SlideShare a Scribd company logo
1 of 15
Download to read offline
Becoming a mobile enterprise step by step
Chris Pepin
IBM Global Mobile Offering Manager and Evangelist




                          @IBMMobile | #IBMatMobileCon   © 2012 IBM Corporation
Mobile is growing exponentially


       1 Billion                         Smartphones
                                         by 2016 *


    375m           Tablets by
                   2016 *


      61%              of CIOs put
                       mobile as priority


    45%      increased productivity
             with mobile apps




             Sources: IBM CIO study and Forrester Research (February 2012)*
2                      @IBMMobile | #IBMatMobileCon                           © 2012 IBM Corporation
Becoming a mobile enterprise step by step




         Develop mobile strategy,                   Enable corporate email,
    1    policy and educate
         employees                       4          contact and calendar


         Secure mobile devices                      Develop mobile

    2                                    5          application strategy



         Enable mobile network                      Deploy and manage

    3    infrastructure
                                         6          mobile applications


3                    @IBMMobile | #IBMatMobileCon                   © 2012 IBM Corporation
Develop mobile strategy, policy and educate employees


 What business problem am I trying to solve with mobile?

 Business to consumer and business to enterprise (B2C and B2E)

 Is there a corporate policy that speaks to Bring Your Own Device? (BYOD) Do I need an
  acceptable use policy? What’s the policy for mobile expense reimbursement and
  arrangements with mobile carriers?

 What are the corporate security and compliance requirements and how are they enforced?

 What devices and OS levels are supported? How is support provided? Can I leverage
  automation or self-service support to reduce costs? How do I educate employees?




                                                                                      1
4                           @IBMMobile | #IBMatMobileCon                      © 2012 IBM Corporation
Secure mobile devices


 End point and data management

 Full disk encryption

 End-to-end encryption

 Containerization and separation between work and personal data

 Remote wipe of corporate data should the device be lost, stolen or the employee leaves the
  company




                                                                                        3
                                                                                        2
5                           @IBMMobile | #IBMatMobileCon                        © 2012 IBM Corporation
Enable mobile network infrastructure


 Securely connect smartphones and tablets to the corporate network to access enterprise
  data

 Wi-fi coverage at corporate locations for employees and guests

 Network access control

 Virtual Private Network (VPN) access when away from the office and accessing enterprise
  data behind the corporate firewall




                                                                                       3
                                                                                       2
6                           @IBMMobile | #IBMatMobileCon                       © 2012 IBM Corporation
Enable corporate e-mail, contact and calendar


 Lotus Domino, Microsoft Exchange – on premise and cloud

 Messaging middleware including Lotus Traveler, Exchange ActiveSync, BlackBerry
  Enterprise Server, Good for Enterprise

 Native e-mail and third party clients

 Removing file attachments and changing file association type




                                                                                     4
7                             @IBMMobile | #IBMatMobileCon                   © 2012 IBM Corporation
Develop mobile application strategy


 Business to employee and business to consumer (B2E and B2C)

 Collaboration, social media, sale tracking, document sharing

 Network and security considerations

 Buy vs. build

 Native, web, hybrid and virtual applications

 Software Development Kit (SDK) and Mobile Application Platform




                                                                           5
8                             @IBMMobile | #IBMatMobileCon         © 2012 IBM Corporation
Deploy and manage mobile applications


 Business to consumer and business to enterprise (B2C and B2E)

 Distribute, update, manage, and secure mobile applications on both personal
  and corporate-owned mobile devices

 Application stores (public and enterprise)

 Mobile application lifecycle management

 Mobile application security & compliance management




                                                                                        6
9                             @IBMMobile | #IBMatMobileCon                      © 2012 IBM Corporation
IBM embraces Bring Your Own Device

                                                           IBM's BYOD program "really
     425,000 employees worldwide                          is about supporting
                                                           employees in the way they
                                                           want to work. They will find
                                                           the most appropriate tool to
                                                           get their job done. I want to
     50% of employees work remotely                       make sure I can enable them
                                                           to do that, but in a way that
                                                           safeguards the integrity of our
                                                           business.“
     50% workforce has less than 5 years of service
                                                           - IBM CIO Jeanette Horan



     How did IBM address the challenge?                 Business outcomes:
      1.   Deploy a secure technology framework          Increased employee productivity
                                                         Increased employee satisfaction
      2.   Develop a strong usage policy                 Reduced security risk and loss of corporate
                                                          data for personally owned devices
      3.   Educate employees
                                                         Over 120,000 employees using mobile devices
      4.   Support personally owned devices               for business with over 80,000 BYOD
           through social software


10                                   @IBMMobile | #IBMatMobileCon                            © 2012 IBM Corporation
1
IBM’s strategy addresses client mobile initiatives
       Build & Connect                 Manage & Secure              Extend & Transform

                 Build mobile                    Manage mobile                Extend capabilities
                 apps                            devices and apps             to mobile

                 Connect & run                   Secure my mobile             Transform
                 mobile systems                  business                     your business




     Key Capabilities                    Key Capabilities            Key Capabilities
     • Mobile web, hybrid and            • Mobile lifecycle          • Strategy, planning and
       native app development              management                  implementation
     • Enterprise data, service,         • Device analytics and      • Mobile-enabled solutions
       and application integration         control                     including analytics,
     • Enterprise wireless               • Secure network              commerce, and social
       networking                          communications &            business
                                           management                • Mobile as a service



11                                @IBMMobile | #IBMatMobileCon                      © 2012 IBM Corporation
Engage With IBM This Week

 1   Meet with an IBM expert to view a product
     demo in booth 735




 2   Join the conversation at @ibmmobile and
     #IBMatMobileCON




 3   Learn more at ibm.com/mobile-enterprise and
     follow us at #IBMMobile




12                   @IBMMobile | #IBMatMobileCon   © 2012 IBM Corporation
Join IBM during our other MobileCon sessions!
Date    Start                            Session Title                                              Stage
Wed    11:00 AM   IBM Mobile Enterprise Overview                                                      3
       11:00 AM   Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile                 2
       11:30 AM   Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy             2
       11:30 AM   Becoming a Mobile Enterprise Step-By-Step                                             3
       1:00 PM    Mobile Collaboration for Your Social Business                                         3
       1:30 PM    Making Commerce Mobile: Strategy and Trends of Mobile Commerce                        3
       2:00 PM    Manage and Secure Your Mobile Enterprise: Delivering Visibility and Confidence        2
       2:30 PM    Impact on IT of BYOD and the Mobile Enterprise                                        2
       3:00 PM    Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile                 2
       3:30 PM    Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy             2
Thurs 11:00 AM    IBM Mobile Enterprise Overview                                                        3
       11:00 AM   Manage and Secure Your Mobile Enterprise: Delivering Visibility and Confidence        2
       11:30 AM   Impact on IT of BYOD and the Mobile Enterprise                                        2
       11:30 AM   Becoming a Mobile Enterprise Step-By-Step                                             3
       1:00 PM    Mobile Collaboration for Your Social Business                                         3
       1:30 PM    Making Commerce Mobile: Strategy and Trends of Mobile Commerce                        3
       2:00 PM    Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile                 2
       2:30 PM    Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy             2
13                            @IBMMobile | #IBMatMobileCon                                © 2012 IBM Corporation
14   @IBMMobile | #IBMatMobileCon   © 2012 IBM Corporation
Legal Disclaimer

  • © IBM Corporation 2011. All Rights Reserved.
  • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
    in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
    subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
    contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
    conditions of the applicable license agreement governing the use of IBM software.
  • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
    capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
    future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by
    you will result in any specific sales, revenue growth or other results.
  • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
    Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will
    experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
    configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
    All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs
    and performance characteristics may vary by customer.
  • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM
    Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server).
    Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your
    presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in
    your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International
    Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
  • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
    Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other
    countries.
  • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
  • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
    Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
  • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
    Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States
    and other countries.
  • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
    UNIX is a registered trademark of The Open Group in the United States and other countries.
  • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
    Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of
    others.
  • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta
    Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration
    purposes only.



15                                                        @IBMMobile | #IBMatMobileCon                                                                               © 2012 IBM Corporation

More Related Content

What's hot

Executing Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales ForceExecuting Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales Forceaktana
 
Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...
Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...
Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...Ed Hewett
 
CES 2015: 50+ Highlights for Marketers
CES 2015: 50+ Highlights for MarketersCES 2015: 50+ Highlights for Marketers
CES 2015: 50+ Highlights for MarketersDavid Berkowitz
 
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...Fabernovel
 
The Commerce Graph
The Commerce GraphThe Commerce Graph
The Commerce GraphStreet Fight
 
Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...
Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...
Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...Bjoern Lasse Herrmann
 
Don't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDon't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDMI
 
5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming
5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming
5 Ways To Keep Retail Customers Loyal In The Age Of ShowroomingFabernovel
 
The Global Mobile Revolution - GGV Capital
The Global Mobile Revolution - GGV CapitalThe Global Mobile Revolution - GGV Capital
The Global Mobile Revolution - GGV CapitalGGV Capital
 
Sales on the Move: Bridging the Gap between Mobile Email and Salesforce
Sales on the Move: Bridging the Gap between Mobile Email and SalesforceSales on the Move: Bridging the Gap between Mobile Email and Salesforce
Sales on the Move: Bridging the Gap between Mobile Email and SalesforceCirrus Insight
 
Mobile websites - The Hidden Mobile Website Sales Opportunities Revealed
Mobile websites - The Hidden Mobile Website Sales Opportunities RevealedMobile websites - The Hidden Mobile Website Sales Opportunities Revealed
Mobile websites - The Hidden Mobile Website Sales Opportunities RevealedAndrew Edwards
 
Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...
Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...
Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...Globant
 
How Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First ExperienceHow Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First ExperienceYuan Wang
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 
Business Opportunities in Mobile Marketing
Business Opportunities in Mobile MarketingBusiness Opportunities in Mobile Marketing
Business Opportunities in Mobile MarketingJaysarie Gundran
 
All about Google
All about Google All about Google
All about Google Fabernovel
 
Adobe Mobile Maturity Study 2015
Adobe Mobile Maturity Study 2015Adobe Mobile Maturity Study 2015
Adobe Mobile Maturity Study 2015Ray Pun
 
L2 Prestige100 - Mobile IQ 2012
L2 Prestige100 - Mobile IQ 2012L2 Prestige100 - Mobile IQ 2012
L2 Prestige100 - Mobile IQ 2012Alain Duchene
 

What's hot (20)

Executing Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales ForceExecuting Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales Force
 
Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...
Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...
Light at the End of the Tube, Industry & Mobile Findings Illuminate Way in Mu...
 
CES 2015: 50+ Highlights for Marketers
CES 2015: 50+ Highlights for MarketersCES 2015: 50+ Highlights for Marketers
CES 2015: 50+ Highlights for Marketers
 
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
 
The Commerce Graph
The Commerce GraphThe Commerce Graph
The Commerce Graph
 
Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...
Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...
Saas State of the Industry Presentation At Small Business Summit 2014 by Bjoe...
 
Don't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDon't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent It
 
5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming
5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming
5 Ways To Keep Retail Customers Loyal In The Age Of Showrooming
 
The Global Mobile Revolution - GGV Capital
The Global Mobile Revolution - GGV CapitalThe Global Mobile Revolution - GGV Capital
The Global Mobile Revolution - GGV Capital
 
Sales on the Move: Bridging the Gap between Mobile Email and Salesforce
Sales on the Move: Bridging the Gap between Mobile Email and SalesforceSales on the Move: Bridging the Gap between Mobile Email and Salesforce
Sales on the Move: Bridging the Gap between Mobile Email and Salesforce
 
Connected Retail
Connected RetailConnected Retail
Connected Retail
 
Mobile websites - The Hidden Mobile Website Sales Opportunities Revealed
Mobile websites - The Hidden Mobile Website Sales Opportunities RevealedMobile websites - The Hidden Mobile Website Sales Opportunities Revealed
Mobile websites - The Hidden Mobile Website Sales Opportunities Revealed
 
Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...
Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...
Beyond Enterprise Consumerization: The era of Digital Journeys for the employ...
 
How Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First ExperienceHow Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First Experience
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 
Business Opportunities in Mobile Marketing
Business Opportunities in Mobile MarketingBusiness Opportunities in Mobile Marketing
Business Opportunities in Mobile Marketing
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
All about Google
All about Google All about Google
All about Google
 
Adobe Mobile Maturity Study 2015
Adobe Mobile Maturity Study 2015Adobe Mobile Maturity Study 2015
Adobe Mobile Maturity Study 2015
 
L2 Prestige100 - Mobile IQ 2012
L2 Prestige100 - Mobile IQ 2012L2 Prestige100 - Mobile IQ 2012
L2 Prestige100 - Mobile IQ 2012
 

Viewers also liked

Mobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonlyMobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonlyNicolas Perner
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not ) Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not ) Shai Wolkomir
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategyAxway Appcelerator
 
Mobile-first, a quick introduction
Mobile-first, a quick introductionMobile-first, a quick introduction
Mobile-first, a quick introductionJelle Desramaults
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceRaúl Castañón Martínez
 
Introducing the Mobile-First Cloud
Introducing the Mobile-First CloudIntroducing the Mobile-First Cloud
Introducing the Mobile-First Cloudkidozen
 
Mobile first business models
Mobile first business modelsMobile first business models
Mobile first business modelsTravelmedia nv
 
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...Tatjana Salcedo
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategyidescitation
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Progressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly EnterpriseProgressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly EnterpriseDave Olsen
 
Big Data Session Presentations
Big Data Session PresentationsBig Data Session Presentations
Big Data Session PresentationsePSI Platform
 
Mobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your EnterpriseMobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your EnterpriseWSO2
 
Hoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele casesHoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele casesAGConsult
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Barcoding, Inc.
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Nitin Gaur
 
Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity ModelSTART Houston
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Mobile-First Strategy
Mobile-First StrategyMobile-First Strategy
Mobile-First StrategySteve Buttry
 

Viewers also liked (20)

Mobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonlyMobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonly
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not ) Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not )
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
 
Mobile-first, a quick introduction
Mobile-first, a quick introductionMobile-first, a quick introduction
Mobile-first, a quick introduction
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
 
Introducing the Mobile-First Cloud
Introducing the Mobile-First CloudIntroducing the Mobile-First Cloud
Introducing the Mobile-First Cloud
 
Mobile first business models
Mobile first business modelsMobile first business models
Mobile first business models
 
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategy
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Progressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly EnterpriseProgressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly Enterprise
 
Big Data Session Presentations
Big Data Session PresentationsBig Data Session Presentations
Big Data Session Presentations
 
Mobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your EnterpriseMobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your Enterprise
 
Hoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele casesHoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele cases
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
 
Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity Model
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Mobile-First Strategy
Mobile-First StrategyMobile-First Strategy
Mobile-First Strategy
 

Similar to Becoming a mobile enterprise: step by step

Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Dirk Nicol
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolIBM Danmark
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Leigh Williamson
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the OfficeHeath McCarthy
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteMasha Geller
 
AN IV SF IBM Keynote - Phil Buckellew
AN IV SF IBM Keynote - Phil BuckellewAN IV SF IBM Keynote - Phil Buckellew
AN IV SF IBM Keynote - Phil BuckellewAPPNATION
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Ed Brill
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 

Similar to Becoming a mobile enterprise: step by step (20)

Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian Cagnol
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live!
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
Mobile enterprise
Mobile enterpriseMobile enterprise
Mobile enterprise
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the Office
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew Keynote
 
AN IV SF IBM Keynote - Phil Buckellew
AN IV SF IBM Keynote - Phil BuckellewAN IV SF IBM Keynote - Phil Buckellew
AN IV SF IBM Keynote - Phil Buckellew
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 

More from Chris Pepin

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesChris Pepin
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at homeChris Pepin
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Chris Pepin
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMChris Pepin
 

More from Chris Pepin (20)

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at home
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise Services
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
 

Recently uploaded

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Recently uploaded (20)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 

Becoming a mobile enterprise: step by step

  • 1. Becoming a mobile enterprise step by step Chris Pepin IBM Global Mobile Offering Manager and Evangelist @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 2. Mobile is growing exponentially 1 Billion Smartphones by 2016 * 375m Tablets by 2016 * 61% of CIOs put mobile as priority 45% increased productivity with mobile apps Sources: IBM CIO study and Forrester Research (February 2012)* 2 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 3. Becoming a mobile enterprise step by step Develop mobile strategy, Enable corporate email, 1 policy and educate employees 4 contact and calendar Secure mobile devices Develop mobile 2 5 application strategy Enable mobile network Deploy and manage 3 infrastructure 6 mobile applications 3 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 4. Develop mobile strategy, policy and educate employees  What business problem am I trying to solve with mobile?  Business to consumer and business to enterprise (B2C and B2E)  Is there a corporate policy that speaks to Bring Your Own Device? (BYOD) Do I need an acceptable use policy? What’s the policy for mobile expense reimbursement and arrangements with mobile carriers?  What are the corporate security and compliance requirements and how are they enforced?  What devices and OS levels are supported? How is support provided? Can I leverage automation or self-service support to reduce costs? How do I educate employees? 1 4 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 5. Secure mobile devices  End point and data management  Full disk encryption  End-to-end encryption  Containerization and separation between work and personal data  Remote wipe of corporate data should the device be lost, stolen or the employee leaves the company 3 2 5 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 6. Enable mobile network infrastructure  Securely connect smartphones and tablets to the corporate network to access enterprise data  Wi-fi coverage at corporate locations for employees and guests  Network access control  Virtual Private Network (VPN) access when away from the office and accessing enterprise data behind the corporate firewall 3 2 6 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 7. Enable corporate e-mail, contact and calendar  Lotus Domino, Microsoft Exchange – on premise and cloud  Messaging middleware including Lotus Traveler, Exchange ActiveSync, BlackBerry Enterprise Server, Good for Enterprise  Native e-mail and third party clients  Removing file attachments and changing file association type 4 7 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 8. Develop mobile application strategy  Business to employee and business to consumer (B2E and B2C)  Collaboration, social media, sale tracking, document sharing  Network and security considerations  Buy vs. build  Native, web, hybrid and virtual applications  Software Development Kit (SDK) and Mobile Application Platform 5 8 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 9. Deploy and manage mobile applications  Business to consumer and business to enterprise (B2C and B2E)  Distribute, update, manage, and secure mobile applications on both personal and corporate-owned mobile devices  Application stores (public and enterprise)  Mobile application lifecycle management  Mobile application security & compliance management 6 9 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 10. IBM embraces Bring Your Own Device IBM's BYOD program "really  425,000 employees worldwide is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to  50% of employees work remotely make sure I can enable them to do that, but in a way that safeguards the integrity of our business.“  50% workforce has less than 5 years of service - IBM CIO Jeanette Horan How did IBM address the challenge? Business outcomes: 1. Deploy a secure technology framework  Increased employee productivity  Increased employee satisfaction 2. Develop a strong usage policy  Reduced security risk and loss of corporate data for personally owned devices 3. Educate employees  Over 120,000 employees using mobile devices 4. Support personally owned devices for business with over 80,000 BYOD through social software 10 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation 1
  • 11. IBM’s strategy addresses client mobile initiatives Build & Connect Manage & Secure Extend & Transform Build mobile Manage mobile Extend capabilities apps devices and apps to mobile Connect & run Secure my mobile Transform mobile systems business your business Key Capabilities Key Capabilities Key Capabilities • Mobile web, hybrid and • Mobile lifecycle • Strategy, planning and native app development management implementation • Enterprise data, service, • Device analytics and • Mobile-enabled solutions and application integration control including analytics, • Enterprise wireless • Secure network commerce, and social networking communications & business management • Mobile as a service 11 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 12. Engage With IBM This Week 1 Meet with an IBM expert to view a product demo in booth 735 2 Join the conversation at @ibmmobile and #IBMatMobileCON 3 Learn more at ibm.com/mobile-enterprise and follow us at #IBMMobile 12 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 13. Join IBM during our other MobileCon sessions! Date Start Session Title Stage Wed 11:00 AM IBM Mobile Enterprise Overview 3 11:00 AM Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile 2 11:30 AM Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy 2 11:30 AM Becoming a Mobile Enterprise Step-By-Step 3 1:00 PM Mobile Collaboration for Your Social Business 3 1:30 PM Making Commerce Mobile: Strategy and Trends of Mobile Commerce 3 2:00 PM Manage and Secure Your Mobile Enterprise: Delivering Visibility and Confidence 2 2:30 PM Impact on IT of BYOD and the Mobile Enterprise 2 3:00 PM Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile 2 3:30 PM Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy 2 Thurs 11:00 AM IBM Mobile Enterprise Overview 3 11:00 AM Manage and Secure Your Mobile Enterprise: Delivering Visibility and Confidence 2 11:30 AM Impact on IT of BYOD and the Mobile Enterprise 2 11:30 AM Becoming a Mobile Enterprise Step-By-Step 3 1:00 PM Mobile Collaboration for Your Social Business 3 1:30 PM Making Commerce Mobile: Strategy and Trends of Mobile Commerce 3 2:00 PM Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile 2 2:30 PM Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy 2 13 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 14. 14 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation
  • 15. Legal Disclaimer • © IBM Corporation 2011. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only. 15 @IBMMobile | #IBMatMobileCon © 2012 IBM Corporation

Editor's Notes

  1. Key message: Computing continues to extend it’s reach and mobile is the latest extension to become fully embedded in the fabric of enterprise IT. But it does bring with it some unique characteristics. From a business perspective it is really transforming and creating new business models. These models must adapt to consumer mobile expectations and work on the end consumer’s own private device Mobile apps have much faster lifecycles and they are much more iterative than traditional applications And there is a high degree of fragmentation of devices, networks, and languages, etc. that is forcing movement toward open standards. Sources: 1 Source: IDC 2 Source: Gartner's Top Predictions for IT Organizations and Users, 2012 and Beyond: November 2011 3 Source: IDC 4 Source: IDC . “Worldwide Business Use Smartphone Forecast and Analysis,” doc #225054, September 2010
  2. Mobile is an enterprise priority. The chart on the left is from a recent Well Fargo Securities report indicating the rapid growth in the number of smart phones worldwide as presented by the blue bar. On the right side we are reminded of key findings from the recent IBM Global CIO study indicating that mobile and cloud are the top spending priorities for CIOs. And by 2020 more than 10 billion mobile connected devices are expected to be in use. We see that mobile data traffic exceeded voice in 2010 and will continue to grow according to The Yankee Group “ Less than five years ago, mobile data traffic made up less than about 15 percent of all total mobile revenue. “ Source: http://www.wirelessindustrynews.org/news-aug-2010/2085-082510-win-news.html (August 26, 2010)
  3. In order to take advantage of the opportunities presented in the mobile space, enterprises from all industries need a comprehensive mobile platform that bridges the gap between the diverse and fragmented mobile devices (tablets and smartphones) and the back end systems that deliver content. The needs of the mobile business are varied and IBM offers a unified portfolio that allows clients to build mobile applications, connect to and run backend systems, while managing and securing their business while extending capabilities to mobile devices and transforming their business.
  4. IBM has a broad set of service capabilities in the mobile space.
  5. Author Note: Mandatory Rational closing slide (includes appropriate legal disclaimer). Graphic is available in English only.