Get Ready for the Flood of Mobile Tech in 2011

John Storts
Slide Show

Top 10 Tech Trends to Watch in 2011 According to CIOs, CTOs

With IT Business Edge's Ann All citing reports by and Gartner that point to an increase in IT spending on mobile technology for 2011, it's a good time to develop a strategy for handling all those tablets, smartphones and other mobile devices that will be entering the business realm. In this post, I present four areas that IT managers will want to consider as mobile devices and tech increasingly become business-critical, and I provide resources for each that can assist them in having the basics covered when making them a part of day-to-day operations.


Transition and Management

As businesses and other organizations embrace mobile computing, they'll need a framework for making necessary changes while identifying and avoiding risks. Author Bhuvan Unhelkar explores the risks and advantages of mobile tech and describes a transition and management framework in our excerpt, "Managing Mobile Business," from his book "The Next Wave of Technologies: Opportunities in Chaos."



With the proliferation of iPhones, Galaxy tablets and the like, security concerns rise due to the increase of sensitive information out in the "wild." In order to reap the benefits of increased efficiency and productivity presented by these devices, security concerns must be addressed. As Tom Gillis puts it in his excerpt from "Securing the Borderless Network," putting security measures in place is the way to overcome "management's fear and IT's inflexibility" and realize these opportunities.


Application Development

Creating mobile apps extends your business reach. It seems like there's an app for nearly everything. If you are considering developing an app for your product or service, you should make sure you're familiar with your options when it comes to operating systems and platforms for running them. Check out these resources for more information on application development for:


Acceptable Use

Even if your business approves the use of mobile devices on its network, having standards, procedures and restrictions in place for users still makes good sense. Create an Acceptable Use policy that applies to any hardware and related software that could be used to access corporate resources. Using Info-Tech Research Group's Mobile Device Acceptable Use Policy Template, you can prevent security breaches that "could result in loss of information, damage to critical applications, loss of revenue and damage to the company's public image."


Be ready for the onslaught of mobile devices making their way into the workplace in 2011.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.