SlideShare a Scribd company logo
Microsoft’s Handheld Strategy
with Windows 10
John Fuller,Windows IoT TSP, Microsoft
Agenda
• Current Landscape
• Convergence with Windows 10
• Universal Windows Platform (UWP)
• Security
• Manageability
• Support Lifecycle
Current Landscape
$7.2 TRILLION
worldwide market for IoT
solutions by 2020
IDC: Worldwide and Regional Internet of
Things (IoT) 2014–2020 Forecast
25 BILLION
Connected“things”
will be in use by 2020
Gartner
Current Landscape
What is the
Internet of Things?
Data
Analytics
Devices
MicrosoftAzure
Services
Microsoft SQL
Server
HDInsights
PowerBI
Connectivity
Current Landscape
DeviceCost
Resource Requirements
Current Landscape
Windows 10 IoT Enterprise
Desktop Shell, Win32 apps, Universal Apps and Drivers
1 GB RAM, 16 GB Storage
X86
Windows 10 IoT Mobile
Enterprise
Modern Shell, Universal Apps and Drivers
512 MB RAM, 4 GB storage
ARM
Windows 10 IoT Core
No Shell, Universal Apps and Drivers
256MB RAM, 2GB storage
X86 or ARM
DeviceCost
Resource Requirements
Current Landscape
This edition will be for industry devices like ATMs, thin clients, point of sale
devices, medical devices, and industrial devices. It provides the full capabilities of
Windows 10 Enterprise including the ability to lockdown the device for line of
business use. Furthermore, Windows 10 IoT Enterprise will support Classic
Windows applications as well as Universal Windows apps on Intel architecture.
This edition will be for mobile industry devices like handheld terminals and mobile point
of sale devices. It provides the full capabilities ofWindows 10 Mobile Enterprise
including the ability to lockdown the device for line of business use.Windows 10 IoT
Mobile Enterprise will also support UniversalWindows apps and additional integrated
peripherals and sensors on ARM architecture.
This edition will be for small footprint, low cost devices like gateways supporting
UniversalWindows apps on Intel and ARM architectures.Windows 10 IoT Core is
intended for single purpose devices and will not include the Windows desktop shell or
consumer apps like mail, photos, people, etc.
Convergence withWindows 10
• Universal Windows Platform (UWP)
• Security
• Manageability
• Support Lifecycle
UniversalWindows Platform (UWP)
• Converged APIs, write ONE Universal App and target all Windows 10 editions
– Scale and get higher ROI by selling same App to all Windows 10 editions
OEMs/ODMSs
– Reuse existing development skills
Languages
• C++ /CX
• C#,VB
• JS
• Python
• Node.js
APIs
• WinRT
• Win32
• .NET
• Wiring
Deployment
and Execution
• APPX
• XCopy
• App
Isolation
UI Frameworks
• HTML
• Xaml
• DirectX
Tools
• Visual Studio
• PowerShell
UniversalWindows Platform (UWP)
Security
AdvanceThreat Resistance
Enterprise Data Protection
Next Gen Credentials
Device Lockdown
Security
Run only trusted apps
Secure Boot
Prevent Malware from running.
Even with admin privileges
AdvancedThreat Resistance
Security
Protects data at rest, and wherever it rests
or may roam to
Prevents unauthorized apps from
accessing business data
IT has fully control of keys and data and
can remote wipe data on demand
Enterprise Data Protection
Security
To IT it’s an asymmetricalkey pair,
justlike a Smartcard
To the user,it’s a PIN
or biometric
IdentityProvidersvalidate user
identity(e.g.:code to phone)and
maps NGC publickeyto user
account
Next Generation Credentials
Security
Block Pop-up
Dialog Boxes and
system notifications
Easily create read
only devices.
Improve system
uptime
Control which apps
are visible and can
run
Device Lockdown
Consistent and
predictable device
lockdown across
form factors
Manageability
3rd Party
MDM
Enterprise
Devices
One Windows
Platform
• Converged MDM Stack
• Converged Servicing Stack
• Common CSPs
Windows 10 IoT
Consistent Device Management for all Windows 10 IoT devices
Consistent Device Management
forallWindows10IoTdevices
Consistent Device Management
forallWindows10IoTdevices
Consistent Device Management
forallWindows10IoTdevices
Manageability
Consistent Device Management
forallWindows10IoTdevices
One tool for all your OS configuration needs
Image Configuration Designer
wim / ffu
Image Configuration Designer (ICD)
making it easier for Enterprises to customize the Device Experience
Industry
Device
Mobile
Device
Small
Device
Manageability
Provisioning not imaging
• Transform a device
• Install apps and enterprise configuration
• Flexible methods
• Build package with Image Configuration Designer (new)
• Trigger package installation from the cloud
or corporate network
• Applypackage using media,USB tethering,
or even e-mail for manualdistribution
• Leverage NFC or QR codes to trigger install
• Provisioning package can be persisted after a reset
Manageability
What can be provisioned?
• First run experience customization
• Automatic into Intune or 3rd Party MDM
• Certificates (root/CA)
• Enterprise Policies (password, encryption)
• Enterprise Profiles (Wi-Fi,VPN, Email, proxy-settings)
• Line of Business and StoreApp
• Start menu Layout and pinned apps
• Offline content (Audio/Video, Pictures, Documents,Maps)
• Lockdown mode aka Assigned Access
Support Lifecycle
https://support.microsoft.com/en-us/lifecycle?p1=17946
Support Lifecycle
https://support.microsoft.com/en-us/lifecycle?p1=18611
Key Takeaways
IOT is Here
UWP
Security
Management
Support Lifecycles
Thank you!
#SupplyChainGeek
John Fuller
Microsoft
V-joful@Microsoft.com

More Related Content

What's hot

Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung Biz Mobile
 
Symbol MC32N0 | SAP Business One for Hana
Symbol MC32N0 | SAP Business One for HanaSymbol MC32N0 | SAP Business One for Hana
Symbol MC32N0 | SAP Business One for Hana
Tienda en línea
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
Marco Dal Pino
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
Samsung Biz Mobile
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
Samsung Biz Mobile
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
Samsung Biz Mobile
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
Javier Gonzalez
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung at Work
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power ManagementNilay Mishra
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
Microsoft TechNet - Belgium and Luxembourg
 
Patch Tuesday November - 2020
Patch Tuesday November - 2020Patch Tuesday November - 2020
Patch Tuesday November - 2020
Ivanti
 
How to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopHow to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual Desktop
Abdulghani Alkhateeb
 
Samsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOXSamsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOX
Samsung Business USA
 
The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
Samsung Business USA
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
Samsung Biz Mobile
 
Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...
Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...
Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...
Ryo Jin
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
Sierraware
 
UWM Customer Roadmap
UWM Customer RoadmapUWM Customer Roadmap
UWM Customer Roadmap
Ivanti
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
Javier Gonzalez
 

What's hot (20)

Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
 
Symbol MC32N0 | SAP Business One for Hana
Symbol MC32N0 | SAP Business One for HanaSymbol MC32N0 | SAP Business One for Hana
Symbol MC32N0 | SAP Business One for Hana
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Patch Tuesday November - 2020
Patch Tuesday November - 2020Patch Tuesday November - 2020
Patch Tuesday November - 2020
 
How to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopHow to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual Desktop
 
Samsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOXSamsung Mobile Device Portfolio + KNOX
Samsung Mobile Device Portfolio + KNOX
 
The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...
Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...
Tizen Overview and Architecture - Seokjae Jeong (Samsung) - Korea Linux Forum...
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
News June 2009
News   June 2009News   June 2009
News June 2009
 
UWM Customer Roadmap
UWM Customer RoadmapUWM Customer Roadmap
UWM Customer Roadmap
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 

Viewers also liked

certificate of diploma
certificate of diplomacertificate of diploma
certificate of diplomaCarl Hutchison
 
Alfresco Rulez
Alfresco RulezAlfresco Rulez
Alfresco Rulez
Jeff Smith
 
El caballero de la armadura oxidada
El caballero de la armadura oxidadaEl caballero de la armadura oxidada
El caballero de la armadura oxidadaRam Cerv
 
Stonehenge
StonehengeStonehenge
Stonehenge
Elba Sepúlveda
 
Empressa ficticia
Empressa ficticiaEmpressa ficticia
Empressa ficticia
daniiesanchez
 
jfeem.odt
jfeem.odtjfeem.odt
jfeem.odt
Jeff Smith
 
One piece volume 46(441-449)
One piece volume 46(441-449)One piece volume 46(441-449)
One piece volume 46(441-449)
Marcos Donato
 
Daniellam.Portfolio.Print
Daniellam.Portfolio.PrintDaniellam.Portfolio.Print
Daniellam.Portfolio.Printdanieltclam
 
A horta ecolóxica - EEI Monte da Guía
A horta ecolóxica - EEI Monte da GuíaA horta ecolóxica - EEI Monte da Guía
A horta ecolóxica - EEI Monte da Guía
montedaguia
 
Co-gen Investigation - Advanced Engineering Project
Co-gen Investigation - Advanced Engineering ProjectCo-gen Investigation - Advanced Engineering Project
Co-gen Investigation - Advanced Engineering ProjectJoshua Yu
 
LOGIN 2016 galimybės partneriams - išsami
LOGIN 2016 galimybės partneriams - išsamiLOGIN 2016 galimybės partneriams - išsami
LOGIN 2016 galimybės partneriams - išsami
LOGIN_conf
 
Plataformas educativas
Plataformas educativasPlataformas educativas
Plataformas educativas
Jesus Aponte
 
Trabajo
TrabajoTrabajo
Trabajo
Tamia Chonta
 

Viewers also liked (19)

Ajedrez
AjedrezAjedrez
Ajedrez
 
certificate of diploma
certificate of diplomacertificate of diploma
certificate of diploma
 
Alfresco Rulez
Alfresco RulezAlfresco Rulez
Alfresco Rulez
 
El caballero de la armadura oxidada
El caballero de la armadura oxidadaEl caballero de la armadura oxidada
El caballero de la armadura oxidada
 
Stonehenge
StonehengeStonehenge
Stonehenge
 
Empressa ficticia
Empressa ficticiaEmpressa ficticia
Empressa ficticia
 
jfeem.odt
jfeem.odtjfeem.odt
jfeem.odt
 
4. peer group
4. peer group4. peer group
4. peer group
 
One piece volume 46(441-449)
One piece volume 46(441-449)One piece volume 46(441-449)
One piece volume 46(441-449)
 
Daniellam.Portfolio.Print
Daniellam.Portfolio.PrintDaniellam.Portfolio.Print
Daniellam.Portfolio.Print
 
TBS
TBSTBS
TBS
 
Becas
BecasBecas
Becas
 
Mozilla
MozillaMozilla
Mozilla
 
A horta ecolóxica - EEI Monte da Guía
A horta ecolóxica - EEI Monte da GuíaA horta ecolóxica - EEI Monte da Guía
A horta ecolóxica - EEI Monte da Guía
 
Co-gen Investigation - Advanced Engineering Project
Co-gen Investigation - Advanced Engineering ProjectCo-gen Investigation - Advanced Engineering Project
Co-gen Investigation - Advanced Engineering Project
 
LOGIN 2016 galimybės partneriams - išsami
LOGIN 2016 galimybės partneriams - išsamiLOGIN 2016 galimybės partneriams - išsami
LOGIN 2016 galimybės partneriams - išsami
 
Plataformas educativas
Plataformas educativasPlataformas educativas
Plataformas educativas
 
MosesResumenew
MosesResumenewMosesResumenew
MosesResumenew
 
Trabajo
TrabajoTrabajo
Trabajo
 

Similar to Microsoft Handheld Strategy with Windows 10

Window IoT Mod 1.pdf
Window IoT Mod 1.pdfWindow IoT Mod 1.pdf
Window IoT Mod 1.pdf
OshofisanOlusholaShe
 
Windows developer program for IoT
Windows developer program for IoTWindows developer program for IoT
Windows developer program for IoT
Mirco Vanini
 
Windows 10 IoT Core - Inovasyon Haftasi - TİM
Windows 10 IoT Core - Inovasyon Haftasi - TİMWindows 10 IoT Core - Inovasyon Haftasi - TİM
Windows 10 IoT Core - Inovasyon Haftasi - TİM
İbrahim KIVANÇ
 
Mob324 Windows IoT Core Dave Glover Microsoft Australia
Mob324 Windows IoT Core Dave Glover Microsoft AustraliaMob324 Windows IoT Core Dave Glover Microsoft Australia
Mob324 Windows IoT Core Dave Glover Microsoft Australia
Dave Glover
 
Windows 10 on Raspberry PI 2
Windows 10 on Raspberry PI 2Windows 10 on Raspberry PI 2
Windows 10 on Raspberry PI 2
Mirco Vanini
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
Dell EMC World
 
The Internet of your things by Jan Tielens
The Internet of your things by Jan  TielensThe Internet of your things by Jan  Tielens
The Internet of your things by Jan Tielens
ITProceed
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Callon Campbell
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, androidJehad2012
 
Yerevan Cloud Camp & Hackathon - Internet of Things & Microsoft
Yerevan Cloud Camp & Hackathon - Internet of Things & MicrosoftYerevan Cloud Camp & Hackathon - Internet of Things & Microsoft
Yerevan Cloud Camp & Hackathon - Internet of Things & Microsoft
Microsoft
 
Mec 2015 - Windows developer program for IoT
Mec 2015 - Windows developer program for IoTMec 2015 - Windows developer program for IoT
Mec 2015 - Windows developer program for IoT
Mirco Vanini
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The Dots
Marco Silva
 
Desktop is going to be v2
Desktop is going to be  v2Desktop is going to be  v2
Desktop is going to be v2Pini Cohen
 
Introduction to Android
Introduction to Android Introduction to Android
Introduction to Android
Ranjith Kumar
 
Crossware-Introduction_AmitDhagat-reduced.pdf
Crossware-Introduction_AmitDhagat-reduced.pdfCrossware-Introduction_AmitDhagat-reduced.pdf
Crossware-Introduction_AmitDhagat-reduced.pdf
v89wytwpyn
 
IT6601 Mobile Computing Unit V
IT6601 Mobile Computing Unit VIT6601 Mobile Computing Unit V
IT6601 Mobile Computing Unit V
pkaviya
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
Microsoft
 
Android
Android Android
Android
Anand Buddarapu
 
Android Development Workshop
Android Development WorkshopAndroid Development Workshop
Android Development Workshop
Muthu Kumar
 

Similar to Microsoft Handheld Strategy with Windows 10 (20)

Window IoT Mod 1.pdf
Window IoT Mod 1.pdfWindow IoT Mod 1.pdf
Window IoT Mod 1.pdf
 
Windows IoT
Windows IoTWindows IoT
Windows IoT
 
Windows developer program for IoT
Windows developer program for IoTWindows developer program for IoT
Windows developer program for IoT
 
Windows 10 IoT Core - Inovasyon Haftasi - TİM
Windows 10 IoT Core - Inovasyon Haftasi - TİMWindows 10 IoT Core - Inovasyon Haftasi - TİM
Windows 10 IoT Core - Inovasyon Haftasi - TİM
 
Mob324 Windows IoT Core Dave Glover Microsoft Australia
Mob324 Windows IoT Core Dave Glover Microsoft AustraliaMob324 Windows IoT Core Dave Glover Microsoft Australia
Mob324 Windows IoT Core Dave Glover Microsoft Australia
 
Windows 10 on Raspberry PI 2
Windows 10 on Raspberry PI 2Windows 10 on Raspberry PI 2
Windows 10 on Raspberry PI 2
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
The Internet of your things by Jan Tielens
The Internet of your things by Jan  TielensThe Internet of your things by Jan  Tielens
The Internet of your things by Jan Tielens
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, android
 
Yerevan Cloud Camp & Hackathon - Internet of Things & Microsoft
Yerevan Cloud Camp & Hackathon - Internet of Things & MicrosoftYerevan Cloud Camp & Hackathon - Internet of Things & Microsoft
Yerevan Cloud Camp & Hackathon - Internet of Things & Microsoft
 
Mec 2015 - Windows developer program for IoT
Mec 2015 - Windows developer program for IoTMec 2015 - Windows developer program for IoT
Mec 2015 - Windows developer program for IoT
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The Dots
 
Desktop is going to be v2
Desktop is going to be  v2Desktop is going to be  v2
Desktop is going to be v2
 
Introduction to Android
Introduction to Android Introduction to Android
Introduction to Android
 
Crossware-Introduction_AmitDhagat-reduced.pdf
Crossware-Introduction_AmitDhagat-reduced.pdfCrossware-Introduction_AmitDhagat-reduced.pdf
Crossware-Introduction_AmitDhagat-reduced.pdf
 
IT6601 Mobile Computing Unit V
IT6601 Mobile Computing Unit VIT6601 Mobile Computing Unit V
IT6601 Mobile Computing Unit V
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
 
Android
Android Android
Android
 
Android Development Workshop
Android Development WorkshopAndroid Development Workshop
Android Development Workshop
 

More from Barcoding, Inc.

Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Barcoding, Inc.
 
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven DesignWinning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
Barcoding, Inc.
 
Driver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the RoadDriver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the Road
Barcoding, Inc.
 
Post Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development PlatformsPost Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development Platforms
Barcoding, Inc.
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
Barcoding, Inc.
 
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Barcoding, Inc.
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
 
The IoT Advantage
The IoT AdvantageThe IoT Advantage
The IoT Advantage
Barcoding, Inc.
 
Continuous Improvement Program Workshop
Continuous Improvement Program WorkshopContinuous Improvement Program Workshop
Continuous Improvement Program Workshop
Barcoding, Inc.
 
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
Barcoding, Inc.
 
Automating Transportation and Logistics
Automating Transportation and LogisticsAutomating Transportation and Logistics
Automating Transportation and Logistics
Barcoding, Inc.
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing Barcoding, Inc.
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!
Barcoding, Inc.
 
Improving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile TechnologyImproving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile Technology
Barcoding, Inc.
 
Automated Data Capture in Distribution
Automated Data Capture in Distribution Automated Data Capture in Distribution
Automated Data Capture in Distribution
Barcoding, Inc.
 
It's Not Just a Label
It's Not Just a LabelIt's Not Just a Label
It's Not Just a Label
Barcoding, Inc.
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
Barcoding, Inc.
 
5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability 5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability
Barcoding, Inc.
 
How to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID TechnologyHow to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID Technology
Barcoding, Inc.
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Barcoding, Inc.
 

More from Barcoding, Inc. (20)

Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
 
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven DesignWinning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
 
Driver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the RoadDriver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the Road
 
Post Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development PlatformsPost Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development Platforms
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
The IoT Advantage
The IoT AdvantageThe IoT Advantage
The IoT Advantage
 
Continuous Improvement Program Workshop
Continuous Improvement Program WorkshopContinuous Improvement Program Workshop
Continuous Improvement Program Workshop
 
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
 
Automating Transportation and Logistics
Automating Transportation and LogisticsAutomating Transportation and Logistics
Automating Transportation and Logistics
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!
 
Improving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile TechnologyImproving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile Technology
 
Automated Data Capture in Distribution
Automated Data Capture in Distribution Automated Data Capture in Distribution
Automated Data Capture in Distribution
 
It's Not Just a Label
It's Not Just a LabelIt's Not Just a Label
It's Not Just a Label
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability 5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability
 
How to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID TechnologyHow to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID Technology
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Microsoft Handheld Strategy with Windows 10

  • 1. Microsoft’s Handheld Strategy with Windows 10 John Fuller,Windows IoT TSP, Microsoft
  • 2. Agenda • Current Landscape • Convergence with Windows 10 • Universal Windows Platform (UWP) • Security • Manageability • Support Lifecycle
  • 3. Current Landscape $7.2 TRILLION worldwide market for IoT solutions by 2020 IDC: Worldwide and Regional Internet of Things (IoT) 2014–2020 Forecast 25 BILLION Connected“things” will be in use by 2020 Gartner
  • 4. Current Landscape What is the Internet of Things? Data Analytics Devices MicrosoftAzure Services Microsoft SQL Server HDInsights PowerBI Connectivity
  • 6. Current Landscape Windows 10 IoT Enterprise Desktop Shell, Win32 apps, Universal Apps and Drivers 1 GB RAM, 16 GB Storage X86 Windows 10 IoT Mobile Enterprise Modern Shell, Universal Apps and Drivers 512 MB RAM, 4 GB storage ARM Windows 10 IoT Core No Shell, Universal Apps and Drivers 256MB RAM, 2GB storage X86 or ARM DeviceCost Resource Requirements
  • 7. Current Landscape This edition will be for industry devices like ATMs, thin clients, point of sale devices, medical devices, and industrial devices. It provides the full capabilities of Windows 10 Enterprise including the ability to lockdown the device for line of business use. Furthermore, Windows 10 IoT Enterprise will support Classic Windows applications as well as Universal Windows apps on Intel architecture. This edition will be for mobile industry devices like handheld terminals and mobile point of sale devices. It provides the full capabilities ofWindows 10 Mobile Enterprise including the ability to lockdown the device for line of business use.Windows 10 IoT Mobile Enterprise will also support UniversalWindows apps and additional integrated peripherals and sensors on ARM architecture. This edition will be for small footprint, low cost devices like gateways supporting UniversalWindows apps on Intel and ARM architectures.Windows 10 IoT Core is intended for single purpose devices and will not include the Windows desktop shell or consumer apps like mail, photos, people, etc.
  • 8. Convergence withWindows 10 • Universal Windows Platform (UWP) • Security • Manageability • Support Lifecycle
  • 9. UniversalWindows Platform (UWP) • Converged APIs, write ONE Universal App and target all Windows 10 editions – Scale and get higher ROI by selling same App to all Windows 10 editions OEMs/ODMSs – Reuse existing development skills Languages • C++ /CX • C#,VB • JS • Python • Node.js APIs • WinRT • Win32 • .NET • Wiring Deployment and Execution • APPX • XCopy • App Isolation UI Frameworks • HTML • Xaml • DirectX Tools • Visual Studio • PowerShell
  • 11. Security AdvanceThreat Resistance Enterprise Data Protection Next Gen Credentials Device Lockdown
  • 12. Security Run only trusted apps Secure Boot Prevent Malware from running. Even with admin privileges AdvancedThreat Resistance
  • 13. Security Protects data at rest, and wherever it rests or may roam to Prevents unauthorized apps from accessing business data IT has fully control of keys and data and can remote wipe data on demand Enterprise Data Protection
  • 14. Security To IT it’s an asymmetricalkey pair, justlike a Smartcard To the user,it’s a PIN or biometric IdentityProvidersvalidate user identity(e.g.:code to phone)and maps NGC publickeyto user account Next Generation Credentials
  • 15. Security Block Pop-up Dialog Boxes and system notifications Easily create read only devices. Improve system uptime Control which apps are visible and can run Device Lockdown Consistent and predictable device lockdown across form factors
  • 16. Manageability 3rd Party MDM Enterprise Devices One Windows Platform • Converged MDM Stack • Converged Servicing Stack • Common CSPs Windows 10 IoT Consistent Device Management for all Windows 10 IoT devices Consistent Device Management forallWindows10IoTdevices Consistent Device Management forallWindows10IoTdevices Consistent Device Management forallWindows10IoTdevices
  • 17. Manageability Consistent Device Management forallWindows10IoTdevices One tool for all your OS configuration needs Image Configuration Designer wim / ffu Image Configuration Designer (ICD) making it easier for Enterprises to customize the Device Experience Industry Device Mobile Device Small Device
  • 18. Manageability Provisioning not imaging • Transform a device • Install apps and enterprise configuration • Flexible methods • Build package with Image Configuration Designer (new) • Trigger package installation from the cloud or corporate network • Applypackage using media,USB tethering, or even e-mail for manualdistribution • Leverage NFC or QR codes to trigger install • Provisioning package can be persisted after a reset
  • 19. Manageability What can be provisioned? • First run experience customization • Automatic into Intune or 3rd Party MDM • Certificates (root/CA) • Enterprise Policies (password, encryption) • Enterprise Profiles (Wi-Fi,VPN, Email, proxy-settings) • Line of Business and StoreApp • Start menu Layout and pinned apps • Offline content (Audio/Video, Pictures, Documents,Maps) • Lockdown mode aka Assigned Access
  • 22. Key Takeaways IOT is Here UWP Security Management Support Lifecycles