Should your company have a Chief Mobile Officer?

Friday, February 17, 2012

  Computerworld recently published this article, Chief Mobile Officer: A job title now timely? “…as enterprises scramble these days to establish mobile strategies, having a CMO could be a key to success, according to a new Forrester Research report. Smartphones and tablets are “the manifestation of a much broader shift to new systems of engagement… [with] customers, partners and employees,” Forrester said in the 30-page report. “To remain vital in this business technology reformation, CIOs must step up and work with other executives to establish an office of the chief mobility officer to implement an enterprisewide mobile strategy.” One of the report’s authors, Forrester analyst Ted Schadler, said in an interview that one of purposes of the report is to get … Continue reading »


How to COPE with Consumerization of IT

Thursday, February 16, 2012

Philippe Winthrop wrote an article, and proposed the term COPE (yes, another acronym) to describe another way to manage consumerization of IT: Corporate Owned, Personally Enabled. “The IT department would provide you ANY mobile device you want…that’s because they have embraced the Consumerization of IT.  However, as opposed to trying to find a way to secure the corporate data that will reside on the employees’ personal devices, why not instead provide the employees a means to put some personal content on their work devices?  The device (and the corporate data that resides on it) is fully managed and controlled, but also allows for employees to install the apps they like for their personal use.  We already see this in many organizations … Continue reading »


Confusion About BYOD Issues

Friday, January 20, 2012

There are two separate issues involved with BYOD (Bring Your Own Device) policies that seem to get constantly mixed up: Who pays for the device Choice of device   Who pays for the device With the proliferation of smartphones in the general population, many employees who did not previously have a corporate paid device, and who didn’t necessarily require mobile access to do their jobs, are now asking to be able to use their own devices at work. Since these devices belong to the employees, this is truly a BYOD phenomenon. Companies may benefit from increased productivity amongst users who are keen to check email more frequently on their shiny new toys business productivity tools. Employees may also be happier, … Continue reading »


Would you pay your carrier to manage mobile devices?

Wednesday, January 11, 2012

Here’s an interesting take on carriers managing mobile devices: http://www.infoworld.com/d/mobile-technology/uh-oh-the-carriers-want-manage-your-smartphones-181055?page=0,1 “There’s a whole industry called telecom expense management (TEM) that exists solely because carrier bills cannot be trusted to be accurate. Despite years of claimed work by carriers on their billing systems, the bills remain untrustworthy, and (surprise!) they tend to overcharge. This is a provider you’d want to give more business and trust?” It’s true, as a TEM company, we keep adding on more customers who recognize that they’re paying more to carriers than they need to.   “Have you ever called a carrier for support on your device? Or brought one in to a retail store? If so, you know the experience is almost always poor. Would any business … Continue reading »


Top Five Mobile Challenges for CIOs in 2012

Monday, January 9, 2012

Article published in Wireless Business & Technology: 2012 is shaping up to be a challenging year for CIOs as they figure out how to safely embrace the slew of mobile devices entering their networks. Smartphones and tablets are seriously threatening the IT status quo, and CIOs who fail to adapt and get ahead of this technological upheaval risk getting pink slips and seeing themselves replaced by more agile colleagues. Clearly, 2012 is the year that organizations of all shapes and sizes must come to terms with their mobile problem. Here are five serious mobile challenges CIOs will have to deal with in 2012… http://wireless.sys-con.com/node/2118812 _____________ There is so much happening with mobility in the enterprise, and it’s happening so quickly. We … Continue reading »


Will RIM’s MDM Software Be a Winner?

Thursday, December 1, 2011

RIM announced yesterday that they are getting closer to launching Mobile Fusion, an extension of their Blackberry Enterprise Server (BES) software that includes support for iOS and Android smartphones and tablets. It’s currently in beta testing, and their target release date is the end of March, 2012. The Mobile Device Management software category has gotten crowded, with dozens of specialized vendors. Recently, IBM and Google also announced MDM offerings. Of course, RIM has the longest history of providing security and management software via their BES software, albeit only for their own Blackberry handsets. RIM originally announced plans to offer support for Apple and Android devices earlier this spring, shortly after acquiring the German MDM firm, ubitexx. Initial demonstrations of the ubitexx/RIM product … Continue reading »


Bring Your Own Device (BYOD) and the Consumerization of Mobile and IT

Wednesday, November 30, 2011

Best Practices for BYOD Policies What is BYOD, and should this concern your company? Ever since consumers (including employees in your company) started coveting the iPhone, there has been an increasing demand from enterprise users to be able to choose their own smartphones, and now tablets, and even desktops and laptops. According to a recent article in the Wall Street Journal, 69% of companies currently do not allow employees to use their own devices, but that number is expected to drop to 37% within 12 to 18 months. On the other hand, a survey from October 2010 showed that “81% of employees admit to using their devices to access their employer’s network without their employer’s knowledge or permission—and 58 % … Continue reading »


Who Pays for Mobile Expenses With Your BYOD Program?

Wednesday, November 23, 2011

Controlling mobile costs becomes more complex when you add in a Bring Your Own Device (BYOD) program. Many employees prefer to carry one smartphone for both work and personal use, but then how should companies pay for these dual-purpose devices? In order to address this question, we need to categorize employees by the type of work that they do, and how much they rely on mobile devices. The exact categories will be different between companies, depending on job functions. Decisions on who pays for the mobile bill will also depend largely on company culture. Consider a spectrum of mobile workers, with employees who are 100% mobile on one end, e.g. a salesperson. On the other end are employees who are … Continue reading »


Amazon’s Kindle Fire for Enterprise Use?

Thursday, November 17, 2011

The Amazon Kindle Fire was released this week with a record-setting one million plus preordered tablets being shipped. Reviews of the device have been lukewarm with many reviewers pointing to the less than powerful 1Ghz processor. From an enterprise point of view the Fire isn’t really important, at least not yet. None of the major MDM providers offer an agent designed to work with the modified version of Android 2.2 that powers the tablet. It is rumored that Amazon is planning to update the Fire OS to make use of Android 2.3 or maybe even 3.0 sometime in the near future. With the Fire expected to be a popular gift this holiday season, we could see pressure on the enterprise … Continue reading »


Bring Your Own Device (BYOD) Security Policies

Wednesday, November 16, 2011

Creating an effective security policy for personal devices accessing the corporate network You probably already have a wireless security policy governing the use of corporately owned devices, but what about those employee owned devices? If you don’t already have a good Bring Your Own Device policy, then your organization falls into one of two scenarios: Personal devices are being blocked from the corporate network and therefore your company is missing out on the free increased productivity associated with an employee making use of a mobile device. Personal devices are already accessing your corporate network, with or without your knowledge, and you aren’t doing anything to ensure that this is being done securely. In either case your organization can likely benefit … Continue reading »