The image cannot be displayed. Your computer may not have ...€¦ · McKinsey Global Institute’s...

Preview:

Citation preview

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

sfdc_ppt_corp_template_01_01_2012.ppt

The Future of Technology is Social, Mobile, & Open Peter Schwartz SVP, Global Government Relations and Strategic Planning

pschwartz@salesforce.com

@peterschwartz2

§  Hyper-connected World

§  Social Technology Revolution

§  Everything is Mobile

§  Machine – Human Symbiosis

§  Managing Threats

§  Conclusions

Source: IBM 2012 Study of 1,709 CEOs, GMs, and Global Business Leaders

For some time, businesses have been refining and optimizing their networks of suppliers and partners. But something just as revolutionary has been happening—the sudden convergence of the cloud, social and mobile spheres—connecting customers, employees and partners in new ways...

A New Reality: Tech Convergence

The Social & Mobile Revolution

1960s Mainframe Computing

1970s Mini

Computing

1980s Client Server

Computing 1990s Cloud

Computing

2000s Mobile

Computing

2010s Social

Revolution

x 10x 100x 1,000x 10,000x 100,000x

Global Mobile Phone Market

Internet Users 2.3 Billion

Global Population 7 Billion

Mobile Phone Subscriptions 6 Billion

Sources: US Census Bureau; International Telecommunication Union; based on Accenture analysis

McKinsey Global Institute’s “The Social Economy: Unlocking value and productivity through social technologies”

Social on a Global Scale

Customers Flocking to Social

Fortune 100 Facebook Fan Growth Fortune 100 Web Traffic Growth 123%

Growth in social customers

Source: Webtrends, “The Effects of Social Networks on the Mobile Web and Website Traffic”; Google Social Media Analysis Study

Jun 2010 Dec 2010 Jun 2011

Dec 2011

Business becomes Social

Source: 2012 McKinsey Global Institute Study: “The Social Economy”

2008 2009 2010 2011 2012

Enterprise Adoption of Social Networking

70% Companies Adopted Social

$1.3 Trillion in value can be unlocked through social technologies.

“ ”

Business is Social What do I know about

our provider? What do I know

about our customer?

Employee Networks

Symbiotic Networks

Can Employers Leverage Employees’ Networks? Customers, Employees,

& Partners Connected

Can Organizations Network Amongst Themselves?

Business is Social

Source: DreamForce 2012 “Business is Social”

Technology Shifts Power

Sources: Comscore, Morgan Stanley, Facebook, Twitter, YouTube, LinkedIn, Wikipedia

Social users 4.5 Billion

Source: Flurry Analytics, iOS and Android, Flurry Estimates

EXPLODING SMART DEVICE INSTALLED BASE

67 71 76 84 93 104 129 144 158 175 194

225 265

319 331 337 358 385

446 480 487

519 529

Jun 10

Jul 10

Aug 10

Sep 10

Oct 10

Nov 10

Dec 10

Jan 11

Feb 11

Mar 11

Apr 11

May 11

Jun 11

Jul 11

Aug 11

Sep 11

Oct 11

Nov 11

Dec 11

Jan 12

Feb 12

Mar 12

Apr 12

Worldwide Smart Device Active Users (Millions)

Frequency of Purchase Made on a Smartphone

0 10 20 30 40 50

Australia

China

Germany

Mexico

USA

Monthly

Google Analytics, Our Mobile Planet, http://bit.ly/Ue9jfD

%

Machines & Humans

2000s Artificial

Intelligence

2010s Human

Machine Symbiosis

2015s Leverage Collective

Intelligence

Technology is Ubiquitous §  Multi-Platform Ecosystem

§  Consistent & Complementary Experiences

§  Unique Experience, Context-sensitive

Consuming Media in New Ways

Source:: Online Marketing Firm Ooyala: www.ooyala.com

Big Data and Online Viewership

Source:: Online Marketing Firm Ooyala: www.ooyala.com

Long-form content (videos of 10+ min.) is over half of the total time spent watching online video in Q1 across all connected devices

Analytics Influencing Consumer Choice

Disk Drive Price Experience Curve

Source: A History of Storage Cost by Mathew Komorowski http://bit.ly/3VqW1u

RFID Deployments Worldwide

Source: RFID Journal Interactive Map http://bit.ly/BeZEt

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

sfdc_ppt_corp_template_01_01_2012.ppt

Security is “Hunting for Threats”

A Greater Horseshoe Bat using ultrasonic echo-locating

calls to navigate and hunt

Source: AOL Pictures http://aol.it/Qw5P2N

Flexible Security Data portability Extensible

Open

No Hardware No Software Innovative

Fast Automatic Upgrades Pay-as-you-go Scales

Easy

Democratic Economical Same infrastructure

Everyone

What Defines Multi-Tenancy?

Green

Comingling is not a Concern

“The fact that it may be stored on the same disk or go through the same processor chip is as irrelevant as worrying about sending your physical mail through the same postal system as your competitors.”

Phil Wainewright, ZDnet

Conclusions §  Tapping Collective Intelligence

§  High Speed Adaptation

§  Device Independence

§  Ubiquitous Networks in a Post-PC Era

§  Computing as a Utility

§  Collaborative Communities

§  Improving Security

Recommended