SlideShare a Scribd company logo
1 of 16
The Smarter Social Enterprise
Are you Keeping UP?
Is this what it seems like . . . .
Long long time ago
IT Evolution
• 1.0
• Dictated by the IT Dept
• They were Experts/Specialists
• Static, utilitarian
• Fixed
• Computers were a ‘Black Art’
• They had total Control
• They Drove the Business
• What they ‘Allowed’ - went !
• . . . .we were in awe of them!
Long time ago
Business Drives IT
IT 2.0
• Responsive to the needs of
the business
• Flexible, agile
• Mobile
• Business drove IT
• IT begins to deliver Value
Today
The Age of Human IT y
• Users Drive IT
• Built around their lives
and preferences
• leveraging the power and
mobility of smart devices
and applications
• Adaptive to individual
user habits
• Intuitive; Real time
• Social
Our Vision
The Smarter
Social Enterprise
Smarter Social Enterprise
Device Choice - BYOD
Device Diversity
Mobility Habits
Day Shifting/Extending
Move to Cloud &
SAAS
Application
Preference - Self
Served
Smarter . . . .Users
Digital Immigrant
Digital Native . . . .
....they know more than
the average IT Guy!!!!
Smarter....devices
Smarter....applications
Smarter...Ways of Working
• Work is a thing they do, NOT a Place they go . .
• Time Shifting
• Day Extending
• Adapting Apps
• www.workliveplay.com
Interface, Input, Use
Smarter...Consumption
• ‘Smart Device’ users
consume more than
triple the data than
a mobile lap top
user
• Everything has to be
available...NOW!
Some specifics
• 2009 1 billion apps downloaded
• 2013 2 billion Apps/Week
• 26,000 apps submitted weekly to
App Store
• >10 billion Smart Devices 2015
• >24 billion By 2024
• Average Users Have >100 Apps
• . . . . . When the App is free, the
user is usually the product!!!!
Application availability
75,000
>2milion!
Smarter Devices
Smarter Attacks
• The smart mobile landscape is changing more
rapidly than many enterprises can manage
• Diverse app markets with millions of apps, billions
of app downloads
• “Bring Your Own Device” (BYOD)
– 80% of apps on employee devices do not
comply with enterprise security requirements
[1]
• Mobile Platforms are attractive target for malware
developers
– 50% of Android phones have unpatched
vulnerabilities [2]
– Number of mobile malware increased from
14,000 to 40,000 from July ’11 to May ’12 [3]
Sources:
[1] Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats, Aug 2012
[2] Duo Security, X-Ray tool report, Sep 2012
[3] Cybersecurity Policy Report, Sep 2012

More Related Content

What's hot

IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)Şafak Saylam
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12ayoungkin
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
Internet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsInternet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsGunjan Panara
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
Smartphone and internet of things (io t)
Smartphone and internet of things (io t)Smartphone and internet of things (io t)
Smartphone and internet of things (io t)iFixScreens
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things Simplified
Internet of Things SimplifiedInternet of Things Simplified
Internet of Things SimplifiedMayur Rawte
 
How to Win in the IoT World
How to Win in the IoT WorldHow to Win in the IoT World
How to Win in the IoT WorldYeongjae Kang
 

What's hot (20)

Internet of things PPT
Internet of things PPTInternet of things PPT
Internet of things PPT
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
What is IoT?
What is IoT?What is IoT?
What is IoT?
 
Internet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsInternet of Things(IoT) & Applications
Internet of Things(IoT) & Applications
 
Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Smartphone and internet of things (io t)
Smartphone and internet of things (io t)Smartphone and internet of things (io t)
Smartphone and internet of things (io t)
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things Simplified
Internet of Things SimplifiedInternet of Things Simplified
Internet of Things Simplified
 
How to Win in the IoT World
How to Win in the IoT WorldHow to Win in the IoT World
How to Win in the IoT World
 

Similar to Smarter social enterprise

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Larry Smith
 
Enterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesEnterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesAlgarytm
 
Enterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and OpportunitiesEnterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and OpportunitiesPropel Apps
 
Enterprise mobility challenges and opportunites
Enterprise mobility   challenges and opportunitesEnterprise mobility   challenges and opportunites
Enterprise mobility challenges and opportunitesAlgarytm
 
Consumerization & Predictive Analytics
Consumerization & Predictive AnalyticsConsumerization & Predictive Analytics
Consumerization & Predictive AnalyticsSoftware Park Thailand
 
1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptxAMITKUMARSINGH756828
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!Echelon Design
 
Nine rocketships firstcall
Nine rocketships firstcallNine rocketships firstcall
Nine rocketships firstcallTedd Fox
 
MD-I-CH-ppt.ppt
MD-I-CH-ppt.pptMD-I-CH-ppt.ppt
MD-I-CH-ppt.pptbharatt7
 

Similar to Smarter social enterprise (20)

Mobile Era & Mobility
Mobile Era & MobilityMobile Era & Mobility
Mobile Era & Mobility
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
How... Do you know?
How... Do you know?How... Do you know?
How... Do you know?
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...
 
Enterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesEnterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunites
 
Enterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and OpportunitiesEnterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and Opportunities
 
Enterprise mobility challenges and opportunites
Enterprise mobility   challenges and opportunitesEnterprise mobility   challenges and opportunites
Enterprise mobility challenges and opportunites
 
Consumerization & Predictive Analytics
Consumerization & Predictive AnalyticsConsumerization & Predictive Analytics
Consumerization & Predictive Analytics
 
1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!
 
Nine rocketships firstcall
Nine rocketships firstcallNine rocketships firstcall
Nine rocketships firstcall
 
MD-I-CH-ppt.ppt
MD-I-CH-ppt.pptMD-I-CH-ppt.ppt
MD-I-CH-ppt.ppt
 

More from Elsa Cariello

Exclusive Group is Recruiting!
Exclusive Group is Recruiting!Exclusive Group is Recruiting!
Exclusive Group is Recruiting!Elsa Cariello
 
Exclusive Group Love Campaign Infographic
Exclusive Group Love Campaign InfographicExclusive Group Love Campaign Infographic
Exclusive Group Love Campaign InfographicElsa Cariello
 
Exclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable BondExclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable BondElsa Cariello
 
Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership". Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership". Elsa Cariello
 
How to join the twitter chat with Druva
How to join the twitter chat with Druva How to join the twitter chat with Druva
How to join the twitter chat with Druva Elsa Cariello
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesElsa Cariello
 
How to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks GroupHow to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks GroupElsa Cariello
 
Carm presentation new logo may 14
Carm presentation  new logo may 14Carm presentation  new logo may 14
Carm presentation new logo may 14Elsa Cariello
 
Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place. Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place. Elsa Cariello
 

More from Elsa Cariello (9)

Exclusive Group is Recruiting!
Exclusive Group is Recruiting!Exclusive Group is Recruiting!
Exclusive Group is Recruiting!
 
Exclusive Group Love Campaign Infographic
Exclusive Group Love Campaign InfographicExclusive Group Love Campaign Infographic
Exclusive Group Love Campaign Infographic
 
Exclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable BondExclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable Bond
 
Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership". Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership".
 
How to join the twitter chat with Druva
How to join the twitter chat with Druva How to join the twitter chat with Druva
How to join the twitter chat with Druva
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
How to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks GroupHow to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks Group
 
Carm presentation new logo may 14
Carm presentation  new logo may 14Carm presentation  new logo may 14
Carm presentation new logo may 14
 
Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place. Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place.
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Smarter social enterprise

  • 1. The Smarter Social Enterprise
  • 2. Are you Keeping UP? Is this what it seems like . . . .
  • 3. Long long time ago IT Evolution • 1.0 • Dictated by the IT Dept • They were Experts/Specialists • Static, utilitarian • Fixed • Computers were a ‘Black Art’ • They had total Control • They Drove the Business • What they ‘Allowed’ - went ! • . . . .we were in awe of them!
  • 4. Long time ago Business Drives IT IT 2.0 • Responsive to the needs of the business • Flexible, agile • Mobile • Business drove IT • IT begins to deliver Value
  • 5. Today The Age of Human IT y • Users Drive IT • Built around their lives and preferences • leveraging the power and mobility of smart devices and applications • Adaptive to individual user habits • Intuitive; Real time • Social
  • 7. Smarter Social Enterprise Device Choice - BYOD Device Diversity Mobility Habits Day Shifting/Extending Move to Cloud & SAAS Application Preference - Self Served
  • 8. Smarter . . . .Users Digital Immigrant Digital Native . . . . ....they know more than the average IT Guy!!!!
  • 11. Smarter...Ways of Working • Work is a thing they do, NOT a Place they go . . • Time Shifting • Day Extending • Adapting Apps • www.workliveplay.com
  • 13. Smarter...Consumption • ‘Smart Device’ users consume more than triple the data than a mobile lap top user • Everything has to be available...NOW!
  • 14. Some specifics • 2009 1 billion apps downloaded • 2013 2 billion Apps/Week • 26,000 apps submitted weekly to App Store • >10 billion Smart Devices 2015 • >24 billion By 2024 • Average Users Have >100 Apps • . . . . . When the App is free, the user is usually the product!!!!
  • 16. Smarter Devices Smarter Attacks • The smart mobile landscape is changing more rapidly than many enterprises can manage • Diverse app markets with millions of apps, billions of app downloads • “Bring Your Own Device” (BYOD) – 80% of apps on employee devices do not comply with enterprise security requirements [1] • Mobile Platforms are attractive target for malware developers – 50% of Android phones have unpatched vulnerabilities [2] – Number of mobile malware increased from 14,000 to 40,000 from July ’11 to May ’12 [3] Sources: [1] Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats, Aug 2012 [2] Duo Security, X-Ray tool report, Sep 2012 [3] Cybersecurity Policy Report, Sep 2012