Category Archives: Articles

Five Critical Steps to Performing a Telecom Audit

Thursday, July 10, 2014

So you’ve been tasked with performing a telecom audit for your company. It can be done manually, which is long. tedious process.  Based on our experience, we recommend that you use some sort of Telecom Expense Management software to help you create files that self-reconcile so that your audits aren’t static – that information gathered from one audit informs the next.  This can be outsourced quite easily, and the results analyzed by professionals who are trained to catch carrier errors. However, you may wish to perform your own audit, and you should be applauded for it – often telecom Audits (Assessments) uncover multiple billing errors, enabling you to reduce and recover costs right at the bottom line. The question is, where to … Continue reading »

Five Common Telecom Billing Errors

Wednesday, June 18, 2014

At Avema Corporation, we offer a Telecom Billing Assessment (Audit) for every new potential customer.  Through our experience dealing with a wide variety of companies, we have discovered many ways that organizations are overcharged for their telecom services.  To help you identify the areas that you are overspending, we’ve compiled the major errors into five categories that you can view on your next bill (or bills). Here they are: Non-Recurring Errors Non-Recurring Errors are fairly easy to spot but rely on strong internal communications and processes inside your company. We suggest incorporating a MACD (Move, Add, Change, Delete) process step that involves notifying your finance or Internal Audit team – that way most of the errors can be found and … Continue reading »

Even IBM Is Struggling With BYOD

Wednesday, May 30, 2012

“The trend toward employee-owned devices isn’t saving IBM any money, says Jeanette Horan, who is IBM’s chief information officer and oversees all the company’s internal use of IT. Instead, she says, it has created new challenges for her department of 5,000 people, because employees’ devices are full of software that IBM doesn’t control.” IBM has had a BYOD program since 2010, and out of about 400,000 employees, they’re using 40,000 Blackberrys, and 80,000 other smartphones and tablets, some of them employee owned. Some advantages that IBM has that you (probably) don’t: Technology as core competency of the company Internal tools – they sell their own MDM software and have their own cloud storage application, MyMobileHub Scale IBM is one … Continue reading »

5 Overlooked BYOD Mistakes to Avoid

Monday, March 12, 2012

Article published in CIO Update: Businesses of all shapes and sizes are struggling with the bring your own device (BYOD) phenomena. On one hand, BYOD is a boon. Employees get the devices they like. Often they pay for them out of their own pockets, and productivity goes up. On the other hand, support costs can also go up, bandwidth may become saturated and, if policies aren’t crafted well, employees can end up feeling cheated by their employers. Creating a workable BYOD policy isn’t rocket science, but it is a delicate balancing act. Get it right, and you’ll boost both productivity and employee morale. Get it wrong, and you’ll need to start worrying about both security risks and increasingly disgruntled workers. … Continue reading »

Should your company have a Chief Mobile Officer?

Friday, February 17, 2012

  Computerworld recently published this article, Chief Mobile Officer: A job title now timely? “…as enterprises scramble these days to establish mobile strategies, having a CMO could be a key to success, according to a new Forrester Research report. Smartphones and tablets are “the manifestation of a much broader shift to new systems of engagement… [with] customers, partners and employees,” Forrester said in the 30-page report. “To remain vital in this business technology reformation, CIOs must step up and work with other executives to establish an office of the chief mobility officer to implement an enterprisewide mobile strategy.” One of the report’s authors, Forrester analyst Ted Schadler, said in an interview that one of purposes of the report is to get … Continue reading »

How to COPE with Consumerization of IT

Thursday, February 16, 2012

Philippe Winthrop wrote an article, and proposed the term COPE (yes, another acronym) to describe another way to manage consumerization of IT: Corporate Owned, Personally Enabled. “The IT department would provide you ANY mobile device you want…that’s because they have embraced the Consumerization of IT.  However, as opposed to trying to find a way to secure the corporate data that will reside on the employees’ personal devices, why not instead provide the employees a means to put some personal content on their work devices?  The device (and the corporate data that resides on it) is fully managed and controlled, but also allows for employees to install the apps they like for their personal use.  We already see this in many organizations … Continue reading »

Would you pay your carrier to manage mobile devices?

Wednesday, January 11, 2012

Here’s an interesting take on carriers managing mobile devices:,1 “There’s a whole industry called telecom expense management (TEM) that exists solely because carrier bills cannot be trusted to be accurate. Despite years of claimed work by carriers on their billing systems, the bills remain untrustworthy, and (surprise!) they tend to overcharge. This is a provider you’d want to give more business and trust?” It’s true, as a TEM company, we keep adding on more customers who recognize that they’re paying more to carriers than they need to.   “Have you ever called a carrier for support on your device? Or brought one in to a retail store? If so, you know the experience is almost always poor. Would any business … Continue reading »

Top Five Mobile Challenges for CIOs in 2012

Monday, January 9, 2012

Article published in Wireless Business & Technology: 2012 is shaping up to be a challenging year for CIOs as they figure out how to safely embrace the slew of mobile devices entering their networks. Smartphones and tablets are seriously threatening the IT status quo, and CIOs who fail to adapt and get ahead of this technological upheaval risk getting pink slips and seeing themselves replaced by more agile colleagues. Clearly, 2012 is the year that organizations of all shapes and sizes must come to terms with their mobile problem. Here are five serious mobile challenges CIOs will have to deal with in 2012… _____________ There is so much happening with mobility in the enterprise, and it’s happening so quickly. We … Continue reading »

IBM Adds Hosted Mobile Device Management Service

Wednesday, November 16, 2011

IBM has announced that it will be entering the Mobile Device Management ring with the introduction of an MDM service aimed at enterprises “embracing employees bringing their own devices.” IBM has partnered with Juniper Networks to provide this cloud-based service, which is expected to be offered at a price of $3-$10 per device. In its press release, IBM makes specific mention of their intention to include the capability of “protecting against spyware and viruses” on the mobile devices under management.  Such functionality could be a differentiator in the MDM space. It will be interesting to see how this product is able to accomplish something not typically mentioned in other MDM products. Companies that are most likely to use the IBM MDM service … Continue reading »

Google joins the Mobile Device Management Bandwagon

Tuesday, November 15, 2011

Google has recently announced plans to offer a Mobile Device Management (MDM) type of service within the Google App suite. This service will allow the basic management and policy enforcement of corporate iOS, Android and Windows Mobile devices. It’s too early to say how well the functionality and features compare to established MDM vendors. Google has created many applications and services over the years. Some do very well, others stumble along, and still others are eventually pulled. Similar to many other MDM providers, this service will connect to devices making use of the standard ActiveSync protocol. For more information check out this article over at InformationWeek. This service is only useful to companies already using Google Apps. While this is … Continue reading »