Subscribe       Feed   All Posts     Search by Topic:

Buried Alive by Consumer Applications in the Workspace

An article in GigaOM citing new research by Unisys on the consumerization of IT recently piqued my interest.   According to the research, IT pros underestimate the use of consumer technologies in the workplace by a whopping 50%.  In fact, IT decision-makers gave themselves a rating of only 2.9 for overall support of employee owned mobile devices, social appli

Evolving Mobile Data Security Risk

In 2010, Oracle surveyed more than 3,000 people from around the globe to discover how people communicate. The overwhelming response was mobile, mobile, mobile. In 2011, Oracle conducted a second survey calling it The Future of Mobile Communications-Take Two. This upgraded report delivered interesting results about mobile phone usage and the perceptions of mobile devices.

Veterans Day, Honoring Those Who Serve

November 11th is Veterans Day. It’s a day to honor United States’ veterans of all conflicts for their patriotism and willingness to serve. Veterans Day was originally established to honor Americans who had served in World War I. Since then, it has become a national holiday that is celebrated on November 11, the anniversary of the day World War I ended in 1918.

Had to Pause Angry Birds to Forward a File to my Boss

Walk around any organization today and you will see people using the newest and coolest PCs, smartphones, and tablets. It’s not just the normal suspects that love the IT gadgets. It’s everyone from the CEO to the summer intern. Even my mom got an iPad and is getting in on the action.  It’s so easy to download emails and send photos to relatives. She takes it with her everywhere—even work. Everyone loves these devices at home and work because they’re easy to use.

Data breaches put the scare back in Halloween!

For most people outside the IT profession, the scariest thing they deal with on Halloween is a spooky costume or the newest episode of AMC’s ghastly drama “The Walking Dead.” For IT professionals, a data breach is far worse. With the frequency and cost of data breaches on the rise, it’s easy to see why the topic worries IT professionals. In its fifth annual TITLE survey the Ponemon Institute showed a significant spike in legal defense spending to address fears of successful class actions resulting from customer, consumer or employee data loss.

Go Mobile, Go Secure with Accellion

Our latest Accellion Mobile App for iPhone and iPad with support for iOS 5 was introduced today.  With this release, Accellion is leading the industry when it comes to enterprise mobile file sharing security features and control.

The Mobile Offensive! BYOD (Bring Your Own Device)

Mobile employees have been worrying IT managers for years. It all started with pagers, PDAs, and the first cellular phones. Now iPads, smartphones, and a slew of other Wi-Fi enabled mobile devices are on track to outnumber desktop computers. The local area network (LAN) that interconnects computers in a limited area such as a home, computer lab, or office building is fading fast. Most enterprise networks are moving to wireless as the primary way to connect.

Accellion and MobileIron Announce Partnership

Most IT organizations have minimal visibility into what’s on an employee’s phone and how it’s being used, and even less control or insight into information being accessed and shared.

Catering to the Sophisticated User: Make that a "babe-a-ccino"

It was only a matter of time before someone figured out how to tap into the toddler market with a specialty mock coffee drink aptly called the "babe-a-ccino." Yes, no kidding, there is the photo in the WSJ this morning of a young man, clutching his morsel of croissant, or is it a chai lavendar biscuit, with his "babe-a-ccino." Invitingly presented in a classic espresso cup, the "babe-a-ccino" seems to consist of frothy milk, a sprinkle of cocoa, and only the suggestion of coffee.

Jack, age 2, drinks a babe-a-ccino at the Seesaw cafe in San Francisco - WSJ

What’s next? Constant Reinvention.

What’s next?  I was inspired to consider this question today after reading John D. Halamka’s blog entry on Life as a Heathcare CIO.


Subscribe to RSS - blogs