The document discusses the candidate's background and experience in engineering, IT solutions implementation, and project management. It then summarizes three case studies where the candidate's company, Masterland, provided mobile solutions to digitize business processes for a telecom operator, an insurance company, and a distribution company. The solutions enabled field data collection, analysis and real-time tracking to drive business operations and services. The document also covers disruptive trends in enterprise software around cyber security, cloud computing and IoT, and proposes a framework for defining a corporate roadmap.
micE Model for Defining Enterprise Mobile Strategyidescitation
Enterprises develop mobile solutions based on competitor offerings and
immediate business needs, without a clear enterprise wide mobile strategy. Thin, thick and
hybrid mobile apps, enterprise mobile platforms, mobile cloud services are all available
across a range of budgets and timing needs, and can be leveraged based on requirement.
Enterprise mobile strategy is typically viewed from the lenses of the IT stakeholders, who
often times have very focused and narrow agendas. The outcome of proceeding with point
solutions to address immediate needs, is unused licenses, replication of effort, rework due to
lack of proper guidelines and other issues that all lead to increased capital and operational
expenditure. This paper defines a user centric, holistic micE model for defining enterprise
mobile strategy and a staged process in leveraging the model in enterprise context.
Connected Healthcare - New PerspectiveSomenath Nag
An IDC source says, the healthcare industry is one of the highest-ranked industries for year-over-year growth and five-year compound annual growth rates with a worldwide average of 7.0% growth for FY12 in software.
There has been a significant investment in the form of health modernization and stimulus funding to leverage technology to cut down rising healthcare costs.
This presentation discusses the concepts of connected healthcare and how it will change the Healthcare Industry.
micE Model for Defining Enterprise Mobile Strategyidescitation
Enterprises develop mobile solutions based on competitor offerings and
immediate business needs, without a clear enterprise wide mobile strategy. Thin, thick and
hybrid mobile apps, enterprise mobile platforms, mobile cloud services are all available
across a range of budgets and timing needs, and can be leveraged based on requirement.
Enterprise mobile strategy is typically viewed from the lenses of the IT stakeholders, who
often times have very focused and narrow agendas. The outcome of proceeding with point
solutions to address immediate needs, is unused licenses, replication of effort, rework due to
lack of proper guidelines and other issues that all lead to increased capital and operational
expenditure. This paper defines a user centric, holistic micE model for defining enterprise
mobile strategy and a staged process in leveraging the model in enterprise context.
Connected Healthcare - New PerspectiveSomenath Nag
An IDC source says, the healthcare industry is one of the highest-ranked industries for year-over-year growth and five-year compound annual growth rates with a worldwide average of 7.0% growth for FY12 in software.
There has been a significant investment in the form of health modernization and stimulus funding to leverage technology to cut down rising healthcare costs.
This presentation discusses the concepts of connected healthcare and how it will change the Healthcare Industry.
Energy Trading and Risk Management (ETRM) solutions have now been a part of the broader wholesale energy trading application landscape for around 20-years, having evolved in step with both business and technology trends over that time period. As a result of this evolutionary process, there are a large number of diverse solutions on the market that address any number of combinations of industrial segments, energy commodities, geographic locations, and functional reach.
Besides the benefits are there possible challenges government agencies are likely to encounter should they
decide to adopt cloud computing? What strategies should be deployed to overcome the inhibitors of cloud
computing? These are but few questions this paper aims to investigate. Studies have shown that, cloud
computing has become a strategic direction for many government agencies and is already being deployed
in many critical areas of the government's cyber infrastructure. The benefits and the challenges of cloud
adoption have heightened interest of academic research in recent times. We are however uncertain, per
literature factors that hinder successful cloud adoption especially in the Ghanaian context. We posit that,
understanding the challenges of cloud adoption and overcoming them must accompany the use of the
technology in order to prevent unwanted technical consequences, and even greater problems from
government information management. This study is based on unstructured interviews from selected
government agencies in Ghana. The study is grounded on the theory of technology, organization and
environment (TOE) framework. Major inhibiting factors identified include lack of basic infrastructure for
cloud take-off, data security, unreliable internet connectivity, and general lack of institutional readiness
[ I B M] Ibm Banking Overview Final Version For F T UEcom Ftu
Do ông Aaron Axworthy trình bày tại hội thảo "TMĐT-Cơ hội nghề nghiệp trong tầm tay"
Giám đốc mảng dịch vụ tài chính tại 3 nước Vietnam, Laos và Campuchia.
Methodology and strategies for building successful telecom managed servicesParcus Group
Presentation to Juniper Networks Carrier Partners Summit in Bangkok on methodologies and strategies for building successful telecom managed services products.
Resilience Engineering as an IT Cultural DisciplineCognizant
To enable always-on and always-available digital business, IT organizations must become more operationally resilient to enhance system and application stability, which fuels service reliability and boosts reputational integrity.
Real estate is the largest asset class in the world and archaic systems and processes establish opportunities for disruption across the ecosystem. Today’s catalysts, which include a macro digital shift, the arrival of 5G, and COVID’s lasting impact on how we live and work, position PropTech for accelerated growth.
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...Karan Menon
Paper Presentation in PLM 2018
Authors:
Karan Menon, Hannu Kärkkäinen, Thorsten Wuest & Timo Seppälä
Tampere University of Technology; West Virginia University; ETLA, Finland.
An analysis of security trends in the Financial Services industry. 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world.
Energy Trading and Risk Management (ETRM) solutions have now been a part of the broader wholesale energy trading application landscape for around 20-years, having evolved in step with both business and technology trends over that time period. As a result of this evolutionary process, there are a large number of diverse solutions on the market that address any number of combinations of industrial segments, energy commodities, geographic locations, and functional reach.
Besides the benefits are there possible challenges government agencies are likely to encounter should they
decide to adopt cloud computing? What strategies should be deployed to overcome the inhibitors of cloud
computing? These are but few questions this paper aims to investigate. Studies have shown that, cloud
computing has become a strategic direction for many government agencies and is already being deployed
in many critical areas of the government's cyber infrastructure. The benefits and the challenges of cloud
adoption have heightened interest of academic research in recent times. We are however uncertain, per
literature factors that hinder successful cloud adoption especially in the Ghanaian context. We posit that,
understanding the challenges of cloud adoption and overcoming them must accompany the use of the
technology in order to prevent unwanted technical consequences, and even greater problems from
government information management. This study is based on unstructured interviews from selected
government agencies in Ghana. The study is grounded on the theory of technology, organization and
environment (TOE) framework. Major inhibiting factors identified include lack of basic infrastructure for
cloud take-off, data security, unreliable internet connectivity, and general lack of institutional readiness
[ I B M] Ibm Banking Overview Final Version For F T UEcom Ftu
Do ông Aaron Axworthy trình bày tại hội thảo "TMĐT-Cơ hội nghề nghiệp trong tầm tay"
Giám đốc mảng dịch vụ tài chính tại 3 nước Vietnam, Laos và Campuchia.
Methodology and strategies for building successful telecom managed servicesParcus Group
Presentation to Juniper Networks Carrier Partners Summit in Bangkok on methodologies and strategies for building successful telecom managed services products.
Resilience Engineering as an IT Cultural DisciplineCognizant
To enable always-on and always-available digital business, IT organizations must become more operationally resilient to enhance system and application stability, which fuels service reliability and boosts reputational integrity.
Real estate is the largest asset class in the world and archaic systems and processes establish opportunities for disruption across the ecosystem. Today’s catalysts, which include a macro digital shift, the arrival of 5G, and COVID’s lasting impact on how we live and work, position PropTech for accelerated growth.
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...Karan Menon
Paper Presentation in PLM 2018
Authors:
Karan Menon, Hannu Kärkkäinen, Thorsten Wuest & Timo Seppälä
Tampere University of Technology; West Virginia University; ETLA, Finland.
An analysis of security trends in the Financial Services industry. 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world.
Monetizing the Internet of Things: Creating a Connected Customer ExperienceZuora, Inc.
Customers today have new expectations. And never before has the customer experience been so critical than in the world IoT. Learn monetization strategies as well as the infrastructure require for delivering memorable customer experiences.
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...kalichargn70th171
The digital transformation landscape has become a key topic of discussion
globally, especially in light of the ongoing economic downturn. The COVID-19
pandemic has only accelerated the need for businesses to keep pace with the
changing times, as they are driven to expedite their digital transformation
journey to ensure their continued operation, if not growth. The pandemic has
resulted in a shift in the traditional way of working, presenting new challenges
in implementing flexible work setups, remote client engagement, and
automated customer experiences.
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...polenumerique33
Conférence "2 Avril Objets connectés, Internet des Objets (IoT) quels enjeux et opportunités pour les entreprises ?" du Pôle Numérique de la CCI Bordeaux - 02 04 2015 - Intervention de
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC
This EMC Perspective elaborates on how service providers can capitalize on the fast-growing cloud services market by being responsive to customers' goals, concerns, and performance and support requirements.
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDIndium Software
While cloud computing offers clinical laboratories the advantage of lowers costs of
infrastructure and better storage, among others, it also poses challenges of data integrity and
security. IP-driven automated testing frameworks such as Indium’s iSafe provide the labs with a
quick, accurate and comprehensive assessment of the health and performance of their services
on the cloud platform.
This report helps the user to understand trends in big data, cloud and medical devices, the key players in the ecosystem , the top users of this technology
DataArt Financial Services and Capital MarketsDataArt
DataArt is a global software engineering firm that takes a uniquely human approach to solving problems. With over 20 years of experience, teams of highly-trained engineers around the world, deep industry sector knowledge, and ongoing technology research, we help clients create custom software that improves their operations and opens new markets. Powered by our People First principle, we work with clients at any scale and on any platform, and adapt alongside them as they evolve.
We integrate our engineering excellence with deeply human values that drive our business and our approach to relationships: curiosity, empathy, trust, honesty, and intuition. These qualities help us deliver high-value, high-quality solutions that our clients depend on, and lifetime partnerships they believe in.
DataArt has earned the trust of some of the world’s leading brands and most discerning clients, including Nasdaq, Travelport, Ocado, Centrica/Hive, Paddy Power Betfair, IWG, Univision, Meetup and Apple Leisure Group among others. DataArt brings together expertise of over 3000 professionals in 20 locations in the US, Europe, and Latin America.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
SAND SKILLS
1.
2. MY PROFILE
QUESTION 1: EXAMPLE OF SOFTWARE PRODUCT BROUGHT TO THE MARKET
QUESTION 2: THE 3 MOST DISRUPTIVE TRENDS IN ENTERPRISE SOFTWARE
TECHNOLOGY
QUESTION 3: DEVELOPING A TECHNICALLY DIFFERENTIATED PRODUCT IN THE
CODE COVERAGE SPACE
QUESTION 4: DEFINING A CORPORATE-WIDE ROADMAP
QUESTION 5: WORKFLOW TO ENSURE A WORLD-CLASS ROADMAP
DEVELOPMENT MODEL
3. As per my academic background, I'm an Engineer in Aeronautics, Engineer in Electronics and
a Master of Science in Telecommunications. After a first experience of 5 years in electronics
engineering, I developed a 15 years considerable know-how in the implementation of Large-
scale IT solutions for automation and dematerialization of business processes, in particular in
the field of electronic payment, field force solutions, web and mobile applications.
I'm also PMP-certified, and have significantly participated to enterprise change management
based on certification systems such as ISO 9000 or CMMI.
4.
5. MASTERLAND is a modular, flexible and highly configurable platform designed to serve the need of field teams
such as sales, maintenance, distribution, etc. It includes a Web BackOffice application and a Mobile application
enabling to digitise and mobilise business processes in a quick and efficient way.
6. Processing and
Management of collected
data according to specific
Business requirement via
the implementation of
specific Plug-ins
Covers the generic life cycle of field operations, from setting up to
data analysis and exploitation.
Users
Geographic Sites
Parameter lists
Input forms
Set Roadmaps / Plan
on MAP
Assign forms to site
visits
Site Data
Capture in forms
Execute tasks
Send data
Offline / Online mode
Operations follow-up
on tabular and MAP
Control received
data
Alerts on specific
events
Rich and flexible
embedded BI tool
Graphs and Diagrams
Reports on MAP
Specific Reports
7. MASTERLAND is designed to enable the « MOBILISATION » of a multitude business
processes in a Quick and Efficient way
MASTERLAND
CENSUS AND
STATISTICS
COMMERCIAL
ANIMATION
FIELD SERVICE
MANAGEMENT
DISTRIBUTION
MANAGEMENT
ASSET
MANAGEMENT
FIELD PROJECT
REPORTING
8. The solution enabled the commercial department of a
leading Telecom Operator to plan operations, collect
field data and make analysis, which helps to enhance
efficiency and increases ability for decision making.
CHALLENGE
• + 35 000 points de sales
• Fully mobile field commercial staff, scattered
throughout the country
• Collected Information critical to the
competitiveness of the company
• Requirement for Real-time data to drive business
operations
SOLUTION
Innovative, simple to use and highly flexible platform compound of an embedded mobile application and
a Web BackOffice application
Plan for staff field operations and push planning to mobile terminals
Configure dynamic data collection forms to be filled in by mobile users
Dispatch useful commercial data to mobile staff
Follow-up operations through MAP
Produce real-time analysis and statistics
9. A leading insurance company, managing around 3 Millions
customer base, targeted to provide services to its members
and care producers through mobile terminals, such as follow-
up of refunds and cares. The aim is to ensure the right to
information and to promote proximity and quality of service to
the insured.
CHALLENGE
• Requirements for very attractive design and highly
ergonomic workflow
• Leverage appropriate data presentation and search
techniques so that the user could retrieve desired
information in the minimum of clicks
• Covering the most important mobile platforms: Android,
Apple, Microsoft
SOLUTION
The solution is made of 2 mobile applications (One for insured members and one
for care producers) deployed on the stores and a web administration tool. This
system enabled highly interactive services for the benefit of members:
• Consultation of the administrative situation of the insured and their dependents;
• Monitoring of reimbursement of medical records;
• Track supported hospitalization: dialysis, cancer, ophthalmology, etc.
• Monitoring of supported expensive drugs admitted
• Drug Guide (and generic) with readable bar codes
• Compare prices of acts among several care producers according to the National
Reference Price
• Sending claims or request for information with the possibility to attach
documents;
• Useful addresses with geo-locations
• Prevention messages on the main pathologies affecting target populations.
10. The deployed solution allows the agents of a leading distribution
company to process shipments using their mobile terminals.
This solution aims to:
• Ensure real-time tracking of collection and distribution
events via the data sent by the mobile terminal
• Dematerialization of paper documents to minimize the risk
of errors
• Data analysis through dashboards and dynamic reports
CHALLENGE
• Very little time available for operations, which requires to
optimise the application’s ergonomics
• Hundreds of users loading and sending important quantities
of data
SOLUTION
The implemented solution is a performance platform that consists of two main modules:
Mobile Module
• Allows the agent to perform the collection and distribution in real time from the Smartphone
• Provides the agent with the possibility to view the data relating to his / her tour (address, Phone
number, Weight, Delivery conditions, Payment, etc.);
Back Office Module
• Secure web application accessible internally by company authorized users
• This module provides functionality for administration and management of distribution and collection
operations
CASE STUDY 3: MOBILE SOLUTION FOR DISTRIBUTION MANAGEMENT
14. Security: Protecting users’ privacy
and enterprises’ OP; detecting and
blocking malicious activity
Data ownership: provider ?, client
?, both?
Complexity: IoT is still the domain
of experts
Sensing technology: Performance,
Connectvity, Power Consumption
Standardisation: Interoperability,
portability, manageability
15. Cloud Computing is a transformative set of technologies that can bring radical changes
to the business model of a company with a wide range of benefits
Streamlined work: focus on delivering software value.
Underlying infrastructure is managed by cloud provider
Scalability: infrastructure scales on demand,
managing variable workloads
Accessibility: Any internet connected device
Time to market: rapid application deployment
Data security: Hardware failures don’t result in data
loss
Flexible monetisation: mutualised resources with pay
as you consume principle
16. Difficulty to define the right business model enabling to leverage the benefits of
cloud platforms
Doubt about hosting sensitive data in systems owned by third party providers
Risks of dependence and lock to cloud software providers
Despite relative maturity of cloud technology, there still is a lack of mastery of
cloud systems and infrastructure by enterprise employers
17. Cyber security concerns the IT delivery chain from end to end: infrastructure, network,
applications, e-payment, systems, mobile terminals, IT organisation and procedures, etc
Protecting sensitive and personal data at
storage and during exchange
Dealing securily with cloud data sources such
as social networks, public stores, public
databases
Implementing application level security:
password management, access management,
idle mode management, webservice
authentication, SSO, etc.
Protecting data embedded in mobile
terminals
Prevention against hacking, sql injection,
malware
Managing system and network facilities in a
way that seals them from outside intrusion
Avoid to fall in security phobia, which might
lead to miss a business opportunity or to
overspend on security efforts.
A careful risk analysis should lead to a
balanced performance / cost ratio in
security management. The aim is to insure
18.
19. Code
cover is a
must !
Dense and Complex
code structure
Complex business
rules
Continuous
development
approach with high
regression risks
High requirements in
term of stability and
performance
(Aeronautics,
Healthcare)
Development of a
standard product with
optimised
components
20.
21. Interfacing risks
• Calling API functions
or requiring external
modules is generally
full of risks: using
wrong arguments,
network fluctuation
effect, exception
errors, corrupted data,
etc. This feature will
enable to configure
rules, run test cases
and detect interfacing
risks
Code Modularity
• The way code is
organised and
structured would have
a critical impact on its
maintainability and
scalability. This
feature will provide a
measurement of
modularity metric and
suggest
improvements to
tested code
Code Readability
• This feature will
enable to measure
code readability
according to
enterprise-defined
development
standard. The later
will be configured by
the client and
adjusted any time to
meet new rules and
policies.
22.
23. SEGMENTATION
•Determining the target client / usage
segmentation of the products and classifying
them under product lines
BUSINESS MODEL
•Determining the business model that fit with
each product: Cloud / In premise / Hosted;
Open Source / Closed source; Free /
Supported, which leads to classify products per
business model
TECHNOLOGY FRAME
•Understanding the used development tools,
frameworks and technologies in each product.
This will help to reorganise and optimise teams,
trainings and tools acquisitions
FUNCTIONAL SYNERGY
•Analysing the transversal functions within these
products, such as: Workflow engines, reporting
engines, audit trail, user management, security
features, etc. This analysis would detect
possible reuse of the best modules from some
products into the others
INTERFACING
•Detecting possible useful interfaces between
products. In principle, Integration between
products of the same company should be more
natural and straightforward than integration with
external products
STANDARDISATION
•Defining common company user interfaces
standards and branding elements that should
apply to all products. These standards should
be enforced for the first release, then
maintained in standard for all following releases
Apart from the fact that each individual product requires specific evolution roadmap that meets its
business context, one would benefit from developing fruitful synergies and economy of scale among
these gathered products, technologies and experiences
24.
25. Step 1:
Brainstorming
sessions
• Free suggestions
• Retaining the most
interesting ideas
• Outcome: Meeting
minutes of the
sessions
Step 2: Elaboration
of Master roadmap
plan
• Functional /
business viability
• technical viability
• development
milestones
• required human
and material
resources
• global timeline
• Outcome: Master
Roadmap Plan
document and
presentation
Step 3: Business
case evaluation
• Presentation to
the evaluation
committee
• Evaluation report
• Outcome: Go / No
go decision
Step 4: Detailed
Roadmap
• Roadmap
elaboration
• Roadmap
presentation
• Outcome: Signed
off version
Step 5: Follow-up
and steering
• Minor changes to
roadmap can be
decided at follow-
up committees
• Major changes to
roadmap can only
be decided at
steering
committees
• Outcome:
Roadmap updates