33
HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD? Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach Emiliano Del Fiume, Business Development Manager, Unisys [email protected] Trento, 12 dec 2012

Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach

  • Upload
    lester

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

HOW DO DEVELOPERS TAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD?. Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approach. Emiliano Del Fiume, Business Development Manager, Unisys [email protected] Trento, 12 dec 2012. Who is Unisys?. - PowerPoint PPT Presentation

Citation preview

Page 1: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

HOW DO DEVELOPERSTAKE CONTROL OF THEIR DESTINY IN A CROSS-PLATFORM WORLD?

Mobile Computing: a disruptive spreading trend Session 1: context, dynamic, approachEmiliano Del Fiume, Business Development Manager, [email protected]

Trento, 12 dec 2012

Page 2: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 2

Who is Unisys?

Stati Uniti: 44%

Resto America: 12%

Europa/Africa: 31%

Asia/Pacific: 13%

IT & BP Consulting System Integration Infrastructure Applications & Solutions Server technology Outsourcing

Page 3: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Agenda Session 1 Consumerization of IT What we do in mobility Organizations’ Point of View Let’s not reinvent the wheel… A practical way to approach the topic

Session 2 A new model to develop SW Native Apps vs Web Apps Developers’ tough choices Let’s put all togheter Recap

Page 4: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

The expectation today is that work comes to us instead of

us going to work

Page 5: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 5

Consumerization of ITThe Actors

PeopleEmployees, Clients, Citizens

OrganizationsBusinesses & Public Administrations

ClientsEmployees, Customers, Citizens

TechiesDevelopers, Sys Engineers, etc.

Page 6: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 6

Gartners says… 1.2 Billion Smartphones & Tablets to be bought worldwide in 2013 821 Million this year: 70% of total device salesPredictions Tablet purchases by businesses will grow 3x by 2016 By 2016 many businesses will chose Windows 8 mobile devices rather than

upgrading Windows on desktop PCs

Tablets sales: 2011: 60M 2012: 119M (+198%) 2013: Gartner 183M, IDC 172M (150%) 2016: Gartner 369M, IDC 283M (184%)

Source: Gartner, may 2012 + IDC, march/december 2012

Consumerization of ITSome numbers to start our discussion…

Page 7: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 7

One fifth of the European workforce is both highly mobile and highly empowered by personal technology

Use 3 or more devices for work

Use 2 devices for work

Use 1 device for work

41%

28%

29%

High use of personal technology for work

Low use of personal technology for work

No use of personal tech-nology for work

24%

33%

42%

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

+

Consumerization of ITThe Social-Technology dynamics

The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).

Page 8: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 8

One fifth of the European workforce is both highly mobile and highly empowered by personal technology

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

Consumerization of ITThe Social-Technology dynamics

More likely to work from multiple locations More likely to communicate directly with customers in a given week More likely to invest in a tool, device or technology because it helps

accomplish their work More likely to troubleshoot device problems on their own 3.5 times more likely to download unauthorized software and

applications to solve a business need

The Mobile Elite workforce is 21% of information workers in Europe (23% at worldwide).

Page 9: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 9

Mobile Elite workers are self-starters and a force of innovation and change. They see greater productivity and service benefits in BYO

devices and apps and they influence boss and org!

“Which of the following activities, if any, have you done in the past year in your job?”

Used my personal computer or personal smartphone to help me do my job

Convinced my company to buy something new to help me do my job

Convinced my boss or the company to significanatly change the way we do something at work

Bought something or paid for something with my own money to help me do my job

41%

24%

26%

21%

75%

40%

35%

51%

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

Mobile Elite

Average iWorker

Consumerization of ITThe Social-Technology dynamics

Page 10: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 10

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

Employees embrace the BYO App opportunity despite strong objection from IT. Mobile Elites are again the lead-adapters of this new phenomenon

Consumerization of ITThe Social-Technology dynamics

Mobile Elite: rebels, unmanageable, anarchists?Maybe simply pragmatic!

Page 11: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 11

Consumerization of ITThe Social-Demographic dynamics

The steady growth of Millennials (Gen Y) in the workforceBy 2020, 45% of workforce will be Millennials

…And Gen Z is already here and growing…

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

Page 12: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Peculiar behaviour: “device convergence”

Page 13: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

What we do in mobility

Page 14: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 14

Key

drivers

Legacy

What we do in mobilityLegacy vs New uses

Voice

E-mail

Web browsing

Texts (SMS)

Instant Messaging

Social Computing (FB, Twitter, LinkedIn…)

Maps (Google Maps, Microsoft Earth, Apple?)

Gaming

Biz Apps (i.e.: expenses approvals)

Users’ point of view

Page 15: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 15

FightArea

Areas to dobusiness

What we do in mobilityLegacy vs New uses

Voice

E-mail

Web browsing

Texts (SMS)

Instant Messaging

Social Computing (FB, Twitter, LinkedIn…)

Maps (Google Maps, Microsoft Earth, Apple?)

Gaming

Biz Apps (i.e.: expenses approvals)

Business point of view

Page 16: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 16

Percent Change in Internet Audience Aged 15+ Accessing Maps Sites and Smartphone Audience Aged 13+ Accessing Maps via their Device

March 2012 vs March 2011EU5 (France, Germany, Italy, Spain and UK

% Growth Year-over-YearAccessed Maps Sites via Computer Accessed Maps via Smartphone

EU5 8% 55% Germany 10% 89% Spain 3% 76% United Kingdom 4% 47% France 6% 38% Italy 22% 35%

Source: comScore (www.comscore.com), 2012

What we do in mobilityUsers love maps!

It’s not a coincidence Apple want to replace Google Maps with Apple’s maps Market for legacy navigators is declining: new cheap devices are coming

leveraging free services (like Google Maps) Industry is integrating “maps” in other contexts (i.e.: new Wii)

Page 17: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 17

What we do in mobilityWhat we use (unconsciously) and what we want…

Mobileboosts Cloud

Cloudsupports

Mobile

Mobile & Socialboost and support each other

Page 18: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 18

Organizations’ Point of View…

…CIOs are not completely happy

Page 19: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 19

How to bringdata and appli-cations to the

end user?

How to managedifferent mobile

devices?

How to secure

my company’s data?

Organizations’ Point of ViewThree main questions from CIOs

What aboutcosts

for all this?

Page 20: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 20

IT believes that employees will contact IT for support with personal devices – employees don’t agree

If employees encounter a problem with a personal device they use for business purposes, what is usually the first course of action they take?

Other

Post issues on a user forum or social site

Contact primary technology provider

Ask a friend or colleague

Troubleshoot themselves

Contact company IT department

6%

1%

6%

15%

53%

20%

1%

1%

7%

9%

19%

56%

What IT saysWhat employees say*

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

Organizations’ Point of ViewCIOs are not happy, they should be.

Page 21: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 21

Improving mobile security is a top priority for EU firms, current security approaches are not adequate

None of these

Secure authentication of mobile users using voice biometrics ((via mobile device microphone)

Secure authentication of mobile users using face biometrics (via mobile device camera)

Secure authentication of mobile users using an attached device (eg USB token, SD card, sleeve)

Secure authentication of mobile users using password

17%

5%

7%

21%

71%

Which, if any, of the following security technologies have you deployed or will you deploy in the next 12 months?

What are your firm’s top mobile priorities during the next 12 months?

Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys, June 2012

Organizations’ Point of ViewConcerns regarding security.

Provide more mobile support for employees

Implement a comprehensive mobile strategy

Implement or improve mobile security

7%

12%

20%

36%

34%

44%

Critical priority High priority

Page 22: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Smartphones can combine multiple authentication techniques like: Something you have (the device) Something you know (a PIN/passphrase) Something you are (biometrics – face, voice) And where you are (GPS); to attain the greatest authentication fidelity

Mobile is not only something to secure: it helps to improve security…

Page 23: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Mobile is not only something to secure: it helps to improve security…

Page 24: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Let’s not reinvent the wheel…There are things we already know.

Page 25: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 25

Let’s not reinvent the wheelFirst thought in your CIO’s mind is…

Mobile Device Management As soon as we start talking about mobile computing, CTOs raise their hands to

ask how to manage the devices. They’re right.

Mobile Device Management is an hot topic mainly for security reasons You can set up an on-premise MDM solutions or buy a service…

Organizations with 1.000 employees or less will go directly to XaaS

MDM will become a commodity solution in few years

If we deal only with clients’ devices (customers and/or citizens) the “Store” is just enough to distribute the app: device mngt & security are not our problems!

SAP Afaria(former Sybase)

Page 26: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 26

Mobile computing should add more value to users Productivity (doing more) Mobility (doing elsewhere) Innovation (doing other things) Green IT (doing saving and preserving Earth) New user experience (doing differently)

Let’s not reinvent the wheelIt’s a matter of User Empowerment

It’s too simplistic thinking at “mobile computing” for Accessing to existing applications through mobile devices Doing a Web version of an application Accessing to Internet while not being at a desktop

Page 27: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 27

Let’s not reinvent the wheelIt is Not Just About the Device

Device selection comes at the bottom not at the top of the list Approaching mobile computing is not a matter of selecting a “new PC”

Tip: freeze any initiative related to procurement,first free up your mind to understand what

you want to do with mobile…

Page 28: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 28

Physical Device Security

• Establish IT Policies for mobile devices usage

• Know built-in security features for devices

• Manage and enforce polices for mobile devices

• Remote wipe

• Recovery of lost device (beacon feature)

• Hardware encryption

• SIM protection

1

End User Security

• User credentials

• Authoritatively confirm user

• Protect IT Services from unauthorized access

• Start with minimum rights

• Automate policy

• Prevent user modification

• Educate user on security threats

• SMS, Phishing, Passcodes

• Provide training

• Monitor behavior

2

Application Security

• Control applications to device

• Custom iPhone App Store

• Trusted Applications

• Prevent “jailbroken” phones

• Secure Platform

• Signed applications and provision profiles

• Sandboxed applications

• Keychain services

• Certificates, Keys, encryptions

• Code vulnerability scanning

3

Information Security

• Protect data at rest (phone & backup)

• Certified FIPS 140-2 encryption

• Prove encryptions (always on)

• Server certificates

• Encrypt data in motion (SSL, VPN, etc.)

• Know built-in security features for devices, and limitations

• Remote wipe

• Purge redeployed devices

• Secure access to device

• Keep sensitive data on the datacenter

4

Organizations’ Point of ViewSecurity? Solutions are here!

Page 29: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Let’s not reinventthe wheel…

How to exploit themobile pontetial

Page 30: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 30

Categorization of initiatives

WF de aprobaciones móvil

Inspecciones “on site” y reporte

Cobro vía móvil

Tramitación expedientes

Cuadro Mandos

Gestión de citaciones

Canal de comunicación

Callejeros

Guia de eventos / venta de entradas

Mossos en el móvil

Entradas “on line”

Mejora Eficiencia

Acercar al ciudadano

Interior

Transporte

Cross

Sanidad

Servicios

INTRODUCTION

• Consumerization of IT• Context & dynamics

Client presents situation

and its strategic vision

Presentation of Mobility Initiatives Public and private sphere

Conclusions and next steps

OBJECTIVES SCOPE

Plan de Trabajo

Mobility initiatives identification

OBJETOS DE SERVICIOSElementos priorización

Qué esperan los ciudadanos

Oportunidades de innovaciónIniciativas en marcha

ObjetivosGeneralitat

Definir criterios depriorización

Priorización de iniciativas

Mapa de iniciativas

Plan Estratégico de Movilidad

Mobility Presentations

• Mobile applications development

• Security and management in mobile devices

• Identification and certificate

Cuadros de MandoMóvilMed Agenda Móvil

Gestiónde Almacenes

Mantenimientode Plantas

AutoServicio del Empleado

Medios dePago

Carro de Compras

How to exploit the mobile potentialHow we suggest to approach the topic

Roadmap

Page 31: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 31

KEYACTIVITIES

D I S C O V E R

ENGAGEMENT PHASES

P L A N

A N A LY Z E

S T R AT E G I Z E

• Team Kick-Off• Group Focus Group• Identify Business Goals,

Objectives, Constraints and Challenges

• Identify Existing Business Capabilities

• Identify Desired Business Capabilities and Opportunities

• Develop As-Is Business and Technology Models

• Develop Technical Assessment of the Current State

• Determine Key Success Factors

• Identify and Prioritize Opportunities (Innovation Workshop)

• Collaboratively Develop recommended plan of action

• Develop an implementation Roadmap

• Present Final Report

KEYDELIVERABLES

Populated Mobility Information Models

Top 3-5 opportunities (one-pg)

High Level Implementation RoadmapFinal Assessment Report

Current State Assessment Briefing

Innovation Workshop Outbrief

Future State and the Gap Analysis Briefing

How to exploit the mobile potentialHow we suggest to approach the topic

Page 32: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

© 2012 Unisys Corporation. All rights reserved. 32

Drivers: Tremendous growth of smartphones / tablets Consumerization trend Increased improvements in apps, browsers, and search Growth of location based apps Wireless networks are getting faster and more reliable. Mobile workers are demanding access for productivity Today’s generation Y lives mobile / wireless life

Challenges: Integrating mobile into business processes and existing apps Multiple devices / platforms Security issues

Implications: As mobile technologies mature, they will bring new applications to more places and devices New user interface design approaches required Mobile solutions can enable new business models Business processes and applications have to be re-engineered for mobile The mobile trend drives the consumerization of IT (and vice versa) Expect increased interest in technologies that can boost the productivity of a remote workforce

Session recap

Page 33: Mobile Computing: a disruptive spreading trend  Session 1: context, dynamic, approach

Thank you Q & A

Docs & slides for you:http://emiliano.delfiume.it/TR