Enterprise mobility: How to choose the right strategy
Finding the ideal alignment and balance between hardware, software and employee preference has become the Holy Grail for those tasked with defining enterprise mobility strategy. BYOD delivered many great things, such as higher employee productivity and satisfaction. It also made IT managers rethink their strategies to make technology work for their organization in terms of mobility, security and management. Then COPE (corporate owned, personally enabled) came along, which promised to solve some of the problems that BYOD didn't, such as security. However, COPE also posed challenges of its own and is being followed now by CYOD (choose your own device).
With so many acronyms flying about, it might appear hard to know where to start identifying the best solution. However it would seem that 2014 has heralded the end for BYOD, with a recent report by analyst firm Gartner declaring its demise, stating, "There is no way for IT to assume full responsibility of securing and managing devices without ownership". Indeed, the acronym is now being translated by some as "bring your own disaster", suggesting it would perhaps be wise to learn from others' mistakes.
China takes on Windows, Android with new homegrown operating systems
China really is serious about shrugging off the shackles of Windows and other Western operating systems, as the country is apparently developing its own OS which is free from the security misgivings the government has about foreign software.
According to the Xinhua news agency (via Reuters), the Chinese government is looking to boost its domestic software industry and develop alternatives firstly for desktop operating systems (namely Windows), and then it will follow those footsteps in the mobile world with an Android usurper (or that's the theory). This is according to a certain Ni Guangnan, head of an "official OS development alliance" which was put together back in the spring.
Google Drive for Work sees strong enterprise adoption
Google’s Drive for Work storage product is seeing 1,800 new businesses sign up every week as enterprises continue to come around to the secure storage and collaboration option that it offers.
A blog post by Scott Johnston, director of product management at Google Drive, explained that the $10 (£6) per user per month package has been popular across a number of industries since it was launched just two months ago.
Most people don't know the Internet of Things is actually a thing
A recent report has suggested that the biggest barrier to the Internet of Things (IoT) is that a large proportion of consumers have never even heard of the term.
According to a survey by The Acquity Group, titled "The Internet of Things: The Future of Consumer Adoption", 87 percent of respondents had not heard of the Internet of Things prior to the questionnaire.
Malicious email barrage hits European car rental companies
Automobile companies are being targeted by a new malware threat that is spreading like wildfire across Europe and stealing a wealth of sensitive information.
Symantec reports that the spam campaign, known as Infostealer.Retgate or Carbon Grabber, is aggressively targeting automobile companies with malware that steals encrypted information such as user names and passwords.
5 tips to make your browsing safe and secure
The internet has become as ubiquitous as air. You’re connected at home via Wi-Fi, then you go out and stop by a cafe to grab a quick morning coffee and check your Facebook, then you come to the office, get all serious and send business mail to your colleagues. The internet gives us great freedom. But with that freedom comes great dangers and great responsibility -- you are responsible for protecting yourself on the web.
Every time you indulge into any sort of online activity, your data can be easily monitored and checked. The websites you visit receive your IP address, location, browser and operating system, screen resolution, ISP and more. You can check on what information you give away at stayinvisible.com. I have nothing against sharing this data when I do simple browsing. I am like Dutch windows without curtains -- doing nothing wrong, peep in whenever you want, I have nothing to hide.
Lenovo Yoga 2: A decent budget hybrid [Review]
The Lenovo Yoga 2 is not to be confused with the Yoga 2 Pro. Although the basic principle of a notebook with a screen that flips over to turn the device into tablet is the same, the specification is markedly different. Just for starters, this is an 11.6in device rather than 13.3in -- but what's inside is much more value-oriented as well.
Instead of a processor from Intel's Core range, our Yoga 2 sample came with a Pentium N3520. This is part of Intel's Silvermount microarchitecture generation, in particular the Bay Trail-M family, which means it's actually from the same line as the Atom processor, despite the Pentium brand name. The N3520 has a nominal frequency of 2.166GHz, but a single core can rise to 2.42GHz in Turbo mode.
How to secure commercial online file sharing
Cloud-based file-sharing services benefit all types of businesses by providing easy, convenient access to information anytime, anywhere. With technology increasingly blurring the lines between work and personal lives -- often with the same platform being used in both worlds -- it can be easy to forget that work-related information often needs to be handled with greater care and a higher level of security.
If employees use personal accounts and free services designed for consumer use, in order to manage clients' documents, they could be putting your business at high risk for a security breach. This will become ever more important as the regulations around management of sensitive and private information get stronger and enforced more strictly. However, there are several simple steps companies can take to tackle these issues and keep business information protected.
Nearly 70 percent of homes will have an Internet of Things device by 2019
Acquity Group (part of Accenture Interactive) has just released the findings of its 2014 State of the Internet of Things Study, and the headline fact is that the firm estimates 69 percent of consumers will own an in-home IoT (Internet of Things) device come the year 2019.
Looking nearer to hand, by the end of 2015, 13 percent of consumers (2,000 US consumers were surveyed, incidentally) will have at least one IoT device in their home, such as a thermostat from the likes of Nest, or home security camera. Only 4 percent own a device like this right now, so that's a tripling up of ownership by the end of next year.
Software-defined networking on the edge
Software-defined networking (SDN) enabling the wireless LAN (WLAN) can help deliver a consistently high performance of critical business applications and simplify unified management of wired and wireless networks. However, to do this effectively, WLAN vendors need to provide solutions that offer immediate benefits to the IT department without any additional training or a "rip-and-replace" of existing controllers and access points.
It also means that these solutions must truly embrace the open architecture approach to SDN enabled by OpenFlow and advocated by communities and industry organizations like the Open Networking Forum and Project Open Daylight.
Gartner: 3D printing still a decade away for most consumers
Gartner says that 3D printers will be used to print medical devices in just two to five years. According to Pete Basiliere, research vice president at Gartner, in the next half decade "3D printing of medical devices will offer exciting, life-altering benefits that will result in global use of 3D printing technology for prosthetics and implants".
However it could be a decade before consumer level 3D printing reaches the mainstream. Basiliere continued, "over 200 startups worldwide are developing and selling consumer-oriented 3D printers, priced from just a few hundred dollars. However, even this price is too high for mainstream consumers at this time".
Samsung launches the Level Box mini wireless speaker
Samsung has a new option for music fans with the addition of the Light Box mini to its line of Level premium audio products that doubles up as a microphone when calls are received.
The new speaker is 30 percent slimmer than its predecessor, the Light Box, and despite this it still provides the same high level of sound that is expected from Samsung’s Level products.
SanDisk releases Ultra II SSD with enhanced SSD Dashboard
SanDisk has announced a new SSD solution with a range of capacities from 120GB upwards, and an enhanced SSD Dashboard.
The SanDisk Ultra II SSD, which is based on X3 NAND Flash technology, offers claimed sequential read speeds of up to 550MB/s and write speeds of up to 500MB/s. SanDisk has also incorporated nCache 2.0 tech which is a two-tiered caching architecture that helps on performance and endurance fronts. The Ultra II SSD is also shock resistant.
US states with faster internet access have smarter people
Despite several doomsday claims that the internet is breeding a generation of morons, new analysis suggests the opposite may be true.
We gathered the 2013 average ACT scores for each state from act.org and compared them with the 2013 internet speed data from Akamai that was highlighted in a recent Broadview article. We found a correlation of .57. This strong correlation shows that students from states with faster internet speeds have higher ACT scores on average.
Is legacy IT paralyzing your organization?
There is no doubt that technology is an integral part of helping businesses reach the top of their industry. Ironically, the IT department can be a barrier to innovation and technological change. This is as a result of being indentured to legacy IT, which is having a huge impact on the ability to keep up with consumer and market demand.
Budgetary limitations and the sheer challenge of upgrading or replacing an aging system are often behind the reluctance to embrace change. If properly planned and approached, businesses can mitigate the perceived risks and issues and reap the benefits from better use of today's technology.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.