SlideShare a Scribd company logo
1 of 30
Download to read offline
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Evolution of the Application





2016



Daniel Miessler
Director of Advisory Services
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Intros
▪ 17 years in information security
▪ 11 year as a security tester
▪ Network / web / mobile / thick-client / IoT testing
▪ Currently run the Advisory Services group for IOActive
▪ Project leader for the OWASP IoT Security Project
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Agenda
▪ 10 technology forces
▪ Digital assistants
▪ Businesses as APIs

▪ Putting it together
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Continuous
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
10 technology forces affecting applications
• Centralized ! Peer to Peer
• Forced ! Natural
• Obvious ! Invisible
• Manual ! Automatic
• Periodic ! Constant
• Scheduled ! Real-time
• Private ! Open
• Visual ! Multi-sensory
• Aggregated ! Curated
• Designed ! Evolved
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Personal assistants
Forced	! Natural	=	VoiceFirst
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Personal assistants
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Computer interface (old)
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Digital assistants (new)
DA
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Migration inward
Application
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Migration inward
Application
Social
Platform
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Migration inward
Application
Social
Platform
Operating System
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs
DA
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs (old vs. new)
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Businesses as APIs (old vs. new)
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Putting it together
1. Motions towards natural, real-time, continuous, frictionless
2. The move towards a voice and chat interface instead of unique,
company-specific application interfaces
3. You interact with your DA, and your DA interacts with the OS and
the world
4. Businesses become algorithms, which become APIs, which are
called by DAs
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Takeaways
1. For the apps that you are creating, and that apps that you use, start thinking
about these usability trends
2. Start thinking about how natural the interface is compared to voice or compared
to it happening automatically
3. What parts of the business could benefit from a bot functionality?
4. Start thinking about what discrete functions your group provides, and how they
can be converted to APIs
5. Start asking what the business looks like when most applications are APIs that
are either voice controlled, bot interactive, or completely automatic
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Thank you
IOActive, Inc. Copyright © 2016. All Rights Reserved.
Questions?



Comments?



Ideas?
E: daniel.miessler@ioactive.com
T: @danielmiessler

More Related Content

Similar to Evolution of The Application

Real World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPIReal World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPIMegan Bowe
 
Test Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceTest Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceAdam Sandman
 
Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...TechMeetups
 
Anubavam Technologies I Phone Offerings
Anubavam Technologies I Phone OfferingsAnubavam Technologies I Phone Offerings
Anubavam Technologies I Phone OfferingsSandeep Mohan
 
Make the Most of Your Traffic
Make the Most of Your TrafficMake the Most of Your Traffic
Make the Most of Your Trafficion interactive
 
How to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage SupportersHow to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage SupportersTechSoup
 
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...Claire Townend Gee
 
Mobile testing trends webinar PPT
Mobile testing trends webinar PPTMobile testing trends webinar PPT
Mobile testing trends webinar PPTXBOSoft
 
Answering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User SummitAnswering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User SummitSquiz
 
Mixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensMixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensAvanade Nederland
 
Enabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at ScaleEnabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at ScaleBob Sokol
 
Adventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual AssistantsAdventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual AssistantsEditt Gonen-Friedman
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 
Html5 web apps vs nativeapps
Html5 web apps vs nativeappsHtml5 web apps vs nativeapps
Html5 web apps vs nativeappsSiva Prasad K V
 
API Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API StrategyAPI Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API StrategyAkana
 
Api frenzy june 2013 v2
Api frenzy june 2013 v2Api frenzy june 2013 v2
Api frenzy june 2013 v2Sachin Agarwal
 

Similar to Evolution of The Application (20)

Real World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPIReal World Solutions Leveraging xAPI
Real World Solutions Leveraging xAPI
 
Test Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceTest Masters 2016 Spring Conference
Test Masters 2016 Spring Conference
 
Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...Grow your startup with on deman talent by hayley conick at guru program sprin...
Grow your startup with on deman talent by hayley conick at guru program sprin...
 
Anubavam Technologies I Phone Offerings
Anubavam Technologies I Phone OfferingsAnubavam Technologies I Phone Offerings
Anubavam Technologies I Phone Offerings
 
Make the Most of Your Traffic
Make the Most of Your TrafficMake the Most of Your Traffic
Make the Most of Your Traffic
 
Alex jubien-think mobile
Alex jubien-think mobileAlex jubien-think mobile
Alex jubien-think mobile
 
How to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage SupportersHow to Build a Nonprofit Mobile App To Engage Supporters
How to Build a Nonprofit Mobile App To Engage Supporters
 
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
Swift LA Meetup at eHarmony - What You Might Have Missed at WWDC 2015 with Ch...
 
Mobile testing trends webinar PPT
Mobile testing trends webinar PPTMobile testing trends webinar PPT
Mobile testing trends webinar PPT
 
Answering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User SummitAnswering the Mobile Challenge - Squiz Scotland User Summit
Answering the Mobile Challenge - Squiz Scotland User Summit
 
Mobile Apps Development Company
Mobile Apps Development CompanyMobile Apps Development Company
Mobile Apps Development Company
 
Mixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensMixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLens
 
Enabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at ScaleEnabling Enterprise DevOps at Scale
Enabling Enterprise DevOps at Scale
 
Adventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual AssistantsAdventures on the Road to Enterprise Virtual Assistants
Adventures on the Road to Enterprise Virtual Assistants
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 
Html5 web apps vs nativeapps
Html5 web apps vs nativeappsHtml5 web apps vs nativeapps
Html5 web apps vs nativeapps
 
Perso.na
Perso.naPerso.na
Perso.na
 
Designing IoT
Designing IoTDesigning IoT
Designing IoT
 
API Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API StrategyAPI Frenzy: The Implications and Planning for a Successful API Strategy
API Frenzy: The Implications and Planning for a Successful API Strategy
 
Api frenzy june 2013 v2
Api frenzy june 2013 v2Api frenzy june 2013 v2
Api frenzy june 2013 v2
 

More from Daniel Miessler

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security FrameworkDaniel Miessler
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security FrameworkDaniel Miessler
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesDaniel Miessler
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesDaniel Miessler
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResilienceDaniel Miessler
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Daniel Miessler
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015Daniel Miessler
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsDaniel Miessler
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingDaniel Miessler
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryDaniel Miessler
 

More from Daniel Miessler (13)

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security Framework
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap Techniques
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing Methodologies
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to Resilience
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change Everything
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Evolution of The Application

  • 1. IOActive, Inc. Copyright © 2016. All Rights Reserved. Evolution of the Application
 
 
 2016
 
 Daniel Miessler Director of Advisory Services
  • 2. IOActive, Inc. Copyright © 2016. All Rights Reserved. Intros ▪ 17 years in information security ▪ 11 year as a security tester ▪ Network / web / mobile / thick-client / IoT testing ▪ Currently run the Advisory Services group for IOActive ▪ Project leader for the OWASP IoT Security Project
  • 3. IOActive, Inc. Copyright © 2016. All Rights Reserved. Agenda ▪ 10 technology forces ▪ Digital assistants ▪ Businesses as APIs
 ▪ Putting it together
  • 4. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 5. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 6. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 7. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 8. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 9. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Continuous • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 10. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 11. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 12. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 13. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 14. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 15. IOActive, Inc. Copyright © 2016. All Rights Reserved. 10 technology forces affecting applications • Centralized ! Peer to Peer • Forced ! Natural • Obvious ! Invisible • Manual ! Automatic • Periodic ! Constant • Scheduled ! Real-time • Private ! Open • Visual ! Multi-sensory • Aggregated ! Curated • Designed ! Evolved
  • 16. IOActive, Inc. Copyright © 2016. All Rights Reserved. Personal assistants Forced ! Natural = VoiceFirst
  • 17. IOActive, Inc. Copyright © 2016. All Rights Reserved. Personal assistants
  • 18. IOActive, Inc. Copyright © 2016. All Rights Reserved. Computer interface (old)
  • 19. IOActive, Inc. Copyright © 2016. All Rights Reserved. Digital assistants (new) DA
  • 20. IOActive, Inc. Copyright © 2016. All Rights Reserved. Migration inward Application
  • 21. IOActive, Inc. Copyright © 2016. All Rights Reserved. Migration inward Application Social Platform
  • 22. IOActive, Inc. Copyright © 2016. All Rights Reserved. Migration inward Application Social Platform Operating System
  • 23. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs
  • 24. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs DA
  • 25. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs (old vs. new)
  • 26. IOActive, Inc. Copyright © 2016. All Rights Reserved. Businesses as APIs (old vs. new)
  • 27. IOActive, Inc. Copyright © 2016. All Rights Reserved. Putting it together 1. Motions towards natural, real-time, continuous, frictionless 2. The move towards a voice and chat interface instead of unique, company-specific application interfaces 3. You interact with your DA, and your DA interacts with the OS and the world 4. Businesses become algorithms, which become APIs, which are called by DAs
  • 28. IOActive, Inc. Copyright © 2016. All Rights Reserved. Takeaways 1. For the apps that you are creating, and that apps that you use, start thinking about these usability trends 2. Start thinking about how natural the interface is compared to voice or compared to it happening automatically 3. What parts of the business could benefit from a bot functionality? 4. Start thinking about what discrete functions your group provides, and how they can be converted to APIs 5. Start asking what the business looks like when most applications are APIs that are either voice controlled, bot interactive, or completely automatic
  • 29. IOActive, Inc. Copyright © 2016. All Rights Reserved. Thank you
  • 30. IOActive, Inc. Copyright © 2016. All Rights Reserved. Questions?
 
 Comments?
 
 Ideas? E: daniel.miessler@ioactive.com T: @danielmiessler