38
Peter Coffee VP / Head of Platform Research salesforce.com inc. Connecting Above the Cloud

Connecting Above the Cloud

Embed Size (px)

DESCRIPTION

AITP San Diego Cloud Conference 2013 Peter Coffee Keynote

Citation preview

Page 1: Connecting Above the Cloud

Peter Coffee

VP / Head of Platform Research

salesforce.com inc.

Connecting Above

the Cloud

Page 2: Connecting Above the Cloud

Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report and on our Form 10-Q for the most recent fiscal quarter: these documents and others are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.

Safe Harbor

In Fewer Words:

Everything That

You’ll See Here

is Real

Page 3: Connecting Above the Cloud

“Digital” Camera?

“Cellular” Phone?

“Cloud” Computing?

“Someday, you’ll have to tell your kids about

phones that had wires…and TVs that didn’t” - Scott McNealy

Over the Long Run, Adjectives Vanish

Page 4: Connecting Above the Cloud

“Digital Camera”: every December, it’s still news to someone

“Cloud Computing”: more use it, fewer ask about it

This Is How Novelty Ends

Page 5: Connecting Above the Cloud

Will Today’s Disruptors Sign In, Please?

Mobility

Social Interaction

Big Data

Page 6: Connecting Above the Cloud

‘Cloud’ is Where the Puck Used to Be

“Big Data” gives the cloud something to do

– Elastic capacity for high peak/average ratios

– Connectivity to real-world, real-time…reality

Page 7: Connecting Above the Cloud

Discovery, Not Query What the World is Doing, not What the Business Did

“By combing through 7.2

million of our electronic

medical records, we have

created a disease network to

help illustrate relationships

between various conditions

and how common those

connections are. Take a look

by condition or condition

category and gender to

uncover interesting

associations.”

visualization.geblogs.com/visualization/network/

Page 8: Connecting Above the Cloud

Your “Product”…Becomes Just a Data Collector

“The addition of BaseSpace

eliminates the need for

expensive IT infrastructure,

simplifying the process of

adopting a personal

sequencer for labs of any

size and experience,”

commented Illumina CEO

Jay Flatley.

Illumina Launches BaseSpace

Cloud Platform for MiSeq October 12, 2011

Page 9: Connecting Above the Cloud

Mobile Data Sources: Where the Puck is Going

Android and iOS combined market share approaching 2/3

Windows at ~1/5…and shrinking

Page 10: Connecting Above the Cloud

Mobility: More Than a Handle

There are three parts of user

experience to increase convenience:

immediacy, simplicity and context.

The three parts make up a customer’s

mobile context, or the overall feedback

of what a customer has told you and is

experiencing during engagement.

The Future Of Mobile Is User Context Context Transforms Product Opportunities For Consumer Product Strategists

Page 11: Connecting Above the Cloud

Multi-Device Users Demand Decoupling

Page 12: Connecting Above the Cloud

What is an “application” anyway?

Old “applications”:

– Data captured as by-product of business activity

– Function driven by familiar business tasks

– User experience an afterthought

– Built by programmers; judged on cost & efficiency

New “apps”:

– Data captured through algorithms of discovery

– Function driven by customer delight

– User experience a top priority

– Apps built by front-line business units; judged on ROI

Page 13: Connecting Above the Cloud

App Requirement

Install &

Configure Stack Write Code

Deploy &

Load Test

Monitor &

Tune

Patch &

Regression Test

Apps Revolution Requires PaaS Speed

Legacy Stack-Based Process – Wherever it Is

IDC White Paper sponsored by Salesforce.com: “Force.com Cloud Platform Drives Huge Time to Market and Cost Savings”, Doc # 219965, September, 2009

Half-life of desktop client turnover is ~10 years (WinXP: 50% market share @ 10th birthday)

Average time to build a custom app with software is ~8 months (IDC)

Since 2009, Qualcomm/Android cycle time has dropped to < 4.5 months

PaaS advantage shrinks development time fivefold

Anything slower subsetting device features or skipping generations

Page 14: Connecting Above the Cloud

What do you get from

Patterns in big data

derived from

Social networks

of people & devices

via

Ubiquitous, 247

mobile connection?

Data, from Networks, Fed by Devices

Page 15: Connecting Above the Cloud

In a World of Five Billion Smart Phones

“People making calls or sending text messages

originating at the Kericho tower were making 16 times

more trips away from the area than the regional

average. What’s more, they were three times more

likely to visit a region northeast of Lake Victoria that

records from the health ministry identified as a malaria

hot spot. The tower’s signal radius thus covered a

significant waypoint for transmission.”

“This is the future of epidemiology. If we are to

eradicate malaria, this is how we will do it.”

– Caroline Buckee

Page 16: Connecting Above the Cloud

Michael Koster, Open Source Internet of Things

www.meetup.com/The-Open-Source-Internet-Of-Things-Silicon-Valley/

APIs evolve;

ecosystems emerge

Connecting at Scale: An Internet of Things is Real

Page 17: Connecting Above the Cloud

Fortune 100 Facebook Fan Growth

Fortune 100 Web Traffic Growth

123% growth in social customers

Webtrends, “The Effects of Social Networks on the Mobile Web and Website Traffic”;

Google Social Media Analysis Study

Jun 2010

Dec 2011

Your Brand Is No Longer Your Property

“We analyzed the website

traffic of Fortune 100

websites based on ‘unique

visits’. The study revealed

that 68% of the top 100

companies were

experiencing a negative

growth in unique visits over

the past year... 40%

exhibited higher traffic to

their Facebook page

compared to their website.”

Fortune 100 Facebook Activity

Fortune 100 Web Activity

Page 18: Connecting Above the Cloud

Old Customers:

– Prospects get content from Marketing

– Buyers negotiate terms with Sales

– Customers raise issues with Support

Social Customers:

– Prospects seek insights from customers

– Buyers collaborate on competitor research

– Customers tell the world when they’re not happy

Companies need new organizations & processes

– Every employee/contractor/partner is a spokesperson/avatar

– Power to address issues must be pushed to edge of organization

– Collaborative response must be available on demand

The Social Customer Plays by New Rules

Page 19: Connecting Above the Cloud

TECH 5/06/2013 @ 8:39PM | 5,338 views

10 Ways Cloud Computing Is Revolutionizing Manufacturing

Designing in services is now becoming commonplace, making cloud

integration expertise critical for manufacturers.

From simplistic services integration on iPhones to the full implementation

of voice-activated controls including emergency assistance in the latest

luxury cars, adding in services integrated to the cloud is redefining

the competitive landscape of industries today.

Revising a product or launching a new product generation with

embedded services can mitigate price wars, which is why many

manufacturers are pursing this strategy today.

Products are Also Connected

Page 20: Connecting Above the Cloud

If you think people are

touchy about their

money, wait ’til you

know where they were

parked…and who else

was in the car…with

what kind of music

playing on the radio.

It’s essential to reduce

complexity and to

narrow the scope of

privileges – rather than

compounding

complexity and

enabling more

superusers.

Connected Planets Elevate Issue of Trust

Page 21: Connecting Above the Cloud

“Boiler rooms in Berlin or Bucharest, a pump-and-dump

scheme out of Parma or the Dordogne…are U.S.

concerns” – Paul Atkins, SEC Commissioner

• Data-handling laws proliferate

• Notification of Risk to Personal Data Act

• Personal Data Privacy and Security Act

• Data Accountability and Trust Act

• Social Security Number Protection Act

• Prevention of Fraudulent Access to

Phone Records Act

• Technology trends oppose the goals of governance

• Processing: enemy of encryption

• Connectivity: attacker opportunities and tools

• Storage: ever-growing risk of larger losses

Connected Planets Challenge IT Governance

Page 22: Connecting Above the Cloud

You All Know This. Most People Don’t.

• Each app has its own dedicated software stack • Each stack needs duplicative maintenance • Every app and its stack are individual

opportunities for error or misconfiguration • Pace of innovation is slowed by need for

cumbersome regression test / re-implementation

Our infrastructure

Other apps

Server

OS

Database

App Server

Storage

Network

App 1

Server

OS

Database

App Server

Storage

Network

App 2

Server

OS

Database

App Server

Storage

Network

App 3

• Applications share an “instance” of the platform • Platform updates apply to all at once • Massive economies of talent, energy and cost

Legacy IT Model Multi-Tenant Cloud

Page 23: Connecting Above the Cloud

When the Platform is a Service: Apps Assurance

iOS + Android:

100 billion downloads

> 1,800 apps

> 1,100 partners

> 1.9 M installations

~70% of Fortune 1000 using at

least one

Page 24: Connecting Above the Cloud

Password security policies

Rich Sharing Rules

User Profiles

SSO/2-factor solutions

Login… Authenticate…Apply Data Security Rules… View Filtered Content

When Platforms Are Born In the Cloud…

…Assets Can Be Shared and Secure

Page 25: Connecting Above the Cloud

Granular Privilege Assignment

+ Expanding Ecosystem of Management Tools

Page 26: Connecting Above the Cloud

Coherent Code Base and Managed Infrastructure

Your Clicks

Your Code

User Interface

Logic

Database

Selectively exposed data, logic and customizations

Click to Connect

Salesforce to Salesforce Sharing

Page 27: Connecting Above the Cloud

Compliance Mandates Map to Cloud Capabilities

Visibility and Assessment – Public Company Accounting Reform and Investor Protection Act (“Sarbanes-Oxley”) §404

requires “internal control report” (establishment and evaluation) combined with §302

requirement to certify “appropriateness”

– True PaaS architecture makes all applications subject to a single, visible trust

model; enables and facilitates automated workflows; and enables precise

auditability of actions

Privacy Assurance and Control – Financial Services Modernization Act (“Gramm-Leach-Bliley”) Title V requires periodic customer

engagement and “opt-out” provision

– Metadata field-level connection, under customer control, enables excellent

visibility and assured revocation of sharing

Modern and Rigorous Encryption – California Security Breach Information Act (“SB-1386”) mandates disclosure of suspected

breach of unencrypted data

– Both internal and boundary encryption can readily be applied to PaaS

Page 28: Connecting Above the Cloud

Data Governance Norms are Global

“While the [USA] Patriot Act continues to be invoked as a

kind of shorthand to express the belief that the United

States government has greater powers of access to

personal data in the Cloud than governments elsewhere,

and that ‘local clouds’ are the solution, a recent study we

conducted of the laws of Australia, Canada, Denmark,

France, Germany, Ireland, Japan, Spain, United

Kingdom—and the United States—shows that it is simply

incorrect to assume that the United States government's

access to data in the Cloud is greater than that of the

other advanced economies.

“Law enforcement and national security officials have

broad access to data stored locally with Cloud service

providers in the countries we investigated. Our research

found that that it is not possible to isolate data in the

Cloud from governmental access based on the physical

location of the Cloud service provider or its facilities, and

that Governments' ability to access data in the Cloud

extends across borders.” - http://www.hoganlovells.com

Page 29: Connecting Above the Cloud

Trusted Advisors Recommend the Cloud

Potential benefits from

transitioning to a public

cloud computing

environment:

• Staff Specialization

• Platform Strength

• Resource Availability

• Backup and Recovery

• Mobile Endpoints

• Data Concentration

Page 30: Connecting Above the Cloud

Despite resource sharing, multitenancy will often

improve security. Most current enterprise security

models are perimeter-based, making you

vulnerable to inside attacks. Multitenant services

secure all assets at all times, since those within the

main perimeter are all different clients…

Multitenancy is here to stay. Our research and

analysis indicates that multitenancy is not a less

secure model — quite the opposite!

Assets Secured In Depth – All the Time

Page 31: Connecting Above the Cloud

“I’ve been looking for it, but I can't find any real evidence that the cloud is more risky than hosting everything completely internal,” said Wade Baker, managing

principal of Verizon's RISK group, which investigates breaches. Verizon owns cloud provider Terremark. “I’ve studied a lot of breaches; we get a lot of information

from a lot of different organizations, and it doesn’t seem to be there.”

Most hacking attacks against corporations are still aimed at internal computer systems, he said. Eighty percent of the breaches Verizon investigated in 2012

involved internally hosted data. The remainder involved externally hosted data -- but those breaches began inside companies’ networks and spread to

the third-party hosting services, not the other way around, Baker said.

- www.bloomberg.com/news/2013-03-26/security-fears-give-way-to-economics-as-cloud-computing-grows.html

Savvy Attackers Aim at Softer Targets

Page 32: Connecting Above the Cloud

If It’s Such A Good Idea…

…Why Isn’t Everyone Doing It?

0

20

40

60

80

100

120

140

0 5 10 15 20 25 30

Flame started here

What happened here? *

* In a pot of water mixed with ice, this is where the last ice melted

Minutes

Page 33: Connecting Above the Cloud

They’d Rather Ride a Unicorn

– You’ll be told that CIOs “prefer a private cloud”

– If it’s not really a choice, a ‘preference’ is a fantasy

• The cloud is connection, not isolation

• The cloud is agility, not stagnation

They’re Used to Feeding Their Minotaur

– Social, mobile and open IT are competitive mandates

– The skills required to do it are scarce

– Talent mustn’t be wasted supporting non-differentiating IT

They Don’t Realize They’re Antisocial

– Social tools aren’t merely recreational

– Events should call for attention

– Content should accompany conversations

– Workplace tools shouldn’t constrain contributions

The Last Bits of Ice in the Cloud

Page 34: Connecting Above the Cloud

Connected Computing Leaves the Desk Behind

“Desktop metaphor” is 25 years old

– Xerox…

– Apple…

– Microsoft…

…but today,

1/3 of U.S.

adults own

at least one

tablet…

…and usually don’t use it at a desk

Page 35: Connecting Above the Cloud

It’s Time to Make the Customer the Focus

1st-generation computer: enter code with switches

– Think about memory and storage

– 1st-gen operating system: “Load my program”

2nd-generation computer: command-line window

– Think about programs and files

– 2nd-generation OS: “EDIT MY_FILE”

3rd-generation computer: desktop metaphor

– Think about ‘documents’ like spreadsheets

– 3rd-generation OS: double-click an icon

It’s time for the next generation

A platform that connects with…customers

Page 36: Connecting Above the Cloud

How We Plan to Do It

Bigger:

“September was another

record month – 31.5 billion

transactions, up 50% from

September ’12, with average

response time of 253 ms”

- Tuesday, 6:44 a.m.

Better:

GA Criteria for New

Functionality

UI will be built on top of

public API

Thus, the API is functionally

complete with the UI

Page 37: Connecting Above the Cloud

You’ll Get the Cloud You Ask For

If you treat the cloud as merely a way to

modernize your IT, that’s all you’ll get.

No matter how creatively and competently that

modernization is done, it will not be enough.

Broadening the perspective requires enlarging

the community of stakeholders and lengthening

the list of criteria for success.

Page 38: Connecting Above the Cloud

@petercoffee

linkedin.com/in/petercoffee

f facebook.com/peter.coffee

[email protected]