SlideShare a Scribd company logo
Software Trends 2013
For Today and Future
(with Important Tips)
A Presentation by: Sanjiv Arora
Contact Cell +91 98102 93733, e-mail – sa@tech-controls.com, www.tech-controls.com
Wats up!
Our Nerve Systems
Our Nerve Systems
Who makes the computer
work: The Software Engineer
1. Gamification
http://gamification.org/wiki/Gamification_Examples
Applies to non-game applications and
processes, in order to encourage people to
adopt them, or to influence how they are
used.
Gamification works by making technology
more engaging for end users and
customers.
Work as if, it is just a game !
Industry where this concept may be useful
Marketing, Education, Art, life HR and
Design (etc.)
Gamification – Design Steps
2. Mobile Money
Carry your money where you go
There are four primary models for mobile
payments:
Premium SMS based transactional
payments
Direct Mobile Billing
Mobile web payments (WAP)
Contactless NFC (Near Field
Communication)
Mobile Money
3. Mobile Marketing
Use SoloMo – Social Local Mobile
Sellers will send Advertisements, Discount
Offers, schemes, New Arrivals etc on the
mobile
At Right place at right time (If you are in a
particular Shopping Mall, you see local Ads)
58% users in US use smartphones to get
directions, ATM details, Restaurant details
etc (People in India use the same through
GPS, Mapmyindia)
4. Seamless Sharing
Sharing buttons are on many social
websites
Almost 50% of 10,000 largest websites
have such links
Useful sharing (benefits, education, legal,
risk) is the key
Facebook page views see a declining trend
(Making or linking friends only, does not
help us grow or benefit)
Kolaveri Di got 30 million youtube views till
Jan 2012
Has advantages and risks
Need to define terms of use
5. Regulations:
Price of FREE access
NO FREE LUNCHES
FREE email accounts gmail, hotmail, Rediff
Social sites (Facebook, Twitter, Linkedin,
Orkut, Youtube) and so many other services
Your individual data is used to promote
business or increase sales, cross selling, by
these websites
May not be misuse, unethical selling of data
Monitoring practices shall be used for
trending
Score individual commercial value using
digital footprints
6. Security Implementations:
Laws in India
Every Corporate must protect Individual
Private Information (Address, Family details,
Health details etc) Failure can result in fine
upto Rs. 5 Crore as per IT Act 2000 – Sec
43a, Sox, PCI DSS
Telecom data, ATM, bank data retention is
for ever
Any derogatory, anti-national remark on
Facebook, Blogs can invite arrest and it is
non-bailable offence
Protection of Information Security, Business
Continuity, Privacy of data as per Laws
Software Mobile, mobility, moble Software solutions,
solutions available on the move, solutions available Software
on the move, Mobile, mobility, moble solutions Mobile,
Software mobility, moble Software solutions solutions
available on the move, Mobile, mobility, moble solutions,
solutions available Software on the move Software
The Future is ....more options
Demand of Software Engineers
Follow Industry trends – whatever that sells
Questions ?
No question is stupid....Go
Ahead
Thank You!
We offer our rich experience to meet your Business Requirements and
Objectives in the IT Audits, IT Governance, Risk, Security Awareness, CISA, CISM
Training and IT Strategy consulting areas.
Our specializations includes reviews of ERP, CBS, Information Architecture, IT
Efficiency and Effectiveness to deliver value amongst other things.
We have worked with Al Rajhi Takaful in KSA, Qatar Steel, WFP, WHO, UNOPS,
Govt of India and many other reputed companies across the world.
We shall be happy to discuss your requirements,
Look forward.
Sanjiv Arora
Contact Cell +91 98102 93733, e-mail – sa@tech-controls.com, www.tech-controls.com

More Related Content

What's hot

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
We Are Social
 
Smartphone & tablets: threats or opportunity
Smartphone & tablets: threats or opportunitySmartphone & tablets: threats or opportunity
Smartphone & tablets: threats or opportunity
ChunJia Sio
 
The future of IOT
The future of IOTThe future of IOT
The future of IOT
Arti Parab Academics
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2
Frank Braski
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
Dr. Mazlan Abbas
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex Training
Bryan Len
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systems
LeMeniz Infotech
 
Why Digital Enterprise by Panso Solutions
Why Digital Enterprise by Panso SolutionsWhy Digital Enterprise by Panso Solutions
Why Digital Enterprise by Panso Solutions
Panso Solutions India Pvt Ltd
 
ALL ABOUT ARTIFICIAL INTELLIGENCE
ALL  ABOUT ARTIFICIAL INTELLIGENCEALL  ABOUT ARTIFICIAL INTELLIGENCE
ALL ABOUT ARTIFICIAL INTELLIGENCE
Kiran Mandrawadkar
 
The Future of Finance is Tech
The Future of Finance is TechThe Future of Finance is Tech
The Future of Finance is Tech
Insight
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
Kirti Khanna
 
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
Alwin Arrasyid
 
Next generation AI platform for smart cities and driver-less vehicles
Next generation AI platform for smart cities and driver-less vehiclesNext generation AI platform for smart cities and driver-less vehicles
Next generation AI platform for smart cities and driver-less vehicles
Rocco Magnotta
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Marjuk Ahmed Siddiki
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Digital Policy and Law Consulting
 
PSFK CES Guide 2016
PSFK CES Guide 2016PSFK CES Guide 2016
PSFK CES Guide 2016
PSFK
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
Juniper Networks
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ict
SmritiGurung4
 

What's hot (20)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Smartphone & tablets: threats or opportunity
Smartphone & tablets: threats or opportunitySmartphone & tablets: threats or opportunity
Smartphone & tablets: threats or opportunity
 
The future of IOT
The future of IOTThe future of IOT
The future of IOT
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex Training
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systems
 
Why Digital Enterprise by Panso Solutions
Why Digital Enterprise by Panso SolutionsWhy Digital Enterprise by Panso Solutions
Why Digital Enterprise by Panso Solutions
 
ALL ABOUT ARTIFICIAL INTELLIGENCE
ALL  ABOUT ARTIFICIAL INTELLIGENCEALL  ABOUT ARTIFICIAL INTELLIGENCE
ALL ABOUT ARTIFICIAL INTELLIGENCE
 
The Future of Finance is Tech
The Future of Finance is TechThe Future of Finance is Tech
The Future of Finance is Tech
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
 
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
 
Next generation AI platform for smart cities and driver-less vehicles
Next generation AI platform for smart cities and driver-less vehiclesNext generation AI platform for smart cities and driver-less vehicles
Next generation AI platform for smart cities and driver-less vehicles
 
technological davids.
technological davids.technological davids.
technological davids.
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
 
PSFK CES Guide 2016
PSFK CES Guide 2016PSFK CES Guide 2016
PSFK CES Guide 2016
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ict
 

Viewers also liked

Anixter Overview
Anixter OverviewAnixter Overview
Anixter Overviewrrakib
 
The Chanel Century
The Chanel CenturyThe Chanel Century
The Chanel Centuryguestda81b6
 
Morning Depoutline
Morning DepoutlineMorning Depoutline
Morning Depoutlineguest1aabe34
 
Moto Gp Oral Presentation
Moto Gp Oral PresentationMoto Gp Oral Presentation
Moto Gp Oral Presentationfranc19
 
Intro to Ruby on Rails
Intro to Ruby on RailsIntro to Ruby on Rails
Intro to Ruby on Rails
homanj
 
Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010
Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010
Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010
ValueFrame Oy
 
The Canada Not For Profit Act
The Canada Not For Profit ActThe Canada Not For Profit Act
The Canada Not For Profit Actnoahsarna
 
World AIDS Day
World AIDS DayWorld AIDS Day
World AIDS Day
GDS International
 
Ayy Ensimmainen Hallitus
Ayy Ensimmainen HallitusAyy Ensimmainen Hallitus
Ayy Ensimmainen Hallitusvaltsi
 
Seeing Red Cars
Seeing Red CarsSeeing Red Cars
Seeing Red Cars
Business Book Summaries
 
campaña recogida de alimentos
campaña recogida de alimentoscampaña recogida de alimentos
campaña recogida de alimentospive
 
Artlandis' webinar Season 2 -Open day
Artlandis' webinar Season 2 -Open dayArtlandis' webinar Season 2 -Open day
Artlandis' webinar Season 2 -Open day
Artlandis' Webinar & Workshop
 
Guida all'Email Marketing
Guida all'Email MarketingGuida all'Email Marketing
Guida all'Email Marketing
Artlandis' Webinar & Workshop
 
Your Best Target
Your Best TargetYour Best Target
What’S The Plan.Web
What’S The Plan.WebWhat’S The Plan.Web
What’S The Plan.Webnancybostock
 
The Effects of Work Habits Around Agility Through Simulations
The Effects of Work Habits Around Agility Through SimulationsThe Effects of Work Habits Around Agility Through Simulations
The Effects of Work Habits Around Agility Through Simulations
Paul Boos
 
Adobe Indesign CS 5.5 (Corso Base)
Adobe Indesign CS 5.5 (Corso Base)Adobe Indesign CS 5.5 (Corso Base)
Adobe Indesign CS 5.5 (Corso Base)
Artlandis' Webinar & Workshop
 

Viewers also liked (20)

Anixter Overview
Anixter OverviewAnixter Overview
Anixter Overview
 
The Chanel Century
The Chanel CenturyThe Chanel Century
The Chanel Century
 
Morning Depoutline
Morning DepoutlineMorning Depoutline
Morning Depoutline
 
Moto Gp Oral Presentation
Moto Gp Oral PresentationMoto Gp Oral Presentation
Moto Gp Oral Presentation
 
Intro to Ruby on Rails
Intro to Ruby on RailsIntro to Ruby on Rails
Intro to Ruby on Rails
 
Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010
Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010
Asiantuntijaorganisaation luvuilla johtaminen - Turku 11.3.2010
 
The Canada Not For Profit Act
The Canada Not For Profit ActThe Canada Not For Profit Act
The Canada Not For Profit Act
 
World AIDS Day
World AIDS DayWorld AIDS Day
World AIDS Day
 
Ayy Ensimmainen Hallitus
Ayy Ensimmainen HallitusAyy Ensimmainen Hallitus
Ayy Ensimmainen Hallitus
 
Seeing Red Cars
Seeing Red CarsSeeing Red Cars
Seeing Red Cars
 
campaña recogida de alimentos
campaña recogida de alimentoscampaña recogida de alimentos
campaña recogida de alimentos
 
Artlandis' webinar Season 2 -Open day
Artlandis' webinar Season 2 -Open dayArtlandis' webinar Season 2 -Open day
Artlandis' webinar Season 2 -Open day
 
Guida all'Email Marketing
Guida all'Email MarketingGuida all'Email Marketing
Guida all'Email Marketing
 
Your Best Target
Your Best TargetYour Best Target
Your Best Target
 
Let it be - The Beatles
Let it be - The BeatlesLet it be - The Beatles
Let it be - The Beatles
 
What’S The Plan.Web
What’S The Plan.WebWhat’S The Plan.Web
What’S The Plan.Web
 
The Effects of Work Habits Around Agility Through Simulations
The Effects of Work Habits Around Agility Through SimulationsThe Effects of Work Habits Around Agility Through Simulations
The Effects of Work Habits Around Agility Through Simulations
 
Sketchup
SketchupSketchup
Sketchup
 
Adobe Indesign CS 5.5 (Corso Base)
Adobe Indesign CS 5.5 (Corso Base)Adobe Indesign CS 5.5 (Corso Base)
Adobe Indesign CS 5.5 (Corso Base)
 
Prawn
PrawnPrawn
Prawn
 

Similar to Software Trends 2013

The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
Insights success media and technology pvt ltd
 
Fintech Software Development: A Comprehensive Guide in 2024
Fintech Software Development: A Comprehensive Guide in 2024Fintech Software Development: A Comprehensive Guide in 2024
Fintech Software Development: A Comprehensive Guide in 2024
SeasiaInfotech2
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Andris Soroka
 
Microsoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus MaltaMicrosoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus Malta
Chris Papaphotis
 
The role of technology in fostering e commerce business growth
The role of technology in fostering e commerce business growthThe role of technology in fostering e commerce business growth
The role of technology in fostering e commerce business growth
SnehaDas60
 
Mobile apps to augment revenue
Mobile apps to augment revenue  Mobile apps to augment revenue
Mobile apps to augment revenue
Hurix Systems
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
Techugo
 
Information Technology and Services Flyer - Mobiloitte
Information Technology and Services Flyer - MobiloitteInformation Technology and Services Flyer - Mobiloitte
Information Technology and Services Flyer - Mobiloitte
Mobiloitte
 
Artificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial servicesArtificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial services
Prudhvi Parne
 
Latest mobile app development trends
Latest mobile app development trendsLatest mobile app development trends
Latest mobile app development trends
eLuminous Technologies Pvt. Ltd.
 
Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...
Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...
Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...
Katy Slemon
 
Golden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureGolden years of IT: Past Present and Future
Golden years of IT: Past Present and Future
Altaf Rehmani
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 
The Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal MarketersThe Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal Marketers
Adam Stock
 
Top 10 use case of ai and ml
Top 10 use case of ai and mlTop 10 use case of ai and ml
Top 10 use case of ai and ml
Mobinius Technologies
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance
Swathi Young
 
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Milos Radovic
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising businessSno Jutt
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 

Similar to Software Trends 2013 (20)

The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Fintech Software Development: A Comprehensive Guide in 2024
Fintech Software Development: A Comprehensive Guide in 2024Fintech Software Development: A Comprehensive Guide in 2024
Fintech Software Development: A Comprehensive Guide in 2024
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
Microsoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus MaltaMicrosoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus Malta
 
The role of technology in fostering e commerce business growth
The role of technology in fostering e commerce business growthThe role of technology in fostering e commerce business growth
The role of technology in fostering e commerce business growth
 
Mobile apps to augment revenue
Mobile apps to augment revenue  Mobile apps to augment revenue
Mobile apps to augment revenue
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Information Technology and Services Flyer - Mobiloitte
Information Technology and Services Flyer - MobiloitteInformation Technology and Services Flyer - Mobiloitte
Information Technology and Services Flyer - Mobiloitte
 
Artificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial servicesArtificial intelligence & Machine learning role in financial services
Artificial intelligence & Machine learning role in financial services
 
Latest mobile app development trends
Latest mobile app development trendsLatest mobile app development trends
Latest mobile app development trends
 
Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...
Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...
Offshore Ruby on Rails Development and Bacancy Technology – A Match Made in H...
 
Golden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureGolden years of IT: Past Present and Future
Golden years of IT: Past Present and Future
 
Fingerpay
FingerpayFingerpay
Fingerpay
 
The Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal MarketersThe Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal Marketers
 
Article in Smart Manager
Article in Smart ManagerArticle in Smart Manager
Article in Smart Manager
 
Top 10 use case of ai and ml
Top 10 use case of ai and mlTop 10 use case of ai and ml
Top 10 use case of ai and ml
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance
 
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Software Trends 2013

  • 1. Software Trends 2013 For Today and Future (with Important Tips) A Presentation by: Sanjiv Arora Contact Cell +91 98102 93733, e-mail – sa@tech-controls.com, www.tech-controls.com
  • 5. Who makes the computer work: The Software Engineer
  • 6. 1. Gamification http://gamification.org/wiki/Gamification_Examples Applies to non-game applications and processes, in order to encourage people to adopt them, or to influence how they are used. Gamification works by making technology more engaging for end users and customers. Work as if, it is just a game ! Industry where this concept may be useful Marketing, Education, Art, life HR and Design (etc.)
  • 8. 2. Mobile Money Carry your money where you go There are four primary models for mobile payments: Premium SMS based transactional payments Direct Mobile Billing Mobile web payments (WAP) Contactless NFC (Near Field Communication)
  • 10. 3. Mobile Marketing Use SoloMo – Social Local Mobile Sellers will send Advertisements, Discount Offers, schemes, New Arrivals etc on the mobile At Right place at right time (If you are in a particular Shopping Mall, you see local Ads) 58% users in US use smartphones to get directions, ATM details, Restaurant details etc (People in India use the same through GPS, Mapmyindia)
  • 11. 4. Seamless Sharing Sharing buttons are on many social websites Almost 50% of 10,000 largest websites have such links Useful sharing (benefits, education, legal, risk) is the key Facebook page views see a declining trend (Making or linking friends only, does not help us grow or benefit) Kolaveri Di got 30 million youtube views till Jan 2012 Has advantages and risks Need to define terms of use
  • 12. 5. Regulations: Price of FREE access NO FREE LUNCHES FREE email accounts gmail, hotmail, Rediff Social sites (Facebook, Twitter, Linkedin, Orkut, Youtube) and so many other services Your individual data is used to promote business or increase sales, cross selling, by these websites May not be misuse, unethical selling of data Monitoring practices shall be used for trending Score individual commercial value using digital footprints
  • 13. 6. Security Implementations: Laws in India Every Corporate must protect Individual Private Information (Address, Family details, Health details etc) Failure can result in fine upto Rs. 5 Crore as per IT Act 2000 – Sec 43a, Sox, PCI DSS Telecom data, ATM, bank data retention is for ever Any derogatory, anti-national remark on Facebook, Blogs can invite arrest and it is non-bailable offence Protection of Information Security, Business Continuity, Privacy of data as per Laws
  • 14. Software Mobile, mobility, moble Software solutions, solutions available on the move, solutions available Software on the move, Mobile, mobility, moble solutions Mobile, Software mobility, moble Software solutions solutions available on the move, Mobile, mobility, moble solutions, solutions available Software on the move Software The Future is ....more options Demand of Software Engineers Follow Industry trends – whatever that sells
  • 15. Questions ? No question is stupid....Go Ahead
  • 16. Thank You! We offer our rich experience to meet your Business Requirements and Objectives in the IT Audits, IT Governance, Risk, Security Awareness, CISA, CISM Training and IT Strategy consulting areas. Our specializations includes reviews of ERP, CBS, Information Architecture, IT Efficiency and Effectiveness to deliver value amongst other things. We have worked with Al Rajhi Takaful in KSA, Qatar Steel, WFP, WHO, UNOPS, Govt of India and many other reputed companies across the world. We shall be happy to discuss your requirements, Look forward. Sanjiv Arora Contact Cell +91 98102 93733, e-mail – sa@tech-controls.com, www.tech-controls.com