SlideShare a Scribd company logo
Delivering Mobile to the Enterprise
    David Strom
    Business Channels Editor
    ReadWriteWeb.com




    May 1, 2012

1
Who am I?




                2



2
Our panel
     Bob Sutor, VP, IBM Mobile Platform
     Steve Smith, Senior Vice President and CIO, TBC Corp
     Dale Potter, CIO, The Ottawa Hospital




3
4
So how do we cope with this
    onslaught of tablets?




5
Email docs to yourself




6
Use cloud-based storage




7
VPNs




8
Remote desktop connection




9
Converter apps




10
Various other special-purpose solutions




11
Security issues




12
Document fidelity issues




13
Discussion questions
      What do you see as the key challenges for organizations
       seeking to capitalize on growth in the mobile market?
      Alternatively, what are the biggest opportunities in the mobile
       market in the next 12-24 months?
      What’s driving this growing adoption of mobility?
      How has the BYOD trend changed mobile adoption rates?
      Where do you recommend companies get started with mobility?




14

More Related Content

Viewers also liked

Comunidades Sociales, una fuerza multiplicadora para los Centros de Contacto
Comunidades Sociales, una fuerza multiplicadora para los Centros de ContactoComunidades Sociales, una fuerza multiplicadora para los Centros de Contacto
Comunidades Sociales, una fuerza multiplicadora para los Centros de Contacto
Mundo Contact
 
Presentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVA
Presentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVAPresentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVA
Presentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVA
Ariel Gajardo
 
Device Fragmentation - Session @ MobileCamp 2011
Device Fragmentation - Session @ MobileCamp 2011Device Fragmentation - Session @ MobileCamp 2011
Device Fragmentation - Session @ MobileCamp 2011
fitml.com
 
Taller de batik
Taller de batikTaller de batik
Taller de batik
Batik Valdivia
 
Manoj cv
Manoj cvManoj cv
Manoj cv
mkkar1681
 
Telecomunicaciones
Telecomunicaciones Telecomunicaciones
Telecomunicaciones
Ana Ivonne Val
 
Change Management for Demand Geneation eBook
Change Management for Demand Geneation eBook Change Management for Demand Geneation eBook
Change Management for Demand Geneation eBook
Mathew Sweezey
 
Rhinovirus y Enterovirus
Rhinovirus y EnterovirusRhinovirus y Enterovirus
Rhinovirus y Enterovirus
lgmadrid
 
Palabras y expresiones de Cuenca
Palabras y expresiones de CuencaPalabras y expresiones de Cuenca
Palabras y expresiones de Cuenca
Manuel Álvarez Reyes
 

Viewers also liked (10)

Comunidades Sociales, una fuerza multiplicadora para los Centros de Contacto
Comunidades Sociales, una fuerza multiplicadora para los Centros de ContactoComunidades Sociales, una fuerza multiplicadora para los Centros de Contacto
Comunidades Sociales, una fuerza multiplicadora para los Centros de Contacto
 
Presentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVA
Presentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVAPresentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVA
Presentación Final / Adama / Postgrado en Innovación y Design Thinking @ ELISAVA
 
Device Fragmentation - Session @ MobileCamp 2011
Device Fragmentation - Session @ MobileCamp 2011Device Fragmentation - Session @ MobileCamp 2011
Device Fragmentation - Session @ MobileCamp 2011
 
Taller de batik
Taller de batikTaller de batik
Taller de batik
 
A Educación En Tecnologia E Informatica
A  Educación En Tecnologia E InformaticaA  Educación En Tecnologia E Informatica
A Educación En Tecnologia E Informatica
 
Manoj cv
Manoj cvManoj cv
Manoj cv
 
Telecomunicaciones
Telecomunicaciones Telecomunicaciones
Telecomunicaciones
 
Change Management for Demand Geneation eBook
Change Management for Demand Geneation eBook Change Management for Demand Geneation eBook
Change Management for Demand Geneation eBook
 
Rhinovirus y Enterovirus
Rhinovirus y EnterovirusRhinovirus y Enterovirus
Rhinovirus y Enterovirus
 
Palabras y expresiones de Cuenca
Palabras y expresiones de CuencaPalabras y expresiones de Cuenca
Palabras y expresiones de Cuenca
 

Similar to Delivering Mobile to the Enterprise

Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big Deal
Piyush Malik
 
Hidden in plain sight B2B world
Hidden in plain sight  B2B worldHidden in plain sight  B2B world
Hidden in plain sight B2B world
Radoslav Corlija
 
Hidden in plain sight: How mobile is quietly revolutionizing the B2B world
Hidden in plain sight: How mobile is quietly revolutionizing the B2B worldHidden in plain sight: How mobile is quietly revolutionizing the B2B world
Hidden in plain sight: How mobile is quietly revolutionizing the B2B world
Ogilvy
 
Hidden in plain sight mobile b2b
Hidden in plain sight mobile b2bHidden in plain sight mobile b2b
Hidden in plain sight mobile b2bDivyesh Juvariwala
 
Mobile is the new face of business
Mobile is the new face of businessMobile is the new face of business
Mobile is the new face of business
Sybase Türkiye
 
Choosing The Right Devices For Your Field Workforce
Choosing The Right Devices For Your Field WorkforceChoosing The Right Devices For Your Field Workforce
Choosing The Right Devices For Your Field Workforce
IQPC Exchange
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
DMI
 
Mobile Customer Experience
Mobile Customer ExperienceMobile Customer Experience
Mobile Customer Experience
Janet Jaiswal
 
HelloWallet Forum: Benefits & Behavior Change Part II, Rick Bowman
HelloWallet Forum: Benefits & Behavior Change Part II, Rick BowmanHelloWallet Forum: Benefits & Behavior Change Part II, Rick Bowman
HelloWallet Forum: Benefits & Behavior Change Part II, Rick Bowman
HelloWallet Events
 
Demand for operational decision management (odm) technology is growing fast.....
Demand for operational decision management (odm) technology is growing fast.....Demand for operational decision management (odm) technology is growing fast.....
Demand for operational decision management (odm) technology is growing fast.....
Luis Carrasco-Cortes
 
The Industry Software Revolution
The Industry Software RevolutionThe Industry Software Revolution
The Industry Software Revolution
Bessemer Venture Partners
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
Barcoding, Inc.
 
HeathWallace_Mobile_Whitepaper_2015
HeathWallace_Mobile_Whitepaper_2015HeathWallace_Mobile_Whitepaper_2015
HeathWallace_Mobile_Whitepaper_2015Rory Yates
 
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
Hugh Choi 최형욱
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
Abhishek Sood
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
Graham Chalk
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
J
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderOKTOPUS Consulting
 
Strategic Analysis of Microsoft Corp. (2014)
Strategic Analysis of Microsoft Corp. (2014)Strategic Analysis of Microsoft Corp. (2014)
Strategic Analysis of Microsoft Corp. (2014)
Chinmay Chauhan
 

Similar to Delivering Mobile to the Enterprise (20)

Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big Deal
 
Hidden in plain sight B2B world
Hidden in plain sight  B2B worldHidden in plain sight  B2B world
Hidden in plain sight B2B world
 
Hidden in plain sight: How mobile is quietly revolutionizing the B2B world
Hidden in plain sight: How mobile is quietly revolutionizing the B2B worldHidden in plain sight: How mobile is quietly revolutionizing the B2B world
Hidden in plain sight: How mobile is quietly revolutionizing the B2B world
 
Hidden in plain sight mobile b2b
Hidden in plain sight mobile b2bHidden in plain sight mobile b2b
Hidden in plain sight mobile b2b
 
Mobile is the new face of business
Mobile is the new face of businessMobile is the new face of business
Mobile is the new face of business
 
Choosing The Right Devices For Your Field Workforce
Choosing The Right Devices For Your Field WorkforceChoosing The Right Devices For Your Field Workforce
Choosing The Right Devices For Your Field Workforce
 
Big data - challenge or opportunity
Big data - challenge or opportunityBig data - challenge or opportunity
Big data - challenge or opportunity
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Mobile Customer Experience
Mobile Customer ExperienceMobile Customer Experience
Mobile Customer Experience
 
HelloWallet Forum: Benefits & Behavior Change Part II, Rick Bowman
HelloWallet Forum: Benefits & Behavior Change Part II, Rick BowmanHelloWallet Forum: Benefits & Behavior Change Part II, Rick Bowman
HelloWallet Forum: Benefits & Behavior Change Part II, Rick Bowman
 
Demand for operational decision management (odm) technology is growing fast.....
Demand for operational decision management (odm) technology is growing fast.....Demand for operational decision management (odm) technology is growing fast.....
Demand for operational decision management (odm) technology is growing fast.....
 
The Industry Software Revolution
The Industry Software RevolutionThe Industry Software Revolution
The Industry Software Revolution
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
HeathWallace_Mobile_Whitepaper_2015
HeathWallace_Mobile_Whitepaper_2015HeathWallace_Mobile_Whitepaper_2015
HeathWallace_Mobile_Whitepaper_2015
 
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
Strategic Analysis of Microsoft Corp. (2014)
Strategic Analysis of Microsoft Corp. (2014)Strategic Analysis of Microsoft Corp. (2014)
Strategic Analysis of Microsoft Corp. (2014)
 

More from David Strom

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
David Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
David Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
David Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
David Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
David Strom
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
David Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
David Strom
 

More from David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Delivering Mobile to the Enterprise

Editor's Notes

  1. File Name Here.ppt File Name Here.ppt 02/10/10 03:37
  2. File Name Here.ppt File Name Here.ppt 02/10/10 03:37
  3. There are numerous cloud-based storage services, including Google Drive, Dropbox and Box.net. But you may not be able to view your docs properly and anyone that can gain access to your cloud can download your documents freely too File Name Here.ppt
  4. You can make use of a VPN if you can find a client for your tablet or smartphone that will work with your corporate VPN provider. One issue for VPNs is that they assume all apps on your tablet are well behaved. Once you open up a VPN connection, any app can have full access to your corporate network. File Name Here.ppt
  5. Products such as Citrix, LogMeIn, or nivio can establish remote desktop connections to “real” Windows computers so you can run these apps on your mobile device. File Name Here.ppt
  6. Slideshark, WatchDox can convert your docs to formats that are viewable on a mobile device, but you can't annotate the document easily. File Name Here.ppt
  7. And then there are specialized Mobile Device Management solutions: ionGrid Nexus, Rover, IBM has two different products from Tivoli and Worklight. File Name Here.ppt
  8. Is all traffic encrypted between mobile device and your corporate network? Can you map and manage a device to a particular user in your directory services? Can you remove all traces of your docs from the tablet once you close it? Can you share documents with external users outside your corporate domain? File Name Here.ppt
  9. As we use smaller-screen devices, it gets harder to find a way to view these documents the way they appear on our large 25-inch monitors on our desktops. Some solutions might be able to transfer a document to a device, but then we waste time moving around and swiping, magnifying and dragging to see its contents clearly. Some solutions support only particular versions or file types, or do oddball conversions that result in some unexpected ways that make it difficult to view the content. This is a sample PPT slide showing you how it looks under certain circumstances. File Name Here.ppt