SlideShare uma empresa Scribd logo
1 de 39
Baixar para ler offline
Software Distribution,
Customer Experience
and the IoT
Get Ready for Fast, Scalable and Secure
Software Delivery
David Johnson
Principal Analyst
Melis Unsal
Product Marketing
Manager
Christopher Fan
Senior Product
Manager
© 2017 FORRESTER. REPRODUCTION PROHIBITED.
4© 2017 FORRESTER. REPRODUCTION PROHIBITED.
First, a Little Background on Customer Experience
The 3 E’s of Customer Experience
5© 2017 FORRESTER. REPRODUCTION PROHIBITED.
How Important is Software Distribution to CX?
› It’s the start of the customer experience journey after the sale
› The quality of your software distribution capability impacts:
• EASE: Is it easy or hard for customers to deploy your products?
• EFFECTIVENESS: Are customers able to deploy them to the right people,
every time, without fail?
• EMOTION: Is the process enjoyable or is it frustrating?
› Psychologically, the effect of negative setbacks on emotion is 3-4
times stronger than the positive impact of progress.
• Poor software distribution has an outsized impact on CX when it fails.
• You must get it right the first time
6© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Improving Customer Experience is the #1 Driver
10%
12%
12%
14%
14%
15%
17%
19%
19%
21%
21%
21%
22%
23%
29%
0% 5% 10% 15% 20% 25% 30% 35%
Achieve better business transparency
Improve business agility for responding to disruption
Consolidating infrastructure
Accelerate transformation to digital
Better leverage our data assets
Create Innovation for the business
Ensure compliance, reduce risks or improve security
Monitor, improve, and optimize process performance
Gain competitive advantage
Streamline processes
Upgrade or replace outdated systems
Key to revenue growth
Develop better products and services
Winning new customers
Improve customer experience
What are the most important goals/drivers your organization considers when planning or
orchestrating your software strategy?
7© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Software Distribution Quality Impacts
› Direct revenue: Conversion & abandonment rates, average order
size, cost per order, margin.
› Support costs: Number of calls, cost per call, time to resolve
› Customer loyalty: Customer sat., feature usage, net promoter
score, customer lifetime value, incremental purchase revenue, etc.
8© 2017 FORRESTER. REPRODUCTION PROHIBITED.
The Problem Is Getting Bigger
› “31 billion devices connected” by 2020 (Intel)
› “41 billion active wireless connections” by 2020 (ABI)
› “50 billion connected devices by 2020” (Ericsson)
› “50 billion things” connected by 2020 (Cisco)
› “75 billion devices connected” by 2020 (Morgan Stanley)
9© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Other Trends Affecting Software Distribution
› Rising user experience expectations of enterprise buyers
› Compliance mandates that require accurate counts for entitlement,
export and record-keeping
› Security mandates requiring software to come from trusted
sources, and frequent software updates
› Today, 44.8% of enterprise application portfolios are vendor-built
• In 2 years, it will still be 44%
› Today, 35.5% of application portfolios are traditional, on-premise.
• In 2 years, we expect it will still be >30%
10© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Budget, security and alignment are the top concerns
13%
15%
15%
17%
19%
20%
21%
23%
25%
25%
32%
43%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
Difficulty mixing architecture governance with Agile and DevOps
Lack of business C-level executive support
Availability of partners to help us
Inadequate change management programs (communications, incentives, etc.)
Lack of strategic vision
Legal and regulatory compliance
Lack of adequate user training
Inadequate or missing relevant internal skills
Inflexible or hard to change culture
Lack of alignment between IT and business
Security
Budget
What are the biggest challenges your firm faces when orchestrating its software strategy?
11© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Source: Forrester’s Global Business Technographics Networks and Telecommunications Survey, 2016
12© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Hot Spots Emerge in Different Industries
Source: The Internet of Things Heat Map, 2016 Forrester report
13© 2017 FORRESTER. REPRODUCTION PROHIBITED.
14© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Kroger’s IoT temperature monitoring helps
customers AND employees
 Kroger’s grocery stores use
IoT to improve food quality
and lower rates of spoilage
 A highly manual process
(2 employee visits a day to
check temperature) replaced
by an automated one
https://www.forrester.com/report/How+To+Design+InternetOfThings+Engagements+In+Retail+Hospitality+And+Travel/-/E-RES135858
15© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Every Device Has a Lifecycle to Manage
• Image/Flash the device
• Initial deployment
• Apply personality, configuration, install apps
• Ongoing patching/updating
• Configuration changes
• Break-fix
• Retirement
Lifecycle Steps
16© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Which Creates Special Problems for Software
Management
› MDM/EMM vendors have limited PC, Mac management capabilities
› IoT platform companies have poor software deployment…
› …or they add to the management tool proliferation problem
› Accurate device targeting with contextual data remains a challenge
› IT pros need both excellent software deployment AND one tool and
platform to do it with for all devices.
17© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Mobile Strains Conventional Software Distribution
Methods
› Devices vary widely in OS platforms, update mechanisms and
software package sizes.
› Example: Updating 20,000 LTE IoT devices with a 100MB package
= 2TB data transfer over wireless network.
› Doing it reliably requires advanced features like checkpoint restart,
peer-to-peer, rapid deployment and validation.
• Perfect set of use cases for a content distribution network
18© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Does your firm have security policies and tools in place for the following types of activities?
5%
5%
4%
4%
5%
4%
4%
4%
14%
13%
10%
12%
12%
10%
10%
9%
34%
33%
32%
32%
31%
33%
31%
30%
45%
45%
48%
48%
49%
50%
51%
52%
3%
4%
6%
4%
2%
3%
4%
5%
Employee use of tablet devices
Employees' personal use of social networking sites like
Facebook and Twitter
Business use of Internet of Things (IoT)/M2M solutions
Business use
Employee use of smartphones
Business use of consumer-oriented file-sharing and sync tools
Business use of SaaS applications
Business use of IaaS and PaaS services
No security policies
We have security policies but no tools to enforce them
We have security policies, but our tools are insufficient
We have security policies, and our tools are sufficient
Only 48% Believe Their Tools are Sufficient for IoT
Global
Base: N=3,158 (Global); Security decision-makers (20+ employees)
Source: Forrester's Global Business Technographics Security Survey, 2016
19© 2017 FORRESTER. REPRODUCTION PROHIBITED.
When thinking about Internet of Things (IoT)/M2M initiatives, what level of concern does each of the following
present for your firm?
58%
59%
60%
60%
61%
62%
63%
65%
67%
73%
Internal hackers
Analytics
Internet of Things (IoT)/M2M device hardening
Physical compromise due to Internet of…
Firmware updates
Lack of authentication and authorization for…
Third party collection of device usage…
Denial of service attacks to intelligent devices
Privacy violations
External hackers
Updating is the Most Important Capability Because…
Base: N=2,053 (Global); Security technology decision-makers who are concerned with the risk that Internet of Things (IoT)/M2M solutions can introduce
to their firm
Source: Forrester's Global Business Technographics Security Survey, 2016
20© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Review
› IoT is driving disruptive change in global business
› The diversity of devices is straining software distribution capabilities
• You need accuracy and reliability
• Entitlements and security
› Enterprise technology decision-makers don’t have the right tools
• Too many consoles
• Too many different targeting and transport mechanisms
FORRESTER.COM
Thank you
© 2017 FORRESTER. REPRODUCTION PROHIBITED.
David K. Johnson
+1 303.522.0579
dajohnson@forrester.com
Twitter: @david_kjohnson
LinkedIn: https://www.linkedin.com/pub/david-
johnson/3/720/610
AKAMAI
Melis Unsal - Product Marketing Manager
©2017 AKAMAI | FASTER FORWARDTM
AUDIENCES
ARE GROWING
DOWNLOAD
CADENCE IS
RISING
DEVICE
LANDSCAPE IS
FRAGMENTED
FILE SIZES
ARE
INCREASING
SOFTWARE
DELIVERY
ISN’T LIKE
IT USED TO
BE
©2017 AKAMAI | FASTER FORWARDTM
File Sizes are Increasing
Ways to optimize handling of larger files
Smaller initial downloads, more frequent updates1
Prepositioning content on devices close to the end user2
Leveraging various delivery protocols3
©2017 AKAMAI | FASTER FORWARDTM
Audiences are Growing
Managing Unpredictable Demand Spikes
12AM
11/12
20,000
15,000
10,000
0
Gbps
5,000
12AM
11/20
12AM
11/28
12AM
12/06
12AM
12/14
12AM
12/22
20+ Gbps
12AM
12/30
12AM
01/07
Marketing Campaign
Software/Product Launch
©2017 AKAMAI | FASTER FORWARDTM
The Device Landscape is Fragmented
Security is a Critical Consideration
Source: Akamai State of the Internet, Security, Q3 2017
TOP DDoS ATTACK
COUNT Q3 2017:
612
Access Control
to manage user access to your
software
Token Authentication
to prevent link sharing
HTTPS-supported delivery
to securely transport content
over TLS
Shared & Custom Certification
to provide an additional layer of
authenticity
Content Targeting
to limit content in certain
geo regions
©2017 AKAMAI | FASTER FORWARDTM
Download Cadence is Rising
Driving Long-Term User Engagement is Key
Performance
Download failure rates
can be as high as 50%
for large files1
Speed
40% abandon when
software takes too
long to update2
Reliability
Undelivered software
won’t generate
returns for your
business
1 Akamai Internal, https://content.akamai.com/PG1526-PerformanceMatters.html
2 Cooper Waddell, Deconstructing Mobile & Tablet Gaming (EEDAR, 2014), 32.
©2017 AKAMAI | FASTER FORWARDTM
The Must-Haves for a Download Delivery Solution
Ensure 100% Reliability
for delivery of downloads to even
the most remote users
Enable Visibility and Reporting
into download performance,
fulfillment rates and the user
experience
Provide Flexibility
to work around changes in
network conditions and to
prioritize critical downloads
Improve End User Experience
by efficiently managing speed
and performance of large file
downloads
Secure Delivery to Users
over HTTPS, encryption
capabilities, access control and
token authentication
©2017 AKAMAI | FASTER FORWARDTM
The Solution
©2017 AKAMAI | FASTER FORWARDTM
230,000+ SERVERS – 1,400+ NETWORKS – 110+ COUNTRIES
ACCELERATING DAILY TRAFFIC
40+ TERABITS PER SECOND
40+ MILLION HITS PER SECOND
2+ TRILLION DELIVERIES PER DAY
100+ PETABYTES PER DAY
100 MILLION PAGE VIEWS PER SECOND
DAILY MOBILE TRAFFIC PEAKS OF 1 TEREBIT
100+ BILLION API REQUEST PER DAY
Akamai – Making the Internet Fast, Reliable, and Secure
We are the leading provider of cloud services for delivering, optimizing and securing
online content and business applications.
©2017 AKAMAI | FASTER FORWARDTM
The Solution: Akamai
An integrated solution with a global footprint to ensure your software
and licenses are delivered fast, reliably, and securely.
Media AccelerationDownload Delivery NetStorageForeground
Download
Enhances
performance of
content delivered
over the internet
A delivery solution built
for superior capacity,
scalability, performance,
and availability
Secure, redundant,
cloud storage to
maximize delivery
performance and
reliability.
Improved download
speeds and times for
large files
FLEXERA
Christopher Fan - Senior Product Manager
ELECTRONIC SOFTWARE DELIVERY
• Deliver software electronically, based on
customer entitlements
• Fast, secure and scalable, using the Akamai
Content Delivery Network
• Clear revenue recognition event
• Automate the fulfilment of export compliance
requirements
• Track downloads
Deliver Software to Right Contacts – At the Right Time
33Based on Akamai Technology
FLEXERA + AKAMAI = Partnership for Customer Success
© 2017 Flexera | Company Confidential 34
• What products
need software
delivered?
• What users are
eligible for
download?
Recognize Revenue
Download Receipt
Customer Portal
Ship a Secure
Product and
Protect Your IP
Manage Software,
Devices, and
Customer
Entitlements
Analyze Adoption,
Feature Usage and
Account/Renewal
Health
Monetize and
Drive Recurring
Revenue
SOFTWARE SUPPLIERS:
SHIP A SECURE PRODUCT AND GROW YOUR BUSINESS
Monitor Usage and
Device Data
FLEXNET OPERATIONS
Modular, to Meet Your Demands
Data and Analytics
Products & Customers
Entitlements, Usage, Renewals, ...
E N A B L E N E W
B U S I N E S S M O D E L S
A U T O M A T E S U B S C R I P T I O N
M A N A G E M E N T
D R I V E C U S T O M E R
G R O W T H
87%
Advanced
Lifecycle
Management
Advanced
Organization
Management
Usage
Management
Electronic
Software
Delivery
Customer
Growth
Cloud
Licensing
Service
FLEXERA SOFTWARE MONETIZATION PLATFORM
Data and Analytics
Products & Customers
Entitlements, Usage, Renewals, ...
E N A B L E N E W
B U S I N E S S
M O D E L S
A U T O M A T E
S U B S C R I P T I O N
M A N A G E M E N T
D R I V E
C U S T O M E R
G R O W T H
87%
SaaS
Application
Platforms
Embedded
& Devices
FlexNet Operations FlexNet Licensing
Customer Portal
Integration
Framework
• ERP
• CRM
• Billing
• …
All Deployment ModelsAll Monetization Models
QUESTIONS?
© 2017 Flexera | All rights reserved
THANK YOU
David Johnson
Principal Analyst
dajohnson@forrester.com
Melis Unsal
Product Marketing Manager
munsal@akamai.com
Christopher Fan
Sr. Product Manager
cfan@flexera.com

Mais conteúdo relacionado

Mais procurados

Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Flexera
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsFlexera
 
Pentest as a Service Impact 2020
Pentest as a Service Impact 2020Pentest as a Service Impact 2020
Pentest as a Service Impact 2020DevOps.com
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisCarlos Andrés García
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Why Zenoss is Right for You
Why Zenoss is Right for YouWhy Zenoss is Right for You
Why Zenoss is Right for YouZenoss
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectNetskope
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 

Mais procurados (20)

Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
 
Pentest as a Service Impact 2020
Pentest as a Service Impact 2020Pentest as a Service Impact 2020
Pentest as a Service Impact 2020
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Why Zenoss is Right for You
Why Zenoss is Right for YouWhy Zenoss is Right for You
Why Zenoss is Right for You
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 

Semelhante a Software Distribution, Customer Experience and the IoT: Get Ready for Fast, Scalable and Secure Software Delivery

Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivoSoftware
 
"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike Jackson"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike JacksonPresentacionesVantaz
 
Customer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-DallasCustomer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-DallasJoAnna Cheshire
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?AGILLY
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Enterprise Management Associates
 
Mobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceMobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceTorry Harris Business Solutions
 
Data Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsData Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsDenodo
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Why Digital Transformations are Failing at Scale
Why Digital Transformations are Failing at ScaleWhy Digital Transformations are Failing at Scale
Why Digital Transformations are Failing at ScaleTasktop
 
DevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital BusinessDevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital BusinessEnterprise Management Associates
 
Are your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital ExperiencesAre your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital ExperiencesRiverbed Technology
 
Deliver on the Promise of Agile and DevOps Transformations
Deliver on the Promise of Agile and DevOps TransformationsDeliver on the Promise of Agile and DevOps Transformations
Deliver on the Promise of Agile and DevOps TransformationsTasktop
 
How Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of AutomationHow Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of AutomationEnterprise Management Associates
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – DataFujitsu Middle East
 
Keep Your Eyes on the Prize Why Context Matters More than Ever
Keep Your Eyes on the Prize   Why Context Matters More than EverKeep Your Eyes on the Prize   Why Context Matters More than Ever
Keep Your Eyes on the Prize Why Context Matters More than EverEktron
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyForgeRock
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfXDuce Corporation
 
Deep Dive into Pivotal Cloud Foundry 2.0
Deep Dive into Pivotal Cloud Foundry 2.0Deep Dive into Pivotal Cloud Foundry 2.0
Deep Dive into Pivotal Cloud Foundry 2.0VMware Tanzu
 
How Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxHow Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxXDuce Corporation
 
굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)
굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)
굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)VMware Tanzu Korea
 

Semelhante a Software Distribution, Customer Experience and the IoT: Get Ready for Fast, Scalable and Secure Software Delivery (20)

Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
 
"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike Jackson"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike Jackson
 
Customer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-DallasCustomer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-Dallas
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
Mobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceMobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User Experience
 
Data Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsData Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation Analytics
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Why Digital Transformations are Failing at Scale
Why Digital Transformations are Failing at ScaleWhy Digital Transformations are Failing at Scale
Why Digital Transformations are Failing at Scale
 
DevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital BusinessDevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
DevOps/Continuous Delivery Tooling: Launchpad for the Digital Business
 
Are your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital ExperiencesAre your apps chasing users away? How to deliver superior Digital Experiences
Are your apps chasing users away? How to deliver superior Digital Experiences
 
Deliver on the Promise of Agile and DevOps Transformations
Deliver on the Promise of Agile and DevOps TransformationsDeliver on the Promise of Agile and DevOps Transformations
Deliver on the Promise of Agile and DevOps Transformations
 
How Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of AutomationHow Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of Automation
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Keep Your Eyes on the Prize Why Context Matters More than Ever
Keep Your Eyes on the Prize   Why Context Matters More than EverKeep Your Eyes on the Prize   Why Context Matters More than Ever
Keep Your Eyes on the Prize Why Context Matters More than Ever
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdf
 
Deep Dive into Pivotal Cloud Foundry 2.0
Deep Dive into Pivotal Cloud Foundry 2.0Deep Dive into Pivotal Cloud Foundry 2.0
Deep Dive into Pivotal Cloud Foundry 2.0
 
How Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxHow Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptx
 
굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)
굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)
굿 소프트웨어 컴퍼니로의 여정(Journey To Be a Good Software Company)
 

Mais de Flexera

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Flexera
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyFlexera
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT EnvironmentFlexera
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceFlexera
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementFlexera
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareFlexera
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewFlexera
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Flexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Flexera
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2Flexera
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseFlexera
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why Flexera
 
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management StrategyCrafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management StrategyFlexera
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecurityFlexera
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityFlexera
 
10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 MigrationFlexera
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsFlexera
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationFlexera
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryFlexera
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Flexera
 

Mais de Flexera (20)

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why
 
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management StrategyCrafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management Strategy
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance Security
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized Inventory
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back?
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Software Distribution, Customer Experience and the IoT: Get Ready for Fast, Scalable and Secure Software Delivery

  • 1. Software Distribution, Customer Experience and the IoT Get Ready for Fast, Scalable and Secure Software Delivery
  • 2. David Johnson Principal Analyst Melis Unsal Product Marketing Manager Christopher Fan Senior Product Manager
  • 3. © 2017 FORRESTER. REPRODUCTION PROHIBITED.
  • 4. 4© 2017 FORRESTER. REPRODUCTION PROHIBITED. First, a Little Background on Customer Experience The 3 E’s of Customer Experience
  • 5. 5© 2017 FORRESTER. REPRODUCTION PROHIBITED. How Important is Software Distribution to CX? › It’s the start of the customer experience journey after the sale › The quality of your software distribution capability impacts: • EASE: Is it easy or hard for customers to deploy your products? • EFFECTIVENESS: Are customers able to deploy them to the right people, every time, without fail? • EMOTION: Is the process enjoyable or is it frustrating? › Psychologically, the effect of negative setbacks on emotion is 3-4 times stronger than the positive impact of progress. • Poor software distribution has an outsized impact on CX when it fails. • You must get it right the first time
  • 6. 6© 2017 FORRESTER. REPRODUCTION PROHIBITED. Improving Customer Experience is the #1 Driver 10% 12% 12% 14% 14% 15% 17% 19% 19% 21% 21% 21% 22% 23% 29% 0% 5% 10% 15% 20% 25% 30% 35% Achieve better business transparency Improve business agility for responding to disruption Consolidating infrastructure Accelerate transformation to digital Better leverage our data assets Create Innovation for the business Ensure compliance, reduce risks or improve security Monitor, improve, and optimize process performance Gain competitive advantage Streamline processes Upgrade or replace outdated systems Key to revenue growth Develop better products and services Winning new customers Improve customer experience What are the most important goals/drivers your organization considers when planning or orchestrating your software strategy?
  • 7. 7© 2017 FORRESTER. REPRODUCTION PROHIBITED. Software Distribution Quality Impacts › Direct revenue: Conversion & abandonment rates, average order size, cost per order, margin. › Support costs: Number of calls, cost per call, time to resolve › Customer loyalty: Customer sat., feature usage, net promoter score, customer lifetime value, incremental purchase revenue, etc.
  • 8. 8© 2017 FORRESTER. REPRODUCTION PROHIBITED. The Problem Is Getting Bigger › “31 billion devices connected” by 2020 (Intel) › “41 billion active wireless connections” by 2020 (ABI) › “50 billion connected devices by 2020” (Ericsson) › “50 billion things” connected by 2020 (Cisco) › “75 billion devices connected” by 2020 (Morgan Stanley)
  • 9. 9© 2017 FORRESTER. REPRODUCTION PROHIBITED. Other Trends Affecting Software Distribution › Rising user experience expectations of enterprise buyers › Compliance mandates that require accurate counts for entitlement, export and record-keeping › Security mandates requiring software to come from trusted sources, and frequent software updates › Today, 44.8% of enterprise application portfolios are vendor-built • In 2 years, it will still be 44% › Today, 35.5% of application portfolios are traditional, on-premise. • In 2 years, we expect it will still be >30%
  • 10. 10© 2017 FORRESTER. REPRODUCTION PROHIBITED. Budget, security and alignment are the top concerns 13% 15% 15% 17% 19% 20% 21% 23% 25% 25% 32% 43% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Difficulty mixing architecture governance with Agile and DevOps Lack of business C-level executive support Availability of partners to help us Inadequate change management programs (communications, incentives, etc.) Lack of strategic vision Legal and regulatory compliance Lack of adequate user training Inadequate or missing relevant internal skills Inflexible or hard to change culture Lack of alignment between IT and business Security Budget What are the biggest challenges your firm faces when orchestrating its software strategy?
  • 11. 11© 2017 FORRESTER. REPRODUCTION PROHIBITED. Source: Forrester’s Global Business Technographics Networks and Telecommunications Survey, 2016
  • 12. 12© 2017 FORRESTER. REPRODUCTION PROHIBITED. Hot Spots Emerge in Different Industries Source: The Internet of Things Heat Map, 2016 Forrester report
  • 13. 13© 2017 FORRESTER. REPRODUCTION PROHIBITED.
  • 14. 14© 2017 FORRESTER. REPRODUCTION PROHIBITED. Kroger’s IoT temperature monitoring helps customers AND employees  Kroger’s grocery stores use IoT to improve food quality and lower rates of spoilage  A highly manual process (2 employee visits a day to check temperature) replaced by an automated one https://www.forrester.com/report/How+To+Design+InternetOfThings+Engagements+In+Retail+Hospitality+And+Travel/-/E-RES135858
  • 15. 15© 2017 FORRESTER. REPRODUCTION PROHIBITED. Every Device Has a Lifecycle to Manage • Image/Flash the device • Initial deployment • Apply personality, configuration, install apps • Ongoing patching/updating • Configuration changes • Break-fix • Retirement Lifecycle Steps
  • 16. 16© 2017 FORRESTER. REPRODUCTION PROHIBITED. Which Creates Special Problems for Software Management › MDM/EMM vendors have limited PC, Mac management capabilities › IoT platform companies have poor software deployment… › …or they add to the management tool proliferation problem › Accurate device targeting with contextual data remains a challenge › IT pros need both excellent software deployment AND one tool and platform to do it with for all devices.
  • 17. 17© 2017 FORRESTER. REPRODUCTION PROHIBITED. Mobile Strains Conventional Software Distribution Methods › Devices vary widely in OS platforms, update mechanisms and software package sizes. › Example: Updating 20,000 LTE IoT devices with a 100MB package = 2TB data transfer over wireless network. › Doing it reliably requires advanced features like checkpoint restart, peer-to-peer, rapid deployment and validation. • Perfect set of use cases for a content distribution network
  • 18. 18© 2017 FORRESTER. REPRODUCTION PROHIBITED. Does your firm have security policies and tools in place for the following types of activities? 5% 5% 4% 4% 5% 4% 4% 4% 14% 13% 10% 12% 12% 10% 10% 9% 34% 33% 32% 32% 31% 33% 31% 30% 45% 45% 48% 48% 49% 50% 51% 52% 3% 4% 6% 4% 2% 3% 4% 5% Employee use of tablet devices Employees' personal use of social networking sites like Facebook and Twitter Business use of Internet of Things (IoT)/M2M solutions Business use Employee use of smartphones Business use of consumer-oriented file-sharing and sync tools Business use of SaaS applications Business use of IaaS and PaaS services No security policies We have security policies but no tools to enforce them We have security policies, but our tools are insufficient We have security policies, and our tools are sufficient Only 48% Believe Their Tools are Sufficient for IoT Global Base: N=3,158 (Global); Security decision-makers (20+ employees) Source: Forrester's Global Business Technographics Security Survey, 2016
  • 19. 19© 2017 FORRESTER. REPRODUCTION PROHIBITED. When thinking about Internet of Things (IoT)/M2M initiatives, what level of concern does each of the following present for your firm? 58% 59% 60% 60% 61% 62% 63% 65% 67% 73% Internal hackers Analytics Internet of Things (IoT)/M2M device hardening Physical compromise due to Internet of… Firmware updates Lack of authentication and authorization for… Third party collection of device usage… Denial of service attacks to intelligent devices Privacy violations External hackers Updating is the Most Important Capability Because… Base: N=2,053 (Global); Security technology decision-makers who are concerned with the risk that Internet of Things (IoT)/M2M solutions can introduce to their firm Source: Forrester's Global Business Technographics Security Survey, 2016
  • 20. 20© 2017 FORRESTER. REPRODUCTION PROHIBITED. Review › IoT is driving disruptive change in global business › The diversity of devices is straining software distribution capabilities • You need accuracy and reliability • Entitlements and security › Enterprise technology decision-makers don’t have the right tools • Too many consoles • Too many different targeting and transport mechanisms
  • 21. FORRESTER.COM Thank you © 2017 FORRESTER. REPRODUCTION PROHIBITED. David K. Johnson +1 303.522.0579 dajohnson@forrester.com Twitter: @david_kjohnson LinkedIn: https://www.linkedin.com/pub/david- johnson/3/720/610
  • 22. AKAMAI Melis Unsal - Product Marketing Manager
  • 23. ©2017 AKAMAI | FASTER FORWARDTM AUDIENCES ARE GROWING DOWNLOAD CADENCE IS RISING DEVICE LANDSCAPE IS FRAGMENTED FILE SIZES ARE INCREASING SOFTWARE DELIVERY ISN’T LIKE IT USED TO BE
  • 24. ©2017 AKAMAI | FASTER FORWARDTM File Sizes are Increasing Ways to optimize handling of larger files Smaller initial downloads, more frequent updates1 Prepositioning content on devices close to the end user2 Leveraging various delivery protocols3
  • 25. ©2017 AKAMAI | FASTER FORWARDTM Audiences are Growing Managing Unpredictable Demand Spikes 12AM 11/12 20,000 15,000 10,000 0 Gbps 5,000 12AM 11/20 12AM 11/28 12AM 12/06 12AM 12/14 12AM 12/22 20+ Gbps 12AM 12/30 12AM 01/07 Marketing Campaign Software/Product Launch
  • 26. ©2017 AKAMAI | FASTER FORWARDTM The Device Landscape is Fragmented Security is a Critical Consideration Source: Akamai State of the Internet, Security, Q3 2017 TOP DDoS ATTACK COUNT Q3 2017: 612 Access Control to manage user access to your software Token Authentication to prevent link sharing HTTPS-supported delivery to securely transport content over TLS Shared & Custom Certification to provide an additional layer of authenticity Content Targeting to limit content in certain geo regions
  • 27. ©2017 AKAMAI | FASTER FORWARDTM Download Cadence is Rising Driving Long-Term User Engagement is Key Performance Download failure rates can be as high as 50% for large files1 Speed 40% abandon when software takes too long to update2 Reliability Undelivered software won’t generate returns for your business 1 Akamai Internal, https://content.akamai.com/PG1526-PerformanceMatters.html 2 Cooper Waddell, Deconstructing Mobile & Tablet Gaming (EEDAR, 2014), 32.
  • 28. ©2017 AKAMAI | FASTER FORWARDTM The Must-Haves for a Download Delivery Solution Ensure 100% Reliability for delivery of downloads to even the most remote users Enable Visibility and Reporting into download performance, fulfillment rates and the user experience Provide Flexibility to work around changes in network conditions and to prioritize critical downloads Improve End User Experience by efficiently managing speed and performance of large file downloads Secure Delivery to Users over HTTPS, encryption capabilities, access control and token authentication
  • 29. ©2017 AKAMAI | FASTER FORWARDTM The Solution
  • 30. ©2017 AKAMAI | FASTER FORWARDTM 230,000+ SERVERS – 1,400+ NETWORKS – 110+ COUNTRIES ACCELERATING DAILY TRAFFIC 40+ TERABITS PER SECOND 40+ MILLION HITS PER SECOND 2+ TRILLION DELIVERIES PER DAY 100+ PETABYTES PER DAY 100 MILLION PAGE VIEWS PER SECOND DAILY MOBILE TRAFFIC PEAKS OF 1 TEREBIT 100+ BILLION API REQUEST PER DAY Akamai – Making the Internet Fast, Reliable, and Secure We are the leading provider of cloud services for delivering, optimizing and securing online content and business applications.
  • 31. ©2017 AKAMAI | FASTER FORWARDTM The Solution: Akamai An integrated solution with a global footprint to ensure your software and licenses are delivered fast, reliably, and securely. Media AccelerationDownload Delivery NetStorageForeground Download Enhances performance of content delivered over the internet A delivery solution built for superior capacity, scalability, performance, and availability Secure, redundant, cloud storage to maximize delivery performance and reliability. Improved download speeds and times for large files
  • 32. FLEXERA Christopher Fan - Senior Product Manager
  • 33. ELECTRONIC SOFTWARE DELIVERY • Deliver software electronically, based on customer entitlements • Fast, secure and scalable, using the Akamai Content Delivery Network • Clear revenue recognition event • Automate the fulfilment of export compliance requirements • Track downloads Deliver Software to Right Contacts – At the Right Time 33Based on Akamai Technology
  • 34. FLEXERA + AKAMAI = Partnership for Customer Success © 2017 Flexera | Company Confidential 34 • What products need software delivered? • What users are eligible for download? Recognize Revenue Download Receipt Customer Portal
  • 35. Ship a Secure Product and Protect Your IP Manage Software, Devices, and Customer Entitlements Analyze Adoption, Feature Usage and Account/Renewal Health Monetize and Drive Recurring Revenue SOFTWARE SUPPLIERS: SHIP A SECURE PRODUCT AND GROW YOUR BUSINESS Monitor Usage and Device Data
  • 36. FLEXNET OPERATIONS Modular, to Meet Your Demands Data and Analytics Products & Customers Entitlements, Usage, Renewals, ... E N A B L E N E W B U S I N E S S M O D E L S A U T O M A T E S U B S C R I P T I O N M A N A G E M E N T D R I V E C U S T O M E R G R O W T H 87% Advanced Lifecycle Management Advanced Organization Management Usage Management Electronic Software Delivery Customer Growth Cloud Licensing Service
  • 37. FLEXERA SOFTWARE MONETIZATION PLATFORM Data and Analytics Products & Customers Entitlements, Usage, Renewals, ... E N A B L E N E W B U S I N E S S M O D E L S A U T O M A T E S U B S C R I P T I O N M A N A G E M E N T D R I V E C U S T O M E R G R O W T H 87% SaaS Application Platforms Embedded & Devices FlexNet Operations FlexNet Licensing Customer Portal Integration Framework • ERP • CRM • Billing • … All Deployment ModelsAll Monetization Models
  • 39. © 2017 Flexera | All rights reserved THANK YOU David Johnson Principal Analyst dajohnson@forrester.com Melis Unsal Product Marketing Manager munsal@akamai.com Christopher Fan Sr. Product Manager cfan@flexera.com