Presentation is loading. Please wait.

Presentation is loading. Please wait.

HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic,

Similar presentations


Presentation on theme: "HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic,"— Presentation transcript:

1 HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach Emiliano Del Fiume, Business Development Manager, Unisys Trento, 12 dec 2012

2 © 2012 Unisys Corporation. All rights reserved. 2 Who is Unisys? Servizi 82% Servizi 82% Tecnologia 18 % Services & Solutions 86% Technology 14% Stati Uniti: 44% Resto America: 12% Europa/Africa: 31% Asia/Pacific: 13%  IT & BP Consulting  System Integration  Infrastructure  Applications & Solutions  Server technology  Outsourcing

3 Agenda Session 1  Consumerization of IT  What we do in mobility  Organizations’ Point of View  Let’s not reinvent the wheel…  A practical way to approach the topic Session 2  A new model to develop SW  Native Apps vs Web Apps  Developers’ tough choices  Let’s put all togheter  Recap

4 The expectation today is that work comes to us instead of us going to work

5 © 2012 Unisys Corporation. All rights reserved. 5 Consumerization of IT The Actors People Employees, Clients, Citizens Organizations Businesses & Public Administrations Clients Employees, Customers, Citizens Techies Developers, Sys Engineers, etc.

6 © 2012 Unisys Corporation. All rights reserved. 6 Gartners says…  1.2 Billion Smartphones & Tablets to be bought worldwide in 2013  821 Million this year: 70% of total device sales Predictions  Tablet purchases by businesses will grow 3x by 2016  By 2016 many businesses will chose Windows 8 mobile devices rather than upgrading Windows on desktop PCs Tablets sales:  2011: 60M  2012: 119M (+198%)  2013: Gartner 183M, IDC 172M (150%)  2016: Gartner 369M, IDC 283M (184%) Source: Gartner, may IDC, march/december 2012 Consumerization of IT Some numbers to start our discussion…

7 © 2012 Unisys Corporation. All rights reserved. 7 One fifth of the European workforce is both highly mobile and highly empowered by personal technology Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June Consumerization of IT The Social-Technology dynamics The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).

8 © 2012 Unisys Corporation. All rights reserved. 8 One fifth of the European workforce is both highly mobile and highly empowered by personal technology Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012 Consumerization of IT The Social-Technology dynamics  More likely to work from multiple locations  More likely to communicate directly with customers in a given week  More likely to invest in a tool, device or technology because it helps accomplish their work  More likely to troubleshoot device problems on their own  3.5 times more likely to download unauthorized software and applications to solve a business need  More likely to work from multiple locations  More likely to communicate directly with customers in a given week  More likely to invest in a tool, device or technology because it helps accomplish their work  More likely to troubleshoot device problems on their own  3.5 times more likely to download unauthorized software and applications to solve a business need The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).

9 © 2012 Unisys Corporation. All rights reserved. 9 Mobile Elite workers are self-starters and a force of innovation and change. They see greater productivity and service benefits in BYO devices and apps and they influence boss and org! “Which of the following activities, if any, have you done in the past year in your job?” Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012 Mobile Elite Average iWorker Consumerization of IT The Social-Technology dynamics

10 © 2012 Unisys Corporation. All rights reserved. 10 Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012 Employees embrace the BYO App opportunity despite strong objection from IT. Mobile Elites are again the lead-adapters of this new phenomenon Consumerization of IT The Social-Technology dynamics Mobile Elite: rebels, unmanageable, anarchists? Maybe simply pragmatic!

11 © 2012 Unisys Corporation. All rights reserved. 11 Consumerization of IT The Social-Demographic dynamics The steady growth of Millennials (Gen Y) in the workforce By 2020, 45% of workforce will be Millennials …And Gen Z is already here and growing… Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

12 Peculiar behaviour: “device convergence”

13 What we do in mobility

14 © 2012 Unisys Corporation. All rights reserved. 14 Key drivers Legacy What we do in mobility Legacy vs New uses Voice Web browsing Texts (SMS) Instant Messaging Social Computing (FB, Twitter, LinkedIn…) Maps (Google Maps, Microsoft Earth, Apple?) Gaming Biz Apps (i.e.: expenses approvals) Users’ point of view

15 © 2012 Unisys Corporation. All rights reserved. 15 Fight Area Areas to do business What we do in mobility Legacy vs New uses Voice Web browsing Texts (SMS) Instant Messaging Social Computing (FB, Twitter, LinkedIn…) Maps (Google Maps, Microsoft Earth, Apple?) Gaming Biz Apps (i.e.: expenses approvals) Business point of view

16 © 2012 Unisys Corporation. All rights reserved. 16 Percent Change in Internet Audience Aged 15+ Accessing Maps Sites and Smartphone Audience Aged 13+ Accessing Maps via their Device March 2012 vs March 2011 EU5 (France, Germany, Italy, Spain and UK % Growth Year-over-Year Accessed Maps Sites via ComputerAccessed Maps via Smartphone EU58%55% Germany10%89% Spain3%76% United Kingdom4%47% France6%38% Italy22%35% Source: comScore (www.comscore.com), 2012 What we do in mobility Users love maps!  It’s not a coincidence Apple want to replace Google Maps with Apple’s maps  Market for legacy navigators is declining: new cheap devices are coming leveraging free services (like Google Maps)  Industry is integrating “maps” in other contexts (i.e.: new Wii)

17 © 2012 Unisys Corporation. All rights reserved. 17 What we do in mobility What we use (unconsciously) and what we want… Mobile boosts Cloud Cloud supports Mobile Mobile & Social boost and support each other

18 © 2012 Unisys Corporation. All rights reserved. 18 Organizations’ Point of View… …CIOs are not completely happy

19 © 2012 Unisys Corporation. All rights reserved. 19 How to bring data and appli- cations to the end user? How to manage different mobile devices? How to secure my company’s data? Organizations’ Point of View Three main questions from CIOs What about costs for all this?

20 © 2012 Unisys Corporation. All rights reserved. 20 IT believes that employees will contact IT for support with personal devices – employees don’t agree If employees encounter a problem with a personal device they use for business purposes, what is usually the first course of action they take? Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012 Organizations’ Point of View CIOs are not happy, they should be.

21 © 2012 Unisys Corporation. All rights reserved. 21 Improving mobile security is a top priority for EU firms, current security approaches are not adequate 21 Which, if any, of the following security technologies have you deployed or will you deploy in the next 12 months? What are your firm’s top mobile priorities during the next 12 months? Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012 Organizations’ Point of View Concerns regarding security.

22 Smartphones can combine multiple authentication techniques like:  Something you have (the device)  Something you know (a PIN/passphrase)  Something you are (biometrics – face, voice)  And where you are (GPS); to attain the greatest authentication fidelity Mobile is not only something to secure: it helps to improve security…

23

24 Let’s not reinvent the wheel… There are things we already know.

25 © 2012 Unisys Corporation. All rights reserved. 25 Let’s not reinvent the wheel First thought in your CIO’s mind is… Mobile Device Management  As soon as we start talking about mobile computing, CTOs raise their hands to ask how to manage the devices. They’re right.  Mobile Device Management is an hot topic mainly for security reasons  You can set up an on-premise MDM solutions or buy a service…  Organizations with employees or less will go directly to XaaS  MDM will become a commodity solution in few years  If we deal only with clients’ devices (customers and/or citizens) the “Store” is just enough to distribute the app: device mngt & security are not our problems! SAP Afaria (former Sybase)

26 © 2012 Unisys Corporation. All rights reserved. 26 Mobile computing should add more value to users Productivity (doing more) Mobility (doing elsewhere) Innovation (doing other things) Green IT (doing saving and preserving Earth) New user experience (doing differently) Let’s not reinvent the wheel It’s a matter of User Empowerment It’s too simplistic thinking at “mobile computing” for  Accessing to existing applications through mobile devices  Doing a Web version of an application  Accessing to Internet while not being at a desktop

27 © 2012 Unisys Corporation. All rights reserved. 27 Let’s not reinvent the wheel It is Not Just About the Device  Device selection comes at the bottom not at the top of the list  Approaching mobile computing is not a matter of selecting a “new PC” Tip: freeze any initiative related to procurement, first free up your mind to understand what you want to do with mobile…

28 © 2012 Unisys Corporation. All rights reserved. 28 Physical Device Security Establish IT Policies for mobile devices usage Know built-in security features for devices Manage and enforce polices for mobile devices Remote wipe Recovery of lost device (beacon feature) Hardware encryption SIM protection 1 End User Security User credentials Authoritatively confirm user Protect IT Services from unauthorized access Start with minimum rights Automate policy Prevent user modification Educate user on security threats SMS, Phishing, Passcodes Provide training Monitor behavior 2 Application Security Control applications to device Custom iPhone App Store Trusted Applications Prevent “jailbroken” phones Secure Platform Signed applications and provision profiles Sandboxed applications Keychain services Certificates, Keys, encryptions Code vulnerability scanning 3 Information Security Protect data at rest (phone & backup) Certified FIPS encryption Prove encryptions (always on) Server certificates Encrypt data in motion (SSL, VPN, etc.) Know built-in security features for devices, and limitations Remote wipe Purge redeployed devices Secure access to device Keep sensitive data on the datacenter 4 Organizations’ Point of View Security? Solutions are here!

29 Let’s not reinvent the wheel… How to exploit the mobile pontetial

30 © 2012 Unisys Corporation. All rights reserved. 30 Categorization of initiatives Categorization of initiatives INTRODUCTION Consumerization of IT Context & dynamics INTRODUCTION Consumerization of IT Context & dynamics Client presents situation and its strategic vision Client presents situation and its strategic vision Presentation of Mobility Initiatives Public and private sphere Presentation of Mobility Initiatives Public and private sphere Conclusions and next steps OBJECTIVESSCOPE Plan de Trabajo Mobility initiatives identification Mobility initiatives identification Mobility Presentations Mobile applications development Security and management in mobile devices Identification and certificate How to exploit the mobile potential How we suggest to approach the topic Roadmap

31 © 2012 Unisys Corporation. All rights reserved. 31 KEY ACTIVITIES DISCOVER ENGAGEMENT PHASES PLAN ANALYZE STRATEGIZE Team Kick-Off Group Focus Group Identify Business Goals, Objectives, Constraints and Challenges Identify Existing Business Capabilities Identify Desired Business Capabilities and Opportunities Develop As-Is Business and Technology Models Develop Technical Assessment of the Current State Determine Key Success Factors Identify and Prioritize Opportunities (Innovation Workshop) Collaboratively Develop recommended plan of action Develop an implementation Roadmap Present Final Report KEY DELIVERABLES Populated Mobility Information Models Top 3-5 opportunities (one-pg) High Level Implementation Roadmap Final Assessment Report Current State Assessment Briefing Innovation Workshop Outbrief Future State and the Gap Analysis Briefing How to exploit the mobile potential How we suggest to approach the topic

32 © 2012 Unisys Corporation. All rights reserved. 32 Drivers:  Tremendous growth of smartphones / tablets  Consumerization trend  Increased improvements in apps, browsers, and search  Growth of location based apps  Wireless networks are getting faster and more reliable.  Mobile workers are demanding access for productivity  Today’s generation Y lives mobile / wireless life Challenges:  Integrating mobile into business processes and existing apps  Multiple devices / platforms  Security issues Implications:  As mobile technologies mature, they will bring new applications to more places and devices  New user interface design approaches required  Mobile solutions can enable new business models  Business processes and applications have to be re-engineered for mobile  The mobile trend drives the consumerization of IT (and vice versa)  Expect increased interest in technologies that can boost the productivity of a remote workforce Session recap

33 Thank you Q & A Docs & slides for you:


Download ppt "HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic,"

Similar presentations


Ads by Google