SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
The	
  Mobile	
  Tribe	
  

Smart	
  Devices	
  +	
  Human	
  Behavior	
  =	
  Massive	
  Change	
  
Dan	
  Keldsen	
  –	
  Informa5on	
  Architected	
  
@dankeldsen	
  #mobilehumans	
  
     Exper;se:	
  
     •  Content/Knowledge	
  Management	
  
     •  Innova;on	
  management	
  	
  
     •  Enterprise	
  2.0/Web	
  2.0	
  

     Background:	
  
     •  Current:	
  
         •  Informa;on	
  Architected:	
  President,	
  Consultant	
  
         •  Level	
  50	
  SoOware:	
  Co-­‐founder,	
  Mobile	
  Social/UX	
  Strategy	
  
            (level50soOware.com)	
  
     •  Past:	
  
         •  AIIM:	
  Former	
  director	
  of	
  Market	
  Intelligence	
  unit	
  
         •  Delphi	
  Group:	
  Former	
  analyst,	
  consultant	
  and	
  CTO	
  
BEFORE	
  WE	
  PRESUME	
  THAT   	
  
“MOBILE	
  IS	
  THE	
  ANSWER”
                              	
  
      OR	
  PERHAPS	
  THAT    	
  
   “MOBILE	
  IS	
  THE	
  PROBLEM” 	
  
HOW	
  MUCH	
  OF	
  YOUR	
  ENTERPRISE	
  
 ENVIRONMENT	
  DO	
  YOU	
  (OR	
  YOUR	
  
USERS)	
  WANT	
  TO	
  HAVE	
  AVAILABLE	
  VIA	
  
                  MOBILE?    	
  

         0	
  <––––––––––––>	
  100%	
  
HOW	
  “SECURE”	
  DOES	
  THAT	
  ACCESS/
        ABILITY	
  NEED	
  TO	
  BE?	
  
      0	
  <––––––––––––>	
  100%	
  
YOU	
  CAN’T	
  HAVE	
  “100%	
  SECURITY.”
                                          	
  
          IT’S	
  NOT	
  POSSIBLE.	
  
   EVEN	
  IF	
  IT	
  WERE,	
  YOU’D	
  BE	
  AS	
  LIKELY	
  
  TO	
  PREVENT	
  MANY	
  BENEFITS	
  AS	
  WELL	
  
    AS	
  PREVENTING	
  ATTACKS/LEAKAGES                  	
  
Stop	
  thinking	
  of	
  
security	
  as	
  being	
  
“completely	
  safe”	
  
Provide	
  Guard	
  Rails	
  




Source: http://www.guzer.com/pictures/car_on_rail.php
EX-­‐
           	
  
  PARANOID   	
  
SECURITY	
  GUY   	
  
Your	
  Security	
  =	
  
               Swiss	
  Cheese	
  
               Effec5veness	
  

Reference: http://en.wikipedia.org/wiki/Swiss_cheese_model
All	
  Security	
  Risks	
  are	
  Not	
  Equal	
  &	
  We	
  Are	
  TERRIBLE	
  at	
  Calcula5ng	
  Risk	
  
The Mobile Tribe
WE	
  LITERALLY	
  	
  	
  	
  	
  	
  	
  	
  	
  OUR	
  PHONES	
  

      (CAN	
  YOU	
  SAY	
  THE	
  SAME	
  FOR	
  YOUR	
  
     CONTENT	
  MANAGEMENT	
  PLATFORM?)                   	
  
IS	
  YOUR	
  
ORGANIZATION	
  
 READY	
  FOR	
  
   MOBILE?	
  
SHOW	
  ME	
  YOU’RE	
  READY!
                                     	
  




Source: “Jerry Maguire” (Copyright Sony Pictures Home Entertainment)
THE	
  BAD	
  NEWS
                 	
  
YOU’RE	
  NOT	
  READY	
  FOR	
  THIS
                                    	
  

   I	
  WAS	
  (ALMOST)	
  KIDDING,	
  WHEN	
  I	
  
         WROTE	
  AN	
  ARTICLE	
  FOR	
  THE	
  
           BRAINYARD	
  LAST	
  YEAR…      	
  
NOT	
  READY…	
  TECHNOLOGICALLY
                               	
  
YOUR	
  SYSTEMS	
  ARE…	
  
          ANCIENT	
  AND	
  DECREPIT   	
  
3-­‐10	
  YEARS	
  OLD,	
  USUALLY	
  PROPRIETARY	
  (FOCUSED	
  ON	
  A	
  
SINGLE	
  ENVIRONMENT),	
  STATIC	
  RATHER	
  THAN	
  DYNAMIC,	
  
WINDOWS	
  ONLY,	
  ONE	
  BROWSER	
  ONLY,	
  FULL	
  OF	
  “DUMB	
  
        TERMINAL”	
  TO	
  ACCESS	
  REALLY	
  OLD	
  SYSTEMS… 	
  
3	
  BIG	
  GAPS:
                      	
  
 77%	
  MISSING	
  SKILLS,      	
  
55%	
  CULTURAL	
  ISSUES,           	
  
  50%	
  INEFFECTIVE	
  IT 	
  
             Source: MIT/Cap Gemini
Q:	
  WHAT	
  WERE	
  THE	
  SALES	
  LEVELS	
  OF	
  
      THE	
  IPAD	
  JUST	
  3	
  YEARS	
  AGO?	
  
A:	
  TRICK	
  QUESTION.	
  THE	
  IPAD	
  DIDN’T	
  
               EXIST	
  3	
  YEARS	
  AGO.
                                         	
  
     IF	
  YOU	
  ARE	
  ON	
  A	
  3-­‐10	
  YEAR	
  REFRESH	
  
      CYCLE,	
  YOU	
  WILL	
  HAVE	
  MISSED	
  3-­‐10	
  
              FULL	
  INNOVATION	
  CYCLES.             	
  
Q:	
  HOW	
  LONG	
  HAS	
  HTML	
  5	
  BEEN	
  A	
  
                STANDARD?     	
  
A:	
  IT	
  STILL	
  ISN’T!
                                     	
  

IF	
  YOU’RE	
  WAITING	
  FOR	
  “STANDARDS”	
  
–	
  PERHAPS	
  THAT’S	
  AN	
  EXCUSE	
  TO	
  HOLD	
  
     ONTO	
  A	
  PAST	
  NOT	
  WORTH	
  KEEPING.	
  
We	
  Are	
  All	
  
Pirates	
  on	
  the	
  
SS	
  CoIT	
  
Time	
  to	
  Jump	
  into	
  
          the   	
  
   21st	
  Century     	
  
YOU	
  CAN’T	
  AFFORD	
  NOT	
  TO	
  EMBRACE	
  
           MOBILE	
  (+	
  CLOUD)    	
  
   VERY	
  CLOSE	
  TO	
  FISCALLY	
  IRRESPONSIBLE	
  
    NOT	
  TO	
  CONSIDER	
  THIS	
  OPPORTUNITY  	
  
CONSIDER	
  MORE	
  THAN	
  SECURITY
                                           	
  
              “UNITED	
  SAID	
  THAT	
  PILOTS	
  TYPICALLY	
  CARRY	
  12,000	
  SHEETS	
  
                OF	
  PAPER	
  TO	
  CHART	
  THEIR	
  COURSE	
  DURING	
  FLIGHTS;	
  THE	
  
               INTRODUCTION	
  OF	
  THE	
  IPAD	
  SHOULD	
  SAVE	
  THE	
  AIRLINE	
  16	
  
              MILLION	
  SHEETS	
  OF	
  PAPER	
  AND,	
  THANKS	
  TO	
  THE	
  REDUCTION	
  
                 IN	
  WEIGHT,	
  326,000	
  GALLONS	
  OF	
  JET	
  FUEL	
  PER	
  YEAR.”
                                                                                         	
  




Source: http://www.pcworldme.net/2011/08/23/united-airlines-cockpits-go-paperless-with-ipads/
NON-­‐SECURITY	
  RELATED:    	
  
WE	
  WERE	
  NEVER	
  INTENDED	
  TO	
  SIT	
  IN	
  
                 CUBES     	
  
    MOBILE	
  OFFERS	
  AN	
  ABILITY	
  FOR	
  US	
  TO	
  
      GET	
  BACK	
  TO	
  BEING	
  HUMAN,	
  AND	
  
     THAT’S	
  BEEN	
  MISSING	
  FOR	
  DECADES       	
  
MOBILE	
  IS	
  AN  	
  
OPPORTUNITY	
  TO	
  RE-­‐HUMANIZE   	
  
      YOUR	
  COMPANY           	
  
WE	
  CAN	
  WORK	
  FROM	
  ANYWHERE	
  –	
  SO	
  WHY	
  
         SHOULDN’T	
  WE	
  BE	
  ABLE	
  TO?	
  
 MOBILE	
  =	
  MOVEMENT	
  =	
  MENTAL	
  AND	
  
                PHYSICAL	
  HEALTH.  	
  
THINK	
  HUMAN-­‐CENTRIC,	
  NOT	
  
COMPANY-­‐CENTRIC,	
  AND	
  CERTAINLY	
  
     NOT	
  SECURITY-­‐CENTRIC  	
  
    INCREASE	
  THE	
  UPSIDE	
  POTENTIAL	
  VIA	
  
   MOBILE,	
  AND	
  BE	
  “REASONABLE”	
  ABOUT	
  
     THE	
  “NEW”	
  SECURITY	
  CONCERNS	
  OF	
  
                       MOBILE   	
  
20th Century/   21st Century/
 Proprietary      Flexible
BYOD	
  
             •  A	
  survey	
  covering	
  17	
  countries	
  by	
  business	
  technology	
  
                company	
  Avanade	
  found	
  that	
  88%	
  of	
  execu;ves	
  said	
  
                employees	
  were	
  using	
  their	
  own	
  personal	
  compu;ng	
  
                technologies	
  for	
  business	
  purposes.	
  
             •  Absolute	
  SoOware	
  found	
  that	
  64%	
  of	
  IT	
  managers	
  surveyed	
  
                thought	
  it	
  was	
  too	
  risky	
  to	
  let	
  personal	
  devices	
  be	
  integrated	
  
                into	
  the	
  business	
  network.	
  However	
  52%	
  of	
  companies	
  
                allowed	
  some	
  form	
  of	
  access.	
  
             •  Another	
  survey	
  by	
  Cisco	
  found	
  that	
  although	
  48%	
  said	
  their	
  
                company	
  would	
  never	
  authorize	
  employees	
  to	
  bring	
  their	
  own	
  
                devices,	
  57%	
  agreed	
  that	
  some	
  employees	
  use	
  personal	
  
                devices	
  without	
  consent.	
  



Source: MIT/Cap Gemini
Going	
  Mobile?	
  Let’s	
  talk.	
  

Dan	
  Keldsen,	
  President	
  
dk@informa;onarchitected.com	
  
617-­‐933-­‐9655	
  

Weitere ähnliche Inhalte

Was ist angesagt?

The Invisible Future of Design
The Invisible Future of DesignThe Invisible Future of Design
The Invisible Future of DesignDerrick Fountain
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacyEntefy
 
Nkuna c.d 23345446 smart phones
Nkuna c.d 23345446 smart phonesNkuna c.d 23345446 smart phones
Nkuna c.d 23345446 smart phonesdolceTikoBerry
 
An app is not a mobile strategy
An app is not a mobile strategyAn app is not a mobile strategy
An app is not a mobile strategythunder::tech
 
SecQ.me New Deck
SecQ.me New DeckSecQ.me New Deck
SecQ.me New DeckKhoo Shiang
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsCrystalHariga
 
Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260venuschung
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 

Was ist angesagt? (13)

The Invisible Future of Design
The Invisible Future of DesignThe Invisible Future of Design
The Invisible Future of Design
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
nkuna c.d 23345446
nkuna c.d 23345446nkuna c.d 23345446
nkuna c.d 23345446
 
Nkuna c.d 23345446 smart phones
Nkuna c.d 23345446 smart phonesNkuna c.d 23345446 smart phones
Nkuna c.d 23345446 smart phones
 
An app is not a mobile strategy
An app is not a mobile strategyAn app is not a mobile strategy
An app is not a mobile strategy
 
Computer safety
Computer safetyComputer safety
Computer safety
 
SecQ.me New Deck
SecQ.me New DeckSecQ.me New Deck
SecQ.me New Deck
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive Us
 
Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
20110325 facebookgoogle
20110325 facebookgoogle20110325 facebookgoogle
20110325 facebookgoogle
 

Ähnlich wie The Mobile Tribe

Threat Modeling 101
Threat Modeling 101Threat Modeling 101
Threat Modeling 101Atlassian
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019Inês Almeida
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration riskEdgevalue
 
Another Day In Paradise
Another Day In ParadiseAnother Day In Paradise
Another Day In Paradisekum72
 
SXSE 2017 – Multiply & Conquer
SXSE 2017 – Multiply & ConquerSXSE 2017 – Multiply & Conquer
SXSE 2017 – Multiply & ConquerIris
 
Technology in Business Law by Ammar Younas
Technology in Business Law by Ammar YounasTechnology in Business Law by Ammar Younas
Technology in Business Law by Ammar YounasAmmar Younas
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecuritynathan-axonius
 
Input Variables - Presentation ADC*E Festival ‘17
Input Variables - Presentation ADC*E Festival ‘17Input Variables - Presentation ADC*E Festival ‘17
Input Variables - Presentation ADC*E Festival ‘17Helge Tennø
 
1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper4imprint
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecuritySounil Yu
 

Ähnlich wie The Mobile Tribe (20)

Threat Modeling 101
Threat Modeling 101Threat Modeling 101
Threat Modeling 101
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019The First of Me! Insights from the Future of Digital at SxSW 2019
The First of Me! Insights from the Future of Digital at SxSW 2019
 
BYOD eBook Part 1 DREW
BYOD eBook Part 1 DREWBYOD eBook Part 1 DREW
BYOD eBook Part 1 DREW
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration risk
 
Another Day In Paradise
Another Day In ParadiseAnother Day In Paradise
Another Day In Paradise
 
SXSE 2017 – Multiply & Conquer
SXSE 2017 – Multiply & ConquerSXSE 2017 – Multiply & Conquer
SXSE 2017 – Multiply & Conquer
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Bt tower v1.1
 
Security
SecuritySecurity
Security
 
Innovate or Die
Innovate or DieInnovate or Die
Innovate or Die
 
Technology in Business Law by Ammar Younas
Technology in Business Law by Ammar YounasTechnology in Business Law by Ammar Younas
Technology in Business Law by Ammar Younas
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
Montclair share preso
Montclair share presoMontclair share preso
Montclair share preso
 
Input Variables - Presentation ADC*E Festival ‘17
Input Variables - Presentation ADC*E Festival ‘17Input Variables - Presentation ADC*E Festival ‘17
Input Variables - Presentation ADC*E Festival ‘17
 
1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 

Mehr von Dan Keldsen

Information Architecture Primer - Integrating search,tagging, taxonomy and us...
Information Architecture Primer - Integrating search,tagging, taxonomy and us...Information Architecture Primer - Integrating search,tagging, taxonomy and us...
Information Architecture Primer - Integrating search,tagging, taxonomy and us...Dan Keldsen
 
The Gen Z Manifesto
The Gen Z ManifestoThe Gen Z Manifesto
The Gen Z ManifestoDan Keldsen
 
Findability Primer by Information Architected - the IA Primer Series
Findability Primer by Information Architected - the IA Primer SeriesFindability Primer by Information Architected - the IA Primer Series
Findability Primer by Information Architected - the IA Primer SeriesDan Keldsen
 
Successful Collaboration and Employee Engagement Lifecycle
Successful Collaboration and Employee Engagement LifecycleSuccessful Collaboration and Employee Engagement Lifecycle
Successful Collaboration and Employee Engagement LifecycleDan Keldsen
 
Collaborative Innovation: The State of Engagement
Collaborative Innovation: The State of EngagementCollaborative Innovation: The State of Engagement
Collaborative Innovation: The State of EngagementDan Keldsen
 
small i to BIG I Innovation
small i to BIG I Innovationsmall i to BIG I Innovation
small i to BIG I InnovationDan Keldsen
 
(Collaboration) Stop Pushing, Get Your Team to Pull!
(Collaboration) Stop Pushing, Get Your Team to Pull!(Collaboration) Stop Pushing, Get Your Team to Pull!
(Collaboration) Stop Pushing, Get Your Team to Pull!Dan Keldsen
 
Real-Time Working With Collaboration
Real-Time Working With CollaborationReal-Time Working With Collaboration
Real-Time Working With CollaborationDan Keldsen
 
Enterprise 2.0: Straight From The Horse's Mouth
Enterprise 2.0: Straight From The Horse's MouthEnterprise 2.0: Straight From The Horse's Mouth
Enterprise 2.0: Straight From The Horse's MouthDan Keldsen
 
Innovation Management Research - Perception Outpaces Reality
Innovation Management Research - Perception Outpaces RealityInnovation Management Research - Perception Outpaces Reality
Innovation Management Research - Perception Outpaces RealityDan Keldsen
 
Get Your Innovation On - “Minds On”
Get Your Innovation On - “Minds On”Get Your Innovation On - “Minds On”
Get Your Innovation On - “Minds On”Dan Keldsen
 
Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?
Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?
Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?Dan Keldsen
 
Do You Have the Strength to Embrace Innovation in a 2.0 World?
Do You Have the Strength to Embrace Innovation in a 2.0 World?Do You Have the Strength to Embrace Innovation in a 2.0 World?
Do You Have the Strength to Embrace Innovation in a 2.0 World?Dan Keldsen
 
Emergence - Get with it... or fade away
Emergence - Get with it... or fade awayEmergence - Get with it... or fade away
Emergence - Get with it... or fade awayDan Keldsen
 
Who's the Boss, MOSS?
Who's the Boss, MOSS?Who's the Boss, MOSS?
Who's the Boss, MOSS?Dan Keldsen
 
Enterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law Firms
Enterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law FirmsEnterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law Firms
Enterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law FirmsDan Keldsen
 
Should you outsource your e-mail archive?
Should you outsource your e-mail archive?Should you outsource your e-mail archive?
Should you outsource your e-mail archive?Dan Keldsen
 
AIIM Market IQ On Findability Webinar Public Version
AIIM Market IQ On Findability Webinar Public VersionAIIM Market IQ On Findability Webinar Public Version
AIIM Market IQ On Findability Webinar Public VersionDan Keldsen
 
AIIM Market IQ On Findability Webinar Press Version
AIIM Market IQ On Findability Webinar Press VersionAIIM Market IQ On Findability Webinar Press Version
AIIM Market IQ On Findability Webinar Press VersionDan Keldsen
 
Enterprise 2.0 = Knowledge Management 2.0?
Enterprise 2.0 = Knowledge Management 2.0?Enterprise 2.0 = Knowledge Management 2.0?
Enterprise 2.0 = Knowledge Management 2.0?Dan Keldsen
 

Mehr von Dan Keldsen (20)

Information Architecture Primer - Integrating search,tagging, taxonomy and us...
Information Architecture Primer - Integrating search,tagging, taxonomy and us...Information Architecture Primer - Integrating search,tagging, taxonomy and us...
Information Architecture Primer - Integrating search,tagging, taxonomy and us...
 
The Gen Z Manifesto
The Gen Z ManifestoThe Gen Z Manifesto
The Gen Z Manifesto
 
Findability Primer by Information Architected - the IA Primer Series
Findability Primer by Information Architected - the IA Primer SeriesFindability Primer by Information Architected - the IA Primer Series
Findability Primer by Information Architected - the IA Primer Series
 
Successful Collaboration and Employee Engagement Lifecycle
Successful Collaboration and Employee Engagement LifecycleSuccessful Collaboration and Employee Engagement Lifecycle
Successful Collaboration and Employee Engagement Lifecycle
 
Collaborative Innovation: The State of Engagement
Collaborative Innovation: The State of EngagementCollaborative Innovation: The State of Engagement
Collaborative Innovation: The State of Engagement
 
small i to BIG I Innovation
small i to BIG I Innovationsmall i to BIG I Innovation
small i to BIG I Innovation
 
(Collaboration) Stop Pushing, Get Your Team to Pull!
(Collaboration) Stop Pushing, Get Your Team to Pull!(Collaboration) Stop Pushing, Get Your Team to Pull!
(Collaboration) Stop Pushing, Get Your Team to Pull!
 
Real-Time Working With Collaboration
Real-Time Working With CollaborationReal-Time Working With Collaboration
Real-Time Working With Collaboration
 
Enterprise 2.0: Straight From The Horse's Mouth
Enterprise 2.0: Straight From The Horse's MouthEnterprise 2.0: Straight From The Horse's Mouth
Enterprise 2.0: Straight From The Horse's Mouth
 
Innovation Management Research - Perception Outpaces Reality
Innovation Management Research - Perception Outpaces RealityInnovation Management Research - Perception Outpaces Reality
Innovation Management Research - Perception Outpaces Reality
 
Get Your Innovation On - “Minds On”
Get Your Innovation On - “Minds On”Get Your Innovation On - “Minds On”
Get Your Innovation On - “Minds On”
 
Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?
Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?
Bonus slides: Do You Have the Strength for Enterprise 2.0 and Innovation?
 
Do You Have the Strength to Embrace Innovation in a 2.0 World?
Do You Have the Strength to Embrace Innovation in a 2.0 World?Do You Have the Strength to Embrace Innovation in a 2.0 World?
Do You Have the Strength to Embrace Innovation in a 2.0 World?
 
Emergence - Get with it... or fade away
Emergence - Get with it... or fade awayEmergence - Get with it... or fade away
Emergence - Get with it... or fade away
 
Who's the Boss, MOSS?
Who's the Boss, MOSS?Who's the Boss, MOSS?
Who's the Boss, MOSS?
 
Enterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law Firms
Enterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law FirmsEnterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law Firms
Enterprise 2.0 = Knowledge Management 2.0? For KM Practitioners in Law Firms
 
Should you outsource your e-mail archive?
Should you outsource your e-mail archive?Should you outsource your e-mail archive?
Should you outsource your e-mail archive?
 
AIIM Market IQ On Findability Webinar Public Version
AIIM Market IQ On Findability Webinar Public VersionAIIM Market IQ On Findability Webinar Public Version
AIIM Market IQ On Findability Webinar Public Version
 
AIIM Market IQ On Findability Webinar Press Version
AIIM Market IQ On Findability Webinar Press VersionAIIM Market IQ On Findability Webinar Press Version
AIIM Market IQ On Findability Webinar Press Version
 
Enterprise 2.0 = Knowledge Management 2.0?
Enterprise 2.0 = Knowledge Management 2.0?Enterprise 2.0 = Knowledge Management 2.0?
Enterprise 2.0 = Knowledge Management 2.0?
 

Kürzlich hochgeladen

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 

Kürzlich hochgeladen (20)

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 

The Mobile Tribe

  • 1. The  Mobile  Tribe   Smart  Devices  +  Human  Behavior  =  Massive  Change  
  • 2. Dan  Keldsen  –  Informa5on  Architected   @dankeldsen  #mobilehumans   Exper;se:   •  Content/Knowledge  Management   •  Innova;on  management     •  Enterprise  2.0/Web  2.0   Background:   •  Current:   •  Informa;on  Architected:  President,  Consultant   •  Level  50  SoOware:  Co-­‐founder,  Mobile  Social/UX  Strategy   (level50soOware.com)   •  Past:   •  AIIM:  Former  director  of  Market  Intelligence  unit   •  Delphi  Group:  Former  analyst,  consultant  and  CTO  
  • 3. BEFORE  WE  PRESUME  THAT   “MOBILE  IS  THE  ANSWER”   OR  PERHAPS  THAT   “MOBILE  IS  THE  PROBLEM”  
  • 4. HOW  MUCH  OF  YOUR  ENTERPRISE   ENVIRONMENT  DO  YOU  (OR  YOUR   USERS)  WANT  TO  HAVE  AVAILABLE  VIA   MOBILE?   0  <––––––––––––>  100%  
  • 5. HOW  “SECURE”  DOES  THAT  ACCESS/ ABILITY  NEED  TO  BE?   0  <––––––––––––>  100%  
  • 6. YOU  CAN’T  HAVE  “100%  SECURITY.”   IT’S  NOT  POSSIBLE.   EVEN  IF  IT  WERE,  YOU’D  BE  AS  LIKELY   TO  PREVENT  MANY  BENEFITS  AS  WELL   AS  PREVENTING  ATTACKS/LEAKAGES  
  • 7. Stop  thinking  of   security  as  being   “completely  safe”  
  • 8. Provide  Guard  Rails   Source: http://www.guzer.com/pictures/car_on_rail.php
  • 9. EX-­‐   PARANOID   SECURITY  GUY  
  • 10. Your  Security  =   Swiss  Cheese   Effec5veness   Reference: http://en.wikipedia.org/wiki/Swiss_cheese_model
  • 11. All  Security  Risks  are  Not  Equal  &  We  Are  TERRIBLE  at  Calcula5ng  Risk  
  • 13. WE  LITERALLY                  OUR  PHONES   (CAN  YOU  SAY  THE  SAME  FOR  YOUR   CONTENT  MANAGEMENT  PLATFORM?)  
  • 14. IS  YOUR   ORGANIZATION   READY  FOR   MOBILE?  
  • 15. SHOW  ME  YOU’RE  READY!   Source: “Jerry Maguire” (Copyright Sony Pictures Home Entertainment)
  • 17. YOU’RE  NOT  READY  FOR  THIS   I  WAS  (ALMOST)  KIDDING,  WHEN  I   WROTE  AN  ARTICLE  FOR  THE   BRAINYARD  LAST  YEAR…  
  • 19. YOUR  SYSTEMS  ARE…   ANCIENT  AND  DECREPIT   3-­‐10  YEARS  OLD,  USUALLY  PROPRIETARY  (FOCUSED  ON  A   SINGLE  ENVIRONMENT),  STATIC  RATHER  THAN  DYNAMIC,   WINDOWS  ONLY,  ONE  BROWSER  ONLY,  FULL  OF  “DUMB   TERMINAL”  TO  ACCESS  REALLY  OLD  SYSTEMS…  
  • 20. 3  BIG  GAPS:   77%  MISSING  SKILLS,   55%  CULTURAL  ISSUES,   50%  INEFFECTIVE  IT   Source: MIT/Cap Gemini
  • 21. Q:  WHAT  WERE  THE  SALES  LEVELS  OF   THE  IPAD  JUST  3  YEARS  AGO?  
  • 22. A:  TRICK  QUESTION.  THE  IPAD  DIDN’T   EXIST  3  YEARS  AGO.   IF  YOU  ARE  ON  A  3-­‐10  YEAR  REFRESH   CYCLE,  YOU  WILL  HAVE  MISSED  3-­‐10   FULL  INNOVATION  CYCLES.  
  • 23. Q:  HOW  LONG  HAS  HTML  5  BEEN  A   STANDARD?  
  • 24. A:  IT  STILL  ISN’T!   IF  YOU’RE  WAITING  FOR  “STANDARDS”   –  PERHAPS  THAT’S  AN  EXCUSE  TO  HOLD   ONTO  A  PAST  NOT  WORTH  KEEPING.  
  • 25. We  Are  All   Pirates  on  the   SS  CoIT  
  • 26. Time  to  Jump  into   the   21st  Century  
  • 27. YOU  CAN’T  AFFORD  NOT  TO  EMBRACE   MOBILE  (+  CLOUD)   VERY  CLOSE  TO  FISCALLY  IRRESPONSIBLE   NOT  TO  CONSIDER  THIS  OPPORTUNITY  
  • 28. CONSIDER  MORE  THAN  SECURITY   “UNITED  SAID  THAT  PILOTS  TYPICALLY  CARRY  12,000  SHEETS   OF  PAPER  TO  CHART  THEIR  COURSE  DURING  FLIGHTS;  THE   INTRODUCTION  OF  THE  IPAD  SHOULD  SAVE  THE  AIRLINE  16   MILLION  SHEETS  OF  PAPER  AND,  THANKS  TO  THE  REDUCTION   IN  WEIGHT,  326,000  GALLONS  OF  JET  FUEL  PER  YEAR.”   Source: http://www.pcworldme.net/2011/08/23/united-airlines-cockpits-go-paperless-with-ipads/
  • 29. NON-­‐SECURITY  RELATED:   WE  WERE  NEVER  INTENDED  TO  SIT  IN   CUBES   MOBILE  OFFERS  AN  ABILITY  FOR  US  TO   GET  BACK  TO  BEING  HUMAN,  AND   THAT’S  BEEN  MISSING  FOR  DECADES  
  • 30. MOBILE  IS  AN   OPPORTUNITY  TO  RE-­‐HUMANIZE   YOUR  COMPANY   WE  CAN  WORK  FROM  ANYWHERE  –  SO  WHY   SHOULDN’T  WE  BE  ABLE  TO?   MOBILE  =  MOVEMENT  =  MENTAL  AND   PHYSICAL  HEALTH.  
  • 31. THINK  HUMAN-­‐CENTRIC,  NOT   COMPANY-­‐CENTRIC,  AND  CERTAINLY   NOT  SECURITY-­‐CENTRIC   INCREASE  THE  UPSIDE  POTENTIAL  VIA   MOBILE,  AND  BE  “REASONABLE”  ABOUT   THE  “NEW”  SECURITY  CONCERNS  OF   MOBILE  
  • 32. 20th Century/ 21st Century/ Proprietary Flexible
  • 33. BYOD   •  A  survey  covering  17  countries  by  business  technology   company  Avanade  found  that  88%  of  execu;ves  said   employees  were  using  their  own  personal  compu;ng   technologies  for  business  purposes.   •  Absolute  SoOware  found  that  64%  of  IT  managers  surveyed   thought  it  was  too  risky  to  let  personal  devices  be  integrated   into  the  business  network.  However  52%  of  companies   allowed  some  form  of  access.   •  Another  survey  by  Cisco  found  that  although  48%  said  their   company  would  never  authorize  employees  to  bring  their  own   devices,  57%  agreed  that  some  employees  use  personal   devices  without  consent.   Source: MIT/Cap Gemini
  • 34. Going  Mobile?  Let’s  talk.   Dan  Keldsen,  President   dk@informa;onarchitected.com   617-­‐933-­‐9655  

Hinweis der Redaktion

  1. Period, at all, not by anyone or any organization. I can put you in touch with penetration testing teams I know if you don’t believe me. But you won’t sleep for weeks.Don’t believe Oracle’s “100% Secure” or whatever their ridiculous marketing claim was. It’s not possible.
  2. Stop thinking “no risk” and create guard rails that keep your car on the road. Stuff happens, it’s how you react that’s more important than trying to prevent all bad things.There are always going to be people who accidentally or on purpose go beyond “expected behavior” – but trying to be “ultra-vigilent” is a serious mistake. It’s almost never worth it.You can’t afford “perfect security” and even if you could, it’s not possible. So instead of thinking “protect against all harm” – think “safely enable” – it opens up a much wider realm of opportunity.
  3. Confession Time
  4. Major moment for me as a security guy…Can’t protect against all threats. Completely impossible.We our are own worst enemies. I was in charge of security configurations and audits….Accidentally killed off all email EXCEPT spam for about 30 minutes. Not a good day in my career.Problem is… I thought I was going above and beyond to ultra-protective of the company. But one tiny misconfiguration completely reversed the expected risk profile… and that’s just a simple example of a major security hole that came about WITHOUT being attacked. Pure human misconfiguration of a truly terrible user interface. Checkpoint firewall, for those who are wondering.
  5. There are no absolutes in security – but calculating risk and addressing various risk levels happens about as often as ROI calculations are done in enterprises, for the same reasons.We are terrible at calculating risks, we are predictably irrational in the way we make decisions, justify decisions after the fact, and prepare for future potential decisions.Both of these books are fantastic – as they show that are understanding of how decisions are made, how people think they’ll react and how they actually do, are not as “obvious” as we might think.Even professional risk takers “fail” quite often – that’s the point of risk – you calculate it and acknowledge that sometimes you’ll be wrong, but work to minimize the downside while maximizing the upside.
  6. So, against my initial inclination for this webinar - I just can’t bring myself to make a massive deal out of mobile security and/or cloud concerns. They are just extensions and in many ways, a return to very old computing models.So let’s focus on whether you’re even ready to take advantage of what is, in my opinion, a massive opportunity to right some wrongs that have hampered us for far too long…
  7. When’s the last time you loved any devices you have to use at work?Probably never.This is REALLY big folks.More people forget their spouses and children more often than they will forget their phone.And according to FMRi (functional magnetic resonance imaging) studies, we show signs of not just being addicted to mobile devices, but effectively “loving” our phones very literally. Exact same measurable response.Is that creepy? Exciting? Not sure – probably both – but this is a major moment for computers – away from the dry labs of mainframes and into devices in our pockets that have “lickable” user interfaces as the model.So… we love our phones, but is your enterprise ready for this?
  8. We have all of this potential power right in our hands – let’s go for it!
  9. Cap Gemini/MIT survey of 157 executives $1 billion+ revenue companies: The three top reasons why companies are finding it hard to implement tools like analytics, mobile technology, and social media for business are: missing skills (77%), cultural issues (55%), and ineffective IT (50%). It is clear that changing people’s work habits represent the biggest impediment to technology change.
  10. So why is that? Seems like mobile devices are everywhere, right? And at this point, that they’ve been available forever…But what were the sales levels of the iPad just 3 years ago?
  11. You already have pirates breaking the rules to get things done in your organization…Call it Consumerization of IT or CoIT – The outside world and normal pace of tech change at most companies is far behind the pace of change of the world at large.Bring your tribe of pirates together to HELP you, rather than end-run around you.
  12. All of the biggest, clunkiest costs for the infrastructure of companies (computers, wiring systems, offices, buildings, etc.) are being eliminated – to not take advantage of the massive revolution of mobile + cloud is very close to fiscally irresponsible, in my viewBe ready to map out both the risks AND the opportunities available via mobile, cloud, etc.
  13. If you over-focus on security, you miss out on all sorts of other ways to innovate in your business – that far outweigh security concerns.