IT

Page 120: E Crime Symposium June 10

Projects

Impo

rtan

ce

Limit of IT

demand(backlog)

Page 121: E Crime Symposium June 10

Quantity

Price

!P

!Q

Page 122: E Crime Symposium June 10

InnovationFlemming Valve, 1904

Certainty

Ubiquity

Page 123: E Crime Symposium June 10

ProductsIntel 4004, 2300 Transistors, 1971

Certainty

Ubiquity

Page 124: E Crime Symposium June 10

Busicom

Page 125: E Crime Symposium June 10

MCS-4

Busicom

Page 126: E Crime Symposium June 10

MCS-4

Busicom

Co-Evolution

Page 127: E Crime Symposium June 10

> 1,000,000,000,000,000,000

Page 128: E Crime Symposium June 10

Agility (Self Service)

Certainty

Opportunity(long tail, co-evolution, price elasticity)

Ubiquity

Innovation (creative destruction, componentisation)

Page 129: E Crime Symposium June 10

Certainty

Ubiquity

consumption

Page 130: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

It’ll reduce your IT spend.

Page 131: E Crime Symposium June 10

consumption

efficiency

Page 132: E Crime Symposium June 10

William Stanley Jevons, 1865

“Jevons Paradox”

Technological progress that increases the

efficiency with which a resource is used, tends to

increase the rate of consumption of that

resource.

Page 133: E Crime Symposium June 10

Choice?

Page 134: E Crime Symposium June 10

Market

Certainty

Ubiquity

You

Page 135: E Crime Symposium June 10

Market

Competitive Gap

Certainty

Ubiquity

You

Page 136: E Crime Symposium June 10

Market

Speed to marketEconomies of scaleFocus on core

Pay per use

Accelerated innovation

Certainty

Ubiquity

You

Page 137: E Crime Symposium June 10

Pres

sure

Certainty

Ubiquity

Market

You

Page 138: E Crime Symposium June 10

Pres

sure

Prof. Van Valen “Red Queen Hypothesis”

Certainty

Ubiquity

Market

You

Page 139: E Crime Symposium June 10

“Red Queen Hypothesis”

The need to constantly evolve in order to stand

still relative to a surrounding ecosystem

Prof. Van Valen

Page 143: E Crime Symposium June 10

No Choice?

Page 144: E Crime Symposium June 10

Certainty

Ubiquity

Marketplace

Page 145: E Crime Symposium June 10

Certainty

Ubiquity

Private

Marketplace

Page 146: E Crime Symposium June 10

Certainty

Ubiquity

Hybrid

Page 147: E Crime Symposium June 10

Certainty

Ubiquity

Transition

GovernanceTrust

Confusion

TransparencySecurity

Page 148: E Crime Symposium June 10

Transition

GovernanceTrust

Confusion

Transparency

CompetitionLock-inSecond SourceControl

SuitabilityOutsourcing

Security

Certainty

Ubiquity

Page 149: E Crime Symposium June 10

Certainty

Ubiquity

Transitional Risks Security of supply, governance, trust ... Hybrid

Page 150: E Crime Symposium June 10

Certainty

Ubiquity

Page 151: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

Only public cloud is cloud computing!

Page 152: E Crime Symposium June 10

vsBenefits Risks

Page 153: E Crime Symposium June 10

Recap

Page 154: E Crime Symposium June 10

... as aService

Infrastructure

Platform

Software

... as aProduct

Certainty

Ubiquity

Page 155: E Crime Symposium June 10

Concept

Suitability

Technology

Attitude

Page 156: E Crime Symposium June 10

Certainty

Ubiquity

AcceleratedInnovation

Infrastructure

Platform

Software

Page 157: E Crime Symposium June 10

Transition

GovernanceTrust

Confusion

Transparency

CompetitionLock-inSecond SourceControl

SuitabilityOutsourcing

Security

Certainty

Ubiquity

Page 158: E Crime Symposium June 10

Pres

sure

Prof. Van Valen “Red Queen Hypothesis”

Certainty

Ubiquity

Market

You

Page 160: E Crime Symposium June 10

Certainty

Ubiquity

Hybrid

Page 161: E Crime Symposium June 10

vsBenefits Risks

Page 162: E Crime Symposium June 10

ChangeWhy now?

Benefits & RiskGeneral

Page 163: E Crime Symposium June 10

IT

Certainty

Ubiquity

Page 164: E Crime Symposium June 10

Certainty

Ubiquity

Page 165: E Crime Symposium June 10

Certainty

Ubiquity

Infrastructure

Page 166: E Crime Symposium June 10

Certainty

Ubiquity

Infrastructure

Collective Intelligence

Enables

Page 167: E Crime Symposium June 10

Certainty

Ubiquity

built on ...

provided as ..

Page 168: E Crime Symposium June 10

Certainty

Ubiquity

Page 169: E Crime Symposium June 10

Certainty

Ubiquity

Hybrid

Page 170: E Crime Symposium June 10
Page 171: E Crime Symposium June 10
Page 172: E Crime Symposium June 10

Data

Code

Page 173: E Crime Symposium June 10

Data

Code

Page 174: E Crime Symposium June 10
Page 175: E Crime Symposium June 10

Proprietary Open Source

Page 176: E Crime Symposium June 10

Proprietary Open Source

TCO

Page 177: E Crime Symposium June 10

Proprietary Open Source

Exit

Page 178: E Crime Symposium June 10

defacto public standard

open source implementation

Minimise future costs

Page 179: E Crime Symposium June 10

ChangeWhy now?

Benefits & RiskGeneral

Managing Change

Page 180: E Crime Symposium June 10

Certainty

Ubiquity

Accounts

Payroll

HR systems

Information market

Enterprise 2.0

InfrastructureCRM

ERP

VRM

Electricity

Search Engines

Web Portal

Page 181: E Crime Symposium June 10

Certainty

Ubiquity

Accounts

Payroll

HR systems

Information market

Enterprise 2.0

InfrastructureCRM

ERP

VRM

Electricity

Search Engines

Web Portal

Page 182: E Crime Symposium June 10

Lifecycle

Page 183: E Crime Symposium June 10

Lifecycle

#

Page 184: E Crime Symposium June 10

Lifecycle

#

Page 185: E Crime Symposium June 10

Lifecycle

#

Payroll

HR systems

Infrastructure

CRM

Electricity

Page 186: E Crime Symposium June 10

Lifecycle

#

Information market

Enterprise 2.0

VRM

Page 187: E Crime Symposium June 10

Lifecycle

#

Demand vs Suppply CompetitionCo-evolution

Commoditisation

Page 188: E Crime Symposium June 10

Lifecycle

#

CommoditisationDemand vs Suppply Competition

Co-evolution

InnovationCreative DestructionComponentisation

Page 189: E Crime Symposium June 10

Lifecycle

#

Page 190: E Crime Symposium June 10

Lifecycle

#

Dynamic

Page 191: E Crime Symposium June 10

Lifecycle

#

DeviationDynamic

Page 192: E Crime Symposium June 10

Lifecycle

#

DeviationDynamic

Uncertain

Page 193: E Crime Symposium June 10

Lifecycle

#

Emergent

DeviationDynamic

Uncertain

Page 194: E Crime Symposium June 10

Lifecycle

#

Emergent

DeviationDynamic

Serendipty

Uncertain

Page 195: E Crime Symposium June 10

Lifecycle

#

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Page 196: E Crime Symposium June 10

Lifecycle

#

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic

Page 197: E Crime Symposium June 10

Lifecycle

#

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 198: E Crime Symposium June 10

Lifecycle

#

Repeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 199: E Crime Symposium June 10

Lifecycle

#

StandardisedRepeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 200: E Crime Symposium June 10

Lifecycle

#

StandardisedKnown

Repeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 201: E Crime Symposium June 10

Lifecycle

#

Predictable

StandardisedKnown

Repeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 202: E Crime Symposium June 10

Lifecycle

#

ProceduralPredictable

StandardisedKnown

Repeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 203: E Crime Symposium June 10

Lifecycle

#

ProceduralPredictable

CODB

StandardisedKnown

Repeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 204: E Crime Symposium June 10

Lifecycle

#

ProceduralPredictable

CODB

StandardisedKnown

Repeatable

Emergent

Competive Adv.

DeviationDynamic

Serendipty

Uncertain

Chaotic Linear

Page 205: E Crime Symposium June 10

Chaotic Linear

Lifecycle

#

Innovation of early lists, 1980.

Utility Services of Salesforce

Page 206: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

Use Six Sigma!

Page 207: E Crime Symposium June 10

Lifecycle

# Six Sigma

Page 208: E Crime Symposium June 10

Lifecycle

#

Predictable

StandardisedKnown

RepeatableSix Sigma

Page 209: E Crime Symposium June 10

Lifecycle

#

Emergent

DeviationDynamic

Uncertain

Six Sigma

Page 210: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

Use Six Sigma!

No! Use Agile!

Page 211: E Crime Symposium June 10

Lifecycle

#

Emergent

DeviationDynamic

Uncertain

Agile

Page 212: E Crime Symposium June 10

Agile

Lifecycle

#

Predictable

StandardisedKnown

Repeatable

Page 213: E Crime Symposium June 10

Lifecycle

#

No Magic Bullet

Page 214: E Crime Symposium June 10

Lifecycle

#

Joseph A. Schumpeter (1883 - 1950)

Page 215: E Crime Symposium June 10

Lifecycle

#

Joseph A. Schumpeter (1883 - 1950)

Prof. Van Valen

Page 216: E Crime Symposium June 10

Survival today requires ‘coherence, coordination and stability’.

Survival tomorrow requires the replacement of these erstwhile virtues.

Salaman & Storey

Innovation Paradox

Page 217: E Crime Symposium June 10

http://www.flickr.com/photos/rainbowproject/3928445074/

One Size fits all!

Page 218: E Crime Symposium June 10

Product

Custom builtInnovation

Commodity

Utility Services

Certainty

Ubiquity

Page 219: E Crime Symposium June 10

Lifecycle

#

Page 220: E Crime Symposium June 10

Lifecycle

#

Six Sigma

Page 221: E Crime Symposium June 10

Lifecycle

#

Page 222: E Crime Symposium June 10

Lifecycle

#

Outsource

Page 223: E Crime Symposium June 10

Lifecycle

#

Why are we spending $600M p.a. on customising

stuff has no strategic value?

Page 224: E Crime Symposium June 10

Lifecycle

#

Infrastructure

Platform

Software

Page 225: E Crime Symposium June 10

Lifecycle

#

Innovation

Infrastructure

Platform

Software

Page 226: E Crime Symposium June 10

Lifecycle

#

“Provided as” “Built on”

Page 233: E Crime Symposium June 10

Recap

Page 234: E Crime Symposium June 10

... as aService

Infrastructure

Platform

Software

... as aProduct

Certainty

Ubiquity

Page 235: E Crime Symposium June 10

Concept

Suitability

Technology

Attitude

Page 236: E Crime Symposium June 10

Certainty

Ubiquity

AcceleratedInnovation

Infrastructure

Platform

Software

Page 237: E Crime Symposium June 10

Transition

GovernanceTrust

Confusion

Transparency

CompetitionLock-inSecond SourceControl

SuitabilityOutsourcing

Security

Certainty

Ubiquity

Page 238: E Crime Symposium June 10

consumption

efficiency

Page 239: E Crime Symposium June 10

Pres

sure

Prof. Van Valen “Red Queen Hypothesis”

Certainty

Ubiquity

Market

You

Page 241: E Crime Symposium June 10

Certainty

Ubiquity

Hybrid

Page 242: E Crime Symposium June 10

vsBenefits Risks

Page 243: E Crime Symposium June 10

defacto public standard

open source implementation

Minimise future costs

Page 244: E Crime Symposium June 10

Lifecycle

#

“Provided as” “Built on”

Page 246: E Crime Symposium June 10

Lifecycle

#

CommoditisationDemand vs Suppply Competition

Co-evolution

InnovationCreative DestructionComponentisation

Page 247: E Crime Symposium June 10

Leading Edge Forum 06/08/10 02:53 AM

The annual LEF EP Study Tour this year will focus on the rapid evolution of IT consumerization – In terms of driving business change

2010 Study Tour – Surf the Change or Be Swept Away – Consumerization, Mobility, and the Cloud

• How do we treat IT-savvy employees and customers – in terms of their technology decision rights?

• How do we promote business value add in terms of social networking tool usage? – without “heavy handed “ IT governance?

• What information sharing rules need to be changed in an era of increased external collaboration?

• How do we make it easier for staff to leverage cloud computing services? – while maintaining enterprise discipline around security and risk?

Some Key Questions To Be Addressed

17 – 22 October 2010San Francisco, USA

For more information, visit: http://lef.csc.com/events/studytour