Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach
Post on 11-Feb-2016
40 Views
Preview:
DESCRIPTION
Transcript
HOW DO DEVELOPERSTAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD?
Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approachEmiliano Del Fiume, Business Development Manager, Unisysemiliano.delfiume@unisys.com
Trento, 12 dec 2012
© 2012 Unisys Corporation. All rights reserved. 2
Who is Unisys?
Stati Uniti: 44%
Resto America: 12%
Europa/Africa: 31%
Asia/Pacific: 13%
IT & BP Consulting System Integration Infrastructure Applications & Solutions Server technology Outsourcing
Agenda Session 1 Consumerization of IT What we do in mobility Organizations’ Point of View Let’s not reinvent the wheel… A practical way to approach the topic
Session 2 A new model to develop SW Native Apps vs Web Apps Developers’ tough choices Let’s put all togheter Recap
The expectation today is that work comes to us instead of
us going to work
© 2012 Unisys Corporation. All rights reserved. 5
Consumerization of ITThe Actors
PeopleEmployees, Clients, Citizens
OrganizationsBusinesses & Public Administrations
ClientsEmployees, Customers, Citizens
TechiesDevelopers, Sys Engineers, etc.
© 2012 Unisys Corporation. All rights reserved. 6
Gartners says… 1.2 Billion Smartphones & Tablets to be bought worldwide in 2013 821 Million this year: 70% of total device salesPredictions Tablet purchases by businesses will grow 3x by 2016 By 2016 many businesses will chose Windows 8 mobile devices rather than
upgrading Windows on desktop PCs
Tablets sales: 2011: 60M 2012: 119M (+198%) 2013: Gartner 183M, IDC 172M (150%) 2016: Gartner 369M, IDC 283M (184%)
Source: Gartner, may 2012 + IDC, march/december 2012
Consumerization of ITSome numbers to start our discussion…
© 2012 Unisys Corporation. All rights reserved. 7
One fifth of the European workforce is both highly mobile and highly empowered by personal technology
Use 3 or more devices for work
Use 2 devices for work
Use 1 device for work
41%
28%
29%
High use of personal technology for work
Low use of personal technology for work
No use of personal tech-nology for work
24%
33%
42%
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
+
Consumerization of ITThe Social-Technology dynamics
The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).
© 2012 Unisys Corporation. All rights reserved. 8
One fifth of the European workforce is both highly mobile and highly empowered by personal technology
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Consumerization of ITThe Social-Technology dynamics
More likely to work from multiple locations More likely to communicate directly with customers in a given week More likely to invest in a tool, device or technology because it helps
accomplish their work More likely to troubleshoot device problems on their own 3.5 times more likely to download unauthorized software and
applications to solve a business need
The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).
© 2012 Unisys Corporation. All rights reserved. 9
Mobile Elite workers are self-starters and a force of innovation and change. They see greater productivity and service benefits in BYO
devices and apps and they influence boss and org!
“Which of the following activities, if any, have you done in the past year in your job?”
Used my personal computer or personal smartphone to help me do my job
Convinced my company to buy something new to help me do my job
Convinced my boss or the company to significanatly change the way we do something at work
Bought something or paid for something with my own money to help me do my job
41%
24%
26%
21%
75%
40%
35%
51%
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Mobile Elite
Average iWorker
Consumerization of ITThe Social-Technology dynamics
© 2012 Unisys Corporation. All rights reserved. 10
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Employees embrace the BYO App opportunity despite strong objection from IT. Mobile Elites are again the lead-adapters of this new phenomenon
Consumerization of ITThe Social-Technology dynamics
Mobile Elite: rebels, unmanageable, anarchists?Maybe simply pragmatic!
© 2012 Unisys Corporation. All rights reserved. 11
Consumerization of ITThe Social-Demographic dynamics
The steady growth of Millennials (Gen Y) in the workforceBy 2020, 45% of workforce will be Millennials
…And Gen Z is already here and growing…
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Peculiar behaviour: “device convergence”
What we do in mobility
© 2012 Unisys Corporation. All rights reserved. 14
Key
drivers
Legacy
What we do in mobilityLegacy vs New uses
Voice
Web browsing
Texts (SMS)
Instant Messaging
Social Computing (FB, Twitter, LinkedIn…)
Maps (Google Maps, Microsoft Earth, Apple?)
Gaming
Biz Apps (i.e.: expenses approvals)
Users’ point of view
© 2012 Unisys Corporation. All rights reserved. 15
FightArea
Areas to dobusiness
What we do in mobilityLegacy vs New uses
Voice
Web browsing
Texts (SMS)
Instant Messaging
Social Computing (FB, Twitter, LinkedIn…)
Maps (Google Maps, Microsoft Earth, Apple?)
Gaming
Biz Apps (i.e.: expenses approvals)
Business point of view
© 2012 Unisys Corporation. All rights reserved. 16
Percent Change in Internet Audience Aged 15+ Accessing Maps Sites and Smartphone Audience Aged 13+ Accessing Maps via their Device
March 2012 vs March 2011EU5 (France, Germany, Italy, Spain and UK
% Growth Year-over-YearAccessed Maps Sites via Computer Accessed Maps via Smartphone
EU5 8% 55% Germany 10% 89% Spain 3% 76% United Kingdom 4% 47% France 6% 38% Italy 22% 35%
Source: comScore (www.comscore.com), 2012
What we do in mobilityUsers love maps!
It’s not a coincidence Apple want to replace Google Maps with Apple’s maps Market for legacy navigators is declining: new cheap devices are coming
leveraging free services (like Google Maps) Industry is integrating “maps” in other contexts (i.e.: new Wii)
© 2012 Unisys Corporation. All rights reserved. 17
What we do in mobilityWhat we use (unconsciously) and what we want…
Mobileboosts Cloud
Cloudsupports
Mobile
Mobile & Socialboost and support each other
© 2012 Unisys Corporation. All rights reserved. 18
Organizations’ Point of View…
…CIOs are not completely happy
© 2012 Unisys Corporation. All rights reserved. 19
How to bringdata and appli-cations to the
end user?
How to managedifferent mobile
devices?
How to secure
my company’s data?
Organizations’ Point of ViewThree main questions from CIOs
What aboutcosts
for all this?
© 2012 Unisys Corporation. All rights reserved. 20
IT believes that employees will contact IT for support with personal devices – employees don’t agree
If employees encounter a problem with a personal device they use for business purposes, what is usually the first course of action they take?
Other
Post issues on a user forum or social site
Contact primary technology provider
Ask a friend or colleague
Troubleshoot themselves
Contact company IT department
6%
1%
6%
15%
53%
20%
1%
1%
7%
9%
19%
56%
What IT saysWhat employees say*
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Organizations’ Point of ViewCIOs are not happy, they should be.
© 2012 Unisys Corporation. All rights reserved. 21
Improving mobile security is a top priority for EU firms, current security approaches are not adequate
None of these
Secure authentication of mobile users using voice biometrics ((via mobile device microphone)
Secure authentication of mobile users using face biometrics (via mobile device camera)
Secure authentication of mobile users using an attached device (eg USB token, SD card, sleeve)
Secure authentication of mobile users using password
17%
5%
7%
21%
71%
Which, if any, of the following security technologies have you deployed or will you deploy in the next 12 months?
What are your firm’s top mobile priorities during the next 12 months?
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Organizations’ Point of ViewConcerns regarding security.
Provide more mobile support for employees
Implement a comprehensive mobile strategy
Implement or improve mobile security
7%
12%
20%
36%
34%
44%
Critical priority High priority
Smartphones can combine multiple authentication techniques like: Something you have (the device) Something you know (a PIN/passphrase) Something you are (biometrics – face, voice) And where you are (GPS); to attain the greatest authentication fidelity
Mobile is not only something to secure: it helps to improve security…
Mobile is not only something to secure: it helps to improve security…
Let’s not reinvent the wheel…There are things we already know.
© 2012 Unisys Corporation. All rights reserved. 25
Let’s not reinvent the wheelFirst thought in your CIO’s mind is…
Mobile Device Management As soon as we start talking about mobile computing, CTOs raise their hands to
ask how to manage the devices. They’re right.
Mobile Device Management is an hot topic mainly for security reasons You can set up an on-premise MDM solutions or buy a service…
Organizations with 1.000 employees or less will go directly to XaaS
MDM will become a commodity solution in few years
If we deal only with clients’ devices (customers and/or citizens) the “Store” is just enough to distribute the app: device mngt & security are not our problems!
SAP Afaria(former Sybase)
© 2012 Unisys Corporation. All rights reserved. 26
Mobile computing should add more value to users Productivity (doing more) Mobility (doing elsewhere) Innovation (doing other things) Green IT (doing saving and preserving Earth) New user experience (doing differently)
Let’s not reinvent the wheelIt’s a matter of User Empowerment
It’s too simplistic thinking at “mobile computing” for Accessing to existing applications through mobile devices Doing a Web version of an application Accessing to Internet while not being at a desktop
© 2012 Unisys Corporation. All rights reserved. 27
Let’s not reinvent the wheelIt is Not Just About the Device
Device selection comes at the bottom not at the top of the list Approaching mobile computing is not a matter of selecting a “new PC”
Tip: freeze any initiative related to procurement,first free up your mind to understand what
you want to do with mobile…
© 2012 Unisys Corporation. All rights reserved. 28
Physical Device Security
• Establish IT Policies for mobile devices usage
• Know built-in security features for devices
• Manage and enforce polices for mobile devices
• Remote wipe
• Recovery of lost device (beacon feature)
• Hardware encryption
• SIM protection
1
End User Security
• User credentials
• Authoritatively confirm user
• Protect IT Services from unauthorized access
• Start with minimum rights
• Automate policy
• Prevent user modification
• Educate user on security threats
• SMS, Phishing, Passcodes
• Provide training
• Monitor behavior
2
Application Security
• Control applications to device
• Custom iPhone App Store
• Trusted Applications
• Prevent “jailbroken” phones
• Secure Platform
• Signed applications and provision profiles
• Sandboxed applications
• Keychain services
• Certificates, Keys, encryptions
• Code vulnerability scanning
3
Information Security
• Protect data at rest (phone & backup)
• Certified FIPS 140-2 encryption
• Prove encryptions (always on)
• Server certificates
• Encrypt data in motion (SSL, VPN, etc.)
• Know built-in security features for devices, and limitations
• Remote wipe
• Purge redeployed devices
• Secure access to device
• Keep sensitive data on the datacenter
4
Organizations’ Point of ViewSecurity? Solutions are here!
Let’s not reinventthe wheel…
How to exploit themobile pontetial
© 2012 Unisys Corporation. All rights reserved. 30
Categorization of initiatives
WF de aprobaciones móvil
Inspecciones “on site” y reporte
Cobro vía móvil
Tramitación expedientes
Cuadro Mandos
Gestión de citaciones
Canal de comunicación
Callejeros
Guia de eventos / venta de entradas
Mossos en el móvil
Entradas “on line”
Mejora Eficiencia
Acercar al ciudadano
Interior
Transporte
Cross
Sanidad
Servicios
INTRODUCTION
• Consumerization of IT• Context & dynamics
Client presents situation
and its strategic vision
Presentation of Mobility Initiatives Public and private sphere
Conclusions and next steps
OBJECTIVES SCOPE
Plan de Trabajo
Mobility initiatives identification
OBJETOS DE SERVICIOSElementos priorización
Qué esperan los ciudadanos
Oportunidades de innovaciónIniciativas en marcha
ObjetivosGeneralitat
Definir criterios depriorización
Priorización de iniciativas
Mapa de iniciativas
Plan Estratégico de Movilidad
Mobility Presentations
• Mobile applications development
• Security and management in mobile devices
• Identification and certificate
Cuadros de MandoMóvilMed Agenda Móvil
Gestiónde Almacenes
Mantenimientode Plantas
AutoServicio del Empleado
Medios dePago
Carro de Compras
How to exploit the mobile potentialHow we suggest to approach the topic
Roadmap
© 2012 Unisys Corporation. All rights reserved. 31
KEYACTIVITIES
D I S C O V E R
ENGAGEMENT PHASES
P L A N
A N A LY Z E
S T R AT E G I Z E
• Team Kick-Off• Group Focus Group• Identify Business Goals,
Objectives, Constraints and Challenges
• Identify Existing Business Capabilities
• Identify Desired Business Capabilities and Opportunities
• Develop As-Is Business and Technology Models
• Develop Technical Assessment of the Current State
• Determine Key Success Factors
• Identify and Prioritize Opportunities (Innovation Workshop)
• Collaboratively Develop recommended plan of action
• Develop an implementation Roadmap
• Present Final Report
KEYDELIVERABLES
Populated Mobility Information Models
Top 3-5 opportunities (one-pg)
High Level Implementation RoadmapFinal Assessment Report
Current State Assessment Briefing
Innovation Workshop Outbrief
Future State and the Gap Analysis Briefing
How to exploit the mobile potentialHow we suggest to approach the topic
© 2012 Unisys Corporation. All rights reserved. 32
Drivers: Tremendous growth of smartphones / tablets Consumerization trend Increased improvements in apps, browsers, and search Growth of location based apps Wireless networks are getting faster and more reliable. Mobile workers are demanding access for productivity Today’s generation Y lives mobile / wireless life
Challenges: Integrating mobile into business processes and existing apps Multiple devices / platforms Security issues
Implications: As mobile technologies mature, they will bring new applications to more places and devices New user interface design approaches required Mobile solutions can enable new business models Business processes and applications have to be re-engineered for mobile The mobile trend drives the consumerization of IT (and vice versa) Expect increased interest in technologies that can boost the productivity of a remote workforce
Session recap
Thank you Q & A
Docs & slides for you:http://emiliano.delfiume.it/TR
top related