SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
Telecom Services
D r i v e n b y C u s t o m e r N e e d ?
C o n s t r a i n e d b y c a r r i e r s !
Prof Peter Cochrane OBE
www.petercochrane.com
Global IP Traffic
2014
60
72
88
109
135
16
202015 16 17 18 19 21 22
168
209
220
180
140
120
80
40
0
270
239
Exabytes
Month
Source
An
Opportunity
Space to
A n i n f i n i t e d e m a n d
Global IP Traffic
2014
60
72
88
109
135
16
202015 16 17 18 19 21 22
168
209
220
180
140
120
80
40
0
270
239
Exabytes
Month
Source
An
Opportunity
Space to
A n
o p p o r t u n i t y
s p a c e t o
i n v e s t f o r
A n i n f i n i t e d e m a n d
B U I L D
I T A N D
T H E Y
W I L L C O M E
F B A W S A p p l e
N O T O N E M A J O R
E U C O M P A N Y
I N
T H I S S P A C E
MINdSET MISMATCH
S u p p l i e r : W i r e s a n d P l i e r s
C o p p e r
m i n d
s e t s
p r e v a i l
C u s t o m e r
a n d
o t t
a n g s t
s e r v i n g m a r k e t s - N O T !
G l o b a l S u p p l i e r - D e m a n d M i s m a t c h
s e r v i n g m a r k e t s - N O T !
G l o b a l S u p p l i e r - D e m a n d M i s m a t c h
C u s t o m e r
P r o v i s i o n
F T T H / P
1 G B i t / s
T h e B A S I C
S t a n d a r d
I t ’ s A l l
a b o u t
s e r v i c e s
B a n d w i d t h
C o s t s
N o t h i n g
M I N d S E T M I S M AT C H
S u p p l i e r : D e v i c e o f C h o i c e
L o c k t h e c u s t o m e r i n t o a
l i m i t e d c h o i c e o f d e v i c e ,
a n d p a c k a g e s , s e r v i c e
o p t i o n s a n d l i m i t e d
f l e x i b i l i t y
M I N d S E T M I S M AT C H
S u p p l i e r : D e v i c e o f C h o i c e
L o c k t h e c u s t o m e r i n t o a
l i m i t e d c h o i c e o f d e v i c e ,
a n d p a c k a g e s , s e r v i c e
o p t i o n s a n d l i m i t e d
f l e x i b i l i t y
c o n s t r a i n e d
c u s t o m e r s
c o n s t r a i n e d
I N N O V A T I O N
C u s t o m e r : Ty p e t o S c re e n
D I Y s e r v i c e s e t u p
a n d p ro v i s i o n i n g o n
d e m a n d b y c u s t o m e r
“ I w a n t w h a t I w a n t
- W h e n I w a n t i t
- H o w I w a n t i t
- A t a p r i c e I w a n t ” C u s t o m e r s
i n
t h e
d r i v i n g
s e a t
MINdSET MISMATCH
M I N S E T M I S M ATC H
C u s t o m e r : A p p o f C h o i c e
A n y d e v i c e , s e r v i c e , a p p a n d
s c e n a r i o t h a t w o r k s f o r m e
a n d m y b u s i n e s s a n d m o d e
o f l i f e
M Y
S P A C E
f r e e d o m
a n d
c r e a t i v i t y
THIS LAPTOP
< 5 0 % o f a l l A p p s
E
x
t
e
r
n
a
l
S
S
D
D
u
e
T
O
P
O
O
R
c
o
n
n
e
c
t
i v
i t
y
a
n
d
z
i p
c
l
o
u
d
A
c
c
e
s
s
SEAMLESS CONNECT - NOT
N o s y m m e t r i c b a n d w i d t h - n o C l o u d
O P P O RT U N I T Y S PAC E F O R YO U
K e e p s G r o w i n g E X P ( n ) Y e a r - o n - Y e a r
Supply
Support
Services
Integration
Storage
Security
Recovery
Replacement
Threat Alerts
Trending
Briefings
Tech Radar
Take my pain away
Just make it all work
Defend me
Keep me safe
Keep my business safe
Ensure a fast recovery
Resilience is everything
New threats
New opportunities
New technologies
Worlds Apart
G e n e s i s o r N e m e s i s
n e w
c o
d a t a
e x p l o i t e d
o l d
c o
d a t a
t o l e r a t e d
S e c u r i t y
Scale of Potential Devastation
Potential Depth
of Penetration
Geographical
Metaphysical
Technological
Psychological
Ecological
Biological
Physical
Virtual
Real
Beyond Cyber Alone
Land Sea Air Space Cyber Information
Cyber-Info War
Nuclear-Warfare
Bio-Chemical Warfare
S e c u r i t y
Scale of Potential Devastation
Potential Depth
of Penetration
Geographical
Metaphysical
Technological
Psychological
Ecological
Biological
Physical
Virtual
Real
Total
Extinction
Trigger
Event
CatalystBeyond Cyber Alone
Land Sea Air Space Cyber Information
Cyber-Info War
Nuclear-Warfare
Bio-Chemical Warfare
S e c u r i t y
Scale of Potential Devastation
Potential Depth
of Penetration
Geographical
Metaphysical
Technological
Psychological
Ecological
Biological
Physical
Virtual
Real
Total
Extinction
Trigger
Event
CatalystBeyond Cyber Alone
Land Sea Air Space Cyber Information
THERE IS ONLY
W
AR
AND
EVERY
DOMAIN
IS
INTERCONNECTED Governments
AND
The Military
Can
no
longer
protect their
citizens
B E H AV I O U R S
People
Machines
Networks
Human Fallibility
=
Primary Failure Mechanism
Start
Finish
Breaks
Uploads
Browsing
Downloads
Connections
SocialNets
Individuals
Population
Contacts
Mobility
Content
Mobility
Storage
Devices
Apps
+++
Patterns say it
all very early!
B l o c k C h a i n P
N u m b e r P o r t a b i l i t y
Get the supplier out
of the loop, make
it fast and easy,
put the user
in control
On one device: Enable Multi-Sim
Cloaking/Simulation of users
with multiple IDs/numbers
for any carrier working
anywhere any time
Provides
the max
likelihood
of a good
c o n n e c t i o n
a t a l l times
everywhere
Introduces extra
security options
and new features
A I A S A S E R V I C E
Humans augmented by machines…
Doing far more with for less !
But there will be a lot of disruptive change !
W r o n g M i n d e d ?
How many people
can I replace by AI ?
…and can
I increase
profitability?
R i g h t M i n d e d ?
My people are smart
hard to recruit and cost
a fortune to train…can AI
make them even smarter
and more effective?
…and can
I grow my
business?
Will we be able to
come up with new
service offerings ?
C L O U D V A U L T
T h e U l t i m a t e B a c k u p
Cloud service providers:
- One is dangerous
- Two is better
- Three ideal
I n d e p e n d e n t
D a t a
V a u l t
t h e u l t i M a t e
Parsed,
encrypted,
& distributed,
documents and folders
over multiple servers…
C L O U D S E C U R I T Y
E x t r e m e P r o t e c t i o n & B a c k U p
A => a1 + a2 + a3 +…… an => q1 + q2 + q3 +……qn
q1
q2
q3
q4qn
Parsed Encrypted
Cloud locations, addressing,
order of concatenation, and
routings, all coded/hidden
B l e s s i n g o r B l i g h t
5 GT h e s o l u t i o n t o a l l o u r p ro b l e m s ?
Dominator of IoT
Smart City enabler
Broadband provision
Autonomous vehicles
Replacement for WiFi
Warehouse automation
Production Line monitoring
Medical device communication
+++
+++
Improves your sex life !
I D O n ’ t
T H i n k
s o
P E R S P E C T I VE
N o f i b r e = N o 5 G
The New Silk Road
Beltway ~ 70 Countries
Economies ~ 40% Global
Homes >80% FTTH/P
Infrastructures: Road, Rail,
Water, Mobile, Internet,
Electricity
Access: New Markets, Raw
Materials including Minerals
including Rare Earths
Strategic Thinking
v
Random Walks of
commercialism
Securing
supplies of
Rare Earths
aN IoT Future + Unknowns
• material sourcing
• manufacturing history
• distribution and supply chain
• purchase and ownership details
• application, usage, maintenance, repair
• repurposing, reuse, recycling sequence
• +++
The 5G vision does not scale by energy
demands, functionally, or economically,
but networks without infrastructure do!
E v e r y t h i n g c o m m u n i c a t i n g + + +
ROBOT WAREHOUSING
To d a y w i t h o u t 5 G + + +
container to container
Will never connect directly to mobile nets
container to container
Ship to
shore
Container to
container
to Ship
Wireless system needs a >10 year battery
The majority of containers don’t see the sky
Short range low power wireless is a necessity
Will never connect directly to mobile nets
c o n t a i n e r T o s h i p t o s h o r e
The load management & transit remain Dickensian !
V e r y
o f t e n
s u c h
i n c i d e n t s a r e i n v i s i b l e
u n t I l t h e s h i p u n l o a d s
C o n t a i n e r s a n d
l o a d s g e t d a m a g e d
L o s t a n d
d e s t r o y e d
3,4,5G nets
cannot support
the demands of
future traffic and
logistic networks…
but vehicle to vehicle
systems can…by providing
the most efficient and relevant
linking of users reporting their status
and sharing local/pertinent information
Intelligent?
Sans infrastructure
3,4,5G nets
cannot support
the demands of
future traffic and
logistic networks…
but vehicle to vehicle
systems can…by providing
the most efficient and relevant
linking of users reporting their status
and sharing local/pertinent information
Intelligent?
Sans infrastructure
5
G
T
o
w
e
r
a
n
d
m
a
s
t
d
e
n
s
i t
y
p
o
s
e
s
a
m
a
j
o
r
l
i m
i t
a
t
i o
n
C o n n e c t e d
But only to each other..
I o T F o r R e a l
Monitoring the in:out…health
p r o p h e t i c
Many truths to be revealed
The IoT will lift the lid on
our habits and behaviours,
who we know and meet,
what we buy, eat and drink,
where we travel and go, what
we own and use++++
And for the first time users
and their actual, & not their
p r e s u m e d h a b i t s , w i l l
become a part of the design
loop!
IoT
Security
Tech Support
AI as a service
Service aggregation
AI as a game changer
Information Management
Block Chain Number Portability
Networks without infrastructure
Users managing mix and match service provision
Doing what the Telcos/Netcos do badly or cannot/will not do
O p p o r t u n i t y S P A C E
Huge, evolving and growing very fast…
H y p o t h e s E s
- Most of IoT will not connect to the internet
- 5G unlikely to be dominant
- Data is the biggest opportunity
- Security the biggest sub-space
- Look out for new OTT players !
- Brexit: we can only minimise the damage
B R E X I T R E P O R T
- Remain: UK reputation is already badly damaged
- Leave 1: World can’t wait to get really cheap deals
- Leave 2: UK frozen out of EU market
- Crash Out: Even more damage
- Either way: A decade to recover
- Upside: None, there is only damage
M Y P L E A T O Y O U
The mantra of so very many people…
“But there is no proven market”
PLEASE never say this:
Lest you be thought a fool!
T h a n k Y o u
petercochrane.com
youtube.com/user/peterstarman
slideshare.net/PeterCochrane
T i m e F o r
Q u e s t i o n s

Mais conteúdo relacionado

Mais procurados

The future of education: Solving Problems by Thinking
The future of education: Solving Problems by ThinkingThe future of education: Solving Problems by Thinking
The future of education: Solving Problems by ThinkingUniversity of Hertfordshire
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureUniversity of Hertfordshire
 

Mais procurados (20)

The Ethics of Engineering and Business
The Ethics of Engineering and BusinessThe Ethics of Engineering and Business
The Ethics of Engineering and Business
 
The future of education: Solving Problems by Thinking
The future of education: Solving Problems by ThinkingThe future of education: Solving Problems by Thinking
The future of education: Solving Problems by Thinking
 
Small data big impact
Small data big impactSmall data big impact
Small data big impact
 
HR practices and technology induced change
HR practices and technology induced changeHR practices and technology induced change
HR practices and technology induced change
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
 
Big data to big understanding
Big data to big understandingBig data to big understanding
Big data to big understanding
 
Industry 4.0 and Sustainability
Industry 4.0 and SustainabilityIndustry 4.0 and Sustainability
Industry 4.0 and Sustainability
 
Fibre broadband futures
Fibre broadband futuresFibre broadband futures
Fibre broadband futures
 
The IoT For Real
The IoT For Real The IoT For Real
The IoT For Real
 
TEDx Brixton 2014 Tech Turmoil to Come
TEDx  Brixton 2014 Tech Turmoil to ComeTEDx  Brixton 2014 Tech Turmoil to Come
TEDx Brixton 2014 Tech Turmoil to Come
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
 
Digital Destinies
Digital DestiniesDigital Destinies
Digital Destinies
 
Small data big impact
Small data big impactSmall data big impact
Small data big impact
 
The Stadium Business - Technology of Engagement
The Stadium Business - Technology of EngagementThe Stadium Business - Technology of Engagement
The Stadium Business - Technology of Engagement
 
Future of work.compressed
Future of work.compressedFuture of work.compressed
Future of work.compressed
 
Why Robots, AI, AL and Quantum Computing
Why Robots, AI, AL and Quantum ComputingWhy Robots, AI, AL and Quantum Computing
Why Robots, AI, AL and Quantum Computing
 
Work or Play
Work or PlayWork or Play
Work or Play
 
AI The Call Center Nemesis?
AI The Call Center Nemesis?AI The Call Center Nemesis?
AI The Call Center Nemesis?
 
AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
 
Diy (Health) Care
Diy (Health) CareDiy (Health) Care
Diy (Health) Care
 

Semelhante a Telecom service futures driven by customer need

Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfPRASHANTJUNNARKAR
 
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamCYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamUniversity of Hertfordshire
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & ResilienceUniversity of Hertfordshire
 
Blockchain. The silent revolution.
Blockchain. The silent revolution.Blockchain. The silent revolution.
Blockchain. The silent revolution.AURACHAIN
 
Demonolithing The Monolith? Bullocks!
Demonolithing The Monolith?  Bullocks!Demonolithing The Monolith?  Bullocks!
Demonolithing The Monolith? Bullocks!Scott Sosna
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
Thinking like a Network
Thinking like a NetworkThinking like a Network
Thinking like a NetworkJonas Altman
 
Digital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain ConvergenceDigital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain ConvergenceGokul Alex
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing AttackJune Park
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONDr. Michael Agbaje
 

Semelhante a Telecom service futures driven by customer need (20)

Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Wireless Past Present Future
Wireless Past Present FutureWireless Past Present Future
Wireless Past Present Future
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdf
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamCYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
 
Blockchain. The silent revolution.
Blockchain. The silent revolution.Blockchain. The silent revolution.
Blockchain. The silent revolution.
 
Voip Cyber Security
Voip Cyber SecurityVoip Cyber Security
Voip Cyber Security
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Demonolithing The Monolith? Bullocks!
Demonolithing The Monolith?  Bullocks!Demonolithing The Monolith?  Bullocks!
Demonolithing The Monolith? Bullocks!
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
MSP Automation - Application and Execution
MSP Automation - Application and ExecutionMSP Automation - Application and Execution
MSP Automation - Application and Execution
 
Thinking like a Network
Thinking like a NetworkThinking like a Network
Thinking like a Network
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
Digital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain ConvergenceDigital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain Convergence
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
 

Mais de University of Hertfordshire

Mais de University of Hertfordshire (17)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 
The Scientific Method
The Scientific MethodThe Scientific Method
The Scientific Method
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 
Cyber Security - Becoming Evil
Cyber Security - Becoming EvilCyber Security - Becoming Evil
Cyber Security - Becoming Evil
 
QUANTUM COMPUTING REALITY CHECK
QUANTUM COMPUTING REALITY CHECKQUANTUM COMPUTING REALITY CHECK
QUANTUM COMPUTING REALITY CHECK
 
Biometrics of ID and Security
Biometrics of ID and SecurityBiometrics of ID and Security
Biometrics of ID and Security
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Telecom service futures driven by customer need

  • 1. Telecom Services D r i v e n b y C u s t o m e r N e e d ? C o n s t r a i n e d b y c a r r i e r s ! Prof Peter Cochrane OBE www.petercochrane.com
  • 2. Global IP Traffic 2014 60 72 88 109 135 16 202015 16 17 18 19 21 22 168 209 220 180 140 120 80 40 0 270 239 Exabytes Month Source An Opportunity Space to A n i n f i n i t e d e m a n d
  • 3. Global IP Traffic 2014 60 72 88 109 135 16 202015 16 17 18 19 21 22 168 209 220 180 140 120 80 40 0 270 239 Exabytes Month Source An Opportunity Space to A n o p p o r t u n i t y s p a c e t o i n v e s t f o r A n i n f i n i t e d e m a n d B U I L D I T A N D T H E Y W I L L C O M E F B A W S A p p l e N O T O N E M A J O R E U C O M P A N Y I N T H I S S P A C E
  • 4. MINdSET MISMATCH S u p p l i e r : W i r e s a n d P l i e r s C o p p e r m i n d s e t s p r e v a i l C u s t o m e r a n d o t t a n g s t
  • 5. s e r v i n g m a r k e t s - N O T ! G l o b a l S u p p l i e r - D e m a n d M i s m a t c h
  • 6. s e r v i n g m a r k e t s - N O T ! G l o b a l S u p p l i e r - D e m a n d M i s m a t c h C u s t o m e r P r o v i s i o n F T T H / P 1 G B i t / s T h e B A S I C S t a n d a r d I t ’ s A l l a b o u t s e r v i c e s B a n d w i d t h C o s t s N o t h i n g
  • 7. M I N d S E T M I S M AT C H S u p p l i e r : D e v i c e o f C h o i c e L o c k t h e c u s t o m e r i n t o a l i m i t e d c h o i c e o f d e v i c e , a n d p a c k a g e s , s e r v i c e o p t i o n s a n d l i m i t e d f l e x i b i l i t y
  • 8. M I N d S E T M I S M AT C H S u p p l i e r : D e v i c e o f C h o i c e L o c k t h e c u s t o m e r i n t o a l i m i t e d c h o i c e o f d e v i c e , a n d p a c k a g e s , s e r v i c e o p t i o n s a n d l i m i t e d f l e x i b i l i t y c o n s t r a i n e d c u s t o m e r s c o n s t r a i n e d I N N O V A T I O N
  • 9. C u s t o m e r : Ty p e t o S c re e n D I Y s e r v i c e s e t u p a n d p ro v i s i o n i n g o n d e m a n d b y c u s t o m e r “ I w a n t w h a t I w a n t - W h e n I w a n t i t - H o w I w a n t i t - A t a p r i c e I w a n t ” C u s t o m e r s i n t h e d r i v i n g s e a t MINdSET MISMATCH
  • 10. M I N S E T M I S M ATC H C u s t o m e r : A p p o f C h o i c e A n y d e v i c e , s e r v i c e , a p p a n d s c e n a r i o t h a t w o r k s f o r m e a n d m y b u s i n e s s a n d m o d e o f l i f e M Y S P A C E f r e e d o m a n d c r e a t i v i t y
  • 11. THIS LAPTOP < 5 0 % o f a l l A p p s E x t e r n a l S S D D u e T O P O O R c o n n e c t i v i t y a n d z i p c l o u d A c c e s s
  • 12. SEAMLESS CONNECT - NOT N o s y m m e t r i c b a n d w i d t h - n o C l o u d
  • 13. O P P O RT U N I T Y S PAC E F O R YO U K e e p s G r o w i n g E X P ( n ) Y e a r - o n - Y e a r Supply Support Services Integration Storage Security Recovery Replacement Threat Alerts Trending Briefings Tech Radar Take my pain away Just make it all work Defend me Keep me safe Keep my business safe Ensure a fast recovery Resilience is everything New threats New opportunities New technologies
  • 14. Worlds Apart G e n e s i s o r N e m e s i s n e w c o d a t a e x p l o i t e d o l d c o d a t a t o l e r a t e d
  • 15. S e c u r i t y Scale of Potential Devastation Potential Depth of Penetration Geographical Metaphysical Technological Psychological Ecological Biological Physical Virtual Real Beyond Cyber Alone Land Sea Air Space Cyber Information
  • 16. Cyber-Info War Nuclear-Warfare Bio-Chemical Warfare S e c u r i t y Scale of Potential Devastation Potential Depth of Penetration Geographical Metaphysical Technological Psychological Ecological Biological Physical Virtual Real Total Extinction Trigger Event CatalystBeyond Cyber Alone Land Sea Air Space Cyber Information
  • 17. Cyber-Info War Nuclear-Warfare Bio-Chemical Warfare S e c u r i t y Scale of Potential Devastation Potential Depth of Penetration Geographical Metaphysical Technological Psychological Ecological Biological Physical Virtual Real Total Extinction Trigger Event CatalystBeyond Cyber Alone Land Sea Air Space Cyber Information THERE IS ONLY W AR AND EVERY DOMAIN IS INTERCONNECTED Governments AND The Military Can no longer protect their citizens
  • 18. B E H AV I O U R S People Machines Networks Human Fallibility = Primary Failure Mechanism Start Finish Breaks Uploads Browsing Downloads Connections SocialNets Individuals Population Contacts Mobility Content Mobility Storage Devices Apps +++ Patterns say it all very early!
  • 19. B l o c k C h a i n P N u m b e r P o r t a b i l i t y Get the supplier out of the loop, make it fast and easy, put the user in control On one device: Enable Multi-Sim Cloaking/Simulation of users with multiple IDs/numbers for any carrier working anywhere any time Provides the max likelihood of a good c o n n e c t i o n a t a l l times everywhere Introduces extra security options and new features
  • 20. A I A S A S E R V I C E Humans augmented by machines… Doing far more with for less ! But there will be a lot of disruptive change !
  • 21. W r o n g M i n d e d ? How many people can I replace by AI ? …and can I increase profitability?
  • 22. R i g h t M i n d e d ? My people are smart hard to recruit and cost a fortune to train…can AI make them even smarter and more effective? …and can I grow my business? Will we be able to come up with new service offerings ?
  • 23. C L O U D V A U L T T h e U l t i m a t e B a c k u p Cloud service providers: - One is dangerous - Two is better - Three ideal I n d e p e n d e n t D a t a V a u l t t h e u l t i M a t e
  • 24. Parsed, encrypted, & distributed, documents and folders over multiple servers… C L O U D S E C U R I T Y E x t r e m e P r o t e c t i o n & B a c k U p A => a1 + a2 + a3 +…… an => q1 + q2 + q3 +……qn q1 q2 q3 q4qn Parsed Encrypted Cloud locations, addressing, order of concatenation, and routings, all coded/hidden
  • 25. B l e s s i n g o r B l i g h t 5 GT h e s o l u t i o n t o a l l o u r p ro b l e m s ? Dominator of IoT Smart City enabler Broadband provision Autonomous vehicles Replacement for WiFi Warehouse automation Production Line monitoring Medical device communication +++ +++ Improves your sex life ! I D O n ’ t T H i n k s o
  • 26. P E R S P E C T I VE N o f i b r e = N o 5 G The New Silk Road Beltway ~ 70 Countries Economies ~ 40% Global Homes >80% FTTH/P Infrastructures: Road, Rail, Water, Mobile, Internet, Electricity Access: New Markets, Raw Materials including Minerals including Rare Earths Strategic Thinking v Random Walks of commercialism Securing supplies of Rare Earths
  • 27. aN IoT Future + Unknowns • material sourcing • manufacturing history • distribution and supply chain • purchase and ownership details • application, usage, maintenance, repair • repurposing, reuse, recycling sequence • +++ The 5G vision does not scale by energy demands, functionally, or economically, but networks without infrastructure do! E v e r y t h i n g c o m m u n i c a t i n g + + +
  • 28. ROBOT WAREHOUSING To d a y w i t h o u t 5 G + + +
  • 29. container to container Will never connect directly to mobile nets
  • 30. container to container Ship to shore Container to container to Ship Wireless system needs a >10 year battery The majority of containers don’t see the sky Short range low power wireless is a necessity Will never connect directly to mobile nets
  • 31. c o n t a i n e r T o s h i p t o s h o r e The load management & transit remain Dickensian ! V e r y o f t e n s u c h i n c i d e n t s a r e i n v i s i b l e u n t I l t h e s h i p u n l o a d s C o n t a i n e r s a n d l o a d s g e t d a m a g e d L o s t a n d d e s t r o y e d
  • 32. 3,4,5G nets cannot support the demands of future traffic and logistic networks… but vehicle to vehicle systems can…by providing the most efficient and relevant linking of users reporting their status and sharing local/pertinent information Intelligent? Sans infrastructure
  • 33. 3,4,5G nets cannot support the demands of future traffic and logistic networks… but vehicle to vehicle systems can…by providing the most efficient and relevant linking of users reporting their status and sharing local/pertinent information Intelligent? Sans infrastructure 5 G T o w e r a n d m a s t d e n s i t y p o s e s a m a j o r l i m i t a t i o n
  • 34. C o n n e c t e d But only to each other..
  • 35. I o T F o r R e a l Monitoring the in:out…health
  • 36. p r o p h e t i c Many truths to be revealed The IoT will lift the lid on our habits and behaviours, who we know and meet, what we buy, eat and drink, where we travel and go, what we own and use++++ And for the first time users and their actual, & not their p r e s u m e d h a b i t s , w i l l become a part of the design loop!
  • 37. IoT Security Tech Support AI as a service Service aggregation AI as a game changer Information Management Block Chain Number Portability Networks without infrastructure Users managing mix and match service provision Doing what the Telcos/Netcos do badly or cannot/will not do O p p o r t u n i t y S P A C E Huge, evolving and growing very fast…
  • 38. H y p o t h e s E s - Most of IoT will not connect to the internet - 5G unlikely to be dominant - Data is the biggest opportunity - Security the biggest sub-space - Look out for new OTT players ! - Brexit: we can only minimise the damage
  • 39. B R E X I T R E P O R T - Remain: UK reputation is already badly damaged - Leave 1: World can’t wait to get really cheap deals - Leave 2: UK frozen out of EU market - Crash Out: Even more damage - Either way: A decade to recover - Upside: None, there is only damage
  • 40. M Y P L E A T O Y O U The mantra of so very many people… “But there is no proven market” PLEASE never say this: Lest you be thought a fool!
  • 41. T h a n k Y o u petercochrane.com youtube.com/user/peterstarman slideshare.net/PeterCochrane T i m e F o r Q u e s t i o n s