SlideShare une entreprise Scribd logo
1  sur  52
Endpoint
           Trends




    Tell me and I’ll forget      STKI Summit 2012
Show me and I may remember
                                   Shahar Geiger Maor,
Involve me and I’ll understand     VP & Senior Analyst
Agenda



Endpoints                                   Networking                                                          Security

                                                             DC                                                 Cloud
 Post
                                                      Voice                                                      MDM
  PC
                                                     Video                                                      Cyber
                                                                                                                               2
   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Presentation Visualization




                                                                MDM
Networking                                                                                                      Security

                                                                 ollaboration




                                                                                                                                 3
     Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Endpoints




http://www.wired.com/wired/archive/14.07/images/found.jpg graphic
   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of
                                                                                                                       4
Presentation Visualization




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              5
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Desktop-PCs are getting old…Say Hello to the Post-PC Era
• No platform, form factor or technology will dominate.
• BYOD will remain the norm.
• Component prices continue downward trend.
• Off-Desktop devices consume more of the digital
  experience
• Employees will use many devices, syncing data between
  them via the cloud.




                                                                                                                                      6
                                                      Source: Bent Objects
          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
2012 game changers :




                                  • Consumerization of IT
                                  • Bring your own Device (BYOD)
                                  • Changing Client Architectures
                                                      Tablet computers, smartphones,
                                                          4G, social media, gaming,
                                                           desktop virtualization,
                                                     and other technology innovations
                                                        are bringing possibilities and
                                                     challenges to IT and the workplace
                                                               like never before


                                                                                                                            7
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Experience Economy > Age of the Customer

• From 1900 to 1960, Age of Manufacturing , if you owned a factory,
  you owned the market.

• From 1960 to 2000, Age of Distribution, if you owned the
  distribution channels, you owned the market.

• From 2000 to 2011, Age of Information, if you owned the
  information, you owned the market.

• From 2011, Age of the Customer, if you engage the customer, you
  own the market


                                                                                                                                      8
          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Why Mobile?




    Communication                              Telecom: fire,                                                                        Mobile Phone
                                                                                        Telephone
     –A basic need                                letters…                                                                             Device




• Population is spreading all          • Starting to close the gap.                • Large distances, real-time.               • Always with me, cost
  over the world.                                                                    Closer to the end-user                      effective, muti-
                                                                                                                                 purpose device, carrier-
• Distance is becoming a               • Short distances, no real-                 • Static                                      side infrastructure,
  communication issue                    time                                                                                    Anywhere-to-anywhere
                                                                                                                                 connection and more…




                                                                                                                                                       9
                  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Mobile Outsourcing



                                                                                 Social
                                                           Trade
                                         Fun                                                              Tools
                Pics

                                                                                                                      Gesture
  Touch



CalendarMail

                                                                                                                Location
                                                                                                               Ⅱ

                                                                                                      Δ
         Voice                                                                                            Video
                              Content                                             Access
                                                          Search
                                                                                                                                10
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Using Mobile Apps more then 10 times a day




                                                                                                                            11
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Using Mobile App to Make a Purchase/ for Client Service




                                                                                                                                  12
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Decision Making in the Digital World



                                                                   Seeking Intelligence,
                                                                      Not Content




                         - Real time




60% of purchase decisions
  being made before the
consumer stepped into the
         store!!!
                                                                                                                                    13
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Many clients are asking about how to:


                                                Set a solid
                                       Digital Customer Experience
                                                                                                                MDM

                                                                                                     craft mobile policies
           how to develop
                                                              manage the devices
           mobile custom apps?

                                                                                  Secure their
                              select mobile devices                               mobile content




                                                                                                                             14
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Answers are right here


                           Who is                                                   IT or Business?
                Digital Customer Experience                                         IT higher involvement
                    Owner in enterprise


how to develop
mobile custom apps?
                                               Native or Hybrid Apps



        select mobile devices                                People wants:



                                                             Enterprises wants:




                                                                                                                                       15
           Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What Do People Want ?




                                                                                                                            16
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Three OSs, Three Ecosystems?




                                                        Source: IDC                                                         17
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Internet vs. Mobile Data Traffic

                           Global Internet Traffic Growth (Fixed)
300%

200%

100%

 0%
       1997                     1998                       1999                       2000                       2001               2002
                                Global Mobile Data Traffic Growth
200%
150%
100%
50%
 0%
       2009                      2010                       2011                        2012                     2013                2014
                                                                                                               (estimate)
                                                      Source: Cisco VNI 2012                                                           18
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Mobile Statistics


                                                          – The number of active mobile broadband
                                                          subscriptions worldwide in 2011.



                                                          –The estimated number of mobile subscriptions
                                                          worldwide in 2011.




                                                          –Percentage of handsets shipped globally in 2011
                                                          that included a web browser.




                                                         – Apple iPad’s share of global tablet web traffic
                                                         in December.

Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/                                                       19
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Different Devices, Different Purpose


                                                                           Work
               Creation
                                                                          Change


                                                                             Flow
              Consumption




                                                                       Experience




                                                                                                                            20
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
List of Tablet Use Cases

      How do you useplan to use your tablet? (Please select all that apply)


       Surfing the web

Writing or reading mail

       Watching video

     listening to music

     social media sites

                 Gaming

                                 0%          10%          20%          30%         40%          50%          60%          70%           80%   90%

                                                           Source: Yankee Group                                                                 21
            Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Bring Your Own Device

                                         Tablets occupy a middle
                                         ground where
                                         consumption and creation                • Easier and more supportable
                                         of data has a wide range.               • More flexible device capability
                                         BYOD needs to be a                           Virtualization
                                         consideration once
                                         interest enters this zone.
BYOD                                                                                                                                                           Full
                                                  Data Consumption and Creation Continuum
Light                                                                                                                                                         BYOC
                                         There are two potential
                                         paths that can be followed
                                         at this point.
                                                                                       Integration
                                                                                 • Full network
- Light data consumption                                                         • Harder to support (e.g. local                     - Heavy data consumption
- Minimal data creation                                                            rather than centralized apps)                     - Local data creation
                                                                                 • Limited by device capabilities
                                                                                                                                     Final steps:
                                                                                                                                     - Full BYOD policy created by
                                         Past this line, infrastructure,                                                               all business groups.
                                         security, and operations                                                                    - TCO calculation in
                                         pillars must be considered in                                                                 conjunction with Finance.
                                         order to support advanced
                                         data creation.



                                                     Source: Info-Tech Research Group                                                                    22
                   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
BYOD Recommendations


1 Measure success against overall objectives of a multi-device strategy.
   Having a multi-device IT service access strategy should contribute to lowering costs while increasing service
   regardless of who owns the devices. Given that, how does BYOD further those objectives?

2 Consider impact on overall objectives when deciding between passive or aggressive
  approach.
   Bring Your Own policies can range from passive (we allow connection from personally-owned devices) to
   aggressive (we encourage and even subsidize bring your devices).
3 Communicate policy requirements and roles and responsibilities for system support.
   Failure to meet success measures can be a result of communication failures as much as a failure of technical
   and operational capability.

4 Maintain company-owned device options for flexibility and end-user service.
   Info-Tech sees that even in the case of an aggressive BYODprogram, allowing use of a company-owned device
   can mitigate a number of the potential pitfalls of BYOD.

5 Document your policy position and rationale for the business.
   In dealing with your internal business customers’ demand for service, there is only one question (with two
   corollaries) that matters. Can you deliver this service? If yes, how? If no, why?


                                                Source: Info-Tech Research Group                                                          23
              Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
The Evolution of Trade



                                                                                                               Credit

                                                                            Lydian coins
Mobile                                                                                                        Barter
Payment
                                                                                                                             24
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Mobile Payment




                                               That’s like almost
                                               Every Cow
                                               on the planet
                                               getting a smartphone




                                                                                                                            25
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
4 Types of Mobile Payment

• The Mobile Wallet -Paying for things at a store with a mobile
  device using NFC or "tap and go“.
• Every Smartphone is a cash register - Merchants using a
  mobile
  device to process credit cards payments.
• The “Everything Else” mobile Payment -Consumers send
  money to merchants, or even each other (sometimes called p2p),
  using mobile devices (on-saleon-line).
• ‘Put it on my bill’ -Consumers buying ringtones or games or
  digital content by putting the charges on their cellphone account.



                                                                                                                                   26
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What’s In a Mobile Wallet?


Secure Element (SE), which holds:
One or more payment, mass transit,                                                     Mobile Phone
and/or offer applications
                                                                                        RF Modem
Each application emulates a
particular “card” in the wallet
                                                                                                               SIM Chip
                                                                                        Baseband
Near Field Communications (NFC)                                                         Processor
                                                                                                                 Secure Element
chip                                                                                                             • Payment Applications
                                                                                           NFC
Two-way communication with the                                                           Controller              • Transit Application
point of sale                                                                                                    • Offer Application

Compatible with existing contactless                                                     Proximity
                                                                                         Antenna
payment standards
Three options for hosting the SE:
On the SIM chip (shown here)
Elsewhere in the handset                                                     Point of Sale
On a MicroSD card
                                                             Source: GSMA
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                      27
How Does It Work?

– Encrypted credentials are
  supplied by the card issuing
  bank to a TSM                                                                                               Card
                                                                                                             Issuing
– The TSM distributes the                                                                                     Bank
                                                                                                                                      Trusted
  credentials to the phone via                                                 Payment                                                Service
                                                                               Network                                                Manager
  the MNO                                                                                                                              (TSM)

– Phones use NFC to present
  the credentials at the POS
                                                                                                                                          Mobile
– Transaction proceeds as a                                             Acquiring
                                                                          Bank
                                                                                                                                         Network
                                                                                                                                         Operator
  regular card payment                                                                                                                    (MNO)



                                                                                             Point of                        Mobile
                                                                                              Sale                           Phone



                                             Source: IDC Financial Insights                                                                 28
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Okay, So What’s the Catch?

Lots of unresolved questions:
– Who controls the secure element?
– How much does it cost to rent space in the wallet?
– Who gets to provide the offer application(s)?
– What if the merchant doesn’t support contactless cards?




                                                                                                                                   29
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
The Digital Customer

  Expectation                   People’s opinions matter more than providers opinions
   Economy                      and more than in the past

 Brand Butlers                  Personalization & attitudes to privacy, ownership, piracy,
                                color & language. Shift from transaction to interaction

   AlwaysOn                     Working Practices & Attitudes: Blurring of work and
                                leisure, conflict between new and old attitudes

   GameOn                       Many-to-Many Communication -turning the mundane
                                into “fun”
   Intelligent                  Knowledge for many regions, languages, currencies &
  Infosystems                   attitudes visualized in different ways

Dynamic Pricing Money, but no time –45 seconds/4 clicks is too long to
                                wait.
                                                                                                                                   30
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What Are The Expectations From a Mobilized World?




                                                                                                                                31
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Devices that end users prefer (new ?)




Ultrabooks (NetNotebooks) will reach just over 15% of total consumer notebooks (IDC)
1. Mainstream price must be very attractive
2. Lower cost conventional notebooks slowing ultrabook adoption


            http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011                                                      32
           Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Apple is Gaining Market Share in the Enterprise




                                                     Source: Forrester                                                       33
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
1/5 Of Global Info Workers Use Apple Products For Work




                                 http://blogs.forrester.com/frank_gillett                                                        34
     Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
“The endpoint not taken”




                                                                                                                            35
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Israeli Smartphone Market-share in 2011


                             Motorola Alcatel                                                          HTC
                         RIM   5%       4%                                                             1%
                         5%
                                                                                                    Samsung
Sony Ericsson
                                                                                                      27%
     7%
          LG
          8%



                                  Nokia                                                                          Apple
                                  20%                                                                             23%




                                                                 Source: IDC                                                         36
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Israeli Smartphone Market-share in 2011



  Operating System                                                                            Market Share
            Android                                                                                 39.39%
                 iOS                                                                                36.62%
      BlackBerry OS                                                                                  9.48%
           Symbian                                                                                   9.00%
              Other                                                                                  5.52%




                                                        Source: IDC                                                         37
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Israel (expected end 2012):




Wintel: Q42011 compared to Q42010
Desktop PCs: -25% Notebooks: -35%
                                                                                                                             38
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What is the Current Endpoint-Devices Mix within your enterprise?
under IT responsibility




                          1%
8% more endpoints




                                                                                                          Tablets

                          7%                                                                      Smartphones


                          13%                                                                            Laptops


                                                                                                       Desktops
                          77%

                                                                   Source: STKI Feb. 2012
                          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                                      39
What will be the Mix 12 Months from now?



                      6%
                                                                                               Tablets

                  1.6%                                                                   Notebooks
                                                                                            Netbooks

                20.5%                                                                         Laptops


                                                                                             Desktops
                   75%

                                         Source: STKI Sep. 2011
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                            40
Endpoint Contemplations



1.   DesktopsNotebooks are losing market share
2.   Desktops = price sensitive
3.   LaptopsTablets are gaining power
4.   A tablet (still) can’t replace a laptop
5.   “By 2015…?” No one really knows what’s going to
     happen…




                                                                                                                                    41
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Market Data




                                            http://xkcd.com/688/                                                            42
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Israeli Endpoint Statistics


1.08                                       • Number of endpoints per 1 employee



   24                                      • Number of endpoints per 1 IT staff



564                                        • Number of endpoints per 1 service desk
                                             staff


748                                        • Number of endpoints per 1 PC staff (field
                                             technicians)


3231                                       • Number of endpoints per 1 PC staff (image)

                                                                                                                            43
                                                    Source: STKI
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Endpoint-Devices Mix (Abroad)




                                       Source: InformationWeek                                                              44
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Who Will Be Using Tablets? (Israel)



                                                                3%              Some of theall Employees


                                       15%                                      Mid-level directors


                              21%                                               Pilot in one of the units


 41%                                                                            Specific functions (e.g. salesmarketing)


44%                                                                             CXOs



                                                Source: STKI, Sep. 2011                                                            45
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Who Will Be Using Tablets? (Abroad)




                              Source: Corporate Executive Board                                                             46
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
End-Point Operating Costs




                                       Source: InformationWeek                                                              47
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
End User Device Replacement Cycle




                                       Source: InformationWeek                                                              48
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Desktop PCs- Israeli Market Positioning 1Q12


                                                                                  HP
                                                                  Lenovo
   Local Support




                                                                                                  Dell
                                                                                                                            Player
                                                                     Ivory
                                                                                                                            Worldwide
                                                                                                                            Leader
                              Acer

                   Apple




                                                 Market Presence

                                                                                                                                49
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Laptops- Israeli Market Positioning 1Q12




                                                             Lenovo
   Local Support




                                                                                                                            Player
                                Acer                                                    HP
                                ASUS                                          Dell                                          Worldwide
                                   LG                                                                                       Leader

                                                                   Samsung

                                                Toshiba
                               Fujitsu
                      Apple
                                                 Market Presence

                                                                                                                                50
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Tablets- Israeli Market Positioning 1Q12


   Local Support




                                                                                                                            Player


                                                                                                                            Worldwide
                                                                                                                            Leader



                   Others…
                                                                 Apple

                                                        Samsung
                                                 Market Presence

                                                                                                                                51
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Thank You!




                       Scan Me to Your Contacts…
                                                                                                                            52
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic

Contenu connexe

Tendances

It Technologies That Will Change The Way We Work Final
It Technologies That Will Change The Way We Work FinalIt Technologies That Will Change The Way We Work Final
It Technologies That Will Change The Way We Work FinalMcGarahan & Associates, Inc.
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint EvolutionCarahsoft
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsLars Bodenhoff
 
Sb Overview Gartner Pcc Sept 2011
Sb Overview Gartner Pcc Sept 2011Sb Overview Gartner Pcc Sept 2011
Sb Overview Gartner Pcc Sept 2011pchandor
 
The ibm social journey
The ibm social journeyThe ibm social journey
The ibm social journeyLetsConnect
 
Tangital Webjects Presentation Document
Tangital Webjects Presentation DocumentTangital Webjects Presentation Document
Tangital Webjects Presentation DocumentShay-Jahen Merritté
 
Ci oezine v2
Ci oezine v2Ci oezine v2
Ci oezine v2hoyinc
 
Sentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Ready, Aim, Fire! Using Social Media Analytics to Hit Your Target Market
Ready, Aim, Fire! Using Social Media Analytics to Hit Your Target MarketReady, Aim, Fire! Using Social Media Analytics to Hit Your Target Market
Ready, Aim, Fire! Using Social Media Analytics to Hit Your Target MarketCareer Communications Group
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
Intel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesIntel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesUmair Mohsin
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social businessLotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social businessHerbert Wagger
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorialLen Bass
 
Designing for the iPad
Designing for the iPadDesigning for the iPad
Designing for the iPadusabilitynj
 
Mobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneMobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneGlen Koskela
 

Tendances (20)

It Technologies That Will Change The Way We Work Final
It Technologies That Will Change The Way We Work FinalIt Technologies That Will Change The Way We Work Final
It Technologies That Will Change The Way We Work Final
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
Sb Overview Gartner Pcc Sept 2011
Sb Overview Gartner Pcc Sept 2011Sb Overview Gartner Pcc Sept 2011
Sb Overview Gartner Pcc Sept 2011
 
The ibm social journey
The ibm social journeyThe ibm social journey
The ibm social journey
 
Tangital Webjects Presentation Document
Tangital Webjects Presentation DocumentTangital Webjects Presentation Document
Tangital Webjects Presentation Document
 
Ci oezine v2
Ci oezine v2Ci oezine v2
Ci oezine v2
 
Sentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud Webinar
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Ready, Aim, Fire! Using Social Media Analytics to Hit Your Target Market
Ready, Aim, Fire! Using Social Media Analytics to Hit Your Target MarketReady, Aim, Fire! Using Social Media Analytics to Hit Your Target Market
Ready, Aim, Fire! Using Social Media Analytics to Hit Your Target Market
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
Intel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesIntel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability Issues
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Edc Engineering Solutions Profile
Edc Engineering Solutions ProfileEdc Engineering Solutions Profile
Edc Engineering Solutions Profile
 
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social businessLotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorial
 
Designing for the iPad
Designing for the iPadDesigning for the iPad
Designing for the iPad
 
Mobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneMobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial Tone
 

En vedette

Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protectionShahar Geiger Maor
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maorShahar Geiger Maor
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelShahar Geiger Maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Shahar Geiger Maor
 
Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeShahar Geiger Maor
 

En vedette (7)

Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
 

Similaire à Endpoints stki summit 2012-shahar geiger maor

Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure ServicesAriel Evans
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11mcini
 
Palestra "Technology Trends To Watch In 2012 and beyond"
Palestra "Technology Trends To Watch In 2012 and beyond"Palestra "Technology Trends To Watch In 2012 and beyond"
Palestra "Technology Trends To Watch In 2012 and beyond"Dígitro Tecnologia
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information securityShahar Geiger Maor
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Soonr Overview
Soonr OverviewSoonr Overview
Soonr Overviewgingerh
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Overcoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in GovernmentOvercoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in Governmentjcichelli
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...Priyanka Aash
 
Smarter Workplace of the Future
Smarter Workplace of the FutureSmarter Workplace of the Future
Smarter Workplace of the FutureStephan Beck
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8Shahar Geiger Maor
 
Cognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsCognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsPietro Leo
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social StreamsLuis Benitez
 

Similaire à Endpoints stki summit 2012-shahar geiger maor (20)

Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure Services
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11
 
Palestra "Technology Trends To Watch In 2012 and beyond"
Palestra "Technology Trends To Watch In 2012 and beyond"Palestra "Technology Trends To Watch In 2012 and beyond"
Palestra "Technology Trends To Watch In 2012 and beyond"
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Soonr Overview
Soonr OverviewSoonr Overview
Soonr Overview
 
Virtual Instruments Presentation
Virtual Instruments PresentationVirtual Instruments Presentation
Virtual Instruments Presentation
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
Overcoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in GovernmentOvercoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in Government
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
 
Smarter Workplace of the Future
Smarter Workplace of the FutureSmarter Workplace of the Future
Smarter Workplace of the Future
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8
 
Cognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsCognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analytics
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Mobile Service Edge
Mobile Service EdgeMobile Service Edge
Mobile Service Edge
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social Streams
 

Plus de Shahar Geiger Maor

Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure servicesShahar Geiger Maor
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2Shahar Geiger Maor
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Shahar Geiger Maor
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1Shahar Geiger Maor
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsShahar Geiger Maor
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
 
Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Shahar Geiger Maor
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008Shahar Geiger Maor
 
Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Shahar Geiger Maor
 

Plus de Shahar Geiger Maor (20)

From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptx
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure services
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
PCI Challenges
PCI ChallengesPCI Challenges
PCI Challenges
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
Green Security
Green SecurityGreen Security
Green Security
 
IPv6
IPv6IPv6
IPv6
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008
 
Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
 
Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008
 
Round Tables Summary
Round Tables SummaryRound Tables Summary
Round Tables Summary
 
Green IT Trends in Israel
Green IT Trends in IsraelGreen IT Trends in Israel
Green IT Trends in Israel
 
Round Tables: Summary
Round Tables: SummaryRound Tables: Summary
Round Tables: Summary
 

Dernier

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Dernier (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Endpoints stki summit 2012-shahar geiger maor

  • 1. Endpoint Trends Tell me and I’ll forget STKI Summit 2012 Show me and I may remember Shahar Geiger Maor, Involve me and I’ll understand VP & Senior Analyst
  • 2. Agenda Endpoints Networking Security DC Cloud Post Voice MDM PC Video Cyber 2 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 3. Presentation Visualization MDM Networking Security ollaboration 3 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 4. Endpoints http://www.wired.com/wired/archive/14.07/images/found.jpg graphic Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of 4
  • 5. Presentation Visualization MDM Networking Security ollaboration 5 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 6. Desktop-PCs are getting old…Say Hello to the Post-PC Era • No platform, form factor or technology will dominate. • BYOD will remain the norm. • Component prices continue downward trend. • Off-Desktop devices consume more of the digital experience • Employees will use many devices, syncing data between them via the cloud. 6 Source: Bent Objects Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 7. 2012 game changers : • Consumerization of IT • Bring your own Device (BYOD) • Changing Client Architectures Tablet computers, smartphones, 4G, social media, gaming, desktop virtualization, and other technology innovations are bringing possibilities and challenges to IT and the workplace like never before 7 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 8. Experience Economy > Age of the Customer • From 1900 to 1960, Age of Manufacturing , if you owned a factory, you owned the market. • From 1960 to 2000, Age of Distribution, if you owned the distribution channels, you owned the market. • From 2000 to 2011, Age of Information, if you owned the information, you owned the market. • From 2011, Age of the Customer, if you engage the customer, you own the market 8 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 9. Why Mobile? Communication Telecom: fire, Mobile Phone Telephone –A basic need letters… Device • Population is spreading all • Starting to close the gap. • Large distances, real-time. • Always with me, cost over the world. Closer to the end-user effective, muti- purpose device, carrier- • Distance is becoming a • Short distances, no real- • Static side infrastructure, communication issue time Anywhere-to-anywhere connection and more… 9 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 10. Mobile Outsourcing Social Trade Fun Tools Pics Gesture Touch CalendarMail Location Ⅱ Δ Voice Video Content Access Search 10 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 11. Using Mobile Apps more then 10 times a day 11 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 12. Using Mobile App to Make a Purchase/ for Client Service 12 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 13. Decision Making in the Digital World Seeking Intelligence, Not Content - Real time 60% of purchase decisions being made before the consumer stepped into the store!!! 13 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 14. Many clients are asking about how to: Set a solid Digital Customer Experience MDM craft mobile policies how to develop manage the devices mobile custom apps? Secure their select mobile devices mobile content 14 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 15. Answers are right here Who is IT or Business? Digital Customer Experience IT higher involvement Owner in enterprise how to develop mobile custom apps? Native or Hybrid Apps select mobile devices People wants: Enterprises wants: 15 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 16. What Do People Want ? 16 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 17. Three OSs, Three Ecosystems? Source: IDC 17 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 18. Internet vs. Mobile Data Traffic Global Internet Traffic Growth (Fixed) 300% 200% 100% 0% 1997 1998 1999 2000 2001 2002 Global Mobile Data Traffic Growth 200% 150% 100% 50% 0% 2009 2010 2011 2012 2013 2014 (estimate) Source: Cisco VNI 2012 18 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 19. Mobile Statistics – The number of active mobile broadband subscriptions worldwide in 2011. –The estimated number of mobile subscriptions worldwide in 2011. –Percentage of handsets shipped globally in 2011 that included a web browser. – Apple iPad’s share of global tablet web traffic in December. Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ 19 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 20. Different Devices, Different Purpose Work Creation Change Flow Consumption Experience 20 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 21. List of Tablet Use Cases How do you useplan to use your tablet? (Please select all that apply) Surfing the web Writing or reading mail Watching video listening to music social media sites Gaming 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Source: Yankee Group 21 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 22. Bring Your Own Device Tablets occupy a middle ground where consumption and creation • Easier and more supportable of data has a wide range. • More flexible device capability BYOD needs to be a Virtualization consideration once interest enters this zone. BYOD Full Data Consumption and Creation Continuum Light BYOC There are two potential paths that can be followed at this point. Integration • Full network - Light data consumption • Harder to support (e.g. local - Heavy data consumption - Minimal data creation rather than centralized apps) - Local data creation • Limited by device capabilities Final steps: - Full BYOD policy created by Past this line, infrastructure, all business groups. security, and operations - TCO calculation in pillars must be considered in conjunction with Finance. order to support advanced data creation. Source: Info-Tech Research Group 22 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 23. BYOD Recommendations 1 Measure success against overall objectives of a multi-device strategy. Having a multi-device IT service access strategy should contribute to lowering costs while increasing service regardless of who owns the devices. Given that, how does BYOD further those objectives? 2 Consider impact on overall objectives when deciding between passive or aggressive approach. Bring Your Own policies can range from passive (we allow connection from personally-owned devices) to aggressive (we encourage and even subsidize bring your devices). 3 Communicate policy requirements and roles and responsibilities for system support. Failure to meet success measures can be a result of communication failures as much as a failure of technical and operational capability. 4 Maintain company-owned device options for flexibility and end-user service. Info-Tech sees that even in the case of an aggressive BYODprogram, allowing use of a company-owned device can mitigate a number of the potential pitfalls of BYOD. 5 Document your policy position and rationale for the business. In dealing with your internal business customers’ demand for service, there is only one question (with two corollaries) that matters. Can you deliver this service? If yes, how? If no, why? Source: Info-Tech Research Group 23 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 24. The Evolution of Trade Credit Lydian coins Mobile Barter Payment 24 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 25. Mobile Payment That’s like almost Every Cow on the planet getting a smartphone 25 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 26. 4 Types of Mobile Payment • The Mobile Wallet -Paying for things at a store with a mobile device using NFC or "tap and go“. • Every Smartphone is a cash register - Merchants using a mobile device to process credit cards payments. • The “Everything Else” mobile Payment -Consumers send money to merchants, or even each other (sometimes called p2p), using mobile devices (on-saleon-line). • ‘Put it on my bill’ -Consumers buying ringtones or games or digital content by putting the charges on their cellphone account. 26 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 27. What’s In a Mobile Wallet? Secure Element (SE), which holds: One or more payment, mass transit, Mobile Phone and/or offer applications RF Modem Each application emulates a particular “card” in the wallet SIM Chip Baseband Near Field Communications (NFC) Processor Secure Element chip • Payment Applications NFC Two-way communication with the Controller • Transit Application point of sale • Offer Application Compatible with existing contactless Proximity Antenna payment standards Three options for hosting the SE: On the SIM chip (shown here) Elsewhere in the handset Point of Sale On a MicroSD card Source: GSMA Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • 28. How Does It Work? – Encrypted credentials are supplied by the card issuing bank to a TSM Card Issuing – The TSM distributes the Bank Trusted credentials to the phone via Payment Service Network Manager the MNO (TSM) – Phones use NFC to present the credentials at the POS Mobile – Transaction proceeds as a Acquiring Bank Network Operator regular card payment (MNO) Point of Mobile Sale Phone Source: IDC Financial Insights 28 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 29. Okay, So What’s the Catch? Lots of unresolved questions: – Who controls the secure element? – How much does it cost to rent space in the wallet? – Who gets to provide the offer application(s)? – What if the merchant doesn’t support contactless cards? 29 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 30. The Digital Customer Expectation People’s opinions matter more than providers opinions Economy and more than in the past Brand Butlers Personalization & attitudes to privacy, ownership, piracy, color & language. Shift from transaction to interaction AlwaysOn Working Practices & Attitudes: Blurring of work and leisure, conflict between new and old attitudes GameOn Many-to-Many Communication -turning the mundane into “fun” Intelligent Knowledge for many regions, languages, currencies & Infosystems attitudes visualized in different ways Dynamic Pricing Money, but no time –45 seconds/4 clicks is too long to wait. 30 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 31. What Are The Expectations From a Mobilized World? 31 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 32. Devices that end users prefer (new ?) Ultrabooks (NetNotebooks) will reach just over 15% of total consumer notebooks (IDC) 1. Mainstream price must be very attractive 2. Lower cost conventional notebooks slowing ultrabook adoption http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011 32 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 33. Apple is Gaining Market Share in the Enterprise Source: Forrester 33 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 34. 1/5 Of Global Info Workers Use Apple Products For Work http://blogs.forrester.com/frank_gillett 34 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 35. “The endpoint not taken” 35 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 36. Israeli Smartphone Market-share in 2011 Motorola Alcatel HTC RIM 5% 4% 1% 5% Samsung Sony Ericsson 27% 7% LG 8% Nokia Apple 20% 23% Source: IDC 36 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 37. Israeli Smartphone Market-share in 2011 Operating System Market Share Android 39.39% iOS 36.62% BlackBerry OS 9.48% Symbian 9.00% Other 5.52% Source: IDC 37 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 38. Israel (expected end 2012): Wintel: Q42011 compared to Q42010 Desktop PCs: -25% Notebooks: -35% 38 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 39. What is the Current Endpoint-Devices Mix within your enterprise? under IT responsibility 1% 8% more endpoints Tablets 7% Smartphones 13% Laptops Desktops 77% Source: STKI Feb. 2012 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • 40. What will be the Mix 12 Months from now? 6% Tablets 1.6% Notebooks Netbooks 20.5% Laptops Desktops 75% Source: STKI Sep. 2011 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • 41. Endpoint Contemplations 1. DesktopsNotebooks are losing market share 2. Desktops = price sensitive 3. LaptopsTablets are gaining power 4. A tablet (still) can’t replace a laptop 5. “By 2015…?” No one really knows what’s going to happen… 41 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 42. Market Data http://xkcd.com/688/ 42 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 43. Israeli Endpoint Statistics 1.08 • Number of endpoints per 1 employee 24 • Number of endpoints per 1 IT staff 564 • Number of endpoints per 1 service desk staff 748 • Number of endpoints per 1 PC staff (field technicians) 3231 • Number of endpoints per 1 PC staff (image) 43 Source: STKI Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 44. Endpoint-Devices Mix (Abroad) Source: InformationWeek 44 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 45. Who Will Be Using Tablets? (Israel) 3% Some of theall Employees 15% Mid-level directors 21% Pilot in one of the units 41% Specific functions (e.g. salesmarketing) 44% CXOs Source: STKI, Sep. 2011 45 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 46. Who Will Be Using Tablets? (Abroad) Source: Corporate Executive Board 46 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 47. End-Point Operating Costs Source: InformationWeek 47 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 48. End User Device Replacement Cycle Source: InformationWeek 48 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 49. Desktop PCs- Israeli Market Positioning 1Q12 HP Lenovo Local Support Dell Player Ivory Worldwide Leader Acer Apple Market Presence 49 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 50. Laptops- Israeli Market Positioning 1Q12 Lenovo Local Support Player Acer HP ASUS Dell Worldwide LG Leader Samsung Toshiba Fujitsu Apple Market Presence 50 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 51. Tablets- Israeli Market Positioning 1Q12 Local Support Player Worldwide Leader Others… Apple Samsung Market Presence 51 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 52. Thank You! Scan Me to Your Contacts… 52 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic