Four years ago, in June 2010, Forrester Analyst Michele Pelino wrote a blog post that summarized the top questions that Forrester clients asked about mobile devices and mobile applications. Pelino wrote that in the previous 12 months, 700 of the 22,000 inquiries that Forrester analysts fielded from clients were related to enterprise mobility issues, a jump from 360 in 2007.Read More
Back in 1748, in his essay Advice to a Young Tradesman, Benjamin Franklin wrote:
“Remember that time is money. He that can earn ten shillings a day by his labour, and goes abroad, or sits idle one half of that day, though he spends but sixpence during his diversion or idleness, it ought not to be reckoned the only expence; he hath really spent or thrown away five shillings besides.”Read More
Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts -- is suddenly a hot topic in U.S. IT circles.
In the beginning, words and images were created by hand. The process was slow and difficult, and written documents were expensive and highly prized.
Tags: secure mobile printing, mobile printing, Android, iPad, mobile security, iPhone, AirWatch, IT security, print from android phone, Print from iPhone, CFAA, iPad printing, Hewlett-Packard Printers
For 21 years, David Cowan has invested for Bessemer Venture Partners, a global venture capital firm that has funded cloud companies such as Box, Eloqua and LinkedIn. Recently, he took to LinkedIn to offer his opinion on the future of cloud computing – a future that he says will rely on encryption.
Tags: mobile printing, Android, mobile security, iPhone, IT security, print from android phone, Print from iPhone, mobile printing on android, print securely, iPad printing, enterprise mobile printing, mobile printing for the enterprise
Easy, secure mobile printing remains elusive for many companies. But it’s within reach – at last – thanks to the practical, factual information in a new ebook published by Breezy.
It’s the stuff of an IT manager’s nightmare: a government agency known by its initials sweeps in to audit the company for compliance with a set of vague regulations that may or may not clearly spell out clearly what constitutes compliance.
Two recent surveys confirm what many IT managers have long suspected: if employees are unhappy with company policies on mobile devices or strict mobile security policies that they see as hindering their ability to get work done, they will find a way around the policies so that they can use unsecured devices to access company files.