HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach Emiliano Del Fiume, Business Development Manager, Unisys [email protected]Trento, 12 dec 2012
33
Embed
Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach
HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD?. Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach. Emiliano Del Fiume, Business Development Manager, Unisys [email protected] Trento, 12 dec 2012. Who is Unisys?. - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
HOW DO DEVELOPERSTAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD?
Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approachEmiliano Del Fiume, Business Development Manager, [email protected]
IT & BP Consulting System Integration Infrastructure Applications & Solutions Server technology Outsourcing
Agenda Session 1 Consumerization of IT What we do in mobility Organizations’ Point of View Let’s not reinvent the wheel… A practical way to approach the topic
Session 2 A new model to develop SW Native Apps vs Web Apps Developers’ tough choices Let’s put all togheter Recap
The expectation today is that work comes to us instead of
Gartners says… 1.2 Billion Smartphones & Tablets to be bought worldwide in 2013 821 Million this year: 70% of total device salesPredictions Tablet purchases by businesses will grow 3x by 2016 By 2016 many businesses will chose Windows 8 mobile devices rather than
One fifth of the European workforce is both highly mobile and highly empowered by personal technology
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Consumerization of ITThe Social-Technology dynamics
More likely to work from multiple locations More likely to communicate directly with customers in a given week More likely to invest in a tool, device or technology because it helps
accomplish their work More likely to troubleshoot device problems on their own 3.5 times more likely to download unauthorized software and
applications to solve a business need
The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).
Improving mobile security is a top priority for EU firms, current security approaches are not adequate
None of these
Secure authentication of mobile users using voice biometrics ((via mobile device microphone)
Secure authentication of mobile users using face biometrics (via mobile device camera)
Secure authentication of mobile users using an attached device (eg USB token, SD card, sleeve)
Secure authentication of mobile users using password
17%
5%
7%
21%
71%
Which, if any, of the following security technologies have you deployed or will you deploy in the next 12 months?
What are your firm’s top mobile priorities during the next 12 months?
Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012
Organizations’ Point of ViewConcerns regarding security.
Provide more mobile support for employees
Implement a comprehensive mobile strategy
Implement or improve mobile security
7%
12%
20%
36%
34%
44%
Critical priority High priority
Smartphones can combine multiple authentication techniques like: Something you have (the device) Something you know (a PIN/passphrase) Something you are (biometrics – face, voice) And where you are (GPS); to attain the greatest authentication fidelity
Mobile is not only something to secure: it helps to improve security…
Mobile is not only something to secure: it helps to improve security…
Let’s not reinvent the wheel…There are things we already know.
Let’s not reinvent the wheelFirst thought in your CIO’s mind is…
Mobile Device Management As soon as we start talking about mobile computing, CTOs raise their hands to
ask how to manage the devices. They’re right.
Mobile Device Management is an hot topic mainly for security reasons You can set up an on-premise MDM solutions or buy a service…
Organizations with 1.000 employees or less will go directly to XaaS
MDM will become a commodity solution in few years
If we deal only with clients’ devices (customers and/or citizens) the “Store” is just enough to distribute the app: device mngt & security are not our problems!
Mobile computing should add more value to users Productivity (doing more) Mobility (doing elsewhere) Innovation (doing other things) Green IT (doing saving and preserving Earth) New user experience (doing differently)
Let’s not reinvent the wheelIt’s a matter of User Empowerment
It’s too simplistic thinking at “mobile computing” for Accessing to existing applications through mobile devices Doing a Web version of an application Accessing to Internet while not being at a desktop
Drivers: Tremendous growth of smartphones / tablets Consumerization trend Increased improvements in apps, browsers, and search Growth of location based apps Wireless networks are getting faster and more reliable. Mobile workers are demanding access for productivity Today’s generation Y lives mobile / wireless life
Challenges: Integrating mobile into business processes and existing apps Multiple devices / platforms Security issues
Implications: As mobile technologies mature, they will bring new applications to more places and devices New user interface design approaches required Mobile solutions can enable new business models Business processes and applications have to be re-engineered for mobile The mobile trend drives the consumerization of IT (and vice versa) Expect increased interest in technologies that can boost the productivity of a remote workforce
Session recap
Thank you Q & A
Docs & slides for you:http://emiliano.delfiume.it/TR