SlideShare a Scribd company logo
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Evolution of the Application





2016



Daniel Miessler
Director of Advisory Services
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Intros
▪ 17 years in information security
▪ 11 year as a security tester
▪ Network / web / mobile / thick-client / IoT testing
▪ Currently run the Advisory Services group for IOActive
▪ Project leader for the OWASP IoT Security Project
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Agenda
▪ 10 technology forces
▪ Digital assistants
▪ Businesses as APIs

▪ Putting it together
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Continuous
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Personal assistants
Forced	! Natural	=	VoiceFirst
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Personal assistants
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Computer interface (old)
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Digital assistants (new)
DA
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Migration inward
Application
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Migration inward
Application
Social
Platform
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Migration inward
Application
Social
Platform
Operating System
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs
DA
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs (old vs. new)
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs (old vs. new)
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Putting it together
1. Motions towards natural, real-time, continuous, frictionless
2. The move towards a voice and chat interface instead of unique,
company-specific application interfaces
3. You interact with your DA, and your DA interacts with the OS and
the world
4. Businesses become algorithms, which become APIs, which are
called by DAs
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Takeaways
1. For the apps that you are creating, and that apps that you use, start thinking
about these usability trends
2. Start thinking about how natural the interface is compared to voice or compared
to it happening automatically
3. What parts of the business could benefit from a bot functionality?
4. Start thinking about what discrete functions your group provides, and how they
can be converted to APIs
5. Start asking what the business looks like when most applications are APIs that
are either voice controlled, bot interactive, or completely automatic
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Thank you
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Questions?



Comments?



Ideas?
E: daniel.miessler@ioactive.com
T: @danielmiessler

More Related Content

Similar to Evolution of The Application

Real World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPIReal World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPI
Megan Bowe
 
Test Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceTest Masters 2016 Spring Conference
Test Masters 2016 Spring Conference
Adam Sandman
 
Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...
TechMeetups
 
Anubavam Technologies I Phone Offerings
Anubavam Technologies I Phone OfferingsAnubavam Technologies I Phone Offerings
Anubavam Technologies I Phone Offerings
Sandeep Mohan
 
Make the Most of Your Traffic
Make the Most of Your TrafficMake the Most of Your Traffic
Make the Most of Your Traffic
ion interactive
 
Alex jubien-think mobile
Alex jubien-think mobileAlex jubien-think mobile
Alex jubien-think mobile
App Promotion Summit Conference
 
How to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage SupportersHow to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage Supporters
TechSoup
 
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Claire Townend Gee
 
Mobile testing trends webinar PPT
Mobile testing trends webinar PPTMobile testing trends webinar PPT
Mobile testing trends webinar PPT
XBOSoft
 
Answering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User SummitAnswering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User Summit
Squiz
 
Mobile Apps Development Company
Mobile Apps Development CompanyMobile Apps Development Company
Mobile Apps Development Company
eLuminous Technologies Pvt. Ltd.
 
Mixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensMixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLens
Avanade Nederland
 
Enabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at ScaleEnabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at Scale
Bob Sokol
 
Adventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual AssistantsAdventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual Assistants
Editt Gonen-Friedman
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
Apperian
 
Html5 web apps vs nativeapps
Html5 web apps vs nativeappsHtml5 web apps vs nativeapps
Html5 web apps vs nativeapps
Siva Prasad K V
 
Perso.na
Perso.naPerso.na
Perso.na
betabeers
 
Designing IoT
Designing IoTDesigning IoT
Designing IoT
Stephen Bolen
 
API Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API StrategyAPI Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API Strategy
Akana
 
Api frenzy june 2013 v2
Api frenzy june 2013 v2Api frenzy june 2013 v2
Api frenzy june 2013 v2
Sachin Agarwal
 

Similar to Evolution of The Application (20)

Real World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPIReal World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPI
 
Test Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceTest Masters 2016 Spring Conference
Test Masters 2016 Spring Conference
 
Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...
 
Anubavam Technologies I Phone Offerings
Anubavam Technologies I Phone OfferingsAnubavam Technologies I Phone Offerings
Anubavam Technologies I Phone Offerings
 
Make the Most of Your Traffic
Make the Most of Your TrafficMake the Most of Your Traffic
Make the Most of Your Traffic
 
Alex jubien-think mobile
Alex jubien-think mobileAlex jubien-think mobile
Alex jubien-think mobile
 
How to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage SupportersHow to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage Supporters
 
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
 
Mobile testing trends webinar PPT
Mobile testing trends webinar PPTMobile testing trends webinar PPT
Mobile testing trends webinar PPT
 
Answering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User SummitAnswering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User Summit
 
Mobile Apps Development Company
Mobile Apps Development CompanyMobile Apps Development Company
Mobile Apps Development Company
 
Mixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensMixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLens
 
Enabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at ScaleEnabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at Scale
 
Adventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual AssistantsAdventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual Assistants
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 
Html5 web apps vs nativeapps
Html5 web apps vs nativeappsHtml5 web apps vs nativeapps
Html5 web apps vs nativeapps
 
Perso.na
Perso.naPerso.na
Perso.na
 
Designing IoT
Designing IoTDesigning IoT
Designing IoT
 
API Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API StrategyAPI Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API Strategy
 
Api frenzy june 2013 v2
Api frenzy june 2013 v2Api frenzy june 2013 v2
Api frenzy june 2013 v2
 

More from Daniel Miessler

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security Framework
Daniel Miessler
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
Daniel Miessler
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
Daniel Miessler
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
Daniel Miessler
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap Techniques
Daniel Miessler
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing Methodologies
Daniel Miessler
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to Resilience
Daniel Miessler
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]
Daniel Miessler
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
Daniel Miessler
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015
Daniel Miessler
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
Daniel Miessler
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change Everything
Daniel Miessler
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
 

More from Daniel Miessler (13)

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security Framework
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap Techniques
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing Methodologies
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to Resilience
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change Everything
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Evolution of The Application

  • 1. IOActive, Inc. Copyright © 2016. All Rights Reserved. Evolution of the Application
 
 
 2016
 
 Daniel Miessler Director of Advisory Services
  • 2. IOActive, Inc. Copyright © 2016. All Rights Reserved. Intros ▪ 17 years in information security ▪ 11 year as a security tester ▪ Network / web / mobile / thick-client / IoT testing ▪ Currently run the Advisory Services group for IOActive ▪ Project leader for the OWASP IoT Security Project
  • 3. IOActive, Inc. Copyright © 2016. All Rights Reserved. Agenda ▪ 10 technology forces ▪ Digital assistants ▪ Businesses as APIs
 ▪ Putting it together
  • 4. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 5. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 6. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 7. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 8. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 9. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Continuous • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 10. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 11. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 12. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 13. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 14. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 15. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 16. IOActive, Inc. Copyright © 2016. All Rights Reserved. Personal assistants Forced ! Natural = VoiceFirst
  • 17. IOActive, Inc. Copyright © 2016. All Rights Reserved. Personal assistants
  • 18. IOActive, Inc. Copyright © 2016. All Rights Reserved. Computer interface (old)
  • 19. IOActive, Inc. Copyright © 2016. All Rights Reserved. Digital assistants (new) DA
  • 20. IOActive, Inc. Copyright © 2016. All Rights Reserved. Migration inward Application
  • 21. IOActive, Inc. Copyright © 2016. All Rights Reserved. Migration inward Application Social Platform
  • 22. IOActive, Inc. Copyright © 2016. All Rights Reserved. Migration inward Application Social Platform Operating System
  • 23. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs
  • 24. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs DA
  • 25. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs (old vs. new)
  • 26. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs (old vs. new)
  • 27. IOActive, Inc. Copyright © 2016. All Rights Reserved. Putting it together 1. Motions towards natural, real-time, continuous, frictionless 2. The move towards a voice and chat interface instead of unique, company-specific application interfaces 3. You interact with your DA, and your DA interacts with the OS and the world 4. Businesses become algorithms, which become APIs, which are called by DAs
  • 28. IOActive, Inc. Copyright © 2016. All Rights Reserved. Takeaways 1. For the apps that you are creating, and that apps that you use, start thinking about these usability trends 2. Start thinking about how natural the interface is compared to voice or compared to it happening automatically 3. What parts of the business could benefit from a bot functionality? 4. Start thinking about what discrete functions your group provides, and how they can be converted to APIs 5. Start asking what the business looks like when most applications are APIs that are either voice controlled, bot interactive, or completely automatic
  • 29. IOActive, Inc. Copyright © 2016. All Rights Reserved. Thank you
  • 30. IOActive, Inc. Copyright © 2016. All Rights Reserved. Questions?
 
 Comments?
 
 Ideas? E: daniel.miessler@ioactive.com T: @danielmiessler