With IT Business Edge's Ann All citing reports by CIO.com and Gartner that point to an increase in IT spending on mobile technology for 2011, it's a good time to develop a strategy for handling all those tablets, smartphones and other mobile devices that will be entering the business realm. In this post, I present four areas that IT managers will want to consider as mobile devices and tech increasingly become business-critical, and I provide resources for each that can assist them in having the basics covered when making them a part of day-to-day operations.
Transition and Management
As businesses and other organizations embrace mobile computing, they'll need a framework for making necessary changes while identifying and avoiding risks. Author Bhuvan Unhelkar explores the risks and advantages of mobile tech and describes a transition and management framework in our excerpt, "Managing Mobile Business," from his book "The Next Wave of Technologies: Opportunities in Chaos."
With the proliferation of iPhones, Galaxy tablets and the like, security concerns rise due to the increase of sensitive information out in the "wild." In order to reap the benefits of increased efficiency and productivity presented by these devices, security concerns must be addressed. As Tom Gillis puts it in his excerpt from "Securing the Borderless Network," putting security measures in place is the way to overcome "management's fear and IT's inflexibility" and realize these opportunities.
Creating mobile apps extends your business reach. It seems like there's an app for nearly everything. If you are considering developing an app for your product or service, you should make sure you're familiar with your options when it comes to operating systems and platforms for running them. Check out these resources for more information on application development for:
Even if your business approves the use of mobile devices on its network, having standards, procedures and restrictions in place for users still makes good sense. Create an Acceptable Use policy that applies to any hardware and related software that could be used to access corporate resources. Using Info-Tech Research Group's Mobile Device Acceptable Use Policy Template, you can prevent security breaches that "could result in loss of information, damage to critical applications, loss of revenue and damage to the company's public image."
Be ready for the onslaught of mobile devices making their way into the workplace in 2011.