Posts

Showing posts from August, 2014

Tips for Managing the Onslaught of Mobility at Enterprises

Enterprise mobility is a tsunami that is about to take over IT in the not too distance future if not already arriving at the shore as we speak. In fact, 2014 has been predicted to be the year of great changes in enterprise mobility . Nothing underscores this assertion more than the recent  Apple-IBM pact to initiate joint efforts and bring about fundamental changes in the way of enterprises approach mobility. So what can IT do to better prepare for this sea change? Here are a few tips: Don't Look at enterprise mobility in isolation:  Many mobility endeavors today focus on delivering device-centric apps. This misses the bigger picture of the interconnectedness mobility and building integrated solutions that involve large-scale technology initiatives of cloud, big data analytics and social networks. Mobility is a strategic initiative: Mobile initiatives spans all lines of business and potentially impact every aspect of the business operation. An overall enterprise mobile str

IBM's Internal BYOD Implementation is Exemplary

In mobility, Bring Your Own Device (BYOD) presents a pressing challenge for enterprises today. Employees want to use corporate and personal apps within the same mobile device regardless of whether the device belongs to them or is issued by their employers. Having the corporate and personal apps cohabitate within the same smartphone or tablet presents significant security issues as personal apps downloaded from the app store may be malicious and sensitive work-related information may be breached as a result. A prime example of this are the emails with file attachments that contain confidential company information. Once you synchronize your mobile device with the company's email server, another app that you may have unwittingly downloaded from the app store may attempt to hijack your sensitive data and upload it to another nondescript server. As you can imagine, enterprises do not look lightly on this threat which may result in violation of their intellectual property. The key