Articles

Tag: byod (page 2)

  • How the Internet of Things Drives Customer Engagement

    How the Internet of Things Drives Customer Engagement

    Now that we've accepted the idea of the Internet of Things (IoT), researchers are starting to look at when, where, how, why and who will use it. They're also looking into potential risks.

    Continue reading...


  • Businesses are Unprepared for the Internet of Things

    Businesses are Unprepared for the Internet of Things

    Much has been made in the past few years about the massive business opportunities that the Internet of Things (IoT) will provide. But capitalizing on this potential is going to be a challenge.  Two recent research reports show that most enterprises are unprepared for the IoT.

    Continue reading...


  • Who Has the Best BYOD Management Services

    Who Has the Best BYOD Management Services?

    Find a company that does not have a bring your own device (BYOD) management strategy, and you'd need to welcome them to enterprise life in the 2010s. We all do work on our personal smartphones.

    Continue reading...


  • The Enterprise Mobility Showdown

    To achieve competitive advantage, large organizations today are developing mobile applications that meet three key objectives: 1) enable new mobile business processes for employees, 2) meet the growing mobile demands of customers, and 3) unlock new revenue potential within their business and with partners.

    Continue reading...


  • Microsoft, Google Yield to Pressure to Improve Phone Security

    Microsoft and Google will incorporate a kill switch into the next version of Windows-based and Android smartphones. The feature, which is already featured on Apple's iPhone 5, allows users to remotely wipe all data and information on the device in the event of theft.

    Continue reading...


  • 5 Mobile App Policies You Need

    You can’t go mobile with a desktop mindset -- but that’s just what too many IT organizations do. The most commonly applied mobile app policies are holdovers from the PC environment, like two-factor authentication and selective access based on Active Directory membership.

    Continue reading...


  • The Elephant in the Room: Evolving Work Styles

    With all that has been studied, written about, developed and tweaked in the area of the social enterprise, why are some of the world's leading organizations still struggling with their social initiatives? Is there something that all of the pundits are missing? The answer is the elephant in the room.

    Continue reading...


  • 5 Steps to Effectively Manage Your Mobile Social Workforce

    5 Steps to Effectively Manage Your Mobile, Social Workforce

    The explosive growth of mobile and social technology is no surprise: It is a natural evolution of how we as humans interact. Mobile and social technology has provided us with the ability to organize, and connect faster and better than ever before.

    Continue reading...


  • How Mobile Apps Will Change Corporate Intranets

    How Mobile Apps Will Change Corporate Intranets

    Why, in the face of mobile apps and the still burgeoning smartphone culture, do companies continue to spend millions of dollars every year re-platforming, re-designing and upgrading their intranets? It’s a simple question with a simple answer: Like the gas-guzzling Escalade and the distinctly undemocratic House of Lords, a sizable

    Continue reading...


  • Were Still Playing at Work and IT Admins are Still Unhappy

    We're Still Playing at Work - and IT Admins are Still Unhappy

    Knock me over with a feather: A new survey shows a lot of people waste time at the office doing all sorts of things they shouldn't … including playing games, browsing social networks and looking for new jobs.  Last month, TeamViewer, a provider of remote control and online meeting

    Continue reading...


  • BYOD Helps Rediscover the Forgotten Workforce

    BYOD Helps Rediscover the Forgotten Workforce

    When thinking of a mobile workforce people typically envision sales team “road warriors” or “Knowledge Workers” operating out of expensive cars or on planes, armed with flashy laptops, tablets and portable projectors.

    Continue reading...


  • Gartners 10 Technologies That Make Government Smarter

    Gartner's 10 Technologies That Make Government Smarter

    You may think it's an oxymoron, but Gartner says it is possible to have a smart government. The temptation to be facetious is pretty strong here, but after initial skepticism, we found that what Gartner was talking about is 10 different technologies that can make government more efficient. Smart

    Continue reading...


  • Dont Fight BYOD Manage It

    Don't Fight BYOD, Manage It

    Don't Take a Blanket Approach One of the bigger threats of information breaches and data leaks is employees using cloud storage applications like Dropbox that can lead to uncontrolled mixing and sharing of personal data and corporate data.

    Continue reading...


  • BYOD: Mixing Work and Play While Minimizing Risk

    Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.

    Continue reading...


Displaying 15-28 of 127