Access "Consumerisation of IT: How to strategise enterprise device management"
This article is part of the May 2012 issue of NAC technology evolves in a BYOD policy world
With the growing popularity of mobile communication devices and consumerisation of IT, the traditional “one-size-fits-all” enterprise device strategy is likely to fail. In this tip, business and technology expert Clive Longbottom explains why it is important now more than ever to revise your IT strategy and to develop a sound plan for managing devices. Shrinking devices; growing problems Life used to be so easy when certain computer workloads were carried out on a central device (a server) and the results of the workload were accessed through an endpoint that did very little itself (a terminal). Personal computers didn’t radically change how information was managed. Although the end-point device became intelligent and was able to store information, it remained “tethered” to a fixed position. Then we saw the development of ever-smaller mobile devices. First, it was the luggable; then the laptop; then the rise (and fall) of personal digital assistants (PDAs); and now the evolution and rise of smartphones and tablets. Problems introduced with those devices, ... Access >>>
Premium Content for Free.
Consumerisation of IT: How to strategise enterprise device management
by Clive Longbottom, Contributor
Amid the rising consumerisation of IT, the traditional “one-size-fits-all” strategy can fail. IT must develop an open approach to consumerisation of devices and use VDI.
- Consumerisation of IT: How to strategise enterprise device management by Clive Longbottom, Contributor
Taking control of smartphone proliferation while avoiding user anarchy
by Ron Condon, UK Bureau Chief
With smartphone proliferation raging through companies, IT teams are turning to MDMs to keep corporate data safe. Are current MDMs up to the task?
European river managers delve into new knowledge management system
by Brian McKenna, News and Site Editor
The UK’s Environment Agency has procured a semantic wiki based knowledge management (KM) system to aid river restoration across Europe.
- Taking control of smartphone proliferation while avoiding user anarchy by Ron Condon, UK Bureau Chief
More Premium Content Accessible For Free
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at ...
FT sold on cloud benefits
In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further ...
The Global Risk Report 2015
Large-scale cyber attacks are among the prominent risks in 2015 in the 10th Global Risks report from the World Economic Forum.