SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
BYOD:
Be Your Own Device?
“Opportunities multiply as they are seized.”
Sun Tzu
Alliander IT CIO Office
Michel de Goede
1. Introduction
2. Issues of a grid operator: Electric vehicles
• Roll out of thousands of electric vehicle charging stations
• Grid Capacity is insufficient
• What if we use cars as backup energy storage?
2. Issues of a grid operator: Two way traffic
Monetary flow
Information flow
Transmission
Trade/PRP/
Shipper
Distribution SupplyMeteringProduction
Physical flow
© Jeroen Scheer, Alliander, 2011
• Flows change
• Capacity increase
2. Issues of a grid operator: Smart metering and home automation
• Roll out of 5 Million Smart Meters (Gas + Electricity)
• Inform customer regarding energy consumption and create
awareness
• Respect privacy concerns
• Manage the potential data ocean
2. Issues of a grid operator: Smart city initiatives
• Combination of various techniques (Amsterdam)
• Self healing and self regulating micro grid (Bronsbergen)
2. Issues of a grid operator: Smart grid
• Accommodate higher peaks and two-way traffic through intelligence
• Accomodate energy transition scenario’s through intelligence
• Provide the necessary information to all parties involved
3. Innovation: sixth Schumpeter / Kondratiev wave of innovation
3. Innovation: The semantic wave?
3. Innovation: And then there is also.....
Source: Sogeti VINT
3. Innovation: Biohackables (implanted bio chip)
Source: Motherboard
3. Innovation: Biohackables (Dean Kamen’s Luke Arm)
Source: Wired
3. Innovation: Biohackables (exoskeleton)
3. Innovation: Biohackables (hearing colour)
Source PSFK
3. Innovation: Augmentables (Motorola wearable computer)
Source Motorola
3. Innovation: Augmentables (Oculus Rift)
3. Innovation: Enchantables (Glow Caps)
Source: Glow Caps
3. Innovation: Swallowables (colonoscopy camera pill)
Source: PSFK
3. Innovation: Wearables (navigation jacket)
Source: Wearable Experiments
3. Innovation: Wearables (Google & Motorola’s lie detector tattoo)
Source: PSFK
3. Innovation: Surroundables (Nissan Nismo Watch)
Source: Nissan
The ultimate device is YOU!
Business Processes
4. Security: So here is your Internet of Everything!!!
Virtual World
Personal
Devices
Home AutomationOperational Technology
IT Connected
Organizations
Crime
4. Security: Gartner 2020 planning assumptions
• 80% of digital access will be shaped by new mobile and non-PC
architectures, up from 5% today.
• 60% of all digital identities interacting with enterprises will come from external
identity providers through a competitive marketplace, up from <10% today.
• over 80% of enterprises will allow unrestricted access to non-critical assets,
up from <5% today, reducing spending on IAM by 25%.
• 70% of all businesses will use attribute-based access control (ABAC) as the
dominant mechanism to protect critical assets, up from <5% today.
• identity analytics and intelligence (IAI) tools will deliver direct business value*
in 60% of enterprises, up from <5% today.
• the Internet of Things will redefine the concept of "identity management" to
include what people own, share, and use.
Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)
5. Four measures to master mobile developments
1. Separate systems of engagement from systems of record
2. Orchestrate over an increasing number of business
partners, devices, protocols and formats
3. Be resilient to all types of risk in the automated landscape
under your responsibility
4. Carefully choose your anti lock-in strategy
5. Four measures to master mobile developments
- Separate systems of engagement from systems of record
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in these rooms?
Protocol and data-
format decoupling
such as: Citrix,
HTML 5, JSON,
XML, Sybase SUP
and so on
Application
2 Application
3
© Wim Bouman, Alliander IT
Needs semantics
5. Four measures to master mobile developments
- Orchestrate
5. Four measures to master mobile developments
- Orchestrate
• Counter the ‘wave of appliances’ and lock-in wars with open
source orchestration
• Use standardization to minimize the number of supported
protocols and file formats as much as possible
• Keep risk acceptable
5. Four measures to master mobile developments
- Choose your anti lock-in strategy
Resilience can be obtained by moving away from typical barrier enhancement
risk-measures. Consider the following options:
• Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic;
• Accept, the potential impact of some risks may be deemed acceptable to
your organization;
• Reduce, e.g. the potential impact or probability of occurrence of a risk, like
the banking app;
• Transfer, use insurance or subcontracting to transfer potential consequences
of risk;
• Avoid , not entering the type of business that may incur potential risk impact
deemed too high;
• Exploit, risk is also an opportunity and high risk investments may yield high
returns.
5. Four measures to master mobile developments
- Be resilient
The beauty of it all?
• Seize the opportunities of Mobile
• Minimize downside risk
Questions?
Alliander IT CIO Office
Michel de Goede
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Bryan Len
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
MicheleNati
 

Was ist angesagt? (20)

Iot presentation JustPeople-ago2015
Iot presentation JustPeople-ago2015Iot presentation JustPeople-ago2015
Iot presentation JustPeople-ago2015
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of Things
 
Tec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesTec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examples
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoT
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
 
IoT Applications and Networks
IoT Applications and NetworksIoT Applications and Networks
IoT Applications and Networks
 
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONINTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of Things
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
 
When IoT Meets Artificial Intelligence
 When IoT Meets Artificial Intelligence When IoT Meets Artificial Intelligence
When IoT Meets Artificial Intelligence
 
IoT Strategy Pillars
IoT Strategy PillarsIoT Strategy Pillars
IoT Strategy Pillars
 
Industrial IOT By Rishika Ghosh
Industrial IOT By Rishika GhoshIndustrial IOT By Rishika Ghosh
Industrial IOT By Rishika Ghosh
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of Things
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of things
 
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business ModelSensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Smart Industry 4.0: IBM Watson IoT in de praktijk
Smart Industry 4.0: IBM Watson IoT in de praktijkSmart Industry 4.0: IBM Watson IoT in de praktijk
Smart Industry 4.0: IBM Watson IoT in de praktijk
 
Industrial IOT: Ti tech day jithu atoll solutions
Industrial IOT: Ti tech day jithu atoll solutionsIndustrial IOT: Ti tech day jithu atoll solutions
Industrial IOT: Ti tech day jithu atoll solutions
 

Ähnlich wie BYOD: Be your own device?

Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version
Thorsten Schroeer
 

Ähnlich wie BYOD: Be your own device? (20)

Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
MLSEV Virtual. One Platform to Rule Them All
MLSEV Virtual. One Platform to Rule Them AllMLSEV Virtual. One Platform to Rule Them All
MLSEV Virtual. One Platform to Rule Them All
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentation
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version
 
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Considermeet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
 
Reshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderReshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to Consider
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 

Mehr von Michel de Goede

Mehr von Michel de Goede (20)

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A
 
Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and ev
 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber security
 
Cloudifying Alliander
Cloudifying AllianderCloudifying Alliander
Cloudifying Alliander
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integration
 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!
 
The Connected Utility
The Connected UtilityThe Connected Utility
The Connected Utility
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?
 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timeline
 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurship
 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYOD
 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learned
 
Database Technologies
Database TechnologiesDatabase Technologies
Database Technologies
 
IT: make or break the deal
IT: make or break the dealIT: make or break the deal
IT: make or break the deal
 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energy
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 

Kürzlich hochgeladen

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (6)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 

BYOD: Be your own device?

  • 1. BYOD: Be Your Own Device? “Opportunities multiply as they are seized.” Sun Tzu Alliander IT CIO Office Michel de Goede
  • 3. 2. Issues of a grid operator: Electric vehicles • Roll out of thousands of electric vehicle charging stations • Grid Capacity is insufficient • What if we use cars as backup energy storage?
  • 4. 2. Issues of a grid operator: Two way traffic Monetary flow Information flow Transmission Trade/PRP/ Shipper Distribution SupplyMeteringProduction Physical flow © Jeroen Scheer, Alliander, 2011 • Flows change • Capacity increase
  • 5. 2. Issues of a grid operator: Smart metering and home automation • Roll out of 5 Million Smart Meters (Gas + Electricity) • Inform customer regarding energy consumption and create awareness • Respect privacy concerns • Manage the potential data ocean
  • 6. 2. Issues of a grid operator: Smart city initiatives • Combination of various techniques (Amsterdam) • Self healing and self regulating micro grid (Bronsbergen)
  • 7. 2. Issues of a grid operator: Smart grid • Accommodate higher peaks and two-way traffic through intelligence • Accomodate energy transition scenario’s through intelligence • Provide the necessary information to all parties involved
  • 8. 3. Innovation: sixth Schumpeter / Kondratiev wave of innovation
  • 9. 3. Innovation: The semantic wave?
  • 10. 3. Innovation: And then there is also..... Source: Sogeti VINT
  • 11. 3. Innovation: Biohackables (implanted bio chip) Source: Motherboard
  • 12. 3. Innovation: Biohackables (Dean Kamen’s Luke Arm) Source: Wired
  • 14. 3. Innovation: Biohackables (hearing colour) Source PSFK
  • 15. 3. Innovation: Augmentables (Motorola wearable computer) Source Motorola
  • 17. 3. Innovation: Enchantables (Glow Caps) Source: Glow Caps
  • 18. 3. Innovation: Swallowables (colonoscopy camera pill) Source: PSFK
  • 19. 3. Innovation: Wearables (navigation jacket) Source: Wearable Experiments
  • 20. 3. Innovation: Wearables (Google & Motorola’s lie detector tattoo) Source: PSFK
  • 21. 3. Innovation: Surroundables (Nissan Nismo Watch) Source: Nissan
  • 23. Business Processes 4. Security: So here is your Internet of Everything!!! Virtual World Personal Devices Home AutomationOperational Technology IT Connected Organizations Crime
  • 24. 4. Security: Gartner 2020 planning assumptions • 80% of digital access will be shaped by new mobile and non-PC architectures, up from 5% today. • 60% of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace, up from <10% today. • over 80% of enterprises will allow unrestricted access to non-critical assets, up from <5% today, reducing spending on IAM by 25%. • 70% of all businesses will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from <5% today. • identity analytics and intelligence (IAI) tools will deliver direct business value* in 60% of enterprises, up from <5% today. • the Internet of Things will redefine the concept of "identity management" to include what people own, share, and use. Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)
  • 25. 5. Four measures to master mobile developments 1. Separate systems of engagement from systems of record 2. Orchestrate over an increasing number of business partners, devices, protocols and formats 3. Be resilient to all types of risk in the automated landscape under your responsibility 4. Carefully choose your anti lock-in strategy
  • 26. 5. Four measures to master mobile developments - Separate systems of engagement from systems of record Internet (open) Access Management (access layer) Representation (presentation layer) Authorization Management (application layer) Application 1 Application n May I enter the house? What goods and services am I allowed to use in these rooms? Any device Offices (closed) For which rooms do you give me the key(s)? What goods and services am I allowed to use in these rooms? Protocol and data- format decoupling such as: Citrix, HTML 5, JSON, XML, Sybase SUP and so on Application 2 Application 3
  • 27. © Wim Bouman, Alliander IT Needs semantics 5. Four measures to master mobile developments - Orchestrate
  • 28. 5. Four measures to master mobile developments - Orchestrate
  • 29. • Counter the ‘wave of appliances’ and lock-in wars with open source orchestration • Use standardization to minimize the number of supported protocols and file formats as much as possible • Keep risk acceptable 5. Four measures to master mobile developments - Choose your anti lock-in strategy
  • 30. Resilience can be obtained by moving away from typical barrier enhancement risk-measures. Consider the following options: • Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic; • Accept, the potential impact of some risks may be deemed acceptable to your organization; • Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking app; • Transfer, use insurance or subcontracting to transfer potential consequences of risk; • Avoid , not entering the type of business that may incur potential risk impact deemed too high; • Exploit, risk is also an opportunity and high risk investments may yield high returns. 5. Four measures to master mobile developments - Be resilient
  • 31. The beauty of it all? • Seize the opportunities of Mobile • Minimize downside risk
  • 32. Questions? Alliander IT CIO Office Michel de Goede Thank you!