Byod News & Analysis
| Wednesday Dec 31, 2014
Perhaps nothing in information technology offers a richer mix of expectation and disillusionment than the mobile enterprise. It's become like the lover who keeps promising a long-term relationship but never commits.
Since workers became enamored with smartphones eight years ago, it has seemed obvious those devices will one day connect with the applications and data within the company's fire-walled network. And that will happen. It just didn't happen in 2014.
Mobile devices and the enterprise have yet to form a happy marriage. Despite significant advances this year, hurdles remain before the mobile enterprise can achieve the kind of speed, safety and productivity that office workers have come to expect from their network.
| Monday Dec 22, 2014
Mobility has been a hot topic in the enterprise space for nearly two decades, but the times have changed since the world was dominated by Blackberry and Palm. The enterprise mobility space is now a robust, highly specialized, and rapidly responsive environment where even Microsoft allows users to edit Office files on third-party mobile applications.
Why? User experience, integration and productivity rule the market. And for IT administrators, understanding the trends that drive this ever-changing marketplace is crucial.
| Thursday Nov 6, 2014
Enterprises are using social and mobile to improve customer engagement, but not using them to improve productivity. At least that is the conclusion of new research from UK-based Advanced Business Solutions (ABS).
The findings are somewhat surprising given that the uses of enterprise social networks are largely associated with internal collaboration. But that is a myth, at least in the mid-sized enterprises segment.
| Tuesday Oct 21, 2014
Microsoft claims it has a solution to some of the most common bring your own device (BYOD) concerns: A way to spy on enterprise workers. Through its Lync app, it's giving enterprises a way to monitor what devices workers are using to communicate.
| Friday Oct 10, 2014
Security-related headaches around BYOD may make users want to BYOB.
That's what you can conclude from a new survey that shows organizations with bring your own device (BYOD) policies have twice the number of security concerns as other organizations.
“BYOD introduces a variety of potential risks from security and policy perspectives, as well as end-user privacy,” said Eugene Liderman, director of the office of the CTO at Good Technology, the company that sponsored the Mid-Market Mobility Trends Survey.
| Thursday Sep 18, 2014
Google has fulfilled every IT administrator's nightmare: It's given users of its app packages the ability to download and use new apps from its Marketplace without IT intervention.
It’s hard to know what's behind this latest move. It may be that Google is eager to offer users of its Google Apps for Work, Google Apps for Education or Google Apps for Government as much functionality as possible as quickly as s possible.
| Thursday Aug 14, 2014
Now that we've accepted the idea of the Internet of Things (IoT), researchers are starting to look at when, where, how, why and who will use it. They're also looking into potential risks.
Recent research from IDC, for example, shows that retailers are leading the charge to the IoT in the quest for better customer experiences.
According to IDC, retailers see the IoT as a way to improve customer experiences. Specifically, they are using it to pull consumers into one of their channels, where they will entice them with products that have been contextualized and personalized for the customers’ gratification.
| Tuesday Jul 8, 2014
Much has been made in the past few years about the massive business opportunities that the Internet of Things (IoT) will provide. But capitalizing on this potential is going to be a challenge.
Two recent research reports show that most enterprises are unprepared for the IoT.
Research from Infoblox showed the infrastructure to support the IoT is too weak. And research from Spiceworks found the IoT will put already overburdened networks under unbearable pressure. Combined, the studies suggest that far from being the financial cornucopia it could be, the IoT may in fact buckle enterprise infrastructure.
| Wednesday Jun 25, 2014
Find a company that does not have a bring your own device (BYOD) management strategy, and you'd need to welcome them to enterprise life in the 2010s.
We all do work on our personal smartphones.
The challenge for organizations is managing all these devices, systems, networks, operating systems, public and private cloud apps and other converging factors.
Forrester Research stresses the need for BYOD management services. It released today a Wave for Global BYOD Management Services, an analysis of 13 top BYOD integrators and specialists.
| Wednesday Jun 25, 2014
To achieve competitive advantage, large organizations today are developing mobile applications that meet three key objectives: 1) enable new mobile business processes for employees, 2) meet the growing mobile demands of customers, and 3) unlock new revenue potential within their business and with partners.
To accomplish this, organizations often need to integrate mobile apps with enterprise systems and data — collectively referred to as the backend.
Organizations that do not integrate mobile apps securely and effectively with their existing backend infrastructure will face competitors whose employees are more productive, whose customers are more satisfied and whose ecosystem fuels new business opportunities.
| Friday Jun 20, 2014
Microsoft and Google will incorporate a kill switch into the next version of Windows-based and Android smartphones. The feature, which is already featured on Apple's iPhone 5, allows users to remotely wipe all data and information on the device in the event of theft.
At a press conference yesterday, New York State Attorney General Eric Schneiderman and San Francisco District Attorney George Gascón announced they had reached agreements with both companies to include the feature in the next iteration of their respective operating systems.
| Wednesday May 21, 2014
You can’t go mobile with a desktop mindset -- but that’s just what too many IT organizations do. The most commonly applied mobile app policies are holdovers from the PC environment, like two-factor authentication and selective access based on Active Directory membership. These measures may be useful in a traditional computing setting, but they’re woefully inadequate for the new world of enterprise mobility. They fail to account for concepts like jailbroken devices, bring-your-own-device (BYOD), untrusted public networks and offline usage.
To make enterprise mobility both secure and fully productive, you need to apply new policies designed specifically for the way mobile users work today. It’s not just about introducing restrictions and roadblocks -- you also need to empower people to do even more with their mobile apps and devices to enable greater business value.
| Friday May 2, 2014
With all that has been studied, written about, developed and tweaked in the area of the social enterprise, why are some of the world's leading organizations still struggling with their social initiatives? Is there something that all of the pundits are missing?
The answer is the elephant in the room. We can discuss solutions until we’re blue in the face, but the answer lies within the evolving dynamics of work styles that we’re seeing across the board at business and enterprises.
| Monday Apr 28, 2014
What was the first thing you reached for before getting out of bed this morning? Your smartphone, right? You had to look up your calendar, latest updates on your Facebook wall and maybe peek at emails sitting in your inbox.
The explosive growth of mobile and social technology is no surprise: It is a natural evolution of how we as humans interact. Mobile and social technology has provided us with the ability to organize, and connect faster and better than ever before. It’s not just a vehicle for connecting with old friends or keeping up with the latest celebrity news, but rather a powerful tool that helps people unite, mobilize and act on a global scale. It’s been the voice of revolutions, united people across the world to bring disaster relief to the Philippines after Typhoon Haiyan, and has been responsible for placing worldwide attention to social, political and environmental issues.
| Monday Apr 21, 2014
The concept of the browser-based intranet as most people know it is a relic of the 20th century: You may as well dress it down in flannel and send it off to a Pearl Jam concert. A seldom elegant mashup of communication channels, application functionality, document collaboration and now enterprise social, the intranet at its heart is an idea from the days before mobile and BYOD that, much like the Cadillac Escalade and the British aristocracy, continues to hang on long past its expiration date. And yet it’s not going anywhere any time soon.