• Like

GIL 2014 Latin America - Information and Communication Technologies Track

  • 1,858 views
Uploaded on

 

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,858
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
28
Comments
0
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Before we get into the main tech trends that will shape our businesses during 2014 in Latin America, we can´t avoid mentioning the impact that politics and economic performance of the overall region will have over the ICT Industry spending during 2014 In this year, 7 presidential elections will take place in some key countries such as Brazil, Colombia, Costa Rica and Panama.Also, Las economías latinoamericanas crecerán en los próximos dos años a un ritmo del 3,3%.Besidestheeconomicgrowth, theEconomic stability in Latin America is driving foreign capital to the region (even though at a lower pace than before), which has a direct impact as well on the adoption of technology.GANCHOS PARA INTRODUCIR LAS TENDENCIASQue es clave para las empresas:INCREMENTAR PRODUCTIVIDAD DISMINUIR COSTOS
  • Before we get into the main tech trends that will shape our businesses during 2014 in Latin America, we can´t avoid mentioning the impact that politics and economic performance of the overall region will have over the ICT Industry spending during 2014 In this year, 7 presidential elections will take place in some key countries such as Brazil, Colombia, Costa Rica and Panama.Also, Las economías latinoamericanas crecerán en los próximos dos años a un ritmo del 3,3%.Besidestheeconomicgrowth, theEconomic stability in Latin America is driving foreign capital to the region (even though at a lower pace than before), which has a direct impact as well on the adoption of technology.GANCHOS PARA INTRODUCIR LAS TENDENCIASQue es clave para las empresas:INCREMENTAR PRODUCTIVIDAD DISMINUIR COSTOS
  • Thatbeingsaid, one of thekeytechnologytrendsthatwillhelpcompanies to decreasetheircost and being more productive in LatinAmericaduring 2014 will be thecloud.Forthefirst time, weshouldstart to see more implementationsthantrials. Weexpect a gradual change in thecompaniesattitudetowardscloud, migratingfromtesting to real implementations in thecurrentyear.Implementaciones reales – Driver – El conocimiento de sus beneficios. Mientras el término “Computación en la Nube” es relativamente nuevo, los diversos conceptos que lo constituyen – ambiente compartido, pago por uso, proveedor tercerizado – son conocidos por las empresas hace años.HYBRID: Weforeseethat cloud implementations in Latin America will increasingly be hybrid, leveraging existent client investments and infrastructure, while blending private and public clouds.La nube será cada vez mas híbrida: las implementaciones de infraestructuras “tradicionales” están perdiendo terreno frente a las implementaciones híbridas, que consisten en la interoperabilidad de las soluciones de Cloud con la infraestructura que el cliente ya posee, y además la construcción y gestión de nubes públicas y privadas. (Two primary drivers for Public Clouds: Cloud service providers have strengthened their public cloud offers, incorporating private networking and beefing up security and reliability to meet enterprise expectations. And businesses are building on-premises private clouds, which they want to connect to the public cloud in a hybrid configuration)La tecnología se centrará en la provisión y gestión de servicios al usuario sin importar cómo se consiguen y de dónde provienen. Esto, en pocas palabras, en el mundo que se viene no todo será en la Nube, ni mucho menos on-premises, sino que será una mezcla de ambos. El mejor de los mundos puede ser alcanzado a través de la combinación y el uso de las mejores capacidades de nuestras redes, las de Vendors,ServiceProviders y otras (además de las capacidades on-premises ya existentes)DISRUPTIVE:Nascent MarketStrong Impact on people & processesSignificant Risks and BenefitSTRATEGICInterest/support from C-levelsQuantitative ImpactOffer Value to the BusinessCompetitive advantageSee more at: http://mundocontact.com/predicciones-sobre-infraestructura-y-cloud-computing-para-2014http://mundocontact.com/4-megatendencias-que-transforman-los-negocios/
  • The first objection, and most common concern, I hear from customers about moving to cloud-based applications is security. How can we protect our data if it’s not on our servers, in our data center, and under our control?It’s my opinion that public, multi-tenant applications are more secure than most of the systems you run in your data center and/or private cloud environment.The following is a list of reasons why I believe this to be so.1# “Cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cyber-security personnel of a higher quality than many governmental agencies.” – VivekKundra, former federal CIO of the United States#2 Cloud Providers spend more money on redundancy and security than any other type of company. Google spends (and can justify spending) more money on redundancy and IT security than any company or country in human history. Google is now the 4th largest manufacturer of servers in the world. They do not sell them to anyone, they consume them all themselves. Keeping their systems up and your data (and theirs) secure is mission critical for them. If they fail, their credibility suffers and the billions they have built in shareholder value are jeopardized. They have designed this need for security into every layer of their architecture. Can you say the same about your environment? #3 In a public cloud environment, you, your domain, and all the data associated to it are very well hidden. In storage, all the data is encrypted. In transmission, all the data is encrypted. Your data model can only be identified by a set of random key identifiers. Can you say the same about your current environment? #4 Upgrades.With cloud-based solutions, you are always on the latest release. Every time your web browser refreshes, there is an opportunity for new features, new functions, and new code behind the screens. That means if there is a security hole, it can be patched for all users in a matter of days or hours. In your legacy systems that just isn’t possible. Your IT staff has to get the updates, bring the system down, install the updates, bring the system back up, and then test it. If they don’t keep up with the updates (almost no one does) then your system may not be secure. Worse, if they get a couple of updates behind, they may have to go through this entire cycle for every update release in order to get to the latest release. This is of course if you’ve kept your maintenance/support contract up to date. Otherwise you don’t get the updates. In the cloud, this entire process just goes away.http://blog.cloudlock.com/2013/03/26/another-reason-why-the-cloud-is-more-secure/Lock them up and throw away the key.Your applications and data are no longer on your servers in your facilities. Every IT security expert on the planet will tell you that your employees are the biggest security risk you will ever face. Either by accident or malice, they have a lot more opportunity and motive than any outsider will ever have. I’ve seen it happen many, many times. A server gets unplugged to be re-commissioned, except it was a production server with really important data on it. Oops. Real statistics back this up. Most security breaches involve at least one insider. Getting that information off of your servers and out of your facilities is the most effective thing you can do to improve reliability, uptime and security.No more copies of copies.Ever worked on a project with an internal and/or external team where some set of documents or presentations got passed back and forth? Everyone making their edits and comments and then trying to bring it back together in a unified version? In the cloud, that stops; now there is one copy and it lives in the cloud and we all share it in real-time. If you are authorized you can see it. If you’re authorized you can edit it, with me or a whole team, but there is still only one copy (unless someone makes more).
  • La cuestión de la seguridad no solo es clave en el entorno cloud, sino en cualquier entorno empresarial. De hecho, diversas organizaciones a nivel mundial han dedicado sus esfuerzos a la prevención de pérdida de datos, cifrado y a dar prioridad a inversiones en términos de seguridad. La repuesta a la tendencia BYOD (Bring your Own Device Traiga su Propio Dispositivo) es la acción BYOS (Bring Your Own Security - Traiga su Propia Seguridad). Esperamos en 2014 que aumenten los escenarios de "BringYourOwn Security", en los cuales los empleados usan sus propios dispositivos móviles para el trabajo, y por lo tanto usan sus mismas medidas de seguridad, lo hacen frecuentemente sin el consentimiento de los gerentes de seguridad de las empresas. En segundo lugar, vemos que los consumidores están aceptando de buen grado los lectores de huellas del nuevo iPhone de Apple por su precisión y facilidad de uso. Este gran salto en el uso de la biometría, incluye, además, escaneo de iris ocular y reconocimiento facial en los dispositivos de los clientes como forma de proteger sus dispositivos y datos, como así también para confirmar las identidades de usuarios destinados a actividades tales como transacciones de compras en línea. La aceptación de la biometría iniciará la evolución para ir más allá de la combinación tradicional de identificación/contraseña utilizada más frecuentemente para verificar identidades en línea. Además, la capacidad de determinar con exactitud y de manera automática el dispositivo específico de un usuario y la localización geográfica, proporcionará a los gerentes de seguridad de las compañías un mayor contexto acerca de los intentos de los usuarios de acceder a las redes. De esta forma, las soluciones de autenticación contextual pueden dar alertas a los gerentes cuando, por ejemplo, alguien que se encuentra fuera del área geográfica predeterminada intente acceder a sus redes. De igual modo, los controles de acceso basados en atributos, identifican solicitudes de acceso que no se encuentran dentro del estándar normal, tales como intentos de obtener información a la que no se accede normalmente o a la que se trata de ingresar en horas poco habituales. Con estas herramientas y métodos de gestión de identidad, como la biometría, los profesionales de seguridad pueden dificultar aún más el ingreso a los sistemas, redes y aplicaciones a aquellos usuarios que no poseen permisos. Entre las instituciones financieras, los avances como la biometría integrada en dispositivos móviles ayudarán a incrementar significativamente la aceptación de transacciones bancarias y comercio electrónico en dispositivos móviles. Del mismo modo, 2014 será el año en que los bancos exploren más el uso de terminales autoservicio y quioscos que requieran una combinación de métodos de seguridad físicos y digitales, incluyendo sistemas biométricos.http://enterprise.itsitio.com/detalleNotaE.php?idxnota=MTQ3NDc4&idxcomunidad=MTg2MQ==&rsumun=2000713533&rsumail=juan.gonzalez@frost.com&
  • How will look the year ahead in terms of network security? Let´s take a look to the big predictionsUSABILITY:Evolution in Internet-based attacks has forced a counteracting advancement in security technologies. While a steady improvement in security efficacy has followed, an unacceptable by-product has been the increased management complexity for overtaxed security departments. In 2014, security vendors will ratchet up their attention to developing security products that are not only effective in combating security threats but also have a higher degree of usability.ACQUISITIONS: Continuous market demand for network & information security technologies and services is enlarging an already attractive strategic opportunity for large IT systems providers such as Cisco, HP, IBM, and Juniper. Simultaneously, convergence, technology innovation, and increasingly sophisticated threats are revealing the gaps in many providers’ security portfolios. To address these gaps, a new phase of industry consolidation will begin in 2014, punctuated by a multi-billion dollar acquisition. Ej:VMware to Acquire AirWatch(Today, AirWatch signed a definitive agreement to be acquired by VMware, Inc.) “AirWatch provides best-in-class, secure, enterprise-mobile management to thousands of businesses around the world,” said Pat Gelsinger, chief executive officer, VMware. “With this acquisition VMware will add a foundational element to our end-user computing portfolio that will enable our customers to turbo-charge their mobile workforce without compromising security.” This acquisition will expand VMware’s End-User Computing group; AirWatch’s offerings will form an expanded portfolio of mobile solutions that are complementary to VMware’s portfolio. The acquisition has been approved by the boards of directors of both VMware and AirWatch and the acquisition is expected to close during late Q1 2014 subject to regulatory approvals and customary closing conditions. On October 7, 2013 Cisco completed the acquisition of Sourcefire, a leader in intelligent cyber security solutions. With the close of this acquisition, Cisco will provide one of the industry's most comprehensive advanced threat protection portfolios, as well as a broad set of enforcement and remediation options that are integrated, pervasive, continuous and open.The increased scrutiny on security is being driven by the evolving trends of mobility, cloud computing, and advanced targeted attacks. More than the attacks themselves, a major consideration is the change in what defines a network, which goes beyond traditional walls and includes data centers, endpoints, virtual and mobile to make up the extended network. A threat-centric security model lets customers address the full attack continuum, across all attack vectors, and respond at any time, all the time.3)BIOMETRICS:In2007, Apple introduced the iPhone, changing the mobile phone industry forever. In 2013, Apple added fingerprint biometrics to the iPhone, introducing biometrics to the general public. These and other biometric initiatives are propelling the market for biometric-based authentication into a growth phase in 2014. Factors that will contribute to this phase include: increasing need for strong authentication, heightened awareness, maturing technologies, and standards development.4)FOLLOW ME DATA PROTECION: With the constant increases in BYOD and cloud services, organizations face a losing battle in discreetly managing data breach risk on a per device or cloud service basis. In 2014, existing data protection solutions will mature and new approaches will emerge to uniformly secure valuable data wherever it flows.
  • Hablamos de Seguridad, y en estecontexto no podemosdejar de mencionar el desafioque la tendencia de Consumerización genera al interior de lasempresasThe consumerization of IT is changing the way people collaborate and how enterprises manage communications. Bring Your Own Technology (BYOT) is the tangible consequence of this.Employees are increasingly using their own technology—devices, services and applications—while at work. There’s a reason so many employees are using their personal smart phones and tablets, services and applications. They enable their own productivity, making it easier to stay in touch with colleagues and customers, and up-to-date on company news and information. En todos los casos estamos hablando de herramientas que estaban inicialmente concebidas para el ámbito del consumo, pero que por su practicidad invadieron el entorno empresarial. Cuáles es el riesgo principal de esta tendencia? El derecho de los usuarios a impulsar las capacidades de sus dispositivos personales entra en conflicto con las políticas empresariales de seguridad e incrementa el riesgo deuna fuga de datos o la explotación de las vulnerabilidades. “How do we integrate all of these devices into our network?” When they should be asking: “How do we deliver the right experience to our workforce?” The later question will create a strategic connection between BYOD and providing the capabilities businesses need to service customers well, to drive innovation and to manage effectively.Frente a los riesgos del BYOT, se impone la necesidad de evaluar que se debe proteger y de crear una política, que incluya:1) Conduct A BYOD Assessment: Organizations can't create effective security policies if they are blind to exactly what needs to be protected, say security experts. A thorough assessment will help identify the types of devices already in use in the organization and the corporate systems and data that is already being accessed with them. Solutionary said that once a clearer picture has been established, policy can be developed with legal counsel. Obtaining executive support is vital to creating policies that are effective, the firm said2) Conduct User Awareness Training: Organizations that have BYOD policies need to communicate them effectively. That means providing training, preferably on a regular basis on the security threats that affect personal smartphones and tablet devices. While the focus is on corporate data policies, some experts believe that teaching employees how to protect themselves and their families from cybercrime can help create a more security-aware culture in the organization.3) Restrict Corporate Network Access: En la intersección del dispositivo, la aplicación y el usuario, se encuentra la red. Organizations consider network access control capabilities to restrict BYOD devices to separate networks or virtual local area networks (VLANs). Allow only the minimum access required to avoid putting sensitive data at risk, the company said.Al fin y al cabo, nos guste o no la idea del BYOD, todas las empresas tienen el mismo problema, que tienen que controlar que dispositivos están accediendo a su red, con que derechos y con que permisos.  No solo a Juan Gonzalez, sino a Juan en su tablet versus Juan en su smartphone, versus Juan en su PC corporativa. Pero como distingo entre esos usuarios? Como le doy a Juan Gonzalez los permisos apropiados para que tenga las aplicaciones que necesitas para colaborar con su equipo de trabajo? Como vemos, hay realmente muchos desafiosdetras del BYOD, en terminos de autenticacion, que el equipo de IT debe enfrentar para permitir el funcionamiento normal de las aplicaciones correctas que faciliten el logro de los objetivos de negocio.4) Remote Wipe Is Necessary: A lost or stolen device is the No. 1 security problem with smartphones and tablets, far outpacing malware attacks and data leakage. Having the ability to remotely wipe a device is one of the minimum basic security measures necessary to address the problem. Use the features already built into Exchange ActiveSync (EAS) to enforce the policy. It can be used to enforce PINs on devices and force users to change them on a regular basis.-------------
  • Besides, providing users with the appropriate rights to access to the applications they need to collaborate with their peers. What else enterprise users expect from Mobiles Service in 2014?New services must help consumers to reduce complexity, save time and reduce stress through centralized management, providing better control of spending and usage. Users expect simplicity of services that are intuitive and can integrate seamlessly with overall consumer behavior. Besides, services need to be customized in real-time, according to time and location of the consumer.By interviewing smartphone users in three markets – Brazil, Indonesia and the US – Ericsson ConsumerLab has identified seven key needs, which are seen as crucial to the success of new services.1.Instant access everywhere – to suit their on-the-go lifestyles, users expect to have access to an array of services on demand and in real time. 2.Customize my world – people are increasingly demanding personalized services and alerts that suit their lifestyles. 3.Switching off – consumers will use technology to balance the "always-on" mentality by actively making time to switch off, relax and unwind. Consumers expressed an interest in services that can help them do this. 4.Assisted productivity – people are interested in services that manage and coordinate their schedules. 5.Enhanced togetherness – in their busy lives, friends and family will increasingly rely on technology to keep in touch, wherever they are. 6.Consumers in control – people want to keep track of their spending, data usage and information updates, allowing them to spend more time on the important things in life. 7.Location-based me – consumers are expressing a need to get information that is relevant to where they are at any given moment.On top of the seven key needs found in the study, top findings include: • Consumers expect simplicity of services that are intuitive and can integrate seamlessly with overall consumer behavior. • In order to be seen as truly mobile, services need to be customized in real-time, according to time and location of the consumer. • Consumer demands will open up new market opportunities, forcing actors in the connected landscape to look beyond existing offerings.
  • That being said, we understand in F&S that the real impact of Mobility could only be fully comprehensible when taking in consideration other underlying but significant trends Proliferation of mobile devices:The proliferation of mobile devices (cellular phones and tablets) is creating a paradigm shift within the corporate work culture. 2) Workers today have more devices to choose from, and can leverage these to work from anywhere. 3) Mobile phone penetration in Latin America will be 129.4% in 2014. El tráfico de datos en dispositivos móviles creció un 80% en todo el mundo. En Brasil, se chegou a 103,1 milhões de acessos de banda larga móvel, de acordo com dados da Anatel referentes a dezembro de 2013 Frost & Sullivan research has estimated that “Mobile phone penetration in Latin America will be 129.4% in 2014.” This figure includes both active and non-active lines, however, carriers have been working at disconnecting unused lines, thus this figure is not overinflated. Our research indicates that mobile phone penetration is growing and it is estimated that this figure will grow to 144.7% in 2018. 3rd point….Another noticeable occurrence in the last year has been that global tablet sales (in volume) outpaced portable PCs (laptops). These two data points (mobile phone penetration and tablet sales) highlight how mobile devices are taking over. No es casualidad que hoy los usuarios esperen cada vez más de su Smartphone, de su Tablet, ya que es su instrumento de toma de decisiones. No es suficiente ya que su dispositivo les permita estar disponibles, sino que debe permitirles acceder a la información, saber quién está disponible y cómo contactar a una persona.Network Readiness: Una mayor adopción de dispositivos de alta gamatrae aparejado una creciente demanda de aplicaciones para ser utilizadas en esos equipos. Esto, tiene un impacto directo sobre la cantidad de trafico en las redes, lo que en última instancia no hace mas que poner presión para empujar la migración hacia arquitecturas mas inteligentes que permitan hacer estas operaciones mas simples.De la mano de la explosión móvil, las crecientes tasas de conectividad de la región, permiten a los empleados desarrollar su tarea desde diferentes lugares. En este sentido, durante 2012, América Latina fue la región con mayor crecimiento en el número de usuarios de internet en el mundo . América Latina creció un 12 por ciento en la cantidad de personas conectadas a internet, llegando a casi los 150 millones de usuarios. De esta manera, la región representa cerca del 10 por ciento del total de los individuos que acceden a la web en la actualidad. Mobile devices when used for collaboration are only as good as the mobile broadband network they run on. In Latin America, investments are being made in mobile infrastructure, nevertheless, LATAM is still lagging compared to other regionsRENATO: Telcos are working to enhance customer experience for enterprises, considering that 3G is not satisfying the needs. This includes Wi-Fi and Small Cell (usually 4G) deployments in areas in which enterprise customers circulate, such as airports, avenues that concentrate company's headquarters, shopping malls. etc. And differentiated QoS in these networks, with traffic management, allowing for instance better VoIP/Video for the UC users in your industry.3G has 90% coverage of population is most countries. 4G is still restricted to few metropolitan areas, but expanding quickly.Changing Workspace and Workforce Culture:20% of US employee workforce work from “home” at least 1 day a week2.5% ofUS employee workforce consider “home” as their primary working place (~3M)Changing Workforce Culture: Digital natives now entering the workforce
  • Como decia anteriormente, estamos frente a fuertes cambios en el Workspace & y la Workforce Culture. Technologies such as smart mobile devices, social media, video, and cloud-based services are significantly affecting the way people interact at work, in much the same way that they have in our personal lives. At the same time the workforce is also undergoing a major demographic shift as the incoming generation expects a more flexible environment that provides choice in how, when, and where they work, as well as the device they use and the way they interact with others.The challenge lies in creating an environment where people can work effectively together anywhere, anytime, in an engaging manner while accommodating the needs of the new workplace. Ahora bien, como cambiara la forma en que trabajamos y que impactos veremos. 1) El limite entre la vida laboral y personal es cada vez más difusoEn primer lugar, The Work-Life Blur. The demarcations between work-life and person-life will blur.This model of work is significantly different than work in the past, and will require a combination of the astute use of technology to help manage transitions and personal responsibility to prioritize effectively in order to find balance between the work and the personal experience. The work-life blur will require policy realignment and compensation changes that acknowledge work and recognize contributions, regardless of where or when they are accomplished.2) De “llegar a deadlines” a “trabajar por compromisos”From Meeting Deadlines to Delivering on Commitments. Knowledge workers have, unfortunately, often been subjected to industrial age managementpractices. The Post-PC World will accelerate the movement away from “butts-in-seats” management to a more trusting engagement model based on commitments. People will commit to achieve a particular goal or objective, and then be empowered to engage across the organization to accomplish their objectives. Collaboration technology can be used to effectively communicate and coordinate commitments, as well as the work required to converge on shared objectives.3) Más negociación y menos administración del tiempo de los empleadosBoss-less Work. In many cases, the move toward commitments and away from day-to-day management will result in an increase in individual contributors as apercentage of the workforce. Managers will spend more time negotiating shared commitments across organizational boundaries and fostering a positive culture, and much less time managing people’s tasks. The hierarchy will give way to teams and collaborative groups as the primary organizing mechanisms become more networked.4) Seremos evaluados por como trabajamos, no solo en qué trabajamosYou Will be Evaluated by What You Do. The Post-PC World will increase the use of analytics to provide insight into how people work, not just what they work on. Very little work has been done to analyze the rich data stored in collaboration systems about how people work. In the Post-PC World analytics will be turned inward and outward, to better understand how people use collaboration software, how and where they spend their days, along with who they know, and how they interact through their social network.5) Los espacios virtuales redefinen el concepto de oficinaRedefining the Office. The Post-PC workspace may remain physical in some cases, but over time, the virtual spaces spread across smartphones, tablets and other devices will be where work takes place. Devices and applications that adapt to the way people work, and the cognitive styles they employ, will be critical to creating customized work experiences that help people focus on what is important, discover who they need to include in their collaborative work, and determine what data will inform and inspire them. Workers will increasingly select applications that align with how they choose to work, how they conduct analysis and how they visualize data — personal applications that transform standardized data into personal experiences. 6) Se reinventan las reunionesMEETINGS REIMAGINED: People spend a lot of time in meetings. In the Post-PC World knowledge workers may still spend a lot of time in meetings, but those meetings will be very different experiences. Do not think of meetings as a gathering of people in a single place. Meeting in the Post-PC World will be as often impromptu as planned, ad hoc as process-oriented, as likely rigidly run as completely chaotic. Meetings will be attended by peopleon smartphones with personal video, by people with access to immersive telepresence, by people with high quality desktop or tablet video — and there will always be people who attending from where they are rather than traveling to a particular location.-----
  • En estecontexto, Video has become a key communications media for both personal and work environmentMore video enabled Devices: Nowadays, pretty much every person on the planet has a cell phone that can make video calls, every laptop now has a web cam, and thanks to HTML 5, pretty much every browser has the capability to perform some fairly advanced video conferencing tasks.Para mediados del próximo año, se espera que la cantidad de teléfonos inteligentes y tabletas que se utilizarán en todo el mundo supere los 1.5 billones de computadoras. 90 millones de smartphones vendidos en LATAM en 2013.2) Business oriented: Video conferencing is going to move beyond primarily consumer-to-consumer interactions to business-to-consumer interactions. Think websites that greet you with live video calls to sales representatives who will attempt to help answer your questions about products. 3) Simple to use and experience: Pero, como mencioné anteriormente, la colaboración por video se está transformando para volverse más simple y al alcance de todos. El video debe ser parte de la forma que hago los negocios normalmente, de como interactuó con mis clientes y canales de manera frecuente. En este contexto, lo cierto es que en tanto y en cuanto la gente se pueda conectar y colaborar naturalmente, no importará realmente desde donde o cuando lo hagan. Por ello, creemos que el desafío principal para las empresas consiste en crear un entorno donde las personas puedan trabajar de manera efectiva y en conjunto, desde cualquier lugar y en cualquier momento, de manera tal de contemplar las necesidades y requerimientos del nuevo espacio laboral.
  • Customers and Companies in Latin America are not only increasingly mobile and visual, but also more social.1) Latin America is one of the fastest growing regions in the globe in terms of social network users:Acording to eMarketer data, there were 196 million social network users in Latin America in 2013. This number is expected to grow to 288 million users by 2017. 2) 5 Latin American countries were among the TOP 10 nations in terms of average hours per visitor spent on social networking sites (per Month)According to comScore data, as of May 2013, Brazil and Argentina are the top two countries in the globe with regards to Average Hours per Visitor Spent on Social Networking Sites (per Month) Peru, Mexico and Chile were also among TOP 10.The above situations highlight why it is so important that companies be present in this space for both branding and customer care activities.One each of 3 (32%) of customers share their customer service experience through social media—the good and the bad…according to a Verintcommisioned survey of 7000 consumers in 6 countries. 3) 5 Latin American countries are among the top 20 nations with the highest number of Linkedin users worldwide (according to Social Bakers) Besides, According to We Are Social data, as of January 2014, Latin America has the same social penetration as Western Europe and Oceania—44%. This makes these regions the second most social in the world, behind North America—56%.4) Similarly, Enterprise Social Networks (e.g., Yammer) are gaining acceptance as efficient internal collaboration tools. The trend indicates the rise of the Social Enterprise, that is, companies that have integrated social networks as a channel for internal and external communications. So, while Social networking enterprise tool is top of mind, larger business adoption still lags.5) That being said, certainly social can boost sales, marketing, customer care, and internal collaboration, but for users ROI is hard to measure.6) Companies have begun to execute “omni-channel” strategies to provide a consistent, high quality, and profitable customer experience, regardless of the channels and devices customers use. For example, if a customer inside a store tweets that he or she likes a particular outfit, social media analytics can pick up the remark and recommend that the retailer tweet back with a special offer to encourage a purchase. But companies have to be careful when acting on this knowledge in order to protect consumers’ privacy and to avoid annoying them. Some customers do not expect or appreciate a direct response from a company after they post a comment on social media.The goal for every business should be how to present an omni-channel experience to the customer where all channels work in concert as customers move through them.http://www.socialbakers.com/linkedin-statistics/
  • A big driver to improve customer experience is certainly to be able to gather more information from our clients and analytics make that possible. Let´s take a look now to the key features that are shaping the future of Big Dataprincipaiscaracterística de Big Data: volume, variedade e velocidade dos dados (Definicionoficial de Frost)Volume:10 connected devices per house by 20205 connected devices per user by 20205 billion internet users by 2020Variety:Smartphones and tablets increasing data accessM2M, RFID, smart devices4G, video call, streaming, Wi-FiVelocity:Real time analysisPro-active strategyCapitalize on new opportunitiesValue:Big Data is positioned to revolutionize many industries. Companies are sitting on a gold mine of information, however, few have been able to leverage it. Big Data allows individuals to make real-time decisions based on analytics model that take into account all this data
  • How we translate Big Data into Competitive Advantage? Jack Welch, the former CEO of GE, suggested there were only two sources of competitive advantage for businesses. Competitive Advantage #1:“Learn more about your customers faster than the competition.” What do you know about customers that your competitors don’t?Competitive Advantage #2: “Turn what you learn about customers into action faster than the competition.” How do you collect customer knowledge and provide it to the people that can take action?Companies that master these two sources of competitive advantage stay ahead of the competition, they are the market leaders.Ejemplo:En resumen Netshoes utiliza Big Data para ofrecer productos diferentes en su e-commerce para cada cliente. Hay mucho más que ellos hacen en Big Data y abajo sigue un texto de publicidad en portugueshttp://www.meioemensagem.com.br/home/comunicacao/em_perspectiva/2013/07/16/Quem-e-que-manda.htmlA Netshoes utiliza o Big Data como mais um fator para suas ações de marketing ou até mesmo de negócios. Internamente, há duas equipes alinhadas: uma opera a performance e quantidade de vendas e outra a construção da marca. A correta gestão do Big Data traz a capacidade de entender cada cliente de maneira personalizada, ainda que haja quantidades gigantescas deles e de suas interações com a empresa. O gerenciamento de dados permite também que diversas áreas da empresa atendam a necessidades específicas de clientes e o contexto de cada interação com a empresa. Assim, possibilitam descobrir se uma situação com um determinado consumidor se repete com outra dezena de clientes e, assim, atuar de forma otimizada para resolver a situação que atinge diversas pessoas. Por tudo isso, o Big Data é mais um fator importante para empresas e agências, que agrega no brainstorm, na elaboração e na execução das ações de marketing.”
  • I have just mention that companies are sitting on a gold mine of information, and a big part of that data is being generated by machines.The Internet of things (IoT) is a concept that has emerged from a vision of an always connected world. As a matter of fact, In 2014, more data will be generated by machines (things) than by human beings. A Internet das Coisas (IoT, na sigla em inglês) tem uma matemática simples: enquanto há mais de 6,4 bilhões de conexões móveis no mundo atualmente, de acordo com dados da Ericsson de junho de 2013, com a IoT isso aumenta para mais 5 bilhões de dispositivos com os quais poderemos nos conectar.Numerous opportunities will emerge as more and more data is generated by machines ('things') than human beings, such as to analyze and use vast amounts of data, to store data and source application functionality in/from the cloud, to create, manage and support apps that enable the operation and management of IoT implementations and to provide high speed connectivity between objects and the people, who work with them and use them."To analyze and use vast amounts of data.To store data and source application functionality in/from the cloud.To create, manage and support apps that enable the operation and management of IoT implementations.To provide high speed connectivity between objects and the people, who work with them and use them.The biggest revenue opportunity today for an IoT ecosystem is transportation and logistics. The deployment of low cost IP enabled sensors within ‘things’ that move products around as well as within products themselves, opens huge opportunities beyond supply chain optimization.Airbus is an excellent example of the use of sensors to drive performance in the transportation sector. The components that make up an A380 are fitted with sensors that can monitor ‘wear and tear’ in real time. This allows Airbus to create a dynamic maintenance process optimized by data continually being generated from components that are being used. From a technology perspective this requires a huge amount of storage and application functionality, as well as data analysis. Cloud computing, big data technologies and lower cost sensors will enable aircraft manufacturers and airlines to transform and optimize their maintenance processes.Other industries are opening up to the opportunities created by the IoT. Smart cities, connected cars, and connected health are examples of transformations that are being driven by IoT. There is also a lot of interest in how the IoT will impact manufacturing. Soon, managers in the manufacturing sector will monitor and manage machinery from their mobile devices. The activity of specialized machinery such as drills will be monitored using myriad of sensors. This will enable manufacturers to replace expensive machinery based on usage rather than based on the amount of time the machine has been installed. These developments and others have huge implications on the way manufacturing plants are designed, operated and maintained.Key IoT ChallengesThe IoT is dependent on cloud computing, high speed connectivity and powerful data analysis tools. Issues around reliable connectivity and enterprise grade cloud computing services still exist. Reliability and performance issues will need to be addressed to allow the potential of IoT to be realized.As more machines operate independently of human beings, the potential risks associated with security breaches multiply. Hacking a self driving car or an aircraft navigation system could have devastating consequences. Technology vendors must continually ensure that IoT technology is secure and that there are processes to address security breaches.Although the ever increasing number of ‘things’ is expected to be IP enabled, it remains important that standards emerge, as ‘things’ may not be able to communicate with each other and the people that engage with them. There remains a risk that we create an ‘Internet of Silos’.In summary, as cloud, data analytics, mobility and connectivity technologies mature, the IoT will open up enormous new opportunities across industries. Activities that were once the domain of specialized industry vendors will become open to the world’s leading technology firms. Technology vendors will place much greater focus on industry specific activities as they seek to fully benefit from the IoT and connected industries.Ejemplo: http://www.forbes.com/sites/greatspeculations/2014/01/17/googles-strategy-behind-the-3-2-billion-acquisition-of-nest-labs/Google announced that it has entered into an agreement to acquire Nest Labs, the maker of high-tech thermostats and smoke detectors, for $3.2 billion. The deal is the second biggest in Google’s history after the $12.5 billion acquisition of mobile phone manufacturer Motorola. Through this acquisition Google will gain a firm footing in the growing market for web-connected household appliances. Moreover, this deal can also strengthen Google’s footprint in an urban householdGoogle has been trying to strengthen its presence in an urban household for a long time. In the past, some of its attempts such as the launch of Smart TV have failed to deliver desired results, while other attempts such as Chromecast Dongle have met mild success. Google’s support for Android OS for electronic devices is driven by its strategy to expand the footprint and create a robust ecosystem of interconnected devices. However, despite these efforts, Google has not made much headway in this direction.Internet of THings (IoT) refers to objects or devices that can be uniquely identified through radio frequency identification, and their virtual representations in an Internet-like structure. According to Gartner, there will be 26 billion devices on IoT by 2020. According to a report by Progressive Policy, IoT is expected to contribute $600 billion to $1.3 trillion to the U.S. economy in 2025.Nest Labs currently manufactures a smart thermostat, which learns a user’s habits over time and adjusts the temperature accordingly. These devices run on algorithms that infuse them with the ability to talk to each other. That way they can profile human behavior and anticipate the users’ needs even before they know it.We believe that Google can leverage Nest’s technical prowess and manpower to develop the next generation of Internet-enabled home gadgets and speed up the development process. Furthermore, by expediting the development process, Google can have first mover advantage and leapfrog competition in the IoT market. A platform for Internet-connected home devices powered by Google will help both companies capture a bigger share of the $600 billion IoT market.However, there are concerns about the use of this technology. Opponents claim that installing such devices and collecting data will invade user privacy. Google could use this data to influence consumer behavior, market products and even dictate a user’s lifestyle, thereby infringing on privacy. While it is too early to speculate on the kind of products Nest Labs might develop under Google’s stewardship, we will continue to watch out for any new developments.
  • We are about to close this presentation, but before doing that, will like to share some summarize key takeaways. We are not entering into a new era in Latam businesses, the era of Partnership and Multi-Industries Convergence The ICT industry is increasingly more competitive, but more unsustainable than before as is constantly suffering from challenging new market forces. La gran mayoria de lasempresas de tecnología en América Latina es o menos rentable (ganamenos) quehacealgunosañosatras, o ha realizadorecientementeinversionespocolucrativas o tienecostoshumanoscadavez mas caros, especialmente en paísescomoBrasil o Argentina.A solução encontrada por algunasempresas é firmar parcerias estratégicas que trazem sinergias e mais importantemente força para monetizar nichos de mercado e oportunidades emergentes. Sin embargo, no me refiero unicamente a alianzas entre empresas de ICT, sino que Parcerias, fusões e aquisições entre agentes de diversas indústrias (como Salud, Industria, Energia e Infraestructura) tem se tornado um evento cada vez mais comum nos últimos 18 meses.RECOMENDACION: In an increasingly competitive scenario, ICT players should assess co-opetition relationships to effectively monetize emerging opportunitiesWithin this context, Companies needs to stretch their current portfolio. Integrate disruptive and emerging technologies and Be Proactive, new ideas create new businesses and generate more revenue sources.EJ : Data prices will become commoditised, with Value Added Services driving revenue - customer access points, security, contentEjemplo:VerticalizaciónICT companies should organize strategic business units (solutions portfolio, pre and post sales capabilities, marketing and communication efforts, go-to-market strategies) solely dedicated to identify and surpass the needs of different industry needs.
  • While this is going on in Latin America, what is happening around us? Let me share F&S top 10 ideas and innovations thatwill shape OUR world in 2014VIRTUAL CURRENCYDigital wallets will move to become more digital, mobile and based on open source, peer-to-peer networks (such as bitcoin). Marketing channels and retail strategies will in tandem become more interactive, fully digital and will be focussed on creating wholly immersive virtual experiences for the customer.WEARABLE DEVICES:Wearable devices, or body-borne devices, will become particularly useful for applications such as healthcare. Products will evolve to a wider spectrum ranging from smart watches to even wearable clothing for new born babies that measures vital signs. PERSONAL ROBOTSRapid Advancement in M2M technology and artificial intelligence will further enhance the field of robotics— even making massive strides with domestic applications. Personal robots will fulfil many household tasks including cleaning, assisted living for the elderly and even window washing.LAST MILE INNOVATION: SHIPPING WARSWith Amazon piloting Unmanned Aerial Vehicles for deliveries, we will soon see retailers and logistic service providers innovating in last mile delivery options to keep in tandem with growth in online retail. Delivery services will be a lot more personalized and 90 minute delivery windows will become shorter.“ME” COMMERCE:Big data analytics will focus more on social analytics, enabling companies to develop more personalized and customized products and solutions. Integration of supply chain and retail strategies to social media platforms will enable development of products closer to individuals’ taste and preferences.ONLINE RETAIL HITS B2B:B2B retail will now see a shift to online retailing, enabling retailers to showcase the complete range of products and services to their customers. Combined with QR codes and augmented reality, B2B online retail will enable automated replenishment alerts and faster procurement cycles.GAMIFICATIONIncreasing adoption of game-based mechanics such as leader boards, social plug-ins, virtual goods, rewards, etc. by businesses is expected to drive the global Gamification market to grow at a rate of nearly 100 percent every year, becoming an over $4-5 billion market by 2015.AUGMENTED REALITY TO BECOME A PERSONAL SHOPPER:Apple recently announcing iBeacon is a testimony that AR will take a massive leap in 2014. AR shopping apps and in-store location technology will get a lot more sophisticated, even providing turn-by-turn directions as a customer shops within the store.SOCIAL TV: POWER TO THE PEOPLEAs apps become game-changers when bundled, we will find social TV evolving towards integrating services from multi-channel providers (such as AT&T, BT) to second screen technology players (Apple TV and Netflix), making TV-watching a unified entertainment experience in 2014.3D PRINTING3D printing has become one of the premier disruptive technologies in transforming traditional industrial models. The prices of 3D printers will decrease makingthem more accessible, even for consumers.
  • A Unify é uma empresa nova, mas uma baita história da qual todos nós fazemos parte.A Unify já nasceu com aquele DNA de engenharia da Siemens. Herdamos a confiabilidade dos produtos, inovação, padrões abertos e segurança para oferecer soluções integradas de comunicações para 75% da Global 500. Permanecemos uma das maiores empresas de comunicação e serviços com 40 milhões de usuários no mundo, com mais de 5,000 profissionais de serviços.É sempre bom lembrar disso e relembrar os clientes, atuais ou novos que virão. Assistam ao vídeo sobre a nossa história e se possível compartilhem com seus clientes e parceiros.
  • Change the logo’s color with the line one

Transcript

  • 1. ICT Industry Track GIL 2014: Latin America The Global Community of Growth, Innovation and Leadership 30tH January, 2014 São Paulo, Brazil 1
  • 2. ICT Industry Track Agenda 1. Presentation: What are the key technology trends that will impact your business in 2014? 2. Case Study Presented by UNIFY 3. Interactive ICT Panel Discussion 2
  • 3. ICT Industry Track Presentation: “What are the key technology trends that will impact your business in 2014?” GIL 2014: Latin America The Global Community of Growth, Innovation and Leadership 30tH January, 2014 São Paulo, Brazil 3
  • 4. Latin American Landscape The impact of politics and economic performance will shape the ICT Industry spending during 2014 2014 Presidential Elections in seven countries in Latin America will impact decision making processes. Economic stability in Latin America will still drive foreign capital to the region, which has a direct impact on the adoption of technology. . Projected GDP Growth 2014 Country Brazil Colombia Uruguay 4.5% Peru 5.5% Mexico 3.5% LATIN AMERICA Panama 4.0% Colombia El Salvador 2.6% Chile Costa Rica 2.6% Brazil Bolivia Argentina 3.2% Table source: CEPAL Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 4
  • 5. From testing the cloud to implementing it during 2014 Cloud implementations in Latin America will increasingly be hybrid, leveraging existent client investments and infrastructure, while blending private and public clouds. Cloud is increasingly Hybrid Cloud is Disruptive Cloud is Strategic Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 5
  • 6. To be (safe), or not to be (safe): that is the question for Cloud Why Cloud may be more secure than your own infrastructure Major Cloud Providers can attract and retain highly qualified cyber-security personnel. Cloud Providers spend more money on redundancy and security than any other type of company. In storage and transmission, all the data is encrypted. With cloud-based solutions, you are always on the latest release. Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 6
  • 7. Towards an enhanced enterprise security environment While BYOS (Bring Your Own Security) will be consider as a response to BYOD, an increased use of encryption systems and biometric technologies are also expected Source: Frost & Sullivan analysis Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 7
  • 8. Network Security: 2014 Big Predictions The Year Ahead USABILITY ACQUISTIONS BIOMETRICS Security vendors will increasingly differentiate based on “usability.” A multi-billion dollar acquisition in 2014 will accelerate the pace of mergers and acquisitions in the network & information industry. 2014 will be a growth year for biometric authentication. FOLLOW-ME DATA PROTECTION Market demand for follow-me data protection solutions will intensify. Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 8
  • 9. Consumerization and BYOT The consumerization of IT is changing the way people collaborate and how enterprises manage their communications. Bring Your Own Technology (BYOT) is the tangible consequence of this. Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 9
  • 10. What enterprise users expect from Mobile Services in 2014? New services must help consumers to reduce complexity, save time and reduce stress through centralized management, and providing better control of spending and usage Instant access everywhere Customization Location-based Switching off Assisted Productivity Enhanced togetherness Control Source: Ericsson ConsumerLab Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 10
  • 11. Key impacts behind Mobility The real impact of Mobility could only be fully comprehensible when taking in consideration other underlying but significant trends MOBILITY Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 11
  • 12. Collaborating on the new Workspace As long as people can connect and contribute in an effective way, it won’t matter where their contribution originates, or when they choose to engage. . The Work-Life Blur From Deadlines to Commitments Boss-less Work You Will be Evaluated by What You Do Redefining the Office Reimagined Meetings Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Communications Big Data Key Takeaways Q&A 12
  • 13. Ubiquitous Video Video has become a key communications media for both personal and work environments  Smartphones, Laptops, Tablets, Video Rooms, Telepresence and so on… Latin America will have 1.3 billion connected devices in 2016  From consumer-to-consumer interactions to business-toconsumer interactions  Plug and Play, in any device and for everyone from everywhere Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Communications Big Data Key Takeaways Q&A 13
  • 14. Social Media Companies are recognizing the value of social media as a marketing and branding tool, as well as a customer service and support channel. It is also becoming a core consumer and business-user forum. Latin America is one of the fastest growing regions in the globe in terms of social network users. 5 Latin American countries were among the TOP 10 nations in terms of average hours per visitor spent on social networking sites (per Month) 5 Latin American countries are among the top 20 nations with the highest number of LinkedIn users worldwide. Latin American Landscape Cloud Security Social networking enterprise tool is top of mind, but larger business adoption lags. Social can boost sales, marketing, customer care, and internal collaboration, but ROI is hard to measure. Companies have begun to execute “omnichannel” strategies to provide a consistent customer experience, regardless of the channels and devices customers use. Mobility Unified Unified Comms Communications Big Data Source: Frost & Sullivan analysis Key Takeaways Q&A 14
  • 15. The 4v Engine for Big Data Key features that are shaping the future of Big Data Volume Velocity Variety Value Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 15
  • 16. Translating Big Data into Competitive Advantage Learn more about your customers and act faster than your competition Only two sources of competitive advantage Learn more about your customers faster than the competition Turn that learning into action faster than the competition. Jack Welch Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 16
  • 17. The Internet of Things (IoT) In 2014, more data will be generated by machines (things) than by human beings. The explosion of IoT will be driven by the nexus of low cost sensors, cloud computing, advanced analytics and mobility.     To analyze and use vast amounts of data. To store data and source application functionality in/from the cloud. To create, manage and support apps to operate and manage IoT implementations. To provide high speed connectivity between objects and the people.  Reliability and performance issues will need to be addressed.  Potential risks associated with security breaches multiply.  It remains important that standards emerge, as " things” may not be able to communicate with each other. Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 17
  • 18. Key Takeaways In an increasingly competitive scenario, ICT players should assess cooperation relationships, alliances and acquisitions to effectively monetize emerging opportunities. Integrate disruptive and emerging technologies. Be Proactive, new ideas create new businesses and generate more revenue sources. Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 18
  • 19. Predicting the top 10 ideas and innovations that will shape the world in 2014 Source: Frost & Sullivan analysis. Latin American Landscape Cloud Security Mobility Unified Comms Big Data Key Takeaways Q&A 19
  • 20. Q&A Juan Manuel Gonzalez, Industry Manager Frost & Sullivan juan.gonzalez@frost.com Connect with me on social media: @juanmgon http://ar.linkedin.com/pub/juan-manuel-gonzalez/6/3b2/8a0 Latin American Landscape Cloud Mobility Security Unified Comms Big Data Key Takeaways Q&A 20
  • 21. ICT Industry Track Case Study Presented by UNIFY GIL 2014: Latin America The Global Community of Growth, Innovation and Leadership 30tH January, 2014 São Paulo, Brazil 21
  • 22. The past decade has seen dramatic technological advances – ones that promise a more fluid, dynamic way to work.
  • 23. Today we serve approximately 75% of the Global 500 in 90 countries
  • 24. This is a hyperconnected world of mobile inspiration and instant collaboration. Anywhere workers demand responsive delight from the communications tools they use every hour of every day.
  • 25. We partnered with user insights expert, frog, in supporting us to learn more about our customers and translate their daily work environment and needs into design principles and user experiences that reshape business communication. Once the project was ready to be developed we conducted a market assessment to validate Ansible’s market viability. With rapid prototyping we got early user feedback on our concepts. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 26
  • 26. Personas Interviews Tests Prototyping “The value was seen to be in the whole experience, Rather than in its features/functions individually” frog research Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 27
  • 27. The workplace has changed Business today is on the move. We don’t often have the luxury of conducting business from our office. Users expect intuitive communication tools across devices. WORK IS MOBILE Copyright © Unify GmbH & Co. KG 2013. All rights reserved. CONSUMER DEVICES LEAD JOY OF USE IS EXPECTED CONVERSATIONS ARE MULTI-MODAL & GLOBAL 28
  • 28. Business is mobile Today, 35% of the world’s professionals are away from their primary workplace 20% or more of the time. The mobile workforce is a 1.2 Billion employee population and growing. 35% Away from the desk 20% Of the work time Source: IDC “Worldwide Mobile Worker Population 2009–2013 Forecast” of June 2010. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 29
  • 29. Business is mobile We spend so much time orchestrating work, we have little time to actually do work. 79% Work in Virtual teams 75% Are distracted In meetings 56% Are less Productive Source: Siemens Enterprise Communications global research conducted September/October 2012 Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 30
  • 30. “Business is about relationships and relationships start with a conversation.” Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 31
  • 31. Project Ansible helps you start the conversation, stay abreast of the people and topics that matter, and keep the conversation going, in any setting, on any device. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 32
  • 32. One view Across devices and communication channels – Project Ansible pulls multiple content sources into a singular view. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 33
  • 33. Vibrant Conversations Communication comes alive with people and content you care about. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 34
  • 34. Thought trails Find what you need, when you need it. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 35
  • 35. Intelligent spaces Smart system shows only content that matters to you. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 36
  • 36. Seamless transitions Seamless and intuitive transitions across virtually any device or channel. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 37
  • 37. Intuitive use Easy to join and participate, and easy for IT to support. Copyright © Unify GmbH & Co. KG 2013. All rights reserved. 38
  • 38. 40
  • 39. ICT Industry Track Interactive ICT Panel Discussion GIL 2014: Latin America The Global Community of Growth, Innovation and Leadership 30tH January, 2014 São Paulo, Brazil 41