HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Mobile News & Analysis

10 Years in Cyberspace Security

2015-03-March-Secure.jpg

Ten years ago, I wrote a paper on the future of cyberspace. In it, I pointed to three areas that we needed to address to make cyberspace safe for information sharing: establishing strong cyber-trust, enabling secure mobility and striking a balance between security and privacy rights.

So much has changed since then. Or has it?

What You've Been Missing: A Standard for Enterprise Apps

2015-3-March-workers-with-phones.jpg

If you’ve ever tried to set up Box, Workday, Oracle, SAP or one of many other Enterprise apps on an Enterprise Mobility Managed (EMM) device, you know it’s not fun.

In fact, chances are good you’ve downloaded a handful of apps you’ve never used — just because you couldn’t properly configure them.

“Public apps often get stuck on the device,” said Kabir Barday, lead product manager, application development at AirWatch by VMware.

Would-be users frequently become frustrated entering user names, passwords, server URLs and ports. Sometimes it’s cumbersome. Other times, they don’t have easy access to the required information.

The result? Error messages like “App can’t be displayed." But that’s not the biggest difficulty. The real problem is the loss of productivity.

Cool Stuff You're Missing at Mobile World Congress #MWC15

So what if it’s a little cloudy in Barcelona, Spain today. The high is 76 degrees Fahrenheit. Those of us who live in the US Northeast would certainly enjoy the reprieve from the snow and the cold.

But the weather isn’t the reason that we’d be near the shores of the Mediterranean today. The Mobile World Congress is the draw.

It’s the event where vendors like Samsung are unveiling iPhone rivals, where Microsoft is revealing its revamped mobile play and IBM is showing off the spawn of its marriage to Apple … and so much more.

HP Admits Defeat, Acquires Competitor Aruba Networks

HP today announced its intention to purchase Aruba Networks, its key competitor in the emerging field of wireless network manageability for smaller businesses, in an all-cash transaction deal valued at $3 billion in equity. The move brings easily the most innovative system for self-provisioning of wireless networks by non-professionals under the HP banner.

HP’s statement that the deal would provide it with tools that “complement” its existing product line, is a tacit admission that its 2014 effort to achieve parity with Aruba in this field was not all that successful.

OpenText Digs into Analytics with B2B Network Integration

OpenText will be focusing a lot on analytics in the next few months, according to recent comments company Mark Barrenechea made in connection with the Actuate acquisition.

Last night, the Waterloo, Ontario-based software company lived up to that promise by announcing that it was adding analytics to its B2B integration network, Trading Grid. According to a statement from OpenText, the new analytics are for companies that are looking for deeper insight into their business processes and the ability to tweak those process with data rather than guesswork.

FCC Orders Title II Reclassification of Broadband Internet

By a 3-2 vote Thursday, the Federal Communications Commission has begun proceedings to adopt a new set of rules designed to give regulators greater authority in mandating how broadband Internet services can be classified and delivered by service providers.

“There are three simple keys to our broadband future,” said FCC Chairman Tom Wheeler in a public statement Thursday [PDF]. “Broadband networks must be fast. Broadband networks must be fair. Broadband networks must be open.”

Democrats on the Commission voted to follow President Obama’s suggestions on the net neutrality issue last November. On a party line vote, the FCC is ordering that broadband Internet service will be treated as a telecommunications service rather than an information service, as the law presently defines those terms.

That change in classification would, at least theoretically, permit the FCC to enforce mandates on how ISPs deliver broadband Internet service to their customers, as well as what measures ISPs will not be allowed to take to manage that service.

Under the terms of the Telecommunications Act of 1934, as amended in 1996, the FCC’s authority to determine so-called common carrier requirements only apply to telecommunications services such as long distance telephone.

After the FCC ordered Verizon to stop using unreasonable network management techniques deemed unfair to customers, a federal appeals court ruled in January 2014 that it could not apply Title II regulations to what the FCC had already classified a Title I service.

Legal Professionals Struggle With Poor Document Management

2015 2 26 legal document management 2.jpg

New research from Workshare claims the legal industry is plagued by a greater than average share of document mismanagement and chaos.

The survey, based on responses from 220 legal professionals, shows that 78 percent are struggling to meet targets in spite of document and content management strategies to improve efficiencies.

The New Age of Intranets: Publishing and Content

2015-26-February-Climb.jpg

The evolution of intranets is happening even as you read this. Last month we took a look at the role planning and corporate communications play in this New Age of Intranets. Today we'll tackle content.

One of the great hassles with intranets is managing and updating content. It can kill what is an otherwise successful intranet. During the planning phase, clients will propose dozens of great ideas of what types of content to be shared. The hard part comes in with obtaining that content -- creating it, approving it, getting it posted -- on a regular basis.

Publishing is critical to the ongoing success of an intranet. When employees consistently see good, valuable and recent content, your site becomes sticky and you will achieve a better return on your intranet investment. Let's take a look at what this requires.

Google Acquires Facebook Marketing Firm Toro

Google is back on the acquisition trail. Late last night it announced it had bought Toro, a startup that enables developers to market their apps on Facebook.

Originally known as Red Hot Labs, it was created by Amitt Mahajan and Joel Poloney, who had previously co-founded a MyMiniLife, a virtual world which users to create their own spaces and homes.

Microsoft Boots Google and Facebook in Favor of Skype

Microsoft is pushing Google Chat and Facebook Chat out of Outlook.com. Not surprisingly, it is urging those that need a chat application in Outlook.com to look to its own option, Skype.

In a statement emailed to Outlook.com users this morning, Microsoft explained that it had made the decision because of Google’s decision to discontinue using the the chat protocol XMPP.

AirWatch by VMware Shakes Up Enterprise Mobility Management

2015-24-february-shake-it-up.jpg

When VMware spent $1.54 billion to acquire Enterprise Mobility Management (EMM) startup AirWatch last year, it raised plenty of eyebrows.

Some saw it as an act of desperation: VMware didn’t have a strong mobile play at a time when personal computers were becoming less and less of an endpoint.

Others saw it as brilliant: AirWatch understood something that many of its competitors did not — namely that “your smart phone or tablet is your computer” and that companies would need to go beyond safeguarding email and file sharing to protecting application data in transit as well.

As with any acquisition, there was also the question of integration. Would Palo Alto, Calif.-based VMware wreck everything that worked about Atlanta, Ga.-based AirWatch?

That doesn’t seem to have happened, especially in the wake of today's release of AirWatch8.

Do Enterprises Need a Secure Texting App?

Texting apps like WhatsApp, SnapChat and Viber are all the rage in the consumer space. But what about texting apps for the enterprise?

With more companies embracing bring your own device (BYOD), it's logical to assume there's a need for a secure enterprise texting solution. As Shaun Smith, technology practice director at Xceed Group, noted, that BYOD has its benefits — as long as companies conduct due diligence and weigh those benefits against the possible risks.

Enter ArmorText, a Reston, Va.-based company that's developing a secure messaging client for the enterprise, targeted specifically at those in regulated markets. The company has already raised nearly $2 million in outside funding.

ArmorText is positioning itself as the answer to BYOD security concerns: It claims its products and services will make BYOD the rule in the workplace rather than the exception.

6 Reasons Hackers Love the Internet of Things

2015-13-february-hackers.jpg

Haven't jumped on the Internet of Things (IoT) because of security concerns? New research from HP Fortify shows there's reason for caution.

HP Fortify researchers reviewed ten IoT-connected home security systems and found all of them are vulnerable to account harvesting via the cloud connection or interface.

But that’s not all. They also found all systems could work with weak security passwords, all of them were lacking an account lock-out mechanism, 90 percent didn’t have a two-factor authentication option and 70 percent had problems with systems updates.

Is Your Business Capitalizing On This $1T E-Commerce Market?

2015-10-february-Chinese-woman-using-cell-phone.jpg

With a population of about 1.3 billion and an emerging middle class, China is the largest market in the world.

In the past few decades, it has emerged as a global economic powerhouse. In fact, its population may be the very reason why China alone will exceed $1 trillion in retail e-commerce sales in 2018. By comparison, global e-commerce sales in 2014 totaled about $1.3 trillion — and by 2018, United States retail e-commerce sales will only be around $500 billion.

Although Internet access in China is reported as widely censored and monitored by the state, 645 million people in China regularly access the Internet. The US has approximately 253 million users, India has 215.6 million and Brazil has 107.7 million, making China far and away also the largest e-commerce market in the world.

So what is your business doing about it?

Putting the Context in Mobile Content and E-Commerce

2015-09-February-Tiger-Smile.jpg

Mobile is a lifestyle, not a channel. So the value of mobile devices emerges most strongly when you engage users in the context of their day-to-day activities. Developing an ongoing relationship with consumers means serving them when they have a specific need, as opposed to pushing content and offers out to them.

This requires a fundamental shift in marketer's mindsets. They know they have to understand user's needs and contexts in order to serve up appropriate content. The challenge lies in integrating content marketing into merchandizing and brand management functions.

Displaying 1-15 of 3001 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >