SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
1 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
Impact of Mobile computing on IT
Ashish Jain
Director, Product Management, VMware
@itickr
July 2013
2 Confidential
Mobile Devices are everywhere
3 Confidential
The Requirements we used to have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through Ownership
An application you own,
running on a server you own
People you employ
Using a network you
own to connect to…
Using software you own on a
Windows desktop you own
4 Confidential
What the world wants now…
Control & Governance is Becoming
More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn’t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows OSs
Employees, contractors
outsourcers, partners
citizens, students
5 Confidential
New Device Platforms New Apps New User Expectations
Three trends are forcing massive change on IT
New Device
Platforms
§ A new way to work
§ Not just Windows anymore
New User
Expectations
§ Collaboration with partners,
contractors, and customers
§ Productivity through better technology
New
Apps
§ SaaS, mobile apps
§ Diversity
New Apps New User ExpectationsNew Device Platforms
6 Confidential
Mobility is Changing Everything:
0
300
600
900
2009 2010 2011 2012
Smartphones and tablets PC shipments
of information workers use
three or more devices for
w o r k t o i n c r e a s e
p r o d u c t i v i t y
EXPLOSIVE
GROWTH
in shipments of
smartphones and tablets
Sources: IDC, BGR, Forrester
FLAT
pc shipments
New Device Platforms New Apps New User ExpectationsNew Device Platforms
BYOD & JIT
7 Confidential
The Changing Device Mix
148 141
202 240
128
352
722
1516
0
1000
2000
2012 2017
Smartphone
Tablet
Portable PC
Desktop PC
Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013
Connected Device Market by Product Category,
Shipments, 2012-2017 in Millions
8 Confidential
New Apps are Flooding the Enterprise
R a t i o o f m o b i l e a p p
development projects to native
P C p r o j e c t s i n 2 0 1 5
PACE OF TECHNOLOGY
ADOPTION IS
ACCELERATING
PC
100M USERS
20YEARS
INTERNET
100M USERS
10YEARS
MOBILE
100M USERS
5YEARS
% OS Neutral % Browser Specific % Windows
1996
CROSSOVER
POINT
Apps in the Enterprise
2011 2020
0%
100%
50%
New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms
Sources: Gartner, Internal VMware Analysis
App & Data Independence
9 Confidential
New User Expectations for Productivity are Driving IT to
Evolve
ENTERPRISE END USER COMPUTING
“88% of executives report
employees are using
their personal computing
technologies for
business purposes”
DEMAND ACCESS
FROM ANYWHERE
“9 out of 10 companies
report the use of
consumer technologies
in the workplace”
BETTER CONSUMER
TECHNOLOGIES
“74% of employees use
consumer
technologies due to
lack of compelling
alternatives from IT”
LACK OF CHOICES
FROM IT
New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations
Sources: IDC, Avanade
Innovate or Perish
10 Confidential
IT’s Objective for End User Computing Infrastructure
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
11 Confidential
The Mobile Landscape
12 Confidential
OS	
  
In million
of units	
  
Market share	
  
Android	
   497,1	
   68,8%	
  
iOS	
   135,9	
   18,8%	
  
Blackberry	
   32,5	
   4,5%	
  
Symbian	
   23,9	
   3,3%	
  
Windows Phone	
   17,9	
   2,5%	
  
TOTAL	
   722,4	
   100,0%	
  
52%
19%
14%
8%
2% 5%
Android iOS
Symbian Blackberry
Windows Phone Others
2012 Smartphones Global Trends
12
Smartphones worldwide shipment 2012
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
Source: TomiAhonen Almanac 2013
1.3B smartphones in use
Smartphones worldwide installed based
as of December 2012
13 Confidential
2013 Data – Android continues its momentum…
14 Confidential
OS Trends
15 Confidential
Smartphones Trends in Key Markets
North America
§ Population:354M
§ Nb of Smartphones:210M
Shipment 2012
Android 71M
iOS 49M
Blackberry 5M
Windows 3M
Western Europe
§ Population:406M
§ Nb of Smartphones:260M
Shipment 2012
Android 69M	
  
iOS 26M	
  
Blackberry 9M	
  
Symbian 4M	
  
Windows 5M	
  
Mature Asia/Pacific
§ Population:82M
§ Nb of Smartphones:60M
Shipment 2012
Android 28M	
  
iOS 14M	
  
Blackberry 1M	
  
Symbian 3M	
  
Others 3M	
  
Greater China
§ Population:1540M
§ Nb of Smartphones:283M
Shipment 2012
Android 79M	
  
iOS 31M	
  
Windows 2M	
  
Bada 1M	
  
Symbian 0,5M	
  
16 Confidential
Android Landscape
§  Widely popular in developing countries
•  Lots of choice – screen size, price, capabilities, etc.
§  Not much traction in enterprise segment
•  Security
•  Perception is that Android is not secure
•  Google Play is ‘wild wild west’
•  Enterprise features (eg: MDM) weak
•  Fragmentation
•  No two devices are the same in terms of capabilities or UI
•  Hard for IT to support diverse environment
•  Lack of control
•  OS upgrades are controlled by carrier/OEM
•  Security patches not pushed out in a timely manner
§  OEMs starting to add capabilities
17 Confidential
Android Fragmentation
18 Confidential
Android Fragmentation
19 Confidential
iOS Landscape
§  Popular in North America, Western Europe and other richer
geographical pockets
•  Price rules them out in many developing countries
§  In tune with enterprise opportunity and have great traction
•  Increasing support for enterprise features in every hw and sw release
•  Security
•  Perception is that iOS is more secure than Android
•  App Store is curated
•  Strong enterprise features (encryption, MDM, etc.)
•  Fragmentation
•  Different screen sizes but not capabilities so perception is that there is no fragmention
in the Apple world
20 Confidential
iOS Landscape
21 Confidential
BlackBerry Landscape
§  Was good standard in enterprise market
•  Device Encryption
•  Remote Wiping for lost/stolen
•  Force password
•  Provision secure Email, VPN, Wifi
§  Missed BYOD trend completely and lost traction
§  BB 10 is decent
•  BlackBerry Balance – built in dual persona solution
•  Small market share and not growing
§  BB shops that didn’t already switch will likely stay with BB
§  Most customers already started switching to a more strategic
platform
•  Don’t view BB as strategic anymore
•  Migrating to iOS or Android or both
22 Confidential
Windows Landscape
§  Windows Phone and Windows 8 are still early
•  Windows Phone – more consumer oriented
•  Windows Tablet seems to be more enterprise friendly and will likely get more
traction that Windows phones in 2014
§  MSFT has deep pockets and will likely become the third dominant
mobile platform
•  Distant third….
23 Confidential
Mobile App Distribution
24 Confidential
50 Billion (iOS) vs. 48B (Android)
25 Confidential
Consumer Apps published to “public stores”
Sources: Nielsen, May 16, 2012, VMware Customer Research.
Amazon appstore
+ Other Stores
26 Confidential
App Distribution options
§ iOS App Distribution
• The Apple iOS App Store
• Ad hoc developer distribution
• Enterprise distribution
• The Apple Volume Purchase Program
• The Apple Custom B2B
§ Android App Distribution
• Google Play
• Non-market resources
27 Confidential
Device & Application Management
28 Confidential
Anatomy of a Smartphone/Tablet
•  Handheld Computer/Processor
•  Communication Components
•  Modem Chips
•  Antenna
•  Bluetooth
•  WiFi
•  Input/Output & Sensors
•  Display
•  Touchscreen
•  Microphone/Speaker
•  Cameras
•  GPS
•  Compass
•  Accelerometer
•  NFC
•  USB
29 Confidential
Building iOS and Android Applications
§  In order to construct a mobile app, need a “front end” – the bits
that run on the device / “the app”
§  A disconnected app is typically not very interesting…so, we also
need to build a “back end” to support the app
Front End Back End
30 Confidential
Solving Mobility
§ Remote Windows desktop / applications
§ Web apps / HTML 5
§ Virtualized OS
31 Confidential
Current Approach Requires Managing the Whole Device
MobileDeviceManagement
Device
Apps &
Data
Corporate
Apps &
Data
What actually needs to be managed
by the enterprise
32 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
We still have ways to go…
33 Confidential
Thank You!
34 Confidential
Range of Options for Device & App Control
Exchange ActiveSync
Email Calendar Contacts
Native (iOS & Android)
35 Confidential
Complex ActiveSync compatibility matrix
36 Confidential
Complex ActiveSync compatibility matrix (cont.)
37 Confidential
Range of Options for Device & App Control
Exchange ActiveSync
Email Calendar Contacts
Native (iOS & Android)
Secure
Documents
Container
Single App
Container
Native Apps
OS Vendor Policy Container
HTML 5 Apps/
WebClips
Blackberry Balance,
Samsung Knox
MDM Solutions
38 Confidential
Sample Apple iOS Device Control
39 Confidential
Range of Options for Device & App Control
Exchange ActiveSync
Email Calendar Contacts
Native (iOS & Android)
Secure
Documents
Container
Single App
Container
Native Apps
OS Vendor Policy Container
HTML 5 Apps/
WebClips
Blackberry Balance,
Samsung Knox
MDM Solutions
Mobile App
Management

Contenu connexe

Tendances

Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?Simon Lock
 
Positioning Platforms for Smartphones
Positioning Platforms for SmartphonesPositioning Platforms for Smartphones
Positioning Platforms for SmartphonesMandar Ghanekar
 
Marketing plan micromax
Marketing plan   micromaxMarketing plan   micromax
Marketing plan micromaxmunish241
 
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIAORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIAAnju Dony
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPankaj Saharan
 
Taking Your Website Mobile
Taking Your Website MobileTaking Your Website Mobile
Taking Your Website Mobilenijsitecore
 
Letter to Shareholders2002
Letter to Shareholders2002Letter to Shareholders2002
Letter to Shareholders2002earnirgsreports
 
Swot Analysis of Nokia
Swot Analysis of NokiaSwot Analysis of Nokia
Swot Analysis of NokiaAayush Kar
 
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsMobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsGreenwich Consulting
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter MovesLaurent Viviez
 
Tablet Market Opportunities
Tablet Market OpportunitiesTablet Market Opportunities
Tablet Market OpportunitiesWinston Choe
 
XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014Madhur Singhal
 
Xiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand MarketXiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand Marketvy1230
 
customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...Adil Hussain
 

Tendances (20)

Nokia
NokiaNokia
Nokia
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
India's Mobile Phone Market
India's Mobile Phone MarketIndia's Mobile Phone Market
India's Mobile Phone Market
 
Positioning Platforms for Smartphones
Positioning Platforms for SmartphonesPositioning Platforms for Smartphones
Positioning Platforms for Smartphones
 
Marketing plan micromax
Marketing plan   micromaxMarketing plan   micromax
Marketing plan micromax
 
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIAORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - Nokia
 
Taking Your Website Mobile
Taking Your Website MobileTaking Your Website Mobile
Taking Your Website Mobile
 
Letter to Shareholders2002
Letter to Shareholders2002Letter to Shareholders2002
Letter to Shareholders2002
 
Failure of nokia
Failure of nokiaFailure of nokia
Failure of nokia
 
Swot Analysis of Nokia
Swot Analysis of NokiaSwot Analysis of Nokia
Swot Analysis of Nokia
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsMobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter Moves
 
Brand dossier on nokia
Brand dossier on nokiaBrand dossier on nokia
Brand dossier on nokia
 
Tablet Market Opportunities
Tablet Market OpportunitiesTablet Market Opportunities
Tablet Market Opportunities
 
XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014
 
Nokia
NokiaNokia
Nokia
 
Xiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand MarketXiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand Market
 
customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...
 

Similaire à CIS13: Impact of Mobile Computing on IT

MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013Ashish Jain
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014The Judge Group
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014IMC Institute
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc erasolarisyourep
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions Troy C. Fulton
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Android Applications
Android ApplicationsAndroid Applications
Android ApplicationsSarwan Singh
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Top 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile WorkforceTop 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile WorkforceMindgrub Technologies
 
Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013Pablo Vittori
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
 

Similaire à CIS13: Impact of Mobile Computing on IT (20)

MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Top 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile WorkforceTop 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile Workforce
 
Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 

Plus de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

CIS13: Impact of Mobile Computing on IT

  • 1. 1 Confidential © 2013 VMware Inc. All rights reserved Confidential Impact of Mobile computing on IT Ashish Jain Director, Product Management, VMware @itickr July 2013
  • 3. 3 Confidential The Requirements we used to have… Change is hard and highly managed Software implemented from the center out Difficult to adjust to users needs Control Through Ownership An application you own, running on a server you own People you employ Using a network you own to connect to… Using software you own on a Windows desktop you own
  • 4. 4 Confidential What the world wants now… Control & Governance is Becoming More Challenging Inability to track, control or secure information assets Can not remove access you didn’t grant Serious compliance concerns Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non-Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 5. 5 Confidential New Device Platforms New Apps New User Expectations Three trends are forcing massive change on IT New Device Platforms § A new way to work § Not just Windows anymore New User Expectations § Collaboration with partners, contractors, and customers § Productivity through better technology New Apps § SaaS, mobile apps § Diversity New Apps New User ExpectationsNew Device Platforms
  • 6. 6 Confidential Mobility is Changing Everything: 0 300 600 900 2009 2010 2011 2012 Smartphones and tablets PC shipments of information workers use three or more devices for w o r k t o i n c r e a s e p r o d u c t i v i t y EXPLOSIVE GROWTH in shipments of smartphones and tablets Sources: IDC, BGR, Forrester FLAT pc shipments New Device Platforms New Apps New User ExpectationsNew Device Platforms BYOD & JIT
  • 7. 7 Confidential The Changing Device Mix 148 141 202 240 128 352 722 1516 0 1000 2000 2012 2017 Smartphone Tablet Portable PC Desktop PC Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013 Connected Device Market by Product Category, Shipments, 2012-2017 in Millions
  • 8. 8 Confidential New Apps are Flooding the Enterprise R a t i o o f m o b i l e a p p development projects to native P C p r o j e c t s i n 2 0 1 5 PACE OF TECHNOLOGY ADOPTION IS ACCELERATING PC 100M USERS 20YEARS INTERNET 100M USERS 10YEARS MOBILE 100M USERS 5YEARS % OS Neutral % Browser Specific % Windows 1996 CROSSOVER POINT Apps in the Enterprise 2011 2020 0% 100% 50% New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms Sources: Gartner, Internal VMware Analysis App & Data Independence
  • 9. 9 Confidential New User Expectations for Productivity are Driving IT to Evolve ENTERPRISE END USER COMPUTING “88% of executives report employees are using their personal computing technologies for business purposes” DEMAND ACCESS FROM ANYWHERE “9 out of 10 companies report the use of consumer technologies in the workplace” BETTER CONSUMER TECHNOLOGIES “74% of employees use consumer technologies due to lack of compelling alternatives from IT” LACK OF CHOICES FROM IT New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations Sources: IDC, Avanade Innovate or Perish
  • 10. 10 Confidential IT’s Objective for End User Computing Infrastructure Deliver the right business apps and data to user devices in a way that is efficient and secure for IT and productive for the end user
  • 12. 12 Confidential OS   In million of units   Market share   Android   497,1   68,8%   iOS   135,9   18,8%   Blackberry   32,5   4,5%   Symbian   23,9   3,3%   Windows Phone   17,9   2,5%   TOTAL   722,4   100,0%   52% 19% 14% 8% 2% 5% Android iOS Symbian Blackberry Windows Phone Others 2012 Smartphones Global Trends 12 Smartphones worldwide shipment 2012 Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013 Source: TomiAhonen Almanac 2013 1.3B smartphones in use Smartphones worldwide installed based as of December 2012
  • 13. 13 Confidential 2013 Data – Android continues its momentum…
  • 15. 15 Confidential Smartphones Trends in Key Markets North America § Population:354M § Nb of Smartphones:210M Shipment 2012 Android 71M iOS 49M Blackberry 5M Windows 3M Western Europe § Population:406M § Nb of Smartphones:260M Shipment 2012 Android 69M   iOS 26M   Blackberry 9M   Symbian 4M   Windows 5M   Mature Asia/Pacific § Population:82M § Nb of Smartphones:60M Shipment 2012 Android 28M   iOS 14M   Blackberry 1M   Symbian 3M   Others 3M   Greater China § Population:1540M § Nb of Smartphones:283M Shipment 2012 Android 79M   iOS 31M   Windows 2M   Bada 1M   Symbian 0,5M  
  • 16. 16 Confidential Android Landscape §  Widely popular in developing countries •  Lots of choice – screen size, price, capabilities, etc. §  Not much traction in enterprise segment •  Security •  Perception is that Android is not secure •  Google Play is ‘wild wild west’ •  Enterprise features (eg: MDM) weak •  Fragmentation •  No two devices are the same in terms of capabilities or UI •  Hard for IT to support diverse environment •  Lack of control •  OS upgrades are controlled by carrier/OEM •  Security patches not pushed out in a timely manner §  OEMs starting to add capabilities
  • 19. 19 Confidential iOS Landscape §  Popular in North America, Western Europe and other richer geographical pockets •  Price rules them out in many developing countries §  In tune with enterprise opportunity and have great traction •  Increasing support for enterprise features in every hw and sw release •  Security •  Perception is that iOS is more secure than Android •  App Store is curated •  Strong enterprise features (encryption, MDM, etc.) •  Fragmentation •  Different screen sizes but not capabilities so perception is that there is no fragmention in the Apple world
  • 21. 21 Confidential BlackBerry Landscape §  Was good standard in enterprise market •  Device Encryption •  Remote Wiping for lost/stolen •  Force password •  Provision secure Email, VPN, Wifi §  Missed BYOD trend completely and lost traction §  BB 10 is decent •  BlackBerry Balance – built in dual persona solution •  Small market share and not growing §  BB shops that didn’t already switch will likely stay with BB §  Most customers already started switching to a more strategic platform •  Don’t view BB as strategic anymore •  Migrating to iOS or Android or both
  • 22. 22 Confidential Windows Landscape §  Windows Phone and Windows 8 are still early •  Windows Phone – more consumer oriented •  Windows Tablet seems to be more enterprise friendly and will likely get more traction that Windows phones in 2014 §  MSFT has deep pockets and will likely become the third dominant mobile platform •  Distant third….
  • 24. 24 Confidential 50 Billion (iOS) vs. 48B (Android)
  • 25. 25 Confidential Consumer Apps published to “public stores” Sources: Nielsen, May 16, 2012, VMware Customer Research. Amazon appstore + Other Stores
  • 26. 26 Confidential App Distribution options § iOS App Distribution • The Apple iOS App Store • Ad hoc developer distribution • Enterprise distribution • The Apple Volume Purchase Program • The Apple Custom B2B § Android App Distribution • Google Play • Non-market resources
  • 27. 27 Confidential Device & Application Management
  • 28. 28 Confidential Anatomy of a Smartphone/Tablet •  Handheld Computer/Processor •  Communication Components •  Modem Chips •  Antenna •  Bluetooth •  WiFi •  Input/Output & Sensors •  Display •  Touchscreen •  Microphone/Speaker •  Cameras •  GPS •  Compass •  Accelerometer •  NFC •  USB
  • 29. 29 Confidential Building iOS and Android Applications §  In order to construct a mobile app, need a “front end” – the bits that run on the device / “the app” §  A disconnected app is typically not very interesting…so, we also need to build a “back end” to support the app Front End Back End
  • 30. 30 Confidential Solving Mobility § Remote Windows desktop / applications § Web apps / HTML 5 § Virtualized OS
  • 31. 31 Confidential Current Approach Requires Managing the Whole Device MobileDeviceManagement Device Apps & Data Corporate Apps & Data What actually needs to be managed by the enterprise
  • 32. 32 Confidential © 2013 VMware Inc. All rights reserved Confidential We still have ways to go…
  • 34. 34 Confidential Range of Options for Device & App Control Exchange ActiveSync Email Calendar Contacts Native (iOS & Android)
  • 35. 35 Confidential Complex ActiveSync compatibility matrix
  • 36. 36 Confidential Complex ActiveSync compatibility matrix (cont.)
  • 37. 37 Confidential Range of Options for Device & App Control Exchange ActiveSync Email Calendar Contacts Native (iOS & Android) Secure Documents Container Single App Container Native Apps OS Vendor Policy Container HTML 5 Apps/ WebClips Blackberry Balance, Samsung Knox MDM Solutions
  • 38. 38 Confidential Sample Apple iOS Device Control
  • 39. 39 Confidential Range of Options for Device & App Control Exchange ActiveSync Email Calendar Contacts Native (iOS & Android) Secure Documents Container Single App Container Native Apps OS Vendor Policy Container HTML 5 Apps/ WebClips Blackberry Balance, Samsung Knox MDM Solutions Mobile App Management