Byod News & Analysis
| Thursday Aug 14, 2014
Now that we've accepted the idea of the Internet of Things (IoT), researchers are starting to look at when, where, how, why and who will use it. They're also looking into potential risks.
Recent research from IDC, for example, shows that retailers are leading the charge to the IoT in the quest for better customer experiences.
According to IDC, retailers see the IoT as a way to improve customer experiences. Specifically, they are using it to pull consumers into one of their channels, where they will entice them with products that have been contextualized and personalized for the customers’ gratification.
| Tuesday Jul 8, 2014
Much has been made in the past few years about the massive business opportunities that the Internet of Things (IoT) will provide. But capitalizing on this potential is going to be a challenge.
Two recent research reports show that most enterprises are unprepared for the IoT.
Research from Infoblox showed the infrastructure to support the IoT is too weak. And research from Spiceworks found the IoT will put already overburdened networks under unbearable pressure. Combined, the studies suggest that far from being the financial cornucopia it could be, the IoT may in fact buckle enterprise infrastructure.
| Wednesday Jun 25, 2014
Find a company that does not have a bring your own device (BYOD) management strategy, and you'd need to welcome them to enterprise life in the 2010s.
We all do work on our personal smartphones.
The challenge for organizations is managing all these devices, systems, networks, operating systems, public and private cloud apps and other converging factors.
Forrester Research stresses the need for BYOD management services. It released today a Wave for Global BYOD Management Services, an analysis of 13 top BYOD integrators and specialists.
| Wednesday Jun 25, 2014
To achieve competitive advantage, large organizations today are developing mobile applications that meet three key objectives: 1) enable new mobile business processes for employees, 2) meet the growing mobile demands of customers, and 3) unlock new revenue potential within their business and with partners.
To accomplish this, organizations often need to integrate mobile apps with enterprise systems and data — collectively referred to as the backend.
Organizations that do not integrate mobile apps securely and effectively with their existing backend infrastructure will face competitors whose employees are more productive, whose customers are more satisfied and whose ecosystem fuels new business opportunities.
| Friday Jun 20, 2014
Microsoft and Google will incorporate a kill switch into the next version of Windows-based and Android smartphones. The feature, which is already featured on Apple's iPhone 5, allows users to remotely wipe all data and information on the device in the event of theft.
At a press conference yesterday, New York State Attorney General Eric Schneiderman and San Francisco District Attorney George Gascón announced they had reached agreements with both companies to include the feature in the next iteration of their respective operating systems.
| Wednesday May 21, 2014
You can’t go mobile with a desktop mindset -- but that’s just what too many IT organizations do. The most commonly applied mobile app policies are holdovers from the PC environment, like two-factor authentication and selective access based on Active Directory membership. These measures may be useful in a traditional computing setting, but they’re woefully inadequate for the new world of enterprise mobility. They fail to account for concepts like jailbroken devices, bring-your-own-device (BYOD), untrusted public networks and offline usage.
To make enterprise mobility both secure and fully productive, you need to apply new policies designed specifically for the way mobile users work today. It’s not just about introducing restrictions and roadblocks -- you also need to empower people to do even more with their mobile apps and devices to enable greater business value.
| Friday May 2, 2014
With all that has been studied, written about, developed and tweaked in the area of the social enterprise, why are some of the world's leading organizations still struggling with their social initiatives? Is there something that all of the pundits are missing?
The answer is the elephant in the room. We can discuss solutions until we’re blue in the face, but the answer lies within the evolving dynamics of work styles that we’re seeing across the board at business and enterprises.
| Monday Apr 28, 2014
What was the first thing you reached for before getting out of bed this morning? Your smartphone, right? You had to look up your calendar, latest updates on your Facebook wall and maybe peek at emails sitting in your inbox.
The explosive growth of mobile and social technology is no surprise: It is a natural evolution of how we as humans interact. Mobile and social technology has provided us with the ability to organize, and connect faster and better than ever before. It’s not just a vehicle for connecting with old friends or keeping up with the latest celebrity news, but rather a powerful tool that helps people unite, mobilize and act on a global scale. It’s been the voice of revolutions, united people across the world to bring disaster relief to the Philippines after Typhoon Haiyan, and has been responsible for placing worldwide attention to social, political and environmental issues.
| Monday Apr 21, 2014
The concept of the browser-based intranet as most people know it is a relic of the 20th century: You may as well dress it down in flannel and send it off to a Pearl Jam concert. A seldom elegant mashup of communication channels, application functionality, document collaboration and now enterprise social, the intranet at its heart is an idea from the days before mobile and BYOD that, much like the Cadillac Escalade and the British aristocracy, continues to hang on long past its expiration date. And yet it’s not going anywhere any time soon.
| Wednesday Apr 16, 2014
Knock me over with a feather: A new survey shows a lot of people waste time at the office doing all sorts of things they shouldn't … including playing games, browsing social networks and looking for new jobs.
Last month, TeamViewer, a provider of remote control and online meeting software, asked 300 IT administrators to list some common behaviors of office workers and explain how those behaviors have affected both IT administration and the company’s bottom line.
The only thing surprising about the resulting IT Admin Behavioral Study is that the company described the results as surprising — and the fact that only 92 percent of IT admins report troublesome habits among office workers using company computers. Are the other 8 percent of IT admins ignorant or just naïve?
| Wednesday Apr 16, 2014
When thinking of a mobile workforce people typically envision sales team “road warriors” or “Knowledge Workers” operating out of expensive cars or on planes, armed with flashy laptops, tablets and portable projectors. What we forget is that there are many remote, dispersed and mobile workers in far less glamorous or high wage roles. They remain outside the office environment for weeks or even months on end, performing what are often mission critical roles in the field, alone and with very little employer engagement.
| Monday Apr 14, 2014
You may think it's an oxymoron, but Gartner says it is possible to have a smart government. The temptation to be facetious is pretty strong here, but after initial skepticism, we found that what Gartner was talking about is 10 different technologies that can make government more efficient.
Smart governments, Gartner says, are governments that integrate information, communication and operational technologies across multiple domains, process areas and jurisdictions to generate “sustainable public value.”
By using these emerging technologies, which were identified at the recent Gartner Symposium/ITxpo in Dubai, the taxpayers should get some bigger bangs for their bucks.
| Friday Apr 4, 2014
Why fight BYOD? Employees are going to bring their spanking new mobile devices to work and use them. Instead of fighting it, smart companies are cautiously embracing BYOD for the sake of gains in productivity, flexibility and employee satisfaction. Implementing well thought out mobile device security and BYOD policies can keep up the pace of work while protecting information security. Here are a few tips that will help companies get the most out of their mobile device management (MDM) initiatives.
| Thursday Apr 3, 2014
Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.
| Monday Feb 24, 2014
It's no secret that bringing your own device to work – colloquially known as BYOD – is on the rise, with employees increasingly preferring to work on their own familiar devices than those provided by their loving employers. A Forrester study commissioned by Cisco and released last September found that employees access a variety of work-related mobile applications on their personal smartphones and tablets, including email, calendar, web browsers and company portals.
This trend has its benefits, to be sure, but there’s also a slightly sinister side to it that has companies scrambling for solutions.