Premium Content

Access "Consumerisation of IT: How to strategise enterprise device management"

Clive Longbottom, Contributor Published: 13 Oct 2012

With the growing popularity of mobile communication devices and consumerisation of IT, the traditional “one-size-fits-all” enterprise device strategy is likely to fail. In this tip, business and technology expert Clive Longbottom explains why it is important now more than ever to revise your IT strategy and to develop a sound plan for managing devices. Shrinking devices; growing problems Life used to be so easy when certain computer workloads were carried out on a central device (a server) and the results of the workload were accessed through an endpoint that did very little itself (a terminal). Personal computers didn’t radically change how information was managed. Although the end-point device became intelligent and was able to store information, it remained “tethered” to a fixed position.  Then we saw the development of ever-smaller mobile devices. First, it was the luggable; then the laptop; then the rise (and fall) of personal digital assistants (PDAs); and now the evolution and rise of smartphones and tablets.  Problems introduced with those devices, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Open Trusted Technology Provider Standard (O-TTPS)
    Open-Trusted-Technology-Provider-Standard-(O-TTPS)-(1365609248_609).jpg
    E-Handbook

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global ...

  • The identity perimeter
    The-identity-perimeter-(1365173761_823).jpg
    E-Handbook

    Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the ...

  • Enabling the secure use of RFID
    Enabling-the-secure-use-of-RFID-(1364996037_361).jpg
    E-Handbook

    UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients....