it evolution & revolutionstaff.washington.edu/gray/talks/2010/it-evo.pdf35 security changing...
TRANSCRIPT
![Page 1: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/1.jpg)
IT Evolution & RevolutionRecognizing the “next new thing” vs.
“deja vu all over again” in order to divine and define the future of IT.
Terry Gray, PhDAssociate VP, Technology Strategy
University of Washington
April 2010
![Page 2: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/2.jpg)
2
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 3: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/3.jpg)
3
Information TechnologyInformation Technology
IT =
Inevitable Tensions?
Infinite Transitions?
Ironic Truisms?
√√
√√
√√
Yep, all of the above!
![Page 4: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/4.jpg)
4
Technology VisionTechnology Vision
Access to all available resources*
– any time, any place, via any device
– quickly, simply, safely, surely
* Resources include information, people, services, tools
Building on the work of prior visionaries, e.g. Bush, Licklider, Fuller...
![Page 5: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/5.jpg)
Bush's MEMEX (1945)Bush's MEMEX (1945)anticipating hypertext & the web
Vannevar Bush
![Page 6: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/6.jpg)
Bucky's World Game (1965)Bucky's World Game (1965)think “GIS meets the Web”
R. Buckminster Fuller
![Page 7: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/7.jpg)
7
Defining vs. Divining the FutureDefining vs. Divining the Future “The best way to predict the future is to invent it.”
(Moliere, Peter Drucker, Alan Kay...)
Innovation often needs organizational “slush” Tight budgets undermine innovation Tight budgets necessitate innovation
Three kinds of innovation (Judy Estrin) Breakthrough, incremental, orthogonal
Central IT imperative: avoid insularity & entitlement Exposure to external forces/trends/alternatives Experiment yourself, and watch other's ! Listen, lead, challenge assumptions & current patterns
Huh??
![Page 8: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/8.jpg)
8
IT Themes & MemesIT Themes & Memes
Mobile Global Green Open Self-service 24x7 Overwhelmed Interactive Risky
Community Cloud-sourced Crowd-sourced Collaborative / Social Personalized Virtualized Web-based Federated Agile
![Page 9: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/9.jpg)
9
The Yin & Yang of ITThe Yin & Yang of ITpolarity mgt or “schizophrenia is a way of life”polarity mgt or “schizophrenia is a way of life”
Physical infrastructure – Intellectual infrastructureSingle Standard – “A thousand flowers”
Homogeneous – HeterogeneousMonolithic - Modular
Distributed – CentralizedCommodity – Customized
Consumer – EnterpriseHigh touch – Self service
Adequate – ExcellentControlled – Chaotic
Agile – FragileTiny – Massive
![Page 10: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/10.jpg)
10
There's something happenin' hereThere's something happenin' here
![Page 11: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/11.jpg)
11
Unknown UnknownsUnknown UnknownsWhen is Past Prelude?When is Past Prelude?
Cycles or Singularities?
![Page 12: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/12.jpg)
12
Technology RevolutionsTechnology Revolutions
An instrument of “creative destruction”(Schumpeter: Capitalism, Socialism and Democracy -1942)
Measured by:In business, the number of stock options that are now worthlessIn academia, the size of the closets storing obsolete gear
![Page 13: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/13.jpg)
13
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 14: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/14.jpg)
14
Taxonomy of ChangeTaxonomy of Change
Constants Cycles Spirals Exponentials Singularities Tipping Points
![Page 15: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/15.jpg)
15
IT ConstantsIT Constants● Exponential change... is a constant in IT!
► Capacity & Demand: CPU, storage, network...► Rate: Obsolescence, physical to digital conversion
● Human desires... for IT:► Smaller, faster, cheaper, greener, simpler► Better battery life; less weight, fewer cords
● Human behavior► “Adapt or die”► “Everyone wants a seat at the table”► “Culture eats strategy for lunch”
![Page 16: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/16.jpg)
16
IT CyclesIT Cycles
The Eternal Debates:
– Governance & Control– Optimization– Risk Management– Service Models– Business Models
![Page 17: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/17.jpg)
17
Governance & Control CyclesGovernance & Control Cycles
● Carrots vs. sticks● Monopoly vs. choice● Agility vs. consensus-building● Group-think vs. risk-taking● Consumer vs. expert vs. crowd wisdom
(individualism vs. elitism vs. democracy) ● Judgment & intuition vs. algorithms
![Page 18: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/18.jpg)
18
Optimization CyclesOptimization Cycles
● Local vs. global● Tactical vs. strategic● Efficiency vs. individual effectiveness● Excellence vs. adequacy (and who decides?)● Overprovisioning vs. control & accounting costs● Monolithic vs. modular/component solutions
![Page 19: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/19.jpg)
19
Risk Management CyclesRisk Management Cycles
● Cost vs. control ► e.g. compliance in the cloud
● Cost vs. resilience► Converged vs. dedicated infrastructure► Homogeneity vs. species diversity
● Security vs. everything► Restrictions vs. flexibility► Technical vs. behavioral focus
![Page 20: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/20.jpg)
20
Service Model CyclesService Model Cycles
● One-size-fits-all vs. custom
● Adapt the business to the software, or vice versa
● Leading vs. responding
● Complexity vs. diversity vs. supportability
● Build vs. buy vs. rent vs. barter
![Page 21: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/21.jpg)
21
Business Model CyclesBusiness Model Cycles Content vs. distribution: who brings more value? Funding
► Core vs. taxes vs. fees; CapEx vs. OpEx► Freemium vs. subscriptions vs. micro-payments
Quantity vs. Quality vs. Price► Cut costs vs. Increase service (& thus revenue)► Reduce prices vs. increase features
Tragedy of the commons vs. uncommons► Pricing too low or too high, leading to death spirals...
![Page 22: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/22.jpg)
22
Business (Death) SpiralsBusiness (Death) Spirals
● Negative feedback loops (demand goes to zero)► Price goes up → demand shrinks → unit cost goes up► Examples:
– Publications: price increase → subscriptions drop → price ↑– Insurance: pool shrinks → fees increase → pool shrinks more
● Positive feedback loops (supply goes to zero)► Cheap good → unconstrained demand → collapse► Examples:
– Tragedy of the Commons– Sub-prime profits grow → more loans → collapse
![Page 23: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/23.jpg)
23
IT ExponentialsIT Exponentials
● Examples► Network capacity and demand ► Compute capacity and demand► Storage capacity and demand► Consumer technology choices► Viral videos
![Page 24: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/24.jpg)
24
““Exponentials R Us:Exponentials R Us:Seven CS Game-Changers” -LazowskaSeven CS Game-Changers” -Lazowska
● Search● Scalability● Digital Media● Mobility● eCommerce● The Cloud● Social networking and crowd-sourcing
![Page 25: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/25.jpg)
25
““and Seven More to Come”and Seven More to Come”
● Smart homes● Smart cars● Smart bodies● Smart robots● The data deluge● Virtual and augmented reality● Smart crowds & human-computer systems
http://www.xconomy.com/seattle/2009/12/24/exponentials-r-us-seven-computer-science-game-changers-from-the-2000%E2%80%99s-and-seven-more-to-come/
--Ed Lazowska, in xconomy.org, 12/24/2009
![Page 26: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/26.jpg)
26
SingularitiesSingularitiesextreme exponentials!extreme exponentials!
● Math: functions with undefined resultse.g. divide by zero
● AI: when computing capability exceeds human brain capability (cf. Ray Kurzweil)
● Business: when a new product or service rapidly destroys an existing one (or an entire industry)
![Page 27: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/27.jpg)
27
IT Tipping PointsIT Tipping Pointsexample Futures Market questions
• Desk phones?• Desktop computers (vs. laptop)?• Which desktop OS they use?• Shared drives (vs. cloud collaboration)?• Email ???
When will 80% of users not care about:
NB: answers will be different for students, faculty, staff, etc
![Page 28: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/28.jpg)
28
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 29: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/29.jpg)
29
DriversDrivers
● Budgets (department, university, state, federal)● Regulations (local, state, federal)● Control (central → dept → individual)● Sociology (Global social trends / culture)● Scale (geography, complexity, volume of data)● Security (attackers: kids → org crime, nations)● Technology (e.g. wireless, cloud, data mining)
![Page 30: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/30.jpg)
30
The Budget EarthquakeThe Budget Earthquake
Former Technology Funding Structure
![Page 31: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/31.jpg)
31
RegulationsRegulations(just a few examples)
● Federal► FERPA► HIPAA► CALEA► Ediscovery► Records management
● City► Green building codes► Energy use codes
● State► DIS rules► ISB rules► Efficiency legislation► Consolidation efforts
● University► Data security standards► Acceptable use policies
![Page 32: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/32.jpg)
32
ControlControl
1980sDecentralizedChaos
2010sCoordinatedCo-operation?
2000sCommunityControl
1990sCentralControl
![Page 33: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/33.jpg)
33
SociologySociology Expectations about
► Time scales (Impatience)► Rich media, mobility, etc
Behavior► Ideological Amplification (Group Think)► Choice and interaction overload► Libertarian Paternalism (Picking good Defaults)
Attitudes toward ► Governance► Privacy► Science/Technology, Education► Intellectual property► Social goods & the public domain
![Page 34: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/34.jpg)
34
ScaleScale
● Geography: ► Globalization
● Quantity: ► cf. “Exponentials R Us” --Ed Lazowska
● Complexity: ► cf. “The IT Complexity Crisis: Danger & Opportunity”
--Roger Sessions
![Page 35: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/35.jpg)
35
SecuritySecurity● Changing threat vectors
► Shifting to social engineering (hard to stop)► Malware more sophisticated; harder to trace► Motivations (no longer teen vandals; now organized
crime, nation states, and terrorists)► Traditional approaches (e.g. perimeter firewalls)
often don't work against new threats
● Higher stakes► Higher value activities than in previous times► Liability consequences increasing
(e.g. notification costs after PII disclosure)
![Page 36: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/36.jpg)
36
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 37: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/37.jpg)
37
Research University TrendsResearch University Trends
Increasing► Contract/grant competition► Multi-discipline virtual organizations► Global, 24x7 activities► Dependence on IT services► Off-shoring research risks► Competition for student seats► Compliance requirements► Data security risks► Amount of data to manage
Decreasing► State support
![Page 38: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/38.jpg)
38
The Data TsunamiThe Data Tsunami
Examples: LHC LSST Genomics OOI Dark Matter
search
An essential element of research computing support is cyberinfrastructure for managing the coming data tsunami.
![Page 39: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/39.jpg)
39
Technology Market TrendsTechnology Market Trends● Smaller/bigger, faster, cheaper, greener● Drowning in data; sensors everywhere● Desk-centric → mobile● Commoditization & consumerization● Disintermediation; self-service; DIY● Social networking; user-generated content● Proprietary silos; market choice & confusion ● Increasing risk (compliance, security)● Dedicated → virtualized● Video everywhere● Thick clients, local hosting → Thin clients, Cloud● “Three screens and the cloud” --Microsoft
![Page 40: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/40.jpg)
40
IT Business TrendsIT Business Trends Enterprise driven → Consumer driven
(Precluding vs. accommodating consumer tech, e.g. netbooks, iPhones)
Content from consumers Standards driven → Proprietary silos
(attempts by major corps to control all aspects of customer experience, e.g. cell comm & entertainment)
Energy costs → increasing Compute & Storage costs → decreasing Commodity IT → large scale out-task options One-time purchase → Freemium (ads + subs) Focus on devices → focus on function, expertise
![Page 41: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/41.jpg)
41http://www.library.drexel.edu/blogs/librarylog/dollars.gif
The New CurrencyThe New Currencycloud concepts are old –but the mashup is new
http://www.cksinfo.com/clipart/people/bodyparts/eyes/eyeballs.png
http://thomaslarock.com/wp-content/uploads/2009/06/datamining.jpg
Inventory!!
Service Bureau + free TV + Personalization
Data Mining
![Page 42: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/42.jpg)
42
Reliability/Responsiveness TrendReliability/Responsiveness Trend
Conjecture:
Computers are becoming more reliable & more responsive
People are becoming less reliable & less responsive
Caveat: “All generalizations are false”
![Page 43: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/43.jpg)
43
Why???Why??? Changes antithetical to collaboration Changes antithetical to collaboration
Information Overload → “Attention Crash”, unplug
Interaction Overload → “Facebook Fatigue”
Needing a zillion different logins to do anything
Different tools for each role & each new info stream
Shift from 2D to 4D media (text → audio/video)
Demise of email → telephone tag (async → sync)
More choice → more stress, chaos
![Page 44: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/44.jpg)
44
Trends or Cycles?Trends or Cycles? Governance: Central → Community → Individual Resources: Central → Departmental Priesthood → DIY, disintermediation, social net.
Engineering driven → Customer driven Excellence: Technical → Resource & Risk Mgt Build → Buy, borrow, barter Create → Consult, broker, Integrate
Public → Proprietary (info, stds, and technology) Prescriptive rules → Measuring results Internet wild-west → More regulation
![Page 45: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/45.jpg)
45
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 46: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/46.jpg)
46
PatternsPatternscyclic and acyclic evolutioncyclic and acyclic evolution
Computing Mobility Customer Market Expertise Governance Organization Applications
![Page 47: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/47.jpg)
47
Computing EvolutionComputing Evolution
MainframeMainframe
ClusterCluster
CloudCloud
PersonalPersonal“Cloudframe” ?
![Page 48: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/48.jpg)
48
Mobility EvolutionMobility Evolution
AnywhereAnywhere
At homeAt home
At the institutionAt the institution
At the MainframeAt the Mainframe Counter force: “Cacooning”
![Page 49: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/49.jpg)
49
Customer Focus EvolutionCustomer Focus Evolution
IndividualIndividual
TeamTeam
DepartmentDepartment
InstitutionInstitution Counter force: Institutional focus & centralization via budget cuts
![Page 50: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/50.jpg)
50
Market EvolutionMarket Evolution
ConsumerConsumer
CommodityCommodity
PersonalPersonal
PriesthoodPriesthood Counter force: Market Consolidation; Less choice
![Page 51: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/51.jpg)
51
Expertise EvolutionExpertise Evolution
AlgorithmsAlgorithms -Death of Intuition-Death of Intuition
CrowdsCrowds -Democracy now!-Democracy now!
IndividualsIndividuals -Power to the people-Power to the people
ElitesElites -Cabals and experts-Cabals and experts
Algorithm authorsbecome the new“IT Priesthood”
![Page 52: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/52.jpg)
52
Governance EvolutionGovernance Evolution
SharedShared-Community-Community
FederatedFederated-Coordinated-Coordinated
DepartmentalDepartmental-Decentralized-Decentralized
CentralCentral-Controlled-Controlled
IndividualIndividual-Autonomous-Autonomous
?
![Page 53: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/53.jpg)
53
Organizational EvolutionOrganizational Evolution
AgileAgile
ServiceService
SurvivalSurvival
EntitlementEntitlement
FocusedFocused
?
(Startup Mode)
![Page 54: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/54.jpg)
54
Application EvolutionApplication EvolutionMoving from software to services
• Build e.g. Pine
• Buy (a right to use) e.g. Outlook
• Borrow (open source) e.g. Thunderbird
• Barter*/Rent (cloud svcs) e.g. Gmail
The evolution repeats at different layers of the stack
The last two are transformational, especially in tight times
* eyeballs for ads
![Page 55: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/55.jpg)
55
SW Development EvolutionSW Development Evolution
• Market survey: nothing suitable found• Build it locally• Share it: market develops• Off-The-Shelf solutions become available• Feature race begins• Local investment becomes unsustainable• O-T-S solution adopted;
local staff redeployed for the next new thing
Q: How does a niche solution become a commodity? When do you let go?
![Page 56: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/56.jpg)
56
Interoperability EvolutionInteroperability EvolutionIssue: adding value vs. inhibiting choiceIssue: adding value vs. inhibiting choice
Multiple vendors create similar but non-interoperable solutions
Tension develops between vendor desire for $$ via proprietary lock-in and customer desire for choice or integration via interoperability & stds
Weaker players embrace standards to grow mkt Absent full monopoly, mkt standard overtakes
proprietary solution (e.g. Sony Memory Stick) Vendors refocus on higher-level differentiation
Vendors want to compete on proprietary features;Consumers want vendors to compete on price
![Page 57: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/57.jpg)
57
Interoperability HierarchyInteroperability Hierarchy
User Interface
Discovery Protocols
Identity / Access Mgt
Data Formats
Data TransferProtocols
Convergenceover time
Breakthroughinnovationmay causereset / recycle
![Page 58: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/58.jpg)
58
IT Sourcing EvolutionIT Sourcing EvolutionWho ya gonna call (for commodity IT)?
Individual
Departmental
Central
Cloud
Goodbye “IT priesthood”... Hello “Consumer Computing”
In the beginning...
![Page 59: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/59.jpg)
59
Data Point: Cloud Apps @ UWData Point: Cloud Apps @ UW
64K UW users!
50% of our students ALREADY forward their UW email!
![Page 60: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/60.jpg)
60
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 61: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/61.jpg)
61
Pain & PushbackPain & Pushback
• Social networking• Proprietary silos• Moving targets• Support Costs• Privacy & Trust• Interoperability
![Page 62: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/62.jpg)
62
Social Networking BacklashSocial Networking BacklashThe Dark Side of Crowd-Sourcing
Jefferson, meet Hamilton...
![Page 63: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/63.jpg)
63
![Page 64: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/64.jpg)
64
More BacklashMore Backlash
![Page 65: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/65.jpg)
65
Proprietary Silos: Innovation at the edge vs. controlling the core
Jonathan Zittrain
![Page 66: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/66.jpg)
66
Moving Target BacklashMoving Target Backlash
http://mrgadget.co.za/catalog/images/Moving_Target.jpg
Support staff concerns: -Rework (integration code, user docs) -Stuck in the middle... -Can't dodge incoming flak from users when a favorite feature or service changes (or disappears!)
![Page 67: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/67.jpg)
67
Cloud ConundrumCloud ConundrumDoes Cloud Computing Reduce Support Costs?
“It's cloud illusions I recall I really don't know clouds at all”
Minimizing software support costs... → Implies minimizing service integration → Implies minimizing utility for users
Minimizing user support costs? → Implies more self-service (which is only good if the system is easier!)
Savings?
![Page 68: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/68.jpg)
68
Study Shows Targeted Ads Make Users Uneasy * By Terrence Russell * April 10, 2008
Privacy & TrustPrivacy & Trust
http://www.wired.com/epicenter/2008/04/study-shows-tar/
Even without ads, many are worried!
![Page 69: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/69.jpg)
69
Total Information AwarenessTotal Information Awareness
![Page 70: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/70.jpg)
70http://gilbane.com/globalization/content%20matters.png
Interoperability MattersInteroperability Mattersfor both collaboration & market sharefor both collaboration & market share
http://blog.law.cornell.edu/tbruce/files/2008/03/8b731795-a600-44f7-a744-9b7a501ede5b.jpg
![Page 71: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/71.jpg)
71http://www.loc.gov/exhibits/bobhope/images/vcvg20.jpg
Non-interoperability BacklashNon-interoperability Backlashexample: the calendaring challenge
Outlook/ExchangeUser IT
Staff
GoogleCalendar
User
![Page 72: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/72.jpg)
72
IT Evolution & RevolutionIT Evolution & Revolution
• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice
![Page 73: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;](https://reader033.vdocuments.us/reader033/viewer/2022051909/5ffd3b99246a230b666744d2/html5/thumbnails/73.jpg)
73
AdviceAdvicefor coping with IT change
Remember: Past is (not always) prologue Technology is (always) a two-edged sword IT = Inevitable Tensions & Infinite Transitions
Distinguish: What is cyclical vs. transformational. Things you control vs. externalities that control you. Innovator / early adopter, Fast follower, Slow follower
Avoid: Insularity, entitlement, arrogance Solving problems that are being overtaken by events
Listen, lead, experiment, challenge assumptions