It’s true what they say about things coming in threes. In the tech industry, there is a lot of talk these days about the “third platform.” Many see computer users as being at a critical juncture in terms of how we interact with technology. The original, first platform was based on mainframes and terminals – think …
Author Archives: Kyp Walls
SEER Technology, Inc., headquartered in Salt Lake City, Utah, creates products that save lives by enabling customers to “see what can’t be seen” in dangerous environments. SEER Technology has two offerings. The AccuSense Chemical Recognition System gives first responders the capability to detect and identify multiple unknown chemicals, and their concentrations, in a field deployable …
Not all tablets are created equal. And as The Wall Street Journal highlights this week, many American companies are making big mistakes in taking a “one size fits all” approach to deploying tablets in the workplace.
In “Here Come Tablets. Here Come Problems,” reporter Shara Tibken takes a look at the spread of tablet computers in the enterprise, especially popular consumer-grade devices like the Apple iPad. She highlights some of the challenges companies are facing after rushing massive deployments to their workforce and failing to take into account some important factors, such as a comprehensive deployment and mobile device management strategy, device functionality and information security concerns. Crucially, many companies also are discovering the devices in which they’ve invested aren’t made to hold up to the real-world conditions their employees face.
Consumer tablets have undoubtedly been the hottest mobile devices of 2011 and now, due to the increased interest in these devices, particularly from employees, tablets have started to make their way into the enterprise market via a phenomenon known as the consumerization of IT.
Mobile workers are seen as the highest risk to IT security, according to a recent study. Employees’ mobile devices, and laptop computers specifically, are cited as the most likely sources of a security breach.