The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
sfdc_ppt_corp_template_01_01_2012.ppt
The Future of Technology is Social, Mobile, & Open Peter Schwartz SVP, Global Government Relations and Strategic Planning
@peterschwartz2
§ Hyper-connected World
§ Social Technology Revolution
§ Everything is Mobile
§ Machine – Human Symbiosis
§ Managing Threats
§ Conclusions
Source: IBM 2012 Study of 1,709 CEOs, GMs, and Global Business Leaders
For some time, businesses have been refining and optimizing their networks of suppliers and partners. But something just as revolutionary has been happening—the sudden convergence of the cloud, social and mobile spheres—connecting customers, employees and partners in new ways...
“
”
A New Reality: Tech Convergence
The Social & Mobile Revolution
1960s Mainframe Computing
1970s Mini
Computing
1980s Client Server
Computing 1990s Cloud
Computing
2000s Mobile
Computing
2010s Social
Revolution
x 10x 100x 1,000x 10,000x 100,000x
Global Mobile Phone Market
Internet Users 2.3 Billion
Global Population 7 Billion
Mobile Phone Subscriptions 6 Billion
Sources: US Census Bureau; International Telecommunication Union; based on Accenture analysis
McKinsey Global Institute’s “The Social Economy: Unlocking value and productivity through social technologies”
Social on a Global Scale
Customers Flocking to Social
Fortune 100 Facebook Fan Growth Fortune 100 Web Traffic Growth 123%
Growth in social customers
Source: Webtrends, “The Effects of Social Networks on the Mobile Web and Website Traffic”; Google Social Media Analysis Study
Jun 2010 Dec 2010 Jun 2011
Dec 2011
Business becomes Social
Source: 2012 McKinsey Global Institute Study: “The Social Economy”
2008 2009 2010 2011 2012
Enterprise Adoption of Social Networking
70% Companies Adopted Social
$1.3 Trillion in value can be unlocked through social technologies.
“ ”
Business is Social What do I know about
our provider? What do I know
about our customer?
Employee Networks
Symbiotic Networks
Can Employers Leverage Employees’ Networks? Customers, Employees,
& Partners Connected
Can Organizations Network Amongst Themselves?
Business is Social
Source: DreamForce 2012 “Business is Social”
Technology Shifts Power
Sources: Comscore, Morgan Stanley, Facebook, Twitter, YouTube, LinkedIn, Wikipedia
Social users 4.5 Billion
Source: Flurry Analytics, iOS and Android, Flurry Estimates
EXPLODING SMART DEVICE INSTALLED BASE
67 71 76 84 93 104 129 144 158 175 194
225 265
319 331 337 358 385
446 480 487
519 529
Jun 10
Jul 10
Aug 10
Sep 10
Oct 10
Nov 10
Dec 10
Jan 11
Feb 11
Mar 11
Apr 11
May 11
Jun 11
Jul 11
Aug 11
Sep 11
Oct 11
Nov 11
Dec 11
Jan 12
Feb 12
Mar 12
Apr 12
Worldwide Smart Device Active Users (Millions)
Frequency of Purchase Made on a Smartphone
0 10 20 30 40 50
Australia
China
Germany
Mexico
USA
Monthly
Google Analytics, Our Mobile Planet, http://bit.ly/Ue9jfD
%
Machines & Humans
2000s Artificial
Intelligence
2010s Human
Machine Symbiosis
2015s Leverage Collective
Intelligence
Technology is Ubiquitous § Multi-Platform Ecosystem
§ Consistent & Complementary Experiences
§ Unique Experience, Context-sensitive
Consuming Media in New Ways
Source:: Online Marketing Firm Ooyala: www.ooyala.com
Big Data and Online Viewership
Source:: Online Marketing Firm Ooyala: www.ooyala.com
Long-form content (videos of 10+ min.) is over half of the total time spent watching online video in Q1 across all connected devices
Analytics Influencing Consumer Choice
Disk Drive Price Experience Curve
Source: A History of Storage Cost by Mathew Komorowski http://bit.ly/3VqW1u
RFID Deployments Worldwide
Source: RFID Journal Interactive Map http://bit.ly/BeZEt
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
sfdc_ppt_corp_template_01_01_2012.ppt
Security is “Hunting for Threats”
A Greater Horseshoe Bat using ultrasonic echo-locating
calls to navigate and hunt
Source: AOL Pictures http://aol.it/Qw5P2N
Flexible Security Data portability Extensible
Open
No Hardware No Software Innovative
Fast Automatic Upgrades Pay-as-you-go Scales
Easy
Democratic Economical Same infrastructure
Everyone
What Defines Multi-Tenancy?
Green
Comingling is not a Concern
“The fact that it may be stored on the same disk or go through the same processor chip is as irrelevant as worrying about sending your physical mail through the same postal system as your competitors.”
Phil Wainewright, ZDnet
Conclusions § Tapping Collective Intelligence
§ High Speed Adaptation
§ Device Independence
§ Ubiquitous Networks in a Post-PC Era
§ Computing as a Utility
§ Collaborative Communities
§ Improving Security