The document discusses how mobile computing is impacting IT and driving massive changes. It notes that new device platforms like smartphones and tablets, new apps, and new user expectations are forcing changes. Specifically, there is now explosive growth in mobile devices, new types of apps, demands for access from anywhere, and expectations of better consumer technologies. This is changing how IT needs to deliver business apps and data to users in a secure yet productive way. It examines trends in mobile operating systems like Android and iOS and challenges like fragmentation. It also explores options for managing devices, apps, data and security in this new environment.
This document outlines the strategy for Nokia to regain the market share in smartphone market.
The views expressed in this article purely belongs to the authors of the article. Neither the college nor the professors endorses the article
Report on smartphone industry and their effects on indian marketAkshRay9001
Mobile Phone market : How Chinese mobile phones took over the Indian market: Local smartphone industry witnesses a boom with Make in India: India’s Mobile Market Rises to the 2nd Largest In The World: Effects of the Growth of India’s Mobile Market
This document outlines the strategy for Nokia to regain the market share in smartphone market.
The views expressed in this article purely belongs to the authors of the article. Neither the college nor the professors endorses the article
Report on smartphone industry and their effects on indian marketAkshRay9001
Mobile Phone market : How Chinese mobile phones took over the Indian market: Local smartphone industry witnesses a boom with Make in India: India’s Mobile Market Rises to the 2nd Largest In The World: Effects of the Growth of India’s Mobile Market
Mobile subscribers grew multiple folds over the last decade which also led to an increase in the mobile phone sales in India. This uptake in the market in recent years has changed the dynamics of the mobile phone retail market. In this research note from Ipsos Business Consulting, we present the landscape of the mobile phone retail market, including the mobile phone growth, smartphone penetration, emergence of domestic handset players, mobile retail market trends and our outlook.
How to take you website mobile. Sitecore and guest presenters discussing mobile website. Perfect for anyone interested in making there website mobile friendly.
In this presentation we have discussed about the
Strength, Weakness, Opportunity, Threats (SWOT).
We have also discussed about the major cause of downfall of Nokia.
marketing strategy
smartphone case study
• Introduction
• Smartphones industry in last few years
• Major players and their strategies
• Differences between Apple & Samsung marketing strategy
• More success company
• Particular naming strategy used by company in this industry
• Key success factor in current industry
• Similarities between Marketplace simulation & Mobile phone industry
• Lesson drawn from mobile phone industry which could be used in Marketplace simulation
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsGreenwich Consulting
After another exciting year at Mobile World Congress 2013, which took place in Barcelona from February 25th to 28th, Greenwich Consulting share with you the main announcements that were made, and to put it in perspective with the major trends in the mobile industry.
Highlights of the paper include:
- Aggressive competition from Chinese handset vendors who could capture 1/3 of the global smartphones shipment volume by 2016
- The battle of mobile OS continues: the emerging market is identified as significant growth driver for handset manufacturers, with the goal to introduce low-cost Smartphones priced under 100$. In order to reach this psychological entry price point, they are looking at some ways to reduce costs, particularly on OS license fees. In this context, adopting alternative OS like Firefox mobile could represent an interesting opportunity vs. Android
- The new Samsung-VISA partnership in Digital-Payments, which is opposed to mobile operators’ SIM-centric NFC strategies and is another sign of the Korean manufacturer’s strategy to tackle Apple’s supremacy, especially in services innovation
- The come-back of Small cells: beyond LTE migration, telecom equipment vendors are being optimistic and plan to increase network infrastructure investments for very dense areas in mature countries, with the goal of increasing both coverage and capacity. Yet we don’t expect a general roll-out of this kind of technology, given the required additional investments and subsequent operational issues (Backhauling is a prerequisite for massive metro cell roll-out, and global maintenance costs can be prohibitive due to the large number of installations)
We hope you'll have a great reading and feel free to contact us with any comments or questions.
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
VMworld Europe 2013
Andrew Hawthorn, VMware
Stig Andersson, UBS
Herve Hulin, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Mobile subscribers grew multiple folds over the last decade which also led to an increase in the mobile phone sales in India. This uptake in the market in recent years has changed the dynamics of the mobile phone retail market. In this research note from Ipsos Business Consulting, we present the landscape of the mobile phone retail market, including the mobile phone growth, smartphone penetration, emergence of domestic handset players, mobile retail market trends and our outlook.
How to take you website mobile. Sitecore and guest presenters discussing mobile website. Perfect for anyone interested in making there website mobile friendly.
In this presentation we have discussed about the
Strength, Weakness, Opportunity, Threats (SWOT).
We have also discussed about the major cause of downfall of Nokia.
marketing strategy
smartphone case study
• Introduction
• Smartphones industry in last few years
• Major players and their strategies
• Differences between Apple & Samsung marketing strategy
• More success company
• Particular naming strategy used by company in this industry
• Key success factor in current industry
• Similarities between Marketplace simulation & Mobile phone industry
• Lesson drawn from mobile phone industry which could be used in Marketplace simulation
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsGreenwich Consulting
After another exciting year at Mobile World Congress 2013, which took place in Barcelona from February 25th to 28th, Greenwich Consulting share with you the main announcements that were made, and to put it in perspective with the major trends in the mobile industry.
Highlights of the paper include:
- Aggressive competition from Chinese handset vendors who could capture 1/3 of the global smartphones shipment volume by 2016
- The battle of mobile OS continues: the emerging market is identified as significant growth driver for handset manufacturers, with the goal to introduce low-cost Smartphones priced under 100$. In order to reach this psychological entry price point, they are looking at some ways to reduce costs, particularly on OS license fees. In this context, adopting alternative OS like Firefox mobile could represent an interesting opportunity vs. Android
- The new Samsung-VISA partnership in Digital-Payments, which is opposed to mobile operators’ SIM-centric NFC strategies and is another sign of the Korean manufacturer’s strategy to tackle Apple’s supremacy, especially in services innovation
- The come-back of Small cells: beyond LTE migration, telecom equipment vendors are being optimistic and plan to increase network infrastructure investments for very dense areas in mature countries, with the goal of increasing both coverage and capacity. Yet we don’t expect a general roll-out of this kind of technology, given the required additional investments and subsequent operational issues (Backhauling is a prerequisite for massive metro cell roll-out, and global maintenance costs can be prohibitive due to the large number of installations)
We hope you'll have a great reading and feel free to contact us with any comments or questions.
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
VMworld Europe 2013
Andrew Hawthorn, VMware
Stig Andersson, UBS
Herve Hulin, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
Many organizations are embracing mobile device management (MDM) and mobile app management (MAM) solutions to secure enterprise data and apps on smartphones, tablets and other mobile devices. However, these solutions are often not enough to provide the levels of secure and seamless access required for effective mobile workforce enablement.
This webinar, featuring Forrester MDM Analyst Christian Kane and Layer 7 Chief Strategy Officer Dimitri Sirota will examine how MDM/MAM solutions can be implemented in conjunction with Mobile Access and API Management technologies in order to deliver end-to-end data and app protection.
You Will Learn
How IT consumerization and BYOD are driving enterprise demand for MDM and MAM
The security scope and limitations of MDM/MAM solutions
The role of API Management products in securing the mobile backend
The benefits of end-to-end mobile security, from device to datacenter
Moving mobility forward 10 mobile predictions Troy C. Fulton
Get a glimpse into the key trends that will drive mobility over the next 12 months and begin to map a course for dealing with upcoming changes to the mobility landscape, including:
• The rise of one-button BYOD as a solution to securing multiple device vendors
• The enterprise emergence of HTML-5 for app flexibility and control
• Cloud computing advances the pressure to increase innovation and workloads at lower costs
Mindgrub CEO Todd Marks was the featured speaker at Chesapeake Regional Tech Council's June TechFocus Seminar “Creating a Mobile [and PRODUCTIVE] Workforce: There’s an App for That!”. Todd spoke on the importance of the ability to communicate with customers and each other from virtually any location, Todd also showcased the "Top 5 Apps to facilitate mobile workforce".
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
I'm delighted to be at DroidCon this year and I hope you enjoy my session on building secure android apps for the enterprise.
Developing apps for enterprise can be a challenge as enterprise grade applications are more than just App code. Enterprise Apps operate in a container of their own where security is a forethought not bolted on, naturally connect to corporate assets which resides behind the firewall thus Protecting Data-at-Rest on mobile devices and Securing Data-in-transport from/to mobile devices become inevitable. Enterprise apps are manageable, deployed not downloaded and controlled by corporate IT rules and policies.
In this session, we will walk you through the four pillars of enterprise app development and how BlackBerry® Enterprise Service 12 (BES12) provides the most secure and flexible way(s) to manage Android apps on all android smartphones and tablets regardless of how enterprises choose to manage Android devices – Android for work, Samsung KNOX or Secure Work Space (SWS).
Similar to CIS13: Impact of Mobile Computing on IT (20)
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
The Cloud Identity Summit was founded by Ping Identity with support from industry leaders in 2010 to bring together the brightest minds across the identity and security industry. Today the event is recognized as the world’s premier identity industry conference and includes tracks from industry thought leaders, CIOs and practitioners. Cloud Identity Summit serves as a multi-year roadmap to deploy solutions that are here today but built for the future. For more info, go to www.cloudidentitysummit.com.
Be apart of the convo on Twitter: @CloudIDSummit + #CISNOLA
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
In an ever interconnected and inter-reliant world, the state of security has been a cause for deep pessimism. In the midst of all the gloom, there is good cause for optimism.
With some fits and starts, the building blocks for transforming mobile security are taking shape at every level from the processor, to the chipset to special purpose hardware to operating systems and protocols that address use cases from device integrity to user authentication to payments.
How do we think about security, privacy, identity and authentication in this world? This talk will provide a rapid overview of some selected building blocks and some practical examples that are now deployed at scale to illustrate the coming wave and how you as a practitioner or customer can participate and position yourself for maximum benefit.
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
Does anybody remember seeing a big red button with the word “PANICK!” written on it? I know it was around here somewhere. Also, there’s all these cats running pell-mell around the place, can someone give me a hand in herding them?
In this real-world case study, come and learn how a Fortune 100 with a diverse and extremely mobile work-force was able to turn up strong authentication protections for our critical cloud resources, and how the IT department lived to tell the tale. You’ll hear about the technical implementation of strong authentication enforcement, and how we made key design decisions in the ongoing balancing act between security and user experience, and how we managed up-and-down the chain from executive stakeholders to the boots-on-the-ground who were being asked to join us on this new security adventure.
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
This session will review digital identity’s transition from vulnerable authentication methods and what Microsoft and others are doing to address the hard problems associated with managing and protecting digital identities.
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
You'll laugh, you'll cry, and you might even pick up a useful nugget or two listening to a real-world enterprise IT architect share the experiences of the past year trying to support his business migrating to cloud services, and sharing the lessons learned from trying to integrate 2 hybrid enterprises into a single, streamlined company. You'll hear where the cloud came through for us, and how we often had to fall back to on-prem services such as FIM, Ping Federate, and ADFS to make the glue which binds it all together.
A "from the trenches" view into how GE is using federation standards to abstract & harden our growing cloud WAM platform. Topics covered: GE's approach to OpenID Connect for cross platform authentication (web, mobile), 2) GE's API management platform for API publishing, subscription & security, 3) how the two work together, 4) lessons learned & areas for improvement.
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
The IAM program needs to align behind the shift towards ITaaS, building the platform for execution and supporting transformation and migration activities. CIOs should keep informed through a relevant IAM capability roadmap in order to make calculated decisions on where investments should be made. Ongoing investments in the IAM program are crucial in order to fill capability gaps, keep up-to-date with support and license agreements and make opportunistic progress on the strategic roadmap. In this talk, Steve discusses recent experiences and lessons learned in preparing for and pitching VMware’s CIO on enterprise IAM program initiatives.
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
Companies and researchers are exploring ways to make software and hardware development easier for the masses. Soon you will be able to build your own autonomous drone, create a sensor that assess the watering needs of your plants, and develop a cat tracking device with minimal coding and hardware skills.
What is the place of security and privacy in this exciting development?
Are we building the next generation of Internet security vulnerabilities right now?
In his talk Hannes Tschofenig will highlight challenges with Internet of Things, what role standardization plays, and what contributions ARM, a provider of microprocessor IP, is making to improve IoT security.
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
The IDaaS (identity as a service) market segment continues to grow in popularity, and the scope of its vendor's capabilities continue to grow as well. It's still not a match for everyone, however. Join identity architect Sean Deuby for an overview of the most popular IDaaS deployment scenarios, scenarios where IDaaS has a tougher time meeting customer requirements, and whether your company is likely to find its perfect IDaaS mate.
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
In the past Enterprise Mobility Management (EMM) has focused primarily on MDM, MAM and MCM. Recently there has been a lot of focus on the fourth pillar of EMM - Mobile Identity Management (MIM). This session will cover the primary use cases and discuss current solutions available for managed/un-managed, internal/public and mobile/web apps for iOS/Android devices.
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
This talk will review the breadth of the Internet of Things (IoT), the challenges of Identity Management and the IoT and the impact to Industrial Enterprise.
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
Are you in a situation where you have two business units (maybe because of a merger) that have their own Federation solutions and now you need to share access to SaaS resources among the 2 workforces. But you don't want to have to setup to separate SaaS connections to the same vendor and you want to manage this connection on premises instead of in the Cloud. We can help with that, come see how!
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
Centralized session management has long been a goal of Web Access Management systems: the idea that one session can give end users access to dozens of protected applications with a seamless SSO experience, and terminating it (either by the end user themselves, or by an administrator) cuts off access instantly. It’s a nice dream isn’t it? Turns out that while most WAM products claim they can do this, when deployment time comes around (especially in globally distributed organizations) serious security and scalability challenges emerge that make it unfeasible. In this “session”, come and learn our vision for deploying session management at scale and see how Ping Identity has implemented it in our Federated Access Management solution.
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
Are you asking yourself how do I take my inhouse application and make it available to internal users, partners or customers using SSO and access management technologies? Oh, and you don't want it to be a 6 month project? No problem. Come and find out how to leverage your existing investments and move to modern standards like OpenID Connect, without having to rip and replace infrastructure. Learn the capabilities and tradeoffs you can make to deploy the right level of identity and access management infrastructure to match your security needs.
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
Devices need owners, people need confidence in device authenticity, data needs to persist in systems long after devices change hands, and access needs to be authorized selectively. That's a lot to ask; even if emerging web identity and security technologies are simpler than the models of yesteryear, IoT devices have complicating limitations when it comes to processing power, memory, user interface, and connectivity. But many use cases span web and IoT environments, so we must try! What are the specific requirements? What elements of web technologies can we borrow outright? What elements may need tweaking?
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
3. 3 Confidential
The Requirements we used to have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through Ownership
An application you own,
running on a server you own
People you employ
Using a network you
own to connect to…
Using software you own on a
Windows desktop you own
4. 4 Confidential
What the world wants now…
Control & Governance is Becoming
More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn’t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows OSs
Employees, contractors
outsourcers, partners
citizens, students
5. 5 Confidential
New Device Platforms New Apps New User Expectations
Three trends are forcing massive change on IT
New Device
Platforms
§ A new way to work
§ Not just Windows anymore
New User
Expectations
§ Collaboration with partners,
contractors, and customers
§ Productivity through better technology
New
Apps
§ SaaS, mobile apps
§ Diversity
New Apps New User ExpectationsNew Device Platforms
6. 6 Confidential
Mobility is Changing Everything:
0
300
600
900
2009 2010 2011 2012
Smartphones and tablets PC shipments
of information workers use
three or more devices for
w o r k t o i n c r e a s e
p r o d u c t i v i t y
EXPLOSIVE
GROWTH
in shipments of
smartphones and tablets
Sources: IDC, BGR, Forrester
FLAT
pc shipments
New Device Platforms New Apps New User ExpectationsNew Device Platforms
BYOD & JIT
7. 7 Confidential
The Changing Device Mix
148 141
202 240
128
352
722
1516
0
1000
2000
2012 2017
Smartphone
Tablet
Portable PC
Desktop PC
Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013
Connected Device Market by Product Category,
Shipments, 2012-2017 in Millions
8. 8 Confidential
New Apps are Flooding the Enterprise
R a t i o o f m o b i l e a p p
development projects to native
P C p r o j e c t s i n 2 0 1 5
PACE OF TECHNOLOGY
ADOPTION IS
ACCELERATING
PC
100M USERS
20YEARS
INTERNET
100M USERS
10YEARS
MOBILE
100M USERS
5YEARS
% OS Neutral % Browser Specific % Windows
1996
CROSSOVER
POINT
Apps in the Enterprise
2011 2020
0%
100%
50%
New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms
Sources: Gartner, Internal VMware Analysis
App & Data Independence
9. 9 Confidential
New User Expectations for Productivity are Driving IT to
Evolve
ENTERPRISE END USER COMPUTING
“88% of executives report
employees are using
their personal computing
technologies for
business purposes”
DEMAND ACCESS
FROM ANYWHERE
“9 out of 10 companies
report the use of
consumer technologies
in the workplace”
BETTER CONSUMER
TECHNOLOGIES
“74% of employees use
consumer
technologies due to
lack of compelling
alternatives from IT”
LACK OF CHOICES
FROM IT
New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations
Sources: IDC, Avanade
Innovate or Perish
10. 10 Confidential
IT’s Objective for End User Computing Infrastructure
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
12. 12 Confidential
OS
In million
of units
Market share
Android
497,1
68,8%
iOS
135,9
18,8%
Blackberry
32,5
4,5%
Symbian
23,9
3,3%
Windows Phone
17,9
2,5%
TOTAL
722,4
100,0%
52%
19%
14%
8%
2% 5%
Android iOS
Symbian Blackberry
Windows Phone Others
2012 Smartphones Global Trends
12
Smartphones worldwide shipment 2012
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
Source: TomiAhonen Almanac 2013
1.3B smartphones in use
Smartphones worldwide installed based
as of December 2012
15. 15 Confidential
Smartphones Trends in Key Markets
North America
§ Population:354M
§ Nb of Smartphones:210M
Shipment 2012
Android 71M
iOS 49M
Blackberry 5M
Windows 3M
Western Europe
§ Population:406M
§ Nb of Smartphones:260M
Shipment 2012
Android 69M
iOS 26M
Blackberry 9M
Symbian 4M
Windows 5M
Mature Asia/Pacific
§ Population:82M
§ Nb of Smartphones:60M
Shipment 2012
Android 28M
iOS 14M
Blackberry 1M
Symbian 3M
Others 3M
Greater China
§ Population:1540M
§ Nb of Smartphones:283M
Shipment 2012
Android 79M
iOS 31M
Windows 2M
Bada 1M
Symbian 0,5M
16. 16 Confidential
Android Landscape
§ Widely popular in developing countries
• Lots of choice – screen size, price, capabilities, etc.
§ Not much traction in enterprise segment
• Security
• Perception is that Android is not secure
• Google Play is ‘wild wild west’
• Enterprise features (eg: MDM) weak
• Fragmentation
• No two devices are the same in terms of capabilities or UI
• Hard for IT to support diverse environment
• Lack of control
• OS upgrades are controlled by carrier/OEM
• Security patches not pushed out in a timely manner
§ OEMs starting to add capabilities
19. 19 Confidential
iOS Landscape
§ Popular in North America, Western Europe and other richer
geographical pockets
• Price rules them out in many developing countries
§ In tune with enterprise opportunity and have great traction
• Increasing support for enterprise features in every hw and sw release
• Security
• Perception is that iOS is more secure than Android
• App Store is curated
• Strong enterprise features (encryption, MDM, etc.)
• Fragmentation
• Different screen sizes but not capabilities so perception is that there is no fragmention
in the Apple world
21. 21 Confidential
BlackBerry Landscape
§ Was good standard in enterprise market
• Device Encryption
• Remote Wiping for lost/stolen
• Force password
• Provision secure Email, VPN, Wifi
§ Missed BYOD trend completely and lost traction
§ BB 10 is decent
• BlackBerry Balance – built in dual persona solution
• Small market share and not growing
§ BB shops that didn’t already switch will likely stay with BB
§ Most customers already started switching to a more strategic
platform
• Don’t view BB as strategic anymore
• Migrating to iOS or Android or both
22. 22 Confidential
Windows Landscape
§ Windows Phone and Windows 8 are still early
• Windows Phone – more consumer oriented
• Windows Tablet seems to be more enterprise friendly and will likely get more
traction that Windows phones in 2014
§ MSFT has deep pockets and will likely become the third dominant
mobile platform
• Distant third….
25. 25 Confidential
Consumer Apps published to “public stores”
Sources: Nielsen, May 16, 2012, VMware Customer Research.
Amazon appstore
+ Other Stores
26. 26 Confidential
App Distribution options
§ iOS App Distribution
• The Apple iOS App Store
• Ad hoc developer distribution
• Enterprise distribution
• The Apple Volume Purchase Program
• The Apple Custom B2B
§ Android App Distribution
• Google Play
• Non-market resources
28. 28 Confidential
Anatomy of a Smartphone/Tablet
• Handheld Computer/Processor
• Communication Components
• Modem Chips
• Antenna
• Bluetooth
• WiFi
• Input/Output & Sensors
• Display
• Touchscreen
• Microphone/Speaker
• Cameras
• GPS
• Compass
• Accelerometer
• NFC
• USB
29. 29 Confidential
Building iOS and Android Applications
§ In order to construct a mobile app, need a “front end” – the bits
that run on the device / “the app”
§ A disconnected app is typically not very interesting…so, we also
need to build a “back end” to support the app
Front End Back End
31. 31 Confidential
Current Approach Requires Managing the Whole Device
MobileDeviceManagement
Device
Apps &
Data
Corporate
Apps &
Data
What actually needs to be managed
by the enterprise