1 / 33

Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach

HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD?. Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach. Emiliano Del Fiume, Business Development Manager, Unisys emiliano.delfiume@unisys.com Trento, 12 dec 2012. Who is Unisys?.

lester
Télécharger la présentation

Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HOW DO DEVELOPERSTAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach Emiliano Del Fiume, Business Development Manager, Unisys emiliano.delfiume@unisys.com Trento, 12 dec 2012

  2. Who is Unisys? Servizi82% Services &Solutions86% Servizi 82% Technology14% Tecnologia 18 % • IT & BP Consulting • System Integration • Infrastructure • Applications & Solutions • Server technology • Outsourcing StatiUniti: 44% Asia/Pacific: 13% Resto America: 12% Europa/Africa: 31%

  3. Agenda Session 1 • Consumerization of IT • Whatwe do in mobility • Organizations’ Point of View • Let’snotreinvent the wheel… • A practical way to approach the topic Session 2 • A new model to develop SW • Native Apps vs Web Apps • Developers’ toughchoices • Let’s put alltogheter • Recap

  4. The expectation today is that workcomes to us instead of us going to work

  5. Consumerization of ITThe Actors PeopleEmployees, Clients, Citizens OrganizationsBusinesses & Public Administrations ClientsEmployees, Customers, Citizens TechiesDevelopers, Sys Engineers, etc.

  6. Consumerization of ITSome numbers to start our discussion… • Gartners says… • 1.2 Billion Smartphones & Tablets to be bought worldwide in 2013 • 821 Million this year: 70% of total device sales • Predictions • Tablet purchases by businesses will grow 3x by 2016 • By 2016 many businesses will chose Windows 8 mobile devices rather than upgrading Windows on desktop PCs • Tablets sales: • 2011: 60M • 2012: 119M (+198%) • 2013: Gartner 183M, IDC 172M (150%) • 2016: Gartner 369M, IDC 283M (184%) Source: Gartner, may 2012 + IDC, march/december 2012

  7. Consumerization of ITThe Social-Technology dynamics One fifth of the European workforce is both highly mobile and highly empowered by personal technology + The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide). Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

  8. Consumerization of ITThe Social-Technology dynamics One fifth of the European workforce is both highly mobile and highly empowered by personal technology • More likely to work from multiple locations • More likely to communicate directly with customers in a given week • More likely to invest in a tool, device or technology because it helps accomplish their work • More likely to troubleshoot device problems on their own • 3.5 times more likely to download unauthorized software and applications to solve a business need The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide). Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

  9. Consumerization of ITThe Social-Technology dynamics Mobile Elite “Which of the following activities, if any, have you done in the past year in your job?” Average iWorker Mobile Elite workers are self-starters and a force of innovation and change. They see greater productivity and service benefits in BYO devices and apps and they influence boss and org! Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

  10. Consumerization of ITThe Social-Technology dynamics Mobile Elite: rebels, unmanageable, anarchists?Maybe simply pragmatic! Employees embrace the BYO App opportunity despite strong objection from IT. Mobile Elites are again the lead-adapters of this new phenomenon Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

  11. Consumerization of ITThe Social-Demographic dynamics The steady growth of Millennials (Gen Y) in the workforceBy 2020, 45% of workforce will be Millennials …And Gen Z is already here and growing… Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

  12. Peculiar behaviour: “device convergence”

  13. What we do in mobility

  14. What we do in mobilityLegacy vs New uses Users’ point of view Voice E-mail Web browsing Texts (SMS) Instant Messaging Legacy Key drivers Social Computing (FB, Twitter, LinkedIn…) Maps (Google Maps, Microsoft Earth, Apple?) Gaming Biz Apps (i.e.: expenses approvals)

  15. What we do in mobilityLegacy vs New uses Business point of view Voice E-mail Web browsing Texts (SMS) Instant Messaging FightArea Areas to dobusiness Social Computing (FB, Twitter, LinkedIn…) Maps (Google Maps, Microsoft Earth, Apple?) Gaming Biz Apps (i.e.: expenses approvals)

  16. What we do in mobilityUsers love maps! • It’s not a coincidence Apple want to replace Google Maps with Apple’s maps • Market for legacy navigators is declining: new cheap devices are coming leveraging free services (like Google Maps) • Industry is integrating “maps” in other contexts (i.e.: new Wii) Source: comScore (www.comscore.com), 2012

  17. What we do in mobilityWhat we use (unconsciously) and what we want… CloudsupportsMobile Mobileboosts Cloud Mobile & Socialboost and support each other

  18. Organizations’ Point of View… …CIOs are not completely happy

  19. Organizations’ Point of ViewThree main questions from CIOs How to secure my company’s data? What aboutcostsfor all this? How to bring data and appli- cations to the end user? How to manage different mobile devices?

  20. Organizations’ Point of ViewCIOs are not happy, they should be. IT believes that employees will contact IT for support with personal devices – employees don’t agree If employees encounter a problem with a personal device they use for business purposes, what is usually the first course of action they take? Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

  21. Organizations’ Point of ViewConcerns regarding security. What are your firm’s top mobile priorities during the next 12 months? Which, if any, of the following security technologies have you deployed or will you deploy in the next 12 months? Improving mobile security is a top priority for EU firms, current security approaches are not adequate Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012 21

  22. Mobile is not only something to secure: it helps to improve security… Smartphones can combine multiple authentication techniques like: • Something you have (the device) • Something you know (a PIN/passphrase) • Something you are (biometrics – face, voice) • And where you are (GPS); to attain the greatest authentication fidelity

  23. Mobile is not only something to secure: it helps to improve security…

  24. Let’s not reinvent the wheel… There are things we already know.

  25. Let’s not reinvent the wheelFirst thought in your CIO’s mind is… • Mobile Device Management • As soon as we start talking about mobile computing, CTOs raise their hands to ask how to manage the devices. They’re right. • Mobile Device Management is an hot topic mainly for security reasons • You can set up an on-premise MDM solutions or buy a service… • Organizations with 1.000 employees or less will go directly to XaaS • MDM will become a commodity solution in few years • If we deal only with clients’ devices (customers and/or citizens) the “Store” is just enough to distribute the app: device mngt & security are not our problems! SAP Afaria(former Sybase)

  26. Let’s not reinvent the wheelIt’s a matter of User Empowerment • Mobile computing should add more value to users • Productivity (doing more) • Mobility (doing elsewhere) • Innovation (doing other things) • Green IT (doing saving and preserving Earth) • New user experience (doing differently) • It’s too simplistic thinking at “mobile computing” for • Accessing to existing applications through mobile devices • Doing a Web version of an application • Accessing to Internet while not being at a desktop

  27. Let’s not reinvent the wheelIt is Not Just About the Device • Device selection comes at the bottom not at the top of the list • Approaching mobile computing is not a matter of selecting a “new PC” • Tip: freeze any initiative related to procurement,first free up your mind to understand whatyou want to do with mobile…

  28. Organizations’ Point of ViewSecurity? Solutions are here! 1 2 Physical Device Security End User Security • User credentials • Authoritatively confirm user • Protect IT Services from unauthorized access • Start with minimum rights • Automate policy • Prevent user modification • Educate user on security threats • SMS, Phishing, Passcodes • Provide training • Monitor behavior • Establish IT Policies for mobile devices usage • Know built-in security features for devices • Manage and enforce polices for mobile devices • Remote wipe • Recovery of lost device (beacon feature) • Hardware encryption • SIM protection 3 4 Information Security Application Security • Protect data at rest (phone & backup) • Certified FIPS 140-2 encryption • Prove encryptions (always on) • Server certificates • Encrypt data in motion (SSL, VPN, etc.) • Know built-in security features for devices, and limitations • Remote wipe • Purge redeployed devices • Secure access to device • Keep sensitive data on the datacenter • Control applications to device • Custom iPhone App Store • Trusted Applications • Prevent “jailbroken” phones • Secure Platform • Signed applications and provision profiles • Sandboxed applications • Keychain services • Certificates, Keys, encryptions • Code vulnerability scanning

  29. Let’s not reinventthe wheel… How to exploit themobile pontetial

  30. How to exploit the mobile potentialHow we suggest to approach the topic 5 2 Elementos priorización OBJETOS DE SERVICIOS 1 3 4 INTRODUCTION • Consumerization of IT • Context & dynamics Presentation of Mobility Initiatives Public and private sphere Mobility initiatives identification Client presents situation and its strategic vision 6 (Optional) • Mobility Presentations Categorization of initiatives Conclusions and next steps 7 OBJECTIVES SCOPE • Mobile applications development Plan de Trabajo • Security and management in mobile devices Roadmap • Identification and certificate

  31. How to exploit the mobile potentialHow we suggest to approach the topic ENGAGEMENT PHASES • Develop As-Is Business and Technology Models • Develop Technical Assessment of the Current State • Collaboratively Develop recommended plan of action • Develop an implementation Roadmap • Present Final Report • Determine Key Success Factors • Identify and Prioritize Opportunities (Innovation Workshop) • Team Kick-Off • Group Focus Group • Identify Business Goals, Objectives, Constraints and Challenges • Identify Existing Business Capabilities • Identify Desired Business Capabilities and Opportunities KEY ACTIVITIES Populated Mobility Information Models High Level Implementation Roadmap Innovation Workshop Outbrief Current State Assessment Briefing KEY DELIVERABLES Top 3-5 opportunities (one-pg) Future State and the Gap Analysis Briefing Final Assessment Report

  32. Session recap Drivers: • Tremendous growth of smartphones / tablets • Consumerization trend • Increased improvements in apps, browsers, and search • Growth of location based apps • Wireless networks are getting faster and more reliable. • Mobile workers are demanding access for productivity • Today’s generation Y lives mobile / wireless life • Challenges: • Integrating mobile into business processes and existing apps • Multiple devices / platforms • Security issues Implications: • As mobile technologies mature, they will bring new applications to more places and devices • New user interface design approaches required • Mobile solutions can enable new business models • Business processes and applications have to be re-engineered for mobile • The mobile trend drives the consumerization of IT (and vice versa) • Expect increased interest in technologies that can boost the productivity of a remote workforce

  33. Thank you Q & A Docs & slides for you: http://emiliano.delfiume.it/TR

More Related