Mobile 2.0 has arrived, so organizations must develop an enterprise mobile strategy that extends beyond smartphones and tablets and into the IoT.
Only a few years ago, a mobile strategy focused mostly on arming workers with phones and laptops that would allow them to call the office and work remotely from home or while on the road. File sharing was difficult, collaboration was challenging, and staying in sync as an organization was next to impossible.
However, as enterprise mobile technology has advanced and clouds have made data more accessible, organizations are learning that basic communication and collaboration, while vitally important, are only part of the picture.
“As mobile devices have evolved into powerful computers and the definition of mobility has expanded, organizations are recognizing that mobile is now at the center of a successful business strategy,” observes Abhijit Kabra, managing director at Accenture Mobility, part of consulting firm Accenture.
More of the Baseline article from Samuel Greengard
Sloppy grammar, sounding like you just woke up, ending statements with a slight uptick in pitch, called “uptalk” or “Valley girl speak,” have all been proven to undermine a person’s success.
But how does the listener break down information when both a man and a woman are saying the exact same thing? According to research, the voice itself is the source of unconscious bias for the listener, and women are interpreted differently as a result.
Meghan Sumner, an associate professor of linguistics at Stanford University, stumbled into the unconscious bias realm after years of investigating how listeners extract information from voices, and how the pieces of information are stored in our memory. Study after study, she found that we all listen differently based on where we’re from and our feelings toward different accents. It’s not a conscious choice, but the result of social biases that form unconscious stereotyping which then influences that way we listen.
More of the Fast Company article from Vivian Giang
The influence of CIOs and other IT leadership execs is growing within the majority of midmarket companies, according to a recent survey from Deloitte. The accompanying report, titled “Technology in the Midmarket: Taking Ownership,” indicates that this shift is emerging at a time when these businesses are increasingly viewing tech investment as a strategic value-builder. They’re pursuing cloud initiatives, for example, to boost the effectiveness of accounting, enterprise resource planning and customer relationship management efforts. In addition, many are pursuing predictive analytics to boost competitive edge. To ensure they can expand investment into these and other IT areas in a secure manner, CIOs and other tech leaders are convincing the C-suite and other executive leaders to deploy data encryption more than ever. These companies “are increasingly realizing value through early investments in the cloud, social, mobile and data analytics,” according to the report.
More of the CIO Insight slideshow from Dennis McCafferty
IPExpo The Internet of Things will put more demand upon mid-range and co-lo data centres, according to the marketing manager of data centre kit firm Minkels.
Speaking at London’s IPExpo conference this morning, Minkels’ Niek van der Pas explained how, in his view, the explosion of IoT device usage will push more and more workloads into smaller data centres.
Highlighting how IoT devices, by necessity, spend their time talking to what he called the “edge layer”, comprising “metro/local” data centres – as opposed to core layer “public cloud and hyperscale” data centres – Van der Pas said the main effect of this is going to be to scale up the age-old problems of cooling and power demands.
Two graphs on one of his slides illustrated the problem. LINX handles just under 3Tbps of internet traffic at 9pm. While the graph showed the usual peaks and troughs during the day, a similar graph showing power drawn by LINX was almost flat.
More of The Register post from Gareth Corfield
Public and hybrid cloud adoption has a major ripple effect on enterprise network design. New bottlenecks arise, and some businesses need to alter their network configurations — particularly those for wide area networks — to ensure they get the performance they need.
With hybrid and public clouds, in particular, the networking focus shifts heavily to wide area network (WAN) connections. Businesses need to link their data centers to their public cloud provider’s sites, and often rely on their existing internet lines to do so. But this approach has shortcomings.
First, bandwidth is an issue. Traffic that used to roam about the data center now needs to move off-site, often increasing WAN traffic. Consequently, organizations may need to upgrade their internet lines, which can be expensive; pricing depends on a business’ location and amount of bandwidth needed.
More of the SearchCloudComputing article from Paul Korzeniowski
According to new research published by CTERA Networks, while enterprises continue to migrate workloads to the cloud at a rapid pace, protection of cloud-based servers and applications has not fully evolved to meet enterprise requirements for business continuity and data availability.
CTERA’s new eBook, ‘Game of Clouds’, showcases the findings of CTERA’s inaugural cloud backup survey, and presents a deep look at the state of enterprise cloud data protection. A CTERA-commissioned study was conducted by independent research firm Vanson Bourne to examine the data protection strategies of 400 IT decision makers and IT specialists in organizations using the cloud for application deployment at US, German and French organizations. The study analyzes the benefits and pitfalls of current backup strategies, offers key considerations for organizations moving to the cloud, and looks at the impact of poor backup practices on business continuity.
More of the Continuity Central post
The ability to effectively manage complex, multi-vendor sourcing arrangements is becoming increasingly important in today’s business enterprises. In many cases, however, vendor management capabilities aren’t adequate to the challenge. As a result, business value erodes, service quality suffers and enterprises are exposed to operational and financial risk.
As a discipline, Vendor Management and Governance (VMG) is gaining boardroom attention for a number of reasons. At a high level, achieving more value from outsourcing is becoming a top priority. A sourcing strategy based on cost reduction alone is no longer sufficient, and executives are recognizing that an effective VMG function can enable the operational transparency and process consistency needed to drive business benefits such as enhanced data analytics and customer insight.
More specifically, the continued growth of complex multi-vendor outsourcing agreements is underscoring the need for effective VMG. As delivery models constantly evolve, and as providers become more numerous and more specialized, the ability to oversee constant change and track multiple moving parts is essential.
More of the CIO Insight post from guest author David England
To keep up with tech shifts and changing business demands, today’s state government CIOs must constantly redefine the way they manage a wide range of IT systems and applications, according to a recent survey from the National Association of State Chief Information Officers (NASCIO), Grant Thornton LLP and CompTIA. The accompanying report, titled “The Adaptable State CIO,” indicates that most state CIOs, for example, are moving toward outsourcing, managed services and shared services models for IT infrastructure and operations. Most are exploring or adopting agile software development approaches. They’re also looking to modernize the wealth of legacy systems that account for a substantial portion of their overall tech portfolio. In addition, many are focusing on ongoing innovations in mobility and the internet of things (IoT). In other words, our nation’s state CIOs face very similar challenges—and opportunities—as those in private industry. “(State government) CIOs are adapting to changing circumstances and expectations,” according to the report. “This requires agility to respond quickly to the unexpected, but also the strategic vision to anticipate and to plan for a future that cannot be easily predicted.
More of the CIO Insight slide show from Dennis McCafferty
Control Risks has published the results of its latest ‘The State of Enterprise Resilience’ survey, which assesses the degree to which the concept of resilience has gained traction and become embedded within organizations.
Over one third of respondents felt that their organizations lacked the relevant skills or talent to drive corporate resilience; this is an increase of 17 percent on 2015. This is in spite of the fact that 27 percent of respondents have actively recruited dedicated resources to support the resilience agenda and 46 percent have invested in training, awareness, and communications.
Other key findings include:
ISO 22316 provides guidance on resilience programmes
62 percent of respondents were either aware of or have read the draft of ISO 22316 – the guide to organizational resilience. 92 percent of respondents agree with the core principles which focus largely on shared purpose and collaboration across functions. However, 18 percent of respondents indicated that they would not be striving to adopt the core principles, preferring instead to stick to existing processes.
More of the Continuity Central post
Analysis On-premises file sync and share and collaboration is yesterday’s story. The future is the public cloud with dedicated software service suppliers, like Box.
File sync, share and collaboration is not a feature, but a product, best expressed as a service (SaaS) through Box’s three data centres and the public cloud, and not subsumed into part of an on-premises storage array offering. The company says it is now a content platform for the modern enterprise.
That’s the Box message and it’s working, though not dramatically, given that Box is growing and increasing its services.
Box has grown its base service with specific offerings for, for example, IBM, Salesforce, Microsoft Office, and Google Android for Work. It has also announced its Box Platform, an open API set for authentication, user management and content access.
More of The Register post from Chris Mellor