The document provides an overview of IBM's mobile strategy and user-centered design approach. It discusses (1) how mobile adoption is changing consumer and business behavior, (2) IBM's Interactive Solutions portfolio and expertise in mobile strategy, design, and technology, (3) IBM's MobileFirst offering and focus on delivering comprehensive mobile solutions, and (4) a sample mobile engagement process that assesses business needs, defines a future mobile experience, evaluates technology requirements, and develops a roadmap. The document emphasizes IBM's capabilities across mobile strategy, user experience design, and technology to help organizations transform their business in a mobile-first world.
10 trends reshaping digital - updated Q1 2016Beyond
The cycle of innovation and iteration that digital is known for means existing concepts can suddenly find radically new trajectories. In this report, we highlight ten ideas that have been gaining rapid traction in Q1, and which will reshape how we digitally interact with the world around us.
Future Of Advertising Webinar Full DeckTroy Centazzo
The Program – New Media specialist Troy Centazzo reviewed the rapid trends in marketing and provided strategic insights into where marketers and investors should be focusing their attention. Attended by hundreds of media industry investors, companies, strategic firms, analysts, and others.
Fjord Trends 2020: Emerging Trends in Business | Accentureaccenture
Accenture's Fjord Trends 2020 provides insight on business trends impacting business, tech & design to help brands thrive in a changing world. Read more.
Me Data - The Rising Opportunity for Self Optimization Apps Beyond
A new research study from creative digital agency Beyond, shows that the lack of concern over the privacy of Me Data - open, freely available, personal data - and the popularity of personal tracking apps is leading to a demand in self-optimization services like Google Now. These products and services will break out of the niches created by personal tracking apps, instead offering overall lifestyle self-optimization services based on several different strands of Me Data.
There is no escaping the "bring your own device" trend, but organizations need to chart a middle path to strike a balance between employee freedom and corporate control over technology.
30 trends that will shape European web & digital media business in 2012Marc Ziegler
In 2011, over 940 web companies in the fields of ecommerce, advertising and digital media have been funded by US investors with a volume of more than 13,6 billion US$. This is the tip of the iceberg of our analysis that investigated most investments by US venture capital companies and business angel in 2011. Beside the data we collected, I wanted to find out, which specific trends in each of the most relevant web business segments can be derived from the identified investment patterns and which impact these trends will have on investment behavior in Europe/Germany.
more on http://www.medien.nrw.de
When a company puts human-centered design at the heart of its digital agenda, it can find new sources of value through technology. Here are five principles to embrace to achieve this new way of doing business: http://stratbz.to/vO0wq
10 trends reshaping digital - updated Q1 2016Beyond
The cycle of innovation and iteration that digital is known for means existing concepts can suddenly find radically new trajectories. In this report, we highlight ten ideas that have been gaining rapid traction in Q1, and which will reshape how we digitally interact with the world around us.
Future Of Advertising Webinar Full DeckTroy Centazzo
The Program – New Media specialist Troy Centazzo reviewed the rapid trends in marketing and provided strategic insights into where marketers and investors should be focusing their attention. Attended by hundreds of media industry investors, companies, strategic firms, analysts, and others.
Fjord Trends 2020: Emerging Trends in Business | Accentureaccenture
Accenture's Fjord Trends 2020 provides insight on business trends impacting business, tech & design to help brands thrive in a changing world. Read more.
Me Data - The Rising Opportunity for Self Optimization Apps Beyond
A new research study from creative digital agency Beyond, shows that the lack of concern over the privacy of Me Data - open, freely available, personal data - and the popularity of personal tracking apps is leading to a demand in self-optimization services like Google Now. These products and services will break out of the niches created by personal tracking apps, instead offering overall lifestyle self-optimization services based on several different strands of Me Data.
There is no escaping the "bring your own device" trend, but organizations need to chart a middle path to strike a balance between employee freedom and corporate control over technology.
30 trends that will shape European web & digital media business in 2012Marc Ziegler
In 2011, over 940 web companies in the fields of ecommerce, advertising and digital media have been funded by US investors with a volume of more than 13,6 billion US$. This is the tip of the iceberg of our analysis that investigated most investments by US venture capital companies and business angel in 2011. Beside the data we collected, I wanted to find out, which specific trends in each of the most relevant web business segments can be derived from the identified investment patterns and which impact these trends will have on investment behavior in Europe/Germany.
more on http://www.medien.nrw.de
When a company puts human-centered design at the heart of its digital agenda, it can find new sources of value through technology. Here are five principles to embrace to achieve this new way of doing business: http://stratbz.to/vO0wq
The Future of Enterprise Mobility: Predictions for 2014Enterprise Mobile
From wearable devices to the growth of managed mobility services (MMS), 2014 will bring many changes for enterprise mobility. By knowing what to expect, your organization will be able to take advantage of the productivity gains and competitive differentiation that mobile technology offers. We’ll discuss:
- Wearable devices
- Security challenges
- Competition in the MDM market
- The importance of managed mobility services (MMS)
- Operating system features
- Cloud adoption
- Brand loyalty
Competing for the Future: Iteration vs. Innovation by Brian SolisBrian Solis
Competing for the future starts with a shift in perspective. Without that shift, you will be confined to cycles of iteration—rather than innovation. Leading digital analyst, author and keynote speaker Brian Solis partnered with Oracle for a new paper, "Enterprise as a Service."
The era of the Mobile Enterprise is here to stay. Mobile penetration is unprecedented: subscribers are growing four times faster than the world’s population. To remain successful, CIOs must continuously investigate, prioritize, fund, adopt, and integrate multiple new technologies to support vital organizational objectives.
Free download at: http://vint.sogeti.com/downloads/
In the past few years, information technology has become increasingly personal and social and has made its presence very much felt. The emergence of wearable computing and other forms of empathic ‘things’ seems a logical further step: even more intimate, more human-oriented, and ubiquitous. There are more and more devices that count our steps, take our blood pressure or measure the indoor temperature, track our location or conversations.
We are witnessing a computer boom in terms of kinds, shapes and sizes – around, on or inside the body – that behave increasingly smart and link up more and more intuitively with man’s extremely personal and natural interface.
In the next decade Personal Computing will become really personal: inside, on and around the person with attention for the context of the individual. In this study we explore this development and present seven manifestations that can define the impact on business, such as the ‘quantified employee’ and the ‘body as the new password’
Did you know that mobile security breaches have affected more than two-thirds of global organizations in the last 12 months? This presentation helps you assess where you stand, explains the different security threats that are out there, and argues for why you should be using Security by Design for all your mobile apps.
New Report by Jessica Groopman
The digitalization of our physical world—what many are now calling the ‘Internet of
Things’—is challenging our expectations of privacy.
Adding sensors to ourselves, and to the objects and places around us, renders our
physical world communicable, contextual, and trackable. The full implications of
ubiquitous connectivity remain blurry, but Altimeter Group’s survey of 2,062 American
consumers makes one point crystal clear: Consumers are decidedly anxious about
how companies use and share data from their connected devices. Our research finds
a massive gulf between consumer awareness and industry practices when it comes
to privacy. But this data reveals more than a concerned citizenry, it reveals tremendous
opportunities for companies to foster more trusted customer relationships.
DOWNLOAD THE COMPLETE REPORT:
http://pages.altimetergroup.com/1506-Consumer-Perceptions-of-Privacy-in-the-IOT-Report.html
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsDMI
Mobile World Congress 2015 was the best and most exciting congress to date. It showed how mobility is transforming every industry, our infrastructure, society and our daily lives. This is a full recap covering all the key themes from this year; the big device launches, Internet of Things, wearables, personalised consumer experiences based on big data, 5G, AdTech, analytics, privacy and security, and more.
Let us know in the comments if we missed anything from the event that was important to you; is there a key trend, technology or company that you think should have been included?
http://www.hcltech.com/ -
As CIOs and business leaders try to create a modern infrastructure that can support today’s challenging IT environment, they may find themselves taking wrong turns or pursuing approaches that lead to dead ends. Here’s a technology roadmap for 2012 — one that highlights useful landmarks and identifies areas to steer clear of – that you can refer to as you explore today’s challenging IT environment. Read Now.
Hidden in plain sight: How mobile is quietly revolutionizing the B2B worldOgilvy
Mobile@Ogilvy has published a new report into how business-to-business (B2B) brands can leverage “smart mobility” to gain significant competitive advantage. Entitled “Hidden in plain sight: How mobile is quietly revolutionizing the B2B world,” the report outlines key mobile opportunities for B2B marketers and describes how to develop mobile strategies for B2B brands.
Harbor Research - The Internet of Things Meets the Internet of PeopleHarbor Research
We have entered an era where people, businesses and social organizations are beginning to understand the profound impacts awareness, collaboration, and intelligence will bring. In the not too distant future, hundreds of millions, then billions, of individuals and businesses, with billions, then trillions, of smart, communicating devices, will stretch the boundaries of today’s business and social systems and create the potential to change the way we work, learn, entertain and innovate.
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
Mobile and Internet of Things (IoT) applications continue to be released at a rapid pace. But organizations’ rush-to-release of new applications to meet rapidly-evolving user demand can jeopardize the applications’ level of security protection.
View these slides from our January 18th webinar, where Larry Ponemon from the Ponemon Institute, Arxan Technologies and IBM Security review findings from our brand-new mobile & IoT application security study.
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
View on demand webinar: https://securityintelligence.com/events/recent-ecbeba-regulations-how-they-will-impact-european-banks-in-2016/
The recent European Central Bank’s (ECB) Recommendations for the Security of Internet Payments and European Banking Authority (EBA) regulations have mandated numerous requirements for European banks to enhance online fraud prevention practices. Most European banks are required to include additional capabilities in risk analysis, malware protection, and strong authentication to meet the security requirements.
Assaf Regev, Product Marketing Manager, IBM Security Trusteer, will expand on how the new regulations will impact the European financial sector and what your bank will need to do to not only comply but also to be more secure.
The key requirements for effective and sustainable online banking security as outlined by the ECB/EBA
The need for layered security – why present controls may not be enough
How IBM can help meet the ECB/EBA recommendations on time and on budget, while minimizing deployment, management and operational costs
The Future of Enterprise Mobility: Predictions for 2014Enterprise Mobile
From wearable devices to the growth of managed mobility services (MMS), 2014 will bring many changes for enterprise mobility. By knowing what to expect, your organization will be able to take advantage of the productivity gains and competitive differentiation that mobile technology offers. We’ll discuss:
- Wearable devices
- Security challenges
- Competition in the MDM market
- The importance of managed mobility services (MMS)
- Operating system features
- Cloud adoption
- Brand loyalty
Competing for the Future: Iteration vs. Innovation by Brian SolisBrian Solis
Competing for the future starts with a shift in perspective. Without that shift, you will be confined to cycles of iteration—rather than innovation. Leading digital analyst, author and keynote speaker Brian Solis partnered with Oracle for a new paper, "Enterprise as a Service."
The era of the Mobile Enterprise is here to stay. Mobile penetration is unprecedented: subscribers are growing four times faster than the world’s population. To remain successful, CIOs must continuously investigate, prioritize, fund, adopt, and integrate multiple new technologies to support vital organizational objectives.
Free download at: http://vint.sogeti.com/downloads/
In the past few years, information technology has become increasingly personal and social and has made its presence very much felt. The emergence of wearable computing and other forms of empathic ‘things’ seems a logical further step: even more intimate, more human-oriented, and ubiquitous. There are more and more devices that count our steps, take our blood pressure or measure the indoor temperature, track our location or conversations.
We are witnessing a computer boom in terms of kinds, shapes and sizes – around, on or inside the body – that behave increasingly smart and link up more and more intuitively with man’s extremely personal and natural interface.
In the next decade Personal Computing will become really personal: inside, on and around the person with attention for the context of the individual. In this study we explore this development and present seven manifestations that can define the impact on business, such as the ‘quantified employee’ and the ‘body as the new password’
Did you know that mobile security breaches have affected more than two-thirds of global organizations in the last 12 months? This presentation helps you assess where you stand, explains the different security threats that are out there, and argues for why you should be using Security by Design for all your mobile apps.
New Report by Jessica Groopman
The digitalization of our physical world—what many are now calling the ‘Internet of
Things’—is challenging our expectations of privacy.
Adding sensors to ourselves, and to the objects and places around us, renders our
physical world communicable, contextual, and trackable. The full implications of
ubiquitous connectivity remain blurry, but Altimeter Group’s survey of 2,062 American
consumers makes one point crystal clear: Consumers are decidedly anxious about
how companies use and share data from their connected devices. Our research finds
a massive gulf between consumer awareness and industry practices when it comes
to privacy. But this data reveals more than a concerned citizenry, it reveals tremendous
opportunities for companies to foster more trusted customer relationships.
DOWNLOAD THE COMPLETE REPORT:
http://pages.altimetergroup.com/1506-Consumer-Perceptions-of-Privacy-in-the-IOT-Report.html
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsDMI
Mobile World Congress 2015 was the best and most exciting congress to date. It showed how mobility is transforming every industry, our infrastructure, society and our daily lives. This is a full recap covering all the key themes from this year; the big device launches, Internet of Things, wearables, personalised consumer experiences based on big data, 5G, AdTech, analytics, privacy and security, and more.
Let us know in the comments if we missed anything from the event that was important to you; is there a key trend, technology or company that you think should have been included?
http://www.hcltech.com/ -
As CIOs and business leaders try to create a modern infrastructure that can support today’s challenging IT environment, they may find themselves taking wrong turns or pursuing approaches that lead to dead ends. Here’s a technology roadmap for 2012 — one that highlights useful landmarks and identifies areas to steer clear of – that you can refer to as you explore today’s challenging IT environment. Read Now.
Hidden in plain sight: How mobile is quietly revolutionizing the B2B worldOgilvy
Mobile@Ogilvy has published a new report into how business-to-business (B2B) brands can leverage “smart mobility” to gain significant competitive advantage. Entitled “Hidden in plain sight: How mobile is quietly revolutionizing the B2B world,” the report outlines key mobile opportunities for B2B marketers and describes how to develop mobile strategies for B2B brands.
Harbor Research - The Internet of Things Meets the Internet of PeopleHarbor Research
We have entered an era where people, businesses and social organizations are beginning to understand the profound impacts awareness, collaboration, and intelligence will bring. In the not too distant future, hundreds of millions, then billions, of individuals and businesses, with billions, then trillions, of smart, communicating devices, will stretch the boundaries of today’s business and social systems and create the potential to change the way we work, learn, entertain and innovate.
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
Mobile and Internet of Things (IoT) applications continue to be released at a rapid pace. But organizations’ rush-to-release of new applications to meet rapidly-evolving user demand can jeopardize the applications’ level of security protection.
View these slides from our January 18th webinar, where Larry Ponemon from the Ponemon Institute, Arxan Technologies and IBM Security review findings from our brand-new mobile & IoT application security study.
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
View on demand webinar: https://securityintelligence.com/events/recent-ecbeba-regulations-how-they-will-impact-european-banks-in-2016/
The recent European Central Bank’s (ECB) Recommendations for the Security of Internet Payments and European Banking Authority (EBA) regulations have mandated numerous requirements for European banks to enhance online fraud prevention practices. Most European banks are required to include additional capabilities in risk analysis, malware protection, and strong authentication to meet the security requirements.
Assaf Regev, Product Marketing Manager, IBM Security Trusteer, will expand on how the new regulations will impact the European financial sector and what your bank will need to do to not only comply but also to be more secure.
The key requirements for effective and sustainable online banking security as outlined by the ECB/EBA
The need for layered security – why present controls may not be enough
How IBM can help meet the ECB/EBA recommendations on time and on budget, while minimizing deployment, management and operational costs
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
With the rapid growth of smartphones and tablets in the enterprise, CIOs are struggling to secure mobile devices and data across a wide range of mobile platforms. Attend this session to learn best practices around defining a mobile security policy, educating employees about safe computing practices, and deploying a secure technology framework. We'll discuss the benefits of endpoint management solutions like IBM Endpoint Manager in the context of a comprehensive enterprise deployment encompassing smartphones, tablets, PCs and servers.
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
View on demand webinar:
https://securityintelligence.com/events/introducing-ibm-cloud-security-enforcer-casb-idaas-and-threat-prevention/
Cloud Security Enforcer is the first solution to combine Cloud Access Security Broker (CASB) functionality with identity services (IDaaS), policy enforcement and dynamic threat prevention intelligence into a single integrated SaaS solution.
Join Daniel Wolff, Program Director Cloud Security Product Management, and Gonzalo de la Hoz, IAM European Segment Leader, as we discuss how IBM Cloud Security Enforcer has integrated multiple technologies crucial to enabling safe adoption of cloud applications in the enterprise:
- Cloud application discovery and risk
- Cloud identity services and application on-boarding
- Closing the mobile device gap
- Policy enforcement and threat prevention
IBM X-Force Incident Response and Intelligence Services (X-Force IRIS) can help you cross the incident response chasm, build a holistic program and better prepare you to deal with and thwart the security challenges your organization faces.
To learn more, read the white paper on best practices for improving your incident response processes: http://ibm.co/2lLdC2k.
Retail Mobility, Productivity and SecurityIBM Security
Displaying key findings from the Mobility Trends in the Retail Sector research report prepared by Enterprise Strategy Group (ESG) and IBM, this infographic affords valuable context to retail organizations in planning a better tomorrow.
IBM Insight 2015 - Security Sessions RoadmapIBM Security
A detailed list of dates, times and abstracts for the security sessions at IBM's Insight 2015 event, taking place October 26-29 in Las Vegas. For event registration, visit http://ibmsec.co/T1bKr.
How to lead a large organization through agile transformation bodhi choudhuriBodhi Choudhuri
You have seen the Agile Manifesto. You have read success stories of startups embracing lean agile. Maybe you even hired consultants and experts. But how is your organization reacting to the change? Agile is not just a change of the delivery framework. It’s a mindset shift for employees and leaders alike. It’s a transformation built around Culture, Principles and Tools/ Technology. Find out how to think end to end, ensure rapid feedback is built into your systems and processes and use the right tools and technology to achieve the desired results.
Social Enterprise - Nuove tecnologie e Modelli di fruizione: Flessibilità e ...Fondazione CUOA
Intervento di Tiziana Rapallini (CEO 4Cust Reply) al Workshop: Crescita e nuove sfide di mercato: 'Social Enterprise' come modello di successo per l'impresa competitiva del 18 ottobre 2012
Squaretable October 4th 2012 on sustainable materials and end productscsdbdv
On the 4th of October 2012, Squarewise hosted yet another inspiring Squaretable on the subject of “Co-creating added value for sustainable materials and end products.” A written summary of the discussions will also be made available on the website www.squarewise.com.
Presented during the High Performance Marketing Conference 2013, organized by Accenture on January 24th 2013. This presentation was given by Wim van Gils of Philips.
A New Value Creation Model for a New Workplace RealityCognizant
Cognizant's Value Creation Framework helps guide companies to become more virtual, collaborative and connected by reconfiguring their business models and operational processes, thus reaching new thresholds of performance.
Social: Session 7: Turbocharging Customer Service Through Social TechnologiesSugarCRM
Social media - Twitter, Facebook, discussion forums, ideation communities, social listening platforms to name a few - can be used to help companies deliver a customer service experience that aligns with customer expectations. This alignment ultimately results in a more loyal customer base and a quantifiably larger wallet share. However, the value of these social technologies can’t be realized by just bolting them onto a suboptimal contact center. This presentation describes the foundational elements that your contact center must get right before you consider adding social technologies, and how social technologies can be deployed in a manner that extends current capabilities, and reinforces the customer experience and company brand.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Ibm solutions for the mobile enterpriseChris Pepin
Presentation from IBM VP of Cloud and Services Marketing, Rich Lechner and IBM CTO of Mobility Bill Bodin. Presented at Gartner Symposium 2012 in Orlando, FL
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
Increasing usage of smartphones and tablets in the consumer space is putting pressure on CIOs to adopt more flexible workplace strategies. Come learn how to embrace the new workplace and unleash the power of enterprise mobility to improve productivity, reduce response time and increase employee satisfaction.
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
CIOs today are under increasing pressure by employees to be able to leverage personally owned smartphones and tablets for business purposes. Learn details on how IBM is addressing this demand from its global employees and delivering solutions to a variety of platforms including BlackBerry, Google Android, Apple iPhone and iPad, Windows Mobile and Nokia Symbian.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
5. Consumer adoption and usage of digital, mobile
and social media is changing how we learn, work
and interact with each other
30.2% of the world is 5.3 billion mobile U.S. mobile commerce
online subscriptions WW reaches $6.7 billion
2.1 billion people are online 940 million subscriptions to U.S. Mobile Commerce
today 3G services Sales expected to reach
$31 billion by 2016
63% research via social 83% of holiday shoppers 800 million active, 400
networking influenced by reviews million daily users
47% consumer are Consumer reviews are A ‘Facebook Like’ from a friend
influenced by what see on 12x more trusted than info. carries same weight as 100
social media outlets from marketers positive reviews from
strangers. Average user has
130 friends 4
6. Digital transformation will have profound societal
impact at all levels, creating new opportunities but
also significant challenges
Individuals
• The digital consumer creates new possibilities for customer engagement, but
rising expectations creates challenges
• The networked workforce engages in new ways to collaborate both inside and
outside the enterprise
• Empowered citizen – increasing engagement and power of the networked
population
Enterprises
• Digitally enabled business models – transformation to monetize and capture
value across channels, products, services and customers
• Maturing digital operations – transformation of how products and services are
created, delivered and serviced
• Enabling the digital enterprise – change to organization & people
Industries
• Value migration – value is shifting along the value chain as digital business
models, often moving closer to the end consumer
• Value chain redefinition – the roles and relationships and industry player
across the value chain are changing
• Fragmentation – the emergence of new industry players is changing broader
industry ecosystems, with new entrants capturing significant value
Source: IBM Institute for Business Value Analysis 5
7. Transformation is achieved by optimizing
combination of value proposition and channel
capabilities at the same time
Digital Transformation Framework
Optimize Path 1 – Create and integrate digital operations and
processes to deliver customer value proposition
The challenge: Realize value of optimized operations by
Reshaping Operating Model
extending into new revenue models and transforming
the customer experience
The “how”
Leverage Path 2 – Enhance, extend or reshape the customer value
proposition with digital content, information, insight and
engagement
The challenge: Delivering innovative value proposition
effectively and efficiently, and being ale to
continuously innovate in lock-step with customers
Create Path 3 – Build a new set of capabilities around the
transformed customer value proposition and operating
Enhance Extend Re-Define model in lock-step
Reshaping customer value proposition The challenge: How to continuously balance and stay
The “what” aligned across the dimensions
6
Source: IBM Institute for Business Value Analysis
9. Interactive Solutions portfolio
Physical Digital Social Mobile Contact Broadcast
Center
PLAN, ALIGN, Business Strategy
ENVISION Digital Brand and Marketing Strategy
DESIGN, CREATE, Creative and Experience Design
IMPLEMENT Interactive User Experience
Implementation of Solutions
ENSURE, User Research and Measurement
PREDICT Business, Web, and Social Analytics
MAINTAIN, Campaign Management,
ENHANCE, Digital Productive and Maintenance Services
OPERATE
Financial
Communications Distribution Industrial Public SMB
Services
8
10. Interactive Solutions expertise
USER EXPERIENCE BUSINESS
User Experience Design Business Strategy
Information Architecture Digital Strategy
Creative Design Branding Strategy
Graphic Design Requirements Analysis
Rich Media Architecture Industry Subject Matter Expertise
Content Strategy Social Media Strategy
Usability Engineering Marketing Strategy
Accessibility Engineering Business Analytics
120+ PhD’s TECHNOLOGY
PROJECT MANAGEMENT
Solution Architecture
Program and Project Management
Rich Internet Application Technology
Change Management
HTML & Java Development
Testing Management
Mobile Architecture
Communications Management
Data Architecture
Risk Management
SecurityCustomer and Data Analysis
Issue Management
Testing
Maintenance and Support
9
11. Interactive Solutions clients
Our clients come to us to help them understand the future, develop differentiated brand strategies and
design relevant experiences across all points of interaction. Our solutions are designed to achieve
business results and increase overall customer satisfaction, leading to greater levels of customer
acquisition, retention, and loyalty.
National Bank
Bank of America
Samsung
VI
Wells Fargo Segway
RBS Discover Card Nationwide
Pfizer
Target Walmart ING USA
Royal Bank of Canada
STA Travel IBM Altria
Barclays
Client MetLife Lufthansa
American Express
Circuit City
Travelers Allianz
Panasonic Tiffany
JCPenney Genentech Sears
Mercedes Benz
Mass Mutual DC Comics
Gateway
CNL Prudential Chubb and Sons
LL Bean
Nestle
Strategy US Open
Unilever
Wimbledon Hallmark
“Company B”
The Home Depot
Norwegian Cruise Lines
Banco Fidurum
Mexx
World Bank Monster.com
Audi
NCAA
Design
10
10
12. Interactive Solutions is global
Toronto
London
Chicago Boston
Vancouver
Washington, DC
Tokyo
Atlanta
As a global integrated organization, IBM conducts business in 170 countries. IBM Interactive Centers
AIS Interactive Solutions has offices & studios in the Americas, Europe & Asia. Atlanta Tokyo
Each center serves as a regional hub, enabling clients to get to know their Bangalore Toronto
team. IBM’s worldwide reach gives us insight into local markets & cultures, Boston Vancouver
allowing us to sense global trends & directions and incorporate this insight Chicago Washington, DC
into client solutions before other companies. London
11
11
13. Interactive Solutions leverages the best of IBM
Our greatest is our ability to bring the best of IBM together to provide innovative
and comprehensive solutions for our clients’needs
IBM.com
Industrial
Design Accessibility
Center
User
Branding + Research
Design
Operations
Custom Strategy
Application Strategy
Development + Change
Campaign
Management
IBV
Digital
Global
Video Social
Technology
Production Media
services
IBM Lab
Software
Labs IBM
Research
12
16. Mobile is everywhere
5 Trends with significant implications for the enterprise
1 Mobile is primary
91% of mobile users keep their device within arm’s reach 100% of the time
2 Insights from mobile data provide new opportunities
75% of mobile shoppers take action after receiving a location based messages
3 Mobile is about transacting
96% year to year increase in mobile cyber Monday sales between 2012 and 2011
4 Mobile must create a continuous brand experience
90% of users use multiple screens as channels come together to create integrated
experiences
5
Mobile enables the Internet of Things
Global Machine-to-machine connections will increase from 2 billion in 2011 to 18
billion at the end of 2022
15
17. Clients have lots of mobile challenges
What’s my mobile strategy How do I support a
for B2E? B2B? B2C? How do I become a growing mobile
social business? workforce?
How do I secure
mobile How do mobile devices
endpoints? Can I migrate from connect securely to
How do I leverage laptops to tablets? the corporate
virtualization and network?
cloud?
How should I How do I deliver
support mobile
BYOD? applications?
How do I support
multiple mobile How do I reduce
platforms? costs?
16
18. IBM has increased its mobile enterprise capabilities
10 acquisitions to strengthen 125+ patents for wireless Doubling 2013
our position in mobile since inventions in 2012, bringing investment ……
2006…… the total to 270…..
200+ IBM Software apps Cited as a leader in app design and
available in App Stores; ~ managed services by Forrester and
1M downloads… Gartner………
17
19. The industry’s most comprehensive mobile portfolio
The Broadest The Deepest New Industry
Portfolio of Set of Partnerships
Mobile Services and
Solutions Expertise Resources
for
Developers
18
20. IBM MobileFirst offering portfolio
Industry Solutions
Banking Insurance Retail Transport Telecom Government Healthcare Automotive
Development & Integration Services
IBM & Partner Applications
Strategy & Design Services
Application & Data Platform
Management Security Analytics
Devices Network Servers
Cloud & Managed Services
19
21. A few of our clients
Concord Hospital improved patch
compliance 50%, reduced software
license costs 25%, and has not had a
single malware infection since
implementation of IBM Endpoint
Manager for patch management and
core protection
20
22. Getting started: mobile strategy & roadmap
Activities Deliverables Team/Location
TEAM
I. Business, Market and Customer Analysis Business Vision Core team of 4-6 IBM
for Mobile Strategy staff representing
Understand and align the business objectives, team structure and
business strategy, design
employee/customer needs in order to create a mobile vision for identifying
and Mobile
differentiating capabilities. Define specifically how mobile capabilities can be
IT/Architecture
leveraged and integrated with other multi-channel initiatives (e.g. web).
IBM staff work
Mobile Customer
II. Future-State Experience cooperatively with key
Experience Models
Estimated 4-10 weeks
client staff to ensure the
Develop the required future-state mobile experience and depict how users will (User Personas and recommendations are
interact with in conjunction with other channels to accomplish key common and Task Scenarios) grounded in the reality of
complex tasks. Identify specific enabling mobile technologies and processes
your business
aligned to recommended capabilities.
Mobile Technology & LOCATION
Work is typically handled
III. Technology and Architecture Evaluation Architecture
on-site in order to provide
Assess current mobile technology infrastructure and Identify key mobile Evaluation access to project
technology capabilities and systems that will be needed to support the future- stakeholders. IBM may
state customer experience for mobile. Identify gaps or considerations that should staff parallel, co-located
be addressed. teams up front to gather
data across both firms
and locations
Mobile
IV. Mobile Solutions Roadmap Implementation In addition, separate in-
Develop mobile recommendations and an Implementation Roadmap for designing Roadmap field observations will
and developing the next generation mobile experience. Identifying dependencies (3-year) need to be done across
and enablers required to estimate the cost, resources and timing of initiatives that both gas and electric as
will support the mobile strategy. well as key employee
types and tasks.
21
23. Assessment method and tools
Our assessment uses proven tools and methods to assist you in developing your strategy
Mobile Strategy Accelerators
• Data Collection Guides
• Questionnaires
• User Research/Field Observation Techniques
• Decision Models
• Mobile experience models
• Non-Functional Requirement samples
• Capability Maturity Models
• Templates of evaluation metrics for vendor analyses in the areas of Mobile Device
Management, Enterprise App Store, Hybrid application platforms, UI and
Controller frameworks
Mobile IT Tools and Accelerators IBM has conducted research focused on
understanding media and entertainment
• Product & Portfolio Management (IBM Rational Focal Point) customer needs as well as overall
industry trends
• Reuse through Model-Driven Development
• Enhanced Collaboration (Rational Team Concert)
• Web2.0 and Mobile Feature Pack Update (WebSphere Application Server)
• Widget set for Mobile Web Apps (Dojo Mobile)
• Tools – Core features for mobile tools
• Testing Applications on Mobile Devices (Rational Quality Manager integrated with DeviceAnywhere)
• Rapid Ideation & Agile Application Development
22
24. Sample mobile engagement
Technology and Mobile Solutions
Business, Market and Future-State
Architecture Evaluation Roadmap
Customer Analysis Experience
A directional strategy and framing of the mobile vision. This vision will be integrated across
all work streams including business, user experience, and IT.
Business, Market and Customer Analysis
Develop an mobile strategy and vision that will be informed by stakeholder interviews,
customer research and a marketplace assessment of leading cross-industry mobile
functionality and practices. A summary of the first stage of the project and will outline the initial
business and customer-focused vision and business strategy. The Strategy & Vision activities
will include synthesized findings. And will include the following deliverables
Deliverables: Business Vision for Mobile Strategy
Strategic Mobile Hypotheses & Objectives
Summary of Stakeholder Interviews (3-5 primary stakeholders)
Analysis Target Audience Mobile Usage
Mobile Trend & Marketplace Assessment
Mobile Services Prioritization Framework
* Assuming an 10 week schedule. Final timing to be defined based on a more specifically defined project scope.
23
25. Sample mobile engagement
Business, Market and Future State Technology and Mobile Solutions
Customer Analysis Experience Architecture Evaluation Roadmap
Weeks 3-6*
Envisioning the mobile experience and capabilities that support the future mobile strategy.
Future-State Experience Design
Design and develop scenario-based narrative and journey map of the future-state mobile
experience and differentiating capabilities as well as high-level requirements needed to
support the strategy, and identification of key enablers (i.e., people, process and technology).
A detailed narrative and journey map of the future-state mobile user experience and
differentiating capabilities as well as high-level requirements needed to support the mobile
strategy. This analysis will be used to define a technical blueprint to support the business
vision and strategy.
The Future-State Experience activities will provide a foundation for future definition, scoping,
and budget planning of specific business and IT initiatives. And will include the following
deliverables
Deliverable: Mobile Customer Experience Models (3-5 User/task based models)
* Assuming an 10 week schedule. Final timing to be defined based on a more specifically defined project scope.
24
26. Sample mobile engagement
Technology and Mobile Implementation
Business, Market and Future-State Mobile Solutions
Customer Analysis Architecture Evaluation Roadmap
Experience Roadmap
Weeks 2-7*
Defining current and required technologies and architecture to support the future
mobile strategy.
Technology and Architecture Evaluation
Security (data-on-device, authentication, authorization)
Application Paradigm (Native, Mobile Web, Hybrid)
Integration of existing services into mobile solution
Privacy of user applications and data in a BYOD (Bring Your Own Device) Model
Breadth of Platform Support (iPhone, iPad, Android-based smart phones and tablets,
BlackBerry smart phones and tablets, Windows7 smart phones)
Certification and Deployment of mobile apps
Governance (Mobile Device Management, Mobile Application Management)
Infrastructure Support
Deliverable: Technology and Architecture Overview
* Assuming an 10 week schedule. Final timing to be defined based on a more specifically defined project scope.
25
27. Sample mobile engagement
Business, Market and Technology and Mobile Solutions
Future-State
Customer Analysis Architecture Evaluation Roadmap
Experience
Weeks 7-10*
An actionable, integrated plan for designing, developing and managing the mobile strategy.
Mobile Solutions Roadmap (prioritized / phased)
This document will outline a high-level description of the key business and technical projects
to be undertaken in the next 12-36 months, in terms of their scope, objectives, dependencies,
risks, resource requirements, timeframe to execute, costs and benefits, and potential solution
options.
The Roadmap document will include findings and recommendations for the IT framework and
future-state technical and application architecture, a high-level gap analysis of technical
capabilities required to support the future state vision and an outline of potential risks and
challenges.
This Strategic Execution Roadmap will provide a foundation for future definition, scoping, and
budget planning of specific business and IT initiatives. And will include the following
deliverables
Deliverables
Prioritized Capability List, Gap Analysis and Supporting Mobile Initiatives
Mobile Implementation Roadmap (3-year)
* Assuming an 10 week schedule. Final timing to be defined based on a more specifically defined project scope.
26
29. What is User-Centered Design?
How do designers come up with an interface that's not in your face?
That just does what you want and doesn't make you waste time doing
what it wants?
Easy-to-use software doesn't just happen. It requires focusing on the
product's potential users from the very beginning and checking at each
step of the way with these users to be sure they like and are
comfortable with the final design.
“Ease of use may be invisible, but its absence sure isn’t...”
28
31. Who will be using the product?
When the target audience has been identified,
representative users can be recruited to work with the
team. These users help establish the requirements for the
product by answering questions that include the following:
– What do you want the product to do for you?
– In what sort of environment will you be using the
product?
– What are your priorities when using the software?
For example, which functions will you use most
often?
“Learn from experience -- the user’s”
30
32. User-centered design principles
Meeting the ease of use challenge is largely a matter of
adhering to the following principles. For each principle, the
goal is to involve users -- to ask the right people the right
questions. Putting yourself in their shoes is a sure way to put
your product at the front of the pack.
Set Business goals Superior design user seesongoing
Everything a requires and
Understand Users awareness designed life of theby a
A commitment tocompetition and
touches is of the understand
Throughout the together
User feedback is gathered early
Assess Competitiveness
product, continue toteam. This
Determine the target market,
multidisciplinary monitor and
involve the intended user is
its customers. When you
and often, using prototypes of
understandtheusers, and let their
essential your wayand primary If
listen to to your users' process.
includes the design tasks, is
intended users, a product you
Design the Total User Experience widely ranging fidelity, and this
feedback inform your responses
you want a user to understand
advertised,those same tasks
competition is central to all
must test ordered, bought,
Evaluate Designs feedback drives product design
packaged, maintained, installed,
againstproduct, you alternatives
designcompetitive must first
your market changes and
to and user participation
and development.
Manage by Continual User and compare their results with
administered, documented,
understand the user.
competitive activity.
Observation upgraded,yours.
and supported.
“Nobody buys ease of use. But nobody buys products without it either…” 31
33. Getting started
User-Centered Design (UCD) offers businesses a number of
critical advantages. It enables them to develop easy-to-use
products, satisfy customers, decrease expenditures on
technical support and training, advertise ease-of-use
successes, and ultimately increase market share.
Despite these advantages, many organizations do not
practice UCD. Instead, technologically savvy developers often
assume they understand the needs of common users and that
UCD is implicit in their designs.
These assumptions often allow the technology itself to guide
the development of products. The difficulty of adopting UCD
within such environments requires attention.
32
34. Top ten list for successful user centered design
1. Simplify the message
2. Tailor your messages to the concerns of each audience
3. Demonstrate the problems that poor usability causes your
organization
4. Provide evidence that demonstrates the value of UCD
5. Establish a set of UCD principles
6. Use simple messages to promote the need for UCD
7. Provide UCD education
8. Get the right set of skills
9. Leverage existing collateral
10. Select a pilot project
33