Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Endpoints stki summit 2012-shahar geiger maor
1. Endpoint
Trends
Tell me and I’ll forget STKI Summit 2012
Show me and I may remember
Shahar Geiger Maor,
Involve me and I’ll understand VP & Senior Analyst
2. Agenda
Endpoints Networking Security
DC Cloud
Post
Voice MDM
PC
Video Cyber
2
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
3. Presentation Visualization
MDM
Networking Security
ollaboration
3
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5. Presentation Visualization
MDM
Networking Security
ollaboration
5
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
6. Desktop-PCs are getting old…Say Hello to the Post-PC Era
• No platform, form factor or technology will dominate.
• BYOD will remain the norm.
• Component prices continue downward trend.
• Off-Desktop devices consume more of the digital
experience
• Employees will use many devices, syncing data between
them via the cloud.
6
Source: Bent Objects
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
7. 2012 game changers :
• Consumerization of IT
• Bring your own Device (BYOD)
• Changing Client Architectures
Tablet computers, smartphones,
4G, social media, gaming,
desktop virtualization,
and other technology innovations
are bringing possibilities and
challenges to IT and the workplace
like never before
7
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
8. Experience Economy > Age of the Customer
• From 1900 to 1960, Age of Manufacturing , if you owned a factory,
you owned the market.
• From 1960 to 2000, Age of Distribution, if you owned the
distribution channels, you owned the market.
• From 2000 to 2011, Age of Information, if you owned the
information, you owned the market.
• From 2011, Age of the Customer, if you engage the customer, you
own the market
8
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
9. Why Mobile?
Communication Telecom: fire, Mobile Phone
Telephone
–A basic need letters… Device
• Population is spreading all • Starting to close the gap. • Large distances, real-time. • Always with me, cost
over the world. Closer to the end-user effective, muti-
purpose device, carrier-
• Distance is becoming a • Short distances, no real- • Static side infrastructure,
communication issue time Anywhere-to-anywhere
connection and more…
9
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
10. Mobile Outsourcing
Social
Trade
Fun Tools
Pics
Gesture
Touch
CalendarMail
Location
Ⅱ
Δ
Voice Video
Content Access
Search
10
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
11. Using Mobile Apps more then 10 times a day
11
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
12. Using Mobile App to Make a Purchase/ for Client Service
12
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
13. Decision Making in the Digital World
Seeking Intelligence,
Not Content
- Real time
60% of purchase decisions
being made before the
consumer stepped into the
store!!!
13
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
14. Many clients are asking about how to:
Set a solid
Digital Customer Experience
MDM
craft mobile policies
how to develop
manage the devices
mobile custom apps?
Secure their
select mobile devices mobile content
14
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
15. Answers are right here
Who is IT or Business?
Digital Customer Experience IT higher involvement
Owner in enterprise
how to develop
mobile custom apps?
Native or Hybrid Apps
select mobile devices People wants:
Enterprises wants:
15
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
16. What Do People Want ?
16
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
17. Three OSs, Three Ecosystems?
Source: IDC 17
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
18. Internet vs. Mobile Data Traffic
Global Internet Traffic Growth (Fixed)
300%
200%
100%
0%
1997 1998 1999 2000 2001 2002
Global Mobile Data Traffic Growth
200%
150%
100%
50%
0%
2009 2010 2011 2012 2013 2014
(estimate)
Source: Cisco VNI 2012 18
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
19. Mobile Statistics
– The number of active mobile broadband
subscriptions worldwide in 2011.
–The estimated number of mobile subscriptions
worldwide in 2011.
–Percentage of handsets shipped globally in 2011
that included a web browser.
– Apple iPad’s share of global tablet web traffic
in December.
Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ 19
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
20. Different Devices, Different Purpose
Work
Creation
Change
Flow
Consumption
Experience
20
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
21. List of Tablet Use Cases
How do you useplan to use your tablet? (Please select all that apply)
Surfing the web
Writing or reading mail
Watching video
listening to music
social media sites
Gaming
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Source: Yankee Group 21
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
22. Bring Your Own Device
Tablets occupy a middle
ground where
consumption and creation • Easier and more supportable
of data has a wide range. • More flexible device capability
BYOD needs to be a Virtualization
consideration once
interest enters this zone.
BYOD Full
Data Consumption and Creation Continuum
Light BYOC
There are two potential
paths that can be followed
at this point.
Integration
• Full network
- Light data consumption • Harder to support (e.g. local - Heavy data consumption
- Minimal data creation rather than centralized apps) - Local data creation
• Limited by device capabilities
Final steps:
- Full BYOD policy created by
Past this line, infrastructure, all business groups.
security, and operations - TCO calculation in
pillars must be considered in conjunction with Finance.
order to support advanced
data creation.
Source: Info-Tech Research Group 22
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
23. BYOD Recommendations
1 Measure success against overall objectives of a multi-device strategy.
Having a multi-device IT service access strategy should contribute to lowering costs while increasing service
regardless of who owns the devices. Given that, how does BYOD further those objectives?
2 Consider impact on overall objectives when deciding between passive or aggressive
approach.
Bring Your Own policies can range from passive (we allow connection from personally-owned devices) to
aggressive (we encourage and even subsidize bring your devices).
3 Communicate policy requirements and roles and responsibilities for system support.
Failure to meet success measures can be a result of communication failures as much as a failure of technical
and operational capability.
4 Maintain company-owned device options for flexibility and end-user service.
Info-Tech sees that even in the case of an aggressive BYODprogram, allowing use of a company-owned device
can mitigate a number of the potential pitfalls of BYOD.
5 Document your policy position and rationale for the business.
In dealing with your internal business customers’ demand for service, there is only one question (with two
corollaries) that matters. Can you deliver this service? If yes, how? If no, why?
Source: Info-Tech Research Group 23
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
24. The Evolution of Trade
Credit
Lydian coins
Mobile Barter
Payment
24
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
25. Mobile Payment
That’s like almost
Every Cow
on the planet
getting a smartphone
25
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
26. 4 Types of Mobile Payment
• The Mobile Wallet -Paying for things at a store with a mobile
device using NFC or "tap and go“.
• Every Smartphone is a cash register - Merchants using a
mobile
device to process credit cards payments.
• The “Everything Else” mobile Payment -Consumers send
money to merchants, or even each other (sometimes called p2p),
using mobile devices (on-saleon-line).
• ‘Put it on my bill’ -Consumers buying ringtones or games or
digital content by putting the charges on their cellphone account.
26
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
27. What’s In a Mobile Wallet?
Secure Element (SE), which holds:
One or more payment, mass transit, Mobile Phone
and/or offer applications
RF Modem
Each application emulates a
particular “card” in the wallet
SIM Chip
Baseband
Near Field Communications (NFC) Processor
Secure Element
chip • Payment Applications
NFC
Two-way communication with the Controller • Transit Application
point of sale • Offer Application
Compatible with existing contactless Proximity
Antenna
payment standards
Three options for hosting the SE:
On the SIM chip (shown here)
Elsewhere in the handset Point of Sale
On a MicroSD card
Source: GSMA
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
27
28. How Does It Work?
– Encrypted credentials are
supplied by the card issuing
bank to a TSM Card
Issuing
– The TSM distributes the Bank
Trusted
credentials to the phone via Payment Service
Network Manager
the MNO (TSM)
– Phones use NFC to present
the credentials at the POS
Mobile
– Transaction proceeds as a Acquiring
Bank
Network
Operator
regular card payment (MNO)
Point of Mobile
Sale Phone
Source: IDC Financial Insights 28
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
29. Okay, So What’s the Catch?
Lots of unresolved questions:
– Who controls the secure element?
– How much does it cost to rent space in the wallet?
– Who gets to provide the offer application(s)?
– What if the merchant doesn’t support contactless cards?
29
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
30. The Digital Customer
Expectation People’s opinions matter more than providers opinions
Economy and more than in the past
Brand Butlers Personalization & attitudes to privacy, ownership, piracy,
color & language. Shift from transaction to interaction
AlwaysOn Working Practices & Attitudes: Blurring of work and
leisure, conflict between new and old attitudes
GameOn Many-to-Many Communication -turning the mundane
into “fun”
Intelligent Knowledge for many regions, languages, currencies &
Infosystems attitudes visualized in different ways
Dynamic Pricing Money, but no time –45 seconds/4 clicks is too long to
wait.
30
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
31. What Are The Expectations From a Mobilized World?
31
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
32. Devices that end users prefer (new ?)
Ultrabooks (NetNotebooks) will reach just over 15% of total consumer notebooks (IDC)
1. Mainstream price must be very attractive
2. Lower cost conventional notebooks slowing ultrabook adoption
http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011 32
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
33. Apple is Gaining Market Share in the Enterprise
Source: Forrester 33
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
34. 1/5 Of Global Info Workers Use Apple Products For Work
http://blogs.forrester.com/frank_gillett 34
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
35. “The endpoint not taken”
35
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
36. Israeli Smartphone Market-share in 2011
Motorola Alcatel HTC
RIM 5% 4% 1%
5%
Samsung
Sony Ericsson
27%
7%
LG
8%
Nokia Apple
20% 23%
Source: IDC 36
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
37. Israeli Smartphone Market-share in 2011
Operating System Market Share
Android 39.39%
iOS 36.62%
BlackBerry OS 9.48%
Symbian 9.00%
Other 5.52%
Source: IDC 37
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
38. Israel (expected end 2012):
Wintel: Q42011 compared to Q42010
Desktop PCs: -25% Notebooks: -35%
38
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
39. What is the Current Endpoint-Devices Mix within your enterprise?
under IT responsibility
1%
8% more endpoints
Tablets
7% Smartphones
13% Laptops
Desktops
77%
Source: STKI Feb. 2012
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
39
40. What will be the Mix 12 Months from now?
6%
Tablets
1.6% Notebooks
Netbooks
20.5% Laptops
Desktops
75%
Source: STKI Sep. 2011
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
40
41. Endpoint Contemplations
1. DesktopsNotebooks are losing market share
2. Desktops = price sensitive
3. LaptopsTablets are gaining power
4. A tablet (still) can’t replace a laptop
5. “By 2015…?” No one really knows what’s going to
happen…
41
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
42. Market Data
http://xkcd.com/688/ 42
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
43. Israeli Endpoint Statistics
1.08 • Number of endpoints per 1 employee
24 • Number of endpoints per 1 IT staff
564 • Number of endpoints per 1 service desk
staff
748 • Number of endpoints per 1 PC staff (field
technicians)
3231 • Number of endpoints per 1 PC staff (image)
43
Source: STKI
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
44. Endpoint-Devices Mix (Abroad)
Source: InformationWeek 44
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
45. Who Will Be Using Tablets? (Israel)
3% Some of theall Employees
15% Mid-level directors
21% Pilot in one of the units
41% Specific functions (e.g. salesmarketing)
44% CXOs
Source: STKI, Sep. 2011 45
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
46. Who Will Be Using Tablets? (Abroad)
Source: Corporate Executive Board 46
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
47. End-Point Operating Costs
Source: InformationWeek 47
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
48. End User Device Replacement Cycle
Source: InformationWeek 48
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
49. Desktop PCs- Israeli Market Positioning 1Q12
HP
Lenovo
Local Support
Dell
Player
Ivory
Worldwide
Leader
Acer
Apple
Market Presence
49
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
50. Laptops- Israeli Market Positioning 1Q12
Lenovo
Local Support
Player
Acer HP
ASUS Dell Worldwide
LG Leader
Samsung
Toshiba
Fujitsu
Apple
Market Presence
50
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
51. Tablets- Israeli Market Positioning 1Q12
Local Support
Player
Worldwide
Leader
Others…
Apple
Samsung
Market Presence
51
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
52. Thank You!
Scan Me to Your Contacts…
52
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic