SlideShare a Scribd company logo
EMC at a glance François Chazalon EMC EMEA South Regional Marketing Director
The Digital Information World in 2011 70% Will be created by individuals 85% Will be the  responsibility of organizations to ensure information’s  security, privacy, reliability, and compliance The Paradox of Responsibility… Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 .. And the importance of information governance
New Challenges In The Information Economy Managing  growth Managing  risk Managing  effectiveness Creating  new value Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 Digital Information Created and Replicated Worldwide 1,773 exabytes Exabytes 173 exabytes  0 200 400 600 800 1,000 1,200 1,400 DVD RFID Digital TV MP3 players Digital cameras Camera phones, VoIP Medical imaging, Laptops, Data center applications, Games Satellite images, GPS, ATMs, Scanners Sensors, Digital radio, DLP theaters, Telematics Peer-to-peer, Email, Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances 10-fold growth in five years! 1,600 1,800 AMOUNT OF DIGITAL INFORMATION CREATED AND REPLICATED EACH YEAR 2006 2007 2008 2009 2010 2011
The Enterprise Faces the Digital Universe By estimating what percent of the content is generated by various device types or applications – such as e-mail, surveillance, or MP3 players – it is possible to come up with the share of total that is: Security-intense – requires high standards of protection Compliance-intense – is subject to government rules about retention, privacy, or protection Preservation-intense – might reasonably be expected to be stored for 10 years or more Note how all three categories are growing! Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 PERCENTAGE OF THE DIGITAL UNIVERSE Security-Intense Compliance- Intense Preservation- Intense 0% 10% 20% 30% 40% 50% 2007 2011
From  CIO of Technology To  CFO of Information Challenges: Information assets need to be managed and governed like financial assets Information governance strikes balance between risk avoidance, cost reduction, value generation Need excutive forum for discussion, policy setting, measurements Opportunities: Create case for corporate-level information governance Deploy tools to discover information risks and opportunities Follow through with: risk remediation capabilities value-generating information integration capabilities cost-reduction strategies The Rise of Information Governance
From  Information   Security as a Problem  To  Information Security as a Strategy Challenges: Information security breaches are mounting  Need to protect high-value information dynamically – at more granular level No longer just IT problem >80% IT and business execs say security concerns inhibit innovation / growth Opportunities: Give organizations the confidence to run their businesses without worry. Create closed-loop system to  address risk throughout its lifecycle. Make information security a business  strategy ,  not a business  concern A New Focus: Information Risk Management
From   Physical IT To   Virtual IT Challenges: Virtualization is creating a new paradigm for IT new cost structures more responsive to the business new strategic options Opportunities: Designing infrastructure for virtualization Designing new processes to capitalize on the power of virtualization Considering new strategic options in a virtualized world Building The Virtual Data Center
EMC Information Infrastructure Information infrastructure makes information work with increased value, flexibility, efficiency, cost savings  and GREEN
EMC Information Infrastructure Storing more efficiently Next generation backup and archive Making protection effective and affordable  Securing critical assets Automating data center operations Leveraging content for competitive advantage Virtualizing your information infrastructure Accelerating business value for applications
Storing Information Efficiently PRIMARY STORAGE, ARCHIVE STORAGE, BACKUP STORAGE Result:  storing the right information, at the right service level, at the right cost Lower TCO and improved energy efficiency  Improved risk management Simplified management High innovation with Flash Drives Challenge:  efficient operation and service delivery 60% information growth annually  Environmental limits – power, cooling, floor space Protecting and securing growing volumes  Invista Symmetrix Connectrix EMC Centera  Celerra CLARiiON EMC Disk Library
Leveraging Content for Competitive Advantage Result:  realize the potential of information Connect information to people and process Improve strategic use of information Minimize security and compliance risks  Lower IT administration costs    From digital information to enterprise repository. Challenge:  effective use of enterprise content Highest value information growing fastest Control cost of content environment – without increasing staff Connecting people, information silos and business processes UNIFIED CONTENT MANAGEMENT  Knowledge Worker Transactional Interactive Compliance and Archiving UNIFIED CONTENT MANAGEMENT
Securing Critical Assets PERIMETER–CENTRIC + INFORMATION–CENTRIC SECURITY Result:  information risk management becomes a business enabler Security controls aligned to risk and business drivers Efficient regulatory compliance Security ‘transparent’ to the end-user Challenge:  addressing the threat and disruption of information security  Threats increasing in scope and complexity Secure access needed by employees, partners, customers  Increased regulatory demands to secure information assets
Next Generation Backup and Archive CLASSIFICATION AND ASSESSMENT TOOLS TO ACHIEVE THE KNOWLEDGE TO ACT SaaS  alternatives for backup – a new way to realize the value of EMC Result:  a reliable and efficient process Improve and extend protection while lowering costs Expedite e-discovery and attain compliance End-to-end solutions from virtual servers to remote offices Accelerated build-out of VMware Challenge:  achieving control, compliance, cost, and confidence  Information protection and retention is costly Potential exposure to litigation and mandates Point solutions lack consistency, no end-to-end strategy  Archive and Data De-duplication Advanced Technology Policy, Process, and Management Security
Making Protection Effective and Affordable Result:  the right protection for the right information Effective protection optimizing costs Related applications and processes recovered consistently Recovery strategies aligned with business requirements Challenge:  achieving control, compliance, cost, and confidence  Increased availability requirements – e-mail, web, ERP, VMware Eroding availability levels caused by information and complexity explosion  Awareness gap – business less aware of risk than IT APPLICATION, OPERATING ENVIRONMENT, AND INFRASTRUCTURE INTEGRATION Data De-duplication, Consistency Groups  Backup Information Protection Continuous Data Protection Remote Restart Continuous Operations
Virtualizing Your Information Infrastructure Result:  “virtual IT” On-demand asset utilization, and deployment Improved costs, flexibility and responsiveness IT processes re-engineered around virtualization Accelerated adoption of virtualization throughout its lifecycle Challenge:  virtualization at scale Achieving an infrastructure that’s right for virtualization Re-engineering IT processes to exploit virtualization Managing physical and virtual environments end to end Obtaining the skills required to successfully deploy EMC: DESIGNED AND OPTIMIZED FOR VMware Infrastructure Optimization Software Lifecycle Desktop Management Business Continuity Storage Security Continuity Backup Management
EMC’s Ongoing Transformation Software and Services Are Now 58% of Revenues  12% Growth 25% Growth 23% Growth Revenue Mix 2000 Revenue Mix 2008
EMC’s Accelerating Growth: 2003-08  Note: Net income is in GAAP and includes restructuring charges and other special items. Consistent Top-line and Bottom-line Growth: 6+ Years 2003 2004 2005 2006 2007 $1.25B $496M $871M $1.1B $6.2B $8.2B $9.65B $11.2B $1.67B $13.2B 2008 $1.34B $14.8B Net Income ($M) Revenue ($B)
 

More Related Content

PPTX
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
PPTX
Understanding Zero Day Recovery - Your last defence against ransomware attacks
PDF
Securing a mobile oriented enterprise
PPT
Cloud computing
PDF
Security Strategies for Success
PPT
Don't risk it presentation
PDF
NEC Backup as a Service reduces administrative tasks, helping it departments...
PDF
12 Game Changing Ways to Mobilize Teaching and Learning
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Securing a mobile oriented enterprise
Cloud computing
Security Strategies for Success
Don't risk it presentation
NEC Backup as a Service reduces administrative tasks, helping it departments...
12 Game Changing Ways to Mobilize Teaching and Learning

What's hot (20)

PDF
EMEA10: Trepidation in Moving to the Cloud
PDF
Yakhouba
PDF
Top 3 Reasons to Deliver Web Apps with Application Virtualization
PPTX
Lessons in Information Governance
PPTX
Cloud is not an option, but is security?
PDF
Cloud Computing - A future prerogative
PPTX
Smarter cyber security v8
PDF
Strategic Information Management Through Data Classification
PDF
Duncan hine input1_irm_and_outsourcing
PDF
Protecting What Matters...An Enterprise Approach to Cloud Security
PDF
Mobile Workspaces Go Where You Go [Infographic]
PDF
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
PDF
IT Security & Governance Template
PPTX
IT governance and Information System Security
PPT
IBM Global Technology Services: Partnering for Better Business Outcomes
PPTX
Automation of Information (Cyber) Security by Joe Hessmiller
PDF
Secure by design building id based security
PPTX
Challenges & Opportunities the Data Privacy Act Brings
PDF
7 Best Practices to Protect Critical Business Information [Infographic]
PPT
Private cloud in the hybrid era
EMEA10: Trepidation in Moving to the Cloud
Yakhouba
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Lessons in Information Governance
Cloud is not an option, but is security?
Cloud Computing - A future prerogative
Smarter cyber security v8
Strategic Information Management Through Data Classification
Duncan hine input1_irm_and_outsourcing
Protecting What Matters...An Enterprise Approach to Cloud Security
Mobile Workspaces Go Where You Go [Infographic]
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
IT Security & Governance Template
IT governance and Information System Security
IBM Global Technology Services: Partnering for Better Business Outcomes
Automation of Information (Cyber) Security by Joe Hessmiller
Secure by design building id based security
Challenges & Opportunities the Data Privacy Act Brings
7 Best Practices to Protect Critical Business Information [Infographic]
Private cloud in the hybrid era
Ad

Viewers also liked (17)

PPT
Netvibes Escola Estiu 09
PPS
Formacio Netvibes Baix Llobregat
PDF
February Economic Update
PPS
Donde Dio Smequiera
PPS
Netvibes Escola Hivern 09
PPT
An Integrative Training Model 3 2 06 (Stfm 2005 Austin.Tx)
PDF
Guest And Teaching Assistant Access
PPT
Sunray Presentation
PPT
Sun Product Overview
PPT
Emirates Computers / EMC Signature Solution Center
PPT
Changing the Virtualization Landscape
PPT
Virtualize Your Disaster! Introduction & Update
PPT
Virtualize Your Disaster! Customer Use Cases & Scenarios
PPT
Cisco Product & Solutions Overview
PPT
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
PDF
Panduit DCIM Solution Overview
PPT
VMware Presentation
Netvibes Escola Estiu 09
Formacio Netvibes Baix Llobregat
February Economic Update
Donde Dio Smequiera
Netvibes Escola Hivern 09
An Integrative Training Model 3 2 06 (Stfm 2005 Austin.Tx)
Guest And Teaching Assistant Access
Sunray Presentation
Sun Product Overview
Emirates Computers / EMC Signature Solution Center
Changing the Virtualization Landscape
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Customer Use Cases & Scenarios
Cisco Product & Solutions Overview
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Panduit DCIM Solution Overview
VMware Presentation
Ad

Similar to EMC At A Glance (20)

PPT
The Joy Of Bits
PPT
Solutions Overview
PPTX
EMC - Is it Business time for the Cloud?
PPT
Vucci IBM Smart Cloud Presentation
PPT
Architectural cncepts: Chip Multithreaded Era
PDF
Peter J. Simpson Resume
PPTX
HPE Security Keynote from Istanbul 20th Jan 2016
PDF
MT50 Data is the new currency: Protect it!
PDF
2019 Intelligent Technology Index
PPT
Are Your PCs and Laptops Recovery and Discovery Ready?
PDF
Modernize storage infrastructure with hybrid cloud & flash
PDF
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
PPT
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
PPT
Cloud Computing - Beyond the Hype
 
PPT
IO Journey All Up
PPT
Smarter Planet: Dynamic Infrastructure
PPT
Cloud computing (2)
PDF
Rod Adkins Senior Vice President IBM Systems & Technology Group IBM Integrate...
PPT
Cloud Computing and Records Management
PPTX
IBM Internet of Things Offerings
The Joy Of Bits
Solutions Overview
EMC - Is it Business time for the Cloud?
Vucci IBM Smart Cloud Presentation
Architectural cncepts: Chip Multithreaded Era
Peter J. Simpson Resume
HPE Security Keynote from Istanbul 20th Jan 2016
MT50 Data is the new currency: Protect it!
2019 Intelligent Technology Index
Are Your PCs and Laptops Recovery and Discovery Ready?
Modernize storage infrastructure with hybrid cloud & flash
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
Cloud Computing - Beyond the Hype
 
IO Journey All Up
Smarter Planet: Dynamic Infrastructure
Cloud computing (2)
Rod Adkins Senior Vice President IBM Systems & Technology Group IBM Integrate...
Cloud Computing and Records Management
IBM Internet of Things Offerings

More from Emirates Computers (11)

PPT
EMC Solution Center
PPT
Citrix Enterprise Access Infrastructure
PPT
Beyond Green: EMC and Energy Efficient IT
PPT
EMC Documentum Enterprise Content Management 6.5
PPT
EMC Documentum Product Line Overview
PPT
Ca Service Desk Presentation
PPT
Ca Service Desk Demo Scenarios
PDF
EC History Timeline
PDF
EC Smart Living
PDF
EC Unified Communications Presentation
PDF
Smart SMB Presentation
EMC Solution Center
Citrix Enterprise Access Infrastructure
Beyond Green: EMC and Energy Efficient IT
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Product Line Overview
Ca Service Desk Presentation
Ca Service Desk Demo Scenarios
EC History Timeline
EC Smart Living
EC Unified Communications Presentation
Smart SMB Presentation

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks

EMC At A Glance

  • 1. EMC at a glance François Chazalon EMC EMEA South Regional Marketing Director
  • 2. The Digital Information World in 2011 70% Will be created by individuals 85% Will be the responsibility of organizations to ensure information’s security, privacy, reliability, and compliance The Paradox of Responsibility… Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 .. And the importance of information governance
  • 3. New Challenges In The Information Economy Managing growth Managing risk Managing effectiveness Creating new value Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 Digital Information Created and Replicated Worldwide 1,773 exabytes Exabytes 173 exabytes 0 200 400 600 800 1,000 1,200 1,400 DVD RFID Digital TV MP3 players Digital cameras Camera phones, VoIP Medical imaging, Laptops, Data center applications, Games Satellite images, GPS, ATMs, Scanners Sensors, Digital radio, DLP theaters, Telematics Peer-to-peer, Email, Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances 10-fold growth in five years! 1,600 1,800 AMOUNT OF DIGITAL INFORMATION CREATED AND REPLICATED EACH YEAR 2006 2007 2008 2009 2010 2011
  • 4. The Enterprise Faces the Digital Universe By estimating what percent of the content is generated by various device types or applications – such as e-mail, surveillance, or MP3 players – it is possible to come up with the share of total that is: Security-intense – requires high standards of protection Compliance-intense – is subject to government rules about retention, privacy, or protection Preservation-intense – might reasonably be expected to be stored for 10 years or more Note how all three categories are growing! Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 PERCENTAGE OF THE DIGITAL UNIVERSE Security-Intense Compliance- Intense Preservation- Intense 0% 10% 20% 30% 40% 50% 2007 2011
  • 5. From CIO of Technology To CFO of Information Challenges: Information assets need to be managed and governed like financial assets Information governance strikes balance between risk avoidance, cost reduction, value generation Need excutive forum for discussion, policy setting, measurements Opportunities: Create case for corporate-level information governance Deploy tools to discover information risks and opportunities Follow through with: risk remediation capabilities value-generating information integration capabilities cost-reduction strategies The Rise of Information Governance
  • 6. From Information Security as a Problem To Information Security as a Strategy Challenges: Information security breaches are mounting Need to protect high-value information dynamically – at more granular level No longer just IT problem >80% IT and business execs say security concerns inhibit innovation / growth Opportunities: Give organizations the confidence to run their businesses without worry. Create closed-loop system to address risk throughout its lifecycle. Make information security a business strategy , not a business concern A New Focus: Information Risk Management
  • 7. From Physical IT To Virtual IT Challenges: Virtualization is creating a new paradigm for IT new cost structures more responsive to the business new strategic options Opportunities: Designing infrastructure for virtualization Designing new processes to capitalize on the power of virtualization Considering new strategic options in a virtualized world Building The Virtual Data Center
  • 8. EMC Information Infrastructure Information infrastructure makes information work with increased value, flexibility, efficiency, cost savings and GREEN
  • 9. EMC Information Infrastructure Storing more efficiently Next generation backup and archive Making protection effective and affordable Securing critical assets Automating data center operations Leveraging content for competitive advantage Virtualizing your information infrastructure Accelerating business value for applications
  • 10. Storing Information Efficiently PRIMARY STORAGE, ARCHIVE STORAGE, BACKUP STORAGE Result: storing the right information, at the right service level, at the right cost Lower TCO and improved energy efficiency Improved risk management Simplified management High innovation with Flash Drives Challenge: efficient operation and service delivery 60% information growth annually Environmental limits – power, cooling, floor space Protecting and securing growing volumes Invista Symmetrix Connectrix EMC Centera Celerra CLARiiON EMC Disk Library
  • 11. Leveraging Content for Competitive Advantage Result: realize the potential of information Connect information to people and process Improve strategic use of information Minimize security and compliance risks Lower IT administration costs  From digital information to enterprise repository. Challenge: effective use of enterprise content Highest value information growing fastest Control cost of content environment – without increasing staff Connecting people, information silos and business processes UNIFIED CONTENT MANAGEMENT Knowledge Worker Transactional Interactive Compliance and Archiving UNIFIED CONTENT MANAGEMENT
  • 12. Securing Critical Assets PERIMETER–CENTRIC + INFORMATION–CENTRIC SECURITY Result: information risk management becomes a business enabler Security controls aligned to risk and business drivers Efficient regulatory compliance Security ‘transparent’ to the end-user Challenge: addressing the threat and disruption of information security Threats increasing in scope and complexity Secure access needed by employees, partners, customers Increased regulatory demands to secure information assets
  • 13. Next Generation Backup and Archive CLASSIFICATION AND ASSESSMENT TOOLS TO ACHIEVE THE KNOWLEDGE TO ACT SaaS alternatives for backup – a new way to realize the value of EMC Result: a reliable and efficient process Improve and extend protection while lowering costs Expedite e-discovery and attain compliance End-to-end solutions from virtual servers to remote offices Accelerated build-out of VMware Challenge: achieving control, compliance, cost, and confidence Information protection and retention is costly Potential exposure to litigation and mandates Point solutions lack consistency, no end-to-end strategy Archive and Data De-duplication Advanced Technology Policy, Process, and Management Security
  • 14. Making Protection Effective and Affordable Result: the right protection for the right information Effective protection optimizing costs Related applications and processes recovered consistently Recovery strategies aligned with business requirements Challenge: achieving control, compliance, cost, and confidence Increased availability requirements – e-mail, web, ERP, VMware Eroding availability levels caused by information and complexity explosion Awareness gap – business less aware of risk than IT APPLICATION, OPERATING ENVIRONMENT, AND INFRASTRUCTURE INTEGRATION Data De-duplication, Consistency Groups Backup Information Protection Continuous Data Protection Remote Restart Continuous Operations
  • 15. Virtualizing Your Information Infrastructure Result: “virtual IT” On-demand asset utilization, and deployment Improved costs, flexibility and responsiveness IT processes re-engineered around virtualization Accelerated adoption of virtualization throughout its lifecycle Challenge: virtualization at scale Achieving an infrastructure that’s right for virtualization Re-engineering IT processes to exploit virtualization Managing physical and virtual environments end to end Obtaining the skills required to successfully deploy EMC: DESIGNED AND OPTIMIZED FOR VMware Infrastructure Optimization Software Lifecycle Desktop Management Business Continuity Storage Security Continuity Backup Management
  • 16. EMC’s Ongoing Transformation Software and Services Are Now 58% of Revenues 12% Growth 25% Growth 23% Growth Revenue Mix 2000 Revenue Mix 2008
  • 17. EMC’s Accelerating Growth: 2003-08 Note: Net income is in GAAP and includes restructuring charges and other special items. Consistent Top-line and Bottom-line Growth: 6+ Years 2003 2004 2005 2006 2007 $1.25B $496M $871M $1.1B $6.2B $8.2B $9.65B $11.2B $1.67B $13.2B 2008 $1.34B $14.8B Net Income ($M) Revenue ($B)
  • 18.  

Editor's Notes

  • #2: Over the past few years, EMC has transformed virtually every part of its business—and always from the point of view of its customers. You may have noticed that EMC has changed in significant ways during the past several years and is considered as a leader in many areas. In fact, software and services accounted for 56% of our revenues in 2007. Note to Presenter: This presentation is designed to be modular, so that you can use these slides in conjunction with slides from other presentations, based on your customer’s/audience’s specific situation. Please review the Notes pages for key speaking points.