Articles
You may think it's an oxymoron, but Gartner says it is possible to have a smart government. The temptation to be facetious is pretty strong here, but after initial skepticism, we found that what Gartner was talking about is 10 different technologies that can make government more efficient. Smart
Continue reading...
Don't Take a Blanket Approach One of the bigger threats of information breaches and data leaks is employees using cloud storage applications like Dropbox that can lead to uncontrolled mixing and sharing of personal data and corporate data.
Continue reading...
Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.
Continue reading...
It's no secret that bringing your own device to work – colloquially known as BYOD – is on the rise, with employees increasingly preferring to work on their own familiar devices than those provided by their loving employers.
Continue reading...
Now that we have reached critical mass in adoption of mobile-friendly internet access technologies like smart phones and tablets, we have to adapt our way of operating. This goes beyond the typical BYOD discussion of how to secure a network, how to control data that is shared across multiple
Continue reading...
Security, infrastructure intelligence and data analytics will be among the hottest business technology trends of 2014, according to a research paper commissioned by UK IT services firm Advanced 365. The paper, written by technology analyst David Smith, chief executive, Global Futures and Foresight with Advanced 365, identifies the most
Continue reading...
Ahead of today's Apple earnings announcement — whatever the sales for last year's models — all the gossip is about company's "plans" for larger iPhone and iPad devices, as its enterprise and worker battle with Android and Windows Phones heats up.
Continue reading...
If you are reading this article, you are likely both a perpetrator and victim of rogue IT. To paraphrase Jeff Foxworthy, “If you shared a company document with a colleague using a publicly-available document sharing service, you might just be rogue IT.
Continue reading...
Every year brings plenty of hype around the promise of what new technical advancements and capabilities can bring to organizations trying to transform their businesses. There are also plenty of things that never quite live up to the promised hype. Let’s take a look at what to expect in 2014.
Continue reading...
The good news about the bring your own device (BYOD) trend is that it enables employees to do company work anytime, anywhere. The bad news: we’ve only started to understand the impact and size of this wave which, as it turns out, is not just about mobile devices.
Continue reading...
Whether it’s concerns over privacy on Facebook and Google, Adobe’s leak of data for nearly 150 million customers, or most notably, the NSA/Edward Snowden scandal, privacy concerns have been nightly news this year.
Continue reading...
2013 was a banner year for enterprise mobility. In case you weren't keeping track or had an actual day job that kept you away from the day-to-day changes in mobility, here's a look at what you missed. 2013 Enterprise Mobility in Review Samsung overtook Apple as the market leader in smartphones and is currently the key driver for mobile device innovation on a global basis The iPhone is quickly transitioning from an innovative
Continue reading...
Your email is blowing up. Your phone is buzzing. You are not even done with your commute and you've already lined up two conference calls, a chat session and a cooperative exchange of Google Docs.
Continue reading...
IBM is aggressively expanding its mobile management capabilities with the announcement last night that it is buying Fiberlink Communications. The acquisition will enable it offer clients the ability to develop secure Bring Your Own Device (BYOD) strategies through IBM’s MobileFirst applications.
Continue reading...