1 Manage your digital life in your personal info management system Serge Abiteboul Benjamin André Daniel Kaplan INRIA & ENS Cachan Cozy Cloud Fing & MesInfos Abstract Geeks already know how to control their personal data. It is now becoming possible for everyone to do the same, and there are many advantages to doing so. Everyone should now manage his/her personal info management system. Such is the topic of this white paper. Context A typical person today usually has data on several devices and in a number of commer- cial systems that function as data traps where it is easy to check in information and diffi- cult to remove it or often to simply access it. It is also difficult, even sometimes impossi- ble, to enforce the privacy of the data. Most countries have personal data regulations, but they are not easily enforced, in particular because data servers are often located in countries with different laws or with no regulation at all. One could consider that this is the price to pay in order to fully take advantage of the ever- increasing amount of available information. This is not the case. The fact that the information resides in isolated silos actually complicates lives. For instance, it is not possible to perform a global search across multiple systems to find some information. Also, typical persons are incapable of listing the systems that host their information. Worse, they cannot even list which systems hold critical information such as credit card data. It is complicated, often impossible to synchronize the same information in different silos; and, since there is neither integration between data nor collaboration between systems, users cannot (unless they are geeks) automatize a sequence of basic operations over different systems. The situation is getting worse because the number of data sources keeps growing. (See Box.) Individuals are facing a somewhat similar situation as the one that large compa- nies encountered before the introduction of database and workflow systems: more and more data are available and their management becomes increasingly complex. For per- sonal data, it got to a point where most people have lost control over their data. Increasing dispersion of personal information There are data that we publish (such as pictures or tweets), data that we produce (con- tacts, schedules, lists, etc.), data that we coproduce as the result of social interactions (on social networks, recommendation systems, etc.) or service relationships, data that organizations produce about us (as employers, schools, insurers, bankers, public ad- ministrations), some of it shared such as bills or bank statements, some of it kept away from us such as scores and other profiling data. There are data that we need to make other data systems work (such as identity or profile data). There are data that others produce about us, for example when they tag a picture. And there are more and more
2 data about us that software or hardware sensors capture with or without our knowledge: Web navigation, phone use, geolocation, "quantified self" measurements, contactless card readings, surveillance camera pictures, This information is stored in a growing number of machines, some owned by us (phones, PCs, residential "boxes", connected devices ), some external but set up by us (a Youtube or a Facebook account), and many absolutely unknown to us. They are stored as individual files with or without metadata, as records in huge databases, coded in different ways and tagged with different identifiers. The cloud 1 is largely responsible for the loss of control over the data that we previously could think of as "ours". There are very good reasons to adopt cloud services. Data in the cloud are ubiquitous and users are relieved from system tasks such as updating soft- ware or backing- up data. But when being relieved becomes synonymous to losing con- trol, then the cloud becomes a problem by itself by imposing its business logic on users. In extreme cases, the external system that holds the data may simply change its usage policies, or the service may be interrupted, leaving users powerless over their data. Can we continue to live in an information space that is growing messier and messier? Clearly, not! So what are the solutions to reach a frictionless information context? First possibility : users can delegate all their information to a single company. It does not really matter whether it is Google, Apple or someone else. This will definitely make their life easier, e.g. they can be provided with global search, data integration and synchroni- zation, etc. But this will also dramatically limit their freedom; so we will assume most users would prefer to avoid such a solution. Another possibility is to ask all users to spend a few years of their lives studying to be- come geeks. Some of them may have the talent for this; some may even be willing to do so; but we will assume that this is not the desire of a large portion of the population. Is there another option? We believe there is. Let s call it the personal info management system (Pims for short). The personal info management system To understand the notion of personal info management system, we need to revisit to- day's context. Why do users trust their data to companies such as Google or Facebook? Because these companies offer fantastic services. Now, there are two facets to these services: they are supported by software with great features, and they are executed on machines that are not managed by the user. What if we could separate these two facets? On one hand, for each service, we would select the best software developer or service provider that suits our need, and on the other hand, we would choose one server where all these different apps will run. We would therefore bring together, on a personal server, all the users favorite applications and all their data that are today distributed, fragmented, isolated. 1 The expression is used to describe a variety of computing concepts that involve a large number of computers connected through a real- time communication network. In com- mon usage, cloud is a metaphor for services delivered remotely through the Internet [Wikipedia].
3 Is this a utopia? Material aspects of the Pims The Pims runs a user software with the user's data on his/her server(s). The im- portant points are: The server is at the user s service typically because it is paid to do that. The user chooses the code to deploy on the server. The software is open source, which is a requirement for security. The server is in the cloud, i.e., it can be reached from everywhere. One sometimes uses the term personal cloud, to stress this last point. We will remain voluntarily imprecise on the setting. The user may own the server, or pay for a hosted server. The server may be a physical or a virtual machine. It may be physically located at the user s home (e.g., a tvbox) or not. It may run on a single ma- chine or be distributed among several machines. The software may be open source or not. The possibilities are endless, as is the range of data that Pims could store, reference and use under the user's control: Agendas, s, contacts, medical/bank/insurance data, music, videos, books, pictures, texts, social network activity, recommendations, commercial activity, salary, taxes In short, all the user s personal information. The Pims centralizes the user s information. It is a digital home. The user selects the applications to install and the external applications to interact with. The Pims server software provides the necessary support so that the user can negotiate what data the applications require, and what they will do with the data. The centralization of all the information is an advantage: it enables great new services because it provides individu- als with a 360 view on their lives. Furthermore, it simplifies security: It is simpler to protect a system with a single entry point than many with many entry points. This is an essential issue that is worth detailing. There are two facets to security here: the security that is enforced by the Pims itself and that enforced by the services running on the Pims. Since we insisted that both be open source, users don't have to trust the providers of these systems. They can inspect the code (if they are competent) or trust third parties to do so. The code of the Pims is clearly the most critical. But it is only one (reasonably small) system to verify. Verifying the services is more an issue. But even if there is a security breach for one hosted service, only the privacy of the information that this service sees is compromised. In general, the information may be more secure in a Pims (a full article would be required to detail Pims s security). Another main issue for regular users is clearly the management of their Pims. This is where the cloud turns out to be essential. Thanks to the cloud, it is possible to have a company manage the system for the users and in particular, back up their data and make all services available all the time, from everywhere. The cloud was part of the problem; it now enables solutions. In the spirit of Pims: VRM Vendor Relationship Management (VRM) is the symmetric of the Customer Relation-
4 ship Management. Promoted by Doc Searls and others since 2006, it emerged from the idea that customers would benefit from having an integrated view of their vendors, in the same way that vendors like to have an integrated view of their customers. This would provide the users with more control over their activity and for instance, better means of comparing prices and quality of service. By establishing a better symmetry between customers and vendors, VRM is completely aligned with the objectives of Pims. Pims are coming! Many geeks already manage some sorts of Pims. They run a home server or rent a host- ed server (in 2013, the French web hosting company OVH rented low- cost per- sonal servers in just 10 days). They manage to have at their disposal some rather primi- tive functionality, typically by developing scripts. A limiting factor is that, in order to use existing services, they have no choice but relinquish some of the control over their data. For instance, if they want to partake in the social web, they have to trust their data to Facebook or others. However, by devoting time and efforts and modulo these limita- tions, they can manage their own data and services to a large extent. This is not for everyone, though: today, one needs to be highly skilled and to be willing to devote a lot of time in order to achieve such a result. PCs are relatively easy to man- age, however, server management is still rather cumbersome, typically based on com- mand lines. But things are changing rapidly: Wonderful abstraction technologies are helping domesticate servers with virtual- ization and configuration management tools. Open source technology of the highest quality is more and more available for a large range of services. The price of hardware is now very low and the price of machine hosting has dropped. A hosted- low cost server could soon be as cheap as 5 /month. At that price, paying is no longer a barrier for a majority of people. All the bricks are here. This is becoming possible. So what will trigger it? Research in this area 2 is increasingly active. New results have been obtained in a num- ber of directions such as sophisticated global search. A number of prototypes have been developed for storing and retrieving personal data: Lifestreams, Stuff- I ve- Seen, Hay- stack, MyLifeBits, Connections, Seetrieve, Personal Dataspaces, or deskweb. The tipping point appears close. Here are some projects illustrating the trend: Mailpile aims at challenging Gmail. Their crowdfunding campaign reached twice the expected amount of money, paying 3 full time employees for more than a year. Lima, another successful crowdfunded project, raised 1.2 millions $ to develop a device on which to deploy a Dropbox- like service, but at home. Personal NAS (network- connected storage) are booming, from Synologie to Iomega to MyCloud by Western Digital. Samsung recently launched the SAMI project whose goal is to provide a personal data store that will seamlessly gather all the data coming from connected devices. 2 Which is Serge Abiteboul's research focus.
6 pertise they have in their particular business. Also, within Pims, they can offer new ser- vices without compromising privacy, elaborating upon the trust relationship they have built over the years. Personal data systems offer an invaluable business opportunity to help these companies evolve in the digital era. A natural extension for home appliance companies There is already a huge number of «boxes» deployed either at home or in datacenters: Internet access provider "boxes", NAS servers, "smart" meters provided by energy ven- dors, home automation systems, "digital lockers" provided by banks, etc. These boxes are personal data spaces. However, each one is dedicated to a specific usage. They could evolve to become more generic and control more and more connected objects, services, and data. They would thereby gather more and more information. Since the providers of all these "boxes" already have a direct relationship with customers, becoming Pims seams like a natural evolution for many of them. And pure Internet players? Some of them, e.g., Facebook, are already focused on the management of information. They cannot let such a wide field of information management grow without getting in. However, Pims, as we defined them here, are very far from these companies indirect business models based on personal data monetization. So moving in this new market would require a major cultural change for them. Others, e.g., Amazon or OVH, have a great know- how in providing data services. They could seamlessly move to this new business. Now an issue is that the business of most big Internet companies is based on extracting value from their users data and attention. Clearly, they will not welcome the arrival of Pims. But they have to follow their users. If Pims manage to become very popular, pure Internet players will have to provide services on these systems. To do that, they will have to become interoperable with other services, and they will have to accept contracts that better protect the users data. This will thus best serve the interests of users.
7 Benefits of personal info management systems Pims carry several unique benefits: User control over their data Pims provide users with more control on their personal data. Users can decide who has access to what, under what rules, to achieve what goals. The key difference with the cur- rent model where the information is hosted on huge platforms, is that the user is paying for information hosting. Companies hosting the users Pims don t need to preach Don t be evil ; they cannot be evil, otherwise they run out of business. In that sense, the information in these systems would be both better protected and more useful to individuals than in other systems. User empowerment Once users have selected a particular service on the cloud today, that service tries to impose on them some form of dependence, even addiction, to the service. As the saying goes, the users become the product. They lose agency and autonomy. With Pims, users are in charge. They can impose their choices. They can decide to leave a service and join a competitor. Indeed, the Pims is not here to enslave users but to empower them with the full power of their data, today limited by the friction of the silos. New functionalities A Pims can support new functionalities that essentially come from the existence of a unique entry point to the user s data. For instance, Pims can provide the following, unique functionalities: Single identity/login with automatic management of login in external services. Global search with a semantic layer based on a personal ontology that helps give meaning to the data. Instead of having to adapt to the terminology and concepts of each external service, the users are able to use their own. Automatic synchronization of data on different devices and systems, automatic back- ups. Automatic management of access control over all applications, e.g. by managing a single list of trusted parties. Global task sequencing to facilitate interoperating different devices/services. These tasks may involve services on multiple providers (e.g., Twitter and Blog- ger, or several banks) but be provided with a single interface on the Pims. Exchange of information and knowledge between friends in a truly social way, even if these use different social network platforms, or no platform at all. Centralized control point for connected objects, a hub for the IoT (Internet of Things). With the multiplication of Internet objects vendors, synchronization and coordination will soon become an issue that a Pims can best address because it has access to all the user s data and devices. Personal big data : Analysis of a person's personal information. Data mining may allow extracting valuable knowledge such as behavioral patterns and predic- tions of future actions so that the user can be more pro active with regard to health, finance, energy consumption, time management, etc. Apps fostering : Web services are dominated by oligopolies. That lack of diversity is obvious if you compare with the abundance of apps available for any needs on your mobile devices. Turning web services into apps is the opportunity of bring-
8 ing the business model (and thus the diversity) of mobile apps market place to web services. The participation to a more neutral web The big platforms such as Google, Apple, Amazon, are accumulating more and more data from their users. Thanks to "network effects", the more users and data they have, the more attractive they become to new users that bring in new data. The fact that the plat- forms are accumulating so much data is distorting competition between businesses in a major way. Can this be fixed? Laws and regulations are of course parts of the solution. One can also expect platforms to hand back some level of control under the pressure of customers increasing demand for privacy. However, control only will not be sufficient to build the required level of pressure. What Pims achieve, is to point towards a new, powerful yet more balanced way of creating user value as well as business value. By bringing back the data of each user under the control of that user, Pims can clearly make a major contribution towards bringing back more fairness on the Web. Indeed, Pims bring more freedom to users and encourage innovation from companies in a number of ways: Interoperability is imposed to all services and data. Good practices are encouraged notably because the code is open source. The user can easily move a service to a new provider (portability), limiting the risk of vendor lock- in. The competition between services takes place on neutral ground. What will the future be? Online services have become an essential part of our daily life. However, because of them, we are all experiencing an unacceptable loss of control over our personal data. Pims offer a concrete solution to that. More, they enable functionalities that the current cloud cannot offer such as single sign on, global search, collaboration across services, personal big data- style analysis, IoT hub, etc. They make all these possible without trading ubiquity and ease of use. Most importantly, they allow users to regain control over their privacy. Will we move more and more towards a cloud dominated by oligopolies, user profiling, general- ized surveillance? Will our lack of control over our data turn us more and more into passive products of a global digital economy? Pims may be the alternative to such an outcome.
Les données du Web : quand nos vies numériques deviennent des bases des connaissances http://abiteboul.com @sergeabiteboul binaire.blog.lemonde.fr Serge Abiteboul INRIA & ENS Cachan #inria_industrie 1.
Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing
Many of our enterprise customers wanted dedicated virtual servers that offered a much higher degree of isolation... we needed to step up our virtualization efforts to stay competitive." Joe Young, Senior
Leveraging the power of social media & mobile applications Xoriant delivers an innovative solution blending mobile applications and web based social networking media for our client focusing on local marketing.
White Paper May-2013 Sentrollers and The Internet of Things By: Cees Links, Founder and CEO GreenPeak Technologies www.greenpeak.com The new buzzword floating around the world is the Internet of Things,
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases
Table of Contents 1. Fundamental shifts driving imminent change for Enterprise Software Applications... 3 1.1. The emergence of the Cloud Computing paradigm... 3 1.2. The key benefits of the shift to the
MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Developing the edge or scaling the core through corporate venturing Internet of Things Daan Witteveen Global M2M Connections (billion) The Global IOT Market is expected to see a forecasted to grow at a
Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio
Cloud Computing and Big Data. What s the Big Deal? Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC firstname.lastname@example.org 2013 PRICE Systems, LLC All Rights Reserved Decades of Cost Management
Lean UX Best practices for integrating user insights into the app development process Best Practices Copyright 2015 UXprobe bvba Table of contents Introduction.... 3 1. Ideation phase... 4 1.1. Task Analysis...
The Software-defined Data Center in the Enterprise A Cloud Report by Ben Kepes This report underwitten by: NIMBOXX The Software-defined Data Center in the Enterprise 02/12/2015 Table of Contents 1. Executive
Reinventing the Business Workspace How Salesforce.com and Google are Bringing On Demand to the Enterprise April 2008 By Phil Wainewright, CEO http://www.pcxvs.com Procullux Limited, 2008 Contents Introduction...2
Mobile Application Platform from FeedHenry Next generation cloud-based solution that simplifies the development, deployment and management of mobile apps for enterprise. Develop native, hybrid and HTML5
CLOUD AUTOMATION How Cloud Automation Can Help You Scale Your IT Services TABLE OF CONTENTS Introduction 03 Business Benefits 07 Administrator Benefits 11 Technical Considerations 14 Conclusion 17 2 INTRODUCTION
Software Empowering People The information contained in these materials is strictly for illustrative purposes only and the figures contained herein are not guaranteed for accuracy. The information used
Point of view Software Defined Data Centers will Change the Way Enterprises Migrate and Deploy to Cloud-Based Applications Software Defined Data Centers have the potential to be both truly revolutionary
A Hands-On Understanding of Cloud Services Presented by: PMPA IT Committee Today s Agenda Introduction / Overview Benefits Risks of using Cloud Services Cloud Apps Overview/Preview Shop Example Hands-On
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Billing and Payment with the Elastic Path Ecommerce Platform The Elastic Path Ecommerce Platform As the industry s most open and flexible ecommerce platform, Elastic Path is the right solution for large
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
WHITE PAPER: VDI VERSUS STREAMING VDI May Not Be The Right Solution or Why Streaming Might Be A Better One Contents So You Think You Want VDI?...1 Why VDI?...1 VDI is a platform, not a solution...2 Infrastructure
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email email@example.com Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox
The Cloud for Productivity and Mobility A Guide for Small and Midsize Business As mobile work becomes the norm, turn to cloud-based solutions to extend productivity, collaboration, and business management
Technical aspects of Cloud computing Luís Ferreira Pires University of Twente Meeting of the NVvIR, 17 June 2010 Personal motivation A lot of people have been talking about Cloud computing in virtually
white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: Big Data is the ability to collect information from diverse sources
Personal Cloud Survey: Hype vs. Reality Research Report August, 2011 Personal Cloud Survey: Hype vs. Reality Table of Contents I. EXECUTIVE SUMMARY...... 3 II. SURVEY RESULTS... 6 III. CONCLUSION... 14
WebRTC Conference & Expo 2013 The Big Picture & Keynotes Highlights The Big Picture webrtc is getting mature and is ready for wide application development and deployment Technical standard is completed
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
Jobsket ATS Empowering your recruitment process WELCOME TO JOBSKET ATS Jobsket ATS is a recruitment and talent acquisition software package built on top of innovation. Our software improves recruitment
EXECUTIVE SUMMARY Market TOWARD MORE FLEXIBLE, NEXT-GENERATION COLLABORATION SOLUTIONS Survey points to the need for tools that offer new models for flexible, interoperable collaboration solutions, enabling
WHITE PAPER CRM Evolved Introducing the Era of Intelligent Engagement November 2015 CRM Evolved Introduction Digital Transformation, a key focus of successful organizations, proves itself a business imperative,
Best Practices for Implementing Global IoT Initiatives Key Considerations for Launching a Connected Devices Service White Paper Jasper Technologies, Inc. 02 For more information about becoming a service
Voice and data recording Red Box makes it easier than you imagine SIMPLER SMARTER VOICE If you re reading this, there s a good chance your organization has to record phone calls, radio conversations or
www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
Request for contributors Introduction to Cloud Computing https://portal.futuregrid.org/contrib/cloud-computing-class by various contributors (see last slide) Hi and thanks for your contribution! If you
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
Cloud Computing and the Future of Internet Services Wei-Ying Ma Principal Researcher, Research Area Manager Microsoft Research Asia Computing as Utility Grid Computing Web Services in the Cloud What is
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business
DEVELOPING A SOCIAL MEDIA STRATEGY Creating a social media strategy for your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Video Tutorials 3 Getting Started with Social
Internet of Things and insurance Paris, March 4h, 0 Think Tank on Aggregators - 04 The "IoT Insurance" Think Tank was conducted with participating European insurers between November 04 and February 0 8
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
MOBILE MARKETING A guide to how you can market your business to mobile phone users 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video Tutorials 4 What is Mobile
Cloud Computing (In Plain English) Application Service Provider, Software as a Service, Grid Computing, Utility Computing, Platform as a Service......all these terms and more, at one time or another have
Research Report Charging and Billing for the Digital Economy Copyright Openet Telecom, 2013 Index Introduction 3 1. The Future for Traditional Billing and Charging 4 2. Innovating and Accelerating Time
- 1 - Terms and Conditions LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent
The Negative Effects of Social Media on Children and Young Adults How can we reduce the negative effects of social media on children and young adults? Overview What is Social Media? Social media is defined
WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities
An Oracle White Paper August 2010 Higher Security, Greater Access with Oracle Desktop Virtualization Introduction... 1 Desktop Infrastructure Challenges... 2 Oracle s Desktop Virtualization Solutions Beyond
Four vital moves to ensure your mobile strategy is responsive Adobe Responsive Development Guide June 2015 Four vital moves to ensure your mobile strategy is responsive Table of contents Responsive matters
EXECUTIVE GUIDE WHY THE MODERN DATA CENTER NEEDS AN OPERATING SYSTEM TABLE OF CONTENTS 2 6 8 12 21 30 Why your modern data center needs an operating system What is a data center operating system and how
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
Choice and Control for the Cloud Open Cloud Alliance Concept and Strategy Date: November 11, 2014 The Cloud from the Consumer's Perspective Cloud computing benefits, challenges and demands from end user
Presentation to IoT Silicon Valley, 2015-01-20 1 Usually shiny new thing presentation. This is not. THEIR Things or OUR Things? Two goals: 1. Think about the big picture. Extrapolate. World you want for
The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS Copyright 2014 Published by Art & Logic All rights reserved. Except as permitted under U.S. Copyright Act of 1976, no part of this publication may
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
WHITEPAPER Author: Stuart James Cloud: It s not a nebulous concept Challenging and removing the complexities of truly understanding Cloud Removing the complexities to truly understand Cloud Author: Stuart
Resco Mobile CRM Vision Vision for next 3 years & more Table of Contents Mission Statement... 2 Main Areas of Focus... 3 CRM Tool... 3 Communication... 3 Calendaring... 3 Cloud Storage... 3 Customer Apps...
Ozgur Aktunc Assistant Professor of Software Engineering St. Mary s University WORLD INTERNET USAGE AND POPULATION STATISTICS World Regions Population ( 2010 Est.) Internet Users Dec. 31, 2000 Internet
How to Choose and Deploy a Transformative BI Solution: The Irish Life Story Author: Ellie Fields Senior Director, Product Marketing, Tableau Software November 2012 p2 With 31 billion Euro under management,
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
Experian Cross Channel Marketing Platform Managing campaigns and reaching consumers in real time The relationship between brands and customers has fundamentally changed. Whereas once there was equilibrium
RUNNING HEAD: Cloud Computing 1 Cloud Computing Future of Computer Networking Asif U Islam University of North Texas LTEC 4550 Assignment 5 07/31/2014 Cloud Computing 2 Abstract The paper discusses the
E-Guide Tips for building a private cloud- Start slowly Many IT professionals are intrigued by the idea of a private cloud to reduce performance bottlenecks and simplify management. But shifting today's
Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a
Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available
October 2015 Shaping the Digital Future FLASH INSIGHT Attack of the Future Smart Home Giants The fight of Apple, Google, Amazon, and others for the most customer centric ecosystem Copyright This document
SIF 3: A NEW BEGINNING The SIF Implementation Specification Defines common data formats and rules of interaction and architecture, and is made up of two parts: SIF Infrastructure Implementation Specification
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform
By: Peter Slegg (01206) 433886 07919 921263 www.besmartmedia.com firstname.lastname@example.org Phone: 01206 433886 www.besmartmedia.com Page 1 What is the Difference Between a Profitable and a Profit-Draining
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Script Open Cloud Alliance Trust and Choice for the Cloud 1 Slide 2 Open Cloud Alliance Thank you very much. Ladies and Gentlemen, this will be a very brief talk about what we at Univention are doing together
The CIO s Dream: A Cloud Platform With Lower Cost, More Agility and Better Performance A publication by: Introduction The chief information officer or chief technology officer carries the weight of the
Your consent to our cookies if you continue to use this website.