Access "Consumerisation of IT: How to strategise enterprise device management"
This article is part of the May 2012 issue of NAC technology evolves in a BYOD policy world
With the growing popularity of mobile communication devices and consumerisation of IT, the traditional “one-size-fits-all” enterprise device strategy is likely to fail. In this tip, business and technology expert Clive Longbottom explains why it is important now more than ever to revise your IT strategy and to develop a sound plan for managing devices. Shrinking devices; growing problems Life used to be so easy when certain computer workloads were carried out on a central device (a server) and the results of the workload were accessed through an endpoint that did very little itself (a terminal). Personal computers didn’t radically change how information was managed. Although the end-point device became intelligent and was able to store information, it remained “tethered” to a fixed position. Then we saw the development of ever-smaller mobile devices. First, it was the luggable; then the laptop; then the rise (and fall) of personal digital assistants (PDAs); and now the evolution and rise of smartphones and tablets. Problems introduced with those devices, ... Access >>>
Premium Content for Free.
Consumerisation of IT: How to strategise enterprise device management
by Clive Longbottom, Contributor
Amid the rising consumerisation of IT, the traditional “one-size-fits-all” strategy can fail. IT must develop an open approach to consumerisation of devices and use VDI.
- Consumerisation of IT: How to strategise enterprise device management by Clive Longbottom, Contributor
Taking control of smartphone proliferation while avoiding user anarchy
by Ron Condon, UK Bureau Chief
With smartphone proliferation raging through companies, IT teams are turning to MDMs to keep corporate data safe. Are current MDMs up to the task?
European river managers delve into new knowledge management system
by Brian McKenna, News and Site Editor
The UK’s Environment Agency has procured a semantic wiki based knowledge management (KM) system to aid river restoration across Europe.
- Taking control of smartphone proliferation while avoiding user anarchy by Ron Condon, UK Bureau Chief
More Premium Content Accessible For Free
In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...
Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...