Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Seoul gov_keynote

658 views

Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Seoul gov_keynote

  1. 1. Mobile Strategy for Public
  2. 2. Part 1. Mobile with social ✔ Trend Watching ✔
  3. 3. Part 2. ✔ ✔
  4. 4. Part 1. Mobile with social
  5. 5. apple
  6. 6. 3 18%
  7. 7. 9 10 3 18%
  8. 8. 9 10 3 18% UX
  9. 9. 9 10 3 18% UX SDK , app store
  10. 10. 9 10 3 18% UX SDK , app store 1
  11. 11. 9 10 3 18% UX SDK , app store 1
  12. 12. 9 10 3 18% UX SDK , app store 1
  13. 13. 9 10 3 18% UX SDK , app store business convergence 1
  14. 14. 9 10 3 18% UX SDK , app store business convergence 1
  15. 15. 9 10 3 18% UX SDK , app store business convergence 1
  16. 16. google
  17. 17. SW
  18. 18. SW Android Market
  19. 19. SW Android Market
  20. 20. SW Android Market apple vs apple
  21. 21. SW Android Market apple vs apple
  22. 22. SW Android Market apple vs apple 40 12
  23. 23. SW Android Market apple vs apple 40 12 Google API
  24. 24. SW Android Market apple vs apple 40 12 Google API Value chain
  25. 25. Social
  26. 26. , , , , , ?
  27. 27. , , , , , ?
  28. 28. , Who, , When, , Where, , , ?
  29. 29. , Who, , When, Mobile , Where, , , ?
  30. 30. , Who, , When, Mobile , Where, , , ?
  31. 31. , Who, , When, Mobile , Where, , , Creating public ?
  32. 32. Social Player
  33. 33. @conanObrein @lovelyButton 95,832 26,763 1 1,230
  34. 34. Social platform 4 /50%/55m 2010 mobile
  35. 35. GET satisfaction
  36. 36. Social GET satisfaction driven
  37. 37. blah blah blah blah blah blah MOBILE blah blah blah blah blah blah MOBILE blah blah blah blah blah blah MOBILE blah blah blah MOBILE, MOBILE blah blah blah blah blah blah blah blah blah blah blah blah MOBILE blah blah blah blah blah blah MOBILE blah blah blah blah blah blah MOBILE blah blah blah MOBILE, MOBILE,
  38. 38. ..
  39. 39. .. ?
  40. 40. .. ? ?
  41. 41. .. ? ? .. -.-a
  42. 42. .. ? ? 3 .. .. -.-a
  43. 43. .. ! ? ? 3 .. .. -.-a
  44. 44. Part 2.
  45. 45. real time
  46. 46. real time + place
  47. 47. real time + place + me
  48. 48. Native APP M.WEB + - 1/150,000
  49. 49. Native APP M.WEB + - 1/150,000
  50. 50. Native APP M.WEB + - 1/150,000
  51. 51. Native APP M.WEB + - 1/150,000
  52. 52. Native APP M.WEB + - 1/150,000
  53. 53. Native APP M.WEB + - 1/150,000 Hybrid Web
  54. 54. Native APP M.WEB + - 1/150,000 cross platform frame work
  55. 55. ✔ -1 200403 SCN / jsp,java 200605 jsp,java 200504 php 200209 Delphi 200806 jsp,java 200702 jsp,java 200004 php 200402 jsp,java 200904 jsp,java 200006 / Delphi 200207 php 200302 php 200703 jsp,java 200503 jsp,java 200405 jsp,java 200407 php 200501 jsp,java 200801 jsp,java 200902 jsp,java 200803 jsp,java 200901 jsp,java 200707 jsp,java
  56. 56. ✔ -2 1. 2. 10,000 100 1,000 ~10,000 10 ~100 1000 10 3. 4. 2009 11 ~ 2010 04 , Web tune
  57. 57. ✔ ● : / ● : ● : ● : jsp, java 1 2 3 4 5 mobility real time place data share , personalize
  58. 58. ✔ ● : / ● : ● : ● : jsp, java 1 2 3 4 5 mobility real time place data share , personalize
  59. 59. ✔ ● : / ● : ● : ● : jsp, java 1 2 3 4 5 mobility real time place data share , personalize
  60. 60. mobility
  61. 61. mobility real time
  62. 62. mobility real time place
  63. 63. data mobility real time place share
  64. 64. data mobility real time place share
  65. 65. -
  66. 66. ✔ Mobile Security - 1
  67. 67. ✔ Mobile Security - 1 HW NAC(Network Access Control) (EndpointIntegrity)
  68. 68. ✔ Mobile Security - 1 HW NAC(Network Access Control) (EndpointIntegrity) SW
  69. 69. ✔ Mobile Security - 2
  70. 70. ✔ Mobile Security - 2 Non-virtualized system
  71. 71. ✔ Mobile Security - 2 Non-virtualized system HW
  72. 72. ✔ Mobile Security - 2 Non-virtualized system Single Domain Private Malwar Data App e App OS HW
  73. 73. ✔ Mobile Security - 2 Non-virtualized system Single Domain Private Malwar Data App e App OS HW
  74. 74. ✔ Mobile Security - 2 Non-virtualized system virtualized system Single Domain Private Malwar Data App e App OS HW
  75. 75. ✔ Mobile Security - 2 Non-virtualized system virtualized system Single Domain Private Malwar Data App e App OS HW HW
  76. 76. ✔ Mobile Security - 2 Non-virtualized system virtualized system Single Domain Private Malwar Data App e App OS VMM HW HW
  77. 77. ✔ Mobile Security - 2 Non-virtualized system virtualized system secure Single Domain domain Private Malwar Private Data App e Data Apps App OS OS1 VMM HW HW
  78. 78. ✔ Mobile Security - 2 Non-virtualized system virtualized system secure general Single Domain domain domain Malwar Malwar Private App Private Apps general e Data e Data Data App App OS OS1 OS2 VMM HW HW
  79. 79. ✔ Mobile Security - 2 Non-virtualized system virtualized system secure general Single Domain domain domain Malwar Malwar Private App Private Apps general e Data e Data Data App App OS OS1 OS2 VMM HW HW
  80. 80. ✔ Mobile Security - 3
  81. 81. ✔ Mobile Security - 3 Wireless Attack Viruses & Worms Break-in Attack DoS Attack
  82. 82. ✔ Mobile Security - 3 Wireless AD-hoc Attack WIDPS (Wireless Intruction Detection and Prevention System) Viruses & Worms Break-in APP Attack , DoS Attack
  83. 83. ✔ Mobile Security - 3 Wireless AD-hoc Attack WIDPS (Wireless Intruction Detection and Prevention System) Viruses & Worms Break-in APP Attack , DoS Attack Loss or Theft
  84. 84. ✔ Mobile Security - 3 Wireless AD-hoc Attack WIDPS (Wireless Intruction Detection and Prevention System) Viruses & Worms Break-in APP Attack , DoS Attack Loss or Remote Wiping Theft

×