SlideShare uma empresa Scribd logo
1 de 18
Droidcon 2012




Enterprise Android –
for the win?
DroidCon 2012
Jan Peuker, Accenture
Raoul Neu, Elca Informatik
Droidcon 2012




«The purpose of an organization is
to enable ordinary humans beings
to do extraordinary things» Peter F. Drucker
 Large Organizations have to strictly follow rules and laws
     Very risk averse, very security and privacy aware
     Rigid development standards and quality assurance
 Large Organizations are internationally spread
     IT as business enabler, not feature- but productivity-driven
     IT usually outsourced – documentation and processes mandatory
 We look at corporate internal applications
Droidcon 2012




What makes Android so interesting
for the enterprise?
Captain Jean-Luc Picard:      There's an aura
                              around him.
Lieutenant Geordi La Forge:   Well, of course, he's
                              an android.
Droidcon 2012




Standards = Cost efficency
Droidcon 2012




Challengers
iOS                                   Windows [mobile|embedded|CE|phone]
 Very strong C-Level visibility,      Windows CE is the standard
  favorite in BYOD schemes              mobile productivity platform
 Very good enterprise                 Broad range of rugged and
  features, particularly for            hardware (SAM) secured devices
  update and hardware services         Very good enterprise features,
 Strong device and mail encryption     very strong Outlook integration
 Development requires                 WP 7 incompatible, Windows
  separate infrastructure               Embedded 8 could be game-changer

Most importantly, though, they care.
Droidcon 2012




«I had a problem so I thought to use Java –
      now I have a ProblemFactory»
Droidcon 2012

«We seek peaceful co-existence»
Capt. Remmick


or: Supporting multiple platforms

 The right choice: Native, Hybrid or Cross-Platform
     No silver bullet. Analyze your requirements & constraints.


 MEAP: Advantages & Drawbacks
     Pro’s in integration and governance. Con’s in usability and native features.
Droidcon 2012

  Native Code                                                                                     Thick
                                                                                     Cross-       Client
                                                                                      Code
                                                                                    Generator
                                                                           Rich
                                                                           Client

                                                                VM /
                                                               Runtime                          How much
                                                                                                users actually
                                                                                                like it*
                                                      Hybrid
                                                       App                                          How much it
                                          Web                                                       fits enterprise
                                         Starter                                                    standards
                             Web
                             Client

   Generic Code


                       Generic UI                                                          Native UI




*) the uncanny valley, see http://martinfowler.com/bliki/CrossPlatformMobile.html
«How can you be certain they're                                         Droidcon 2012



receiving us?»                 Capt. Picard



or: Supporting multiple devices
 Blacklists vs Whitelists
    Trusted Certificates vary between device/api/provider


 API & Development Issues
    HttpUrlConnection vs DefaultHttpClient
    Different Bouncycastle algorithms and hardware security features
    Missing XML validation


 Licensing 3rd party software.
    Best technical solution            Business model
«Mr. Data, is that the trouble I                                          Droidcon 2012



believe it is?»             Capt. Picard



or: Supporting multiple apps
 Dealing with enterprise release and life cycles
    Always be ready to release. Think of test environment and repositories


 Intergalactic Continuous Integration
    Not out of the box: strong & exotic hardware requirements


 Missing Distribution Channels
    Android stays behind its competitors
Droidcon 2012


SVN
branch


 SVN
  trunk




          SSH
Droidcon 2012




How do you manage the diversity of
rules and guidelines in an enterprise?
Droidcon 2012




«The bureaucratic mentality is the
 only constant in the universe» Dr. McCoy
 Governance is key
    Enterprises applications require transactions and accountability
    Device state and user assignment must be maintainable
    E-Mail, Clipboard, Intents and Caches often not properly secured


 Security is key
    Device Encryption and Application Safety are mandatory
    Trusted context either via virtualization (BizzTrust, VMware) or
     encryption e.g. with hardware modules (3LM, Certgate, Ageto)
    Tradeoff: Most sophisticated protection is not integrated in standard
     Android. Requires rooting, which itself is a security risk.
Droidcon 2012

            «One of the advantages of being a Captain
             is being able to ask for advice without
             necessarily having to take it.» Cpt. Kirk
             Bring your own device (BYOD)
                    Most employees do not want complex device passwords or full
                     control over their device and route all internet traffic over VPN*
                    Currently no distinction between Corporate/Private data (except
                     for dual-boot or application-level encryption)
                    Rooting and malicious software must be recognized
             Connectivity
                    Connectivity should usually established over secure channels
                    Android does not support Proxy Authentication, Wi-Fi configuration
                    Tethering and Bluetooth cannot be controlled


*) Which, luckily, is currently impossible anyways
Droidcon 2012




Missing features:
What will the future bring?
Droidcon 2012




«Reports of my assimilation have been
greatly exaggerated» Cpt. Picard
 Missing ecosystem features
      Enterprise Market with CA for trusted applications
      OTA Update API without Google account
      Clear Chrome (Jelly Bean), Motorola and Samsung strategy
      Understanding of enterprise features with app makers
 Missing security features
      MDM which supports user certificates, CA’s and network config
      Wi-Fi Proxy Authentication, Full VPN routing, EAP-SIM
      Real ASLR and storage encryption for corporate/private stores
      E-Mail and Exchange features for S/MIME and two-factor auth
      Robust Synchronization (SyncML), Robust Service and SSL API
Droidcon 2012




Recap
   Align to enterprise policies, prepare for non-market distribution
   Embrace development standards, KPI’s and lifecycles
   Thoroughly manage traceability, accountability and privacy
   Prepare for integration using secure Webservices and XML
   Prepare for fragmented device base and users who need to be
    supported by – in the end – yourself (incomprehensible pain)
Droidcon 2012




May the force be with you.

jan.peuker@accenture.com
raoul.neu@elca.ch

Mais conteúdo relacionado

Mais procurados

Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013
Magic Software
 
Magic quadrant for_wc2010
Magic quadrant for_wc2010Magic quadrant for_wc2010
Magic quadrant for_wc2010
razvan001
 
Silicon Overdrive IT Services
Silicon Overdrive IT ServicesSilicon Overdrive IT Services
Silicon Overdrive IT Services
Ryan Fullerton
 
Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2
gaborvodics
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
HyTrust
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Digicomp Academy AG
 
Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks
Videoguy
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile StrategyWe4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT Group
 

Mais procurados (20)

Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013
 
Magic quadrant for_wc2010
Magic quadrant for_wc2010Magic quadrant for_wc2010
Magic quadrant for_wc2010
 
Silicon Overdrive IT Services
Silicon Overdrive IT ServicesSilicon Overdrive IT Services
Silicon Overdrive IT Services
 
Ibm mobile strategy may2012 mark.cesario v1.0
Ibm mobile strategy may2012 mark.cesario v1.0Ibm mobile strategy may2012 mark.cesario v1.0
Ibm mobile strategy may2012 mark.cesario v1.0
 
Kony - The multi Channel Challenge
Kony - The multi Channel Challenge Kony - The multi Channel Challenge
Kony - The multi Channel Challenge
 
Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2
 
SETA international (sv)
SETA international (sv)SETA international (sv)
SETA international (sv)
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Next Generation UC Clients and Endpoints
Next Generation UC Clients and EndpointsNext Generation UC Clients and Endpoints
Next Generation UC Clients and Endpoints
 
Teclever so and cs v0.9
Teclever so and cs v0.9Teclever so and cs v0.9
Teclever so and cs v0.9
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalExinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
 
Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile SoftwareCollaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile StrategyWe4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
 

Destaque

Android enterprise application development
Android enterprise application developmentAndroid enterprise application development
Android enterprise application development
Paramvir Singh
 
Impresoras zebra
Impresoras  zebra Impresoras  zebra
Impresoras zebra
Microgroup
 
Android Enterprise Integration
Android Enterprise IntegrationAndroid Enterprise Integration
Android Enterprise Integration
Dominik Helleberg
 

Destaque (9)

]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Pricing models for android enterprise applications
Pricing models for android enterprise applicationsPricing models for android enterprise applications
Pricing models for android enterprise applications
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
 
Android enterprise application development
Android enterprise application developmentAndroid enterprise application development
Android enterprise application development
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Android for the Enterprise and OEMs
Android for the Enterprise and OEMsAndroid for the Enterprise and OEMs
Android for the Enterprise and OEMs
 
Impresoras zebra
Impresoras  zebra Impresoras  zebra
Impresoras zebra
 
Android Enterprise Integration
Android Enterprise IntegrationAndroid Enterprise Integration
Android Enterprise Integration
 

Semelhante a Peuker, Neu: Enterprise Android for the Win

Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
Sarah Thomas
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
jasonlan
 
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
mfrancis
 

Semelhante a Peuker, Neu: Enterprise Android for the Win (20)

Worklight mobile v6
Worklight mobile v6 Worklight mobile v6
Worklight mobile v6
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app development
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
Ibm edge computing meetup
Ibm edge computing meetupIbm edge computing meetup
Ibm edge computing meetup
 
Test expo cloud-enabled testing services (wide)_v1.0
Test expo cloud-enabled testing services (wide)_v1.0Test expo cloud-enabled testing services (wide)_v1.0
Test expo cloud-enabled testing services (wide)_v1.0
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
 
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
IBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with Worklight
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road ahead
 

Mais de Droidcon Berlin

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
Droidcon Berlin
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
Droidcon Berlin
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
Droidcon Berlin
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
Droidcon Berlin
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
Droidcon Berlin
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
Droidcon Berlin
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
Droidcon Berlin
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
Droidcon Berlin
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkrauss
Droidcon Berlin
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
Droidcon Berlin
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
Droidcon Berlin
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
Droidcon Berlin
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
Droidcon Berlin
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
Droidcon Berlin
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
Droidcon Berlin
 

Mais de Droidcon Berlin (20)

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
 
crashing in style
crashing in stylecrashing in style
crashing in style
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in ux
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
 
droidparts
droidpartsdroidparts
droidparts
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetization
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkrauss
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Peuker, Neu: Enterprise Android for the Win

  • 1. Droidcon 2012 Enterprise Android – for the win? DroidCon 2012 Jan Peuker, Accenture Raoul Neu, Elca Informatik
  • 2. Droidcon 2012 «The purpose of an organization is to enable ordinary humans beings to do extraordinary things» Peter F. Drucker  Large Organizations have to strictly follow rules and laws  Very risk averse, very security and privacy aware  Rigid development standards and quality assurance  Large Organizations are internationally spread  IT as business enabler, not feature- but productivity-driven  IT usually outsourced – documentation and processes mandatory  We look at corporate internal applications
  • 3. Droidcon 2012 What makes Android so interesting for the enterprise? Captain Jean-Luc Picard: There's an aura around him. Lieutenant Geordi La Forge: Well, of course, he's an android.
  • 4. Droidcon 2012 Standards = Cost efficency
  • 5. Droidcon 2012 Challengers iOS Windows [mobile|embedded|CE|phone]  Very strong C-Level visibility,  Windows CE is the standard favorite in BYOD schemes mobile productivity platform  Very good enterprise  Broad range of rugged and features, particularly for hardware (SAM) secured devices update and hardware services  Very good enterprise features,  Strong device and mail encryption very strong Outlook integration  Development requires  WP 7 incompatible, Windows separate infrastructure Embedded 8 could be game-changer Most importantly, though, they care.
  • 6. Droidcon 2012 «I had a problem so I thought to use Java – now I have a ProblemFactory»
  • 7. Droidcon 2012 «We seek peaceful co-existence» Capt. Remmick or: Supporting multiple platforms  The right choice: Native, Hybrid or Cross-Platform  No silver bullet. Analyze your requirements & constraints.  MEAP: Advantages & Drawbacks  Pro’s in integration and governance. Con’s in usability and native features.
  • 8. Droidcon 2012 Native Code Thick Cross- Client Code Generator Rich Client VM / Runtime How much users actually like it* Hybrid App How much it Web fits enterprise Starter standards Web Client Generic Code Generic UI Native UI *) the uncanny valley, see http://martinfowler.com/bliki/CrossPlatformMobile.html
  • 9. «How can you be certain they're Droidcon 2012 receiving us?» Capt. Picard or: Supporting multiple devices  Blacklists vs Whitelists  Trusted Certificates vary between device/api/provider  API & Development Issues  HttpUrlConnection vs DefaultHttpClient  Different Bouncycastle algorithms and hardware security features  Missing XML validation  Licensing 3rd party software.  Best technical solution  Business model
  • 10. «Mr. Data, is that the trouble I Droidcon 2012 believe it is?» Capt. Picard or: Supporting multiple apps  Dealing with enterprise release and life cycles  Always be ready to release. Think of test environment and repositories  Intergalactic Continuous Integration  Not out of the box: strong & exotic hardware requirements  Missing Distribution Channels  Android stays behind its competitors
  • 12. Droidcon 2012 How do you manage the diversity of rules and guidelines in an enterprise?
  • 13. Droidcon 2012 «The bureaucratic mentality is the only constant in the universe» Dr. McCoy  Governance is key  Enterprises applications require transactions and accountability  Device state and user assignment must be maintainable  E-Mail, Clipboard, Intents and Caches often not properly secured  Security is key  Device Encryption and Application Safety are mandatory  Trusted context either via virtualization (BizzTrust, VMware) or encryption e.g. with hardware modules (3LM, Certgate, Ageto)  Tradeoff: Most sophisticated protection is not integrated in standard Android. Requires rooting, which itself is a security risk.
  • 14. Droidcon 2012 «One of the advantages of being a Captain is being able to ask for advice without necessarily having to take it.» Cpt. Kirk  Bring your own device (BYOD)  Most employees do not want complex device passwords or full control over their device and route all internet traffic over VPN*  Currently no distinction between Corporate/Private data (except for dual-boot or application-level encryption)  Rooting and malicious software must be recognized  Connectivity  Connectivity should usually established over secure channels  Android does not support Proxy Authentication, Wi-Fi configuration  Tethering and Bluetooth cannot be controlled *) Which, luckily, is currently impossible anyways
  • 15. Droidcon 2012 Missing features: What will the future bring?
  • 16. Droidcon 2012 «Reports of my assimilation have been greatly exaggerated» Cpt. Picard  Missing ecosystem features  Enterprise Market with CA for trusted applications  OTA Update API without Google account  Clear Chrome (Jelly Bean), Motorola and Samsung strategy  Understanding of enterprise features with app makers  Missing security features  MDM which supports user certificates, CA’s and network config  Wi-Fi Proxy Authentication, Full VPN routing, EAP-SIM  Real ASLR and storage encryption for corporate/private stores  E-Mail and Exchange features for S/MIME and two-factor auth  Robust Synchronization (SyncML), Robust Service and SSL API
  • 17. Droidcon 2012 Recap  Align to enterprise policies, prepare for non-market distribution  Embrace development standards, KPI’s and lifecycles  Thoroughly manage traceability, accountability and privacy  Prepare for integration using secure Webservices and XML  Prepare for fragmented device base and users who need to be supported by – in the end – yourself (incomprehensible pain)
  • 18. Droidcon 2012 May the force be with you. jan.peuker@accenture.com raoul.neu@elca.ch

Notas do Editor

  1. Scenario: Native Apps for different Platforms3 Developers2 different HardwaresMISSING DISTRIBUTION CHANELSBETA TestingAndroidstraightforward BUT: reducesecurity + missingdistributioncontroliOSentreprise -> no securityloss, (ordeviceidcontrol)WP7 -> via marketplace