1. Technology update Presented by James Sturgess – Owner/ Director Sturgclan Consulting 16/06/2011 James@sturgclan.co.uk 0800 058 8929
2. Contents Introduction Changing perceptions Internet Presence Hardware/software PC vs.. Mac Android vs. IOS Battle of the browsers Security Conclusion
3.
4. Today's talk – Technology update – I want to keep you abreast of the ever changing world of technology.
5. There a a few sections, however as the technology itself you will see that everything is starting to link together.
6. Cloud services have become a big player in the business world with SAAS (software as a service) becoming the new internet in many sectors.
7. As a result virtualisation has saved many businesses, large and small, time and money as well as increasing productivity due to less downtime and tighter controls.
8.
9.
10. People know what they want and are more savvy.E-commerce was like the proverbial talking dog. It wasn’t about how well the dog could talk, it was amazing that the dog could talk at all. Quote from <http://venturebeat.com/2010/12/03/5-top-trends-in-consumer-based-internet-businesses-for-2011/>
11. Internet presence What is an Internet presence? How much Management does it require? Do you know where you rank? Do you have more than your website? Is your site compliant to W3C standards? Where else are you listed?
12.
13. Solid state hard drives are starting to become a viable option, offering faster read speeds.
14. Mobile phones now have at least as much function as a computer, often allowing greater flexibility due to their portable nature
15.
16.
17. This meant that a number of users switched to Apple, allowing more interoperability with the infamous I-phone.
18. The focus of the cyber-criminals has now shifted to Apple technology.
25. The I-phone is very secure, but is limited in its capabilities
26.
27. Security The cloud used to be a great security concern – rather than having to get into each individual host machine, all a cyber-criminal would need to do is access the server. They could do this by logging into any of the host machines, meaning the security of the whole network depended on each individual user, now the protection is loaded directly into the cloud, protecting both internal and external attacks.