Dominic Wordsworth Product Manager Considerations along.

Slides:



Advertisements
Similar presentations
Lessons in developing a mobile application for a Thai university Antony Harfield Department of Computer Science and IT, Faculty of Science, Naresuan University.
Advertisements

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended.
System Center Reporting Through the BI Stack
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Horizon Suite Demos: Quick Start The Platform for Workforce Mobility Single workspace for accessing data, apps & desktops on any device Access EUC Demo.
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
1:1 Mobile Device Plan June 12, Table of Contents Introduction2Introduction2 Recommendation Overview3Recommendation Overview3 Back End Infrastructure4Back.
DELIVERING SHAREPOINT AS A SERVICE
The Changing Communications Security Landscape Prem Iyer | VP of North America Channel Programs | 07/11/12.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Mobile Protection Overview
FIM MOBILE PRESENTATION
Martin Bacon – Managing Director.
Marion County Public Schools Scott A. Hansen – Director, Technology & Information Systems June 13, 2012 ~ An Equal Opportunity School District ~
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
 Technology can automate almost any process that a human can perform but at what cost?  What, How, Why, Who  Use Case Diagrams - a representation of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Cisco VOIP & Unified Communications ICTF 2008.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
The ArcGIS Platform Cloud and Web Service based GIS Patrick Gahagan – Esri January 25 th, 2012 United Nations.
Troy Davis Yorktown High School.  Who? Teachers  What? Having and Maintaining a Digital Toolbox  When? Today  Where? Everywhere  Why? Meet the.
1 © 2011 XIRRUS :: All Rights Reserved BRING YOUR OWN DEVICE (BYOD) DOESN’T HAVE TO MEAN UNCONTROLLED NOVEMBER 2011 Perry Correll Xirrus, Principal Technologist.
Keynote Address Jeff Torczon, CEO. Welcome  Welcome to the first annual Infinity Software User Conference  Thank you to our attendees and organizers.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Confidential The Power to Connect. Business presentations in boardrooms, conference rooms and outside the office are always in high demand. With CircleHub,
B Y O D RING WN EVICE OUR FGCU!. What is BYOD FGCU ? FGCU faculty… you can now Bring Your Own Device [ Microsoft Surface, Apple iPad, iPhone and Android.
Migrating myUWindsor to Liferay Sanjay Chitte Shawn DenHartogh.
Innovations at DSTC. What is the Rosalind Franklin Room? Rooms formerly know as syn 1 and syn 2 re-designed and re- equipped 19 I-pads.
Thank you #SPSTC sponsors! Who Am I? Haystax Technology.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Anthony Bettini Founder & CEO Appthority – The Authority in App Security.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Creating Value From Conflict – The IT Challenge Carrier Logistics User Group Denis Goulet Vice President, Information Technology Progress Software Corporation.
VCS to UCM Migration Program. Cisco Confidential 2 © Cisco and/or its affiliates. All rights reserved. Customers with VCS and UCM Customers.
Serious about Success ® Communicating Employee Share Plans Workshop – EOG Conference Charlie Viola, Partner Moore Stephens Sydney.
Persuasive Speech on Android OS vs. IOS
Air Stat. Air Stat Overview Mobility is clearly one of the hottest Topic An ecosystem of sopisticated related technologies is already established: – Cloud,
Real World App Development using Telerik ScreenBuilder and Progress Data Source – advanced Brian C. Preece Ypsilon Software Ltd
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California ArcGIS for Land Records:
Created by Presented by James Schultz Titanium. What is Titanium? An open, extensible development environment for creating beautiful native apps across.
Working with EDiscovery and Records Management in SharePoint Steve Name of speaker (optional)
11/8/2012Proprietary & Confidential1. Enhancing the learning environment to… Increase student & teacher competencies in technology Support the integration.
SharePoint Saturday Chicago Suburbs 2 Speaker Feedback: SPSCSM.COM.
OFFICE OF INFORMATION AND TECHNOLOGY SERVICE DELIVERY AND ENGINEERING Briefing to Industry DEPARTMENT OF VETERANS AFFAIRS Charles De Sanno TAC APBI, Eatontown,
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 1 Selling Avaya Scopia XT5000 with IP Office.
Who Am I? Haystax Technology Contact Info Todays Agenda.
GAIT2010 Project Update September 22, Georgia Technology Authority 2 Agenda OIT Agency Lead Transition Status Update Due Diligence HR Update Next.
Total Enterprise Mobility Comprehensive Management and Security
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
CudaLaunch for Barracuda NG Firewall.
Office Add-ins Intro and Development
Mobile Device Management options in Office 365 and beyond
Cisco ISE 1.2 Mobile Device Management Integration
Azure Stack Foundation
The power of common identity across any cloud
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Panel session: East Africa Procurement Forum
CDIO Initiative Annual Conference and Collaborators’ Meeting
Factsheet: Renewable Energy Targets
MobileConnect Assistive Listening over WiFi
Resource Directors Group Introduction
Town Hall Draft Update Strategic Planning Town Hall Draft Update
Fire Service Maps and Apps for Local Government
Presentation transcript:

Dominic Wordsworth Product Manager Considerations along the BYOD adoption curve

Agenda ▌ Intro – why is 2012 the year for BYOD ▌ Considerations - Does it make sense? - Platform - Applications - HR / Legal / Tax ▌ Demo ▌ Considerations continued... - Use-ability / Collaboration - Security ▌ Final thoughts ▌ Q&A

BYOD - Why now? Everything is aligning ▌ What is it? - BYOD / CYOD / Provisioned ▌ Apple, Android devices are everywhere ▌ Budget cuts taking hold ▌ Technology can deliver COMPUTERLINKS BYOD approach – ‘Securely deliver legacy and line of business apps over an IOS enhanced network to a secured endpoint device’ ▌ BYOD is in production today…

Considerations

Considerations

Considerations

Considerations

Demo Demo:

Considerations

Considerations

COMPUTERLINKS BYOD STACK Deliver any App to any device Optimised wireless infrastructure Infrastructure to securely deliver legacy and line of business applications to any device (clientless), over an IOS enhanced network, to an endpoint that is managed and secured. Applications Private Document Collaboration Secured Endpoint Device

Final Thoughts ▌ Is 2012 the year for BYOD for you? ▌ Is anyone truly harnessing the power of BYOD? ▌ Does it make financial sense? ▌ Where are you on the adoption curve? - Session re-run as Webex – Thurs 21 st June 4pm - BYOD adoption curve conference call - ▌ Q&A

Thank you