(Note: This article is a repost from Mobile Business Insights)
These days, it would be surprising – and concerning – if mobility and the consumerization of IT were not part of any mobile enterprise’s strategic roadmap. After all, end users have become more demanding about which devices they use and where they log in from the network. They expect the same user experience that they get from the powerful personal mobile devices they are already accustomed to.
Though the first mobile trend that emerged to address this new world was bring-your-own-device (BYOD), many enterprises are understandably concerned about the security of sensitive corporate data in a BYOD model. Enterprises are increasingly considering implementing a choose-your-own-device (CYOD) program to address those very legitimate concerns.
(This article is also published in Computerworld Hong Kong on August 1, 2016)
Image source: Internet
Hong Kong appears to be invaded by Pokémon Go players. We’ll no doubt be bumping into avid players all over the place. In case you’ve been entirely cut off from news this month, Pokémon Go is a mobile game app, in which players move around in the real world looking for digital creatures overlaid on the streets around them.
Less than two weeks after the initial release, Pokémon Go has become the most successful mobile game ever. It is also generating newspaper headlines about users and their experiences on a daily basis. The share price of Nintendo – which originated the Pokémon characters back in the ‘90s but is just a part owner of the app – was doubled. But it has fallen back as in reality, its profits from the game will be limited.
There is much more in this groundbreaking game. Such application and massive acceptance in augmented reality is expected to trigger a wave of adoption in other areas. Meanwhile, however, Pokémon Go’s massive adoption has been accompanied by reports of server overloads, players being locked out and rumors of security issues.
While details have not been disclosed, it seems pretty clear that such issues have delayed the game’s rollout, especially to Japan and other game-crazy Asian markets, slowing down revenue generation. Simply put, it appears that the operation team was unprepared for the success of Pokémon Go.
Image source: Internet
Anyone familiar with “Star Trek” knows that technology plays a central role in the science fiction franchise. On the Starship Enterprise, the onboard computer is almost a character in its own right, interacting naturally with the crew members through spoken language and thoroughly embedded in all activities like any other shipmate.
When the Romulans de-cloak off the starboard beam and prepare to attack, Mr. Spock asks the computer to divert more power to the forward shields and prepare a full spread of photon torpedoes in response. The computer does so instantly and effortlessly, casually responding, “All taken care of, Mr. Spock, is there anything else I can do for you today?”
(Note: This article is a repost from here)
It’s a story we hear all too often in this day and age — the nightly television news anchor reports on yet another data breach at a major corporation that affected millions of customers. IT systems go down, important records are exposed, credit card numbers are compromised and identities are bought and sold on dark corners of the internet. The road to recovery can be a long one and can leave a mark some organizations have a hard time erasing in the long term.
However, in the face of rising data breach costs, business continuity management (BCM) can make a drastic difference for affected organizations.