it evolution & revolutionstaff.washington.edu/gray/talks/2010/it-evo.pdf35 security changing...

74
IT Evolution & Revolution Recognizing the “next new thing” vs. “deja vu all over again” in order to divine and define the future of IT. Terry Gray, PhD Associate VP, Technology Strategy University of Washington April 2010

Upload: others

Post on 21-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

IT Evolution & RevolutionRecognizing the “next new thing” vs.

“deja vu all over again” in order to divine and define the future of IT.

Terry Gray, PhDAssociate VP, Technology Strategy

University of Washington

April 2010

Page 2: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

2

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 3: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

3

Information TechnologyInformation Technology

IT =

Inevitable Tensions?

Infinite Transitions?

Ironic Truisms?

√√

√√

√√

Yep, all of the above!

Page 4: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

4

Technology VisionTechnology Vision

Access to all available resources*

– any time, any place, via any device

– quickly, simply, safely, surely

* Resources include information, people, services, tools

Building on the work of prior visionaries, e.g. Bush, Licklider, Fuller...

Page 5: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

Bush's MEMEX (1945)Bush's MEMEX (1945)anticipating hypertext & the web

Vannevar Bush

Page 6: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

Bucky's World Game (1965)Bucky's World Game (1965)think “GIS meets the Web”

R. Buckminster Fuller

Page 7: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

7

Defining vs. Divining the FutureDefining vs. Divining the Future “The best way to predict the future is to invent it.”

(Moliere, Peter Drucker, Alan Kay...)

Innovation often needs organizational “slush” Tight budgets undermine innovation Tight budgets necessitate innovation

Three kinds of innovation (Judy Estrin) Breakthrough, incremental, orthogonal

Central IT imperative: avoid insularity & entitlement Exposure to external forces/trends/alternatives Experiment yourself, and watch other's ! Listen, lead, challenge assumptions & current patterns

Huh??

Page 8: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

8

IT Themes & MemesIT Themes & Memes

Mobile Global Green Open Self-service 24x7 Overwhelmed Interactive Risky

Community Cloud-sourced Crowd-sourced Collaborative / Social Personalized Virtualized Web-based Federated Agile

Page 9: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

9

The Yin & Yang of ITThe Yin & Yang of ITpolarity mgt or “schizophrenia is a way of life”polarity mgt or “schizophrenia is a way of life”

Physical infrastructure – Intellectual infrastructureSingle Standard – “A thousand flowers”

Homogeneous – HeterogeneousMonolithic - Modular

Distributed – CentralizedCommodity – Customized

Consumer – EnterpriseHigh touch – Self service

Adequate – ExcellentControlled – Chaotic

Agile – FragileTiny – Massive

Page 10: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

10

There's something happenin' hereThere's something happenin' here

Page 11: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

11

Unknown UnknownsUnknown UnknownsWhen is Past Prelude?When is Past Prelude?

Cycles or Singularities?

Page 12: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

12

Technology RevolutionsTechnology Revolutions

An instrument of “creative destruction”(Schumpeter: Capitalism, Socialism and Democracy -1942)

Measured by:In business, the number of stock options that are now worthlessIn academia, the size of the closets storing obsolete gear

Page 13: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

13

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 14: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

14

Taxonomy of ChangeTaxonomy of Change

Constants Cycles Spirals Exponentials Singularities Tipping Points

Page 15: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

15

IT ConstantsIT Constants● Exponential change... is a constant in IT!

► Capacity & Demand: CPU, storage, network...► Rate: Obsolescence, physical to digital conversion

● Human desires... for IT:► Smaller, faster, cheaper, greener, simpler► Better battery life; less weight, fewer cords

● Human behavior► “Adapt or die”► “Everyone wants a seat at the table”► “Culture eats strategy for lunch”

Page 16: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

16

IT CyclesIT Cycles

The Eternal Debates:

– Governance & Control– Optimization– Risk Management– Service Models– Business Models

Page 17: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

17

Governance & Control CyclesGovernance & Control Cycles

● Carrots vs. sticks● Monopoly vs. choice● Agility vs. consensus-building● Group-think vs. risk-taking● Consumer vs. expert vs. crowd wisdom

(individualism vs. elitism vs. democracy) ● Judgment & intuition vs. algorithms

Page 18: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

18

Optimization CyclesOptimization Cycles

● Local vs. global● Tactical vs. strategic● Efficiency vs. individual effectiveness● Excellence vs. adequacy (and who decides?)● Overprovisioning vs. control & accounting costs● Monolithic vs. modular/component solutions

Page 19: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

19

Risk Management CyclesRisk Management Cycles

● Cost vs. control ► e.g. compliance in the cloud

● Cost vs. resilience► Converged vs. dedicated infrastructure► Homogeneity vs. species diversity

● Security vs. everything► Restrictions vs. flexibility► Technical vs. behavioral focus

Page 20: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

20

Service Model CyclesService Model Cycles

● One-size-fits-all vs. custom

● Adapt the business to the software, or vice versa

● Leading vs. responding

● Complexity vs. diversity vs. supportability

● Build vs. buy vs. rent vs. barter

Page 21: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

21

Business Model CyclesBusiness Model Cycles Content vs. distribution: who brings more value? Funding

► Core vs. taxes vs. fees; CapEx vs. OpEx► Freemium vs. subscriptions vs. micro-payments

Quantity vs. Quality vs. Price► Cut costs vs. Increase service (& thus revenue)► Reduce prices vs. increase features

Tragedy of the commons vs. uncommons► Pricing too low or too high, leading to death spirals...

Page 22: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

22

Business (Death) SpiralsBusiness (Death) Spirals

● Negative feedback loops (demand goes to zero)► Price goes up → demand shrinks → unit cost goes up► Examples:

– Publications: price increase → subscriptions drop → price ↑– Insurance: pool shrinks → fees increase → pool shrinks more

● Positive feedback loops (supply goes to zero)► Cheap good → unconstrained demand → collapse► Examples:

– Tragedy of the Commons– Sub-prime profits grow → more loans → collapse

Page 23: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

23

IT ExponentialsIT Exponentials

● Examples► Network capacity and demand ► Compute capacity and demand► Storage capacity and demand► Consumer technology choices► Viral videos

Page 24: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

24

““Exponentials R Us:Exponentials R Us:Seven CS Game-Changers” -LazowskaSeven CS Game-Changers” -Lazowska

● Search● Scalability● Digital Media● Mobility● eCommerce● The Cloud● Social networking and crowd-sourcing

Page 25: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

25

““and Seven More to Come”and Seven More to Come”

● Smart homes● Smart cars● Smart bodies● Smart robots● The data deluge● Virtual and augmented reality● Smart crowds & human-computer systems

http://www.xconomy.com/seattle/2009/12/24/exponentials-r-us-seven-computer-science-game-changers-from-the-2000%E2%80%99s-and-seven-more-to-come/

--Ed Lazowska, in xconomy.org, 12/24/2009

Page 26: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

26

SingularitiesSingularitiesextreme exponentials!extreme exponentials!

● Math: functions with undefined resultse.g. divide by zero

● AI: when computing capability exceeds human brain capability (cf. Ray Kurzweil)

● Business: when a new product or service rapidly destroys an existing one (or an entire industry)

Page 27: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

27

IT Tipping PointsIT Tipping Pointsexample Futures Market questions

• Desk phones?• Desktop computers (vs. laptop)?• Which desktop OS they use?• Shared drives (vs. cloud collaboration)?• Email ???

When will 80% of users not care about:

NB: answers will be different for students, faculty, staff, etc

Page 28: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

28

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 29: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

29

DriversDrivers

● Budgets (department, university, state, federal)● Regulations (local, state, federal)● Control (central → dept → individual)● Sociology (Global social trends / culture)● Scale (geography, complexity, volume of data)● Security (attackers: kids → org crime, nations)● Technology (e.g. wireless, cloud, data mining)

Page 30: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

30

The Budget EarthquakeThe Budget Earthquake

Former Technology Funding Structure

Page 31: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

31

RegulationsRegulations(just a few examples)

● Federal► FERPA► HIPAA► CALEA► Ediscovery► Records management

● City► Green building codes► Energy use codes

● State► DIS rules► ISB rules► Efficiency legislation► Consolidation efforts

● University► Data security standards► Acceptable use policies

Page 32: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

32

ControlControl

1980sDecentralizedChaos

2010sCoordinatedCo-operation?

2000sCommunityControl

1990sCentralControl

Page 33: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

33

SociologySociology Expectations about

► Time scales (Impatience)► Rich media, mobility, etc

Behavior► Ideological Amplification (Group Think)► Choice and interaction overload► Libertarian Paternalism (Picking good Defaults)

Attitudes toward ► Governance► Privacy► Science/Technology, Education► Intellectual property► Social goods & the public domain

Page 34: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

34

ScaleScale

● Geography: ► Globalization

● Quantity: ► cf. “Exponentials R Us” --Ed Lazowska

● Complexity: ► cf. “The IT Complexity Crisis: Danger & Opportunity”

--Roger Sessions

Page 35: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

35

SecuritySecurity● Changing threat vectors

► Shifting to social engineering (hard to stop)► Malware more sophisticated; harder to trace► Motivations (no longer teen vandals; now organized

crime, nation states, and terrorists)► Traditional approaches (e.g. perimeter firewalls)

often don't work against new threats

● Higher stakes► Higher value activities than in previous times► Liability consequences increasing

(e.g. notification costs after PII disclosure)

Page 36: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

36

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 37: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

37

Research University TrendsResearch University Trends

Increasing► Contract/grant competition► Multi-discipline virtual organizations► Global, 24x7 activities► Dependence on IT services► Off-shoring research risks► Competition for student seats► Compliance requirements► Data security risks► Amount of data to manage

Decreasing► State support

Page 38: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

38

The Data TsunamiThe Data Tsunami

Examples: LHC LSST Genomics OOI Dark Matter

search

An essential element of research computing support is cyberinfrastructure for managing the coming data tsunami.

Page 39: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

39

Technology Market TrendsTechnology Market Trends● Smaller/bigger, faster, cheaper, greener● Drowning in data; sensors everywhere● Desk-centric → mobile● Commoditization & consumerization● Disintermediation; self-service; DIY● Social networking; user-generated content● Proprietary silos; market choice & confusion ● Increasing risk (compliance, security)● Dedicated → virtualized● Video everywhere● Thick clients, local hosting → Thin clients, Cloud● “Three screens and the cloud” --Microsoft

Page 40: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

40

IT Business TrendsIT Business Trends Enterprise driven → Consumer driven

(Precluding vs. accommodating consumer tech, e.g. netbooks, iPhones)

Content from consumers Standards driven → Proprietary silos

(attempts by major corps to control all aspects of customer experience, e.g. cell comm & entertainment)

Energy costs → increasing Compute & Storage costs → decreasing Commodity IT → large scale out-task options One-time purchase → Freemium (ads + subs) Focus on devices → focus on function, expertise

Page 41: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

41http://www.library.drexel.edu/blogs/librarylog/dollars.gif

The New CurrencyThe New Currencycloud concepts are old –but the mashup is new

http://www.cksinfo.com/clipart/people/bodyparts/eyes/eyeballs.png

http://thomaslarock.com/wp-content/uploads/2009/06/datamining.jpg

Inventory!!

Service Bureau + free TV + Personalization

Data Mining

Page 42: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

42

Reliability/Responsiveness TrendReliability/Responsiveness Trend

Conjecture:

Computers are becoming more reliable & more responsive

People are becoming less reliable & less responsive

Caveat: “All generalizations are false”

Page 43: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

43

Why???Why??? Changes antithetical to collaboration Changes antithetical to collaboration

Information Overload → “Attention Crash”, unplug

Interaction Overload → “Facebook Fatigue”

Needing a zillion different logins to do anything

Different tools for each role & each new info stream

Shift from 2D to 4D media (text → audio/video)

Demise of email → telephone tag (async → sync)

More choice → more stress, chaos

Page 44: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

44

Trends or Cycles?Trends or Cycles? Governance: Central → Community → Individual Resources: Central → Departmental Priesthood → DIY, disintermediation, social net.

Engineering driven → Customer driven Excellence: Technical → Resource & Risk Mgt Build → Buy, borrow, barter Create → Consult, broker, Integrate

Public → Proprietary (info, stds, and technology) Prescriptive rules → Measuring results Internet wild-west → More regulation

Page 45: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

45

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 46: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

46

PatternsPatternscyclic and acyclic evolutioncyclic and acyclic evolution

Computing Mobility Customer Market Expertise Governance Organization Applications

Page 47: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

47

Computing EvolutionComputing Evolution

MainframeMainframe

ClusterCluster

CloudCloud

PersonalPersonal“Cloudframe” ?

Page 48: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

48

Mobility EvolutionMobility Evolution

AnywhereAnywhere

At homeAt home

At the institutionAt the institution

At the MainframeAt the Mainframe Counter force: “Cacooning”

Page 49: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

49

Customer Focus EvolutionCustomer Focus Evolution

IndividualIndividual

TeamTeam

DepartmentDepartment

InstitutionInstitution Counter force: Institutional focus & centralization via budget cuts

Page 50: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

50

Market EvolutionMarket Evolution

ConsumerConsumer

CommodityCommodity

PersonalPersonal

PriesthoodPriesthood Counter force: Market Consolidation; Less choice

Page 51: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

51

Expertise EvolutionExpertise Evolution

AlgorithmsAlgorithms -Death of Intuition-Death of Intuition

CrowdsCrowds -Democracy now!-Democracy now!

IndividualsIndividuals -Power to the people-Power to the people

ElitesElites -Cabals and experts-Cabals and experts

Algorithm authorsbecome the new“IT Priesthood”

Page 52: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

52

Governance EvolutionGovernance Evolution

SharedShared-Community-Community

FederatedFederated-Coordinated-Coordinated

DepartmentalDepartmental-Decentralized-Decentralized

CentralCentral-Controlled-Controlled

IndividualIndividual-Autonomous-Autonomous

?

Page 53: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

53

Organizational EvolutionOrganizational Evolution

AgileAgile

ServiceService

SurvivalSurvival

EntitlementEntitlement

FocusedFocused

?

(Startup Mode)

Page 54: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

54

Application EvolutionApplication EvolutionMoving from software to services

• Build e.g. Pine

• Buy (a right to use) e.g. Outlook

• Borrow (open source) e.g. Thunderbird

• Barter*/Rent (cloud svcs) e.g. Gmail

The evolution repeats at different layers of the stack

The last two are transformational, especially in tight times

* eyeballs for ads

Page 55: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

55

SW Development EvolutionSW Development Evolution

• Market survey: nothing suitable found• Build it locally• Share it: market develops• Off-The-Shelf solutions become available• Feature race begins• Local investment becomes unsustainable• O-T-S solution adopted;

local staff redeployed for the next new thing

Q: How does a niche solution become a commodity? When do you let go?

Page 56: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

56

Interoperability EvolutionInteroperability EvolutionIssue: adding value vs. inhibiting choiceIssue: adding value vs. inhibiting choice

Multiple vendors create similar but non-interoperable solutions

Tension develops between vendor desire for $$ via proprietary lock-in and customer desire for choice or integration via interoperability & stds

Weaker players embrace standards to grow mkt Absent full monopoly, mkt standard overtakes

proprietary solution (e.g. Sony Memory Stick) Vendors refocus on higher-level differentiation

Vendors want to compete on proprietary features;Consumers want vendors to compete on price

Page 57: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

57

Interoperability HierarchyInteroperability Hierarchy

User Interface

Discovery Protocols

Identity / Access Mgt

Data Formats

Data TransferProtocols

Convergenceover time

Breakthroughinnovationmay causereset / recycle

Page 58: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

58

IT Sourcing EvolutionIT Sourcing EvolutionWho ya gonna call (for commodity IT)?

Individual

Departmental

Central

Cloud

Goodbye “IT priesthood”... Hello “Consumer Computing”

In the beginning...

Page 59: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

59

Data Point: Cloud Apps @ UWData Point: Cloud Apps @ UW

64K UW users!

50% of our students ALREADY forward their UW email!

Page 60: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

60

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 61: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

61

Pain & PushbackPain & Pushback

• Social networking• Proprietary silos• Moving targets• Support Costs• Privacy & Trust• Interoperability

Page 62: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

62

Social Networking BacklashSocial Networking BacklashThe Dark Side of Crowd-Sourcing

Jefferson, meet Hamilton...

Page 63: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

63

Page 64: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

64

More BacklashMore Backlash

Page 65: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

65

Proprietary Silos: Innovation at the edge vs. controlling the core

Jonathan Zittrain

Page 66: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

66

Moving Target BacklashMoving Target Backlash

http://mrgadget.co.za/catalog/images/Moving_Target.jpg

Support staff concerns: -Rework (integration code, user docs) -Stuck in the middle... -Can't dodge incoming flak from users when a favorite feature or service changes (or disappears!)

Page 67: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

67

Cloud ConundrumCloud ConundrumDoes Cloud Computing Reduce Support Costs?

“It's cloud illusions I recall I really don't know clouds at all”

Minimizing software support costs... → Implies minimizing service integration → Implies minimizing utility for users

Minimizing user support costs? → Implies more self-service (which is only good if the system is easier!)

Savings?

Page 68: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

68

Study Shows Targeted Ads Make Users Uneasy * By Terrence Russell * April 10, 2008

Privacy & TrustPrivacy & Trust

http://www.wired.com/epicenter/2008/04/study-shows-tar/

Even without ads, many are worried!

Page 69: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

69

Total Information AwarenessTotal Information Awareness

Page 70: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

70http://gilbane.com/globalization/content%20matters.png

Interoperability MattersInteroperability Mattersfor both collaboration & market sharefor both collaboration & market share

http://blog.law.cornell.edu/tbruce/files/2008/03/8b731795-a600-44f7-a744-9b7a501ede5b.jpg

Page 71: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

71http://www.loc.gov/exhibits/bobhope/images/vcvg20.jpg

Non-interoperability BacklashNon-interoperability Backlashexample: the calendaring challenge

Outlook/ExchangeUser IT

Staff

GoogleCalendar

User

Page 72: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

72

IT Evolution & RevolutionIT Evolution & Revolution

• Introduction• Taxonomy• Drivers • Trends• Patterns• Backlash• Advice

Page 73: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

73

AdviceAdvicefor coping with IT change

Remember: Past is (not always) prologue Technology is (always) a two-edged sword IT = Inevitable Tensions & Infinite Transitions

Distinguish: What is cyclical vs. transformational. Things you control vs. externalities that control you. Innovator / early adopter, Fast follower, Slow follower

Avoid: Insularity, entitlement, arrogance Solving problems that are being overtaken by events

Listen, lead, experiment, challenge assumptions

Page 74: IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;

74

FeedbackFeedback

Contact:

Terry Gray <[email protected]>

www.uw.edu/staff/gray