Wireless Challenges: What Mobile Users Really Think
While moderating a Birds of a Feather Session (BOFS) at the InformationWeek Spring Conference in Amelia Island, Fla., this week, I presented the attendees with a list of wireless challenges in hopes of shining a light of realism on hype around mobile applications, dual-mode handsets, WiMax, and municipal Wi-Fi. But apparently the challenges don't stop there.
While moderating a Birds of a Feather Session (BOFS) at the InformationWeek Spring Conference in Amelia Island, Fla., this week, I presented the attendees with a list of wireless challenges in hopes of shining a light of realism on hype around mobile applications, dual-mode handsets, WiMax, and municipal Wi-Fi. But apparently the challenges don't stop there.Several people that sat in on the session expressed their frustration with putting applications on mobile devices. It's expensive to custom-develop a mobile application, and off-the-shelf applications often don't integrate with back-end systems. As if that weren't enough, manufacturers are rolling out new devices every couple of months. That means companies not only have to keep buying new devices, but they also have to keep tailoring their applications to work on these devices.
Then there's the prosumer problem. It's not uncommon nowadays to use a smart phone or PDA for both personal and work purposes. Who wants to carry multiple devices? Not many people I know. Life would be a lot easier if every device, regardless of carrier, manufacturer, or operating system, could integrate with people's personal and business contact lists and calendars. It's the simple things that can make a difference. At least that's the vibe I got from the attendees.
One thing that still remains at the top of the challenges list is security. Only now, people have to get a better grip on the personal and work data that resides on their mobile devices. A lost BlackBerry or a stolen Treo can spell disaster, especially if they're not protected by passwords or encryption keys. One solution is to design security policies around applications as opposed to the devices themselves. So for example, a person would have to type in a password before accessing their E-mail on a PDA. Having remote device data-wipe capabilities is also a good idea.
One attendee was convinced that people will start demanding wireless in the near future--kind of like how E-mail addresses and Internet connections are demanded today. Sure, a lot of technology is already out there to meet the demand, but IT departments may not be ready to support it.
My former colleague, Andy Dornan, and I further tackle a lot these issues in our wireless challenges feature story. Check it out in next week's issue (Monday, April 10). A reality check is good every once in a while. I know I got one when we wrote that story.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.