Mobile strategy News
June 05, 2017
Unified communications expert Paul Clarke says the technology is still far from ubiquity especially as more CIOs implement mobile-first strategies. From a unified communications perspective, the ...
March 22, 2017
Microsoft's acquisition of Xamarin forced a change in strategy within IBM, and that turned out to be a good thing for IBM's Bluemix and Mobile cloud platforms.
February 23, 2017
Consumerisation of mobile technology has had many benefits. It has driven down the prices of devices, improved the user experience to the benefit of non-technical users. Plus, awareness and ...
February 14, 2017
Mobile devices put access to IT right into the hands of people while they are out and about performing their work tasks. For many this is not just about 'being in touch' or getting access to useful ...
Mobile strategy Get Started
Bring yourself up to speed with our introductory content
Forrester analysts interviewed 40 digital business leaders about their paths to mobile digital transformation. The verdict: It's not an easy road. Continue Reading
MBaaS platforms offer developers an easier way to utilize mobile application development resources. Find out how to put it all together with this guide. Continue Reading
Legal concerns can hinder the mobility strategy of companies, but designing compliance into the front end of mobile technology development will keep both regulators and CIOs satisfied. Continue Reading
Evaluate Mobile strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The shift toward edge computing is happening in organizations everywhere, and mobility is at the center of the evolution. IT shops can take advantage of life on the edge. Continue Reading
Radiology and medical imaging are being transformed by new, more client-centered and mobile approaches and technologies as healthcare moves outside the hospital. Continue Reading
Vendors keep hammering the mobile HR message, but organizations are slow to buy into the pitch. One major reason is HR's failure to serve the biggest user base: employees. Continue Reading
Manage Mobile strategy
Learn to apply best practices and optimize your operations.
IT admins can get overwhelmed or undermined when it comes to the emerging mobile technology arriving in businesses. To stay on top of trends, it's crucial to plan ahead. Continue Reading
Many companies lack the right policies or tools necessary to implement a successful enterprise mobility strategy. Find out what your mobile initiative might be missing. Continue Reading
Many companies face obstacles in trying to go mobile, but not every mobile initiative has to be treacherous. IT can take steps to avoid making common strategy mistakes. Continue Reading
Problem Solve Mobile strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Developers have traditionally been required to write new checkpointing for individual programs. Professor Gene Cooperman explains how transparent checkpointing will change that. Continue Reading
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks. Continue Reading
CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.
Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.
Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.Continue Reading