SlideShare a Scribd company logo
1 of 1
Download to read offline
When computers filled whole rooms, it was difficult to imagine phones more powerful than lunar
     landers, Star Trek communicators and C3PO put together. Yet even when single computers filled
       a room, it seems computer scientists always dreamed of universal storage access in the cloud.


                                                                Here’s a look at the key
                                                            breakthroughs that have made
                                                            the rise of the cloud inevitable.


         Idea


                          Hardware
                                             Software & Media



                                                                                   In response to the
50’s
 and60’s
                                                                                   launch of Sputnik,
                                                                                   the US forms the
                                                                                   Advanced Research
                                       The first hard disk drive ever               Products Agency
                   1956                launched: IBM Model 350
                                       Disk File comes with IBM 305
                                       RAMAC computer
                   1957


                  Early 60’s


                   1964      BASIC is invented by
                             John George Kemeny and                         John McCarthy:
                             Tom Kurtz                                     An American computer
                                                                           scientist sees computing
                                                                           as a public utility
                   1966               Douglas Parkhill:
                                      Parkhill's book, The Challenge             Douglas
                                      of the Computer Utility,                   Engelbart:
                                      predicts many modern cloud                 invents the
                                      ideas                                      mouse

                   1968


                   1969                                          First message sent
                                                                 on ARPANET:
                                                                 The core network
                                                                 that became the
    70’s                                                         global internet

                   1970         The Floppy Disk
                                invented by
                                Alan Shugart
                   1971                                                               Email first
                                                                                     developed by
                                                                                   Ray Tomlinson


                                     Ethernet invented by                          First PC modem,
                   1973              Robert Metcalfe/                                developed by
                                          Xerox                                Dennis Hayes and
                   1977                                                       Dale Heatherington,
                                                                                first sold to hobbyists




                                                                                                Mobile
                                                                                               phones
                                          Al Gore introduces                                    invented
                  1978                 the term “information
                                            superhighway”
                   1979



    80’s                                                                           Standardised
                                 MS-DOS                                             concept of
                                 invented                                           worldwide
                                                                                 interconnected
                   1981                             First IBM-PC                TCP/IP networks
                                                      invented                  (AKA the Internet)
                                                                                    developed

                  1982


                                                         William Gibson, in his
                             Over 1000                      short story “Burning                         Apple
                              web hosts                      Chrome”, coins the                       Macintosh
                                                           term "cyberspace"                          invented
                   1984
                  1985
                                                                                             CD-ROM
                                                                           Microsoft         invented
                  1986                 First PC                            releases
                                     virus found                           Windows


                   1988
                                                                                         Tim Berners-Lee
                                                                                     writes the proposal for the
                                                                                         World Wide Web

                                            Tim Berners-Lee
    90’s                                    creates World Wide          Tim Berners-Lee
                          Launch of          Web and Internet           writes the software
                        IMDB online           protocol HTTP             for world's first web
                        film database                                    server, which came to
                                                                        be known as CERN
                  1990



                  1992                                                                         First smartphone:
                                                                             Web
                                                        1,000,000            Hosts             IBM Simon
                                                                                              shown as a concept
                                                                                                  product
                  1993                                                                                Launch of
                                                                                                    Mosaic web
                                                                                                   browser grants
                                                                                                     widespread
                                                   First mass             Invention of             Internet access
                                               commercial spam            the Pentium
                  1994                         spread by law firm          processor
                                                   Canter and
                                                     Siegel                                         Geocities,
                  1995                                                                               free web
                                                                                                    hosting site,
                                                                                                     launches
                                         Launch of
                                        Hotmail on
                                          July 4th                      Windows 95
                                                                        released with
                                                                    Internet Explorer
                     Late 1990’s
                     Web commonly used as both
                     public and private file storage                        Launch of



                   1997                                           Web
                                            20,000,000            Hosts
                   1998
                                                                                                    Napster
                                                                                                 popularizes file
    00’s                    2000                                First smartphone,               sharing over the
                                                                   Touchscreen
                            Dot Com Bust                        Ericsson R380,
                                                                                                    Internet
                                                                  released. First
                                                                 device to use an
                                                               open OS: Symbian



                  2001
                                         Launch of
                                       Wikipedia                                           Amazon Web
                  2002                                                                     Service (AWS)
                                                                                            in the cloud

                  2003                                                                           Myspace
                                                                                                  launched
                  2004         Popularisation of              Facebook and
                                 Web 2.0. John                Flickr launched
                                Batelle and Tim
                              O’Reilly describe the
                                  concept of
                                 "the Web as a
                                   Platform"

                  2005                                                                         popularizes free
                                                                                                online video
                                                                                                hosting and
                                                                                                  sharing
                  2006                                             Google Docs
                                                                  launches, putting
                                                                   millions in direct
                                                                     contact with                Gartner
                                                                       the cloud                says cloud
                   2008                                                                     computing will be
                                                                                             as influential as
                                                                                              e-commerce




                                                                             Google can reach

                                launches catalogue                           1 trillion
                                of six million songs,                  web pages, but just a small
                                 supported by ads                      fraction are indexed by the
                                                                              search engine



                                   300%         growth
                                                                       in ads for full-time cloud
                                                                         computing positions
                                                              November 2009 - November 2010
                  2010

                      US Government
                       officials begin           European Network and Information
                      mandating cloud             Security Agency makes Cloud
                         adoption              Computing recommendations for EU
                                                          governments.

                   2011

                                                                          introduces the
                                                                          concept of the                Launch of
                                                   Web
                          584,000,000              Hosts
                                                                        Unified Cloud
                                                                         Experience
                                                                                                     Apple iCloud



                   2012
 Future
                            Google Drive release
                           expected, entering the
                           content storage market                       launched, F-Secure offering
                                                                        operators and ISPs the cloud
                                                                        as a service


                   2013             1 billion users share content in
                                      a public cloud on Facebook

                                     Services like Apple
                                     iCloud and Google
                                     Drive are tied to
                                     mobile phones
                                                                        The idea of a private cloud for each
                                                                         individual becomes popularized
                  2014

                                         $148.8B
                  Revenue for
                  cloud                     €115B
                  services
                  Gartner
                  predicts           AUD139.2B

                                             ₤96B




                                The idea of private cloud for each
                                individual becomes popularized.




             Privacy issues become more                    Consumers expect to want a
             important and people are                      personal cloud that they can
             more willing to pay for it.                    control and doesn’t track
                                                                      them.



                                                                                                Sources: General
                                                             http://inventors.about.com/od/timelines/a/modern_5.htm
                                              http://www.computerweekly.com/feature/A-history-of-cloud-computing
                                           http://sixrevisions.com/resources/the-history-of-the-internet-in-a-nutshell/
                                     http://www.guardian.co.uk/technology/interactive/2009/oct/23/internet-arpanet
                                                 http://www.cloudtweaks.com/2011/02/a-history-of-cloud-computing/
                                                                    http://www.flickr.com/photos/ciscoibsg/6101427547/
                                                                          http://www.gartner.com/it/page.jsp?id=707508
 Content | Anywhere                                                     http://www.zakon.org/robert/internet/timeline/

 http://www.f-secure.com/content-anywhere

More Related Content

What's hot

iPodolatry And Crackberries
iPodolatry And CrackberriesiPodolatry And Crackberries
iPodolatry And CrackberriesRandy Connolly
 
Faces & Rewards Of Web 2.0
Faces & Rewards Of Web 2.0Faces & Rewards Of Web 2.0
Faces & Rewards Of Web 2.0Josephine JK Tan
 
Connecting First And Second Life
Connecting First And Second LifeConnecting First And Second Life
Connecting First And Second LifeMatt Biddulph
 
Vie des objets, Jérôme Abel (2)
Vie des objets, Jérôme Abel (2)Vie des objets, Jérôme Abel (2)
Vie des objets, Jérôme Abel (2)jeromeabel
 
timeline
timelinetimeline
timelinesammi7
 

What's hot (6)

iPodolatry And Crackberries
iPodolatry And CrackberriesiPodolatry And Crackberries
iPodolatry And Crackberries
 
Notacd01
Notacd01Notacd01
Notacd01
 
Faces & Rewards Of Web 2.0
Faces & Rewards Of Web 2.0Faces & Rewards Of Web 2.0
Faces & Rewards Of Web 2.0
 
Connecting First And Second Life
Connecting First And Second LifeConnecting First And Second Life
Connecting First And Second Life
 
Vie des objets, Jérôme Abel (2)
Vie des objets, Jérôme Abel (2)Vie des objets, Jérôme Abel (2)
Vie des objets, Jérôme Abel (2)
 
timeline
timelinetimeline
timeline
 

Viewers also liked

Activity%20 sheet dominant%20intelligence%20learning%20style
Activity%20 sheet dominant%20intelligence%20learning%20styleActivity%20 sheet dominant%20intelligence%20learning%20style
Activity%20 sheet dominant%20intelligence%20learning%20stylegregorybazile
 
Reflecting learning style
Reflecting learning styleReflecting learning style
Reflecting learning stylegregorybazile
 
Educational%20planout
Educational%20planoutEducational%20planout
Educational%20planoutgregorybazile
 
5 Steps to survive the Talent Battle
5 Steps to survive the Talent Battle5 Steps to survive the Talent Battle
5 Steps to survive the Talent BattleTodd Wheatland
 

Viewers also liked (8)

Pre assessment
Pre assessmentPre assessment
Pre assessment
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Activity%20 sheet dominant%20intelligence%20learning%20style
Activity%20 sheet dominant%20intelligence%20learning%20styleActivity%20 sheet dominant%20intelligence%20learning%20style
Activity%20 sheet dominant%20intelligence%20learning%20style
 
Reflecting learning style
Reflecting learning styleReflecting learning style
Reflecting learning style
 
Diversity
DiversityDiversity
Diversity
 
Education%20 plan
Education%20 planEducation%20 plan
Education%20 plan
 
Educational%20planout
Educational%20planoutEducational%20planout
Educational%20planout
 
5 Steps to survive the Talent Battle
5 Steps to survive the Talent Battle5 Steps to survive the Talent Battle
5 Steps to survive the Talent Battle
 

Similar to Like it or not, you're already in the cloud

Computer development
Computer developmentComputer development
Computer developmentargusacademy
 
Strategic Business Ict Management And Investment
Strategic Business Ict Management And InvestmentStrategic Business Ict Management And Investment
Strategic Business Ict Management And Investmentnnadoziel
 
Detailed facts on computer development
Detailed facts on computer developmentDetailed facts on computer development
Detailed facts on computer developmentargusacademy
 
CT1101 - Computer Technology
CT1101 - Computer TechnologyCT1101 - Computer Technology
CT1101 - Computer TechnologyPratik Pradhan
 
CST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of ComputingCST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of Computingoudesign
 
1981 to 1990 timeline exposure
1981 to 1990 timeline exposure1981 to 1990 timeline exposure
1981 to 1990 timeline exposureRexly Lasaca
 
Living in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxLiving in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxFroilan Cantillo
 
Sejarah komputer
Sejarah komputerSejarah komputer
Sejarah komputeryaperkasa
 
History of Computer Hardware
History of Computer HardwareHistory of Computer Hardware
History of Computer HardwareSubham Rouniyar
 
1970 to 1980 media and technologies
1970 to 1980 media and technologies1970 to 1980 media and technologies
1970 to 1980 media and technologiesRexly Lasaca
 
The History of computers
The History of computersThe History of computers
The History of computerskasrya62
 
A brief history of home computer technology
A brief history of home computer technologyA brief history of home computer technology
A brief history of home computer technologyvenusanderson225
 

Similar to Like it or not, you're already in the cloud (20)

Computer development
Computer developmentComputer development
Computer development
 
Strategic Business Ict Management And Investment
Strategic Business Ict Management And InvestmentStrategic Business Ict Management And Investment
Strategic Business Ict Management And Investment
 
Detailed facts on computer development
Detailed facts on computer developmentDetailed facts on computer development
Detailed facts on computer development
 
Computer story
Computer storyComputer story
Computer story
 
CT1101 - Computer Technology
CT1101 - Computer TechnologyCT1101 - Computer Technology
CT1101 - Computer Technology
 
CST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of ComputingCST 20363-Session 1.2-A Brief History of Computing
CST 20363-Session 1.2-A Brief History of Computing
 
1981 to 1990 timeline exposure
1981 to 1990 timeline exposure1981 to 1990 timeline exposure
1981 to 1990 timeline exposure
 
Living in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxLiving in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptx
 
Sejarah komputer
Sejarah komputerSejarah komputer
Sejarah komputer
 
History of Computer Hardware
History of Computer HardwareHistory of Computer Hardware
History of Computer Hardware
 
1970 to 1980 media and technologies
1970 to 1980 media and technologies1970 to 1980 media and technologies
1970 to 1980 media and technologies
 
The History of computers
The History of computersThe History of computers
The History of computers
 
A brief history of home computer technology
A brief history of home computer technologyA brief history of home computer technology
A brief history of home computer technology
 
The history of computers
The history of computersThe history of computers
The history of computers
 
NE(x)T GENERATION
NE(x)T GENERATIONNE(x)T GENERATION
NE(x)T GENERATION
 
Unknown facts
Unknown factsUnknown facts
Unknown facts
 
Unknown facts
Unknown factsUnknown facts
Unknown facts
 
Unknown facts
Unknown factsUnknown facts
Unknown facts
 
Lecture-2-02112021-013800pm.pdf
Lecture-2-02112021-013800pm.pdfLecture-2-02112021-013800pm.pdf
Lecture-2-02112021-013800pm.pdf
 
Great People in IT
Great People in ITGreat People in IT
Great People in IT
 

More from F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 

More from F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Like it or not, you're already in the cloud

  • 1. When computers filled whole rooms, it was difficult to imagine phones more powerful than lunar landers, Star Trek communicators and C3PO put together. Yet even when single computers filled a room, it seems computer scientists always dreamed of universal storage access in the cloud. Here’s a look at the key breakthroughs that have made the rise of the cloud inevitable. Idea Hardware Software & Media In response to the 50’s and60’s launch of Sputnik, the US forms the Advanced Research The first hard disk drive ever Products Agency 1956 launched: IBM Model 350 Disk File comes with IBM 305 RAMAC computer 1957 Early 60’s 1964 BASIC is invented by John George Kemeny and John McCarthy: Tom Kurtz An American computer scientist sees computing as a public utility 1966 Douglas Parkhill: Parkhill's book, The Challenge Douglas of the Computer Utility, Engelbart: predicts many modern cloud invents the ideas mouse 1968 1969 First message sent on ARPANET: The core network that became the 70’s global internet 1970 The Floppy Disk invented by Alan Shugart 1971 Email first developed by Ray Tomlinson Ethernet invented by First PC modem, 1973 Robert Metcalfe/ developed by Xerox Dennis Hayes and 1977 Dale Heatherington, first sold to hobbyists Mobile phones Al Gore introduces invented 1978 the term “information superhighway” 1979 80’s Standardised MS-DOS concept of invented worldwide interconnected 1981 First IBM-PC TCP/IP networks invented (AKA the Internet) developed 1982 William Gibson, in his Over 1000 short story “Burning Apple web hosts Chrome”, coins the Macintosh term "cyberspace" invented 1984 1985 CD-ROM Microsoft invented 1986 First PC releases virus found Windows 1988 Tim Berners-Lee writes the proposal for the World Wide Web Tim Berners-Lee 90’s creates World Wide Tim Berners-Lee Launch of Web and Internet writes the software IMDB online protocol HTTP for world's first web film database server, which came to be known as CERN 1990 1992 First smartphone: Web 1,000,000 Hosts IBM Simon shown as a concept product 1993 Launch of Mosaic web browser grants widespread First mass Invention of Internet access commercial spam the Pentium 1994 spread by law firm processor Canter and Siegel Geocities, 1995 free web hosting site, launches Launch of Hotmail on July 4th Windows 95 released with Internet Explorer Late 1990’s Web commonly used as both public and private file storage Launch of 1997 Web 20,000,000 Hosts 1998 Napster popularizes file 00’s 2000 First smartphone, sharing over the Touchscreen Dot Com Bust Ericsson R380, Internet released. First device to use an open OS: Symbian 2001 Launch of Wikipedia Amazon Web 2002 Service (AWS) in the cloud 2003 Myspace launched 2004 Popularisation of Facebook and Web 2.0. John Flickr launched Batelle and Tim O’Reilly describe the concept of "the Web as a Platform" 2005 popularizes free online video hosting and sharing 2006 Google Docs launches, putting millions in direct contact with Gartner the cloud says cloud 2008 computing will be as influential as e-commerce Google can reach launches catalogue 1 trillion of six million songs, web pages, but just a small supported by ads fraction are indexed by the search engine 300% growth in ads for full-time cloud computing positions November 2009 - November 2010 2010 US Government officials begin European Network and Information mandating cloud Security Agency makes Cloud adoption Computing recommendations for EU governments. 2011 introduces the concept of the Launch of Web 584,000,000 Hosts Unified Cloud Experience Apple iCloud 2012 Future Google Drive release expected, entering the content storage market launched, F-Secure offering operators and ISPs the cloud as a service 2013 1 billion users share content in a public cloud on Facebook Services like Apple iCloud and Google Drive are tied to mobile phones The idea of a private cloud for each individual becomes popularized 2014 $148.8B Revenue for cloud €115B services Gartner predicts AUD139.2B ₤96B The idea of private cloud for each individual becomes popularized. Privacy issues become more Consumers expect to want a important and people are personal cloud that they can more willing to pay for it. control and doesn’t track them. Sources: General http://inventors.about.com/od/timelines/a/modern_5.htm http://www.computerweekly.com/feature/A-history-of-cloud-computing http://sixrevisions.com/resources/the-history-of-the-internet-in-a-nutshell/ http://www.guardian.co.uk/technology/interactive/2009/oct/23/internet-arpanet http://www.cloudtweaks.com/2011/02/a-history-of-cloud-computing/ http://www.flickr.com/photos/ciscoibsg/6101427547/ http://www.gartner.com/it/page.jsp?id=707508 Content | Anywhere http://www.zakon.org/robert/internet/timeline/ http://www.f-secure.com/content-anywhere