SlideShare a Scribd company logo
1 of 16
The Smarter Social Enterprise
Are you Keeping UP?
Is this what it seems like . . . .
Long long time ago
IT Evolution
• 1.0
• Dictated by the IT Dept
• They were Experts/Specialists
• Static, utilitarian
• Fixed
• Computers were a ‘Black Art’
• They had total Control
• They Drove the Business
• What they ‘Allowed’ - went !
• . . . .we were in awe of them!
Long time ago
Business Drives IT
IT 2.0
• Responsive to the needs of
the business
• Flexible, agile
• Mobile
• Business drove IT
• IT begins to deliver Value
Today
The Age of Human IT y
• Users Drive IT
• Built around their lives
and preferences
• leveraging the power and
mobility of smart devices
and applications
• Adaptive to individual
user habits
• Intuitive; Real time
• Social
Our Vision
The Smarter
Social Enterprise
Smarter Social Enterprise
Device Choice - BYOD
Device Diversity
Mobility Habits
Day Shifting/Extending
Move to Cloud &
SAAS
Application
Preference - Self
Served
Smarter . . . .Users
Digital Immigrant
Digital Native . . . .
....they know more than
the average IT Guy!!!!
Smarter....devices
Smarter....applications
Smarter...Ways of Working
• Work is a thing they do, NOT a Place they go . .
• Time Shifting
• Day Extending
• Adapting Apps
• www.workliveplay.com
Interface, Input, Use
Smarter...Consumption
• ‘Smart Device’ users
consume more than
triple the data than
a mobile lap top
user
• Everything has to be
available...NOW!
Some specifics
• 2009 1 billion apps downloaded
• 2013 2 billion Apps/Week
• 26,000 apps submitted weekly to
App Store
• >10 billion Smart Devices 2015
• >24 billion By 2024
• Average Users Have >100 Apps
• . . . . . When the App is free, the
user is usually the product!!!!
Application availability
75,000
>2milion!
Smarter Devices
Smarter Attacks
• The smart mobile landscape is changing more
rapidly than many enterprises can manage
• Diverse app markets with millions of apps, billions
of app downloads
• “Bring Your Own Device” (BYOD)
– 80% of apps on employee devices do not
comply with enterprise security requirements
[1]
• Mobile Platforms are attractive target for malware
developers
– 50% of Android phones have unpatched
vulnerabilities [2]
– Number of mobile malware increased from
14,000 to 40,000 from July ’11 to May ’12 [3]
Sources:
[1] Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats, Aug 2012
[2] Duo Security, X-Ray tool report, Sep 2012
[3] Cybersecurity Policy Report, Sep 2012

More Related Content

What's hot

IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)Şafak Saylam
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12ayoungkin
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
Internet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsInternet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsGunjan Panara
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
Smartphone and internet of things (io t)
Smartphone and internet of things (io t)Smartphone and internet of things (io t)
Smartphone and internet of things (io t)iFixScreens
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things Simplified
Internet of Things SimplifiedInternet of Things Simplified
Internet of Things SimplifiedMayur Rawte
 
How to Win in the IoT World
How to Win in the IoT WorldHow to Win in the IoT World
How to Win in the IoT WorldYeongjae Kang
 

What's hot (20)

Internet of things PPT
Internet of things PPTInternet of things PPT
Internet of things PPT
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
What is IoT?
What is IoT?What is IoT?
What is IoT?
 
Internet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsInternet of Things(IoT) & Applications
Internet of Things(IoT) & Applications
 
Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Smartphone and internet of things (io t)
Smartphone and internet of things (io t)Smartphone and internet of things (io t)
Smartphone and internet of things (io t)
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things Simplified
Internet of Things SimplifiedInternet of Things Simplified
Internet of Things Simplified
 
How to Win in the IoT World
How to Win in the IoT WorldHow to Win in the IoT World
How to Win in the IoT World
 

Similar to Smarter social enterprise

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Larry Smith
 
Enterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesEnterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesAlgarytm
 
Enterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and OpportunitiesEnterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and OpportunitiesPropel Apps
 
Enterprise mobility challenges and opportunites
Enterprise mobility   challenges and opportunitesEnterprise mobility   challenges and opportunites
Enterprise mobility challenges and opportunitesAlgarytm
 
Consumerization & Predictive Analytics
Consumerization & Predictive AnalyticsConsumerization & Predictive Analytics
Consumerization & Predictive AnalyticsSoftware Park Thailand
 
1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptxAMITKUMARSINGH756828
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!Echelon Design
 
Nine rocketships firstcall
Nine rocketships firstcallNine rocketships firstcall
Nine rocketships firstcallTedd Fox
 
MD-I-CH-ppt.ppt
MD-I-CH-ppt.pptMD-I-CH-ppt.ppt
MD-I-CH-ppt.pptbharatt7
 

Similar to Smarter social enterprise (20)

Mobile Era & Mobility
Mobile Era & MobilityMobile Era & Mobility
Mobile Era & Mobility
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
How... Do you know?
How... Do you know?How... Do you know?
How... Do you know?
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...
 
Enterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesEnterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunites
 
Enterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and OpportunitiesEnterprise Mobility - Challenges and Opportunities
Enterprise Mobility - Challenges and Opportunities
 
Enterprise mobility challenges and opportunites
Enterprise mobility   challenges and opportunitesEnterprise mobility   challenges and opportunites
Enterprise mobility challenges and opportunites
 
Consumerization & Predictive Analytics
Consumerization & Predictive AnalyticsConsumerization & Predictive Analytics
Consumerization & Predictive Analytics
 
1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!Social Media and Mobile Event Technology, Tools, and Apps Oh My!
Social Media and Mobile Event Technology, Tools, and Apps Oh My!
 
Nine rocketships firstcall
Nine rocketships firstcallNine rocketships firstcall
Nine rocketships firstcall
 
MD-I-CH-ppt.ppt
MD-I-CH-ppt.pptMD-I-CH-ppt.ppt
MD-I-CH-ppt.ppt
 

More from Elsa Cariello

Exclusive Group is Recruiting!
Exclusive Group is Recruiting!Exclusive Group is Recruiting!
Exclusive Group is Recruiting!Elsa Cariello
 
Exclusive Group Love Campaign Infographic
Exclusive Group Love Campaign InfographicExclusive Group Love Campaign Infographic
Exclusive Group Love Campaign InfographicElsa Cariello
 
Exclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable BondExclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable BondElsa Cariello
 
Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership". Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership". Elsa Cariello
 
How to join the twitter chat with Druva
How to join the twitter chat with Druva How to join the twitter chat with Druva
How to join the twitter chat with Druva Elsa Cariello
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesElsa Cariello
 
How to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks GroupHow to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks GroupElsa Cariello
 
Carm presentation new logo may 14
Carm presentation  new logo may 14Carm presentation  new logo may 14
Carm presentation new logo may 14Elsa Cariello
 
Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place. Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place. Elsa Cariello
 

More from Elsa Cariello (9)

Exclusive Group is Recruiting!
Exclusive Group is Recruiting!Exclusive Group is Recruiting!
Exclusive Group is Recruiting!
 
Exclusive Group Love Campaign Infographic
Exclusive Group Love Campaign InfographicExclusive Group Love Campaign Infographic
Exclusive Group Love Campaign Infographic
 
Exclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable BondExclusive Group and Palo Alto and the Unbreakable Bond
Exclusive Group and Palo Alto and the Unbreakable Bond
 
Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership". Why Exclusive Group and Fortinet are a solid "partnership".
Why Exclusive Group and Fortinet are a solid "partnership".
 
How to join the twitter chat with Druva
How to join the twitter chat with Druva How to join the twitter chat with Druva
How to join the twitter chat with Druva
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
How to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks GroupHow to join a Twitter Chat from Exclusive Networks Group
How to join a Twitter Chat from Exclusive Networks Group
 
Carm presentation new logo may 14
Carm presentation  new logo may 14Carm presentation  new logo may 14
Carm presentation new logo may 14
 
Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place. Infographic on why you need CARM when’a cyber breach take place.
Infographic on why you need CARM when’a cyber breach take place.
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Smarter social enterprise

  • 1. The Smarter Social Enterprise
  • 2. Are you Keeping UP? Is this what it seems like . . . .
  • 3. Long long time ago IT Evolution • 1.0 • Dictated by the IT Dept • They were Experts/Specialists • Static, utilitarian • Fixed • Computers were a ‘Black Art’ • They had total Control • They Drove the Business • What they ‘Allowed’ - went ! • . . . .we were in awe of them!
  • 4. Long time ago Business Drives IT IT 2.0 • Responsive to the needs of the business • Flexible, agile • Mobile • Business drove IT • IT begins to deliver Value
  • 5. Today The Age of Human IT y • Users Drive IT • Built around their lives and preferences • leveraging the power and mobility of smart devices and applications • Adaptive to individual user habits • Intuitive; Real time • Social
  • 7. Smarter Social Enterprise Device Choice - BYOD Device Diversity Mobility Habits Day Shifting/Extending Move to Cloud & SAAS Application Preference - Self Served
  • 8. Smarter . . . .Users Digital Immigrant Digital Native . . . . ....they know more than the average IT Guy!!!!
  • 11. Smarter...Ways of Working • Work is a thing they do, NOT a Place they go . . • Time Shifting • Day Extending • Adapting Apps • www.workliveplay.com
  • 13. Smarter...Consumption • ‘Smart Device’ users consume more than triple the data than a mobile lap top user • Everything has to be available...NOW!
  • 14. Some specifics • 2009 1 billion apps downloaded • 2013 2 billion Apps/Week • 26,000 apps submitted weekly to App Store • >10 billion Smart Devices 2015 • >24 billion By 2024 • Average Users Have >100 Apps • . . . . . When the App is free, the user is usually the product!!!!
  • 16. Smarter Devices Smarter Attacks • The smart mobile landscape is changing more rapidly than many enterprises can manage • Diverse app markets with millions of apps, billions of app downloads • “Bring Your Own Device” (BYOD) – 80% of apps on employee devices do not comply with enterprise security requirements [1] • Mobile Platforms are attractive target for malware developers – 50% of Android phones have unpatched vulnerabilities [2] – Number of mobile malware increased from 14,000 to 40,000 from July ’11 to May ’12 [3] Sources: [1] Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats, Aug 2012 [2] Duo Security, X-Ray tool report, Sep 2012 [3] Cybersecurity Policy Report, Sep 2012