SlideShare une entreprise Scribd logo
1  sur  16
Disruptive Technology Alex Rafferty Rob Kryger Ryan Sutphin Scott Barnett
The organization has to accept that this may happen Start designing or modifying their technology to be compatible with the new disruptive technology In order to plan for the inevitable event they have to accept and embrace the technology that will come out of it Organizations and this Inevitable Event
If the organization does not modify its own hardware and software for this new technology then it will be left behind Employees that have the new technology will be incapable of completing their work due to the incompatibility of the systems Organizations and this Inevitable Event
There may be compatibility issues The new technology may not have the software to run other types of software The new Motorola docking station only has Firefox; Stevenson math classes use Math Lab which only runs on Internet Explorer Those with the new Motorola technology will not have access to critical software for Stevenson students Impact on Current Software
If everyone switches to this new technology then the old software that was relied on will be obsolete because it cannot be used on the new system Compatibility is the biggest problem along with some software becoming obsolete This will create chaos within the school, organization, or company until it can be resolved Impact on Current Software
Disruptive technologies are not always disruptive to customers, and often take a long time before they are significantly disruptive to establish companies Existing businesses are often reluctant to take advantage of it, since it would involve competing with their existing (and more profitable) technological approach Who are the Winners and Losers
Networking in general will become increasingly mobile  Considering everyone carries their phone around with them, with the advent of this new technology everyone will have their “computer” on them at all times Wireless technology will become increasingly advanced and widely used Along with increased mobility comes a greater use of and greater need for more advanced wireless technologies Impact on Networking
Crossover to The Cloud Cloud-based sites and services are becoming more and more common. This new technology will greatly increase the use of The Cloud. Storing data on remote servers so it is accessible anywhere, from any device goes hand-in-hand with an increase in mobility and wireless technology. Smart phones don’t have enough memory to keep all that stuff when there are millions of apps to be downloaded, although I am sure storage space on smart phones will begin to increase dramatically. Impact on Networking
Security and Access to Systems Corporations will need the MAC addresses of all their employees’ smart phones so that when someone accesses the network via their smart phone the company will be able to identify that device as one belonging to an employee This will make it so that not just anyone can connect to the company’s network via their smart phone and have access to sensitive information
Security and Access to Systems Company user log-ins unique to each employee will also be important to have This will prevent someone who has stolen an employer’s smart phone from being able to access the company’s network MAC address filtering and user log-ins coupled with an IT department that keeps up-to-date and on top of all of the new security trends should provide adequate security even with the new technology
Accessibility Always have your files right at your fingertips Save Companies that supply desktops, phones, and or laptops to employees can cut costs They can supply their employers with only a smart phone and that smart phone will be able to fit their needs.  Benefits to Corporations and Organizations
Security Sensitive information can be available to the public with a smart phone Companies will need to create access codes or other means of security Disadvantages
Durability It is extremely easy to break a phone In my experience, phones break extremely easy. I usually have to purchase a new phone every year. Laptops can last much longer. I have had the same one for a couple of years. Laptops are much more durable due to the fact that they are not always taken everywhere with you. Disadvantages
Docking station uses Firefox A lot of programs still only use Internet explorer This may be a major problem for organizations that make electronic study systems. They will have to figure out a way to make their programs compatibility more flexible It is already unacceptable that these programs cannot be used on Macs. Compatibility
Some technology will become obsolete Laptops Desktop computers Regular phones Everything you need will be stored and ran right from a smart phone, the size of a credit card.  Disadvantages
We are likely to see similar disruptive changes throughout the years Technology is changing extremely quickly  Every year technology is shrinking and becoming more mobile It is very likely that this change, or one similar to it, will occur within the next five years Within the Next Five Years

Contenu connexe

Tendances

Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Softchoice Corporation
 
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARDScalefusion
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet IBM Sverige
 
Communicating and Collaborating Through the Cloud
Communicating and Collaborating Through the CloudCommunicating and Collaborating Through the Cloud
Communicating and Collaborating Through the CloudUXC Connect
 
Mark Aberdour - New technologies for compliance training
Mark Aberdour - New technologies for compliance trainingMark Aberdour - New technologies for compliance training
Mark Aberdour - New technologies for compliance trainingEpic
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security IncidentsARP
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicIBM Security
 
How can Artificial Intelligence improve software development process?
How can Artificial Intelligence improve software development process?How can Artificial Intelligence improve software development process?
How can Artificial Intelligence improve software development process?Tyrone Systems
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudySoftchoice Corporation
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocWalmart Super Center
 
Road ahead for performance testing
Road ahead for performance testingRoad ahead for performance testing
Road ahead for performance testingDeb Hota
 
Latest trends in Assistive Technology Solutions
Latest trends in Assistive Technology SolutionsLatest trends in Assistive Technology Solutions
Latest trends in Assistive Technology Solutionsiansyst
 

Tendances (18)

Education slides_MMPL
Education slides_MMPLEducation slides_MMPL
Education slides_MMPL
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017
 
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
Communicating and Collaborating Through the Cloud
Communicating and Collaborating Through the CloudCommunicating and Collaborating Through the Cloud
Communicating and Collaborating Through the Cloud
 
Mark Aberdour - New technologies for compliance training
Mark Aberdour - New technologies for compliance trainingMark Aberdour - New technologies for compliance training
Mark Aberdour - New technologies for compliance training
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security Incidents
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
How can Artificial Intelligence improve software development process?
How can Artificial Intelligence improve software development process?How can Artificial Intelligence improve software development process?
How can Artificial Intelligence improve software development process?
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research Study
 
Mobile Applications for Business Use
Mobile Applications for Business UseMobile Applications for Business Use
Mobile Applications for Business Use
 
Windows 10 - Adoption on the rise
Windows 10 - Adoption on the riseWindows 10 - Adoption on the rise
Windows 10 - Adoption on the rise
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.Doc
 
Road ahead for performance testing
Road ahead for performance testingRoad ahead for performance testing
Road ahead for performance testing
 
Presentation1
Presentation1Presentation1
Presentation1
 
Latest trends in Assistive Technology Solutions
Latest trends in Assistive Technology SolutionsLatest trends in Assistive Technology Solutions
Latest trends in Assistive Technology Solutions
 

Similaire à Disruptive Technology

I S 201 Team Project Disruptive Technology.Docx
I S 201  Team  Project    Disruptive  Technology.DocxI S 201  Team  Project    Disruptive  Technology.Docx
I S 201 Team Project Disruptive Technology.Docxkblack8686
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive TechnologyRachelMullett
 
External Device Integration with Mobile
External Device Integration with MobileExternal Device Integration with Mobile
External Device Integration with MobileSoftweb Solutions
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...Dana Gardner
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Internet Of Things and Open Source
Internet Of Things and Open SourceInternet Of Things and Open Source
Internet Of Things and Open SourceMobodexter
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wpJessica Hirst
 
Chapter 3 And 4.pptx
Chapter 3 And 4.pptxChapter 3 And 4.pptx
Chapter 3 And 4.pptxTadeseBeyene
 
What is the future of cloud computing--SolutionCloud computing occupie.docx
What is the future of cloud computing--SolutionCloud computing occupie.docxWhat is the future of cloud computing--SolutionCloud computing occupie.docx
What is the future of cloud computing--SolutionCloud computing occupie.docxdorisc7
 
Safety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsSafety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsIan Heron
 

Similaire à Disruptive Technology (20)

IS201 docks
IS201 docksIS201 docks
IS201 docks
 
I S 201 Team Project Disruptive Technology.Docx
I S 201  Team  Project    Disruptive  Technology.DocxI S 201  Team  Project    Disruptive  Technology.Docx
I S 201 Team Project Disruptive Technology.Docx
 
Atrix
AtrixAtrix
Atrix
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive Technology
 
External Device Integration with Mobile
External Device Integration with MobileExternal Device Integration with Mobile
External Device Integration with Mobile
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Internet Of Things and Open Source
Internet Of Things and Open SourceInternet Of Things and Open Source
Internet Of Things and Open Source
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp
 
Chapter 3 And 4.pptx
Chapter 3 And 4.pptxChapter 3 And 4.pptx
Chapter 3 And 4.pptx
 
What is the future of cloud computing--SolutionCloud computing occupie.docx
What is the future of cloud computing--SolutionCloud computing occupie.docxWhat is the future of cloud computing--SolutionCloud computing occupie.docx
What is the future of cloud computing--SolutionCloud computing occupie.docx
 
cloud security
cloud securitycloud security
cloud security
 
Safety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsSafety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of Things
 

Disruptive Technology

  • 1. Disruptive Technology Alex Rafferty Rob Kryger Ryan Sutphin Scott Barnett
  • 2. The organization has to accept that this may happen Start designing or modifying their technology to be compatible with the new disruptive technology In order to plan for the inevitable event they have to accept and embrace the technology that will come out of it Organizations and this Inevitable Event
  • 3. If the organization does not modify its own hardware and software for this new technology then it will be left behind Employees that have the new technology will be incapable of completing their work due to the incompatibility of the systems Organizations and this Inevitable Event
  • 4. There may be compatibility issues The new technology may not have the software to run other types of software The new Motorola docking station only has Firefox; Stevenson math classes use Math Lab which only runs on Internet Explorer Those with the new Motorola technology will not have access to critical software for Stevenson students Impact on Current Software
  • 5. If everyone switches to this new technology then the old software that was relied on will be obsolete because it cannot be used on the new system Compatibility is the biggest problem along with some software becoming obsolete This will create chaos within the school, organization, or company until it can be resolved Impact on Current Software
  • 6. Disruptive technologies are not always disruptive to customers, and often take a long time before they are significantly disruptive to establish companies Existing businesses are often reluctant to take advantage of it, since it would involve competing with their existing (and more profitable) technological approach Who are the Winners and Losers
  • 7. Networking in general will become increasingly mobile Considering everyone carries their phone around with them, with the advent of this new technology everyone will have their “computer” on them at all times Wireless technology will become increasingly advanced and widely used Along with increased mobility comes a greater use of and greater need for more advanced wireless technologies Impact on Networking
  • 8. Crossover to The Cloud Cloud-based sites and services are becoming more and more common. This new technology will greatly increase the use of The Cloud. Storing data on remote servers so it is accessible anywhere, from any device goes hand-in-hand with an increase in mobility and wireless technology. Smart phones don’t have enough memory to keep all that stuff when there are millions of apps to be downloaded, although I am sure storage space on smart phones will begin to increase dramatically. Impact on Networking
  • 9. Security and Access to Systems Corporations will need the MAC addresses of all their employees’ smart phones so that when someone accesses the network via their smart phone the company will be able to identify that device as one belonging to an employee This will make it so that not just anyone can connect to the company’s network via their smart phone and have access to sensitive information
  • 10. Security and Access to Systems Company user log-ins unique to each employee will also be important to have This will prevent someone who has stolen an employer’s smart phone from being able to access the company’s network MAC address filtering and user log-ins coupled with an IT department that keeps up-to-date and on top of all of the new security trends should provide adequate security even with the new technology
  • 11. Accessibility Always have your files right at your fingertips Save Companies that supply desktops, phones, and or laptops to employees can cut costs They can supply their employers with only a smart phone and that smart phone will be able to fit their needs. Benefits to Corporations and Organizations
  • 12. Security Sensitive information can be available to the public with a smart phone Companies will need to create access codes or other means of security Disadvantages
  • 13. Durability It is extremely easy to break a phone In my experience, phones break extremely easy. I usually have to purchase a new phone every year. Laptops can last much longer. I have had the same one for a couple of years. Laptops are much more durable due to the fact that they are not always taken everywhere with you. Disadvantages
  • 14. Docking station uses Firefox A lot of programs still only use Internet explorer This may be a major problem for organizations that make electronic study systems. They will have to figure out a way to make their programs compatibility more flexible It is already unacceptable that these programs cannot be used on Macs. Compatibility
  • 15. Some technology will become obsolete Laptops Desktop computers Regular phones Everything you need will be stored and ran right from a smart phone, the size of a credit card. Disadvantages
  • 16. We are likely to see similar disruptive changes throughout the years Technology is changing extremely quickly Every year technology is shrinking and becoming more mobile It is very likely that this change, or one similar to it, will occur within the next five years Within the Next Five Years