Premium Content

Access "Consumerisation of IT: How to strategise enterprise device management"

Clive Longbottom, Contributor Published: 13 Oct 2012

With the growing popularity of mobile communication devices and consumerisation of IT, the traditional “one-size-fits-all” enterprise device strategy is likely to fail. In this tip, business and technology expert Clive Longbottom explains why it is important now more than ever to revise your IT strategy and to develop a sound plan for managing devices. Shrinking devices; growing problems Life used to be so easy when certain computer workloads were carried out on a central device (a server) and the results of the workload were accessed through an endpoint that did very little itself (a terminal). Personal computers didn’t radically change how information was managed. Although the end-point device became intelligent and was able to store information, it remained “tethered” to a fixed position.  Then we saw the development of ever-smaller mobile devices. First, it was the luggable; then the laptop; then the rise (and fall) of personal digital assistants (PDAs); and now the evolution and rise of smartphones and tablets.  Problems introduced with those devices, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...