Meeting enterprise requirements with mash-ups Sean Phelan Founder & Chairman.

Slides:



Advertisements
Similar presentations
Chapter 3 E-Strategy.
Advertisements

Technology Acceptance Model. Copyright 2007 Black & Rossi, LLC All rights reserved 10/15/05 Black & Rossi, LLC, all rights reserved Who we are Technology.
PROJECT TITLE Project Leader: Team: Executive Project Sponsor (As Required): Date: Month/Day/Year 110/17/2014 V1.
Thought Leadership Portals: Drive for Transparency NAW Large Company Technology Networking Conference June 17, 2008 NAW Large Company Technology Networking.
CS487 Software Engineering Omar Aldawud
STEVE PEARCE CHANNEL MARKETING MANAGER. WHY ARE YOUR CUSTOMERS REQUESTING MANAGED PRINT SERVICES? Quocirca 2013 How important are the following drivers.
© Radiant Innovation Who Am I ? UK – based management consultancy – 1 person at present, but with growth plans Focused on change and innovation.
Magic Quadrants 1. Research Processes Behind Methodologies 2 Qualitative Insight Research Quantitative Market Research Magic Quadrants Market Scopes Hype.
Investing in a Transformed Market May 13, 2008 E/ME 103 Caltech Lecture.
DEVELOP CONTENT FOR USE IN MARKETING COMMUNICATIONS TO CREATE INTEREST IN PRODUCT/BUSINESS/IDEA.
Greg Baker © Part One The Foundations – A Model for TQM Chapter # 3 Design for quality.
The Architecture Design Process
Geographical Information Systems By: Philip Galloway Database Concepts.
Hype Cycle 2010 and Cloud Computing Sidra Inayat.
Developing and Managing Products
CIO Leader - 1. CIO Leader - 2 ITGI Research on Executives’ View of IT Investments The perceived low return from high-cost IT investments, and an inadequate.
Business Models in the Internet of Services Nikolay Mehandjiev, University of Manchester Benjamin Gil, Atos Origin.
WebGIS. Web & GIS ….WebGIS Access without purchasing proprietary software Data directly from producer Emerging new market.
Integrating Business Strategy and R&D Strategy Frameworks for R&D Strategy Formulation.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
©2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Model Bank Testing Accelerators “Ready-to-use” test scenarios to reduce effort, time and money.
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
Chapter 5: Requirement Engineering Process Omar Meqdadi SE 2730 Lecture 5 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
MGT-519 STRATEGIC MARKETING AAMER SIDDIQI 1. LECTURE 24 2.
The IP Communications Top 5 Richard McLeod Director, IP Communications Worldwide Channels Cisco Systems.
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
Software Processes lecture 8. Topics covered Software process models Process iteration Process activities The Rational Unified Process Computer-aided.
AJAX and Atlas in ASP.NET 2.0 William J. Steele MSDN Developer Evangelist Microsoft Corporation
E-Learning for Small- to Medium-Sized Businesses Diane Elkins and Desireé Ward Alcorn, Ward, & Partners, Inc. E-Learning for Small- to Medium-Sized Businesses.
© 2007 IBM Corporation Lotus Mashups Mashup Technical Exchange Meeting January 31, 2008.
Presentation Guidelines. I. OPPORTUNITY 1: Market need What problem does the product solve? Is the solution to this problem based on an innovative product/technology/model?
marketing communication involves communication about the product the product or service an element in the marketing mix aimed at informing, influence.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 7 Slide 1 Requirements Engineering Processes.
Product Research Product development marketing research serves several goals: new product design and market validation research, or assessing existing.
National Housing Locator Presentation to DAS Feb. 14, 2008.
Active Server Pages and Application Service Providers Architecture for 2000 and beyond Krishen Kota Denali Technologies
ENTREPRENEURS AND THEIR ROLE IN THE ECONOMY An entrepreneur is a managed risk- taker who sees opportunities and allocates resources to implement ideas.
Prof. Dr. –Ing. Kalamullah Ramli 1 Marketing is Selling.
The System and Software Development Process Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
It is equal to the marketing communications. It relates to the products or services of the communications products. Promotion is an element of the marketing.
® IBM Software © IBM Corporation IBM Internal Use Only--Not to be shared outside the company until July 25, 2006 Processor Value Unit Licensing for Middleware.
Employing people. Full time employees  Full time employment is by far the most significant part of total employment in the UK.
Creating Rich Internet Applications with WebFOCUS Patrick Hammond April 6, 2010.
Web Service Future CS409 Application Services Even Semester 2007.
What can Business Psychology do to map and measure Organisation Culture? A presentation for the Association of Business Psychologists 22nd September 2003.
The Hype Cycle. The five stages in Gartner's interpretation of the Hype Cycle. 1. "Technology Trigger" is the first phase of a hype cycle. This could.
Digital Ecosystems Re-tuning the user requirements after 3 years Digital Ecosystems Re-tuning the user requirements after 3 years Towards Business Cases.
Let Ascension take your business to new heights Expert Knowledge Sharing (Utilising Knowledge as a Commodity) Scott Warnock Andrew Smillie.
ERP Implementation Lifecycle
CONDUCTING A FEASIBILITY ANALYSIS
© Copyright 2006 Glimmerglass. All Rights Reserved. More than just another single point of failure? Optical Switching.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
New Product Development Page 1 Teddy Concurrent Engineering by Teddy Sjafrizal.
Telefónica Data Perú S.A.A. How will e-commerce affect the Transportation Industry Ing. Ricardo Lanfranco Varea Central Manager Sales & Marketing Telefónica.
Digital repositories: All hype and no substance? Marinus Swanepoel.
LAUNCHING NEW ventures – AN ENTREPRENEURIAL APPROACH, 7e
Technology-based industries and the management of innovation Kyle Kunkel Teddy Lathrop Thor Fink John Barron Parker.
LIFE CYCLE OF AN ENTREPRENEURIAL VENTURE
Kenneth Pelman September 21, Introduction and Problem Statement Evaluation Plans Tool Description Significance and Limitations Future Research.
CONFIDENTIAL SPE Service Opportunities Draft. page 1 Traditional Studio Content and Distribution Businesses are Fragmenting Studio User Generated Games.
Beneath the Bonnet of Education in the Post-Digital Age DR RAY STONEHAM UNIVERSITY OF GREENWICH.
KiloBytes Technologies “New Face Of Technology” / Website: SEOwww.kilobytes.inSEO.
Commercial benefits to organisations using geospatial mash-ups and open standards Norman Barker Consultant
CONFIDENTIAL SPE Service Opportunities Draft. page 1 Traditional Studio Content and Distribution Businesses are Fragmenting Studio User Generated Games.
1 DEPLOYMENT AND OPERATIONS MODULE 23 ECM SPECIALIST COURSE 1 Copyright AIIM.
PCW.
Web Application Firewalls: Panel Discussion
Technology Management derived from the definition of Technology Management is as follows: Information Technology Management is concerned with: exploring.
Digital Literacies for learning
Presentation transcript:

Meeting enterprise requirements with mash-ups Sean Phelan Founder & Chairman

Page 2 Confidential Technology Diffusion When does the Enterprise Get It? One answer: Enterprise customers deploy new technologies as and when they reach acceptable levels of stability and reliability, and can be shown to deliver competitive advantage (yawn). Another answer — Tim O’Reilly’s Hacker Cycle: Leading-edge developers (hackers) experiment with a new technology and/or application; Innovators and/or entrepreneurs recognise commercial applications of the hacker’s work, create 1st-generation products & services; Established vendors acquire and/or copy entrepreneurial start-ups, sell high-end products and services to enterprise customers. Applying either or both approaches, where do map mash-ups stand today?

Page 3 Confidential Gartner Hype Cycle 1. "Technology Trigger” The first phase of a Hype Cycle is the "technology trigger" or breakthrough, product launch or other event that generates significant press and interest. 2. "Peak of Inflated Expectations" In the next phase, a frenzy of publicity typically generates over-enthusiasm and unrealistic expectations. There may be some successful applications of a technology, but there are typically more failures. 3. "Trough of Disillusionment" Technologies enter the "trough of disillusionment" because they fail to meet expectations and quickly become unfashionable. Consequently, the press usually abandons the topic and the technology. 4. "Slope of Enlightenment" Although the press may have stopped covering the technology, some businesses continue through the "slope of enlightenment" and experiment to understand the benefits and practical application of the technology. 5. "Plateau of Productivity" A technology reaches the "plateau of productivity" as the benefits of it become widely demonstrated and accepted. The technology becomes increasingly stable and evolves in second and third generations. The final height of the plateau varies according to whether the technology is broadly applicable or benefits only a niche market.

Page 4 Confidential Gartner 2006 Emerging Technologies Hype Cycle Source: Mash-ups AJAX Web 2.0

Page 5 Confidential Enterprise-ready?

Page 6 Confidential How to add Geospatial capabilities to Enterprise data 1980 — 1999:Buy a GIS (ESRI, Laserscan, Mapinfo); license data; recruit team; integrate enterprise & geospatial data — 2005: Provide browser-based access to enterprise data (intranet); link to external map services — present: use Web Services (XML) feed to incorporate externally-hosted Geospatial capabilities into internal & external-facing applications (server-side integration) 2006 onward: use XML/AJAX/JSON feed to incorporate externally-hosted Geospatial capabilities into internal & external-facing applications (client-side integration, or mash-up)

Page 7 Confidential Difficult & Expensive Implementation Complexity Client-side vs. Server-side integration Quick, Cheap & Easy Buy a GIS Link to a map XML Services Full ASP Service Mash-up Server-side Integration Client-side Integration (No programming) (Programming)

Page 8 Confidential Simple, basic mapping Rich & extensible Functionality Holy Grail: Quick, cheap, easy with rich & extensible functionality Buy a GIS Link to a map XML Services Full ASP Service Mash-up ? Difficult & Expensive Implementation Complexity Quick, Cheap & Easy

Page 9 Confidential Multimap XML traffic as share of all B2B traffic

Page 10 Confidential Multimap XML Services as share of all new live services

Page 11 Confidential Transition from HTML to XML to AJAX/APIs Use of XML by Multimap clients grew from zero to ~30% of new users & traffic over a period of 3-4 years. However, a few large clients made the switch relatively early. Early indications suggest that we might see the same profile for the switch to the API: Early adoption by large clients Widespread interest Short development cycle required to make the change However, important to note that API-based mash-ups are an attractive substitute for XML services; mash-ups likely to substitute for XML services in the short term Overall trend is from HTML (Web 1.0) to AJAX/APIs/Mash-ups (Web 2.0)

Page 12 Confidential Scenario & timeline for move to APIs/mash-ups

Page 13 Confidential Meeting enterprise requirements with mash-ups: Conclusions Implementation of AJAX/API-based enterprise systems will catch up and overtake XML implementation in 2007 — led by the property and travel sectors; AJAX/API implementations will represent half of all enterprise web-mapping implementations by the end of 2008; Media coverage of web 2.0/mash-ups/etc. will have largely subsided by the time widespread enterprise deployment tests and validates the initial hype; and As always, SLAs are key to enterprise adoptions, covering: Service availability; Data currency; Technical and end-user support; and Long-term service continuity.

Page 14 Confidential Example: Yell.com

Page 15 Confidential Example: Yell.com

Page 16 Confidential Example: Yell.com