1,175 KB | 3 files | DOC, PDF
Author Bhuvan Unhelkar's "Managing Mobile Business" chapter from "The Next Wave of Technologies: Opportunities in Chaos" presents mobile technologies in a business context and describes a mobile enterprise transition and management (METM) framework.
Mobile technologies have revolutionized the way many organizations operate. Mobility provides two crucial advantages to organizations: location independence and personalization. The past decade has seen the rapid development of the Internet, the advent of cloud computing and lower costs for mobile hardware and services. As a result, mobile technology has become a viable -- and some would say essential — way to do business. Hugely successful organizations such as Apple Computer have been able to fundamentally alter the user experience, forcing other organizations to change the way they conduct business, interact with key constituents and collaborate with one other.
Author Bhuvan Unhelkar's "Managing Mobile Business" chapter from "The Next Wave of Technologies: Opportunities in Chaos" presents mobile technologies in a business context and describes a mobile enterprise transition and management (METM) framework. Mobile technology adoption risks and advantages are discussed with an eye on how organizations can avoid or lessen these risks.
This excerpt was reprinted with permission of John Wiley & Sons, Inc. Phil Simon (ed.), The Next Wave of Technologies: Opportunities in Chaos, 2010.
The attached Zip file includes:
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing and how technology is enabling this transition. ... More >>
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. ... More >>
The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities. ... More >>